首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   823篇
  免费   6篇
各国政治   8篇
工人农民   4篇
世界政治   8篇
外交国际关系   15篇
法律   252篇
中国共产党   10篇
中国政治   24篇
政治理论   41篇
综合类   467篇
  2023年   2篇
  2022年   11篇
  2021年   16篇
  2020年   15篇
  2019年   12篇
  2018年   27篇
  2017年   12篇
  2016年   7篇
  2015年   8篇
  2014年   48篇
  2013年   65篇
  2012年   37篇
  2011年   90篇
  2010年   61篇
  2009年   75篇
  2008年   42篇
  2007年   52篇
  2006年   48篇
  2005年   54篇
  2004年   42篇
  2003年   41篇
  2002年   37篇
  2001年   18篇
  2000年   8篇
  1998年   1篇
排序方式: 共有829条查询结果,搜索用时 15 毫秒
821.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
822.
Internet of things (IoT) is changing the way data is collected and processed. The scale and variety of devices, communication networks, and protocols involved in data collection present critical challenges for data processing and analyses. Newer and more sophisticated methods for data integration and aggregation are required to enhance the value of real-time and historical IoT data. Moreover, the pervasive nature of IoT data presents a number of privacy threats because of intermediate data processing steps, including data acquisition, data aggregation, fusion and integration. User profiling and record linkage are well studied topics in online social networks (OSNs); however, these have become more critical in IoT applications where different systems share and integrate data and information. The proposed study aims to discuss the privacy threat of information linkage, technical and legal approaches to address it in a heterogeneous IoT ecosystem. The paper illustrates and explains information linkage during the process of data integration in a smart neighbourhood scenario. Through this work, the authors aim to enable a technical and legal framework to ensure stakeholders awareness and protection of subjects about privacy breaches due to information linkage.  相似文献   
823.
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
824.
EU update     
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside websites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
825.
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
826.
EU update     
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
827.
This study examines whether community policing can build informal social control. Specifically, this paper assesses the impact of the Chicago Alternative Policing Strategy (CAPS) in Chicago neighborhoods. The data for this research are drawn from both the Community Survey of the Project on Human Development in Chicago Neighborhoods (PHDCN) and the CAPS Prototype Panel Survey. Bivariate and multivariate methods are used to analyze data gathered from 8782 residents nested within 343 neighborhood clusters. Initially, community policing was found to increase informal social control, but this effect was rendered non-significant after controlling for theoretically and empirically relevant variables. Several social (dis)organization variables, as well as satisfaction with policing services, yielded significant effects in a multilevel regression model. Further analysis found that the community policing effect on informal social control was mediated through satisfaction with the police. These findings indicate indirect support for the ability of community policing to build informal social control and suggest that general satisfaction with the police is important to neighborhood crime control strategies.  相似文献   
828.
《Science & justice》2023,63(3):364-368
The stamp markings on wooden surfaces, which are placed on trees and products including antiques, indicate the status of trees and involve identifying data regarding the products. Such markings are obliterated either to facilitate illegal logging or to conceal product information. Despite the wide literature on the restoration of obliterated characters on metal and polymer surfaces, the recovery of defaced characters on wooden surfaces appears to be understudied. Several reference texts in the forensic marks’ examination literature suggest that water, water vapor, and alkaline solutions are useful in restoring the abraded markings on the wood. Since there does not seem to be any experimental study proving such success, this study aimed to fill this gap. This study conducted experimental research by using water, ethanol, ammonia, and chloroform to recover the scraped characters on samples obtained from walnut, beech, spruce, oak, and cedar trees. The cold-stamped characters, which were defaced at varying depths, were restored using vapor and liquid phases of four solvents. While the vapor phases of water, ethanol, and ammonia yielded good outcomes on all types of wooden surfaces, the liquid phases did not seem to be useful in the revisualization process. The response of the vapors, which varied between 62 and 220 s, depended on the type of wood. The restoration technique developed in this research offers the possibility of on-site usage, easy application, utilization of low-cost solvents, rapid recovery, and effectiveness on various wooden surfaces. Overall, the restoration methodology used in this research appears to be fruitful in retrieving identifying information on wooden samples.  相似文献   
829.
网络安全审查是一个系统工程,其涵盖的层面和内容十分广泛,既涉及技术,也涉及立法和管理等问题。美国拥有较为成熟的网络安全审查制度,在国家立法层面,有完善的网络安全审查相关法律法规;在管理层面,有网络安全审查机构以及一整套的国家关键信息基础设施保护审查手段、信息通信技术供应链审查等防线,以重点保障国家网络安全。美国之所以成为信息强国,离不开其网络安全保障、信息通信技术自主可控和管理体制的健全,其中一个重要制度便是其网络安全审查制度,既控制了产业,又影响了世界,极具借鉴意义。目前,中国是网络大国,但还不是网络强国,大量外国信息技术产品已经深度渗透至中国的关键信息基础设施,中国面临着严峻的网络安全保障、信息通信技术自主可控和网络安全管理体制等方面的挑战。要想保障国家安全、网络安全,网络安全审查必然要成为国家安全审查的重要组成部分。这就要求中国在关键信息基础设施领域尤其是信息技术通信产品、服务、系统以及相关投资领域开展是否危及国家安全、网络安全的审查,并建立完善的适应中国国情的网络安全审查制度。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号