首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   965篇
  免费   62篇
各国政治   21篇
工人农民   16篇
世界政治   39篇
外交国际关系   62篇
法律   481篇
中国共产党   19篇
中国政治   91篇
政治理论   109篇
综合类   189篇
  2024年   2篇
  2023年   25篇
  2022年   30篇
  2021年   47篇
  2020年   53篇
  2019年   31篇
  2018年   62篇
  2017年   35篇
  2016年   26篇
  2015年   35篇
  2014年   70篇
  2013年   101篇
  2012年   74篇
  2011年   41篇
  2010年   43篇
  2009年   40篇
  2008年   55篇
  2007年   44篇
  2006年   33篇
  2005年   40篇
  2004年   26篇
  2003年   38篇
  2002年   22篇
  2001年   21篇
  2000年   10篇
  1999年   6篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1983年   3篇
排序方式: 共有1027条查询结果,搜索用时 15 毫秒
961.
962.
Nanotechnology has been proposed as the next general purpose technology and engine for growth for the 21th century. Increasing public R&D investments are foremost reflected in the growth of scientific publications, while nanotechnology still is in an uncertain phase of development with various directions of commercialization pending. This paper focuses on the challenges, modes and outcomes of nanotechnology as an emerging science-based field in Finland. The paper contributes by interrogating how challenges and modes of nanotechnology transfer differ across universities and companies and determine outcomes broadly defined. It uses survey data covering university and company researchers in the Finnish nanotechnology community. The results show significant differences in the perceptions of researchers across these organisations, and highlight specific challenges and modes as determinants of outcomes. The specificities of nanotechnology are also assessed.
Christopher PalmbergEmail:
  相似文献   
963.
Information science distinguishes between the semantic forms/intangibles of data, information and knowledge. Data (e.g. an attribute of a data record in a relational database) does not have any meaning by itself. Information is data brought into context (e.g. data related to its primary key), and knowledge is the collection of information for useful intent (e.g. a database). This paper investigates the mapping of semantic forms in information science (i.e. data, information, knowledge) to correlative concepts in information law (primarily data protection legislation) with a view to investigating how such semantic forms are legally protected. The paper first proposes a data, information, knowledge, rules (DIKR) hierarchy in the context of relational database theory, and interprets this hierarchy with respect to data protection concepts. The paper then gives an in-depth discussion of the elements of the DIKR hierarchy (data, information, knowledge, deduced knowledge, induced knowledge) and how they relate to the EU Data Protection Directive 95/46/EC. These relationships are summarized in the form of a two dimensional correlation matrix. Finally the paper discusses how the semantic forms identified are protected under the EU Data Protection Directive, and gives insightful observations about the connection between information law and information science.  相似文献   
964.
Recent research has compared male and female trends in violent offending in Uniform Crime Report (UCR) arrest data with similar trends derived from victims' reports in the National Crime Victimization Survey (NCVS) and has concluded that the two data sources produce contrary findings. In this article, we reassess this issue and draw different conclusions. Using pooled National Crime Survey (NCS) and NCVS data for 1973 to 2005, we find that the female‐to‐male offending rate ratios for aggravated assault, robbery, and simple assault have increased over time and that the narrowing of the gender gaps is very similar to patterns in UCR arrest data. In addition, we find that these patterns are in part caused by larger decreases in male than female offending after the mid‐1990s and not by recent increases in violent offending rates among females. We conclude that changes in the gender gaps in aggravated assault, robbery, and simple assault are real and not artifacts; therefore, these changes deserve serious attention in future research. We conclude with a discussion of several hypotheses that might account for a narrowing of the gender gap in nonlethal violent offending over time.  相似文献   
965.
The Supplementary Homicide Reports (SHR), assembled by the Federal Bureau of Investigation (FBI), have for many years represented the most valuable source of information on the patterns and trends in murder and non-negligent manslaughter. Despite their widespread use by researchers and policy makers alike, these data are not completely without their limitations, the most important of which involves missing or incomplete incident reports. In this analysis, we develop methods for addressing missing data in the 1976–2005 SHR cumulative file, related to both non-reports (unit missingness) and incomplete reports (item missingness). For incomplete case data (that is, missing characteristics on victims, offenders or incidents), we implement a multiple imputation (MI) approach based on a log-linear model for incomplete multivariate categorical data. Then, to adjust for unit missingness, we adopt a weighting scheme linked to FBI annual estimates of homicide counts by state and National Center for Health Statistics mortality data on decedent characteristics in coroners’ reports for deaths classified as homicide. The result is a fully-imputed SHR database for 1976–2005. This paper examines the effects of MI and case weighting on victim/offender/incident characteristics, including standard errors of parameter estimates resulting from imputation uncertainty.
