首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   467篇
  免费   14篇
各国政治   20篇
工人农民   11篇
世界政治   17篇
外交国际关系   41篇
法律   72篇
中国共产党   4篇
中国政治   37篇
政治理论   47篇
综合类   232篇
  2024年   2篇
  2023年   5篇
  2022年   6篇
  2021年   7篇
  2020年   10篇
  2019年   6篇
  2018年   13篇
  2017年   9篇
  2016年   2篇
  2015年   7篇
  2014年   24篇
  2013年   54篇
  2012年   27篇
  2011年   36篇
  2010年   34篇
  2009年   49篇
  2008年   35篇
  2007年   31篇
  2006年   35篇
  2005年   28篇
  2004年   18篇
  2003年   20篇
  2002年   10篇
  2001年   9篇
  2000年   4篇
排序方式: 共有481条查询结果,搜索用时 0 毫秒
181.
网络对青少年社会化的影响有利有弊。一方面,起到了增强社会化的自主性、促进知识技能的学习、拓宽人际互动的范围和提供广阔的虚拟角色演绎空间等积极作用;另一方面,造成了社会化的缺陷、道德社会化的偏离、人生价值观的冲击以及自我角色的失调等负面影响。应该加强网络的管理,加强青少年健康上网的引导和社会化方面的教育,促进青少年健康地社会化。  相似文献   
182.
The 1980 Hague Convention on the Civil Aspects of International Child Abduction (“the Convention”) provides for the prompt return to the country of habitual residence of children taken by a parent from one country to another. It was created to address the threshold problem in such cases, that is, which court should determine the rights of the parties involved. In a case under the Convention, the court's concern is which country is the country of habitual residence and practical aspects of the return to ensure the safety of the child and the taking parent. This article will discuss the formation of the International Hague Network of Judges (IHNJ), why it is crucial in the advancement of the Convention's goals, and, specifically, what it does to educate judges and facilitate communication between judges, and how the IHNJ can facilitate the return, including providing information on services, procedures, and protections offered in the countries of return.  相似文献   
183.
从社会网络的视角来看,凭祥归侨的社会适应策略可以分为嵌入、建构和调试三种。其在生产、生活和心理上的社会适应充分利用了其所拥有的社会网络。在这一过程中,丰富的社会资本和中越边境文化同源是归侨适应凭祥社会的有利条件,而他者身份、个体力量薄弱、原有优势衰退是其在社会适应中的主要困难。  相似文献   
184.
Breaches of security, a.k.a. security and data breaches, are on the rise, one of the reasons being the well-known lack of incentives to secure services and their underlying technologies, such as cloud computing. In this article, I question whether the patchwork of six EU instruments addressing breaches is helping to prevent or mitigate breaches as intended. At a lower level of abstraction, the question concerns appraising the success of each instrument separately. At a higher level of abstraction, since all laws converge on the objective of network and information security – one of the three pillars of the EU cyber security policy – the question is whether the legal ‘patchwork’ is helping to ‘patch’ the underlying insecurity of network and information systems thus contributing to cyber security. To answer the research question, I look at the regulatory framework as a whole, from the perspective of network and information security and consequently I use the expression cyber security breaches. I appraise the regulatory patchwork by using the three goals of notification identified by the European Commission as a benchmark, enriched by policy documents, legal analysis, and academic literature on breaches legislation, and I elaborate my analysis by reasoning on the case of cloud computing. The analysis, which is frustrated by the lack of adequate data, shows that the regulatory framework on cyber security breaches may be failing to provide the necessary level of mutual learning on the functioning of security measures, awareness of both regulatory authorities and the public on how entities fare in protecting data (and the related network and information systems), and enforcing self-improvement of entities dealing with information and services. I conclude with some recommendations addressing the causes, rather than the symptoms, of network and information systems insecurity.  相似文献   
185.
