首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   823篇
  免费   6篇
各国政治   8篇
工人农民   4篇
世界政治   8篇
外交国际关系   15篇
法律   252篇
中国共产党   10篇
中国政治   24篇
政治理论   41篇
综合类   467篇
  2023年   2篇
  2022年   11篇
  2021年   16篇
  2020年   15篇
  2019年   12篇
  2018年   27篇
  2017年   12篇
  2016年   7篇
  2015年   8篇
  2014年   48篇
  2013年   65篇
  2012年   37篇
  2011年   90篇
  2010年   61篇
  2009年   75篇
  2008年   42篇
  2007年   52篇
  2006年   48篇
  2005年   54篇
  2004年   42篇
  2003年   41篇
  2002年   37篇
  2001年   18篇
  2000年   8篇
  1998年   1篇
排序方式: 共有829条查询结果,搜索用时 15 毫秒
641.
电子政务如何更好地满足不同用户的需求,业已成为当前中国电子政务研究的重点方向。在理论上,本研究首先将中国电子政务的所有服务分为三大类:"电子学习""电子行政"和"电子参与",然后对用户的性别、年龄、教育背景、职业等个人特征与其信息行为偏好之间的相关关系提出了一系列理论假设;在实证上,于2006年进行了针对天津市城市居民政府网站使用情况的问卷调查,对中国电子政务的用户特征及其信息行为偏好之间一系列理论假设进行了检验。实证研究表明,用户对政府网站服务功能的选择性使用所呈现的差异,是由用户身份特征的差异性和政府网站建设的局限性两个方面决定的。根据研究结论,提出了一系列提高政府网站的使用率、减少网络用户为获得政府信息和服务所需的时间和精力的投入、提高登录政府网站用户的满意度等方面的政策建议。  相似文献   
642.
契合"放管服"改革理念的数据安全认证,在数字时代整个规制法体系中必将占据日益重要的地位。数据安全认证通过声誉评价机制,可以引导、激励互联网企业守法合规经营,可以增强用户对中小微互联网企业和新兴数字产业的信任感,可以避免"一刀切"的政府规制,可以满足社会公众多元的数据安全需求。数据安全认证机构应具有高度的独立性与专业性,防止其被互联网企业"俘获"或成为政府的"附庸"。宜实行自愿为主、强制为辅的数据安全认证模式。认证程序应强调公正透明性,认证标准应注重评价企业数据合规的制度建设。根据过错责任原则,分别设置数据安全认证机构"相应的赔偿责任"或"连带责任",并加大对数据安全认证违法行为的公法责任追究。科学构建法治化的数据安全认证体制机制,不仅是保障数据安全的现实需要,而且是弥补数字时代政府规制缺陷的迫切需求。  相似文献   
643.
曾有学者评价香港特区是一个"回避法定知情权的开放政府"。1这一独特的制度究竟是如何运作的,颇令人好奇。2013年,免费电视牌照事件持续发酵,一波三折。透过该事件,可以看到立法机关脱离了行政机关,变成行政机关的监察者、制衡者与竞争者;独立的司法机关的政治影响力也越来越大。如何处理好保密与公开的关系、处理好行政效率与公众利益的关系,如何更能回应民众诉求,如何进一步提升施政能力和水平,都是摆在政府面前的重大课题。  相似文献   
644.
How can European democratic states respond to Russian information warfare? This article aims to enable and spur systematic research of how democracies can respond to the spread of distorted information as part of information warfare. The article proposes four ideal-type models representing different strategies that democratic governments can employ; blocking, confronting, naturalising and ignoring. Each strategy is illustrated by ways of empirical examples of strategies applied by European states in view of what is regarded as an unwelcome Russian strategic narrative that is spread as part of information warfare. We problematise each strategy and explore reasons for why states choose one strategy over another. We then explore how different strategies might contribute to destabilise or stabilise the security environment and how they resonate with democratic values. Finally, we contribute to theorising on strategic narratives by highlighting that the choice of strategy will influence states in their formation of strategic narratives. We thus further theorising on strategic narratives by highlighting the link between strategies and narratives, thus identifying one central dynamic in how narratives are formed.  相似文献   
645.
