全文获取类型
收费全文 | 591篇 |
免费 | 18篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 15篇 |
世界政治 | 7篇 |
外交国际关系 | 52篇 |
法律 | 198篇 |
中国共产党 | 8篇 |
中国政治 | 41篇 |
政治理论 | 85篇 |
综合类 | 194篇 |
出版年
2022年 | 6篇 |
2021年 | 12篇 |
2020年 | 13篇 |
2019年 | 16篇 |
2018年 | 26篇 |
2017年 | 21篇 |
2016年 | 13篇 |
2015年 | 14篇 |
2014年 | 39篇 |
2013年 | 95篇 |
2012年 | 32篇 |
2011年 | 53篇 |
2010年 | 45篇 |
2009年 | 44篇 |
2008年 | 25篇 |
2007年 | 18篇 |
2006年 | 17篇 |
2005年 | 19篇 |
2004年 | 27篇 |
2003年 | 21篇 |
2002年 | 14篇 |
2001年 | 29篇 |
2000年 | 9篇 |
1997年 | 1篇 |
排序方式: 共有609条查询结果,搜索用时 15 毫秒
101.
This is the fourth in a series of articles looking at the interaction between Internet domain names and intellectual property. It outlines the ICANN dispute resolution procedure for gTLDs whereby objectionable domain names can be transferred away from their registrants or cancelled. It also compares this to legal proceedings in the UK Courts and outlines a referral to the European Court of Justice on issues relating to a trade mark registration as the basis or legitimate interest for a .eu domain name registration. 相似文献
102.
网络成瘾导致青少年形成网络双重人格和各种人格障碍。研究发现,网络成瘾与特定人格具有相关性,并且有人格障碍的人更易产生网瘾。对此,可根据不同类型的网络成瘾所导致的人格障碍,采取精神分析疗法、行为疗法和认知疗法,对青少年网络成瘾人格进行矫治。 相似文献
103.
Graeme Horsman Ph.D. 《Journal of forensic sciences》2018,63(5):1392-1400
With an increase in the creation and maintenance of personal websites, web content management systems are now frequently utilized. Such systems offer a low cost and simple solution for those seeking to develop an online presence, and subsequently, a platform from which reported defamatory content, abuse, and copyright infringement has been witnessed. This article provides an introductory forensic analysis of the three current most popular web content management systems available, WordPress, Drupal, and Joomla! Test platforms have been created, and their site structures have been examined to provide guidance for forensic practitioners facing investigations of this type. Result's document available metadata for establishing site ownership, user interactions, and stored content following analysis of artifacts including Wordpress's wp_users, and wp_comments tables, Drupal's “watchdog” records, and Joomla!'s _users, and _content tables. Finally, investigatory limitations documenting the difficulties of investigating WCMS usage are noted, and analysis recommendations are offered. 相似文献
104.
Václav Janeček 《Computer Law & Security Report》2018,34(5):1039-1052
This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, this article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates. 相似文献
105.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(1):178-185
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
106.
Cedric Vanleenhove 《Computer Law & Security Report》2018,34(3):640-646
In the European Union the Brussels Ibis Regulation governs the jurisdiction of Member State courts in civil and commercial matters. The reference for a preliminary ruling coming from the Estonian Supreme Court in the Bolagsupplysningen case offered the European Court of Justice another opportunity to develop its interpretation of the special ground for non-contractual obligations (article 7.2). The European Court of Justice's Grand Chamber ruled that legal persons, like natural persons, have the option of bringing a claim based on the infringement of personality rights by an online publication before the courts of the Member State where their centre of interests is located. It laid down that the centre of interests of a legal person pursuing an economic activity is determined by reference to the place where the company carries out the main part of its economic activities. The victim of a tortious internet publication can only seek an order for rectification and removal of the incorrect information in the courts that have jurisdiction over the entirety of the harm sustained and not before the courts that only enjoy jurisdiction with regard to the damage suffered in their territory. 相似文献
107.
Nick Pantlin 《Computer Law & Security Report》2018,34(3):653-656
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
108.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(6):1364-1376
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
109.
网络信息时代,权力的内涵发生了深刻变化,非政府行为体和个人变得更加活跃,并冲击到了政府的权威。权力流散使国际格局发生了新的变化,行为体多元化和“一超多强”的国际力量对比关系将平行存在。未来的发展趋势将是,网络空间成为国家间竞争的新领域,网络权力成为争夺的新焦点。中国作为有影响力的世界大国,也需要应对网络信息时代的机遇与挑战,构建符合自身未来发展的网络空间战略。 相似文献
110.
Throughout the United States, legal professionals and advocates have taken measures to address the access to victims of sex trafficking. A commonly accepted practice has been to advocate for the removal of ‘sex for sale’ advertising in free media such as Craigslist and Backpage. Although this action against the solicitation of prostitution has been celebrated by many advocates and legal professionals, the removal of such advertisements does not directly affect the prevalence of sex trafficking. In fact, displacement theory suggests that the removal of solicitation advertisements and targeted policing forces traffickers to simply advertise elsewhere or become more creative in selling the victims, thereby concealing the act of sex trafficking and making it less identifiable. Although we do not advocate for the maintenance of ‘sex for sale’ advertisements, the process of removing these ads is counterproductive, having little positive impact on the incidence of sex trafficking in the United States. Rather, it forces both traffickers and victims to bury deeper in the already hidden world of sex trafficking. Policy implications derived from criminal displacement theory and research are provided. 相似文献