全文获取类型
收费全文 | 2505篇 |
免费 | 72篇 |
专业分类
各国政治 | 30篇 |
工人农民 | 39篇 |
世界政治 | 25篇 |
外交国际关系 | 61篇 |
法律 | 758篇 |
中国共产党 | 61篇 |
中国政治 | 434篇 |
政治理论 | 213篇 |
综合类 | 956篇 |
出版年
2024年 | 2篇 |
2023年 | 17篇 |
2022年 | 24篇 |
2021年 | 29篇 |
2020年 | 74篇 |
2019年 | 48篇 |
2018年 | 62篇 |
2017年 | 41篇 |
2016年 | 45篇 |
2015年 | 47篇 |
2014年 | 176篇 |
2013年 | 214篇 |
2012年 | 146篇 |
2011年 | 183篇 |
2010年 | 191篇 |
2009年 | 173篇 |
2008年 | 165篇 |
2007年 | 136篇 |
2006年 | 159篇 |
2005年 | 144篇 |
2004年 | 151篇 |
2003年 | 127篇 |
2002年 | 104篇 |
2001年 | 68篇 |
2000年 | 34篇 |
1999年 | 14篇 |
1996年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
排序方式: 共有2577条查询结果,搜索用时 15 毫秒
321.
《辽宁个人信息保护现状调查及立法建议》课题组 《辽宁公安司法管理干部学院学报》2010,(4):77-79
近年来,人们在享受科技发展与网络信息技术普及带来的便利的同时,也正经历着个人信息侵权的困扰。个人信息侵权行为具有侵害手段的技术性、侵害方式的隐蔽性、侵害领域的无地域性、侵害后果的严重性的特点,而相对于个人信息侵权行为,个人信息保护的立法却相对滞后,个人信息的界定狭窄,个人信息的法律保护无系统、比较零散,法律保护范围比较狭窄,而且保护手段比较单一,因此,必须完善个人信息侵权行为的保护,加快个人信息保护的立法进程和行业自律建设。 相似文献
322.
Nour-Mohammad Yaghoubi 《美中公共管理》2010,(5):41-46
Information technology (IT) has been able to facilitate the rural development through empowering and integrating the accessibility of the villagers (cottagers) to the available knowledge and information and the opportunities to different extents. The success of IT approach in rural development requires some initial efforts to prepare applying IT in order to achieve it. Awareness of IT-based rural development infrastructures and subsequently preparation of required infrastructures are one of the most important steps towards delivering the development program. Considering the importance of this subject, in this paper, we have tried to identify the IT-based rural development infrastructures, using the ideas of experts in IT and rural development across the Iran country. The data analysis of 171 respondents with T-student test showed that the factors of social-cultural, organizational-managerial, technical-telecommunication and legal-legitimate are the IT-based infrastructures of rural development. Successful provision of these elements depends on the existence of strategic alignment approach and focuses on the balanced maturity of the infrastructures. 相似文献
323.
Parallel to the advancements in information and communication technologies, certain risks and security problems also arise, one of which is the authentication problem. In order to control who can have access to information sources, it is of utmost importance to develop an advanced authentication mechanism. It is through this mechanism that one can protect personal information, and prevent unauthorized access to the information or services provided. Likewise, this mechanism can block unauthorized persons to change or release information that is not public. All the work being undertaken in this field can be named as access control. The concept of authentication is among those concepts that have been studied for a long time in Turkey in the context of rapidly growing e-transformation efforts. In the process of e-transformation, the transformation circle is completed by first defining the concept of modeling business processes, followed by the formation of automation process, and lastly, providing services in electronic medium. 相似文献
324.
Teplova Tamara Valeriy Udaltsov 《美中公共管理》2010,(3):32-38
In this paper we present the research results of key factors that determine the investment behavior of Russian companies during 2004-2008. The emphasis is made on the policy of capital expenditures. In the analysis, it included maeroeconomic, some industry factors (growth rate, spread of efficiency (ROIC-WACC), market and industry risks) as well as some internal factors related to the equity structure and the quality of corporate governance. 相似文献
325.
