首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   692篇
  免费   35篇
各国政治   31篇
工人农民   22篇
世界政治   9篇
外交国际关系   26篇
法律   416篇
中国政治   24篇
政治理论   53篇
综合类   146篇
  2023年   2篇
  2022年   8篇
  2021年   7篇
  2020年   24篇
  2019年   22篇
  2018年   14篇
  2017年   17篇
  2016年   19篇
  2015年   16篇
  2014年   30篇
  2013年   60篇
  2012年   48篇
  2011年   55篇
  2010年   45篇
  2009年   42篇
  2008年   46篇
  2007年   57篇
  2006年   52篇
  2005年   46篇
  2004年   49篇
  2003年   16篇
  2002年   13篇
  2001年   15篇
  2000年   18篇
  1999年   5篇
  1995年   1篇
排序方式: 共有727条查询结果,搜索用时 31 毫秒
71.
当今社会,弱势群体问题已引起社会各界的广为关注,但人们在对弱势群体的认识上还缺乏一种社会公正的理念,致使在处理和对待有关弱势群体的问题上有失公允。社会公正应首先体现在社会权利的平等上,其次要处理好公平与效率的关系,最后要解决的是起点公平和机会均等。  相似文献   
72.
The plans of the Scottish Executive/Government for the independence of Scotland, which are very sketchy, are explored in relation to desire to retain the monarchy. The Scottish Parliament has expressed support for the removal of religious discrimination from succession to the throne and instituted an alternative state religion—measures which suggest an alternative relationship between religion and the monarchy will be required in an independent Scotland. Repealing the Act of Union will require decisions as to whether the monarchy remains as Christian, Protestant and Presbyterian in Scotland or whether some alternative religious or secular arrangements will be developed. Accepting the existing religious settlement of the monarchy, or varying it, will generate challenging issues for a Scottish administration that is seeking to be more religiously inclusive.  相似文献   
73.
Many voters are canvassed by British political parties in the months and weeks immediately preceding a general election – but many are not. The parties are selective in whom they make contact with, and where. They focus on those in marginal constituencies who are likely to vote for them – and having identified them early in the process they contact them again, seeking to sustain that support in the seats where the contest overall will be either won or lost. A large panel survey conducted immediately before and after the 2010 general election allows detailed insight into that pattern of canvassing, identifying who the parties contacted, and where, in the six months prior to the election being called, and then who were contacted during the month immediately preceding polling day, and in how many different ways. Each party focused on its own supporters in the marginal constituencies, and in the middle-class neighbourhoods within those constituencies, but whereas the Conservatives, expecting to win the election, campaigned most intensively in the seats they lost by relatively small margins at the previous contest, Labour and the Liberal Democrats fought defensive campaigns in the seats that they won then. Such tactics were successful; the more ways in which respondents were contacted by a party, the more likely they were to vote for it.  相似文献   
74.
This case note examines the controversial decision of the US Supreme Court which, by a majority of 5:4 held that California should reduce its prison population as overcrowding levels gave rise to cruel and unusual punishment. The implications of the case for the interpretation of when prisoners' rights under the Eighth Amendment are breached, the separation of powers are discussed; the possible impact on prison rates in the USA is also examined.  相似文献   
75.
Online child pornography is a repulsive reality which cannot be ignored; the biggest child pornography manufacturing ring in South African history was cracked with the arrest of eight family members. There are more than 116 000 Internet searches daily for child pornography. Pornography is no longer confined to consenting adults, children are not only being exposed to pornographic material but are increasingly being used as victims of child pornography. In South Africa, the Internet and Cell phone Pornography Bill tabled in 2010 aims to make it illegal for Internet and mobile phone service providers to distribute pornography or permit it to be distributed. The objective of the Bill is to protect children from child pornography and women from the indignity of being seen as objects of pornography. This paper takes as its focal point the continuing crisis which centres on the conceptual framework, the existing legislation regulating online child pornography and measures to curb infringement.  相似文献   
76.
The “cloud” is not new, and its roots go back to the original plans for computing from the 1950s. Now that computing is moving back to the original cloud-based models that were envisioned more than 60 years ago, with it, consumers are realizing the increases in security and safety that accompany the move to centralized servers. Yet the perception of “trust” in this context is often still formed by views that people have from their use of computers over the past two decades, which is localized in nature (“if I can see it, I can control it”). This view is based on perception more than fact. Our paper discusses different views of trust in other contexts (such as banking and travel) and concludes that users of cloud computing should recast their view of trust in a similar way that consumers of banking and travel have changed their perceptions of trust in the last 100 years.  相似文献   
77.
