全文获取类型
收费全文 | 509篇 |
免费 | 5篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 3篇 |
世界政治 | 6篇 |
外交国际关系 | 59篇 |
法律 | 263篇 |
中国共产党 | 5篇 |
中国政治 | 16篇 |
政治理论 | 22篇 |
综合类 | 131篇 |
出版年
2023年 | 7篇 |
2022年 | 20篇 |
2021年 | 24篇 |
2020年 | 18篇 |
2019年 | 15篇 |
2018年 | 34篇 |
2017年 | 12篇 |
2016年 | 12篇 |
2015年 | 17篇 |
2014年 | 43篇 |
2013年 | 39篇 |
2012年 | 19篇 |
2011年 | 32篇 |
2010年 | 16篇 |
2009年 | 47篇 |
2008年 | 39篇 |
2007年 | 35篇 |
2006年 | 26篇 |
2005年 | 11篇 |
2004年 | 15篇 |
2003年 | 11篇 |
2002年 | 6篇 |
2001年 | 10篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1997年 | 1篇 |
1996年 | 1篇 |
排序方式: 共有514条查询结果,搜索用时 0 毫秒
191.
Kayleen Manwaring 《Computer Law & Security Report》2010,26(6):630-639
The beginning of the 21st century saw the beginning of substantial debate on “open access” to the Internet and the related concept of “network neutrality”. This paper is a short introduction to some of the complexities of the debate, focussing on the difficulties of attempting to regulate rapidly developing technologies, as well as particular issues of price and market regulation in Australia. Generally, network neutrality advocates believe that without regulation, telecommunications companies will use their control over “last mile” infrastructure to engage in discriminatory and anti-competitive practices against content providers. Opponents argue that this concern is illusory, and regulatory restrictions requiring neutrality will in their turn restrict innovation by network providers. In Australia, most discussion has focussed on price and market regulation. However, many Australian opponents of network neutrality say that it is an American problem, irrelevant to Australia, because of different pricing models for the Australian broadband market. 相似文献
192.
Cloud computing systems provide a new paradigm to the distributed processing of digital data. Digital forensic investigations involving such systems are likely to involve more complex digital evidence acquisition and analysis. Some public cloud computing systems may involve the storage and processing of digital data in different jurisdictions, and some organisations may choose to encrypt their data before it enters the cloud. Both of these factors in conjunction with cloud architectures may make forensic investigation of such systems more complex and time consuming. There are no established digital forensic guidelines that specifically address the investigation of cloud computing systems. In this paper we examine the legal aspects of digital forensic investigations of cloud computing systems. 相似文献
193.
李英 《江南社会学院学报》2009,11(3)
国防科技是武器装备发展的前提和基石,是军队战斗力的物质基础和军事实力的重要组成部分。国防科技安全是科技安全在国防领域的体现,维护国防科技安全,保护国防科技成果,是国家安全的重要内容之一。建立健全国防科技安全的法律保障机制,在各国法律建设中的地位尤为重要,随着国防科技工业的不断发展,我国国防科技安全保障机制在一些立法和制度上的问题有待进一步研究和解决。 相似文献
194.
In recent years Australia has seen increasing use of digital technology including smartphones and with that, increasing development and availability of online family law resources including digital applications (‘apps’). However, the extent to which online resources are being used – and are considered useful – by those experiencing relationship separation has not so far been the focus of Australian empirical research. After first briefly examining digital developments in Australia more broadly, we draw on recent data from 35 separated parents across four states to explore use and utility of family law resources available on smartphones from a ‘consumer’ perspective, focusing on apps. Our analysis suggests a gap between what is available, and what is known about and used by separating parents. 相似文献
195.
With a reliance on the various forms of forensic science evidence in complex criminal investigations, the measures for ensuring its quality are facing increasing scrutiny. Improvements to quality management systems, to ensure both the robust application of scientific principles and the accurate interpretation and reporting of results, have arisen as a consequence of high-profile rebuttals of forensic science evidence, combined with process improvements driven by evaluation of current practice. These improvements are crucial to ensure validity of results as well as providing assurance for all those involved in the Criminal Justice System. This work first examines the quality management systems utilised for the examination and analysis of fingerprint, body fluid and DNA evidence. It then proceeds to highlight an apparent lack of comparable quality assurance mechanisms within the field of digital forensics, one of the newest branches of forensic science. Proposals are provided for the improvement of quality assurance for the digital forensics arena, drawing on the experiences of, and more well-established practices within, other forensic disciplines. 相似文献
196.
197.
David Hodson 《Family Court Review》2019,57(3):425-433
Digitalization is increasing across family justice systems around the world. What are the benefits? What will be the impact on professional practice and legal representation? What are the concerns for those who may be digitally disadvantaged? How much can justice itself become digital? 相似文献
198.
Nick Pantlin 《Computer Law & Security Report》2018,34(4):985-987
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening ``on the ground'' at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
199.
Saudi Arabia grants nationality to an AI robot; the first “clash of robots” took place in Japan; and, Bill Gates suggests that robots start paying taxes. We believe that these developments justify new legal fiction interventions. Software has long now exceeded the intellectual property boundaries. It is no longer merely property; it has assumed life of its own. It does not matter that such life is imaginary today. Legal persons were brought to life through legal fiction intervention that was based on much less motivation – merely the human incentive for profit. Software is certainly connected today with profit, given that the world's most valued corporations are software companies. However, it has moved much further than that, to assume in many ways artificial life of its own. We think that it is time that the dichotomy between natural and legal persons, that has served humanity so well over the past centuries, now be trisected: A new, digital person, ought to be added to it. 相似文献
200.
Miquel Peguera 《Computer Law & Security Report》2018,34(5):1099-1118
For more than a decade now, the right of communication to the public has been developed and interpreted by the CJEU, leading to a complex set of criteria that must be analysed on a case-by-case basis. When confronted with the copyright status of hyperlinking, the Court built upon that background in a string of cases that ended up reshaping the traditional contours of the exclusive right. The practice of linking, an essential element of the Internet and a crucial tool for any online activity carried out by entities and individuals, is now affected by the new scope of the communication to the public right, with direct consequences on the liability hyperlinkers may incur. This article will examine the status of the Court's case law to provide insights that may facilitate its interpretation and application. It will consider in particular how hyperlinkers are exposed to liability and which duties of care result from the Court's approach. It will also examine how the new understanding of hyperlinks from a copyright perspective may be relevant in the context of the proposed Directive on Copyright in the Digital Single Market. 相似文献