首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2317篇
  免费   37篇
政治法律   2354篇
  2024年   2篇
  2023年   10篇
  2022年   22篇
  2021年   52篇
  2020年   49篇
  2019年   36篇
  2018年   48篇
  2017年   39篇
  2016年   34篇
  2015年   34篇
  2014年   113篇
  2013年   225篇
  2012年   141篇
  2011年   130篇
  2010年   131篇
  2009年   161篇
  2008年   196篇
  2007年   171篇
  2006年   172篇
  2005年   111篇
  2004年   124篇
  2003年   138篇
  2002年   86篇
  2001年   76篇
  2000年   44篇
  1999年   6篇
  1998年   1篇
  1991年   1篇
  1985年   1篇
排序方式: 共有2354条查询结果,搜索用时 9 毫秒
31.
叶姗 《北方法学》2012,6(4):93-102
我国《工会法》第52条规定的责令雇主承担不当劳动行为的民事责任,与美国《国家劳资关系法》第10(c)条的规定看起来很相似,相比之下,这一规范在美国劳动法的实践中很有效,在我国却极少被适用,解释方面也存在较大的分歧。美国是世界上最早创设不当劳动行为救济制度的国家,从《瓦格纳法》规定的雇主不当劳动行为的禁止规范及救济措施,到《塔夫托—哈特莱法》将适用对象扩大到工会和雇员,在雇用自由原则和劳资自治模式的背景下,其演变始终以保护雇员团结权的松紧程度和收放态度为线索。我国《工会法》现正处于第三次修改阶段,适时检讨第52条的解释和适用的障碍,还可以解决其与《劳动合同法》规范的竞合问题。  相似文献   
32.
随着无线局域网的普及以及VoIP技术的不断发展,无线VoIP已成为一个热门的研究课题,其安全性问题尤其值得关注。本文将首先介绍无线VoIP的基本原理,然后分析威胁无线VoIP系统安全的因素,最后讨论初步的安全解决方案。  相似文献   
33.
Methodological aspects of the Dutch National Threat Assessment   总被引:1,自引:0,他引:1  
This paper discusses issues related to measuring organized crime as they have become manifest in the Dutch contribution to the EU Organised Crime Threat Assessment (OCTA). It intends to convey to a wider academic community certain issues of definition, methodology and accountability, understanding the NTA process in terms of the communication of risks in a context of competitive defining institutions.
Peter KlerksEmail:
  相似文献   
34.
《法学杂志》2012,33(9)
联合国宪章为安理会采取包括动用武力在内的强制行动打击国际恐怖主义提供了隐含的法律依据,如果国际恐怖主义达到危及国际和平与安全的程度,安理会就可以采取包括动武在内的强制行动介入反恐斗争。事实上,安理会已多次采取强制行动来打击国际恐怖主义。从法理方面分析,安理会可以授权以武力打击国际恐怖主义。打击国际恐怖主义与人权的国际保护并不矛盾;而保护人权,正是反恐的主要目的之一。  相似文献   
35.
The adoption of the Treaty of Lisbon and the granting to the Charter of Fundamental Rights of the same legal force as the Treaty has lent a new impulse to the consideration of fundamental human rights by the European Union (EU). The question remains, however, as to how this legal discourse, centred upon human rights, is actually shaping the EU regulatory framework in specific policy domains. The aim of this paper is to critically appraise the ways that the fundamental rights of security, privacy and freedom guaranteed by the Charter are being construed in the context of EU law and policy on biometrics, an ethically and morally sensitive security technology whose development and use are being actively promoted by the EU. We conclude that the interpretation of the pertinent rights, as well as their balancing, owes a great deal to the goals of EU policies for research and development, and under the auspices of Freedom, Security and Justice, shaped largely by political and economic considerations. These considerations then tend to prevail over ethically or morally-based legal claims.  相似文献   
36.
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements.  相似文献   
37.
The personal ID card is a document carried by most Germans, but rarely used. This could change in the future: According to the new law on identification cards and electronic proof of identity (Gesetz über Personalausweise und den elektronischen Identitätsnachweis, PAuswG), the ID card, with its proof of identity, will gain a new functionality, making it applicable for diverse Internet transactions. Functionally, the electronic proof of identity corresponds to existing non-electronic personal proof of identity guidelines in legal and business connections. However, its concrete, technical application opens up many issues regarding contracts and data privacy laws. On both the legal and the technical level, the German approach departs from other European countries, as it strictly distinguishes the electronic proof of identity from the electronic signature function, which the new ID card also provides. It remains to be seen whether the various projects of the EU Member States will become legally and technically interoperable in the near future.  相似文献   
38.
二战之后制定的日本国宪法一直存在着被强加宪法论与自主制定宪法论的争论。保守派政治家出于现实政治需要,一直围绕宪法第9条主张修改宪法,并促成了国民投票法案的通过和教育基本法的修改。宪法修改应该使宪法的基本原理与现实发展相契合并有利于宪法的发展,而绝不能悖逆于宪法原理,弱化宪法的存在意义。战后的日本政治史可以说是“宪法固定化”的过程。要不要修改宪法,对于哪些条款进行怎样的修改,应该由国民来做决定。  相似文献   
39.
陈咏梅 《河北法学》2008,26(4):65-70
香港特区终审法院在庄礼源案的裁决对香港产生了深远重大的影响。该案的判决与全国人大常委会在1999年6月26日对香港基本法有关条款作出的解释不尽一致。若终审法院在裁决庄丰源案时能考虑到"人大释法"就有关筹委会的意见已反映在《基本法》第24条第2款其他各项的立法原意这一决议中,则有相当充分的法律理据来裁定庄丰源败诉。这样非法入境、逾期居留或在香港临时居留的人在香港逗留期间所生的中国籍子女,并不能享有香港居留权。同时,内地孕妇亦不会因为希望其子女获得香港居留权而引发争相到香港产子的情况。  相似文献   
40.
The increased burden placed upon the UN Security Council in the post-Cold War era in respect of its discharge of its primary responsibility for the maintenance of international peace and security has fuelled calls for the greater use of regional arrangements as agents of the Council, to relieve its burden. However, the various agendas and capabilities of different arrangements make it difficult to adopt a uniform template of the role which regional arrangements can play as conductors of peace support operations authorised by the Security Council. This article attempts to provide a framework against which the potential role of different arrangements as viable agents to which the Security Council can entrust military enforcement operations, before going on to assess how selected African and European organisations fare against this framework. It will be demonstrated that when assessed against this framework, the organisations selected for comparison are remarkably similar.
Gary WilsonEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号