运用信息网络科技创建村(社)级惩防腐败体系的实践与思考 总被引:1,自引:0,他引:1
依托较为成熟的信息网络,努力探索和创建村(社)级特色惩防腐败体系,是广东省江门市蓬江区基层农村党风廉政建设的一大特色和亮点。地处城乡结合部、基础较好的篁庄股份合作经济联合社,按照广东“开放、动态、创新”惩防腐败体系和“数字珠三角洲”的需要,运用信息网络科技,打造“数字篁庄”,进行党风廉政宣传教育,实行社务网上阳光工程,增强了社务的公开、透明程度,拉近了干部、党员与群众的距离,促进了社务与民生的和谐,取得了良好成效,积累了一些经验,为深入推进全区党风廉政建设,促进社会和谐发展,走出了一条新路。 相似文献
326.
股东代理权征集对上市公司治理具有"双刃剑"的作用,其优势与弊端共存的特性使其更需严格规制以防止被滥用。从法理层面进行分析、并结合以往征集投票权实践所暴露的问题可知,新《证券法》第90条相比以前法律规范虽有重大进步,但仍存在对代理权征集滥用规制的不足。可以运用代理人道德风险理论、信义义务理论解释和规制代理权征集滥用行为。分析新《证券法》第90条规定可知,对征集人资格、条件和行使权利程序规定的不足,对征集过程中信息披露和违法征集损害赔偿责任等事项的粗放式规定都可能带来代理权征集的滥用。为了更有效地规制代理权征集滥用行为,应从限缩征集人资格和条件、确立代理权征集决策程序的内部控制机制、强制披露包括征集目的在内的法定信息披露制度和差异化信息披露制度、实施证券"看门人"见证制度等入手,进一步完善新《证券法》第90条规定和加强对代理权征集滥用的规制。 相似文献
327.
本文就刑事侦查工作信息化和侦查破案机制的转变进行了论述。文章分析了当前我国刑事侦查工作所面临的巨大挑战,探讨了与刑事侦查信息化相关的一些问题,并提出了一些建议。 相似文献
328.
Dinesh Ramdhony Francisco Liébana-Cabanillas Vidisha Devi Gunesh-Ramlugun Fariha Mowlabocus 《Australian Journal of Public Administration》2023,82(2):194-209
The success of electronic filing services largely depends on their continuance usage. This study examines the factors affecting the continuance usage intention of the online tax filing services in Mauritius. An integrated model comprising Trust Theory and Information System Success Model (ISSM) is applied to assess the continuance usage behaviour of e-filing systems. The model has been extended by adding two additional variables: Perceived Usefulness and Perceived Risk. The model was tested using a sample of 315 users of e-filing services in Mauritius. A structural equation modelling technique using partial least square structural equation modelling verified the hypotheses. The results reveal that the continuance usage intention of an electronic tax filing system is influenced by Perceived Usefulness, User Satisfaction, and Service Quality. However, Perceived Risk does not influence the continuance usage intention of e-filing systems since the importance of Perceived Risk diminishes as trust in the e-service provider increases. The theoretical and practical implications derived from the findings of this study are also discussed. This paper makes several contributions to the literature on electronic tax filing systems. 相似文献
329.
Andrew Kakabadse Nada K. Kakabadse Alexander Kouzmin Kalu N. Kalu 《Contemporary Politics》2010,16(3):279-299
Aimed at reinforcing the democratic values of freedom of speech and increased diversity in civic access to the means of communication, this paper examines the concept of democracy within an information and communication technology-mediated context. Discussion proceeds with an analysis of orthodox views adopted by Jefferson and the architects of the American Constitution. Building on the Jeffersonian tradition, a critique is presented of present-day, non-transparent constraints on the democratic values of freedom of speech, information access and the structural constrains mitigating unfettered public access to critical information and debate on fundamental social and political issues of the day. The proposed ‘custodiary’ model for the new Democratic Project is premised on the development of a constitutional framework which encourages information diversity and freedom of access and expression as a way of bringing back ‘discourse’ into democratic praxis. 相似文献
330.
The heightened threat of terrorism in the West has resulted in more power being granted to police. However, new anti-terror laws and heavy-handed policing practices can stigmatize Muslim communities. Using survey data from 800 Australian Muslims this paper examines whether procedural justice policing in counter-terrorism enhances Muslims’ feelings of social inclusion, and promotes their intentions to report terror threats to police. Of interest is how procedural justice influences Muslims who feel less socially included. Three competing theoretical frameworks differ in the predictions they make about when and why procedural justice influences excluded groups. This paper considers each framework and discusses how each explains the relationships between our variables of interest. Our findings show that procedural justice is positively associated with social inclusion and intentions to report terror threats to police. Findings also show that social inclusion both moderates and partially mediates the effect of procedural justice on reporting intentions. 相似文献