全文获取类型
收费全文 | 736篇 |
免费 | 59篇 |
专业分类
各国政治 | 20篇 |
工人农民 | 13篇 |
世界政治 | 28篇 |
外交国际关系 | 50篇 |
法律 | 418篇 |
中国共产党 | 5篇 |
中国政治 | 58篇 |
政治理论 | 94篇 |
综合类 | 109篇 |
出版年
2024年 | 2篇 |
2023年 | 22篇 |
2022年 | 28篇 |
2021年 | 45篇 |
2020年 | 51篇 |
2019年 | 27篇 |
2018年 | 53篇 |
2017年 | 34篇 |
2016年 | 27篇 |
2015年 | 30篇 |
2014年 | 61篇 |
2013年 | 79篇 |
2012年 | 63篇 |
2011年 | 25篇 |
2010年 | 27篇 |
2009年 | 28篇 |
2008年 | 42篇 |
2007年 | 33篇 |
2006年 | 19篇 |
2005年 | 22篇 |
2004年 | 12篇 |
2003年 | 16篇 |
2002年 | 12篇 |
2001年 | 10篇 |
2000年 | 6篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 3篇 |
排序方式: 共有795条查询结果,搜索用时 15 毫秒
661.
欧盟委员会于2017年在题为“建立欧洲数据经济”的文件中提出为保护机器生成数据设立数据生产者权利(data producer’s right)的建议。数据生产者权利采用与知识产权制度类似的方式规定保护对象、权利主体、权利例外和保护期限,但这一权利在体系构建方面存在难点,与版权、数据库特殊权和商业秘密保护等现有知识产权制度产生重复保护的冲突。文章在分析数据生产者权利与现有知识产权制度关系的基础上,厘清数据生产者权利体系构建的难点,得出欧盟及欧盟之外国家立法不宜设立数据生产者权利的结论。 相似文献
662.
论刑事情报资料的管理及完善 总被引:2,自引:0,他引:2
张桂勇 《湖北警官学院学报》2001,(3)
本文简要地论述了两百年来刑事情报资料的发展情况,其中重点论述了美、英、日、德等国的发展水平。进而论述了刑事情报资料在现代侦查中的四大作用:(1)传统作用;(2)使各领域侦查方式全面改观;(3)对付当前各种犯罪的作用;(4)促进侦查民主、科学和公正化的发展。最后,谈及当前我国刑事情报资料管理的问题:(1)自动化程度不高;(2)种类不全;(3)管理分散落后效用低下;(4)有关法律有待完善;并根据这些问题提出了相应的四条完善建议:(1)全面实现刑事情报资料管理计算机网络化;(2)统一标准扩大刑事情报资料收集存储种类;(3)建立健全与刑事情报资料相关的法律;(4)提高刑事情报资料管理和使用人员的素质。 相似文献
663.
资源数据库不仅是图书馆资源共享体系建设的基础,也是馆员在图书馆数字化过程中完成心态调整,提高帮助读者获取所需资料等方面的服务能力,扩大图书馆服务范围所必备的软件基础. 相似文献
664.
Deborah Lupton 《Economy and Society》2016,45(1):101-122
The concept of self-tracking has recently begun to emerge in discussions of ways in which people can record specific features of their lives, often using digital technologies, to monitor, evaluate and optimize themselves. There is evidence that the personal data that are generated by the digital surveillance of individuals (dataveillance) are now used by a range of actors and agencies in diverse contexts. This paper examines the ‘function creep’ of self-tracking by outlining five modes that have emerged: private, communal, pushed, imposed and exploited. The analysis draws upon theoretical perspectives on concepts of selfhood, citizenship, dataveillance and the global digital data economy in discussing the wider socio-cultural implications of the emergence and development of these modes of self-tracking. 相似文献
665.
Although research on terrorism has grown rapidly in recent years, few scholars have applied criminological theories to the analysis of individual‐level political extremism. Instead, researchers focused on radicalization have drawn primarily from political science and psychology and have overwhelmingly concentrated on violent extremists, leaving little variation in the dependent variable. With the use of a newly available data set, we test whether variables derived from prominent criminological theories are helpful in distinguishing between nonviolent and violent extremists. The results show that variables related to social control (lack of stable employment), social learning (radical peers), psychological perspectives (history of mental illness), and criminal record all have significant effects on participation in violent political extremism and are robust across multiple techniques for imputing missing data. At the same time, other common indicators of social control (e.g., education and marital status) and social learning perspectives (e.g., radical family members) were not significant in the multivariate models. We argue that terrorism research would benefit from including criminology insights and by considering political radicalization as a dynamic, evolving process, much as life‐course criminology treats more common forms of crime. 相似文献
666.
