首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   149篇
  免费   0篇
工人农民   1篇
世界政治   2篇
法律   61篇
中国共产党   1篇
中国政治   18篇
政治理论   9篇
综合类   57篇
  2024年   1篇
  2022年   1篇
  2019年   1篇
  2018年   2篇
  2017年   4篇
  2016年   5篇
  2015年   1篇
  2014年   12篇
  2013年   18篇
  2012年   19篇
  2011年   16篇
  2010年   9篇
  2009年   15篇
  2008年   12篇
  2007年   7篇
  2005年   6篇
  2004年   7篇
  2003年   5篇
  2002年   2篇
  2001年   2篇
  2000年   1篇
  1996年   1篇
  1990年   1篇
  1988年   1篇
排序方式: 共有149条查询结果,搜索用时 15 毫秒
131.
黎其武 《河北法学》2005,23(4):109-111
随着我国网络游戏的发展,盗窃网络游戏物品的现象日趋严重,如何认定游戏物品的财产价值和盗窃游戏物品的行为是否构成犯罪,都是值得深入研究的,这不仅关系到目前如何保护我国游戏玩家和运营商的利益,也为我国未来相关立法作好理论准备。  相似文献   
132.
金子 《犯罪研究》2010,(6):31-43
经济情报具有重要的经济价值、生活价值、军事价值与政治价值。围绕经济情报的窃取与反窃取,猫鼠双方殊死博弈,斗智斗勇。开展刑事司法,维护经济安全,必须重视研究与处置窃取经济情报犯罪。  相似文献   
133.
在刑法修正案(八)中,对于特殊盗窃虽取消了入罪数额规定,但特殊盗窃仍旧为结果犯,应以侵害财产权的结果是否发生作为犯罪既未遂标准。在司法实践中,适用"两高"解释第十二条关于盗窃未遂处理的规定,应当坚持"规范优先、价值随后"的罪刑法定和刑法谦抑的原则,对于特殊盗窃未遂入罪问题,同时还应根据国家刑事政策和地区治安形势进行解决。  相似文献   
134.
    
This paper explores developments in privacy and data protection regulation in China. It argues that, since China is an emerging global economic power, the combination of domestic social economic development, international trade and economic exchange will encourage China to observe international standards of privacy and personal data protection in its future regulatory response.  相似文献   
135.
    
Livestock theft is common in many parts of sub-Saharan Africa. Experience of theft can deplete household assets and food resources. This article reports the findings of an exploratory study to investigate whether livestock theft patterns in Malawi reflect variations in the extent to which different animals are “CRAVED” (Concealable, Removable, Available, Valuable, Enjoyable, and Disposable), Clarke's mnemonic to explain preferences for items to steal. Measures of the elements of CRAVED were correlated with self-reported levels of theft for seven species of livestock using data from a cross-sectional, nationally representative survey of 11,280 households. Higher availability and disposability of livestock were significantly associated with higher levels of theft. Livestock displaying more CRAVED attributes were also stolen in greater numbers. The findings are cautiously interpreted as suggesting that livestock theft in Malawi is largely opportunistic. Implications from and for the application of CRAVED to livestock theft in Malawi are discussed.  相似文献   
136.
    
《Justice Quarterly》2012,29(2):344-367
Although researchers have examined the attributes that make offenders more or less responsive to sanction threats, far less attention has centered on the manner in which responsiveness can lead to less detectible crime, or perhaps even more overall crime. Restrictive deterrence is the concept that explains this paradox. We explore it here using qualitative interviews with 35 active auto thieves. Findings suggest that auto thieves' restrictively deterrent decision-making strategies fell into three broad categories: discretionary target selection, normalcy illusions, and defiance. Discussion focuses on the data's conceptual implications for restrictive deterrence and offender decision-making.  相似文献   
137.
    
Objectives. This paper explores how offenders manage the prospect of victim confrontation during auto theft. Methods. Data were drawn from in-depth, semi-structured interviews with 35 active offenders recruited from the streets of a large Midwestern US city using snowball sampling methods. Results. Two contextual domains figured prominently in the offenders’ decision-making calculus: The area around the target and the target itself. The first galvanized the offenders’ attention to, and management of, informal social control. The second enjoined offenders to balance speed and stealth in breaching the target. Conclusions. Victim confrontation is an informal sanction that is distinct from both retaliation and traditional extralegal sanctions. The rarity with which it occurs in auto theft is likely due to confrontation avoidance measures offenders adopt at the front end of the offense and during the enactment process itself. The conceptual implications of victim confrontation in crime are explored in relation to the following five areas: (1) sanction celerity and present orientation; (2) sanction certainty and ambiguity aversion; (3) sanction interdependence; (4) violence avoidance; and (5) directions for future research.  相似文献   
138.
    
The article explores the likely impact of the Criminal Justice Act 2003 on the decision to imprison adult offenders convicted of theft. Using a sample of cases decided in the magistrates' court and the Crown Court under the Criminal Justice Act 1991, the article considers whether it is possible to estimate the effects of the 2003 Act on the use of imprisonment in theft cases. It does so by applying the Sentencing Guidelines Council's guidelines on theft, which were formulated under the 2003 Act, to the sample of earlier cases, to consider the extent to which the guidelines align with the decision to imprison prior to the enactment of the 2003 Act.  相似文献   
139.
利用ATM机故障恶意取款行为是指信用卡的合法持卡人,或者经持卡人合法授权的人,在明知银行的ATM机出现技术故障的情况下,进行取款、转账等操作程序,非法占有银行资金的行为。这种行为具有五个特征,即信用卡的真实性、主体的合法性、银行的过错性、行为的形式正当性和主观的恶意性。对利用ATM机故障恶意取款的行为应当定盗窃罪,而不能以信用卡诈骗罪或侵占罪处罚。  相似文献   
140.
Data and information constitute a valuable resource both for the companies in general and individuals in specific. The traditional paper based transaction has been replaced by electronic transaction and now a day’s most of the valuable data and information’s are stored in electronic medium. Therefore data and information security have become a matter of great concern for every agencies acting on faith of e-transaction. In India there remains an added significance owing to the fact that a growing number of companies seek more centralized and less expensive methods of processing information, they’re turning to offshore outsourcing to fulfill many of their business and human resources processes. Data theft is not in itself a new concept, but has become an increasingly important issue in the digital age. The new mode of communication, its malleability, transmissibility, networking capacity, affect our lives in many and sometimes surprising ways, it requires that we find new legal solutions for new social questions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号