首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2721篇
  免费   79篇
各国政治   31篇
工人农民   108篇
世界政治   27篇
外交国际关系   48篇
法律   1145篇
中国共产党   54篇
中国政治   379篇
政治理论   106篇
综合类   902篇
  2023年   8篇
  2022年   30篇
  2021年   34篇
  2020年   60篇
  2019年   34篇
  2018年   63篇
  2017年   32篇
  2016年   34篇
  2015年   29篇
  2014年   163篇
  2013年   183篇
  2012年   200篇
  2011年   196篇
  2010年   182篇
  2009年   217篇
  2008年   217篇
  2007年   234篇
  2006年   200篇
  2005年   191篇
  2004年   190篇
  2003年   108篇
  2002年   83篇
  2001年   60篇
  2000年   38篇
  1999年   11篇
  1998年   2篇
  1989年   1篇
排序方式: 共有2800条查询结果,搜索用时 15 毫秒
971.
Recent coverage in the press regarding large-scale passive pervasive network monitoring by various state and government agencies has increased interest in both the legal and technical issues surrounding such operations. The monitoring may take the form of which systems (and thus potentially which people) are communicating with which other systems, commonly referred to as the metadata for a communication, or it may go further and look into the content of the traffic being exchanged over the network. In particular the monitoring may rely upon the implementation of Deep Packet Inspection (DPI) technologies. These technologies are able to make anything that happens on a network visible and recordable. While in practice the sheer volume of traffic passing through a DPI system may make it impractical to record all network data, if the system systematically records certain types of traffic, or looks for specific patterns in all traffic, the privacy concerns are highly significant. The aim of this paper is twofold: first, to show that despite the increasing public awareness in relation to the capabilities of Internet service providers (ISPs), a cross-field and comparative examination shows that DPI technologies are in fact progressively gaining legal legitimacy; second to stress the need to rethink the relationship between data protection law and the right to private life, as enshrined in Article 8 of the European Convention on human rights and Article 7 of the European Charter of fundamental rights, in order to adequately confine DPI practices. As a result, it will also appear that the principle of technical neutrality underlying ISP's liability exemptions is misleading.  相似文献   
972.
信息资源共享与版权保护的法律思考   总被引:1,自引:0,他引:1  
本文基于近年来与图书馆有关的版权纠纷案件和相关的法律规定,分析了目前图书馆服务隐含的风险和存在的问题,并对此从法律的角度进行了思考,指出在信息资源共享与版权保护之间的表面冲突现象之下,应注意两者终极目标的一致,寻求合适的平衡点,努力做到合理使用。  相似文献   
973.
我国现在已经建立了以宪法、劳动法和妇女权益保障法为核心的比较完整的对妇女劳动权进行保护法律法规体系,但对高校女教师这一社会群体来说,还是存在着女教师与男教师不同龄退休、职业性别隔离、男女劳动待遇不平等等侵害劳动权的行为。产生这些问题,既有意识上的原因,也有立法不完善、执法不力等原因。可以从加大男女劳动权利平等内容和意识的宣传和教育、完善相关的立法,以及加强执法等方面来保障高校女教师的劳动权。  相似文献   
974.
朱国良 《青年论坛》2014,(6):108-112
用法律手段保护民间文学艺术是知识产权保护“国际化”进程的需要,也是保护传统文化、增强文化自信、提升我国文化软实力的迫切要求.民间文学艺术的法律保护问题首先是由发展中国家提出来的,发达国家中对民间文学艺术保护相对较弱.比较法视阈下,民间文学艺术的知识产权保护尽可能既要与现行国内国际立法实现有效对接,又要坚持立法重构,以有效保护民间文学艺术传承、记录、整理和汇编者的合法权益.  相似文献   
975.
