首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   547篇
  免费   4篇
各国政治   6篇
工人农民   4篇
世界政治   6篇
外交国际关系   15篇
法律   211篇
中国共产党   10篇
中国政治   15篇
政治理论   36篇
综合类   248篇
  2023年   2篇
  2022年   8篇
  2021年   13篇
  2020年   13篇
  2019年   6篇
  2018年   23篇
  2017年   10篇
  2016年   5篇
  2015年   7篇
  2014年   35篇
  2013年   44篇
  2012年   25篇
  2011年   55篇
  2010年   46篇
  2009年   63篇
  2008年   21篇
  2007年   32篇
  2006年   32篇
  2005年   33篇
  2004年   29篇
  2003年   16篇
  2002年   22篇
  2001年   6篇
  2000年   4篇
  1998年   1篇
排序方式: 共有551条查询结果,搜索用时 15 毫秒
331.
信息化条件下侦查破案方式的探索,转变侦查观念是一个关键性的问题。在侦查破案中侦查人员应当建立新的犯罪时空观,以情报信息为切入点,围绕人、事、物等进行多方位侦查,充分发掘分析利用案件中的各种关联信息,及时发现侦查线索,查明犯罪事实,提高侦破效率。  相似文献   
332.
行政许可持有人强制信息披露制度问题研究   总被引:1,自引:0,他引:1  
以行政许可持有人为信息披露义务主体的行政许可信息强制披露制度是一种削弱行政许可持有人信息优势地位、优化行政许可监管对策的重要制度安排。行政许可持有人强制信息披露制度具有舒缓监管信息不对称状态、强化行政许可持有人自律、促使监管权力规范运行的价值。行政许可持有人强制信息披露制度的构建,需在遵循利益平衡、比例原则下综合考量利益关联度、信息搜寻成本、信息披露成本、专业化程度、市场竞争度等标准。  相似文献   
333.
梁艺 《政治与法律》2020,(2):113-124
行政执法案卷信息从作为行政执法案卷评查的对象到作为政府信息公开的例外事由,“行政执法案卷信息”在司法实践中呈现出概念扩张的趋势,具体体现在案卷类型的溢出与案卷内容的形式化。反映出作为相对不予公开事项的行政执法案卷信息,在不予公开的实质的理由上存在模糊之处,使得法定公开与裁量公开的适用难以深入展开。与此同时,与之相关联的卷宗阅览权在行使方式上被进一步挤压。如何获得相对确定的内涵与外延,形成适当强度的司法审查路径,是行政执法案卷信息合理解释与适用中需要解决的问题。  相似文献   
334.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
335.
Any investigation can have a digital dimension, often involving information from multiple data sources, organizations and jurisdictions. Existing approaches to representing and exchanging cyber-investigation information are inadequate, particularly when combining data sources from numerous organizations or dealing with large amounts of data from various tools. To conduct investigations effectively, there is a pressing need to harmonize how this information is represented and exchanged. This paper addresses this need for information exchange and tool interoperability with an open community-developed specification language called Cyber-investigation Analysis Standard Expression (CASE). To further promote a common structure, CASE aligns with and extends the Unified Cyber Ontology (UCO) construct, which provides a format for representing information in all cyber domains. This ontology abstracts objects and concepts that are not CASE-specific, so that they can be used across other cyber disciplines that may extend UCO. This work is a rational evolution of the Digital Forensic Analysis eXpression (DFAX) for representing digital forensic information and provenance. CASE is more flexible than DFAX and can be utilized in any context, including criminal, corporate and intelligence. CASE also builds on the Hansken data model developed and implemented by the Netherlands Forensic Institute (NFI). CASE enables the fusion of information from different organizations, data sources, and forensic tools to foster more comprehensive and cohesive analysis. This paper includes illustrative examples of how CASE can be implemented and used to capture information in a structured form to advance sharing, interoperability and analysis in cyber-investigations. In addition to capturing technical details and relationships between objects, CASE provides structure for representing and sharing details about how cyber-information was handled, transferred, processed, analyzed, and interpreted. CASE also supports data marking for sharing information at different levels of trust and classification, and for protecting sensitive and private information. Furthermore, CASE supports the sharing of knowledge related to cyber-investigations, including distinctive patterns of activity/behavior that are common across cases. This paper features a proof-of-concept Application Program Interface (API) to facilitate implementation of CASE in tools. Community members are encouraged to participate in the development and implementation of CASE and UCO.  相似文献   
336.
