首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   585篇
  免费   23篇
各国政治   9篇
工人农民   15篇
世界政治   7篇
外交国际关系   52篇
法律   197篇
中国共产党   8篇
中国政治   41篇
政治理论   85篇
综合类   194篇
  2022年   6篇
  2021年   12篇
  2020年   12篇
  2019年   16篇
  2018年   26篇
  2017年   21篇
  2016年   13篇
  2015年   14篇
  2014年   39篇
  2013年   95篇
  2012年   32篇
  2011年   53篇
  2010年   45篇
  2009年   44篇
  2008年   25篇
  2007年   18篇
  2006年   17篇
  2005年   19篇
  2004年   27篇
  2003年   21篇
  2002年   14篇
  2001年   29篇
  2000年   9篇
  1997年   1篇
排序方式: 共有608条查询结果,搜索用时 93 毫秒
101.
With an increase in the creation and maintenance of personal websites, web content management systems are now frequently utilized. Such systems offer a low cost and simple solution for those seeking to develop an online presence, and subsequently, a platform from which reported defamatory content, abuse, and copyright infringement has been witnessed. This article provides an introductory forensic analysis of the three current most popular web content management systems available, WordPress, Drupal, and Joomla! Test platforms have been created, and their site structures have been examined to provide guidance for forensic practitioners facing investigations of this type. Result's document available metadata for establishing site ownership, user interactions, and stored content following analysis of artifacts including Wordpress's wp_users, and wp_comments tables, Drupal's “watchdog” records, and Joomla!'s _users, and _content tables. Finally, investigatory limitations documenting the difficulties of investigating WCMS usage are noted, and analysis recommendations are offered.  相似文献   
102.
This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, this article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.  相似文献   
103.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
104.
In the European Union the Brussels Ibis Regulation governs the jurisdiction of Member State courts in civil and commercial matters. The reference for a preliminary ruling coming from the Estonian Supreme Court in the Bolagsupplysningen case offered the European Court of Justice another opportunity to develop its interpretation of the special ground for non-contractual obligations (article 7.2). The European Court of Justice's Grand Chamber ruled that legal persons, like natural persons, have the option of bringing a claim based on the infringement of personality rights by an online publication before the courts of the Member State where their centre of interests is located. It laid down that the centre of interests of a legal person pursuing an economic activity is determined by reference to the place where the company carries out the main part of its economic activities. The victim of a tortious internet publication can only seek an order for rectification and removal of the incorrect information in the courts that have jurisdiction over the entirety of the harm sustained and not before the courts that only enjoy jurisdiction with regard to the damage suffered in their territory.  相似文献   
105.
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
106.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
107.
网络信息时代,权力的内涵发生了深刻变化,非政府行为体和个人变得更加活跃,并冲击到了政府的权威。权力流散使国际格局发生了新的变化,行为体多元化和“一超多强”的国际力量对比关系将平行存在。未来的发展趋势将是,网络空间成为国家间竞争的新领域,网络权力成为争夺的新焦点。中国作为有影响力的世界大国,也需要应对网络信息时代的机遇与挑战,构建符合自身未来发展的网络空间战略。  相似文献   
108.
Throughout the United States, legal professionals and advocates have taken measures to address the access to victims of sex trafficking. A commonly accepted practice has been to advocate for the removal of ‘sex for sale’ advertising in free media such as Craigslist and Backpage. Although this action against the solicitation of prostitution has been celebrated by many advocates and legal professionals, the removal of such advertisements does not directly affect the prevalence of sex trafficking. In fact, displacement theory suggests that the removal of solicitation advertisements and targeted policing forces traffickers to simply advertise elsewhere or become more creative in selling the victims, thereby concealing the act of sex trafficking and making it less identifiable. Although we do not advocate for the maintenance of ‘sex for sale’ advertisements, the process of removing these ads is counterproductive, having little positive impact on the incidence of sex trafficking in the United States. Rather, it forces both traffickers and victims to bury deeper in the already hidden world of sex trafficking. Policy implications derived from criminal displacement theory and research are provided.  相似文献   
109.
Abstract

Very little empirical work exists on cyberstalking. The current study analysed detailed questionnaires completed by 1051 self-defined stalking victims. Almost half (47.5%) reported harassment via the Internet, but only 7.2% of the sample was judged to have been cyberstalked. Ordinal regression analyses of four groups of victims, categorized according to degree of cyber involvement in their victimization, revealed a general picture of similarity between the groups in terms of the stalking process, responses to being stalked, and the effects on victims and third parties. It was concluded that cyberstalking does not fundamentally differ from traditional, proximal stalking, that online harassment does not necessarily hold broad appeal to stalkers, and that those who target ex-intimates remain the most populous stalker type.  相似文献   
110.
Abstract

Summary: This article is taken from a report entitled: Rhetorics and Realities: Sexual Exploitation of Children in Europe, of a study funded by the European Commission under the STOP Programme. It begins by re-visiting the knowledge base of child pornography and addresses a range of issues including: children's access to pornography; law enforcement and European policy. The article concludes with a number of pertinent questions which need both attention and answers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号