首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   409篇
  免费   9篇
各国政治   21篇
工人农民   3篇
世界政治   9篇
外交国际关系   12篇
法律   270篇
中国共产党   2篇
中国政治   27篇
政治理论   27篇
综合类   47篇
  2023年   2篇
  2022年   11篇
  2021年   15篇
  2020年   17篇
  2019年   8篇
  2018年   53篇
  2017年   13篇
  2016年   9篇
  2015年   8篇
  2014年   45篇
  2013年   44篇
  2012年   44篇
  2011年   34篇
  2010年   27篇
  2009年   39篇
  2008年   16篇
  2007年   15篇
  2006年   4篇
  2005年   3篇
  2004年   4篇
  2003年   2篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1988年   1篇
排序方式: 共有418条查询结果,搜索用时 15 毫秒
41.
The analysis and improvements of bank performance is a challenging issue for bank managers. Among various banking services, mobile banking is one of the most risky fields that is prone to customer resistance. Mobile banking is a form of banking transaction carried out via a mobile phone. Mobile banking allows bank customers to check their account balances and perform credit card transaction, as well as provide information on the latest transaction made by customers. This paper summarizes experiences and results of productively using knowledge discovery and data mining techniques in a large detail bank data. Data mining is the process of extracting patterns from data. We review prior literature on mobile payments, analyze the various factors that impact mobile payment services markets, and suggest directions for future research in this risk management field. Our research work demonstrates the effectiveness and efficiency of data mining in analysis of retailing bank performance. We use classification and regression tree learning algorithm for proposing a customer adoption model of mobile banking according to some personal characteristics of customers.  相似文献   
42.
The use of digital technologies, functioning thanks to data processing, has been conquering many sectors of the world economy and it is possible that, in the near future, only a few markets will still be excluded from this industrial revolution. Therefore, even if one chose unreasonably to disregard the many innovations that the digital economy has brought about, its development seems quite inexorable, although it is true that this new stage in human progress raises some concerns. In particular, many worry about the millions of passive and powerless digital consumers who, facing a few huge and influential companies without any education or awareness, could succumb and find themselves poorer, victimized, and manipulated. The paper proposes to react to this state of affairs without further fueling the fear of the digital revolution and without the thought that regulation can be used only as a shield to protect fragile digital consumers. Rather, by taking inspiration from some regulatory actions undertaken by the European Union, the paper bears in mind that regulation can be used as a sword in the hands of consumers to finally assign them a lead role in digital markets. New rules to empower consumers and to make them take autonomous and independent decisions as to the management of their personal data as well as to the merits of digital firms can be envisaged. After all, one of the cultural roots of Western societies is that every individual should be enabled to be faber ipsius fortunae.  相似文献   
43.
Online platforms, which are at the forefront of today's economy, are subject to intensive competition law enforcement. However, the platform business model presents challenges for the application of competition law. Most notably, they appear to offer consumers a great number of their products for free. The explanation for most of these supposedly free products is offered by two-sided market theory: consumers may not be paying, but the ‘other’ side of the market is. This other side of the market often consists of advertisers, which pay the platform for access to the consumers’ information (to target advertisements) and attention (to show the advertisements). As many of these platforms are now potentially dominant, they come within the scope of competition law's abuse of dominance provision, including the doctrines of predatory and excessive pricing. These price-based theories need to adapt to the often price-less platform business model in order to prevent competition authorities from making both type I and type II enforcement errors. At the same time, competition law enforcement needs to consider—and at times give priority to—other branches of law that address abusive behaviour concerning free products. Through the use of case studies, this article therefore suggests ways in which abuse of dominance assessments can take into account the economic reality of free products.  相似文献   
44.
The variations found in the elemental composition in ecstasy samples result in spectral profiles with useful information for data analysis, and cluster analysis of these profiles can help uncover different categories of the drug. We provide a cluster analysis of ecstasy tablets based on their elemental composition. Twenty‐five elements were determined by ICP‐MS in tablets apprehended by Sao Paulo's State Police, Brazil. We employ the K‐means clustering algorithm along with C4.5 decision tree to help us interpret the clustering results. We found a better number of two clusters within the data, which can refer to the approximated number of sources of the drug which supply the cities of seizures. The C4.5 model was capable of differentiating the ecstasy samples from the two clusters with high prediction accuracy using the leave‐one‐out cross‐validation. The model used only Nd, Ni, and Pb concentration values in the classification of the samples.  相似文献   
45.
