全文获取类型
收费全文 | 1125篇 |
免费 | 16篇 |
专业分类
各国政治 | 13篇 |
工人农民 | 8篇 |
世界政治 | 16篇 |
外交国际关系 | 23篇 |
法律 | 512篇 |
中国共产党 | 17篇 |
中国政治 | 34篇 |
政治理论 | 72篇 |
综合类 | 446篇 |
出版年
2023年 | 3篇 |
2022年 | 22篇 |
2021年 | 24篇 |
2020年 | 38篇 |
2019年 | 14篇 |
2018年 | 43篇 |
2017年 | 18篇 |
2016年 | 16篇 |
2015年 | 14篇 |
2014年 | 69篇 |
2013年 | 88篇 |
2012年 | 65篇 |
2011年 | 94篇 |
2010年 | 90篇 |
2009年 | 105篇 |
2008年 | 68篇 |
2007年 | 77篇 |
2006年 | 61篇 |
2005年 | 60篇 |
2004年 | 46篇 |
2003年 | 42篇 |
2002年 | 38篇 |
2001年 | 21篇 |
2000年 | 15篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1996年 | 1篇 |
1993年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
排序方式: 共有1141条查询结果,搜索用时 15 毫秒
171.
172.
传统手工技艺是非物质文化遗产的重要组成部分。随着全球经济的发展,产业化、国际化进程给传统手工技艺带来了前所未有的冲击,因此,如何保护我国传统手工技艺已刻不容缓。本文从界定传统手工技艺的范畴入手,重点分析了当前我国传统手工技艺的发展现状,并在此基础上提出了适用商业秘密保护传统手工技艺的措施,特别是针对我国传统手工技艺适用商业秘密保护存在的困境,提出了解决对策。 相似文献
173.
空白刑法规范的特性及其解释 总被引:2,自引:0,他引:2
空白罪状由于概括性的委任立法使得规范弹性具有难以避免性和合理性,法律概念的相对性更为明显,部门法规范的易变性也使得其容易出现偏离立法规范目标的情况,对其必须进行刑法的独立规范判断,区分事实问题和法律问题。提倡双向对应的规范解释路径,能够有效地实现概括的类型化转向具体的定型化,获得规范与事实的一致。由于罪刑法定在技术上并无制约作用,因此规范解释空白罪状时,重要的是合理运用解释方法,以得出妥善结论,注重目的解释和体系解释可以有效地实现刑法的规范保护任务。 相似文献
174.
赵娟 《山东行政学院学报》2010,(4):85-87
实践中绝大多数的继承纠纷源于继承人对遗产的争夺,但是放弃继承在实践中亦不鲜见,是继承法律制度研究的一项重要内容。我国关于继承权放弃的立法较为抽象和原则,实务中缺乏可操作性,有必要对继承权放弃的相关理论与实务问题进行阐述和探讨。 相似文献
175.
作为舶来事物,"后悔权"一经浮出水面,即遭受或赞或弹的命运。其中的质疑不无道理,但又有失偏颇。据此,厘清"后悔权"之真正意旨,区别相关权利,奠定对其讨论的正确基础实为必须且为必要。此外,"后悔权"作为一个货真价实的"国际惯例",无理由将之拒之门外,但为避免"水土不服"的尴尬,其设立必须兼顾本土实际,即:一切从实际出发,设立中国特色的"后悔权"制度——"有限后悔权"制度。 相似文献
176.
林晓光 《江南社会学院学报》2010,(2):48-51
冷战结束以来,日本政府在加紧走向"政治强国"、"军事强国"的同时,也在加紧走向"情报强国"。设立"国家安全会议",强化国家安全战略的决策机制;整顿战后建立的情报体制,加强情报的搜集和分析能力;加紧建立太空情报体系,编织严密的卫星侦察网络;拓展对外情报合作,建立国际性情报网络。日本正从上述多个方面不断加强情报搜集的组织、体制和情报搜集功能的建设。 相似文献
177.
From ‘Doctor Knows Best’ to Dignity: Placing Adults Who Lack Capacity at the Centre of Decisions About Their Medical Treatment
下载免费PDF全文
![点击此处可从《The Modern law review》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Emily Jackson 《The Modern law review》2018,81(2):247-281
In 1989, the House of Lords first derived a ‘best interests’ test for the medical treatment of adults who lack capacity from the doctrine of necessity and, now codified, the test continues to apply today. The Mental Capacity Act 2005 sets out a non‐exhaustive checklist of relevant considerations, but it gives no particular priority to the patient's wishes. There is also no formal expectation that the patient will participate directly in any court proceedings in which her best interests are to be determined. This article will consider the advantages and disadvantages of providing additional guidance to decision‐makers in order to help them navigate both taking seriously the wishes of people who lack capacity and, at the same time, not abandoning patients who need help and support. More specifically, this article advocates formalising current best practice in the Court of Protection through the introduction of a series of rebuttable presumptions, or starting points. 相似文献
178.
Václav Janeček 《Computer Law & Security Report》2018,34(5):1039-1052
This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, this article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates. 相似文献
179.
Miranda Mourby Elaine Mackey Mark Elliot Heather Gowans Susan E. Wallace Jessica Bell Hannah Smith Stergios Aidinlis Jane Kaye 《Computer Law & Security Report》2018,34(2):222-233
There has naturally been a good deal of discussion of the forthcoming General Data Protection Regulation. One issue of interest to all data controllers, and of particular concern for researchers, is whether the GDPR expands the scope of personal data through the introduction of the term ‘pseudonymisation’ in Article 4(5). If all data which have been ‘pseudonymised’ in the conventional sense of the word (e.g. key-coded) are to be treated as personal data, this would have serious implications for research. Administrative data research, which is carried out on data routinely collected and held by public authorities, would be particularly affected as the sharing of de-identified data could constitute the unconsented disclosure of identifiable information.Instead, however, we argue that the definition of pseudonymisation in Article 4(5) GDPR will not expand the category of personal data, and that there is no intention that it should do so. The definition of pseudonymisation under the GDPR is not intended to determine whether data are personal data; indeed it is clear that all data falling within this definition are personal data. Rather, it is Recital 26 and its requirement of a ‘means reasonably likely to be used’ which remains the relevant test as to whether data are personal. This leaves open the possibility that data which have been ‘pseudonymised’ in the conventional sense of key-coding can still be rendered anonymous. There may also be circumstances in which data which have undergone pseudonymisation within one organisation could be anonymous for a third party. We explain how, with reference to the data environment factors as set out in the UK Anonymisation Network's Anonymisation Decision-Making Framework. 相似文献
180.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(1):178-185
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献