全文获取类型
收费全文 | 436篇 |
免费 | 8篇 |
专业分类
各国政治 | 2篇 |
工人农民 | 1篇 |
世界政治 | 4篇 |
外交国际关系 | 8篇 |
法律 | 296篇 |
中国共产党 | 2篇 |
中国政治 | 32篇 |
政治理论 | 23篇 |
综合类 | 76篇 |
出版年
2023年 | 1篇 |
2022年 | 12篇 |
2021年 | 12篇 |
2020年 | 9篇 |
2019年 | 9篇 |
2018年 | 53篇 |
2017年 | 10篇 |
2016年 | 10篇 |
2015年 | 4篇 |
2014年 | 50篇 |
2013年 | 44篇 |
2012年 | 51篇 |
2011年 | 42篇 |
2010年 | 24篇 |
2009年 | 45篇 |
2008年 | 22篇 |
2007年 | 14篇 |
2006年 | 1篇 |
2005年 | 6篇 |
2004年 | 8篇 |
2003年 | 5篇 |
2002年 | 3篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1996年 | 1篇 |
1990年 | 1篇 |
1988年 | 2篇 |
排序方式: 共有444条查询结果,搜索用时 453 毫秒
61.
Ian Lloyd 《Computer Law & Security Report》2018,34(4):779-783
This article considers the development of data protection laws from a position on the periphery of legal consciousness to the situation where it is the subject of intensive legal and media publicity. Focusing on the recent controversies surrounding the use of Facebook apps for political purposes, the article will consider the role and limitations of data and privacy protection laws. The question will be posed – if not answered – whether national or regional laws can be effective in what increasingly is a global information society. 相似文献
62.
Nick Pantlin 《Computer Law & Security Report》2018,34(3):653-656
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
63.
This article envisions an iterative regulatory process for robot governance. In the article, we argue that what lacks in robot governance is actually a backstep mechanism that can coordinate and align robot and regulatory developers. In order to solve that problem, we present a theoretical model that represents a step forward in the coordination and alignment of robot and regulatory development. Our work builds on previous literature, and explores modes of alignment and iteration towards greater closeness in the nexus between research and development (R&D) and regulatory appraisal and channeling of robotics’ development. To illustrate practical challenges and solutions, we explore different examples of (related) types of communication processes between robot developers and regulatory bodies. These examples help illuminate the lack of formalization of the policymaking process, and the loss of time and resources that the waste of knowledge generated for future robot governance instruments implies. We argue that initiatives that fail to formalize the communication process between different actors and that propose the mere creation of coordinating agencies risk being seriously ineffective. We propose an iterative regulatory process for robot governance, which combines the use of an ex ante robot impact assessment for legal/ethical appraisal, and evaluation settings as data generators, and an ex post legislative evaluation instrument that eases the revision, modification and update of the normative instrument. In all, the model breathes the concept of creating dynamic evidence-based policies that can serve as temporary benchmark for future and/or new uses or robot developments. Our contribution seeks to provide a thoughtful proposal that avoids the current mismatch between existing governmental approaches and what is needed for effective ethical/legal oversight, in the hope that this will inform the policy debate and set the scene for further research. 相似文献
64.
Bruce A. Jacobs 《Justice Quarterly》2018,35(2):191-222
Although sanction threats promote fear, among committed offenders, that fear can become a resource with which to sculpt emerging crime preferences. In such cases, criminality is not deterred but channeled. We explore the channeling process here as it relates to auto theft and carjacking. Our qualitative findings reveal that auto thieves are reluctant to embrace the violence of carjacking due to concerns over sanction threat severity they attributed to carjacking—both formal (higher sentences) and informal (victim resistance and retaliation). Meanwhile, the carjackers are reticent to enact auto theft because of the more uncertain and putatively greater risk of being surprised by victims, a fear that appears to overcome the enhanced long-term formal penalty of taking a vehicle by force. We examine the implications of offenders’ decision-making for the analytic intersection of rational choice and deterrence, offering the notion of projective risk sensitivity to encapsulate the process. 相似文献
65.