A. Schröder K. Lorentzen E. Riiskjaer L.-O. Lundqvist 《The journal of forensic psychiatry & psychology》2016,27(4):551-568
The present study describes the quality of psychiatric care among forensic inpatients in Denmark who answered the Danish version of the Quality in Psychiatric Care–Forensic In-Patient (QPC–FIP) instrument. A sample of 143 patients (response rate 53%) from 25 of the 27 specialized forensic units in Denmark participated in the study. The patients’ ratings of the quality of care were generally high. The highest rating was found for the quality of the secluded environment and the lowest for patient participation in the care. The results showed that several factors influenced the patients’ ratings. Women rated the quality of care lower in comparison to men. Patients living together with someone before admission, patients with a lower level of education, and patients who were better informed regarding their diagnosis, who was the responsible physician, and where to complain rated the quality of care higher. We can recommend the use of the Danish version of the QPC–FIP instrument for measuring and improving the quality of care in forensic inpatient care. 相似文献
667.
Naval power is a crucial element of state power, yet existing naval data sets are limited to a small number of states and ship types. Here we present 147 years of naval data on all the world’s navies from 1865 to 2011. This country-year data set focuses on warships with ship-based weapons capable of using kinetic force to inflict damage on other structures or peoples. After identifying a country’s active naval forces, we create a measure of naval power based on the aggregate tonnage of the active ships. Additionally, we create count variables for ship types such as aircraft carriers or battleships. This article introduces the country-year data, describes variables of interests for use in country-year, dyadic, or systemic studies, and suggests potential questions of interest scholars could explore using the naval power data set. 相似文献
668.
顾丽霞 《山西省政法管理干部学院学报》2021,(1)
多点连环式恐怖袭击的袭击目标多、影响范围大,是需要加以重视的一种恐怖袭击类型。通过对GTD数据进行统计分析,指出该类恐怖袭击发案区域广泛主要聚焦于中东和北非等地区,其特点是目标明确、多为团伙作案且使用炸弹袭击方式。文章结合“蜂巢分析法”分析作案模式,总结发案原因,提出加强安防能力、完善情报工作流程的工作措施,以供实战部门进行针对性防控。 相似文献
669.
In November 2016, China passed its first Cybersecurity Law, aiming to strengthen cyberspace governance through a number of initiatives, including Internet operator security protection, personal information protection, special protection of critical information infrastructure, local storage of data, and security evaluation for data export. This Article discusses the major concepts and principles of the Cybersecurity Law. It also discusses the tensions and controversies inherent in the law. All in all, the Cybersecurity Law exhibits distinctive Chinese characteristics. It is premised on the concept of cyberspace sovereignty and emphasizes security over free flow of data and freedom of speech. It provides a basic legal framework for cyberspace governance in China, to be supplemented by implementing regulations in years to come. 相似文献
670.
电子数据搜查、扣押的法律规制 总被引:1,自引:0,他引:1
我国2012年修正的《刑事诉讼法》将电子数据增列为证据的法定种类,这要求我国刑事诉讼法学界对电子数据的相关问题,如电子证据的搜查与扣押,出示与质证,审查判断等问题进行深入研究。与传统证据相比,电子数据具有以下四大特征:存储内容的海量性、形态的易变性、变动的可察觉性以及内容的难以直接感知性。电子数据的以上特征对电子数据的搜查、扣押提出了更加严格的要求:首先,在搜查、扣押之前,侦查机关必须申请司法机关签发令状;在搜查、扣押过程中,无论是对电子设备的搜查、扣押还是此后对电子设备中存储的电子数据的进一步搜查,都必须受到令状原则有关合理根据和特定性要求的约束。其次,侦查机关搜查、扣押电子数据之后,必须允许辩护方对被搜查、扣押的电子数据进行查看、审查和复制,从而防止侦查机关滥用权力,保护辩护方的合法权利。另外,为保障电子数据的客观性和原始性,还必须建立严密的证据保管链制度。我国在以上方面都存在严重问题,在有些方面甚至完全空白,立法机关在未来修正《刑事诉讼法》时必须进行完善与重构。 相似文献