首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   640篇
  免费   48篇
各国政治   6篇
工人农民   10篇
世界政治   8篇
外交国际关系   194篇
法律   166篇
中国共产党   8篇
中国政治   82篇
政治理论   32篇
综合类   182篇
  2023年   5篇
  2022年   6篇
  2021年   10篇
  2020年   14篇
  2019年   20篇
  2018年   18篇
  2017年   11篇
  2016年   12篇
  2015年   14篇
  2014年   46篇
  2013年   46篇
  2012年   40篇
  2011年   47篇
  2010年   38篇
  2009年   57篇
  2008年   57篇
  2007年   56篇
  2006年   42篇
  2005年   36篇
  2004年   40篇
  2003年   23篇
  2002年   24篇
  2001年   17篇
  2000年   4篇
  1999年   2篇
  1996年   1篇
  1994年   1篇
  1992年   1篇
排序方式: 共有688条查询结果,搜索用时 281 毫秒
91.
电子文件的长期存取除了受相关技术、管理因素的影响外,还受到法律的制约。其中版权问题尤为重要。在数量巨大的电子文件中,有不少是属于享有版权的作品,应受到国家版权法规的保护。  相似文献   
92.
In this article, the authors present the “insight approach” to conflict as an analytical and methodological framework that addresses the dynamic interactions between conflicting parties. According to the insight approach, conflict is relational, dynamic, and adaptive, generated from the responsive interpretive frameworks that parties use to construct meaning. Conflict arises as a result of parties' experience of what insight theorists call “threat‐to‐cares,” which generates defend–attack patterns of interaction between them. The authors suggest that rethinking the nature of conflict so that it is seen as an interaction embedded in meaning making enables conflict interveners to help parties gain insight into, and articulate, the values that are being generated, advanced, threatened, and realigned within the complex interactions that define us as social beings. In doing so, parties develop abilities to generate new patterns and solutions that can limit and even eliminate the experiences of threat that generate conflict between them.  相似文献   
93.
Negotiation requires communication, but not necessarily verbal exchanges. Adjustments can be achieved incrementally by other means. This article will examine how some parties have managed to strike a deal in situations characterized by total distrust and even hostility, asymmetric power relations, major cultural differences, extreme logistical difficulties in reaching the place in which the trade is to be made, and several additional process risks by employing a type of bargaining known as “dumb barter.” This process presents a distinct paradigm with a specific and unique rationale. Sometimes called “silent trade,” it has been observed in many places (especially West Africa) for more than two millennia. It may well be the oldest form of trade negotiation and is still practiced in some parts of the world. An examination of this unlikely but real and effective process can also provide negotiation theorists with some useful insights into the fundamental nature of negotiation.  相似文献   
94.
MS Office documents could be illegally copied by offenders, and forensic investigators still face great difficulty in investigating and tracking the source of these illegal copies. This paper mainly proposes a forensic method based on the unique value of the revision identifier (RI) to determine the source of suspicious electronic documents. This method applies to electronic documents which use Office Open XML (OOXML) format, such as MS Office 2007, Mac Office 2008 and MS Office 2010. According to the uniqueness of the RI extracted from documents, forensic investigators can determine whether the suspicious document and another document are from the same source. Experiments demonstrate that, for a copy of an electronic document, even if all the original characters are deleted or formatted by attackers, forensic examiners can determine that the copy and the original document are from the same source through detecting the RI values. Additionally, the same holds true if attackers just copy some characters from the original document to a newly created document. As long as there is one character left whose original format has not been cleared, forensic examiners can determine that the two documents are from the same source using the same method. This paper also presents methods for OOXML format files to detect the time information and creator information, which can be used to determine who the real copyright holder is when a copyright dispute occurs.  相似文献   
95.
为促进电子病历的健康发展,我们必须首先明确电子病历的属性和定位,正确处理电子病历相关问题的关系,并找到切实可行的推进模式,分阶段加以推进。与此同时,应该高度重视采用云计算等新一代信息技术在电子病历、居民健康档案、区域卫生信息平台建设中的巨大作用,解决电子病历医疗服务对象的身份标识问题,并从电子签名、隐私保护、权利认定与事故责任分担等方面完善相应的管理制度,为促进电子病历有序发展创造良好的软环境。  相似文献   
96.
电子证据现象反映了证据的可信度问题即所有证据形式都会被修改,所有的证据形式都面临着可信度危机。证据的可信度除了与证据的取得过程有关,还与证据提供者的可信度有关。在证据取得过程合法的情况下,证据的可信度将直接取决于证据提供者的可信度。  相似文献   
97.
温岭协商合作式治理实践,是我国农村基层社会管理创新的一种有益探索。协商合作式治理模式有助于优化乡村治理格局,构建协商合作式模式既是乡村治理的未来趋向也是推动乡村发展的理性选择。构建协商合作式治理模式,需要注意六大因素:明晰乡村公共生活主体的权力来源及其彼此边界;主体多元;以合作代替冲突,以协商代替竞争;职能互补;参与方式力求多样;在互动中实现共识。  相似文献   
98.
This article examines the two most influential international initiatives on electronic signatures (UNCITRAL’s 1996 Model Law on Electronic Commerce and the 1999 EU Electronic Signature Directive). It considers whether the legislative approaches in Australia and the United Kingdom based on these initiatives are helpful in deciding whether lower level signature methods such as simple email messages are likely to satisfy a legal requirement for a signature. The conclusion reached is that they are unhelpful. The article goes on to consider whether legislative amendments based on UNCITRAL’s 2001 Model Law on Electronic Signatures or the 2005 UN Convention on the Use of Electronic Communications in International Contracts would improve the identified weaknesses. It concludes that such an update would clarify some issues, but that overall it will not solve the difficulties. The article ends with a brief speculation on the likely attributes of a more helpful approach.  相似文献   
99.
本文综述了对于asp类型网站的电子取证知识及应用技术。分别从ASP网站结构、IIS信息及日志文件的获取、网站文件内容的取证、后台数据库信息的获取几个方面展开进行介绍。  相似文献   
100.
郑毅 《政法学刊》2010,27(2):25-29
构建中央与地方纠纷的协商解决模式具有极大的可行性,但是同时又面临着极大的理论和实践阻力。尤为要注意的是,学界将这种协商与政治协商作等同的倾向是存在误区的。同时,在法制化的语境中,在“协商之后的法制化”与“法制框架下的协商”之间也体现出了更多的外在制度区别与内在理念融合并存的特点。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号