首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2505篇
  免费   72篇
各国政治   30篇
工人农民   39篇
世界政治   25篇
外交国际关系   61篇
法律   758篇
中国共产党   61篇
中国政治   434篇
政治理论   213篇
综合类   956篇
  2024年   2篇
  2023年   17篇
  2022年   24篇
  2021年   29篇
  2020年   74篇
  2019年   48篇
  2018年   62篇
  2017年   41篇
  2016年   45篇
  2015年   47篇
  2014年   176篇
  2013年   214篇
  2012年   146篇
  2011年   183篇
  2010年   191篇
  2009年   173篇
  2008年   165篇
  2007年   136篇
  2006年   159篇
  2005年   144篇
  2004年   151篇
  2003年   127篇
  2002年   104篇
  2001年   68篇
  2000年   34篇
  1999年   14篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
排序方式: 共有2577条查询结果,搜索用时 15 毫秒
321.
近年来,人们在享受科技发展与网络信息技术普及带来的便利的同时,也正经历着个人信息侵权的困扰。个人信息侵权行为具有侵害手段的技术性、侵害方式的隐蔽性、侵害领域的无地域性、侵害后果的严重性的特点,而相对于个人信息侵权行为,个人信息保护的立法却相对滞后,个人信息的界定狭窄,个人信息的法律保护无系统、比较零散,法律保护范围比较狭窄,而且保护手段比较单一,因此,必须完善个人信息侵权行为的保护,加快个人信息保护的立法进程和行业自律建设。  相似文献   
322.
Information technology (IT) has been able to facilitate the rural development through empowering and integrating the accessibility of the villagers (cottagers) to the available knowledge and information and the opportunities to different extents. The success of IT approach in rural development requires some initial efforts to prepare applying IT in order to achieve it. Awareness of IT-based rural development infrastructures and subsequently preparation of required infrastructures are one of the most important steps towards delivering the development program. Considering the importance of this subject, in this paper, we have tried to identify the IT-based rural development infrastructures, using the ideas of experts in IT and rural development across the Iran country. The data analysis of 171 respondents with T-student test showed that the factors of social-cultural, organizational-managerial, technical-telecommunication and legal-legitimate are the IT-based infrastructures of rural development. Successful provision of these elements depends on the existence of strategic alignment approach and focuses on the balanced maturity of the infrastructures.  相似文献   
323.
Parallel to the advancements in information and communication technologies, certain risks and security problems also arise, one of which is the authentication problem. In order to control who can have access to information sources, it is of utmost importance to develop an advanced authentication mechanism. It is through this mechanism that one can protect personal information, and prevent unauthorized access to the information or services provided. Likewise, this mechanism can block unauthorized persons to change or release information that is not public. All the work being undertaken in this field can be named as access control. The concept of authentication is among those concepts that have been studied for a long time in Turkey in the context of rapidly growing e-transformation efforts. In the process of e-transformation, the transformation circle is completed by first defining the concept of modeling business processes, followed by the formation of automation process, and lastly, providing services in electronic medium.  相似文献   
324.
In this paper we present the research results of key factors that determine the investment behavior of Russian companies during 2004-2008. The emphasis is made on the policy of capital expenditures. In the analysis, it included maeroeconomic, some industry factors (growth rate, spread of efficiency (ROIC-WACC), market and industry risks) as well as some internal factors related to the equity structure and the quality of corporate governance.  相似文献   
325.
依托较为成熟的信息网络,努力探索和创建村(社)级特色惩防腐败体系,是广东省江门市蓬江区基层农村党风廉政建设的一大特色和亮点。地处城乡结合部、基础较好的篁庄股份合作经济联合社,按照广东“开放、动态、创新”惩防腐败体系和“数字珠三角洲”的需要,运用信息网络科技,打造“数字篁庄”,进行党风廉政宣传教育,实行社务网上阳光工程,增强了社务的公开、透明程度,拉近了干部、党员与群众的距离,促进了社务与民生的和谐,取得了良好成效,积累了一些经验,为深入推进全区党风廉政建设,促进社会和谐发展,走出了一条新路。  相似文献   
326.