The EU and the United States have implemented data breach notification rules that cover the health sectors. Nevertheless, data breach incidents involving medical data continue to rise, especially in the US and the UK. The HITECH Act, Pub. L. 111-5 Title XIII is the first federal health breach notification law in the US to be characterized by less government intrusions, while the revised EU Privacy Directive, 2009/136/EC calls for tougher privacy protection for data held by electronic communication providers. While the EU law sets a global de facto standard, the law remains toothless without strong enforcement mechanisms.  相似文献   
78.
万毅 《现代法学》2012,(6):180-193
第十一届全国人民代表大会第五次会议通过了《关于修改<中华人民共和国刑事诉讼法>的决定》(即《刑事诉讼法修正案》),明文规定在《刑事诉讼法》第二编第二章第七节后增加第八节"技术侦查措施"。但是,《刑事诉讼法修正案》在技术侦查措施的立法技术上采取了"概括授权"的方式,即仅笼统规定侦查机关对于危害国家安全犯罪、恐怖活动犯罪、黑社会性质的组织犯罪、重大毒品犯罪或者其他严重危害社会的犯罪案件,根据侦查犯罪的需要,经过严格的批准手续,有权采取技术侦查措施,而并未明确列举可采取的技术侦查措施的具体种类和手段。与此相关,《刑事诉讼法修正案》在"技术侦查措施"这一章节下同时授权公安机关为了查明案情,在必要的时候,经公安机关负责人决定,可以由有关人员隐匿其身份实施侦查,此即"乔装侦查措施"。问题在于,《刑事诉讼法修正案》在乔装侦查措施的立法技术上同样采取了概括授权的方式,除列举性地规定了作为乔装侦查方式之一的"控制下交付"之外,并未在立法上明文列举乔装侦查措施的具体类型和方式,其结果是造成《刑事诉讼法修正案》中"技术侦查措施"、"乔装侦查措施"等基础概念含义不清、相关法条内容模糊,减损了法条的可操作性,威胁到司法的确定性,可能直接或间接地冲击《刑事诉讼法》保障人权和打击犯罪的终极目的。《刑事诉讼法修正案》施行在即,上述基础概念的界定问题不解决,司法实务中将无法正确操作《刑事诉讼法修正案》中与"技术侦查措施"和"乔装侦查措施"相关的程序与制度。因此,应运用法律解释的方法对"技术侦查措施"和"乔装侦查措施"这两个基础性概念进行规范解释,勘定"技术侦查措施"和"乔装侦查措施"的合理内涵与外延。  相似文献   
79.
刑事诉讼法再修改与被追诉人财产权的保护   总被引:1,自引:0,他引:1  
左卫民 《现代法学》2012,34(1):135-143
强化对被追诉人财产权利的保护是当代中国刑事诉讼制度与实践的应然内容。当下的刑诉法修正案虽然从价值理念、制度设计与技术规范层面对此展开初步调整,但其价值取向的明确度及对现实需求的回应度尚显不足。未来刑事诉讼法修改应综合考量中国社会的整体变迁、域外法治发达国家司法经验,进一步观照被追诉人的财产权利,建构更契合人权保障要求的程序性保障机制。  相似文献   
80.
In Haxton v Philips Electronics the Court of Appeal considered whether a widow could recover the diminution in value of her dependency claim following the defendant's tortious reduction of her life expectancy. The note outlines the development of the common law, demonstrating that Haxton is novel but not unorthodox, and tests whether Haxton's principles can provide a sound foundation for future cases. Positing three hypothetical scenarios, it argues that the disparity in outcome, rather than indicating a lack of unifying principle, as was suggested in Jobling v Associated Dairies, may be explained by combining Austin's division between primary and secondary rights with Gardner and Stevens' contributions as to how they are protected. Restitutio in integrum requires consideration of the reasons and values underlying the right in question and these are discernible in the jurisprudence. The note also considers whether Haxton could have been decided on the basis that a defendant should not profit from its own wrongdoing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号