首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1141篇
  免费   12篇
各国政治   19篇
工人农民   15篇
世界政治   37篇
外交国际关系   71篇
法律   542篇
中国共产党   11篇
中国政治   120篇
政治理论   108篇
综合类   230篇
  2025年   5篇
  2024年   17篇
  2023年   26篇
  2022年   31篇
  2021年   47篇
  2020年   59篇
  2019年   41篇
  2018年   58篇
  2017年   36篇
  2016年   31篇
  2015年   36篇
  2014年   76篇
  2013年   99篇
  2012年   79篇
  2011年   51篇
  2010年   45篇
  2009年   49篇
  2008年   63篇
  2007年   59篇
  2006年   44篇
  2005年   44篇
  2004年   40篇
  2003年   30篇
  2002年   32篇
  2001年   25篇
  2000年   7篇
  1999年   6篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   3篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1983年   3篇
排序方式: 共有1153条查询结果,搜索用时 0 毫秒
191.
The success of electronic filing services largely depends on their continuance usage. This study examines the factors affecting the continuance usage intention of the online tax filing services in Mauritius. An integrated model comprising Trust Theory and Information System Success Model (ISSM) is applied to assess the continuance usage behaviour of e-filing systems. The model has been extended by adding two additional variables: Perceived Usefulness and Perceived Risk. The model was tested using a sample of 315 users of e-filing services in Mauritius. A structural equation modelling technique using partial least square structural equation modelling verified the hypotheses. The results reveal that the continuance usage intention of an electronic tax filing system is influenced by Perceived Usefulness, User Satisfaction, and Service Quality. However, Perceived Risk does not influence the continuance usage intention of e-filing systems since the importance of Perceived Risk diminishes as trust in the e-service provider increases. The theoretical and practical implications derived from the findings of this study are also discussed. This paper makes several contributions to the literature on electronic tax filing systems.  相似文献   
192.
    
This article looks beyond Z-score and proposes a novel methodological framework to build an all-encompassing indicator of bank stability for individual banks using the optimisation-based ‘benefit-of-the-doubt (BoD)’ approach. Unlike other available approaches, this approach is totally data-driven and generates endogenous weights to aggregate sub-indicators of bank stability and dimensions. Further, the final outcomes are not limited to a scalar measure of bank stability. The unique optimal weights offer valuable policy-relevant insights and highlight the most precarious areas of stability, which demand the immediate attention of the bank's management and the industry regulators for both micro-and macro-level policymaking. Using the data of Indian public sector banks operating in the year 2018, the study illustrates the proposed framework to obtain a holistic indicator of bank stability, defined on 14 ratio sub-indicators and 5 broad dimensions (soundness, asset quality, profitability, management efficiency, and liquidity) of bank stability.  相似文献   
193.
    
An assessment of the determinants of corporate social performance (CSP) in emerging economies is still too fractured. This article contributes to general management literature by developing an empirical model based on the existing theoretical models rooted in neo-institutional theory (legitimacy approach), stakeholders management theory, agency theory, the resource-based view of the firm, slack resources argument, and managerial control theory. A robust, multidimensional, unweighted disclosure index was used to measure CSP. This article provides a methodologically and empirically more rigorous assessment of determinants of CSP compared to previous studies by performing panel data regression analysis on 307 firms for 10 years. The results reveal that the presence of a legal framework, board attributes (board size, board diversity, board interlocking), women on board, ownership pattern, financial performance, firm attributes (size, age, leverage), and industry characteristics affect CSP significantly. These findings provide very important clues to design pragmatic strategies to improve CSP.  相似文献   
194.
根据MongoDB文件型数据库的特点,提出了一种针对MongoDB文件型数据库的证据获取方法。在研究GridFS文件系统原理的基础上,详细阐述了MongoDB和GirdFS文件系统结构,对MongoDB存放数据的文件进行了分析,进而获取被删除的文件数据。实验结果表明该方法能有效地从MongoDB数据库中获取电子证据。  相似文献   
195.
微软复合文档结构分析及文件恢复   总被引:1,自引:0,他引:1  
沙晶  钱伟 《中国司法鉴定》2011,(6):59-61,80
本文分析了微软复合文档类型的结构,对于数据恢复中因文件头损坏不能正常打开的情况,可通过分析整个文件结构,合理重构文件头,修复文件。  相似文献   
196.
