首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   361篇
  免费   11篇
工人农民   3篇
世界政治   2篇
外交国际关系   3篇
法律   202篇
中国共产党   2篇
中国政治   36篇
政治理论   29篇
综合类   95篇
  2023年   3篇
  2022年   8篇
  2021年   7篇
  2020年   10篇
  2019年   7篇
  2018年   7篇
  2017年   4篇
  2016年   11篇
  2015年   7篇
  2014年   29篇
  2013年   36篇
  2012年   38篇
  2011年   26篇
  2010年   28篇
  2009年   21篇
  2008年   25篇
  2007年   20篇
  2006年   19篇
  2005年   19篇
  2004年   21篇
  2003年   10篇
  2002年   5篇
  2001年   5篇
  2000年   2篇
  1999年   3篇
  1983年   1篇
排序方式: 共有372条查询结果,搜索用时 15 毫秒
271.
This article draws upon social interaction theory (the work of Irwin Altman) to develop a theory of the right to privacy, which reflects the way that privacy is experienced. This theory states that the right to privacy is a right to respect for barriers, and that an invasion of privacy occurs when a privacy barrier is penetrated. The first part of the paper establishes the position of the author's theory in the existing scholarship. The second part of the paper expands upon the theory to explain the nature of privacy barriers and the way that the author's theory manages a number of specific privacy issues, including threats to privacy, attempted invasions of privacy, unforeseeable interferences with privacy and waiving the right to privacy. The final part of the paper demonstrates the impact that this approach to privacy could have upon judicial reasoning, in particular Article 8 European Convention on Human Rights.  相似文献   
272.
Never has a text been received with so many requests for amendments; never has the debate around it been so huge. Some see it as a simple duplicate of the Directive 95/46; others present the GDPR, as a monster. In the context of this birthday, it cannot be a question of analyzing this text or of launching new ideas, but simply of raising two questions. I state the first as follows: "In the end, what are the major features that cross and justify this regulation? In addition, the second: "Is the regulation adequate for today's digital challenges to our societies and freedoms? The answers given in the following lines express the opinion of their author. It is just an invitation for a dialogue to go forth in this journal where so many excellent reflections have been published on Digital Law, thanks to our common friend: Steve.  相似文献   
273.
胡卫东  葛婧 《河北法学》2005,23(4):125-128
绝大部分手机用户都有被短信骚扰的经历,这种骚扰让人不堪忍受。短信骚扰属于违法行为,既违反了《消费者权益保护法》,也侵犯了公民的隐私权。为了保护手机用户的权益,应严格禁止群发短信广告,加强对个人资料的法律保护,明确短信骚扰的民事责任,理清举证责任。  相似文献   
274.
个人征信体系的建立是现代信用经济发展的基础。以个人信用信息为中心的个人征信体系带来了授信人知情权与被征信人信息隐私权的冲突,平衡二者的冲突是个人征信立法的重要任务。法律原则是法律制定与适用的指导,所以,在利益衡量、权利协调、比例、人格尊严原则的指导下,个人征信法律制度将会逐渐趋于完善。  相似文献   
275.
随着信息高速公路的筹建与开通,学术期刊界对编排予以规范是科学运作的必然选择。时下颁行的《中国高校社会科学学报编排规范》、《中国高等学校自然科学学报编排规范》、《中国学术期刊光盘版检索与评价数据规范》在强调科学编排的同时,漠视了对作者隐私权的保护,其中某些项目要求对个人信息的曝露不能不引起人们的关注,如何保障作者隐私不受侵害则是我们必须探讨的问题。  相似文献   
276.
Communication technologies, such as the mobile phone, often represent a double-edged sword in romantic relationships. While the mobile phone can enhance the quality of communication, it can simultaneously become a source of conflict. The dialectic framework of communication privacy management offers a nuanced lens from which to investigate rules for the use of the mobile phone in the dyadic of romantic relationships. This study investigates mobile phone usage rules that are negotiated by adolescents and young adults in romantic relationships. The study specifically focuses on rules around mobile privacy management. Findings from in-depth interviews indicate that the negotiation of rules is a crucial part of young adult relationships. Enhancing trust and fostering harmony were important factors in the rule development process. The implications, limitations, and future possibilities for research are discussed.  相似文献   
277.
吴小帅 《法学论坛》2021,36(2):152-160
个人生物识别信息具有个人数据的唯一性、程序识别性、可复制性、损害的不可逆性及信息的关联性等特征。在大数据背景下,个人生物识别信息的广泛应用会带来严重的生物信息安全风险,其滥用可造成隐私权、平等权和财产权等权益受到侵犯,需要立法进行全方位规制。我国目前个人生物信息的相关立法存在总体位阶较低且内容分散、保护范围狭窄、权利义务边界不清、法律责任不明晰等缺陷,应当采取渐进式专门立法的思路,完善现有相关部门法关于个人生物信息的规制内容,构建层次分明、内外协调的个人生物识别信息安全保护的法律体系。  相似文献   
278.
This article explores the exchange of personal information between agencies working with drug users and the 'problems' created by confidentiality. Confidentiality may be conceptualised as a form of information privacy, which in turn derives from a wider idea of privacy. The authors take as a case study the 'Wintercomfort Case', concerning a day centre for drug users in Cambridge. The focus is to look at the legal and practice implications of the case, and to examine in particular the tensions that exist between welfare and justice agencies who may have access to the same information, but who may also have different agendas and objectives in taking action.  相似文献   
279.
"人肉搜索"侵犯个人信息,严重侵犯公民隐私权,《刑法修正案(七)》提出了对公民个人信息的保护,但未将"人肉搜索"入罪,"人肉搜索"行为侵犯刑法保护的法益,并达到应受刑罚处罚的程度,应当在刑法中设置专门条款以规制"人肉搜索"等侵犯公民个人信息的行为。  相似文献   
280.
ABSTRACT

Supporters of increased surveillance see tremendous potential in the ever increasing creation, collection, and retention of personal data. Most acknowledge that the massive collection of information also creates challenges where the collection outpaces the ability to meaningfully process the data. Increased processing power and more finely tuned algorithms are often portrayed as the solution to this haystack conundrum. While a human may struggle to find the needle in an overflowing haystack of disordered information, powerful computers can take a logical and structured approach that will make the haystack eminently more searchable. This article evaluates this premise from a human rights perspective and considers whether algorithmic surveillance systems can be designed to be compatible with the right to privacy. In addition to assessing the incongruity between traditional safeguards (such as foreseeability and accountability) with algorithmic surveillance, this article also confronts the problem of initial collection and addresses the contention that well-defined algorithmic search can effectively limit the intrusiveness of surveillance. Evolution in the case law of the European Court of Human Rights and the Court of Justice of the European Union will be factored into this analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号