全文获取类型
收费全文 | 1125篇 |
免费 | 16篇 |
专业分类
各国政治 | 13篇 |
工人农民 | 8篇 |
世界政治 | 16篇 |
外交国际关系 | 23篇 |
法律 | 512篇 |
中国共产党 | 17篇 |
中国政治 | 34篇 |
政治理论 | 72篇 |
综合类 | 446篇 |
出版年
2023年 | 3篇 |
2022年 | 22篇 |
2021年 | 24篇 |
2020年 | 38篇 |
2019年 | 14篇 |
2018年 | 43篇 |
2017年 | 18篇 |
2016年 | 16篇 |
2015年 | 14篇 |
2014年 | 69篇 |
2013年 | 88篇 |
2012年 | 65篇 |
2011年 | 94篇 |
2010年 | 90篇 |
2009年 | 105篇 |
2008年 | 68篇 |
2007年 | 77篇 |
2006年 | 61篇 |
2005年 | 60篇 |
2004年 | 46篇 |
2003年 | 42篇 |
2002年 | 38篇 |
2001年 | 21篇 |
2000年 | 15篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1996年 | 1篇 |
1993年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
排序方式: 共有1141条查询结果,搜索用时 295 毫秒
151.
Kit Burden 《Computer Law & Security Report》2017,33(1):112-118
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
152.
如果能够在东北亚地区建立IT产业的共同体,将很有可能带动其他产业的联合,最终走向全面地联合,从而提升东北亚地区合作的层次。东北亚国家已经开始在IT领域进行了一定程度的合作,但是在东北亚地区建立IT共同体的道路不会是一帆风顺的,有许多因素会影响到东北亚IT共同体的最终形成。 相似文献
153.
Ida Madieha AzmiAuthor Vitae 《Computer Law & Security Report》2011,27(4):394-401
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics. 相似文献
154.
Gabriela Kennedy 《Computer Law & Security Report》2011,27(4):436-446
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
155.
Gabriela Kennedy 《Computer Law & Security Report》2011,27(3):318-326
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
156.
Gabriela Kennedy 《Computer Law & Security Report》2011,27(1):98-105
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
157.
Gabriela Kennedy 《Computer Law & Security Report》2011,27(2):201-210
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
158.
Helen Kemmitt Michael Dizon Wendy Pang Tom Gastrell Bianca Chouls 《Computer Law & Security Report》2011,27(2):191-195
This is the latest edition of Baker &; McKenzie’s column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
159.
Yves Poullet 《Computer Law & Security Report》2011,27(1):6-20
The present paper1 aims both at introducing the legal aspects of the protection of minors in cyberspace and analysing and criticizing certain main features embedded in this legal approach of young people protection. After a short introduction underlining the concept of child’s rights and the reason why this right has been particularly proclaimed in the context of the cyberspace, the first section describes the new technological features of the ICT environment and linked to this evolution the increasing risks the minors are confronted with. A typology of cyber abuses is proposed on the basis of these considerations. A list of EU or Council of Europe texts directly or indirectly related to the minors’ protection into the cyberspace is provided. The second section intends to analyse certain characteristics of the legal approach as regards the ways by which that protection is conceived and effectively ensured. Different principles and methods might be considered as keywords summarizing the legal approach and to a certain extent, fixing a partition of responsibilities taking fully into account the diversity of actors might be deduced from the different regulatory documents.The third section comes back to the different complementary means by which the Law is envisaging the minors’ protection. The obligation to create awareness about the potential risks minors might incur definitively is the first one. The omnipresent reference in all the legal texts to the role of self-regulatory interventions constitutes another pillar of the protection envisaged by the Law. After having described the multiple instruments developed in the context of this self-regulation (labels, codes of conduct, hotlines, ODR…) or even co-regulation, the paper examines the conditions set by the European legislators as regards these instruments. Technology might be considered as a fourth method for protecting children. Our concern will be to see how the Law is addressing new requirements as regards the technological solutions and their implementation. The present debates about the liability of the actors involved in applications or services targeted or not vis-à-vis the minors like SNS or VSP operators are evoked. As a final point the question of the increasing competences of LEA and the reinforcement of the criminal provisions in order to fight cyber abuses against minors will be debated. In conclusion, we will address final recommendations about the way by which it would be possible to reconcile effective minors’ protection and liberties into the cyberspace. 相似文献
160.
外交保护的实施过程可以区分为国内决策阶段和利用国际法向侵害本国人权利的相对国采取措施的阶段。因此,在国内决策阶段中有一种不可忽视的实践,那就是认为从国内法角度来看国家负有以一切可能方式保护本国公民的义务。但是,实际上外交是国家行为,它代表国民的整体利益。因而在具体个案中可能需要从大局出发采取和缓的方式对权益受侵害的国民进行保护或放弃保护。但,必须建立有效的机制以沟通被害者和实行外交保护的公权力机构。在对公共利益和私人利益进行取舍时,可能需要考虑相应的补偿问题。以此为出发点,对将以外交保护方式保护国民作为国家宪法义务的国家实践进行研究。 相似文献