首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   142篇
  免费   2篇
各国政治   1篇
世界政治   1篇
外交国际关系   2篇
法律   77篇
中国共产党   1篇
中国政治   5篇
政治理论   6篇
综合类   51篇
  2022年   1篇
  2021年   2篇
  2020年   2篇
  2019年   5篇
  2018年   7篇
  2016年   4篇
  2015年   2篇
  2014年   7篇
  2013年   5篇
  2012年   8篇
  2011年   13篇
  2010年   14篇
  2009年   11篇
  2008年   14篇
  2007年   10篇
  2006年   12篇
  2005年   9篇
  2004年   5篇
  2003年   4篇
  2002年   4篇
  2001年   4篇
  2000年   1篇
排序方式: 共有144条查询结果,搜索用时 15 毫秒
21.
电子期刊与纸质期刊的比较及互补研究   总被引:3,自引:0,他引:3  
电子期刊以其出版速度快,检索功能强,信息存储量大等特点给图书馆期刊工作带来新的机遇和挑战,文章通过对电子期刊和纸质期刊优缺点的分析比较,提出了如何加强期刊科学管理,提高期刊利用率。  相似文献   
22.
Online child pornography is a repulsive reality which cannot be ignored; the biggest child pornography manufacturing ring in South African history was cracked with the arrest of eight family members. There are more than 116 000 Internet searches daily for child pornography. Pornography is no longer confined to consenting adults, children are not only being exposed to pornographic material but are increasingly being used as victims of child pornography. In South Africa, the Internet and Cell phone Pornography Bill tabled in 2010 aims to make it illegal for Internet and mobile phone service providers to distribute pornography or permit it to be distributed. The objective of the Bill is to protect children from child pornography and women from the indignity of being seen as objects of pornography. This paper takes as its focal point the continuing crisis which centres on the conceptual framework, the existing legislation regulating online child pornography and measures to curb infringement.  相似文献   
23.
This paper discusses the feasibility of EU legal action in the field of electronic identity (eID) within the new distribution of legal competences and the provision of novel legal basis engendered by the Treaty of Lisbon. The article attempts to find a ‘legal anchor’ to the idea of a pan-European electronic identity within EU law, looking at the issues of competences and legal basis. After examining various different areas of competence and the most feasible (and probable) candidates for a legal basis supporting an EU legal framework for eID, the paper argues that the latter should be found in the combination of Article 16 TFEU (concerning the right to the protection of personal data) with Article 3 TUE, and Articles 26 and 114 TFEU (concerning the establishment and functioning of the Internal Market), which also constitute the area of competence where an eID legal initiative can be pursued.  相似文献   
24.
There is a general concern amongst judges, lawyers and legal scholars that evidence in digital format is not to be trusted, given that it can be altered and manipulated with ease. Some jurists have called for a UN Convention on matters relating to the authentication and admissibility of electronic evidence. It is debatable whether such a Convention is necessary, but guidance of an international nature might be welcome, providing that any such guidance remains guidance, and does not ossify into legal requirements that fail to take into account the dynamic and constantly developing changes in information technology. In any event, the accuracy of the presumption in England & Wales that a computer is in order at the material time is highly debatable, and it is suggested that this presumption ought to be reformed.  相似文献   
25.
We are the middle of a global identity crisis. New notions of identity are made possible in the online world where people eagerly share their personal data and leave ‘digital footprints’. Multiple, partial identities emerge distributed across cyberspace divorced from the physical person. The representation of personal characteristics in data sets, together with developing technologies and systems for identity management, in turn change how we are identified. Trustworthy means of electronic identification is now a key issue for business, governments and individuals in the fight against online identity crime. Yet, along with the increasing economic value of digital identity, there are also risks of identity misuse by organisations that mine large data sets for commercial purposes and in some cases by governments. Data proliferation and the non-transparency of processing practices make it impossible for the individual to track and police their use. Potential risks encompass not only threats to our privacy, but also knowledge-engineering that can falsify digital profiles attributed to us with harmful consequences. This panel session will address some of the big challenges around identity in the digital age and what they mean for policy and law (its regulation and protection). Questions for discussion include: What does identity mean today? What types of legal solutions are fit for purpose to protect modern identity interests? What rights, obligations and responsibilities should be associated with our digital identities? Should identity management be regulated and who should be held liable and for what? What should be the role of private and public sectors in identity assurance schemes? What are the global drivers of identity policies? How can due process be ensured where automated technologies affect the rights and concerns of citizens? How can individuals be more empowered to control their identity data and give informed consent to its use? How are biometrics and location-tracking devices used in body surveillance changing the identity landscape?  相似文献   
26.