Electronic commerce has brought about business and technological changes globally, and these global changes have given rise to major legal reforms across nations. In the fast-changing global digital economy, states need strategies to maintain competitiveness of their markets while simultaneously ensuring the secure and effective use of technologies involved in conducting electronic transactions. This paper examines how the use and recognition of electronic signatures are regulated in Southeast Asia – the region that has shown the most significant growth in global e-commerce in past few years. Based on a comparative analysis of the laws of four representative ASEAN member states – namely Singapore, Thailand, Malaysia, and Vietnam, this paper argues that there is a regional trend towards adopting more liberal and technology-neutral standards for electronic signatures. Electronic signature regulation in Southeast Asia is now built upon limited technological neutrality (or the so-called “two-tiered” approach) as a shared regulatory understanding, but this approach is operationalized differently in each state due to distinctive national contexts. Within the common legal framework, each state has developed its own system of control and management with respect to higher-level signatures (using advanced technologies). The principle of technological neutrality, a concept originally developed for the regulation of technologies in response to the liberalization of telecommunications market, has been the central theme of discussions on the e-transactions policy-making scene. As the author shows, in the process through which states localize the global standards of technological neutrality, ASEAN as a vehicle of regulatory change has played an essential role in translating this principle to the national context.  相似文献   
197.
The use of digital technologies, functioning thanks to data processing, has been conquering many sectors of the world economy and it is possible that, in the near future, only a few markets will still be excluded from this industrial revolution. Therefore, even if one chose unreasonably to disregard the many innovations that the digital economy has brought about, its development seems quite inexorable, although it is true that this new stage in human progress raises some concerns. In particular, many worry about the millions of passive and powerless digital consumers who, facing a few huge and influential companies without any education or awareness, could succumb and find themselves poorer, victimized, and manipulated. The paper proposes to react to this state of affairs without further fueling the fear of the digital revolution and without the thought that regulation can be used only as a shield to protect fragile digital consumers. Rather, by taking inspiration from some regulatory actions undertaken by the European Union, the paper bears in mind that regulation can be used as a sword in the hands of consumers to finally assign them a lead role in digital markets. New rules to empower consumers and to make them take autonomous and independent decisions as to the management of their personal data as well as to the merits of digital firms can be envisaged. After all, one of the cultural roots of Western societies is that every individual should be enabled to be faber ipsius fortunae.  相似文献   
198.
MS Office documents could be illegally copied by offenders, and forensic investigators still face great difficulty in investigating and tracking the source of these illegal copies. This paper mainly proposes a forensic method based on the unique value of the revision identifier (RI) to determine the source of suspicious electronic documents. This method applies to electronic documents which use Office Open XML (OOXML) format, such as MS Office 2007, Mac Office 2008 and MS Office 2010. According to the uniqueness of the RI extracted from documents, forensic investigators can determine whether the suspicious document and another document are from the same source. Experiments demonstrate that, for a copy of an electronic document, even if all the original characters are deleted or formatted by attackers, forensic examiners can determine that the copy and the original document are from the same source through detecting the RI values. Additionally, the same holds true if attackers just copy some characters from the original document to a newly created document. As long as there is one character left whose original format has not been cleared, forensic examiners can determine that the two documents are from the same source using the same method. This paper also presents methods for OOXML format files to detect the time information and creator information, which can be used to determine who the real copyright holder is when a copyright dispute occurs.  相似文献   
199.
随着互联网技术的发展,电子产品被广泛应用在各个领域。与此同时,涉及到数字证据的犯罪案件日益增多。目前,侦查取证人员面临的巨大挑战是需要在短时间内在存有海量数据的大容量存储介质中进行搜查取证活动,传统的数字取证模型难以应对。  相似文献   
200.
电子证据现象反映了证据的可信度问题即所有证据形式都会被修改,所有的证据形式都面临着可信度危机。证据的可信度除了与证据的取得过程有关,还与证据提供者的可信度有关。在证据取得过程合法的情况下,证据的可信度将直接取决于证据提供者的可信度。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号