首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   647篇
  免费   12篇
各国政治   17篇
工人农民   2篇
世界政治   13篇
外交国际关系   19篇
法律   315篇
中国共产党   7篇
中国政治   33篇
政治理论   34篇
综合类   219篇
  2023年   1篇
  2022年   20篇
  2021年   17篇
  2020年   34篇
  2019年   8篇
  2018年   22篇
  2017年   8篇
  2016年   9篇
  2015年   9篇
  2014年   44篇
  2013年   47篇
  2012年   47篇
  2011年   49篇
  2010年   36篇
  2009年   47篇
  2008年   47篇
  2007年   59篇
  2006年   42篇
  2005年   25篇
  2004年   21篇
  2003年   33篇
  2002年   15篇
  2001年   11篇
  2000年   7篇
  1998年   1篇
排序方式: 共有659条查询结果,搜索用时 15 毫秒
101.
董涛 《学理论》2010,(3):193-194
非物质文化遗产是国家珍贵的宝藏,而随着现代文明的日新月异,承载民族记忆的非物质遗产正渐渐走向消亡,对非物质文化遗产的保护已然迫在眉睫。本文在总结高校图书馆在非物质文化保护中的经验基础上,从图书馆提高服务质量和承担文化重任的角度出发,为高校图书馆在非物质文化遗产保护方面提出了些许建议。  相似文献   
102.
日本环境产业的发展   总被引:3,自引:1,他引:2  
环境产业是改善环境和保证经济社会可持续发展的物质技术条件,也是促进日本经济与环境协调发展和激活其地区活力的强大动力.目前,日本的环境产业已从少数产业部门扩展到几乎所有产业部门,未来将同汽车业和建筑业并驾齐驱,成为支撑日本经济发展的主导支柱产业之一.促进日本环境产业发展的主要因素是,强化环境法规的限制,推动经济政策的绿色化,完善企业的环境管理和发展绿色消费.  相似文献   
103.
论卧底警察的保护与规制   总被引:1,自引:0,他引:1  
随着有组织犯罪的日益猖獗,公安机关运用卧底警察进行侦查破案的策略日益受到人们的关注。然而由于我国相较于其他世界发达国家在这方面的立法及制度建设还存在极大的滞后性,因此,理论界学者有必要对卧底警察这一被广泛运用的现象给以正确评价、规制和保护,以满足当今刑事侦查工作的切实需要。  相似文献   
104.
盂伟 《法学论坛》2004,19(6):74-77
在环境伦理学中,对于人与自然的关系主要存在人类中心主义、动物解放/权利论、生物平等主义和生态中心主义四种学说。其中,现代人类中心主义是一种最低性的道德标准,可以作为环境刑法的伦理基础。从现代人类中心主义的角度审视环境犯罪,可以发现:环境犯罪是对当代人和未来世代人利益的侵犯,其社会危害性并不仅仅体现为经济价值,环境犯罪正在向一种自然犯罪演化。  相似文献   
105.
要实现广西北部湾经济区金融业与产业的联动需要许多条件,如硬件设施、社会中介服务体系、金融机构体系、人才环境、信用环境、政策环境等。本文主要对信用环境、人才环境、国家政策扶持等进行分析,提出了信用增进技术、数字信用、特殊政策清单等实用概念。  相似文献   
106.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
107.
The present paper1 aims both at introducing the legal aspects of the protection of minors in cyberspace and analysing and criticizing certain main features embedded in this legal approach of young people protection. After a short introduction underlining the concept of child’s rights and the reason why this right has been particularly proclaimed in the context of the cyberspace, the first section describes the new technological features of the ICT environment and linked to this evolution the increasing risks the minors are confronted with. A typology of cyber abuses is proposed on the basis of these considerations. A list of EU or Council of Europe texts directly or indirectly related to the minors’ protection into the cyberspace is provided. The second section intends to analyse certain characteristics of the legal approach as regards the ways by which that protection is conceived and effectively ensured. Different principles and methods might be considered as keywords summarizing the legal approach and to a certain extent, fixing a partition of responsibilities taking fully into account the diversity of actors might be deduced from the different regulatory documents.The third section comes back to the different complementary means by which the Law is envisaging the minors’ protection. The obligation to create awareness about the potential risks minors might incur definitively is the first one. The omnipresent reference in all the legal texts to the role of self-regulatory interventions constitutes another pillar of the protection envisaged by the Law. After having described the multiple instruments developed in the context of this self-regulation (labels, codes of conduct, hotlines, ODR…) or even co-regulation, the paper examines the conditions set by the European legislators as regards these instruments. Technology might be considered as a fourth method for protecting children. Our concern will be to see how the Law is addressing new requirements as regards the technological solutions and their implementation. The present debates about the liability of the actors involved in applications or services targeted or not vis-à-vis the minors like SNS or VSP operators are evoked. As a final point the question of the increasing competences of LEA and the reinforcement of the criminal provisions in order to fight cyber abuses against minors will be debated. In conclusion, we will address final recommendations about the way by which it would be possible to reconcile effective minors’ protection and liberties into the cyberspace.  相似文献   
108.
王若源 《政法论丛》2011,(1):103-110
外交保护的实施过程可以区分为国内决策阶段和利用国际法向侵害本国人权利的相对国采取措施的阶段。因此,在国内决策阶段中有一种不可忽视的实践,那就是认为从国内法角度来看国家负有以一切可能方式保护本国公民的义务。但是,实际上外交是国家行为,它代表国民的整体利益。因而在具体个案中可能需要从大局出发采取和缓的方式对权益受侵害的国民进行保护或放弃保护。但,必须建立有效的机制以沟通被害者和实行外交保护的公权力机构。在对公共利益和私人利益进行取舍时,可能需要考虑相应的补偿问题。以此为出发点,对将以外交保护方式保护国民作为国家宪法义务的国家实践进行研究。  相似文献   
109.
环境新闻具有广泛性、冲突性、刺激性、相关性、复杂性等特性,对社会发展起着不可替代的积极影响。环境新闻的社会功能主要体现在扩大认知视野、守卫环境生态、增强情感交流、提高思想教育、凸显经济价值、产生审美愉悦等方面。我国的环境报道在重视长期效应、拓展题材领域、强调内容科学等方面都还存有不足,尚待改进提升,以更好地发挥其应有的作用。  相似文献   
110.
The article considers the subject of clickstream data from aEuropean/US perspective, taking into account the Data ProtectionFramework (Data Protection Directive 95/46/EC; Directive onPrivacy and Electronic Communications 2002/58/EC) and the USlegal framework and in particular, the Wiretap Act U.S.C. 2701(2004) and related statutes. It examines the extent to whichclickstream data is considered "personal data" within the DataProtection Directive and the implications to consumers and businesses.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号