In response to media attention and public demand, legislation increasingly mandates more stringent surveillance for sex offenders. This trend towards greater supervision resulted in the lifetime GPS monitoring of high-risk sex offenders (HRSO) in California. This study assesses the impact of the California Department of Corrections and Rehabilitation’s GPS program for HRSOs by employing a quasi-experimental design. The treatment group was drawn from all HRSO who were released from prison and placed on GPS monitoring in California. To identify comparison individuals likely to have pretreatment risk characteristics similar to those in the treatment group, a propensity score matching procedure was performed. The final sample included 516 subjects equally divided between the treatment and control groups. Data was assessed using Cox proportional hazards survival analysis clustering participants by parole district. Results showed the GPS condition was associated with significantly fewer parole registration and arrest violations, arrests, and convictions. These results are discussed in relation to other electronic monitoring research, the policy implications for the increasing use of this technology, and its effectiveness in reducing crime, prison populations, and ensuring public safety.  相似文献   
27.
Electronic commerce has brought about business and technological changes globally, and these global changes have given rise to major legal reforms across nations. In the fast-changing global digital economy, states need strategies to maintain competitiveness of their markets while simultaneously ensuring the secure and effective use of technologies involved in conducting electronic transactions. This paper examines how the use and recognition of electronic signatures are regulated in Southeast Asia – the region that has shown the most significant growth in global e-commerce in past few years. Based on a comparative analysis of the laws of four representative ASEAN member states – namely Singapore, Thailand, Malaysia, and Vietnam, this paper argues that there is a regional trend towards adopting more liberal and technology-neutral standards for electronic signatures. Electronic signature regulation in Southeast Asia is now built upon limited technological neutrality (or the so-called “two-tiered” approach) as a shared regulatory understanding, but this approach is operationalized differently in each state due to distinctive national contexts. Within the common legal framework, each state has developed its own system of control and management with respect to higher-level signatures (using advanced technologies). The principle of technological neutrality, a concept originally developed for the regulation of technologies in response to the liberalization of telecommunications market, has been the central theme of discussions on the e-transactions policy-making scene. As the author shows, in the process through which states localize the global standards of technological neutrality, ASEAN as a vehicle of regulatory change has played an essential role in translating this principle to the national context.  相似文献   
28.
This summary relates to the consultation held at St George's House, in Windsor, England, on February 2018. The attendees came from across Europe and from the United States, and they discussed a range of initiatives designed to address the challenges in modern family justice and the changes in the social, political, and economic environments that are impacting family life across the globe. Although the challenges are very similar, the approach to resolving them varies from jurisdiction to jurisdiction. The attendees concluded that there is much we can learn from each other, and that greater cooperation between family justice professionals across geographic boundaries would be highly beneficial.  相似文献   
29.
李新洁 《学理论》2011,(11):57-58
电子货币作为一种新的派生形式,是货币发展规律作用的必然结果。电子货币不仅具有一般货币的共性,而且具有明显的时代特征。因此,电子货币的出现,并没有否定马克思的货币理论,相反却再次证明了马克思货币理论的科学性。  相似文献   
30.
航空电子客票行程单是旅客乘坐飞机的惟一报销凭证,俗称机票发票。近期,关于虚假行程单犯罪的数量不断攀升,而且涉案金额巨大,造成了严重的社会危害。我们可以从分析行程单的法律属性入手,了解虚假行程单犯罪的形式和特征,剖析虚假行程单犯罪的原因。从制度上看,现有的行程单管理制度也存在较大的缺陷。针对虚假行程单犯罪,我们可以从多个方面加以防范和治理。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号