Held at Southampton University's Highfield campus and hosted by iCLIC, an interdisciplinary core on Law, the Internet and Culture, the Data Mining and Data Sharing workshop brought together attendees and speakers from industry, government, academia and a range of disciplines alike. The workshop comprised two sessions, each with a keynote and an associated panel. The first session was chaired by Eleonora Rosati and dealt with copyright and database rights, data mining and data sharing. The second session, chaired by Sophie Stalla-Bourdillon, focussed on data protection, data mining and data sharing. The following report covers both sessions, associated panel discussions and the subsequent question and answer sessions.  相似文献   
46.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
47.
The present paper1 aims both at introducing the legal aspects of the protection of minors in cyberspace and analysing and criticizing certain main features embedded in this legal approach of young people protection. After a short introduction underlining the concept of child’s rights and the reason why this right has been particularly proclaimed in the context of the cyberspace, the first section describes the new technological features of the ICT environment and linked to this evolution the increasing risks the minors are confronted with. A typology of cyber abuses is proposed on the basis of these considerations. A list of EU or Council of Europe texts directly or indirectly related to the minors’ protection into the cyberspace is provided. The second section intends to analyse certain characteristics of the legal approach as regards the ways by which that protection is conceived and effectively ensured. Different principles and methods might be considered as keywords summarizing the legal approach and to a certain extent, fixing a partition of responsibilities taking fully into account the diversity of actors might be deduced from the different regulatory documents.The third section comes back to the different complementary means by which the Law is envisaging the minors’ protection. The obligation to create awareness about the potential risks minors might incur definitively is the first one. The omnipresent reference in all the legal texts to the role of self-regulatory interventions constitutes another pillar of the protection envisaged by the Law. After having described the multiple instruments developed in the context of this self-regulation (labels, codes of conduct, hotlines, ODR…) or even co-regulation, the paper examines the conditions set by the European legislators as regards these instruments. Technology might be considered as a fourth method for protecting children. Our concern will be to see how the Law is addressing new requirements as regards the technological solutions and their implementation. The present debates about the liability of the actors involved in applications or services targeted or not vis-à-vis the minors like SNS or VSP operators are evoked. As a final point the question of the increasing competences of LEA and the reinforcement of the criminal provisions in order to fight cyber abuses against minors will be debated. In conclusion, we will address final recommendations about the way by which it would be possible to reconcile effective minors’ protection and liberties into the cyberspace.  相似文献   
48.
Text is still the most prevalent Internet media type. Examples of this include popular social networking applications such as Twitter, Craigslist, Facebook, etc. Other web applications such as e-mail, blog, chat rooms, etc. are also mostly text based. A question we address in this paper that deals with text based Internet forensics is the following: given a short text document, can we identify if the author is a man or a woman? This question is motivated by recent events where people faked their gender on the Internet. Note that this is different from the authorship attribution problem.In this paper we investigate author gender identification for short length, multi-genre, content-free text, such as the ones found in many Internet applications. Fundamental questions we ask are: do men and women inherently use different classes of language styles? If this is true, what are good linguistic features that indicate gender? Based on research in human psychology, we propose 545 psycho-linguistic and gender-preferential cues along with stylometric features to build the feature space for this identification problem. Note that identifying the correct set of features that indicate gender is an open research problem. Three machine learning algorithms (support vector machine, Bayesian logistic regression and AdaBoost decision tree) are then designed for gender identification based on the proposed features. Extensive experiments on large text corpora (Reuters Corpus Volume 1 newsgroup data and Enron e-mail data) indicate an accuracy up to 85.1% in identifying the gender. Experiments also indicate that function words, word-based features and structural features are significant gender discriminators.  相似文献   
49.
The article considers the subject of clickstream data from aEuropean/US perspective, taking into account the Data ProtectionFramework (Data Protection Directive 95/46/EC; Directive onPrivacy and Electronic Communications 2002/58/EC) and the USlegal framework and in particular, the Wiretap Act U.S.C. 2701(2004) and related statutes. It examines the extent to whichclickstream data is considered "personal data" within the DataProtection Directive and the implications to consumers and businesses.  相似文献   
50.
The entry into force of the Lisbon Treaty has suspended discussions over the release of a EU PNR processing system. Plans to introduce an intra-EU PNR processing system initiated since 2007, although strongly supported by the Commission and the Council, did not bear fruit before the ratification of the Lisbon Treaty and the, institutional, involvement of the Parliament. While discussions have been suspended since October 2009 and most probably a new draft proposal will be produced, it is perhaps useful to present in brief the proposal currently in place so as to highlight its shortcomings for European data protection and suggest ways individual protection may be strengthened in future drafts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号