首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   586篇
  免费   22篇
各国政治   9篇
工人农民   15篇
世界政治   7篇
外交国际关系   52篇
法律   197篇
中国共产党   8篇
中国政治   41篇
政治理论   85篇
综合类   194篇
  2022年   6篇
  2021年   12篇
  2020年   12篇
  2019年   16篇
  2018年   26篇
  2017年   21篇
  2016年   13篇
  2015年   14篇
  2014年   39篇
  2013年   95篇
  2012年   32篇
  2011年   53篇
  2010年   45篇
  2009年   44篇
  2008年   25篇
  2007年   18篇
  2006年   17篇
  2005年   19篇
  2004年   27篇
  2003年   21篇
  2002年   14篇
  2001年   29篇
  2000年   9篇
  1997年   1篇
排序方式: 共有608条查询结果,搜索用时 31 毫秒
91.
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
92.
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
93.
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
94.
This paper studies the fourth generation ‘peer-2-peer’ (P2P) file sharing technology which is also known as streaming technology from the technology point of view. It critically analyses the nature of streaming technology and assesses similarities to broadcasting for the purpose of copyright protection in the name of webcasting. In addition, it considers the possibility of protecting webcasting within the framework of broadcasting under copyright and the extent of broadcasters’ rights applicable to webcasters. Based on the conclusions derived from the discussion of UK, New Zealand, Italian and US law on streaming, WIPO Standing Committee on Copyright and Related Rights (SCCR) draft documents will be critically analyzed. The Last part of this work will offer suggestions as to how to protect webcasting (streaming technology) under the umbrella of copyright.  相似文献   
95.
校园网建设,简而言之是将校园内各种不同应用的信息资源通过高性能的网络设备相互连接起来,形成校园园区内部的Internet系统,对外通过路由设备接入广域网。在这些网络基础上,形成在校园内部、校园与外部进行信息沟通的体系,建立满足教学、科研和管理需求的计算机环境,为学校各种人员提供充分的网络信息服务,在网络环境中进行教学、研究、收集信息等工作。  相似文献   
96.
360和腾讯纠纷案提供了分析网络立法与网络自治的绝佳样板。网络立法与网络自治的冲突以鲜明方式体现出来,探究两者共存的基础显得必要而紧迫。法律多元理论为两者的协调发展提供了基础。在法律多元理论视角下存在自治与立法的双重逻辑,一是网络立法是优先法益立法,也是有限立法,法益标准的确定是网络立法的前提;二是为解决网络自治与网络立法的现实冲突,部分赋予网络自治规则予以习惯效力,促使网络规则向法律规则的转化,亦是互联网发展的有效途径。但转化过程中应当注意网络自治规则的普适性与实用性,防止垄断性企业对网络自治规则的滥用。  相似文献   
97.
“Capacity building” is a catch phrase from the UN development discourse. In recent years, it has entered the global Internet governance (IG) arena. At World Summit of the Information Society (WSIS 2003), “capacity building” was identified as a key public policy issue. It is proposed in this study that ‘capacity building’ be defined in a different manner – as the principal outcome of the experimental multistakeholder (MSH) process in global IG. The open and inclusive process of stakeholder deliberation leads to accumulation of intellectual capital, development of relational infrastructure for the domain (epistemic community), and emergence of common global consciousness. When cast as a capacity‐building process, MSH collaboration at global Internet governance arenas exhibits long‐term and large‐scale intangible outcomes. This study contributes to the understanding of the capacity‐building potential of MSH collaboration in IG. By employing concepts from International Relations and Organizational Learning, the author develops a model of tangible and intangible outcomes of MSH collaboration. This unique model can be used for studying the effects in other stakeholder venues of governing global resources and processes.  相似文献   
98.
National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include international military deterrence. The incredible power of nuclear weapons gave birth to deterrence, a military strategy in which the purpose of armies shifted from winning wars to preventing them. Although cyber attacks per se do not compare to a nuclear explosion, they do pose a serious and increasing threat to international security. Real-world examples suggest that cyber warfare will play a lead role in future international conflicts. This article examines the two deterrence strategies available to nation-states (denial and punishment) and their three basic requirements (capability, communication, and credibility) in the light of cyber warfare. It also explores whether the two most challenging aspects of cyber attacks – attribution and asymmetry – will make cyber attack deterrence an impossible task.  相似文献   
99.
The personal ID card is a document carried by most Germans, but rarely used. This could change in the future: According to the new law on identification cards and electronic proof of identity (Gesetz über Personalausweise und den elektronischen Identitätsnachweis, PAuswG), the ID card, with its proof of identity, will gain a new functionality, making it applicable for diverse Internet transactions. Functionally, the electronic proof of identity corresponds to existing non-electronic personal proof of identity guidelines in legal and business connections. However, its concrete, technical application opens up many issues regarding contracts and data privacy laws. On both the legal and the technical level, the German approach departs from other European countries, as it strictly distinguishes the electronic proof of identity from the electronic signature function, which the new ID card also provides. It remains to be seen whether the various projects of the EU Member States will become legally and technically interoperable in the near future.  相似文献   
100.
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号