全文获取类型
收费全文 | 1202篇 |
免费 | 46篇 |
专业分类
各国政治 | 21篇 |
工人农民 | 33篇 |
世界政治 | 24篇 |
外交国际关系 | 67篇 |
法律 | 344篇 |
中国共产党 | 49篇 |
中国政治 | 205篇 |
政治理论 | 142篇 |
综合类 | 363篇 |
出版年
2024年 | 2篇 |
2023年 | 16篇 |
2022年 | 9篇 |
2021年 | 26篇 |
2020年 | 31篇 |
2019年 | 12篇 |
2018年 | 28篇 |
2017年 | 32篇 |
2016年 | 30篇 |
2015年 | 18篇 |
2014年 | 70篇 |
2013年 | 102篇 |
2012年 | 80篇 |
2011年 | 88篇 |
2010年 | 58篇 |
2009年 | 78篇 |
2008年 | 67篇 |
2007年 | 81篇 |
2006年 | 101篇 |
2005年 | 71篇 |
2004年 | 53篇 |
2003年 | 61篇 |
2002年 | 59篇 |
2001年 | 43篇 |
2000年 | 20篇 |
1999年 | 9篇 |
1998年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
排序方式: 共有1248条查询结果,搜索用时 15 毫秒
201.
Kit Burden 《Computer Law & Security Report》2017,33(1):112-118
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
202.
We employ a rational choice framework to understand the conditions under which sex traffickers allow their victims access to telecommunications devices while under their control. We posit that sex traffickers are rational actors who make calculated decisions regarding whether to allow their victims access to the Internet and cell phones. We hypothesize that sex traffickers allow younger victims and those they did not defraud in the recruitment process greater access to telecommunications devices because these decisions maximize their payoffs with minimal risk. However, we hypothesize that younger victims’ access to telecommunications devices is conditional on whether they have been defrauded in recruitment. In order to test these hypotheses, we deployed a survey to 115 victims of sex trafficking in the United States to learn about how they were recruited by their sex trafficker and the level of access they had to technology while under their sex trafficker's control. We find support for all of our hypotheses. The results have serious implications for criminal justice policy and practice. 相似文献
203.
Agnes Callamard 《International Review of Law, Computers & Technology》2017,31(3):323-339
The article reviews the evolution and key dimensions of the jurisprudence around the world as it relates to the Internet regulation and governance. It argues that while the judicial sector played a fairly marginal role as far as on-line issues were concerned in the first two decades of the Internet development, judicial rulings have now emerged as one of the main forces shaping on-line freedom of expression and information and the Internet governance. The article reviews a number of decisions from Europe and Latin America to demonstrate that judicial ruling are challenging some of the Internet’s founding principles and values. They have become highly influential, not just as interpreters of the law (the tribunals’ traditional function) but as shapers or transformers of the Internet norms and values. This evolution has become particularly clear over the last three to five years, demonstrating the increasing confidence of judges and Tribunals in challenging engineers, users, corporations, or indeed governments and possibly establishing different norms as far as the cyberspace is concerned. 相似文献
204.
ABSTRACTHuman resource is the key driving force of research and development of a nation. Japan and Korea are two examples of how appropriate strategies in developing human resources have been transferred into remarkable achievements in R&D. In recent years, Vietnam has observed significant shift in investment for R&D. Thus, the lessons of Japan and Korea could provide Vietnam with valuable strategies for further development in human resources in R&D, particularly in vision of R&D development, policy flexibility, increased investment on R&D development and human resources, key R&D organization formation and increased international cooperation in S&T. 相似文献
205.
206.
董楠 《安徽警官职业学院学报》2005,4(4):76-79
司法会计技术作为查办经济犯罪案件的重要手段之一,越来越受到公安司法机关的重视.本文从我国司法会计技术的发展现状入手,分别对运用司法会计检查技术和鉴定技术的策略提出可操作性意见,以便更好地发挥司法会计技术在查办经济犯罪案件中的重要作用. 相似文献
207.
如果能够在东北亚地区建立IT产业的共同体,将很有可能带动其他产业的联合,最终走向全面地联合,从而提升东北亚地区合作的层次。东北亚国家已经开始在IT领域进行了一定程度的合作,但是在东北亚地区建立IT共同体的道路不会是一帆风顺的,有许多因素会影响到东北亚IT共同体的最终形成。 相似文献
208.
论测谎结论的证据价值 总被引:3,自引:0,他引:3
程万高 《国家检察官学院学报》2004,12(3):108-112
测谎技术的产生时间并不长,但其在诉讼活动中的应用却日趋增多,对测谎结论的证据价值的争议也开始在法学界显现。在我国,应以与时俱进的态度看待测谎结论,在了解测谎技术科学性的基础上,将测谎结论设定为鉴定结论形式中的"有限采用"辅助证据,从而更好地为司法实践提供帮助。 相似文献
209.
210.
俄罗斯国防工业“寓军于民”实践及对我国的启示 总被引:2,自引:1,他引:1
俄罗斯国防科技工业大力推行"军转民"政策,组建国防工业大型企业集团。并在许多领域,特别是在电子技术和信息技术领域都采取了许多有效的措施。同时强调在首先满足国防需求的前提下,建立军民融合的工业体系,军民融合建设已取得初步成效。俄罗斯国防工业"寓军于民"的实践,对探讨我国国防工业"寓军于民"具有一定的启示。 相似文献