首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   363篇
  免费   9篇
工人农民   3篇
世界政治   2篇
外交国际关系   3篇
法律   202篇
中国共产党   2篇
中国政治   36篇
政治理论   29篇
综合类   95篇
  2023年   3篇
  2022年   8篇
  2021年   7篇
  2020年   10篇
  2019年   7篇
  2018年   7篇
  2017年   4篇
  2016年   11篇
  2015年   7篇
  2014年   29篇
  2013年   36篇
  2012年   38篇
  2011年   26篇
  2010年   28篇
  2009年   21篇
  2008年   25篇
  2007年   20篇
  2006年   19篇
  2005年   19篇
  2004年   21篇
  2003年   10篇
  2002年   5篇
  2001年   5篇
  2000年   2篇
  1999年   3篇
  1983年   1篇
排序方式: 共有372条查询结果,搜索用时 0 毫秒
121.
The purpose of the study was to review privacy and security concerns and their impact on e-government adoption in Dubai. The research analyzed the literature on e-government, security and privacy concerns of e-government adoption and the legislative provision relating to privacy and security protection. A survey on e-government user concerns on privacy, security and ease of use was also carried out. The data for the survey in this research were collected from 190 respondents in Dubai. The results of the analysis revealed that perceived security, privacy and perceived ease of use were important constructs in e-government adoption. The analysis of legal framework showed that the Federal Constitution, the Penal Code, the new Data Protection Act and the Computer Crime Act could be used to address various privacy and security concerns. Thus, it is important that the policy makers facilitate an appropriate awareness campaign of the existence of both information privacy and security to attract more participation towards the e-government services.  相似文献   
122.
This article is a case study based on court records. What seems initially to be a petty theft gives rise to remarkable events. Affairs that are initially private later become public. Various events in and around the court throw light upon the way court and community respond to family stress in a mid-nineteenth century rural northern Swedish community. Testimonies by a large number of witnesses in court reveal a society in transition with elements of a money market, which means here a huge amount of ready money in circulation and arenas ready to shelter private transactions.  相似文献   
123.
This article presents the findings from an evaluation of the care provided at treatment units for drug abusers in Swedish prisons. A total of 741 inmates who were placed in prison treatment units in 2006 are compared with individuals with whom they were matched on the basis of their statistical risk for reoffending, and who served prison terms during the years 2001–2002. Half of the inmates in the treatment group were placed in units working with a 12-step programme, while the remainder were placed in treatment units employing cognitive programmes. The study shows positive results with respect to reoffending. The greatest differences were found in the following subgroups: males, inmates who were at least 30 years of age, those who completed their stay in a treatment unit, and those who had spent at least 4.5 months in a treatment unit.  相似文献   
124.
In Human Rights Watch v Secretary of State for the Foreign and Commonwealth Office the UK Investigatory Powers Tribunal found that the relevant standard of ‘victim status’ that applies in secret surveillance cases consists in a potential risk of being subjected to surveillance and that the European Convention on Human Rights does not apply to the surveillance of individuals who reside outside of the UK. This note argues that the Tribunal's finding regarding the victim status of the applicants was sound but that the underlying reasoning was not. It concludes that the Tribunal's finding on extraterritoriality is unsatisfactory and that its engagement with the European Court of Human Rights case law on the matter lacked depth. Finally, the note considers the defects of the Human Rights Watch case, and the case law on extraterritoriality more generally, against the backdrop of the place of principled reasoning in human rights adjudication.  相似文献   
125.
126.
目前,人肉搜索在揭露腐败、打击犯罪方面起到了一定作用,同时也引发了诸多侵权事件。当前,最令人忧虑的是人肉搜索已经变成一场没有规则的"游戏",基本上处于失控的状态。使用人肉搜索涉及国家利益、社会公共安全和个人信息的保护。对人肉搜索并不能简单地作出"放"或者"禁"的结论,对人肉搜索应当在疏导的前提下予以规范。犯罪学等各方面的力量应当携手并肩,在优势互补中共同探寻人肉搜索的规制之道。  相似文献   
127.
公民隐私权的宪法保护——以“人肉搜索”为研究视角   总被引:1,自引:0,他引:1  
探讨隐私权的宪法保护在中国具有非常现实的意义。面对“人肉搜索”带来的对个人隐私的现实侵犯,隐私权以基本人权的面目纷纷进入各国宪法保护的范围。隐私权在我国仍然不被看做是一项独立的权利,在中国体制转轨的过程中,我国公民隐私权的法律保护呈现出了单纯依靠民法保护的不足,尤其是加强网络隐私的保护更加具有紧迫性。  相似文献   
128.
The protection of personal data represents one of recent most emerging legal issues. On one hand, the privacy and the discretion of individuals are challenged by various new means of data collection and communication. On the other hand, the growth and development of the information economy is heavily dependent on the level of freedom of business units in gathering, processing and distribution of various kinds of information. In this short notice, we will try to summarize the experience with the data protection laws with respect to their basic teleology.  相似文献   
129.
人肉搜索引起了诸多的道德与法律问题。王菲诉三网站案将其引入了司法视野。论文从法理学角度,从人肉搜索的本体着手,分析其蕴含的权利冲突与价值矛盾,提出并论证何种规制规则是有效的,力求对破解此司法困局有所裨益。  相似文献   
130.
This article examines the two major international data transfer schemes in existence today – the European Union (EU) model which at present is effectively the General Data Protection Regulation (GDPR), and the Asia-Pacific Economic Cooperation (APEC) Cross Border Privacy Rules system (CBPR), in the context of the Internet of Things (IoT).While IoT data ostensibly relates to things i.e. products and services, it impacts individuals and their data protection and privacy rights, and raises compliance issues for corporations especially in relation to international data flows. The GDPR regulates the processing of personal data of individuals who are EU data subjects including cross border data transfers. As an EU Regulation, the GDPR applies directly as law to EU member nations. The GDPR also has extensive extraterritorial provisions that apply to processing of personal data outside the EU regardless of place of incorporation and geographical area of operation of the data controller/ processor. There are a number of ways that the GDPR enables lawful international transfer of personal data including schemes that are broadly similar to APEC CBPR.APEC CBPR is the other major regional framework regulating transfer of personal data between APEC member nations. It is essentially a voluntary accountability scheme that initially requires acceptance at country level, followed by independent certification by an accountability agent of the organization wishing to join the scheme. APEC CBPR is viewed by many in the United States of America (US) as preferable to the EU approach because CBPR is considered more conducive to business than its counterpart schemes under the GDPR, and therefore is regarded as the scheme most likely to prevail.While there are broad areas of similarity between the EU and APEC approaches to data protection in the context of cross border data transfer, there are also substantial differences. This paper considers the similarities and major differences, and the overall suitability of the two models for the era of the Internet of Things (IoT) in which large amounts of personal data are processed on an on-going basis from connected devices around the world. This is the first time the APEC and GDPR cross-border data schemes have been compared in this way. The paper concludes with the author expressing a view as to which scheme is likely to set the global standard.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号