66.
Joseph V. DeMarco 《Computer Law & Security Report》2018,34(4):908-911
Robust cyber-resilience depends on sound technical controls and testing of those controls in combination with rigorous cyber-security policies and practices. Increasingly, corporations and other organizations are seeking to test all of these, using methods more sophisticated than mere network penetration testing or other technical audit operations. More sophisticated organizations are also conducting so-called “Red Team” exercises, in which the organization tasks a small team of highly skilled and trained individuals to try to gain unauthorized access to physical and logical company assets and information. While such operations can have real value, they must be planned and conducted with great care in order to avoid violating the law or creating undue risk and reputational harm to the organization. This article explores these sometimes tricky issues, and offers practical risk-based guidance for organizations contemplating these types of exercises. 相似文献
67.
Mingxiang Liu 《Frontiers of Law in China》2011,6(3):369-386
Credit card fraud is a new type of fraud amended into the Criminal Law of China in 1997. The “credit card” under credit card fraud is interpreted as a very board concept, which includes debit card and
virtually all electronic payment cards used in ordinary payment, credit loan, transfer and settlement of account, cash deposit
and withdrawal. Therefore, it is necessary for the legislature to revise “credit card” under this special fraud into “electronic
payment card,” and “credit card fraud” into “electronic payment card fraud,” which will be understood easily and precisely.
“Use” and “fraudulent use” of credit card under this fraud is defined as ordinary use of credit card, including withdrawal
cash with authentic or forged credit card from ATMs. It is unreasonable to define “malicious overdraft” as a form of credit
card fraud under the Chinese Criminal Law. In the future amendment, this kind of criminal conduct shall be separated as independent
named as “malicious overdraft” or “abuse of credit card” under the Criminal Law with less stiff statutory punishment than
that of credit card fraud. Besides, under the Chinese Criminal Law, stealing credit card and using it is held as “theft,”
which is neither reasonable nor logical. Therefore, it should be revised in the future criminal law. 相似文献
68.
69.
Advertorials are a form of outside lobbying that organized interests use to influence policymakers and attentive publics. It is apparent from their popularity that organized interests consider them to be an effective form of political communication. This article analyzes 2,805 organized interest advertorials that appeared on the lower right quadrant of The New York Times op-ed page from 1985 to 1998. Advertorials take two broad forms: (a) image advertorials, which are paid messages by organized interests designed to create a favorable climate of opinion, and (b) advocacy advertorials, which are sponsored messages intended to win support for an interest's viewpoints on controversial issues. Typologies of advertorials (11 categories), organized interests (21 categories), corporate and noncorporate economic interests (29 categories), and policy content (28 categories) are used to document annually and over time who is sponsoring advertorials, what types of advertorials are being used, what interests avail themselves of advertorial campaigns, which issue areas are receiving attention, what images and policy messages are being communicated, which organizations sponsor the most advertorials, and the timing of such political advertising campaigns. We find over time an increasing number of advertorials, an increasing number and diversity of sponsoring interest organizations, an increasing trend toward advocacy advertorials, a continuing but declining sponsorship dominance by corporate interests, a shifting policy issue emphasis that corresponds to events in the political environment, and evidence that organized interests employ a variety of sponsorship strategies. 相似文献
70.
《Journal of school violence》2013,12(2-3):89-108
SUMMARY This study examined the influence of survey validity screening on the results from three group-administered school surveys administered to samples totaling approximately 5500 students in 19 schools. The estimated levels of risk behaviors, antisocial behaviors, and victim experiences were substantially reduced when respondents who gave multiple inconsistent or extreme responses to other survey items were screened out of the data. The researchers also observed that the percentage of students giving inconsistent and illogically extreme responses was greater among those surveys given by an untrained administrator, raising the hypothesis that administrator training could be a critical factor in obtaining more consistent and trustworthy survey data. These results indicate that it may be important to train school staff in survey administration and to screen surveys for validity in order to improve the accuracy of student self-report surveys. 相似文献