首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2291篇
  免费   112篇
各国政治   193篇
工人农民   24篇
世界政治   103篇
外交国际关系   298篇
法律   444篇
中国共产党   9篇
中国政治   67篇
政治理论   463篇
综合类   802篇
  2024年   5篇
  2023年   18篇
  2022年   15篇
  2021年   49篇
  2020年   60篇
  2019年   73篇
  2018年   99篇
  2017年   110篇
  2016年   105篇
  2015年   84篇
  2014年   125篇
  2013年   319篇
  2012年   130篇
  2011年   113篇
  2010年   99篇
  2009年   106篇
  2008年   133篇
  2007年   137篇
  2006年   141篇
  2005年   95篇
  2004年   102篇
  2003年   76篇
  2002年   69篇
  2001年   76篇
  2000年   48篇
  1999年   4篇
  1998年   6篇
  1997年   6篇
排序方式: 共有2403条查询结果,搜索用时 15 毫秒
911.
我国国家安全法律体系初探   总被引:2,自引:0,他引:2  
我国<国家安全法>的内涵有广义、狭义之说,但二者皆是就狭义的国家安全概念而言,使得<国家安全法>的视野以及研究领域非常有限.结合我国现时国情,维护国家安全应在广义"国家安全"概念的前提下界定<国家安全法>的内涵,以此为基础从理论上构建我国国家安全法律体系的框架,进而结合我国现行立法,梳理、展示我国国家安全法律体系的全貌,揭示这一体系包含的所有法律规范的内在联系,使之与理论上对国家安全认识的重大突破相适应,同时也为维护国家安全的实际工作提供一个较为全面的法律依据体系.  相似文献   
912.
Quotas are the most disputed instrument to promote equal representation of women. Today, political parties in more than 90 democracies apply them. Essentially, gender quotas are a manipulation of the electoral rules. Scholars of legislative politics have created an impressive knowledge of the effect of electoral rules on political behaviour. So far, this literature remains unconnected to the literature on gender quotas. Our study contributes to closing that research gap.  相似文献   
913.
The European Court of Human Rights has been deciding cases concerning LGBT rights since the early 1980s. Its case law on trans rights has changed drastically over time, imposing upon the states of the Council of Europe certain minimum standards regarding the legal recognition of gender identity. In its recent judgment of April 2017 the Court laid down a new rule to be adopted by domestic legislation; namely, that the legal recognition of gender transition cannot be made conditional upon pursuing medical or surgical procedures which have (or are likely to have) sterilising effects. This article analyses the judgment from a critical perspective grounded in queer theory, noting both the positive and the negative elements of the Court's decision.  相似文献   
914.
Restrictions on speaking events in universities have been created both by recent student‐led efforts at ‘no‐platforming’ and by Part 5 of the Counter‐terrorism and Security Act 2015 which placed aspects of the government's Prevent strategy on a statutory basis. The statutory Prevent duty in universities includes, under the accompanying Guidance, curbing or monitoring events that could have an impact in drawing persons into terrorism. This article places the combined impact of Part 5 and student‐led curbs on campus speech in context by juxtaposing pre‐existing restrictions with the various free speech duties of universities. Focusing on speaking events, it evaluates the resulting state of free speech and academic freedom in universities. It finds potential violations of established free speech norms due to the impact of pre‐emptive strikes against some campus‐linked speech articulating non‐mainstream viewpoints. But it also argues that not all such speech has a strong foundation within such norms.  相似文献   
915.
Breaches of security, a.k.a. security and data breaches, are on the rise, one of the reasons being the well-known lack of incentives to secure services and their underlying technologies, such as cloud computing. In this article, I question whether the patchwork of six EU instruments addressing breaches is helping to prevent or mitigate breaches as intended. At a lower level of abstraction, the question concerns appraising the success of each instrument separately. At a higher level of abstraction, since all laws converge on the objective of network and information security – one of the three pillars of the EU cyber security policy – the question is whether the legal ‘patchwork’ is helping to ‘patch’ the underlying insecurity of network and information systems thus contributing to cyber security. To answer the research question, I look at the regulatory framework as a whole, from the perspective of network and information security and consequently I use the expression cyber security breaches. I appraise the regulatory patchwork by using the three goals of notification identified by the European Commission as a benchmark, enriched by policy documents, legal analysis, and academic literature on breaches legislation, and I elaborate my analysis by reasoning on the case of cloud computing. The analysis, which is frustrated by the lack of adequate data, shows that the regulatory framework on cyber security breaches may be failing to provide the necessary level of mutual learning on the functioning of security measures, awareness of both regulatory authorities and the public on how entities fare in protecting data (and the related network and information systems), and enforcing self-improvement of entities dealing with information and services. I conclude with some recommendations addressing the causes, rather than the symptoms, of network and information systems insecurity.  相似文献   
916.
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening ``on the ground'' at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
917.
Chinese officials are increasingly turning to a policy known as Informatisation, connecting industry online, to utilise technology to improve efficiency and tackle economic developmental problems in China. However, various recent laws have made foreign technology firms uneasy about perceptions of Rule of Law in China. Will these new laws, under China's stated policy of “Network Sovereignty” (“网络主权” “wangluo zhuquan”) affect China's ability to attract foreign technology firms, talent and importantly technology transfers? Will they slow China's technology and Smart City drive? This paper focuses on the question of whether international fears of China's new Cyber Security Law are justified. In Parts I and II, the paper analyses why China needs a cyber security regime. In Parts III and IV it examines the law itself.  相似文献   
918.
919.
In the post-human rights era the question has arisen on several occasions as to whether the automatic and arbitrary termination of the registered owner’s title through the common law and statutory principles governing adverse possession of land is contrary to the Article 1, Protocol 1 of the European Convention. The matter fell to be decided in J.A. Pye (Oxford) Ltd v United Kingdom ([2005] 3 EGLR 1) where the European Court of Human Rights held that the automatic termination of a registered owners title after 12 years possession was indeed a violation of Article 1, Protocol 1. More recently, the decision of the European Court has been overturned by the Grand Chamber of the European Court of Human Rights where the Grand Chamber has held that a squatters’ right to another persons land are not disproportionate (J. A. Pye (Oxford) Ltd and Another v United Kingdom, The Times, October 1st 2007). This short article examines the decision of the Grand Chamber.
Jane WoodEmail:
  相似文献   
920.
Four years from the European Court of Justice's seminal rulings on database right in the British Horseracing Board and Fixtures Marketing cases, the Court has once again looked at the extent of protection this right affords. The earlier decisions had suggested the right was weak, with many databases not qualifying for protection and the extent of infringement required being difficult to meet. However, the ECJ's recent ruling in the Directmedia case (C-304/07) handed down in late-2008 is more positive for database owners. Adopting the reasoning of the Advocate General, the ECJ has clarified the types of acts which can constitute infringement of database right and confirmed they are broad in scope. The outcome and implications of the ruling are discussed below.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号