首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   369篇
  免费   49篇
各国政治   5篇
工人农民   20篇
世界政治   7篇
外交国际关系   32篇
法律   134篇
中国共产党   3篇
中国政治   74篇
政治理论   27篇
综合类   116篇
  2023年   15篇
  2022年   22篇
  2021年   16篇
  2020年   32篇
  2019年   20篇
  2018年   19篇
  2017年   9篇
  2016年   11篇
  2015年   12篇
  2014年   21篇
  2013年   32篇
  2012年   15篇
  2011年   23篇
  2010年   24篇
  2009年   32篇
  2008年   18篇
  2007年   34篇
  2006年   19篇
  2005年   6篇
  2004年   9篇
  2003年   9篇
  2002年   11篇
  2001年   5篇
  2000年   3篇
  1999年   1篇
排序方式: 共有418条查询结果,搜索用时 15 毫秒
71.
Abstract

The study investigated the relationship between interrogative suggestibility and relevant cognitive factors as proposed by Gudjonsson and Clark (1986). The subjects were fifty-eight adolescent young offenders resident in a national children's centre with secure facilities. All were administered the Gudjonsson Suggestibility Scale and the Wechsler Intelligence Scale for Children. Interrogative suggestibility correlated negatively with intelligence and recall memory. Limited evidence of range effects was found for the relationship between intelligence and suggestibility, but not for the relationship between recall memory and suggestibility.  相似文献   
72.
现在我国的区域警务合作机制不论是在实施的效率、增加合作机会和层次以及警务资源的共享等方面还存在着很多的问题,这就要求我们要从建立新型的合作模式、更新现有的合作手段、转变原有的合作观念等方面努力完善我国的区域警务合作机制,只有这样才能进一步提高我国区域警务合作的工作效率、放大其实际效果,从而实现区域警务合作有效促进系统内部交流合作,控制社会面的目标。  相似文献   
73.
This research is geared toward theory building by alleviating some of the lacunae in three areas of study. First, it redefines what terrorism is by refocusing the definition away from politics and the mens rea of terror to its criminal actus reus. In this endeavor, it proposes a unifying definition that is viable for global assessment and under standing, while being conducive to international military and law enforcement cooperation. The definition is proposed to accommodate the international laws of reciprocity, community, and political framework, without compromising terrorism's criminal liabilities. Second, it defines what a religious terrorist is by using a convergence of psychometric measures from 356 suicide-bombers, taped self-immolations of 15 terrorists and 918 zealots, and triangulated anthologies. Among the outcomes of this mixed-method design is an empowering 32-trait profile of a religious terrorist that is ethno-religious specific and user friendly. Third, it introduces the concept of International Islamization Terrorism (IIT) and calls on future research to assess the propensity of IIT to global calamity, and the viability of a universal religious terrorist profile.  相似文献   
74.
Privacy by Design is now enjoying widespread acceptance. The EU has recently expressly included it as one of the key principles in the revised data protection legal framework. But how does Privacy by design and data anonymisation work in practise? In this article the authors address this question from a practical point of view by analysing a case study on EU Financial Intelligence Units (“FIUs”) using the Ma3tch technology as additional feature to the existing exchange of information via FIU.NET decentralised computer network. They present, analyse, and evaluate Ma3tch technology from the perspective of personal data protection. The authors conclude that Ma3tch technology can be seen as a valuable example of Privacy by Design. It achieves data anonymisation and enhances data minimisation and data security, which are the fundamental elements of Privacy by Design. Therefore, it may not only improve the exchange of information among FIUs and allow for the data processing to be in line with applicable data protection requirements, but it may also substantially contribute to the protection of privacy of related data subjects. At the same time, the case study clearly shows that Privacy by Design needs to be supported and complemented by appropriate organisational and technical procedures to assure that the technology solutions devised to protect privacy would in fact do so.  相似文献   
75.
In the age of artificial intelligence (AI), robots have profoundly impacted our life and work, and have challenged our civil legal system. In the course of AI development, robots need to be designed to protect our personal privacy, data privacy, intellectual property rights, and tort liability identification and determination. In addition, China needs an updated Civil Code in line with the growth of AI. All measures should aim to address AI challenges and also to provide the needed institutional space for the development of AI and other emerging technologies.  相似文献   
76.
近年来人工智能迅速发展,但其对就业不仅会产生创造效应,也会产生破坏效应。研究利用 2008—2016 年中国省级面板数据,探索在智能物质资本投入影响下不同地区和不同技能水平劳动力的需求变化, 分析人工智能通过创造效应和破坏效应对我国劳动力就业的影响和作用方向。研究发现:人工智能对不同技能 水平劳动力的就业影响方向不同,存在“两极化”趋势;产业结构升级将在一定程度上进一步加剧人工智能对 就业“两极化”发展的影响;人工智能对不同地区的不同技能水平的劳动力有差异性影响。研究建议,应进一 步加强教育培训,优化产业结构,完善社会福利,以应对人工智能的破坏效应,促进劳动力市场的稳定。  相似文献   
77.
Abstract: There remains significant uncertainty in illicit marijuana cultivation. We analyzed the δ13C and δ15N of 508 domestic samples from known U.S.A. counties, 31 seized from a single location, 5 samples grown in Mexico and Colombia, and 10 northwest border seizures. For a subset, inflorescences and leaves were analyzed separately. These data revealed a strong correspondence, with inflorescences having slightly higher δ13C and δ15N values than leaves. A framework for interpreting these results is introduced and evaluated. Samples identified as outdoor‐grown by δ13C were generally recorded as such by the Drug Enforcement Administration (DEA). DEA‐classified indoor‐grown samples had the most negative δ13C values, consistent with indoor cultivation, although many were also in the outdoor‐grown domain. δ15N indicated a wide range of fertilizers across the dataset. Samples seized at the single location suggested multiple sources. Northwest border δ13C values suggested indoor growth, whereas for the Mexican and Colombian samples they indicated outdoor growth.  相似文献   
78.
The author starts by questioning the main privacy challenges raised by our present and future information society viewed as a “global village”. Apart from a comparison with the traditional village of our parents, he identifies the two complementary and not dissociable facets of our privacy: the right to seclusion and the right to participate fully in our society. According to the first German Constitutional Court recognizing the right to informational self-determination as a new constitutional right, he underlines the need to analyse the data protection as a tool for ensuring both the citizens' dignity and our democracy.  相似文献   
79.
网络恐怖活动具有成本低廉、破坏广泛、技术性高、隐蔽性强等特点。美国在反网络恐怖活动的情报工作中采取了完善情报立法、构建网络式结构反恐情报体系、大力开展网络侦查等一系列情报对策.构建了强大的国家安全屏障。在我国,防范和打击网络恐怖活动一方面要树立信息时代的新威胁观与安全观.另一方面则可借鉴美国反网络恐怖活动情报工作的经验。  相似文献   
80.
智能一般是指个体运用知识、经验获取信息、认识客观事物、合理思维和有效地处理周围环境事宜的主观能力。侦查智能是侦查个体运用知识、经验,获取、利用犯罪关联信息,通过思维等智力因素的参与,认知事物、解决问题的主观能力。侦查智能的本质特征是对涉及案件有关知识的创新运用,基本内容是发现、处理犯罪关联信息;其表征是对犯罪关联信息的注意力、观察力、记忆力和思维能力,其中思维能力是侦查智能的核心表征与实质;其衡量标准是认知、解决犯罪事件的速度、准确性和恰当性;其发展及制约因素是社会环境,个体的学习、实践以及“非智力因素”。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号