首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   469篇
  免费   52篇
各国政治   11篇
工人农民   28篇
世界政治   8篇
外交国际关系   31篇
法律   229篇
中国共产党   16篇
中国政治   55篇
政治理论   41篇
综合类   102篇
  2024年   2篇
  2023年   17篇
  2022年   34篇
  2021年   19篇
  2020年   23篇
  2019年   21篇
  2018年   24篇
  2017年   19篇
  2016年   17篇
  2015年   17篇
  2014年   23篇
  2013年   48篇
  2012年   23篇
  2011年   24篇
  2010年   29篇
  2009年   20篇
  2008年   19篇
  2007年   29篇
  2006年   24篇
  2005年   21篇
  2004年   19篇
  2003年   13篇
  2002年   21篇
  2001年   8篇
  2000年   4篇
  1998年   1篇
  1991年   1篇
  1990年   1篇
排序方式: 共有521条查询结果,搜索用时 15 毫秒
61.
ABSTRACT

Since the end of the East–West divide in the 1990s, the world has slowly lost its US-based unipolarity to globalisation, and a shift towards East Asia. This phenomenon has given more space to middle powers and furthered the embeddedness of the political, economic, and cultural spheres into the dynamics of social structures. It is highly visible when observed from the digital communication standpoint, which has become pervasive. In this context, the study of international power has moved towards the concept of soft power, which remains a fuzzy concept concerning ‘who’ and ‘what’. We define power as a continuum, in which various types of public and private actors carry out different types of coercive to cooptive actions in various but embedded spheres. We propose an empirically tractable conceptual framework that we use as a tool to analyse soft power within a hard-to-soft power spectrum, in which the articulation, dynamics and incremental nature of soft power become observable. We illustrate our point with the case study of South Korean power in Indonesia in the twenty-first century and draw conceptual as well as practical conclusions.  相似文献   
62.
ABSTRACT

From a cursory look at the terms of service of the main social networking websites, it is immediately possible to detect that Facebook’s show a peculiar configuration. Although they represent a mere contract between private parties, these terms adopt the traditional jargon of constitutional texts and articulate their contents in terms of rights, principles and duties. This curious pairing between norms regulating social media and the constitutional sphere is also apparent in a series of non-binding documents that are unequivocally named ‘bill of rights’ and seek to articulate a set of principles to protect social media users. This paper examines whether the emergence of a constitutional tone in this limited number of texts could be related to the effective, or aspirational, constitutional function that these documents exercise. The identification of a series of significant shortcomings will lead to exclude that social media’s terms of service and bills of rights of social media users currently play a constitutionalising role. Nevertheless, the possibility to theoretically justify the use of these documents as mechanisms of constitutionalisation in the social media environment will be adduced as an evidence of the potential constitutional aspirations of these texts.  相似文献   
63.
以信息技术为核心的数字社会迅速发展,促进多元主体信息交流和资讯共享,给个人信息保护带来挑战。作为数字社会公民身份的基本表征,个人信息权既是数字公民实现全面自由发展的先决条件,也是防范和控制数字权力异化的重要工具。实现数字社会个人信息权保护的价值追求,国家立法机关应秉持作为宪法价值核心的人格尊严进行立法,明晰个人信息权的规范内涵与保护机制;行政机关应遵循权力法定原则,严格基于法律保留、公共利益和比例原则处理和使用个人信息,并建立专门的个人信息权保护的监管机构;司法机关应通过法律适用和司法解释对被侵犯的个人信息权提供及时司法救济,填补法律漏洞,实现数字社会个人信息权保护的制度正义目标。  相似文献   
64.
Digital video is used in criminal trials as evidence with legal responsibility because video content vividly depicts events occurring at a crime scene. However, using sophisticated video editing software, assailants can easily manipulate visible clues for their own benefit. Therefore, the integrity of digital video files acquired or submitted as evidence must be ensured. Forensic analysis of digital video is key to ensuring the integrity of links with individual cameras. In this study, we analyzed whether it is possible to ensure the integrity of MTS video files. Herein, we propose a method to verify the integrity of MTS files encoded by advanced video coding high definition (AVCHD), which is frequently used for video recording. To verify MTS file integrity, we propose five features. Codec information, picture timing, and camera manufacture/model are modified AVI and MP4-like format video verification features. Group of pictures and Universally Unique Identifier patterns were specifically developed for MTS streams. We analyzed the features of 44 standard files recorded using all recording options of seven cameras. We checked whether integrity can be validated on unmanipulated videos recorded in various environments. In addition, we considered whether manipulated MTS files edited in video editing software could be validated. Experimental results show that all unmanipulated and manipulated MTS files with known recording devices were discriminated only when all five features were checked. These results show that the proposed method verifies the integrity of MTS files, strengthening the validity of MTS file-based evidence in trials.  相似文献   
65.
Recently, digital forensics has become increasingly important as it is used by investigation agencies, corporate, and private sector. To supplement the limitations of evidence capacity and be recognized in court, it is essential to establish an environment that ensures the integrity of the entire process ranging from collecting and analyzing to submitting digital evidence to court. In this study, common elements were extracted by comparing and analyzing ISO/IEC 17025, 27001 standards and Interpol and Council of Europe (CoE) guidelines to derive the necessary components for building a digital forensic laboratory. Subsequently, based on 21 digital forensic experts in the field, Delphi survey and verifications were conducted in three rounds. As a result, 40 components from seven areas were derived. The research results are based on the establishment, operation, management, and authentication of a digital forensics laboratory suitable for the domestic environment, with added credibility through collection of the opinions of 21 experts in the field of digital forensics in Korea. This study can be referred to in establishing digital forensic laboratories in national, public, and private digital forensic organizations as well as for employing as competency measurement criteria in courts to evaluate the reliability of the analysis results.  相似文献   
66.
How do market actors in the contemporary economy make decisions when they are uncertain of the value of what is being traded? To answer this question, this paper analyses the changing temporal and spatial orientation of economic valuations in increasingly digitalized economies, in which markets can no longer be understood as locally bound and closed sites of valuation and exchange. Drawing on ethnographic material from the fishing industry, the paper shows how digital tracking technologies link and synchronize auction markets with real-time information on fishing activities. Hence, ‘scopic media’ such as chart plotters and computer screens are not only deployed by skippers to monitor one another, but are also used as valuation devices that recontextualize local knowledge for the purpose of coping with economic uncertainty. As a consequence of this panoptic valuation regime, fishermen control their virtual identities by disciplining harvesting practices according to their buyers’ expectations.  相似文献   
67.
“互联网+”时代的来临对社会的各个方面都产生了巨大影响,对图书馆的发展也带来了影响与挑战。“互联网+”时代的图书馆将如何发展,如何合理规划建设图书馆的各类资源,怎样用“互联网+”思维发展图书馆,已成为“互联网+”时代亟待研究的热题。  相似文献   
68.
69.
静电吸附方法提取穿袜粉尘足迹时,由于受到袜子对粉尘的缓冲和静电场强度影响而出现形态变异问题,造成特征不符的假象而干扰正确的检验结果,提请在足迹检验操作时引起注意.  相似文献   
70.
公安文献信息数字资源主要来自公安机关、院校、协会等建立的特色数据库;建设特色数据库应全面掌握公安业务信息,深入了解公安学科专业设置状况,在与其它公安院校合作的基础上,建立起具有鲜明学科、专业特色的数据库体系,以便更好地为用户提供高质量的专业化服务。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号