James Margach famously argued that Prime Ministers from Lloyd George to Callaghan had been intent on exploiting the media in their determination to centralise power. From Margaret Thatcher onwards, however, there is a strong argument that the power relationship has been reversed, and that the Leveson Inquiry—set up in the wake of the phone hacking scandal—exposed a political class which had become deeply fearful of the power and influence of the national press. Citing evidence to Leveson and subsequent recommendations by the inquiry, this article presents two case studies—on data protection and on media ownership—where the public interest clearly demanded political intervention, which would be inconvenient for the major publishers. And yet, despite recommendations by Lord Justice Leveson and despite clear support from leading politicians of all parties, there has been virtually no policy progress in either case. While the Leveson Inquiry was billed as a watershed in press–politician relations and an opportunity to counteract decades of unhealthy press power, political inertia in these two areas suggests that very little has changed.  相似文献   
976.
对有前科者就业的限制是指对其就业范围的限制,包括实体规定和实现限制的程序规定。实体规定应以工作的性质与有前科者被执行刑罚的性质为标准。程序规定则以颁发行为证明书或犯罪记录证明书的做法较为可取。我国刑法规定的前科报告制度难以体现程序的外在价值和内在价值,并不能实现对有前科者就业的有效限制。对有前科者就业的保护需以前科消灭制度的建立为前提,并辅之以具体的规定与政策。  相似文献   
977.
The creation and diffusion of Independent 1 1Three different meanings of the regulatory state have been identified by Jordana and Levi-Faur (2004): the minimal, the prudent, and the overambitious meaning. The minimal meaning refers to the regulatory state as a field of study grouping scholars from different disciplines. The prudent meaning emphasises the tendency of modern states to use power and authority. An overambitious notion, the regulatory state developed to replace other state forms such as the welfare, developmental, and stabilisation state. Regulatory Agencies (IRAs) was greatly investigated in the context of the developed countries, particularly in Europe. Many scholars have provided different theories to explain the logic behind the formation and the spread of such agencies. These theories are important but not sufficient to explain the same phenomenon in the context of the developing countries wherein socio-economic and political environments are different. Adopting an institutional framework of analysis, and based on an in-depth qualitative documentary analysis and interviews with different stakeholders, this article investigates the creation and diffusion of the IRAs in Egypt particularly in the telecommunication sector. The findings show that the creation of the IRAs in the Egyptian telecommunications sector represents a rational response to the external isomorphic pressures exerted by international agency and can be explained on functional and practical grounds rather than any other factors of democratic governance or political uncertainties.  相似文献   
978.
There is a profound disconnect between the practice and scholarly study of security in Europe. The 2010 Internal Security Strategy added disasters such as forest fires, earthquakes, and floods to the list of European Union (EU) internal security concerns, expanding on the more traditional anxieties over militaries, border protection, and the effects of poverty. This article explores how evolving practices of disaster response, a policy area once separate from EU security discourse, have become part of the EU's wider security provision and with what implications. Based on interviews conducted at the Directorate-General (DG) for Humanitarian Aid and Civil Protection (ECHO), it provides a detailed study of three EU disaster response practices – monitoring, training, and information co-ordinating – and their circulation to the wider field of EU internal security provision. It uses this case to outline that new understandings of what it means to “voluntarily co-operate” in European security projects have been radically under-theorized.  相似文献   
979.
目前,我国很多地方性法规、地方政府规章等都确立了对著名商标的认定和保护。探讨著名商标的认定和保护的合理性,对于规范商标管理,形成统一的、公平竞争的市场秩序具有现实意义。但本文认为,政府认定著名商标不如让市场认定;就商标专用权保护而言,认定著名商标没有必要;著名商标制度容易助长地方保护主义;著名商标并不是认定驰名商标的必要条件;依靠认定和保护著名商标推动地方经济发展,是一种舍本逐末的做法。建议加大对商标侵权的处罚力度,加强对商标专用权的保护,并取消对著名商标的认定。  相似文献   
980.
在当代公共行政发展的趋势下,我国金融消费者权益行政法保护主体分为监管部门和社会组织两类。在对金融消费者权益提供保护的实践中存在监管部门之间协同合作机制缺失、行业协会等社会组织权威性缺失问题,建议通过完善联席会议制度加强监管部门的协同合作,通过立法赋予行业协会等市场组织更大的独立性与权威性,从而构建多元化的金融消费者权益行政法保护主体。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号