首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1251篇
  免费   53篇
各国政治   21篇
工人农民   33篇
世界政治   24篇
外交国际关系   68篇
法律   366篇
中国共产党   48篇
中国政治   226篇
政治理论   146篇
综合类   372篇
  2024年   2篇
  2023年   17篇
  2022年   10篇
  2021年   26篇
  2020年   36篇
  2019年   14篇
  2018年   28篇
  2017年   35篇
  2016年   30篇
  2015年   23篇
  2014年   74篇
  2013年   106篇
  2012年   81篇
  2011年   90篇
  2010年   60篇
  2009年   83篇
  2008年   69篇
  2007年   81篇
  2006年   101篇
  2005年   72篇
  2004年   53篇
  2003年   63篇
  2002年   63篇
  2001年   48篇
  2000年   22篇
  1999年   14篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
排序方式: 共有1304条查询结果,搜索用时 31 毫秒
261.
Privacy by Design is now enjoying widespread acceptance. The EU has recently expressly included it as one of the key principles in the revised data protection legal framework. But how does Privacy by design and data anonymisation work in practise? In this article the authors address this question from a practical point of view by analysing a case study on EU Financial Intelligence Units (“FIUs”) using the Ma3tch technology as additional feature to the existing exchange of information via FIU.NET decentralised computer network. They present, analyse, and evaluate Ma3tch technology from the perspective of personal data protection. The authors conclude that Ma3tch technology can be seen as a valuable example of Privacy by Design. It achieves data anonymisation and enhances data minimisation and data security, which are the fundamental elements of Privacy by Design. Therefore, it may not only improve the exchange of information among FIUs and allow for the data processing to be in line with applicable data protection requirements, but it may also substantially contribute to the protection of privacy of related data subjects. At the same time, the case study clearly shows that Privacy by Design needs to be supported and complemented by appropriate organisational and technical procedures to assure that the technology solutions devised to protect privacy would in fact do so.  相似文献   
262.
共性技术扩散中的政府行为   总被引:3,自引:0,他引:3  
自20世纪90年代以来,随着经济的全球化和知识经济的发展,国际间竞争变的越来越激烈,在这种严峻背景下,只有拥有丰富的技术资源才能生存。而新技术的产生才能满足这种需求,共性技术在整个技术创新链中处于重要的地位,它是新技术产生的基础。本文在阐述共性技术扩散概念及其特征的基础上,系统分析了政府在共性技术扩散中的职能,指出政府在共性技术扩散中应发挥着不可替代的重要作用。  相似文献   
263.
新《刑事诉讼法》(以下简称新法)出台后,监视居住制度开始承担着独立的刑事诉讼功能。新法对监视居住制度的完善,既健全了刑事强制措施体系,也为侦查部门适用刑事强制措施提供了依据。然而,新法仍缺乏对于被执行人权利的救济和第三人权利的保障,致使对职务犯罪的侦查极易造成监视居住执行时的错位。因此,应构建独立的监视居住平台,赋予职务犯罪侦查部门刑事强制措施执行权,加强检察系统内部职务犯罪侦查部门一体化建设。  相似文献   
264.
眼动追踪技术及其在侦查辨认中的应用   总被引:1,自引:0,他引:1  
辨认,从心理学角度来讲,是感知、记忆、再认的过程。通过眼动追踪技术可以实时采集辨认人在辨认过程中的眼动数据,了解其在辨认中是如何思考及做出辨认结果的心理认知过程。利用眼动追踪技术,分析证人、犯罪嫌疑人辨认过程中的眼动模式,有助于研究证人辨认的准确率、识别犯罪嫌疑人、辅助发现破案线索等问题。眼动追踪技术在侦查辨认领域有广阔的应用前景。  相似文献   
265.
辨认从心理学角度来讲是感知、记忆、再认的过程。通过眼动追踪技术可以实时采集辨认人在辨认过程中的眼动数据,了解其在辨认中的是如何思考及做出辨认结果的心理认知过程。利用眼动追踪技术,分析证人、犯罪嫌疑人辨认过程中的眼动模式,有助于研究证人辨认的准确率、识别犯罪嫌疑人、辅助发现破案线索等问题,在侦查辨认领域有广阔的应用前景。  相似文献   
266.
科技的发展促成了风险社会的形成。风险社会中的风险有着向下层聚集的特点。以转基因技术为例,在转基因商品化和产业化的过程中,利益被发达国家、跨国公司、生产企业和科学家等获得,而风险却集中在发展中国家的普通消费者尤其是农民身上。根据可持续发展原则,在科技发展中,利益集团有能力也有义务承担更多风险,并在保障普通大众的基本权益不受损害的前提下,优先考虑大众的利益。  相似文献   
267.
Abstract: High‐energy synchrotron radiation x‐ray fluorescence spectrometry (SR‐XRF) utilizing 116 keV x‐rays was used to characterize titanium dioxide pigments (rutile) and automotive white paint fragments for forensic examination. The technique allowed analysis of K lines of 9 trace elements in 18 titanium dioxide pigments (rutile), and 10 trace elements in finish coat layers of seven automotive white paint fragments. High‐field strength elements (HFSE) were found to strongly reflect the origin of the titanium dioxide (TiO2) pigments, and could be used as effective parameters for discrimination and classification of the pigments and paint fragments. A pairwise comparison of the finish coat layers of seven automotive white paint fragments was performed. The trace elements in the finish coat layers detected by the high‐energy SR‐XRF were especially effective for identification. By introducing the trace element information of primer and electrocoat layers, all the automotive white paint fragments could be discriminated by this technique.  相似文献   
268.
269.
One common rationale supporting public financing programs for small firms is that initial public investment creates incentives for follow-on private investment. However, there does not appear to be a unified statement in the literature describing how initial public investment creates incentives for follow-on private investment. Focusing on external private investors, we use a two-stage net present value model to identify four effects from initial public investment on the private decision for follow-on investment. Our empirical analysis uses a sample of non-venture backed firms entering the SBIR program to examine how reduced risk, the number of SBIR awards, and size of initial public investment influence the likelihood of follow-on venture capital investment. We find the probability of follow-on venture capital investment is more likely when firms reach Phase II of the program, is less likely as firms win multiple Phase I and Phase II awards, and is more likely as the size of initial public investment in Phase I increases.
Calum TurveyEmail:
  相似文献   
270.
Scholars call for “adaptive governance” to balance concern about technology uncertainty with the need for innovation in the governance of emerging technologies. Yet, empirical assessment of such governance systems remains sparse. Do the actors interested in the potential regulation of an emerging technology focus on their own interests and opportunities, or do they think in terms of the collective interest? We focus on the actors who embed such systems from a novel landscape perspective that combines two dimensions of governance: the nature of the regulatory target, and the nature of the process they advocate for governing the target. We present data from over 70 actors in the area of cryptocurrencies for evaluating this new logic.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号