全文获取类型
收费全文 | 526篇 |
免费 | 16篇 |
专业分类
各国政治 | 10篇 |
工人农民 | 14篇 |
世界政治 | 6篇 |
外交国际关系 | 13篇 |
法律 | 157篇 |
中国共产党 | 25篇 |
中国政治 | 86篇 |
政治理论 | 29篇 |
综合类 | 202篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 2篇 |
2021年 | 12篇 |
2020年 | 18篇 |
2019年 | 10篇 |
2018年 | 14篇 |
2017年 | 8篇 |
2016年 | 11篇 |
2015年 | 12篇 |
2014年 | 42篇 |
2013年 | 54篇 |
2012年 | 49篇 |
2011年 | 36篇 |
2010年 | 26篇 |
2009年 | 32篇 |
2008年 | 25篇 |
2007年 | 35篇 |
2006年 | 30篇 |
2005年 | 43篇 |
2004年 | 27篇 |
2003年 | 22篇 |
2002年 | 14篇 |
2001年 | 11篇 |
2000年 | 2篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有542条查询结果,搜索用时 15 毫秒
501.
互联网的出现和发展为党的思想建设提供了丰富的信息资源和广阔的传播空间。但它却消解了党对意识形态的控制,冲击了意识形态传播体制、手段,增加了党的思想政治工作的难度。因此,我们党要加强网络先进文化传播阵地的建设,创新网络传播体制和手段,强化网络舆论调控和网络思想政治工作方式,提高党运用网络进行思想建设的意识和能力。 相似文献
502.
网络监督正在成为推动一个国家政治、经济、社会、文化进步的不可忽视的力量,发挥着独特的作用和难以替代的功能,主要体现在以下几个方面:网络监督形成的舆论压力影响公共决策,促使公共政策反映和实现民意;网络监督打破了信息垄断,促使政党政府工作更加公开透明;网络监督的快速便捷,促使政府提升回应性;网络监督的全民参与性,有利于推动反腐倡廉建设;网络监督的社会调控功能,有利于政治稳定与社会和谐。 相似文献
503.
浅谈网络教育对传统教育的影响及其发展趋势 总被引:2,自引:0,他引:2
王冬 《中华女子学院山东分院学报》2001,(1):46-50
对网络教育的形式、特点和未来教育发展趋势进行了剖析,指出传统成人教育必须适应现代教育的形势,改变传统观念,迎接新的挑战. 相似文献
504.
吴茜 《北京人民警察学院学报》2008,(2):56-59
网上侦查是在信息时代的背景下侦查机关应对多元化刑事犯罪形势的必由之路.网上侦查的产生和发展有其原理依据:信息论原理、系统论原理和物质交换原理.以原理的方法论为指导,解决实际工作中存在的问题,才能实现理论与实践的对接. 相似文献
505.
对确认网络管辖权的探讨 总被引:2,自引:0,他引:2
网络的出现与发展向传统国际民事管辖权制度提出了新的课题:地域性连接因素无法成为涉网案件的管辖权基础,与网络有关的民事案件需要寻找新的管辖根据与适用原则。通过考察美欧等国家的立法实践,以及分析现有的种种学说,总结它们的利弊得失,可以发现在现有条件下,广泛、合法地适用协议管辖,辅之以最密切联系原则,并充分考虑技术可行性原则,是解决这一问题的最佳对策。 相似文献
506.
507.
近年来,越来越多的司法个案因为各种原因进入公众视野,受到舆情的广泛关注而演化为“公案”。分析这些“公案”,我们能够发现其共有的规律性特征:多为冤假错案、涉案被告人的身份呈现两极化、刑讯逼供问题广泛存在、网络成为主要媒介。“公案”的出现向涉检舆情应对工作提出了新的挑战,民意诉求、有罪推定、“命案必破”错误思想、公检法机关配合过度而制约不足等都是现阶段涉检舆情应对工作存在难题的深层次原因。本文通过分析“公案”及其成因,以期对建立有效的涉检舆情应对机制提供有益的思考。 相似文献
508.
Nick Pantlin 《Computer Law & Security Report》2019,35(1):112-116
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
509.
Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to be enforced from May 2018). We use the case study of the emergent smart energy supply chain to frame, scope out and consolidate the breadth of security concerns at play, and the regulatory responses. We argue the industrial IoT brings four security concerns to the fore, namely: appreciating the shift from offline to online infrastructure; managing temporal dimensions of security; addressing the implementation gap for best practice; and engaging with infrastructural complexity. Our goal is to surface risks and foster dialogue to avoid the emergence of an Internet of Insecure Industrial Things. 相似文献
510.
In this study we sought to identify which locations appear more, or less, attractive to a terrorist in planning an attack and to investigate what attributes of those locations influence preferences. A sample of undergraduate university students (N?=?147) were given the role of terrorists, and provided with five potential attack locations, including a pedestrian mall, a shopping center, a train station, a university and an airport. After using the Internet to learn about the target locations, participants placed the locations in rank-order from most to least preferred as targets and indicated why they had selected those targets. Results showed both a clear rank-order of target preferences: locations perceived as being more crowded were more preferred, while locations with a greater security presence were less preferred. Results also demonstrated a moderate positive correlation between the amount of online information viewed for a specific location and the preference for that location as a terrorist target, where participants who viewed more online content for a particular location were more likely to also prefer that location as a terrorist target. Findings from this study can potentially be used to reduce the likelihood of a terrorist attack occurring on specific locations, by altering the publicly available information on that location regarding the security and how crowded that location is. 相似文献