首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   736篇
  免费   59篇
各国政治   20篇
工人农民   13篇
世界政治   28篇
外交国际关系   50篇
法律   418篇
中国共产党   5篇
中国政治   58篇
政治理论   94篇
综合类   109篇
  2024年   2篇
  2023年   22篇
  2022年   28篇
  2021年   45篇
  2020年   51篇
  2019年   27篇
  2018年   53篇
  2017年   34篇
  2016年   27篇
  2015年   30篇
  2014年   61篇
  2013年   79篇
  2012年   63篇
  2011年   25篇
  2010年   27篇
  2009年   28篇
  2008年   42篇
  2007年   33篇
  2006年   19篇
  2005年   22篇
  2004年   12篇
  2003年   16篇
  2002年   12篇
  2001年   10篇
  2000年   6篇
  1999年   5篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1983年   3篇
排序方式: 共有795条查询结果,搜索用时 15 毫秒
661.
华劼 《知识产权》2020,(1):72-78
欧盟委员会于2017年在题为“建立欧洲数据经济”的文件中提出为保护机器生成数据设立数据生产者权利(data producer’s right)的建议。数据生产者权利采用与知识产权制度类似的方式规定保护对象、权利主体、权利例外和保护期限,但这一权利在体系构建方面存在难点,与版权、数据库特殊权和商业秘密保护等现有知识产权制度产生重复保护的冲突。文章在分析数据生产者权利与现有知识产权制度关系的基础上,厘清数据生产者权利体系构建的难点,得出欧盟及欧盟之外国家立法不宜设立数据生产者权利的结论。  相似文献   
662.
论刑事情报资料的管理及完善   总被引:2,自引:0,他引:2  
本文简要地论述了两百年来刑事情报资料的发展情况,其中重点论述了美、英、日、德等国的发展水平。进而论述了刑事情报资料在现代侦查中的四大作用:(1)传统作用;(2)使各领域侦查方式全面改观;(3)对付当前各种犯罪的作用;(4)促进侦查民主、科学和公正化的发展。最后,谈及当前我国刑事情报资料管理的问题:(1)自动化程度不高;(2)种类不全;(3)管理分散落后效用低下;(4)有关法律有待完善;并根据这些问题提出了相应的四条完善建议:(1)全面实现刑事情报资料管理计算机网络化;(2)统一标准扩大刑事情报资料收集存储种类;(3)建立健全与刑事情报资料相关的法律;(4)提高刑事情报资料管理和使用人员的素质。  相似文献   
663.
汪晓敏 《思想战线》2001,27(2):135-136
资源数据库不仅是图书馆资源共享体系建设的基础,也是馆员在图书馆数字化过程中完成心态调整,提高帮助读者获取所需资料等方面的服务能力,扩大图书馆服务范围所必备的软件基础.  相似文献   
664.
The concept of self-tracking has recently begun to emerge in discussions of ways in which people can record specific features of their lives, often using digital technologies, to monitor, evaluate and optimize themselves. There is evidence that the personal data that are generated by the digital surveillance of individuals (dataveillance) are now used by a range of actors and agencies in diverse contexts. This paper examines the ‘function creep’ of self-tracking by outlining five modes that have emerged: private, communal, pushed, imposed and exploited. The analysis draws upon theoretical perspectives on concepts of selfhood, citizenship, dataveillance and the global digital data economy in discussing the wider socio-cultural implications of the emergence and development of these modes of self-tracking.  相似文献   
665.
Although research on terrorism has grown rapidly in recent years, few scholars have applied criminological theories to the analysis of individual‐level political extremism. Instead, researchers focused on radicalization have drawn primarily from political science and psychology and have overwhelmingly concentrated on violent extremists, leaving little variation in the dependent variable. With the use of a newly available data set, we test whether variables derived from prominent criminological theories are helpful in distinguishing between nonviolent and violent extremists. The results show that variables related to social control (lack of stable employment), social learning (radical peers), psychological perspectives (history of mental illness), and criminal record all have significant effects on participation in violent political extremism and are robust across multiple techniques for imputing missing data. At the same time, other common indicators of social control (e.g., education and marital status) and social learning perspectives (e.g., radical family members) were not significant in the multivariate models. We argue that terrorism research would benefit from including criminology insights and by considering political radicalization as a dynamic, evolving process, much as life‐course criminology treats more common forms of crime.  相似文献   
666.