Marc L. SwattEmail:
  相似文献   
966.
On 6 April 2009 new legislation came into force, for the first time putting Internet service providers' duty to retain significant amounts of data (relating to customers' email and Internet usage) on a compulsory, as opposed to a voluntary footing. It is a topic which has provoked intense protest from the privacy lobby and fuelled months of “Big Brother” headlines in the press. For the industry it raises operational challenges – how to facilitate storage and retrieval of colossal amounts of data. In this article we consider the policy background to the regime, the detail of the UK implementation and the practical implications for communications service providers. We weigh up the privacy and human rights concerns against the business case put forward by the Government. We also examine the Government's proposals – announced at the end of April – to significantly extend and “future proof” this regime in the form of its Intercept Modernisation Programme.  相似文献   
967.
This contribution is an attempt to facilitate a meaningful European discussion on propertization of personal data by explaining the idea as it emerged in its ‘mother-jurisdiction’, the United States. The piece starts with an overview of how the current US legal system addresses the data protection problem and whether, according to the US commentators, the law does it effectively. Furthermore, the contribution presents propertization of personal information as an alternative to the existing data protection regime and one of the ways to fill in the alleged gaps in the US data protection system. The article maps the US propertization debate. Pro-propertization arguments are considered from economic perspective as well as from the perspective of the limitations of the US legal and political system. In continuation it analyses proposals on how property rights in personal data would have to be regulated, if at all, in case the idea of propertization is accepted. The main points of criticism of propertization are also sketched. The article concludes with a brief summary of the US propertization discourse and, most importantly, with a list of the lessons Europeans can learn from their American counterparts engaging in the debate in the home jurisdiction. Among the main messages is that the outcome of the debate depends on the definition of the problem propertization is called on to tackle, and that it is the substance of the actual rights with regard to personal data that matters, and not whether we label them as property rights or not.  相似文献   
968.
中国与世界相互依赖的日益紧密既给中国带来机遇,也给中国的发展和国家安全带来挑战.对此,中国应实施自主发展战略,这既是对未来中国发展的总体筹划,也符合中国成长为开放型大国的阶段性要求.自主发展战略主张在对外开放进程中,中国应保持国家自主性,全面提升自主发展能力,为维护国家安全、实现可持续发展和加快和平发展提供可靠的战略保障.  相似文献   
969.
论社会危害性理论与实质刑法观的关联关系与风险防范   总被引:1,自引:0,他引:1  
社会危害性理论与法益理论确实可以成为实质刑法观的理论基础,但是社会危害性理论与实质刑法观的关联性比较复杂,并非如部分学者所提示的那样一一对应。就持有传统社会危害性理论立场的学者而言,他们其实并非可以简单地归入实质刑法观立场;而主张改革完善传统社会危害性理论的部分学者,反而坚持实质刑法观立场。在中国语境下,实质刑法观面临的风险与批评,主要根源就在于作为实质刑法观理论基础的社会危害性理论具有太过强大的解释功能,且实质解释论的功能表现包括了保障人权的正面功能与严重侵犯人权的负面功能的两面,呈现出矛盾属性。为了防范风险,不但需要发展实质刑法观,而且需要完善社会危害性理论。单面的实质刑法观或者保守的实质刑法观,主张通过实质罪刑法定原则的限制、实质犯罪论的限制与实质司法解释权的限制,以有效防范开放的实质刑法观可能存在的侵蚀人权保障机能的风险,因而应当成为当下中国最理想的选择。  相似文献   
970.
探讨建立对电子数据司法鉴定工具进行科学性及可靠性的评估方法。在已有的国内外取证工具评测方法的基础上,借鉴国家强制认证认可和可靠性工程等因素,对电子数据司法鉴定工具可靠性评估体系中的工具基本认可和定性评估二阶段进行详细分析,为保证司法鉴定实践的科学性和准确性提供理论依据。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号