全文获取类型
收费全文 | 546篇 |
免费 | 4篇 |
专业分类
各国政治 | 6篇 |
工人农民 | 4篇 |
世界政治 | 6篇 |
外交国际关系 | 15篇 |
法律 | 211篇 |
中国共产党 | 10篇 |
中国政治 | 15篇 |
政治理论 | 36篇 |
综合类 | 247篇 |
出版年
2023年 | 2篇 |
2022年 | 8篇 |
2021年 | 13篇 |
2020年 | 13篇 |
2019年 | 6篇 |
2018年 | 23篇 |
2017年 | 10篇 |
2016年 | 5篇 |
2015年 | 7篇 |
2014年 | 35篇 |
2013年 | 44篇 |
2012年 | 24篇 |
2011年 | 55篇 |
2010年 | 46篇 |
2009年 | 63篇 |
2008年 | 21篇 |
2007年 | 32篇 |
2006年 | 32篇 |
2005年 | 33篇 |
2004年 | 29篇 |
2003年 | 16篇 |
2002年 | 22篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1998年 | 1篇 |
排序方式: 共有550条查询结果,搜索用时 15 毫秒
71.
Helen Kemmitt Michael Dizon Karen Roberts Bianca Chouls 《Computer Law & Security Report》2010,26(6):655-658
This is the latest edition of Baker &; McKenzie's column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
72.
知情权与信息获取权——以英美为比较法基础的概念界分 总被引:1,自引:0,他引:1
知情权与信息获取权是两个不同的概念,在我国行政法学界有被混淆的倾向。以英美为基础的比较法视野看,两者在逻辑结构、规范表述和制度印证层面,都有着不同的特质。这对概念的界分,已然构成其信息自由立法理念的奠基。以此来反思概念混淆对我国现行《政府信息公开条例》在规范结构、立法理念和制度建构中的可能影响。并以概念界分为契机,指向未来更为完善的政府信息公开立法。 相似文献
73.
政府信息公开行政诉讼有关问题研究 总被引:3,自引:0,他引:3
正确适用《政府信息公开条例》,依法审理政府信息公开行政案件,对于推进服务型政府建设、保障社会公众的知情权具有重要意义。但是,作为一种新类型案件,政府信息公开案件在司法实践中争议颇多,而政府信息的界定、政府信息公开例外情形的把握、政府信息公开案件的裁判方式和诉权滥用的防范应对等问题尤为值得关注,司法审查层面须有判断标准和合理应对。 相似文献
74.
林晓光 《江南社会学院学报》2010,(2):48-51
冷战结束以来,日本政府在加紧走向"政治强国"、"军事强国"的同时,也在加紧走向"情报强国"。设立"国家安全会议",强化国家安全战略的决策机制;整顿战后建立的情报体制,加强情报的搜集和分析能力;加紧建立太空情报体系,编织严密的卫星侦察网络;拓展对外情报合作,建立国际性情报网络。日本正从上述多个方面不断加强情报搜集的组织、体制和情报搜集功能的建设。 相似文献
75.
Václav Janeček 《Computer Law & Security Report》2018,34(5):1039-1052
This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, this article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates. 相似文献
76.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(1):178-185
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
77.
Nick Pantlin 《Computer Law & Security Report》2018,34(3):653-656
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
78.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(6):1364-1376
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
79.
Abstract This research compares resident, peer and staff reports of bullying and victimization in one open facility and one secure facility for young offenders. The prevalence of bullies and victims was higher according to resident reports (self-reports) than according to peer or staff reports. There was significant agreement between residents, peers, and staff in identifying bullies and victims. The majority of bullies and victims identified by peers and/or staff were also identified by self-reports. Making the plausible assumption that bullies and victims tend to be concealed, it is concluded that self-reports (in the context of an individual interview) provide the most reliable and valid information about bullies and victims in young offender institutions. Hence, anti-bullying strategies should be based on self-report data. 相似文献
80.
信息技术与课程整合是指将信息技术有机地与教学结构、课程内容、课程资源以及课程实施等融合为一体,使其成为课程的有机组成部分,成为与课程内容和课程实施高度和谐自然的有机部分。上海公安高等专科学校正是基于以上理念,对治安类课程与信息技术整合进行了为期三年的实践探索,并取得了一定的成效。 相似文献