首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   798篇
  免费   63篇
各国政治   16篇
工人农民   14篇
世界政治   27篇
外交国际关系   51篇
法律   453篇
中国共产党   5篇
中国政治   74篇
政治理论   86篇
综合类   135篇
  2024年   2篇
  2023年   22篇
  2022年   28篇
  2021年   45篇
  2020年   52篇
  2019年   27篇
  2018年   55篇
  2017年   34篇
  2016年   26篇
  2015年   29篇
  2014年   65篇
  2013年   86篇
  2012年   65篇
  2011年   28篇
  2010年   30篇
  2009年   32篇
  2008年   53篇
  2007年   35篇
  2006年   28篇
  2005年   24篇
  2004年   17篇
  2003年   18篇
  2002年   21篇
  2001年   11篇
  2000年   7篇
  1999年   5篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1983年   3篇
排序方式: 共有861条查询结果,搜索用时 15 毫秒
851.
This paper rethinks the reasons for and the nature and means of personal data protection. The reasons for personal data protection are that it could promote the fairness and effectiveness of information flow, help individuals develop their independent personality, and equip them to deal with risks. With respect to the nature of personal data, this paper argues that such data should not be perceived from a purely individualistic point of view. Rather, there should be a contextualized understanding of the data, which considers the appropriate information flow of personal data within a particular context. Regarding the legal framework of personal data protection, this paper suggests that consumer protection law and public law are better equipped to protect personal data than tort, contract, or property law.  相似文献   
852.
我国药品、食品安全领域的延时性合规侵权案件频发,现行规范无法直接适用,《民法典》的侵权责任编却未作出任何回应。适当引进美国法上的“市场份额责任”并予以本土化改造迫在眉睫。药企的合规之抗辩不能被认可,因为其仍具有“不合理的危险”,且违反产品跟踪观察义务之行为亦应被视为缺陷,在利益衡量上应倾向于救济被侵权人。具体构建上,以《民法典》产品责任章第1202条为基础,对“产品”“缺陷”等要件进行合理解释,并对因果关系要件进行适当宽松改造,即可构建本土化体系。在损害赔偿的计算上,“本地市场份额”相较于“全国市场份额”标准具有法理和技术上的双重优势,更值得采纳。同时,大数据技术的飞速发展为我们提供了更多的可能性,针对线上企业和线下企业可采用不同的计算方式以加强合理性。  相似文献   
853.
研究银行集中与效率的关系主要有银行集中-管制效率论、银行集中-结构效率论和银行集中-制度效率论三种理论。本文基于面板数据,实证分析了后两种由市场竞争导致的银行集中与效率的理论。结果表明银行集中度与银行效率有显著的正相关关系,控制制度变量后,银行集中度与银行效率仍有显著的正相关关系,但制度变量不显著,银行集中-结构效率论成立。所以,提高银行效率必须改善银行市场结构,调整业务结构和加强银行监管,努力实现市场竞争导致的银行集中,建立防范金融风险的“隔离墙”。  相似文献   
854.
零信任是一种专注于资源保护的网络安全范式,其前提是信任永远不会隐式授予,而是必须持续评估。这一安全范式是随着互联网、物联网、大数据、云计算等数字应用场景的拓展而产生的。零信任架构的核心原则是通用身份验证、访问分割、最小信任授权、加密无处不在以及持续监控和调整。美国政府加速推进零信任战略,既是美国传统网络安全系统失能、网络安全理念和技术迭代的要求,也是数字时代大国竞争的组成部分,同时还是美国国防数字战略现代化的需要。美国政府加强基于顶层设计的网络安全宏观布局,明确实施零信任战略的关键事项,并确立了联邦政府推动零信任安全体系的基本原则。零信任安全框架的核心领域是关键基础设施、国家安全系统和国防系统,美国确立了以网络安全和基础设施安全局为轴心的推动零信任布局的“全政府”架构。零信任不仅仅是技术的转变,还是一种文化。零信任架构从以网络安全为中心转向以数据安全为中心。零信任不仅是网络安全防御战略,也是进攻战略,即在稳固自身安全的同时,无所顾忌地向对手发起攻击。美国在网络安全领域攻击性的增强,将给包括中国在内的世界其他国家的网络安全带来更大的压力。在这种情势下,中国政府机构、企业、网络安全工作人员须共同努力,打造中国自主可控、安全便捷的现代化网络安全体系。  相似文献   
855.
While research on the relationship between conspiratorial beliefs and populist attitudes has expanded over the years, concerns about causality in said relationship have not been successfully addressed. This research uses a two-pronged methodology combining observational and experimental data to put to empirical test the possibility that conspiratorial thinking breeds populist attitudes relying on Spain as a case study. A first study uses an online survey (N = 2887) to test how conspiratorial thinking covaries with the different dimensions of populist attitudes, accounting for the most likely confounders in this relationship. Results show that conspiratorial thinking and populist attitudes are associated even when considering potential spurious variables. We next use an online experiment (N = 537) in which we expose a randomly selected group to a vignette on three 9/11 conspiratorial stories, then they are asked about their populist attitudes. Our results lend credence to the literature pointing that conspiratorial beliefs led people to develop only one dimension of populist attitudes, the Manichean outlook.  相似文献   
856.
电子数据取证是信息时代公安机关重要的基础工作,是打击涉及互联网各类违法犯罪的“杀手锏”。电子数据鉴定是公安机关电子数据取证工作的重要组成部分,起到最终判定案(事)件性质,为侦查与诉讼提供依据的重要作用。公安机关电子数据鉴定与信息技术共同飞速发展,其领域不断延伸扩展、技术要求越来越高,面对的挑战也越来越多。概要介绍了公安机关电子数据鉴定的法律要求、鉴定资质、鉴定流程等内容,阐述了其面临的挑战。  相似文献   
857.
《Science & justice》2023,63(3):369-375
The strong integration of consumer electronics in everyday life offers many new investigative opportunities. In particular, digital traces from smartphones, smartwatches and activity trackers can now increasingly be used to infer information about actions performed by their users in the physical world that might not be obtainable from any other types of forensic evidence.While potentially very valuable from an investigative perspective, making forensically justifiable statements about such traces can sometimes be more difficult than expected. Requirements for this have not yet received much attention in the digital forensic literature. To help filling this gap, we describe the principles we use in determining the evidential value of such traces, which emphasize the need for experimental verification. For such research, aimed at determining the evidential value of these traces, we coin the term data2activity.In this paper, we devote attention to the potential and limitations of data2activity traces, focusing on challenges and giving two examples to illustrate potential pitfalls in interpreting data. Finally, future research directions into data2activity traces are indicated that, in our opinion, should be given attention. These include development of future-proof data acquisition and storage methodology, enabling division-of-effort and sharing of information, as well as development of labeling methodology for free-living experiments.  相似文献   
858.
The influence of the primary environment on the willingness to participate in elections or votes is undisputed. However, previous research on this was mainly based on experimental or survey data that exhibit systematic measurement errors (overreporting) or refer only to individual election dates. The aim of this study is therefore to obtain a more precise estimate of the household's basic participation disposition that is unbiased by random or systematic errors. This is possible thanks to official complete survey data on 18 different ballots in about a dozen St. Gallen municipalities. The corresponding analysis shows that the lion's share of individual willingness to participate varies at the household level.  相似文献   
859.