The present study describes the quality of psychiatric care among forensic inpatients in Denmark who answered the Danish version of the Quality in Psychiatric Care–Forensic In-Patient (QPC–FIP) instrument. A sample of 143 patients (response rate 53%) from 25 of the 27 specialized forensic units in Denmark participated in the study. The patients’ ratings of the quality of care were generally high. The highest rating was found for the quality of the secluded environment and the lowest for patient participation in the care. The results showed that several factors influenced the patients’ ratings. Women rated the quality of care lower in comparison to men. Patients living together with someone before admission, patients with a lower level of education, and patients who were better informed regarding their diagnosis, who was the responsible physician, and where to complain rated the quality of care higher. We can recommend the use of the Danish version of the QPC–FIP instrument for measuring and improving the quality of care in forensic inpatient care.  相似文献   
667.
Naval power is a crucial element of state power, yet existing naval data sets are limited to a small number of states and ship types. Here we present 147 years of naval data on all the world’s navies from 1865 to 2011. This country-year data set focuses on warships with ship-based weapons capable of using kinetic force to inflict damage on other structures or peoples. After identifying a country’s active naval forces, we create a measure of naval power based on the aggregate tonnage of the active ships. Additionally, we create count variables for ship types such as aircraft carriers or battleships. This article introduces the country-year data, describes variables of interests for use in country-year, dyadic, or systemic studies, and suggests potential questions of interest scholars could explore using the naval power data set.  相似文献   
668.
多点连环式恐怖袭击的袭击目标多、影响范围大,是需要加以重视的一种恐怖袭击类型。通过对GTD数据进行统计分析,指出该类恐怖袭击发案区域广泛主要聚焦于中东和北非等地区,其特点是目标明确、多为团伙作案且使用炸弹袭击方式。文章结合“蜂巢分析法”分析作案模式,总结发案原因,提出加强安防能力、完善情报工作流程的工作措施,以供实战部门进行针对性防控。  相似文献   
669.
In November 2016, China passed its first Cybersecurity Law, aiming to strengthen cyberspace governance through a number of initiatives, including Internet operator security protection, personal information protection, special protection of critical information infrastructure, local storage of data, and security evaluation for data export. This Article discusses the major concepts and principles of the Cybersecurity Law. It also discusses the tensions and controversies inherent in the law. All in all, the Cybersecurity Law exhibits distinctive Chinese characteristics. It is premised on the concept of cyberspace sovereignty and emphasizes security over free flow of data and freedom of speech. It provides a basic legal framework for cyberspace governance in China, to be supplemented by implementing regulations in years to come.  相似文献   
670.
电子数据搜查、扣押的法律规制   总被引:1,自引:0,他引:1  
陈永生 《现代法学》2014,36(5):111-127
我国2012年修正的《刑事诉讼法》将电子数据增列为证据的法定种类,这要求我国刑事诉讼法学界对电子数据的相关问题,如电子证据的搜查与扣押,出示与质证,审查判断等问题进行深入研究。与传统证据相比,电子数据具有以下四大特征:存储内容的海量性、形态的易变性、变动的可察觉性以及内容的难以直接感知性。电子数据的以上特征对电子数据的搜查、扣押提出了更加严格的要求:首先,在搜查、扣押之前,侦查机关必须申请司法机关签发令状;在搜查、扣押过程中,无论是对电子设备的搜查、扣押还是此后对电子设备中存储的电子数据的进一步搜查,都必须受到令状原则有关合理根据和特定性要求的约束。其次,侦查机关搜查、扣押电子数据之后,必须允许辩护方对被搜查、扣押的电子数据进行查看、审查和复制,从而防止侦查机关滥用权力,保护辩护方的合法权利。另外,为保障电子数据的客观性和原始性,还必须建立严密的证据保管链制度。我国在以上方面都存在严重问题,在有些方面甚至完全空白,立法机关在未来修正《刑事诉讼法》时必须进行完善与重构。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号