This paper presents a recent case study about how South Korea has modified the way it addresses digital incidents. To determine the best approach to mission-critical instances, the Multilateral Joint Analysis (MJA) model was used as an enhanced two stage process. The Delphi method and Structural Equation Model (SEM) were employed to determine the final model. This process established a governance mechanism that uses measurable control variables and is presently in use in mission critical services to protect against digital incidents.  相似文献   
337.
电子政务系统的成功不仅取决于技术因素,更取决于用户的接受。本文以计划行为理论(TPB)和技术接受模型(TAM)为基础,建立分析公众接受政府门户网站影响因素的理论模型和假设,通过调查获取了225份有效问卷,运用SPSS和LISREL软件进行数据分析和假设检验,结果表明:模型能够解释公众使用意向的方差为58.3%;影响公众接受政府门户网站的主要因素包括感知有用性、信任、感知易用性、外部影响、人际影响、自我效能和便利条件。最后,提出了促进公众接受政府门户网站的若干建议。  相似文献   
338.
时飞 《科技与法律》2015,(1):164-189
当下围绕着"公意主题事件"而生成的"网络谣言",多为公民基于参与公共政治的联动机制而形成的信息求索机制,属于公民权利的宪法机能形式。它在填补公民参与公共政治的信息赤字的同时,为建构良性的官民互动和公信机制提供了充分契机。伴随着互联网所建构的平面化信息交流机制的日益深入,以及开放、透明的公共信息机制需求在现代国家的民主政治建设中的作用日益凸显,制度设置必须提供更为开放和多元的信息交流机制,尤其是公民参与政治的公共信息获取路径。因此,需要阐明互联网上的信息生成和传递作为国民公共信息获取程式的必要性,澄清政治公议的宪法化展开逻辑,为"网络谣言"所犯政法禁忌解套,实现借助互联网有别于官方话语系统的政治公议的常态化和合法化,并最终寻求其正当性的法理根基。  相似文献   
339.
全面建设小康社会过程中,政府决策的基础发生了变化。这就要求政府必须提高决策的科学化水平。有效的信息咨询机制是实现政府决策科学化水平的重要保证,实现信息咨询机制的重点是全面掌握行政情报信息以及使用适当的信息咨询方式。  相似文献   
340.
Fair use and copyright protection: a price theory explanation   总被引:1,自引:0,他引:1  
Copyright scholars suggest that computer technology has reduced transaction costs associated with copyright transfer, allegedly eliminating the need for the fair-use doctrines that were developed to allow limited use of copyrighted material in situations where the transaction costs of securing authorized use would be prohibitive. According to this emerging view, in an ideal world with no contracting costs, third party use of copyrighted material could realistically only take place with the express consent of the copyright holder. This would give the author absolute power to dispose of his work, including the right to veto uses, without the possibility of a fair use “override” of any sort.This paper shows the limits of such transaction cost-based arguments. If transaction costs provide the dominant economic justification of “fair-use” doctrines, an exogenous reduction of such transaction costs would limit the scope and application of the defense of fair use. Nevertheless, in this paper we suggest that, when viewed in light of the anticommons theory, fair-use doctrines retain a valid efficiency justification even in a zero transaction-cost environment. Fair-use defenses are justifiable, and in fact instrumental, in minimizing the welfare losses prompted by the strategic behavior of the copyright holders. Even if copyright licenses can be transferred at no cost (for instance, in a “click and pay” frictionless computer world), the strategic behavior of the copyright holders would still create possible deadweight losses.In this context, we identify a number of critical variables that should guide and constrain the application of fair-use doctrines. These variables include (a) the number of copyright holders; (b) the degree of complementarity between the copyrighted inputs; (c) the degree of independence between the various copyright holders in the pricing of their licenses; and (d) ability to price discriminate.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号