For more than a decade now, the right of communication to the public has been developed and interpreted by the CJEU, leading to a complex set of criteria that must be analysed on a case-by-case basis. When confronted with the copyright status of hyperlinking, the Court built upon that background in a string of cases that ended up reshaping the traditional contours of the exclusive right. The practice of linking, an essential element of the Internet and a crucial tool for any online activity carried out by entities and individuals, is now affected by the new scope of the communication to the public right, with direct consequences on the liability hyperlinkers may incur. This article will examine the status of the Court's case law to provide insights that may facilitate its interpretation and application. It will consider in particular how hyperlinkers are exposed to liability and which duties of care result from the Court's approach. It will also examine how the new understanding of hyperlinks from a copyright perspective may be relevant in the context of the proposed Directive on Copyright in the Digital Single Market.  相似文献   
186.
Chinese officials are increasingly turning to a policy known as Informatisation, connecting industry online, to utilise technology to improve efficiency and tackle economic developmental problems in China. However, various recent laws have made foreign technology firms uneasy about perceptions of Rule of Law in China. Will these new laws, under China's stated policy of “Network Sovereignty” (“网络主权” “wangluo zhuquan”) affect China's ability to attract foreign technology firms, talent and importantly technology transfers? Will they slow China's technology and Smart City drive? This paper focuses on the question of whether international fears of China's new Cyber Security Law are justified. In Parts I and II, the paper analyses why China needs a cyber security regime. In Parts III and IV it examines the law itself.  相似文献   
187.
中国互联网络信息中心(CNNIC)一直致力于互联网发展的调查和研究,每年两次的互联网统计报告全面、系统、客观、真实地展现了互联网的发展现状、网民的行为和习惯以及互联网发展的趋势,为我们开展互联网管理工作提供了有效的依据。因此,公安机关解读这个报告,能使我们对互联网有一个清晰的了解,寻找工作结合点和着力点,对作出准确的判断和科学的决策具有深刻意义。  相似文献   
188.
An IEEE 802.11 wireless device can leave traces of its presence in the volatile memories of nearby wireless devices. While the devices need to be in radio range of each other for this to happen, they do not need to be connected to the same network—or to any network at all. Traces appear in the form of full wire-type frames; a residue of the signals in the ether. We examine types of information that can be extracted from such residual frames and explore the conditions under which traces develop and persist. Their availability is determined by factors in both in the external environment (the types of signals in the ether) and the internal environment (the configuration and particulars of a device's wifi stack). To isolate some of these factors, we have created memory dumps of devices in various environments and configurations. Analysis of the dumps has offered insights into the conditions determining creation and decay of the traces. The results indicate that they will be available in a limited number of real-world scenarios. We conclude with practical advice on triaging and preservation.  相似文献   
189.
Although officially non-aligned during the Cold War, India remained closely aligned with the Soviet Union. After the Cold War, Indo-Russian ties have remained strong; currently the two countries share a Strategic Partnership in addition to numerous other bilateral treaties. When the United States first replaced Russia as India’s largest defence supplier, it made international headlines in security circles. Since then, there has been much speculation on the future of Indo-Russian ties. Since the essence of the Indo-Russian relationship is considered to be the large-scale military trade between the two states, the toppling of Russia as India’s premier defence provider naturally led to dismal predictions about the strength of their future ties. However, this approach discounts the various measures that both India and Russia have taken to institutionalize their friendship. By conducting a systematic analysis of the Indo-Russian bilateral treaties, this article assesses the levels of cooperation within this dyad. By using network analysis it demonstrates that the Indo-Russian relationship is cooperative rather than ad hoc, leading to deeper institutionalization that is unlikely to shift in the recent future.  相似文献   
190.
The Internet is often seen as borderless and unmanageable and, therefore, not fully understandable. Starting from the assumption that it can be understood, we begin an attempt to organize the Internet by characterizing it as a behavior space in which groups categorized as societies, communities, and governments interact. We emphasize the utility of organizing the Internet and focus specifically on attempts by societies, communities, and governments to regulate the flow of information. We posit an Internet regulation process model that, we believe, explains most of the efforts to regulate the Internet. In addition, we provide some insight into the relationships between and within the various groups involved. Our conclusions center on the observation that political power (especially Western political power) has been a defining factor in the regulation of the Internet as governments have played a prominent role in regulatory action.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号