个人信息保护已经成为互联网时代的重大法律问题之一。个人信息保护涉及多个法律领域、多种法律手段,因此必须采取综合治理的方式来解决个人信息保护问题,构建个人信息保护的多元法律体系。十三届全国人大三次会议将于2020年3月审议表决《民法典》,还将计划制定《个人信息保护法》。因此,我国个人信息保护立法将迎来历史性突破,以民事基本法与行政单行法构筑的我国个人信息保护法律体系将基本形成。  相似文献   
646.
个人信息保护存在私法诉讼与行政规制两种主要路径,私法诉讼多以侵权之诉的形式展开。由于个人信息处理者与信息主体的地位失衡,信息主体举证困难,维权难度高;由于损害难以界定,诉讼存在成本与收益不均衡的激励困境;同时,个别性的诉讼也难以有效回应系统性的社会风险。行政规制路径以基本权利的国家保护义务作为法权基础,在专业性、信息充分程度、治理效率等方面具有比较优势。个人信息保护立法应当更妥善地处理两种路径的协调。未来个人信息保护的行政规制路径需要进一步明确规制体制,充分运用行政处罚、自我规制、内部管理型规制、第三方规制等多元化的规制机制。  相似文献   
647.
Despite the dramatic rise in use of militarized weapons, equipment, and tactics by police departments across the nation, no study has examined the opinions of those responsible for designing, funding, and implementing police militarization in the United States. Therefore this study collected and analyzed opinion data from 465 key stakeholders from the 114th Congress U.S. House of Representatives, law enforcement executives, and local police officers regarding police militarization. Results suggest that while most practitioners and policymakers favor police militarization, Congress and law enforcement differ in support of critical issues such as oversight of military procurement programs, use of surplus military weapons and vehicles, and overall support for the militarization of policing in the United States.  相似文献   
648.
The “General Principles of Civil Law” of our country (article 110 and article 111) protects the privacy and information separately, the problem in theory and practice is that, in this two yuan protection mode, privacy and information can be clearly distinguished from or not? From the perspective of foreign legislation, majority legislation take the “one system” protection, which does not distinguish between information and privacy, which the reason is the privacy and the personal information are difficult to distinguish. I agree that the “General Principles of Civil Law” of China's “dual system” protection for privacy and information, and consider that the privacy and information can be distinguished, and we should apply the “Rule of Thirds” to distinguish between privacy and information, which is divided into purely personal privacy, privacy information, purely personal information.On the basis of the claim basis for the protection of privacy and information, the claim basis whose privacyand information is infringed exists in the eighth chapter of the “General Principles of Civil Law”, and several special laws such as “Tort Liability Law” and “Network Security Act”. Although the “General Principles of Civil Law”‘s Article 109-111 stipulated the provisions for the protection of right of privacy and information, but there is no effect of independent norms, because in these three articles, there is no protective measures to solve the problem that what is the civil juristic consequences when the privacy and information are violated.  相似文献   
649.
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.  相似文献   
650.
近年来,各地基层公安机关结合形势和本地实际积极探索警务创新,如江西省宜春市公安局成功地尝试了刚性法律规定下体现人情关怀的"背景调查与跟踪回访"制度、警民互动的平台"双星"评选、提升公安执法公信力的"警媒论坛"、救赎心灵的窗口"光明电视台"等注重服务与沟通的警务创新活动,坚持走群众路线,履行"忠诚、为民、公正、奉献"的人民警察核心价值观,培养塑造了富有宜春公安"亲民、爱民、为民"特色的敬业精神,有效地维护了当地社会治安秩序和经济建设的稳定发展,对目前基层公安机关的警务创新实践具有以下启示:警务创新是公安机关维护社会稳定与发展的不竭动力,队伍素质是推动公安工作发展的根本,警务公关是优化社会治安环境的重要途径。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号