全文获取类型
收费全文 | 508篇 |
免费 | 5篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 3篇 |
世界政治 | 6篇 |
外交国际关系 | 59篇 |
法律 | 262篇 |
中国共产党 | 5篇 |
中国政治 | 16篇 |
政治理论 | 22篇 |
综合类 | 131篇 |
出版年
2023年 | 7篇 |
2022年 | 19篇 |
2021年 | 24篇 |
2020年 | 18篇 |
2019年 | 15篇 |
2018年 | 34篇 |
2017年 | 12篇 |
2016年 | 12篇 |
2015年 | 17篇 |
2014年 | 43篇 |
2013年 | 39篇 |
2012年 | 19篇 |
2011年 | 32篇 |
2010年 | 16篇 |
2009年 | 47篇 |
2008年 | 39篇 |
2007年 | 35篇 |
2006年 | 26篇 |
2005年 | 11篇 |
2004年 | 15篇 |
2003年 | 11篇 |
2002年 | 6篇 |
2001年 | 10篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1997年 | 1篇 |
1996年 | 1篇 |
排序方式: 共有513条查询结果,搜索用时 15 毫秒
81.
This article analyses digital identity as an emergent legal concept in the United States of America, as a consequence of the move to place all federal government services on-line. The features and functions of digital identity and its legal nature are examined, and the consequences are considered. 相似文献
82.
信息化是全球范围内推动经济和社会变革的重要力量,是增强国家竞争力的制高点。与此同时,由信息技术所带来的信息安全问题亦日益凸显,已成为各国高度关注的问题。应对新一代信息技术挑战的对策主要有:加强管理体制与机制创新,加强信息化软硬件建设,加强网络舆情引导,加大对网络犯罪活动的打击力度与加强公众信息安全教育等。 相似文献
83.
在视频侦查新技术和新思维的视域下,刑事技术工作应从转变思维方式,树立深度应用理念。在宏观层面,推进刑事技术工作在视频侦查条件下的发展,需要抓好以下工作:一是修改《公安机关刑事案件现场勘验检查规则》,为勘查技术工作向视频侦查拓展提供制度支撑。二是构建"四侦合一"勘查工作模式,注重对现有信息资源的充分应用。三是加强天网工程和视频侦查数据库的基础建设。四是大力开展人才培训、引进和岗位技术比武。在微观层面,要切实打好"合成战",要配合视频侦查人员做好视频图像的获取、视频图像的侦查价值的挖掘和痕迹物证与视频图像的碰撞等工作。 相似文献
84.
许兴华 《云南公安高等专科学校学报》2014,(1):118-121
随着我国公务员录用面试信息化建设工作的深入推进,各地陆续在公务员面试过程中采用了公务员面试计算机评分系统。该系统对考官基本信息库、考官的原始计分表、监督员(复核员)的统计表等数据的加密存贮和传输非常重要。为避免泄密,基于PKI技术的“混合签密”方案应用于面试计算机评分系统,能很好地提供机密性、完整性、可认证和不可否认性保证数据的安全性。 相似文献
85.
赵佳乐 《福建省社会主义学院学报》2014,(4):82-87
由于明朝海禁政策的限制,在以福建东南沿海区域为中心的全球化初期的历史背景下,有许多关于闽商的真实史实都被边缘化,甚至没有记载,因此,借由弗兰克的观点,我们需要用一种全球视野来看当时的世界经济,从人口、技术和制度三方面来还原全球化初期16到18世纪里真实的闽商和真实的中国。 相似文献
86.
Yves Poullet 《Computer Law & Security Report》2009,25(3):211-226
The author starts by questioning the main privacy challenges raised by our present and future information society viewed as a “global village”. Apart from a comparison with the traditional village of our parents, he identifies the two complementary and not dissociable facets of our privacy: the right to seclusion and the right to participate fully in our society. According to the first German Constitutional Court recognizing the right to informational self-determination as a new constitutional right, he underlines the need to analyse the data protection as a tool for ensuring both the citizens' dignity and our democracy. 相似文献
87.
Helen KemmittRachael Jolley Joanne PairmanOlufemi Duduyemi 《Computer Law & Security Report》2009,25(1):97-100
This is a summary of the Baker & McKenzie columns on developments in EU law relating to IP, IT and telecommunications. This summarises the principal developments in 2008 that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas and which were reported on in this column in 2008. It seeks also to update any further development which may have taken place in relation to the specific topics since originally reported. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
88.
Harry SmallAuthor VitaeMichael DizonAuthor Vitae Tabeebah MalikAuthor VitaeHelen KemmittAuthor Vitae Ben SmithAuthor VitaeAlison ChinAuthor Vitae Olufemi Duduyemi ofAuthor Vitae 《Computer Law & Security Report》2009,25(2):189-193
This is the latest edition of Baker & McKenzie's column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
89.
A. Srivastava 《Computer Law & Security Report》2009,25(5):432-446
Security concerns with regard to the use of electronic signatures in the electronic environment seem to represent a potential barrier to their usage. This paper presents an empirical study that examines businesses' perceived security concerns with the use of the electronic signature technology for executing contracts and commercial transactions and whether such issues represent a disincentive for their usage. The findings of the study reveal that there are significant security concerns in the business community with regard to the use of electronic signatures. However, such perceptions seem to be primarily driven by a lack of awareness and understanding. Advising prospective users of electronic signatures about the kind of safeguards that could be put in place to minimise risks associated with their usage can be a useful step towards overcoming their fears and hesitance. 相似文献
90.
The final Digital Britain report was published in June as to set out the Government's final proposals and updating an interim version that has been published in January this year. This article builds upon an earlier article in [2009] 25 CLSR 263, which analysed the interim report in depth. The intention is not to repeat that earlier analysis, but rather update it and draw the reader's attention to those key areas of change. 相似文献