全文获取类型
收费全文 | 2291篇 |
免费 | 112篇 |
专业分类
各国政治 | 193篇 |
工人农民 | 24篇 |
世界政治 | 103篇 |
外交国际关系 | 298篇 |
法律 | 444篇 |
中国共产党 | 9篇 |
中国政治 | 67篇 |
政治理论 | 463篇 |
综合类 | 802篇 |
出版年
2024年 | 5篇 |
2023年 | 18篇 |
2022年 | 15篇 |
2021年 | 49篇 |
2020年 | 60篇 |
2019年 | 73篇 |
2018年 | 99篇 |
2017年 | 110篇 |
2016年 | 105篇 |
2015年 | 84篇 |
2014年 | 125篇 |
2013年 | 319篇 |
2012年 | 130篇 |
2011年 | 113篇 |
2010年 | 99篇 |
2009年 | 106篇 |
2008年 | 133篇 |
2007年 | 137篇 |
2006年 | 141篇 |
2005年 | 95篇 |
2004年 | 102篇 |
2003年 | 76篇 |
2002年 | 69篇 |
2001年 | 76篇 |
2000年 | 48篇 |
1999年 | 4篇 |
1998年 | 6篇 |
1997年 | 6篇 |
排序方式: 共有2403条查询结果,搜索用时 15 毫秒
911.
我国国家安全法律体系初探 总被引:2,自引:0,他引:2
赵辉 《江南社会学院学报》2009,11(2):68-71
我国<国家安全法>的内涵有广义、狭义之说,但二者皆是就狭义的国家安全概念而言,使得<国家安全法>的视野以及研究领域非常有限.结合我国现时国情,维护国家安全应在广义"国家安全"概念的前提下界定<国家安全法>的内涵,以此为基础从理论上构建我国国家安全法律体系的框架,进而结合我国现行立法,梳理、展示我国国家安全法律体系的全貌,揭示这一体系包含的所有法律规范的内在联系,使之与理论上对国家安全认识的重大突破相适应,同时也为维护国家安全的实际工作提供一个较为全面的法律依据体系. 相似文献
912.
Daniel Finke 《The Journal of Legislative Studies》2019,25(1):66-87
Quotas are the most disputed instrument to promote equal representation of women. Today, political parties in more than 90 democracies apply them. Essentially, gender quotas are a manipulation of the electoral rules. Scholars of legislative politics have created an impressive knowledge of the effect of electoral rules on political behaviour. So far, this literature remains unconnected to the literature on gender quotas. Our study contributes to closing that research gap. 相似文献
913.
An Improved Protection for the (Mentally Ill) Trans Parent: A Queer Reading of AP,Garçon and Nicot v France
下载免费PDF全文
![点击此处可从《The Modern law review》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Damian A. Gonzalez‐Salzberg 《The Modern law review》2018,81(3):526-538
The European Court of Human Rights has been deciding cases concerning LGBT rights since the early 1980s. Its case law on trans rights has changed drastically over time, imposing upon the states of the Council of Europe certain minimum standards regarding the legal recognition of gender identity. In its recent judgment of April 2017 the Court laid down a new rule to be adopted by domestic legislation; namely, that the legal recognition of gender transition cannot be made conditional upon pursuing medical or surgical procedures which have (or are likely to have) sterilising effects. This article analyses the judgment from a critical perspective grounded in queer theory, noting both the positive and the negative elements of the Court's decision. 相似文献
914.
Restrictions on speaking events in universities have been created both by recent student‐led efforts at ‘no‐platforming’ and by Part 5 of the Counter‐terrorism and Security Act 2015 which placed aspects of the government's Prevent strategy on a statutory basis. The statutory Prevent duty in universities includes, under the accompanying Guidance, curbing or monitoring events that could have an impact in drawing persons into terrorism. This article places the combined impact of Part 5 and student‐led curbs on campus speech in context by juxtaposing pre‐existing restrictions with the various free speech duties of universities. Focusing on speaking events, it evaluates the resulting state of free speech and academic freedom in universities. It finds potential violations of established free speech norms due to the impact of pre‐emptive strikes against some campus‐linked speech articulating non‐mainstream viewpoints. But it also argues that not all such speech has a strong foundation within such norms. 相似文献
915.
