首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   593篇
  免费   33篇
各国政治   18篇
工人农民   21篇
世界政治   9篇
外交国际关系   16篇
法律   388篇
中国政治   22篇
政治理论   37篇
综合类   115篇
  2023年   2篇
  2022年   6篇
  2021年   7篇
  2020年   23篇
  2019年   18篇
  2018年   14篇
  2017年   15篇
  2016年   16篇
  2015年   14篇
  2014年   29篇
  2013年   52篇
  2012年   41篇
  2011年   36篇
  2010年   35篇
  2009年   38篇
  2008年   40篇
  2007年   49篇
  2006年   48篇
  2005年   40篇
  2004年   44篇
  2003年   14篇
  2002年   9篇
  2001年   12篇
  2000年   18篇
  1999年   5篇
  1995年   1篇
排序方式: 共有626条查询结果,搜索用时 15 毫秒
61.
It is a well‐established principle that no trust may be regarded as charitable in law unless carrying out its purposes will benefit the public. Trusts for religious purposes have traditionally been presumed by courts to be for the public benefit. However, the presumption of public benefit will be removed from the law in early 2008 when section 3(2) of the Charities Act 2006 comes into force. At that time, two questions are likely to attract interest. First, to what extent, and in what ways, has the application of a presumption of public benefit assisted courts up to now? Secondly, without the assistance of the presumption, how might courts go about ascertaining whether the public will benefit in future cases? The article takes up these two questions with respect to trusts for religious purposes.  相似文献   
62.
Legal context: This article focuses on the relationship between trade markrights and other forms of statutory protection. Key points: FIFA is the proprietor of a number of trade mark registrationsin South Africa. The strength of these registrations is discussedand the view taken that a number are open to attack, in termsof both distinctiveness and user requirements. It is then shownthat, if statutory protection is given for the same words andphrases, the weaknesses of the trade mark registrations willbe avoided. Practical significance: The article serves as an illustration of the manner in whichinternational sporting bodies attempt to extend their IP protectionbeyond the bounds of existing legislation.  相似文献   
63.
吴萍 《行政与法》2006,(10):50-54
《妇女权益保障法》是一部以妇女为主体,以全面保护妇女合法权益为主要内容的基本法,本文以其为视角,探讨分析进城务工女性劳动和社会保障权的立法、执法和司法的环境进行深层的剖析,分析产生的原因,提出对策建议。  相似文献   
64.
论个人隐私权的行政法保护   总被引:1,自引:0,他引:1  
从隐私权的私权属性出发,应该确立以私权为核心的隐私权行政法保护理念;行政权力公共利益属性决定了隐私权行政法保护离不开行政公开制度建构;在平衡政府权力与个人权利的关系中,制定个人隐私权保护法,为隐私权行政法保护提供直接法律依据。  相似文献   
65.
The plans of the Scottish Executive/Government for the independence of Scotland, which are very sketchy, are explored in relation to desire to retain the monarchy. The Scottish Parliament has expressed support for the removal of religious discrimination from succession to the throne and instituted an alternative state religion—measures which suggest an alternative relationship between religion and the monarchy will be required in an independent Scotland. Repealing the Act of Union will require decisions as to whether the monarchy remains as Christian, Protestant and Presbyterian in Scotland or whether some alternative religious or secular arrangements will be developed. Accepting the existing religious settlement of the monarchy, or varying it, will generate challenging issues for a Scottish administration that is seeking to be more religiously inclusive.  相似文献   
66.
This case note examines the controversial decision of the US Supreme Court which, by a majority of 5:4 held that California should reduce its prison population as overcrowding levels gave rise to cruel and unusual punishment. The implications of the case for the interpretation of when prisoners' rights under the Eighth Amendment are breached, the separation of powers are discussed; the possible impact on prison rates in the USA is also examined.  相似文献   
67.
