全文获取类型
收费全文 | 149篇 |
免费 | 0篇 |
专业分类
工人农民 | 1篇 |
世界政治 | 2篇 |
法律 | 61篇 |
中国共产党 | 1篇 |
中国政治 | 18篇 |
政治理论 | 9篇 |
综合类 | 57篇 |
出版年
2024年 | 1篇 |
2022年 | 1篇 |
2019年 | 1篇 |
2018年 | 2篇 |
2017年 | 4篇 |
2016年 | 5篇 |
2015年 | 1篇 |
2014年 | 12篇 |
2013年 | 18篇 |
2012年 | 19篇 |
2011年 | 16篇 |
2010年 | 9篇 |
2009年 | 15篇 |
2008年 | 12篇 |
2007年 | 7篇 |
2005年 | 6篇 |
2004年 | 7篇 |
2003年 | 5篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1996年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有149条查询结果,搜索用时 15 毫秒
131.
随着我国网络游戏的发展,盗窃网络游戏物品的现象日趋严重,如何认定游戏物品的财产价值和盗窃游戏物品的行为是否构成犯罪,都是值得深入研究的,这不仅关系到目前如何保护我国游戏玩家和运营商的利益,也为我国未来相关立法作好理论准备。 相似文献
132.
经济情报具有重要的经济价值、生活价值、军事价值与政治价值。围绕经济情报的窃取与反窃取,猫鼠双方殊死博弈,斗智斗勇。开展刑事司法,维护经济安全,必须重视研究与处置窃取经济情报犯罪。 相似文献
133.
吴真 《广西警官高等专科学校学报》2014,(1):71-74
在刑法修正案(八)中,对于特殊盗窃虽取消了入罪数额规定,但特殊盗窃仍旧为结果犯,应以侵害财产权的结果是否发生作为犯罪既未遂标准。在司法实践中,适用"两高"解释第十二条关于盗窃未遂处理的规定,应当坚持"规范优先、价值随后"的罪刑法定和刑法谦抑的原则,对于特殊盗窃未遂入罪问题,同时还应根据国家刑事政策和地区治安形势进行解决。 相似文献
134.
This paper explores developments in privacy and data protection regulation in China. It argues that, since China is an emerging global economic power, the combination of domestic social economic development, international trade and economic exchange will encourage China to observe international standards of privacy and personal data protection in its future regulatory response. 相似文献
135.
Aiden Sidebottom 《国际比较与应用刑事审判杂志》2013,37(3):195-212
Livestock theft is common in many parts of sub-Saharan Africa. Experience of theft can deplete household assets and food resources. This article reports the findings of an exploratory study to investigate whether livestock theft patterns in Malawi reflect variations in the extent to which different animals are “CRAVED” (Concealable, Removable, Available, Valuable, Enjoyable, and Disposable), Clarke's mnemonic to explain preferences for items to steal. Measures of the elements of CRAVED were correlated with self-reported levels of theft for seven species of livestock using data from a cross-sectional, nationally representative survey of 11,280 households. Higher availability and disposability of livestock were significantly associated with higher levels of theft. Livestock displaying more CRAVED attributes were also stolen in greater numbers. The findings are cautiously interpreted as suggesting that livestock theft in Malawi is largely opportunistic. Implications from and for the application of CRAVED to livestock theft in Malawi are discussed. 相似文献
136.
《Justice Quarterly》2012,29(2):344-367
Although researchers have examined the attributes that make offenders more or less responsive to sanction threats, far less attention has centered on the manner in which responsiveness can lead to less detectible crime, or perhaps even more overall crime. Restrictive deterrence is the concept that explains this paradox. We explore it here using qualitative interviews with 35 active auto thieves. Findings suggest that auto thieves' restrictively deterrent decision-making strategies fell into three broad categories: discretionary target selection, normalcy illusions, and defiance. Discussion focuses on the data's conceptual implications for restrictive deterrence and offender decision-making. 相似文献
137.
Objectives. This paper explores how offenders manage the prospect of victim confrontation during auto theft. Methods. Data were drawn from in-depth, semi-structured interviews with 35 active offenders recruited from the streets of a large Midwestern US city using snowball sampling methods. Results. Two contextual domains figured prominently in the offenders’ decision-making calculus: The area around the target and the target itself. The first galvanized the offenders’ attention to, and management of, informal social control. The second enjoined offenders to balance speed and stealth in breaching the target. Conclusions. Victim confrontation is an informal sanction that is distinct from both retaliation and traditional extralegal sanctions. The rarity with which it occurs in auto theft is likely due to confrontation avoidance measures offenders adopt at the front end of the offense and during the enactment process itself. The conceptual implications of victim confrontation in crime are explored in relation to the following five areas: (1) sanction celerity and present orientation; (2) sanction certainty and ambiguity aversion; (3) sanction interdependence; (4) violence avoidance; and (5) directions for future research. 相似文献
138.
Gary Betts 《The Howard Journal of Crime and Justice》2015,54(2):176-192
The article explores the likely impact of the Criminal Justice Act 2003 on the decision to imprison adult offenders convicted of theft. Using a sample of cases decided in the magistrates' court and the Crown Court under the Criminal Justice Act 1991, the article considers whether it is possible to estimate the effects of the 2003 Act on the use of imprisonment in theft cases. It does so by applying the Sentencing Guidelines Council's guidelines on theft, which were formulated under the 2003 Act, to the sample of earlier cases, to consider the extent to which the guidelines align with the decision to imprison prior to the enactment of the 2003 Act. 相似文献
139.
论利用ATM机故障恶意取款行为的定性——兼论侵占罪、盗窃罪、信用卡诈骗罪实行行为的区别 总被引:1,自引:0,他引:1
利用ATM机故障恶意取款行为是指信用卡的合法持卡人,或者经持卡人合法授权的人,在明知银行的ATM机出现技术故障的情况下,进行取款、转账等操作程序,非法占有银行资金的行为。这种行为具有五个特征,即信用卡的真实性、主体的合法性、银行的过错性、行为的形式正当性和主观的恶意性。对利用ATM机故障恶意取款的行为应当定盗窃罪,而不能以信用卡诈骗罪或侵占罪处罚。 相似文献
140.
Tushar Kumar BiswasAuthor Vitae 《Computer Law & Security Report》2011,27(4):385-393
Data and information constitute a valuable resource both for the companies in general and individuals in specific. The traditional paper based transaction has been replaced by electronic transaction and now a day’s most of the valuable data and information’s are stored in electronic medium. Therefore data and information security have become a matter of great concern for every agencies acting on faith of e-transaction. In India there remains an added significance owing to the fact that a growing number of companies seek more centralized and less expensive methods of processing information, they’re turning to offshore outsourcing to fulfill many of their business and human resources processes. Data theft is not in itself a new concept, but has become an increasingly important issue in the digital age. The new mode of communication, its malleability, transmissibility, networking capacity, affect our lives in many and sometimes surprising ways, it requires that we find new legal solutions for new social questions. 相似文献