董新义 《财经法学》2020,(3):107-123
股东代理权征集对上市公司治理具有"双刃剑"的作用,其优势与弊端共存的特性使其更需严格规制以防止被滥用。从法理层面进行分析、并结合以往征集投票权实践所暴露的问题可知,新《证券法》第90条相比以前法律规范虽有重大进步,但仍存在对代理权征集滥用规制的不足。可以运用代理人道德风险理论、信义义务理论解释和规制代理权征集滥用行为。分析新《证券法》第90条规定可知,对征集人资格、条件和行使权利程序规定的不足,对征集过程中信息披露和违法征集损害赔偿责任等事项的粗放式规定都可能带来代理权征集的滥用。为了更有效地规制代理权征集滥用行为,应从限缩征集人资格和条件、确立代理权征集决策程序的内部控制机制、强制披露包括征集目的在内的法定信息披露制度和差异化信息披露制度、实施证券"看门人"见证制度等入手,进一步完善新《证券法》第90条规定和加强对代理权征集滥用的规制。  相似文献   
327.
本文就刑事侦查工作信息化和侦查破案机制的转变进行了论述。文章分析了当前我国刑事侦查工作所面临的巨大挑战,探讨了与刑事侦查信息化相关的一些问题,并提出了一些建议。  相似文献   
328.
The success of electronic filing services largely depends on their continuance usage. This study examines the factors affecting the continuance usage intention of the online tax filing services in Mauritius. An integrated model comprising Trust Theory and Information System Success Model (ISSM) is applied to assess the continuance usage behaviour of e-filing systems. The model has been extended by adding two additional variables: Perceived Usefulness and Perceived Risk. The model was tested using a sample of 315 users of e-filing services in Mauritius. A structural equation modelling technique using partial least square structural equation modelling verified the hypotheses. The results reveal that the continuance usage intention of an electronic tax filing system is influenced by Perceived Usefulness, User Satisfaction, and Service Quality. However, Perceived Risk does not influence the continuance usage intention of e-filing systems since the importance of Perceived Risk diminishes as trust in the e-service provider increases. The theoretical and practical implications derived from the findings of this study are also discussed. This paper makes several contributions to the literature on electronic tax filing systems.  相似文献   
329.
Aimed at reinforcing the democratic values of freedom of speech and increased diversity in civic access to the means of communication, this paper examines the concept of democracy within an information and communication technology-mediated context. Discussion proceeds with an analysis of orthodox views adopted by Jefferson and the architects of the American Constitution. Building on the Jeffersonian tradition, a critique is presented of present-day, non-transparent constraints on the democratic values of freedom of speech, information access and the structural constrains mitigating unfettered public access to critical information and debate on fundamental social and political issues of the day. The proposed ‘custodiary’ model for the new Democratic Project is premised on the development of a constitutional framework which encourages information diversity and freedom of access and expression as a way of bringing back ‘discourse’ into democratic praxis.  相似文献   
330.
The heightened threat of terrorism in the West has resulted in more power being granted to police. However, new anti-terror laws and heavy-handed policing practices can stigmatize Muslim communities. Using survey data from 800 Australian Muslims this paper examines whether procedural justice policing in counter-terrorism enhances Muslims’ feelings of social inclusion, and promotes their intentions to report terror threats to police. Of interest is how procedural justice influences Muslims who feel less socially included. Three competing theoretical frameworks differ in the predictions they make about when and why procedural justice influences excluded groups. This paper considers each framework and discusses how each explains the relationships between our variables of interest. Our findings show that procedural justice is positively associated with social inclusion and intentions to report terror threats to police. Findings also show that social inclusion both moderates and partially mediates the effect of procedural justice on reporting intentions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号