Online child pornography is a repulsive reality which cannot be ignored; the biggest child pornography manufacturing ring in South African history was cracked with the arrest of eight family members. There are more than 116 000 Internet searches daily for child pornography. Pornography is no longer confined to consenting adults, children are not only being exposed to pornographic material but are increasingly being used as victims of child pornography. In South Africa, the Internet and Cell phone Pornography Bill tabled in 2010 aims to make it illegal for Internet and mobile phone service providers to distribute pornography or permit it to be distributed. The objective of the Bill is to protect children from child pornography and women from the indignity of being seen as objects of pornography. This paper takes as its focal point the continuing crisis which centres on the conceptual framework, the existing legislation regulating online child pornography and measures to curb infringement.  相似文献   
68.
The “cloud” is not new, and its roots go back to the original plans for computing from the 1950s. Now that computing is moving back to the original cloud-based models that were envisioned more than 60 years ago, with it, consumers are realizing the increases in security and safety that accompany the move to centralized servers. Yet the perception of “trust” in this context is often still formed by views that people have from their use of computers over the past two decades, which is localized in nature (“if I can see it, I can control it”). This view is based on perception more than fact. Our paper discusses different views of trust in other contexts (such as banking and travel) and concludes that users of cloud computing should recast their view of trust in a similar way that consumers of banking and travel have changed their perceptions of trust in the last 100 years.  相似文献   
69.
The EU and the United States have implemented data breach notification rules that cover the health sectors. Nevertheless, data breach incidents involving medical data continue to rise, especially in the US and the UK. The HITECH Act, Pub. L. 111-5 Title XIII is the first federal health breach notification law in the US to be characterized by less government intrusions, while the revised EU Privacy Directive, 2009/136/EC calls for tougher privacy protection for data held by electronic communication providers. While the EU law sets a global de facto standard, the law remains toothless without strong enforcement mechanisms.  相似文献   
70.
万毅 《现代法学》2012,(6):180-193
第十一届全国人民代表大会第五次会议通过了《关于修改<中华人民共和国刑事诉讼法>的决定》(即《刑事诉讼法修正案》),明文规定在《刑事诉讼法》第二编第二章第七节后增加第八节"技术侦查措施"。但是,《刑事诉讼法修正案》在技术侦查措施的立法技术上采取了"概括授权"的方式,即仅笼统规定侦查机关对于危害国家安全犯罪、恐怖活动犯罪、黑社会性质的组织犯罪、重大毒品犯罪或者其他严重危害社会的犯罪案件,根据侦查犯罪的需要,经过严格的批准手续,有权采取技术侦查措施,而并未明确列举可采取的技术侦查措施的具体种类和手段。与此相关,《刑事诉讼法修正案》在"技术侦查措施"这一章节下同时授权公安机关为了查明案情,在必要的时候,经公安机关负责人决定,可以由有关人员隐匿其身份实施侦查,此即"乔装侦查措施"。问题在于,《刑事诉讼法修正案》在乔装侦查措施的立法技术上同样采取了概括授权的方式,除列举性地规定了作为乔装侦查方式之一的"控制下交付"之外,并未在立法上明文列举乔装侦查措施的具体类型和方式,其结果是造成《刑事诉讼法修正案》中"技术侦查措施"、"乔装侦查措施"等基础概念含义不清、相关法条内容模糊,减损了法条的可操作性,威胁到司法的确定性,可能直接或间接地冲击《刑事诉讼法》保障人权和打击犯罪的终极目的。《刑事诉讼法修正案》施行在即,上述基础概念的界定问题不解决,司法实务中将无法正确操作《刑事诉讼法修正案》中与"技术侦查措施"和"乔装侦查措施"相关的程序与制度。因此,应运用法律解释的方法对"技术侦查措施"和"乔装侦查措施"这两个基础性概念进行规范解释,勘定"技术侦查措施"和"乔装侦查措施"的合理内涵与外延。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号