首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   508篇
  免费   5篇
各国政治   9篇
工人农民   3篇
世界政治   6篇
外交国际关系   59篇
法律   262篇
中国共产党   5篇
中国政治   16篇
政治理论   22篇
综合类   131篇
  2023年   7篇
  2022年   19篇
  2021年   24篇
  2020年   18篇
  2019年   15篇
  2018年   34篇
  2017年   12篇
  2016年   12篇
  2015年   17篇
  2014年   43篇
  2013年   39篇
  2012年   19篇
  2011年   32篇
  2010年   16篇
  2009年   47篇
  2008年   39篇
  2007年   35篇
  2006年   26篇
  2005年   11篇
  2004年   15篇
  2003年   11篇
  2002年   6篇
  2001年   10篇
  2000年   2篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有513条查询结果,搜索用时 15 毫秒
81.
This article analyses digital identity as an emergent legal concept in the United States of America, as a consequence of the move to place all federal government services on-line. The features and functions of digital identity and its legal nature are examined, and the consequences are considered.  相似文献   
82.
信息化是全球范围内推动经济和社会变革的重要力量,是增强国家竞争力的制高点。与此同时,由信息技术所带来的信息安全问题亦日益凸显,已成为各国高度关注的问题。应对新一代信息技术挑战的对策主要有:加强管理体制与机制创新,加强信息化软硬件建设,加强网络舆情引导,加大对网络犯罪活动的打击力度与加强公众信息安全教育等。  相似文献   
83.
在视频侦查新技术和新思维的视域下,刑事技术工作应从转变思维方式,树立深度应用理念。在宏观层面,推进刑事技术工作在视频侦查条件下的发展,需要抓好以下工作:一是修改《公安机关刑事案件现场勘验检查规则》,为勘查技术工作向视频侦查拓展提供制度支撑。二是构建"四侦合一"勘查工作模式,注重对现有信息资源的充分应用。三是加强天网工程和视频侦查数据库的基础建设。四是大力开展人才培训、引进和岗位技术比武。在微观层面,要切实打好"合成战",要配合视频侦查人员做好视频图像的获取、视频图像的侦查价值的挖掘和痕迹物证与视频图像的碰撞等工作。  相似文献   
84.
随着我国公务员录用面试信息化建设工作的深入推进,各地陆续在公务员面试过程中采用了公务员面试计算机评分系统。该系统对考官基本信息库、考官的原始计分表、监督员(复核员)的统计表等数据的加密存贮和传输非常重要。为避免泄密,基于PKI技术的“混合签密”方案应用于面试计算机评分系统,能很好地提供机密性、完整性、可认证和不可否认性保证数据的安全性。  相似文献   
85.
由于明朝海禁政策的限制,在以福建东南沿海区域为中心的全球化初期的历史背景下,有许多关于闽商的真实史实都被边缘化,甚至没有记载,因此,借由弗兰克的观点,我们需要用一种全球视野来看当时的世界经济,从人口、技术和制度三方面来还原全球化初期16到18世纪里真实的闽商和真实的中国。  相似文献   
86.
The author starts by questioning the main privacy challenges raised by our present and future information society viewed as a “global village”. Apart from a comparison with the traditional village of our parents, he identifies the two complementary and not dissociable facets of our privacy: the right to seclusion and the right to participate fully in our society. According to the first German Constitutional Court recognizing the right to informational self-determination as a new constitutional right, he underlines the need to analyse the data protection as a tool for ensuring both the citizens' dignity and our democracy.  相似文献   
87.
This is a summary of the Baker & McKenzie columns on developments in EU law relating to IP, IT and telecommunications. This summarises the principal developments in 2008 that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas and which were reported on in this column in 2008. It seeks also to update any further development which may have taken place in relation to the specific topics since originally reported. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
88.
This is the latest edition of Baker & McKenzie's column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
89.
Security concerns with regard to the use of electronic signatures in the electronic environment seem to represent a potential barrier to their usage. This paper presents an empirical study that examines businesses' perceived security concerns with the use of the electronic signature technology for executing contracts and commercial transactions and whether such issues represent a disincentive for their usage. The findings of the study reveal that there are significant security concerns in the business community with regard to the use of electronic signatures. However, such perceptions seem to be primarily driven by a lack of awareness and understanding. Advising prospective users of electronic signatures about the kind of safeguards that could be put in place to minimise risks associated with their usage can be a useful step towards overcoming their fears and hesitance.  相似文献   
90.
The final Digital Britain report was published in June as to set out the Government's final proposals and updating an interim version that has been published in January this year. This article builds upon an earlier article in [2009] 25 CLSR 263, which analysed the interim report in depth. The intention is not to repeat that earlier analysis, but rather update it and draw the reader's attention to those key areas of change.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号