首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   509篇
  免费   5篇
各国政治   9篇
工人农民   3篇
世界政治   6篇
外交国际关系   59篇
法律   263篇
中国共产党   5篇
中国政治   16篇
政治理论   22篇
综合类   131篇
  2023年   7篇
  2022年   20篇
  2021年   24篇
  2020年   18篇
  2019年   15篇
  2018年   34篇
  2017年   12篇
  2016年   12篇
  2015年   17篇
  2014年   43篇
  2013年   39篇
  2012年   19篇
  2011年   32篇
  2010年   16篇
  2009年   47篇
  2008年   39篇
  2007年   35篇
  2006年   26篇
  2005年   11篇
  2004年   15篇
  2003年   11篇
  2002年   6篇
  2001年   10篇
  2000年   2篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有514条查询结果,搜索用时 15 毫秒
211.
Anant Kamath 《亚洲研究》2018,50(3):375-394
This paper presents a fresh perspective on the complicated relationship between digital communication technologies and historically disadvantaged castes such as Dalits in peri-urban Bangalore (Bengaluru), India, a city popularly perceived as India’s “Silicon Valley.” Based on interviews with Dalit household members, entrepreneurs, and political activists, the study examines whether mobile phones have been insufficiently harnessed by Dalits in the region to overcome historic deprivation, or whether they may have even assisted in the reinforcement of caste-based exclusion. The paper uses oral histories and draws from feminist perspectives on technology to demonstrate how the contemporary socio-technological outcomes among Dalits in peri-urban south Bangalore is a result of a convergence between three elements – the durability of caste in peri-urban metropolitan India, the social construction of the usage of information communication technologies (ICTs), and myopia in the conventional understanding of the digital divide in India. In the process of disentangling this convergence, the paper offers a new perspective on the relationship between caste, ICTs, and development policy. The paper ultimately argues for a re-examination of the idea of a digital divide and the development assumption that access to new technologies will further positive development outcomes.  相似文献   
212.
数字经济范式与工作关系变革   总被引:1,自引:0,他引:1       下载免费PDF全文
数字经济的发展带来了自工业革命以来最深刻的社会变革。它对传统雇佣关系或工作关系产生了重大影响,使得岗位职责和技能更精确,工作场所不再受限,工作时间也更自由。同时,数字技术的应用,也不断推动各领域进行组织管理变革,使得劳动关系发生分化。为了更好地应对数字技术和数字经济的发展,政府应该适应技术创新与商业创新,并遵循既定的目标与原则进行制度创新。  相似文献   
213.
Identity-based cryptography has attracted attention in the cryptographic research community in recent years. Despite the importance of cryptographic schemes for applications in business and law, the legal implications of identity-based cryptography have not yet been discussed. We investigate how identity-based signatures fit into the legal framework. We focus on the European Signature Directive, but also take the UNCITRAL Model Law on Electronic Signatures into account. In contrast to previous assumptions, identity-based signature schemes can, in principle, be used even for qualified electronic signatures, which can replace handwritten signatures in the member states of the European Union. We derive requirements to be taken into account in the development of future identity-based signature schemes.  相似文献   
214.
The ability to reconstruct the data stored in a database at an earlier time is an important aspect of database forensics. Past research shows that the log file in a database can be useful for reconstruction. However, in many database systems there are various options that control which information is included in the logs. This paper introduces the notion of the ideal log setting necessary for an effective reconstruction process in database forensics. The paper provides a survey of the default logging preferences in some of the popular database management systems and identifies the information that a database log should contain in order to be useful for reconstruction. The challenges that may be encountered in storing the information as well as ways of overcoming the challenges are discussed. Possible logging preferences that may be considered as the ideal log setting for the popular database systems are also proposed. In addition, the paper relates the identified requirements to the three dimensions of reconstruction in database forensics and points out the additional requirements and/or techniques that may be required in the different dimensions.  相似文献   
215.
In 2012, the United Kingdom actively sought to tackle acts of stalking through amendments to the Protection from Harassment Act 1997. Now, not only is stalking a recognised criminal offence, acts associated with stalking behaviour have finally been properly defined in legislation. Further, the role of technology in digital stalking offences, frequently termed as acts of cyberstalking, has been duly highlighted. The prosecution of such cyberstalking offences is reliant on the forensic analysis of devices capable of communication with a victim, in order to identify the offender and evidence the offending content for presentation to a court of law. However, with the recent proliferation of anonymous communication services, it is becoming increasingly difficult for digital forensic specialists to analyse and detect the origin of stalking messages, particularly those involving mobile devices. This article identifies the legal factors involved, along with a scenario-based investigation of sample anonymous and spoof SMS (Short Message Service) messages, documenting the evidence that remains on a victim's handset for the purpose of locating an offender, which often may be minimal or non-existent.  相似文献   
216.
风险规制法的目标和方法在于具体危险的防御和预防(可能的)风险。对于科技工艺和技术生产的物质或生物来说,除了惩罚禁止措施外,需要建构一套传统风险预防的前置制度,通过广泛的公众参与来对科技后果进行评估,从而采取相应的预防措施。风险规制的行政法方法包括传统的行政调控方式和信息规制方法、激励型规制手段等非禁令手段的方法。通过智慧的规制方法既可实现意欲达到的规制目标,同时也能降低行政管理成本和减少对经济活动的过度干预。  相似文献   
217.
218.
科技介入警务活动越来越广泛、深入,警务科技的自主性及警务科技的专业化统筹越来越重要和紧迫。在部、省、市三级公安机关普遍设立"警务科技总工程师",以此建立警务科技专业统筹机制,并明确"科技警"作为一个新的重要警种的独特地位,是现代警务建设一个重要的创新。  相似文献   
219.
The regular article tracking developments at the national level in key European countries in the area of IT and communications - co-ordinated by Herbert Smith LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to compliment the Journal’s feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
220.
Cyber attacks continue to increase in frequency and variety, making cyber malfeasance a rising area of study and a major policy issue. Categorizing cyber attackers aids targeted organizations in efficiently directing resources to enhance security. However, extant hacker typologies do not fully account for the multifaceted nature of cyber malfeasance, including the rise in socially and ideologically motivated hacking (e.g. crowdsourcing, hacktivism). I clarify the current state of the field by uniting recent case studies on hackers with existing categorization techniques. Previous researchers have employed circumplex models—visualizations which depict relationships and boundaries between groups—as a way to organize hacker types. I propose an updated model—a weighted arc circumplex model—that is designed to represent the multidimensional nature of contemporary hacker types by offering a means of visually representing multiple motivations simultaneously. Finally, I demonstrate how archetypical circumplex models can be wed with sociograms to depict social and technical relationships between hacker groups.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号