Maria Grazia Porcedda 《Computer Law & Security Report》2018,34(5):1077-1098
Breaches of security, a.k.a. security and data breaches, are on the rise, one of the reasons being the well-known lack of incentives to secure services and their underlying technologies, such as cloud computing. In this article, I question whether the patchwork of six EU instruments addressing breaches is helping to prevent or mitigate breaches as intended. At a lower level of abstraction, the question concerns appraising the success of each instrument separately. At a higher level of abstraction, since all laws converge on the objective of network and information security – one of the three pillars of the EU cyber security policy – the question is whether the legal ‘patchwork’ is helping to ‘patch’ the underlying insecurity of network and information systems thus contributing to cyber security. To answer the research question, I look at the regulatory framework as a whole, from the perspective of network and information security and consequently I use the expression cyber security breaches. I appraise the regulatory patchwork by using the three goals of notification identified by the European Commission as a benchmark, enriched by policy documents, legal analysis, and academic literature on breaches legislation, and I elaborate my analysis by reasoning on the case of cloud computing. The analysis, which is frustrated by the lack of adequate data, shows that the regulatory framework on cyber security breaches may be failing to provide the necessary level of mutual learning on the functioning of security measures, awareness of both regulatory authorities and the public on how entities fare in protecting data (and the related network and information systems), and enforcing self-improvement of entities dealing with information and services. I conclude with some recommendations addressing the causes, rather than the symptoms, of network and information systems insecurity. 相似文献
916.
Nick Pantlin 《Computer Law & Security Report》2018,34(4):985-987
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening ``on the ground'' at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
917.
Max Parasol 《Computer Law & Security Report》2018,34(1):67-98
Chinese officials are increasingly turning to a policy known as Informatisation, connecting industry online, to utilise technology to improve efficiency and tackle economic developmental problems in China. However, various recent laws have made foreign technology firms uneasy about perceptions of Rule of Law in China. Will these new laws, under China's stated policy of “Network Sovereignty” (“网络主权” “wangluo zhuquan”) affect China's ability to attract foreign technology firms, talent and importantly technology transfers? Will they slow China's technology and Smart City drive? This paper focuses on the question of whether international fears of China's new Cyber Security Law are justified. In Parts I and II, the paper analyses why China needs a cyber security regime. In Parts III and IV it examines the law itself. 相似文献
918.
919.
In the post-human rights era the question has arisen on several occasions as to whether the automatic and arbitrary termination
of the registered owner’s title through the common law and statutory principles governing adverse possession of land is contrary
to the Article 1, Protocol 1 of the European Convention. The matter fell to be decided in J.A. Pye (Oxford) Ltd v United Kingdom ([2005] 3 EGLR 1) where the European Court of Human Rights held that the automatic termination of a registered owners title
after 12 years possession was indeed a violation of Article 1, Protocol 1. More recently, the decision of the European Court
has been overturned by the Grand Chamber of the European Court of Human Rights where the Grand Chamber has held that a squatters’
right to another persons land are not disproportionate (J. A. Pye (Oxford) Ltd and Another v United Kingdom, The Times, October 1st 2007). This short article examines the decision of the Grand Chamber.
相似文献
Jane WoodEmail: |
920.
Ewan NettletonAuthor Vitae 《Computer Law & Security Report》2009,25(2):181-184
Four years from the European Court of Justice's seminal rulings on database right in the British Horseracing Board and Fixtures Marketing cases, the Court has once again looked at the extent of protection this right affords. The earlier decisions had suggested the right was weak, with many databases not qualifying for protection and the extent of infringement required being difficult to meet. However, the ECJ's recent ruling in the Directmedia case (C-304/07) handed down in late-2008 is more positive for database owners. Adopting the reasoning of the Advocate General, the ECJ has clarified the types of acts which can constitute infringement of database right and confirmed they are broad in scope. The outcome and implications of the ruling are discussed below. 相似文献