全文获取类型
收费全文 | 629篇 |
免费 | 3篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 20篇 |
世界政治 | 11篇 |
外交国际关系 | 54篇 |
法律 | 200篇 |
中国共产党 | 8篇 |
中国政治 | 41篇 |
政治理论 | 92篇 |
综合类 | 197篇 |
出版年
2025年 | 2篇 |
2024年 | 2篇 |
2023年 | 1篇 |
2022年 | 7篇 |
2021年 | 12篇 |
2020年 | 15篇 |
2019年 | 18篇 |
2018年 | 26篇 |
2017年 | 23篇 |
2016年 | 15篇 |
2015年 | 15篇 |
2014年 | 41篇 |
2013年 | 96篇 |
2012年 | 37篇 |
2011年 | 53篇 |
2010年 | 45篇 |
2009年 | 44篇 |
2008年 | 25篇 |
2007年 | 18篇 |
2006年 | 17篇 |
2005年 | 19篇 |
2004年 | 27篇 |
2003年 | 21篇 |
2002年 | 14篇 |
2001年 | 29篇 |
2000年 | 9篇 |
1997年 | 1篇 |
排序方式: 共有632条查询结果,搜索用时 15 毫秒
121.
Gabriela Kennedy 《Computer Law & Security Report》2011,27(2):201-210
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
122.
National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include international military deterrence. The incredible power of nuclear weapons gave birth to deterrence, a military strategy in which the purpose of armies shifted from winning wars to preventing them. Although cyber attacks per se do not compare to a nuclear explosion, they do pose a serious and increasing threat to international security. Real-world examples suggest that cyber warfare will play a lead role in future international conflicts. This article examines the two deterrence strategies available to nation-states (denial and punishment) and their three basic requirements (capability, communication, and credibility) in the light of cyber warfare. It also explores whether the two most challenging aspects of cyber attacks – attribution and asymmetry – will make cyber attack deterrence an impossible task. 相似文献
123.
This is the fourth in a series of articles looking at the interaction between Internet domain names and intellectual property. It outlines the ICANN dispute resolution procedure for gTLDs whereby objectionable domain names can be transferred away from their registrants or cancelled. It also compares this to legal proceedings in the UK Courts and outlines a referral to the European Court of Justice on issues relating to a trade mark registration as the basis or legitimate interest for a .eu domain name registration. 相似文献
124.
网络成瘾导致青少年形成网络双重人格和各种人格障碍。研究发现,网络成瘾与特定人格具有相关性,并且有人格障碍的人更易产生网瘾。对此,可根据不同类型的网络成瘾所导致的人格障碍,采取精神分析疗法、行为疗法和认知疗法,对青少年网络成瘾人格进行矫治。 相似文献
125.
Nick Pantlin 《Computer Law & Security Report》2018,34(3):653-656
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
126.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(6):1364-1376
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
127.
Abstract Summary: This article is taken from a report entitled: Rhetorics and Realities: Sexual Exploitation of Children in Europe, of a study funded by the European Commission under the STOP Programme. It begins by re-visiting the knowledge base of child pornography and addresses a range of issues including: children's access to pornography; law enforcement and European policy. The article concludes with a number of pertinent questions which need both attention and answers. 相似文献
128.
《Global Crime》2013,14(1):146-157
Cyberspace and thus cybercrime know no boundaries. This chapter reviews some of the basic forms of cybercrime, draws specific attention to the issues that arise when offences occur across borders and in relation to organised criminal groupings, and provides illustrations based on some of the more celebrated cases of the past few years. The borderless nature of cyberspace and the exponential take-up of digital technology throughout the world guarantee that transnational cybercrime will remain a challenge. Fortunately, many nations are rising to this challenge, individually and collectively, but the web of international cooperation does have its holes and those nations that lag behind the leaders risk becoming havens for cybercriminals of the future. 相似文献
129.
《Journal of Political Marketing》2013,12(4):29-55
ABSTRACT This paper reports on the findings of the Internet component of the 2001 BES and compares them with those of the other BES pre-election surveys. Part 1 outlines the rationale that underpins the introduction of Internet polling as a supplement to more traditional methods of assessing mass public opinion. Part 2 describes the marginal distributions on the key dependent variable-the projected vote shares of the main political parties-of the three pre-election polls that were conducted using BES questionnaires. Intriguingly, the (unweighted) Internet-based poll provided a better guess of the actual vote shares in the subsequent election than either of the two conventional polls. Part 3 provides a more detailed comparison of the profiles of the face-to-face and Internet-based polls. It shows how the Internet poll, compared with the face-to-face poll, was skewed demographically towards the professional classes and politically towards the Conservative Party. Part 4 explores the extent to which the use of the Internet poll might result in spurious causal inferences being drawn about the sources of voting preferences in the 2001 UK election. A simple, direct-effects causal model is estimated using both the face-to-face probability sample data and the Internet survey data. The results suggest that, although the raw probability and Internet samples differ significantly, the relationships among the key variables do not differ significantly across the two samples. We conclude that Internet polling has an important part to play in gauging and analysing public opinion in future UK elections. 相似文献
130.
利用空壳公司实施的经济犯罪隐蔽性强、具体作案手法不断翻新。目前,我国存在诸多影响空壳公司经济犯罪治理的问题。对此,公安机关需要从加强信息分析、完善监管机制、消除作案动机等方面开展治理,探讨新形势下空壳公司经济犯罪治理面临的挑战、制约因素和应对之策。 相似文献