首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   174篇
  免费   1篇
各国政治   1篇
工人农民   2篇
世界政治   1篇
法律   58篇
中国共产党   1篇
中国政治   28篇
政治理论   9篇
综合类   75篇
  2024年   1篇
  2023年   3篇
  2022年   3篇
  2020年   3篇
  2019年   3篇
  2018年   4篇
  2017年   2篇
  2016年   1篇
  2014年   12篇
  2013年   7篇
  2012年   15篇
  2011年   12篇
  2010年   18篇
  2009年   16篇
  2008年   15篇
  2007年   8篇
  2006年   11篇
  2005年   17篇
  2004年   8篇
  2003年   9篇
  2002年   2篇
  2001年   3篇
  1999年   2篇
排序方式: 共有175条查询结果,搜索用时 93 毫秒
21.
Cryptocurrency has become the new hot investment for young investors. Everyone wants to get in on the next cryptocurrency bubble, and there are those that want to exploit this excitement and exploit children. Influencers who have young audiences are pushing cryptocurrency investments onto their audiences and not fully educating them on the risks. To avoid this exploitation, The Securities and Exchange Commission should actively regulate decentralized exchanges where children purchase cryptocurrency, put age limit regulations into place, and require know your customer systems to verify that minors are not purchasing cryptocurrency without the consent of a guardian.  相似文献   
22.
ABSTRACT

One of the main objectives of the Lisbon Treaty was to increase the democratic legitimacy of the European Union (EU). Member state parliaments were, therefore, equipped with new tools for monitoring compliance of EU draft laws with the principle of subsidiarity. The aim of this article is to shed some light on the unicameral Maltese Parliament’s ex ante subsidiarity scrutiny of European legislation. Based on the island’s historical and cultural background, the Kamra tad-Deputati confers great importance to the application of subsidiarity, although it is still in its learning curve over the rapid and effective implementation of such procedures.  相似文献   
23.
在我国信用卡消费大众化的同时,利用信用卡实施犯罪呈上升趋势,犯罪手段不断向高科技化、集团化、专业化、规模化发展,案件实施过程更为隐蔽,手法不断翻新,其危害程度呈现出逐年严重态势。文章通过总结信用卡犯罪的现状、特点及发展趋势对在信用卡犯罪案件侦查中存在的主要问题进行了全面分析,理论结合实际地提出了打击对策,为侦查机关打击信用卡犯罪,提供了参考。  相似文献   
24.
借卡人与名义持卡人之间存在事实行为形成的债权债务关系;名义持卡人与银行之间存在法律行为所形成的债权债务关系;借卡人与银行之间不存在影响行为定性评价的法律关系。所以,挂失并取走他人存在借用本人银行卡内钱款的行为在民法层面,只是不履行债务行为的一种,并且这种不履行完全属于当事人意志之外的不履行,因此缺乏对该种行为进行刑法规制的必要性。  相似文献   
25.
随着互联网金融的发展,花呗等类似信用卡的透支工具出现在人们的消费方式中,以花呗套现为代表的新型套现方式也成为问题。司法实践中,围绕冒用他人支付宝账户进行花呗套现行为应如何认定的问题争论不休,有观点主张按传统信用卡诈骗罪处理,亦有观点则认为不应将花呗产品认定为信用卡,其更符合盗窃、诈骗罪的犯罪构成,还有观点认为可将花呗套现行为解释为非法经营罪进行规制。逐一分析上述观点,结合花呗套现自身特点,在恪守罪刑法定原则的前提下,可以找到对于该种行为的合理规制。  相似文献   
26.
当今,消费卡式消费合同日渐走入消费者的日常生活,其消费行为的稳定、简便、时尚吸引了众多商家和消费者,但由于缺乏相应的法律监管,给一些不法商家提供了可乘之机,侵害了消费者的合法权益。因此,应加强对消费卡式消费合同的法律监管,明确规范消费卡的发行、使用以及资金安全保障等方面的行为,防范消费卡式消费合同的风险,从而更好地保护消费者的合法权益。  相似文献   
27.
Abstract: An online forensic dental identification exercise was conducted involving 24 antemortem–postmortem (AM–PM) dental radiograph pairs from actual forensic identification cases. Images had been digitally cropped to remove coronal tooth structure and dental restorations. Volunteer forensic odontologists were passively recruited to compare the AM–PM dental radiographs online and conclude identification status using the guidelines for identification from the American Board of Forensic Odontology. The mean accuracy rate for identification was 86.0% (standard deviation 9.2%). The same radiograph pairs were compared using a digital imaging software algorithm, which generated a normalized coefficient of similarity for each pair. Twenty of the radiograph pairs generated a mean accuracy of 85.0%. Four of the pairs could not be used to generate a coefficient of similarity. Receiver operator curve and area under the curve statistical analysis confirmed good discrimination abilities of both methods (online exercise = 0.978; UT‐ID index = 0.923) and Spearman’s rank correlation coefficient analysis (0.683) indicated good correlation between the results of both methods. Computer‐aided dental identification allows for an objective comparison of AM–PM radiographs and can be a useful tool to support a forensic dental identification conclusion.  相似文献   
28.
The personal ID card is a document carried by most Germans, but rarely used. This could change in the future: According to the new law on identification cards and electronic proof of identity (Gesetz über Personalausweise und den elektronischen Identitätsnachweis, PAuswG), the ID card, with its proof of identity, will gain a new functionality, making it applicable for diverse Internet transactions. Functionally, the electronic proof of identity corresponds to existing non-electronic personal proof of identity guidelines in legal and business connections. However, its concrete, technical application opens up many issues regarding contracts and data privacy laws. On both the legal and the technical level, the German approach departs from other European countries, as it strictly distinguishes the electronic proof of identity from the electronic signature function, which the new ID card also provides. It remains to be seen whether the various projects of the EU Member States will become legally and technically interoperable in the near future.  相似文献   
29.
信息社会人们之间的交往需要权威的身份证明,由公权力介入推行的身份证明制度满足了这种需要,并在社会生活中广泛应用.但是只有通过法律规制明确公民个人信息自决权,并设定政府不侵犯和保护个人信息的责任,才能真正发挥身份证证明身份的权威作用.我国日前身份证法律规制的弊端在于政府没有履行必要的个人信息保护职责,公民的个人信息主体地位缺失,导致了政府滥用职权和个人权益受到损害.所以必须以保护个人信息为核心完善我国的居民身份证法律规制制度.  相似文献   
30.
The highly connected nature of the current era has raised the need for more secure systems, and hence the demand for biometric-based authentication methods. In 2013, the Mauritian Government invested massively in the collection of data, and implementation of the national biometric identity card scheme. The latter has suffered a number of contestations among the population, and several cases were consequently filed at the Supreme Court of Mauritius to oppose the use of this biometric card. The main concern was the collection of biometric data which posed threats to the privacy of individuals. Additionally, the collection and retention of biometric data lead to security issues. In this paper, the challenges with respect to the usage of the biometric card are analysed. The laws governing data protection are discussed, together with the legal framework used for data collection and retention. Following the court decisions, several amendments have been made to the existing laws in order to cater for the usage of biometric data for the public interest. Finally, recommendations are made with regards to a legal framework which will enhance the security of biometric data, and eventually encouraging public acceptance of this biometric identification system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号