全文获取类型
收费全文 | 761篇 |
免费 | 2篇 |
专业分类
各国政治 | 6篇 |
工人农民 | 4篇 |
世界政治 | 6篇 |
外交国际关系 | 15篇 |
法律 | 254篇 |
中国共产党 | 10篇 |
中国政治 | 23篇 |
政治理论 | 38篇 |
综合类 | 407篇 |
出版年
2023年 | 3篇 |
2022年 | 9篇 |
2021年 | 13篇 |
2020年 | 15篇 |
2019年 | 6篇 |
2018年 | 23篇 |
2017年 | 10篇 |
2016年 | 5篇 |
2015年 | 7篇 |
2014年 | 45篇 |
2013年 | 53篇 |
2012年 | 29篇 |
2011年 | 73篇 |
2010年 | 62篇 |
2009年 | 81篇 |
2008年 | 39篇 |
2007年 | 54篇 |
2006年 | 48篇 |
2005年 | 48篇 |
2004年 | 48篇 |
2003年 | 31篇 |
2002年 | 32篇 |
2001年 | 18篇 |
2000年 | 5篇 |
1998年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有763条查询结果,搜索用时 15 毫秒
101.
Václav Janeček 《Computer Law & Security Report》2018,34(5):1039-1052
This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, this article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates. 相似文献
102.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(1):178-185
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
103.
Nick Pantlin 《Computer Law & Security Report》2018,34(3):653-656
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
104.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(6):1364-1376
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
105.
Abstract This research compares resident, peer and staff reports of bullying and victimization in one open facility and one secure facility for young offenders. The prevalence of bullies and victims was higher according to resident reports (self-reports) than according to peer or staff reports. There was significant agreement between residents, peers, and staff in identifying bullies and victims. The majority of bullies and victims identified by peers and/or staff were also identified by self-reports. Making the plausible assumption that bullies and victims tend to be concealed, it is concluded that self-reports (in the context of an individual interview) provide the most reliable and valid information about bullies and victims in young offender institutions. Hence, anti-bullying strategies should be based on self-report data. 相似文献
106.
信息技术与课程整合是指将信息技术有机地与教学结构、课程内容、课程资源以及课程实施等融合为一体,使其成为课程的有机组成部分,成为与课程内容和课程实施高度和谐自然的有机部分。上海公安高等专科学校正是基于以上理念,对治安类课程与信息技术整合进行了为期三年的实践探索,并取得了一定的成效。 相似文献
107.
Steven H. Chaffee Melissa Nichols Saphir Joseph Graf Christian Sandvig Kyu Sup Hahn 《政治交往》2013,30(3):247-272
Research following the "selective exposure" model has focused on avoidance of political messages with which a person might disagree. But positive attention to such "counter-attitudinal" messages is worthy of study, in part because normative theories of democracy value exposure to information that might disturb citizens' political predispositions. Surveys of youth (N = 417) and parents (N = 430) examine attention to newspaper, television, and Web messages about candidates. While there is somewhat more attention to messages about and for a person's favored political candidate or party, forms of political involvement (knowledge, curiosity, and discussion) that predict this "attitude-consistent" attention also predict counter-attitudinal attention at least as strongly. Parents' education and students' exposure to civics lessons also predict both kinds of attention. These results suggest that attention to counterattitudinal political messages is worthy of further study as an important goal of political socialization and a criterion of citizen performance in democracy. 相似文献
108.
The extent to which the electorate uses issue information to update their candidate evaluations over the course of political campaigns has often raised questions about citizen competence. Using a ten-week panel experiment designed to capture the low-information context of most congressional races this study contributes to our understanding of when and by what processes issue information produces enduring effects. Findings reveal that when voters need to assess an ideologically moderate candidate, they rely less on partisan cues but instead of storing issue information in long-term memory – either via a memory-based or on-line process – considerations in short-term memory remained one of the most powerful predictors of candidate evaluation, particularly when new issue information deviated from partisan norms. 相似文献
109.
Hidetaka Yoshimatsu 《Asian Journal of Political Science》2013,21(3):227-247
After the early 1990s, the wave of regionalism covered broader areas in the world, and Northeast Asia, which had weak regional cohesion largely due to history-oriented animosity, gradually developed initiatives for regional cooperation since the late 1990s. This article seeks to address why and how China, Japan, and South Korea have pursued regional cooperation by relying on the concept of ‘regional governance’. It advances two arguments. First, the governments of China, Japan, and South Korea have identified the avoidance of risk from uncertainty as a major objective of promoting trilateral cooperation in specific functional areas. Second, they have gradually intensified the harmonisation of regulatory frameworks in the cooperative process in collaboration with non-state actors. The article examines the arguments by tracing the evolution of trilateral cooperation in environmental protection and information technology (IT) development. 相似文献
110.
Scott AllardyceLibby Amos Nadine BleachPatricia Collis Claire DaviesTim Heaps Adam LavertyTom Ohta Sam TuxfordMark Watts Faye WeedonOsman Zafar 《Computer Law & Security Report》2013
This is the latest edition of the Bristows column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献