首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1208篇
  免费   47篇
各国政治   21篇
工人农民   33篇
世界政治   24篇
外交国际关系   67篇
法律   347篇
中国共产党   48篇
中国政治   207篇
政治理论   142篇
综合类   366篇
  2024年   2篇
  2023年   16篇
  2022年   9篇
  2021年   26篇
  2020年   31篇
  2019年   12篇
  2018年   28篇
  2017年   32篇
  2016年   30篇
  2015年   20篇
  2014年   71篇
  2013年   102篇
  2012年   79篇
  2011年   89篇
  2010年   58篇
  2009年   79篇
  2008年   68篇
  2007年   80篇
  2006年   101篇
  2005年   71篇
  2004年   54篇
  2003年   61篇
  2002年   59篇
  2001年   44篇
  2000年   21篇
  1999年   9篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
排序方式: 共有1255条查询结果,搜索用时 31 毫秒
201.
202.
203.
EU update     
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
204.
We employ a rational choice framework to understand the conditions under which sex traffickers allow their victims access to telecommunications devices while under their control. We posit that sex traffickers are rational actors who make calculated decisions regarding whether to allow their victims access to the Internet and cell phones. We hypothesize that sex traffickers allow younger victims and those they did not defraud in the recruitment process greater access to telecommunications devices because these decisions maximize their payoffs with minimal risk. However, we hypothesize that younger victims’ access to telecommunications devices is conditional on whether they have been defrauded in recruitment. In order to test these hypotheses, we deployed a survey to 115 victims of sex trafficking in the United States to learn about how they were recruited by their sex trafficker and the level of access they had to technology while under their sex trafficker's control. We find support for all of our hypotheses. The results have serious implications for criminal justice policy and practice.  相似文献   
205.
The article reviews the evolution and key dimensions of the jurisprudence around the world as it relates to the Internet regulation and governance. It argues that while the judicial sector played a fairly marginal role as far as on-line issues were concerned in the first two decades of the Internet development, judicial rulings have now emerged as one of the main forces shaping on-line freedom of expression and information and the Internet governance. The article reviews a number of decisions from Europe and Latin America to demonstrate that judicial ruling are challenging some of the Internet’s founding principles and values. They have become highly influential, not just as interpreters of the law (the tribunals’ traditional function) but as shapers or transformers of the Internet norms and values. This evolution has become particularly clear over the last three to five years, demonstrating the increasing confidence of judges and Tribunals in challenging engineers, users, corporations, or indeed governments and possibly establishing different norms as far as the cyberspace is concerned.  相似文献   
206.
ABSTRACT

Human resource is the key driving force of research and development of a nation. Japan and Korea are two examples of how appropriate strategies in developing human resources have been transferred into remarkable achievements in R&D. In recent years, Vietnam has observed significant shift in investment for R&D. Thus, the lessons of Japan and Korea could provide Vietnam with valuable strategies for further development in human resources in R&D, particularly in vision of R&D development, policy flexibility, increased investment on R&D development and human resources, key R&D organization formation and increased international cooperation in S&T.  相似文献   
207.
韩灵丽 《河北法学》2005,23(6):27-29
分析高新技术产业中的垄断双重性,探讨技术创新法律体系下的反垄断立法。  相似文献   
208.
司法会计技术作为查办经济犯罪案件的重要手段之一,越来越受到公安司法机关的重视.本文从我国司法会计技术的发展现状入手,分别对运用司法会计检查技术和鉴定技术的策略提出可操作性意见,以便更好地发挥司法会计技术在查办经济犯罪案件中的重要作用.  相似文献   
209.
如果能够在东北亚地区建立IT产业的共同体,将很有可能带动其他产业的联合,最终走向全面地联合,从而提升东北亚地区合作的层次。东北亚国家已经开始在IT领域进行了一定程度的合作,但是在东北亚地区建立IT共同体的道路不会是一帆风顺的,有许多因素会影响到东北亚IT共同体的最终形成。  相似文献   
210.
论测谎结论的证据价值   总被引:3,自引:0,他引:3  
测谎技术的产生时间并不长,但其在诉讼活动中的应用却日趋增多,对测谎结论的证据价值的争议也开始在法学界显现。在我国,应以与时俱进的态度看待测谎结论,在了解测谎技术科学性的基础上,将测谎结论设定为鉴定结论形式中的"有限采用"辅助证据,从而更好地为司法实践提供帮助。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号