首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1125篇
  免费   16篇
各国政治   13篇
工人农民   8篇
世界政治   16篇
外交国际关系   23篇
法律   512篇
中国共产党   17篇
中国政治   34篇
政治理论   72篇
综合类   446篇
  2023年   3篇
  2022年   22篇
  2021年   24篇
  2020年   38篇
  2019年   14篇
  2018年   43篇
  2017年   18篇
  2016年   16篇
  2015年   14篇
  2014年   69篇
  2013年   88篇
  2012年   65篇
  2011年   94篇
  2010年   90篇
  2009年   105篇
  2008年   68篇
  2007年   77篇
  2006年   61篇
  2005年   60篇
  2004年   46篇
  2003年   42篇
  2002年   38篇
  2001年   21篇
  2000年   15篇
  1999年   1篇
  1998年   2篇
  1996年   1篇
  1993年   1篇
  1991年   2篇
  1990年   1篇
  1986年   1篇
  1985年   1篇
排序方式: 共有1141条查询结果,搜索用时 295 毫秒
151.
EU update     
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
152.
如果能够在东北亚地区建立IT产业的共同体,将很有可能带动其他产业的联合,最终走向全面地联合,从而提升东北亚地区合作的层次。东北亚国家已经开始在IT领域进行了一定程度的合作,但是在东北亚地区建立IT共同体的道路不会是一帆风顺的,有许多因素会影响到东北亚IT共同体的最终形成。  相似文献   
153.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
154.
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
155.
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
156.
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
157.
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
158.
EU update     
This is the latest edition of Baker &; McKenzie’s column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
159.
The present paper1 aims both at introducing the legal aspects of the protection of minors in cyberspace and analysing and criticizing certain main features embedded in this legal approach of young people protection. After a short introduction underlining the concept of child’s rights and the reason why this right has been particularly proclaimed in the context of the cyberspace, the first section describes the new technological features of the ICT environment and linked to this evolution the increasing risks the minors are confronted with. A typology of cyber abuses is proposed on the basis of these considerations. A list of EU or Council of Europe texts directly or indirectly related to the minors’ protection into the cyberspace is provided. The second section intends to analyse certain characteristics of the legal approach as regards the ways by which that protection is conceived and effectively ensured. Different principles and methods might be considered as keywords summarizing the legal approach and to a certain extent, fixing a partition of responsibilities taking fully into account the diversity of actors might be deduced from the different regulatory documents.The third section comes back to the different complementary means by which the Law is envisaging the minors’ protection. The obligation to create awareness about the potential risks minors might incur definitively is the first one. The omnipresent reference in all the legal texts to the role of self-regulatory interventions constitutes another pillar of the protection envisaged by the Law. After having described the multiple instruments developed in the context of this self-regulation (labels, codes of conduct, hotlines, ODR…) or even co-regulation, the paper examines the conditions set by the European legislators as regards these instruments. Technology might be considered as a fourth method for protecting children. Our concern will be to see how the Law is addressing new requirements as regards the technological solutions and their implementation. The present debates about the liability of the actors involved in applications or services targeted or not vis-à-vis the minors like SNS or VSP operators are evoked. As a final point the question of the increasing competences of LEA and the reinforcement of the criminal provisions in order to fight cyber abuses against minors will be debated. In conclusion, we will address final recommendations about the way by which it would be possible to reconcile effective minors’ protection and liberties into the cyberspace.  相似文献   
160.
王若源 《政法论丛》2011,(1):103-110
外交保护的实施过程可以区分为国内决策阶段和利用国际法向侵害本国人权利的相对国采取措施的阶段。因此,在国内决策阶段中有一种不可忽视的实践,那就是认为从国内法角度来看国家负有以一切可能方式保护本国公民的义务。但是,实际上外交是国家行为,它代表国民的整体利益。因而在具体个案中可能需要从大局出发采取和缓的方式对权益受侵害的国民进行保护或放弃保护。但,必须建立有效的机制以沟通被害者和实行外交保护的公权力机构。在对公共利益和私人利益进行取舍时,可能需要考虑相应的补偿问题。以此为出发点,对将以外交保护方式保护国民作为国家宪法义务的国家实践进行研究。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号