首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   439篇
  免费   12篇
各国政治   4篇
世界政治   8篇
外交国际关系   8篇
法律   240篇
中国共产党   6篇
中国政治   19篇
政治理论   13篇
综合类   153篇
  2022年   14篇
  2021年   10篇
  2020年   23篇
  2019年   5篇
  2018年   17篇
  2017年   5篇
  2016年   7篇
  2015年   7篇
  2014年   30篇
  2013年   34篇
  2012年   33篇
  2011年   30篇
  2010年   31篇
  2009年   36篇
  2008年   31篇
  2007年   36篇
  2006年   28篇
  2005年   16篇
  2004年   12篇
  2003年   20篇
  2002年   10篇
  2001年   10篇
  2000年   6篇
排序方式: 共有451条查询结果,搜索用时 31 毫秒
71.
This article discusses some important aspects of thetreatment of minorities in the Republic of Slovakia.It discusses the 1992 Constitution and subsequentdevelopments such as the State language law 1995, therestriction of political rights of Hungarians,educational policies, the setback of EU entry talks,the September 1998 general elections, the Dzurindagovernment's ``De-Meciarization', the 1999 MinorityLanguage Law, and recent electoral legislation. Thespecial condition of the Romany is considered. Theeffectiveness of international mechanisms for theprotection of minority rights (the Organisation forSecurity and Cooperation in Europe, the InternationalCovenant for Civil and Political Rights, the EuropeanConvention of Human Rights, the Framework Conventionfor the Protection of National Minorities) isassessed, as is the involvement of the EU. Finally,the role of the judiciary is reflected upon.  相似文献   
72.
董涛 《学理论》2010,(3):193-194
非物质文化遗产是国家珍贵的宝藏,而随着现代文明的日新月异,承载民族记忆的非物质遗产正渐渐走向消亡,对非物质文化遗产的保护已然迫在眉睫。本文在总结高校图书馆在非物质文化保护中的经验基础上,从图书馆提高服务质量和承担文化重任的角度出发,为高校图书馆在非物质文化遗产保护方面提出了些许建议。  相似文献   
73.
论卧底警察的保护与规制   总被引:1,自引:0,他引:1  
随着有组织犯罪的日益猖獗,公安机关运用卧底警察进行侦查破案的策略日益受到人们的关注。然而由于我国相较于其他世界发达国家在这方面的立法及制度建设还存在极大的滞后性,因此,理论界学者有必要对卧底警察这一被广泛运用的现象给以正确评价、规制和保护,以满足当今刑事侦查工作的切实需要。  相似文献   
74.
李龙  闫宾 《河北法学》2005,23(7):88-93
在历史中揭示,程序法和实体法共同脱胎于诉讼法,此时的诉讼法是诉未分解时的诉讼法,而现今之诉讼法虽名为诉讼法,实则程序法而已;对民事诉讼中的几组概念的混用进行澄清;实体法和程序法的合理关系是自足与互助的,并质疑时下流行的“层次论”观点。  相似文献   
75.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
76.
The present paper1 aims both at introducing the legal aspects of the protection of minors in cyberspace and analysing and criticizing certain main features embedded in this legal approach of young people protection. After a short introduction underlining the concept of child’s rights and the reason why this right has been particularly proclaimed in the context of the cyberspace, the first section describes the new technological features of the ICT environment and linked to this evolution the increasing risks the minors are confronted with. A typology of cyber abuses is proposed on the basis of these considerations. A list of EU or Council of Europe texts directly or indirectly related to the minors’ protection into the cyberspace is provided. The second section intends to analyse certain characteristics of the legal approach as regards the ways by which that protection is conceived and effectively ensured. Different principles and methods might be considered as keywords summarizing the legal approach and to a certain extent, fixing a partition of responsibilities taking fully into account the diversity of actors might be deduced from the different regulatory documents.The third section comes back to the different complementary means by which the Law is envisaging the minors’ protection. The obligation to create awareness about the potential risks minors might incur definitively is the first one. The omnipresent reference in all the legal texts to the role of self-regulatory interventions constitutes another pillar of the protection envisaged by the Law. After having described the multiple instruments developed in the context of this self-regulation (labels, codes of conduct, hotlines, ODR…) or even co-regulation, the paper examines the conditions set by the European legislators as regards these instruments. Technology might be considered as a fourth method for protecting children. Our concern will be to see how the Law is addressing new requirements as regards the technological solutions and their implementation. The present debates about the liability of the actors involved in applications or services targeted or not vis-à-vis the minors like SNS or VSP operators are evoked. As a final point the question of the increasing competences of LEA and the reinforcement of the criminal provisions in order to fight cyber abuses against minors will be debated. In conclusion, we will address final recommendations about the way by which it would be possible to reconcile effective minors’ protection and liberties into the cyberspace.  相似文献   
77.
王若源 《政法论丛》2011,(1):103-110
外交保护的实施过程可以区分为国内决策阶段和利用国际法向侵害本国人权利的相对国采取措施的阶段。因此,在国内决策阶段中有一种不可忽视的实践,那就是认为从国内法角度来看国家负有以一切可能方式保护本国公民的义务。但是,实际上外交是国家行为,它代表国民的整体利益。因而在具体个案中可能需要从大局出发采取和缓的方式对权益受侵害的国民进行保护或放弃保护。但,必须建立有效的机制以沟通被害者和实行外交保护的公权力机构。在对公共利益和私人利益进行取舍时,可能需要考虑相应的补偿问题。以此为出发点,对将以外交保护方式保护国民作为国家宪法义务的国家实践进行研究。  相似文献   
78.
The article considers the subject of clickstream data from aEuropean/US perspective, taking into account the Data ProtectionFramework (Data Protection Directive 95/46/EC; Directive onPrivacy and Electronic Communications 2002/58/EC) and the USlegal framework and in particular, the Wiretap Act U.S.C. 2701(2004) and related statutes. It examines the extent to whichclickstream data is considered "personal data" within the DataProtection Directive and the implications to consumers and businesses.  相似文献   
79.
当代侵权法比较研究   总被引:4,自引:0,他引:4  
侵权法在两大法系中所采路径截然不同、风格各异,这一特点与具体规则模式和一般原则模式之间的现代法律理论的区别是相伴而生的。比较侵权法的焦点主要不是实体问题,而是侵权法的基本结构和模式问题。在侵权法的诸多具体制度上,两大法系远比普遍认为的那样更为相近,二者之间并没有不可逾越的障碍和差别。  相似文献   
80.
黄括 《行政与法》2010,(4):62-65
传统手工技艺是非物质文化遗产的重要组成部分。随着全球经济的发展,产业化、国际化进程给传统手工技艺带来了前所未有的冲击,因此,如何保护我国传统手工技艺已刻不容缓。本文从界定传统手工技艺的范畴入手,重点分析了当前我国传统手工技艺的发展现状,并在此基础上提出了适用商业秘密保护传统手工技艺的措施,特别是针对我国传统手工技艺适用商业秘密保护存在的困境,提出了解决对策。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号