Research Summary

The current study examined 1055 stolen data products across 40 vendors on the Open and Dark Web to determine whether different product- and vendor-level behaviors predicted vendors’ trustworthiness as reflected in their product price point. Understanding the mechanisms that convey trust in the underground marketplace is crucial as it could help law enforcement target serious actors and disrupt the larger marketplace. Findings suggest the online stolen data market may resemble an uninformative cost condition where buyers are unable to accurately differentiate credible sellers due to the obscure nature of signaling behaviors.

Policy Implications

Law enforcement would benefit from designing fake shops and deceptive forum posts that transmit mixed signals to complicate market participants’ process of interpreting trust signals as intended. These interventions would generate high levels of risk that encourage both buyers and sellers to exit the online illicit marketplace without needing law enforcement arrests. Law enforcement could also target prominent market facilitators to generate a larger disruption that prevents actors from continuing their illicit behavior.  相似文献   
860.
为实现“十四五”规划提出的“健全就业需求调查和失业监测预警机制”,基于大数据开展失 业监测具有显著的实践意义。本研究在梳理和总结国内外关于就业失业的理论基础上采用文献分析法、访谈法, 分析基于大数据进行失业监测的应用逻辑,进而梳理国内外相关实践及其存在的突出问题,为失业预警机制的 建立健全提供参考。研究提出基于大数据开展失业监测的优化路径:首先建立政府引导、网站提供数据和学界 提供指导的三方合作机制,其次盘点和分类国内招聘网站等劳动力市场的互联网媒介,进而尽快开发和构建搜 索引擎关键词库,并引入专业的社会智库参与,最后强化政府监管力度。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号