首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   412篇
  免费   43篇
各国政治   8篇
工人农民   29篇
世界政治   9篇
外交国际关系   27篇
法律   183篇
中国共产党   15篇
中国政治   48篇
政治理论   42篇
综合类   94篇
  2024年   2篇
  2023年   14篇
  2022年   34篇
  2021年   19篇
  2020年   23篇
  2019年   18篇
  2018年   19篇
  2017年   16篇
  2016年   12篇
  2015年   16篇
  2014年   24篇
  2013年   43篇
  2012年   20篇
  2011年   15篇
  2010年   26篇
  2009年   17篇
  2008年   16篇
  2007年   24篇
  2006年   19篇
  2005年   20篇
  2004年   18篇
  2003年   11篇
  2002年   19篇
  2001年   7篇
  2000年   3篇
排序方式: 共有455条查询结果,搜索用时 15 毫秒
351.
利用数码相机进行分色照相,是数码照相机用于现场照相后所带来的新问题。能否直接在拍照中进行分色,而不是拍照后用图像处理软件进行分色,对于保持照片效果的原始性具有一定的意义。  相似文献   
352.
仲瑞敏  李凤莲 《青年论坛》2010,(1):158-160,F0003
在网络化的档案管理服务中,计算机信息和档案资源很容易遭到各方面的攻击。必须采取多方面的手段,将技术措施、管理策略和法律制度融为一体,搭建系统的安全保障体系。具体的安全控制系统由以下几方面组成:物理安全、网络安全、信息安全和安全管理。  相似文献   
353.
The concept of digital governance has renovated the basic premise of administration. Digitalization has not only made it more responsive but also enhanced its accountability to deliver the better services to people by initiating direct participation of common person in the process of governance. The dynamic nature of administration makes it change orientation thus responding to the demands in particular time frame. Though the core issue of rendering services acquires the center-stage, recently there has been intermixing of principles of public management giving effective resource management, the special leverage to flame policies. In countries which are less prone to the adaptations of advanced technologies are also taking e-initiative to activate the process of implementation. The present article explores the status of e-governance in Rajasthan, the biggest state of Indian Union. After the enactment of Information Technology Act 2000 by the union government, different states have also taken corresponding initiatives pertaining to the e-governance. This study which was carried out in Rajasthan in 2009 focuses on various dimensions of its application in state secretariat, which epitomizes the epithet of administrative activities undertaken by the Government of Rajasthan. The study results are evaluated on the basis of the data collected at different levels by instituting the questionnaire and survey. It establishes the fact that Rajasthan has responded very well in some areas of administration, but there are certain areas where it has to implement the e-initiative at par with the other states. Therefore this particular study examines the present status of the e-governance followed by the suggestive trajectory on what other efforts are needed to involve this state. The interpretations are subject to the data collected. The secretariat is the domain of governmental functioning to fulfill the expectations of common person in the state. This research works has focused on the various e-programs, and data collected thereafter have been analyzed to understand the intricacies of e-governance in the state. It is a less explored arena where the study is conducted to find out the status of various programs and the impact of e-governance on the implementation of programs.  相似文献   
354.
吕国民 《河北法学》2006,24(8):38-41
作为一种全新的商业运作模式,数字化产品贸易给世界贸易注入了新的活力,同时也给WTO带来了一系列的规制问题,因为在这一贸易过程中,货物和服务之间的明显界限消失了,相同产品可以被当作货物、服务,也可以被当作特许合同.为此WTO成员展开了激烈争论,尚未达成一致意见.  相似文献   
355.
论消弥数字鸿沟   总被引:1,自引:0,他引:1  
本文探讨数字鸿沟的概念 ,认为要理性认识数字鸿沟 ,数字鸿沟与贫富差距一样是必然存在的 ,电子政府并不能缩短数字鸿沟的差距 ,并提出了在消弥数字鸿沟中应遵循“泽被全民原则”“普遍服务原则”  相似文献   
356.
In this paper, we review literature on antiforensics published between 2010 and 2016 and reveal the surprising lack of up‐to‐date research on this topic. This research aims to contribute to this knowledge gap by investigating different antiforensic techniques for devices running Windows 7, one of the most popular operating systems. An approach which allows for removal or obfuscation of most forensic evidence is then presented. Using the Trojan software DarkComet RAT as a case study, we demonstrate the utility of our approach and that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive. Up‐to‐date information regarding how forensic artifacts can be compromised will allow relevant stakeholders to make informed decisions when deciding the outcome of legal cases involving digital evidence.  相似文献   
357.
现代通信技术的发展,公安计算机和公安通信教育是公安院校必须重视的课题.本文浅谈国内国外各行各业计算机的应用和通信技术的发展,目的在于改变我们的思想观念,提高对现代公安通信教育的重视,加强公安通信实验室建设,促进教学效果进一步提高,共同为培养21世纪高素质警官而奋斗.  相似文献   
358.
大数据时代,培育公务员大数据素养是政府治理能力与公务员能力现代化的必然选择。在阐明公务员大数据素养议题产生逻辑与概念内涵的基础上,以冰山模型和数据生命周期理论为理论基础,构建一个融合潜在素质与显性技能的公务员大数据素养框架双环模型:模型内环为潜在大数据素质层,包括大数据意识、知识、情感、思维和伦理五项素质;模型外环为显性大数据技能层,依据数据生命周期具化出大数据采集、管理、分析、可视化及信息利用五项公务员胜任大数据活动的应用技能。依据双环模型,可以对公务员大数据素养各要素的内涵、测度方向与思路予以诠释,提出加强大数据素养实践培育和理论研究的必要性。  相似文献   
359.
社交网络账号为用户与网络服务平台之间的服务协议,社交账号的继承问题本质上为用户对自己网络信息的支配权限界定,属于个人对其数据及信息的利用范畴。社交网络账户具有财产性、身份性与人格性多重法律属性。社交网络账户具有可继承性,其性质、用户协议及个人信息保护义务均不排除账号继承的可能性。社交账号继承规则的构建首先需要区分社交网络账号本身与账号中存储的信息,其次根据社交性网络账户的类型构建不同维度的继承规则。账号内存储信息的继承应当优先保障用户的自主权,可以通过构建数字化信托的模式实现,保障用户决定是否允许继承的自主利益,并消除社交账号继承中的负外部性。同时《民法典》第1122条规定的“遗产”的内涵应当做扩大解释。  相似文献   
360.
Abstract

Connectivity infrastructure is constantly expanding, increasing internet access across countries, regions and socio-political contexts. Given the fast-changing geography of the internet, there is a growing demand to strengthen cyber capacity beyond national frameworks, in order to develop a transnationally coherent and coordinated governance approach to cybersecurity. In this context, cyber capacity building initiatives are increasingly central in international debates, with the ambition to support countries in the Global South in fostering their cybersecurity strategy from technical and policy perspectives. This article discusses the key factors explaining states’ efforts to enhance their cyber capacity. Based on a cross-national quantitative research approach, the findings contradict international relations (IR)-derived approaches to cybersecurity, which assume that countries develop their cyber capacity according to external security threats, domestic politics or norms. In line with existing research on the role that science plays in policymaking processes more broadly, our results suggest instead that a country’s science and technical knowledge is the most robust explanation for that state’s cyber capacity level. These findings emphasise the need for policymakers to support countries in the Global South in developing their cyber capacity beyond national security paradigms by strengthening education and technical skills in contexts lacking in this resource.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号