首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   149篇
  免费   0篇
工人农民   1篇
世界政治   2篇
法律   61篇
中国共产党   1篇
中国政治   18篇
政治理论   9篇
综合类   57篇
  2024年   1篇
  2022年   1篇
  2019年   1篇
  2018年   2篇
  2017年   4篇
  2016年   5篇
  2015年   1篇
  2014年   12篇
  2013年   18篇
  2012年   19篇
  2011年   16篇
  2010年   9篇
  2009年   15篇
  2008年   12篇
  2007年   7篇
  2005年   6篇
  2004年   7篇
  2003年   5篇
  2002年   2篇
  2001年   2篇
  2000年   1篇
  1996年   1篇
  1990年   1篇
  1988年   1篇
排序方式: 共有149条查询结果,搜索用时 0 毫秒
141.
Data and information constitute a valuable resource both for the companies in general and individuals in specific. The traditional paper based transaction has been replaced by electronic transaction and now a day’s most of the valuable data and information’s are stored in electronic medium. Therefore data and information security have become a matter of great concern for every agencies acting on faith of e-transaction. In India there remains an added significance owing to the fact that a growing number of companies seek more centralized and less expensive methods of processing information, they’re turning to offshore outsourcing to fulfill many of their business and human resources processes. Data theft is not in itself a new concept, but has become an increasingly important issue in the digital age. The new mode of communication, its malleability, transmissibility, networking capacity, affect our lives in many and sometimes surprising ways, it requires that we find new legal solutions for new social questions.  相似文献   
142.
侵占罪与盗窃罪的界定   总被引:7,自引:0,他引:7  
从侵占罪与盗窃罪各自的构成要件比较中来区分两者是比较容易的 ,但在司法实践中搞清两者之间的界限绝非易事 ,但又不是没有规律可寻。确定是侵占罪还是盗窃罪关键要把握物的支配状态。无论何种之物 ,只要行为人对其取得支配时不是用秘密手段取得的 ,就不是盗窃罪 ;对物不是用秘密手段取得的支配以后 ,只要行为人对物有法律上或事实上的代为保管关系 ,对物非法占为己有 ,拒不退还的 ,就构成了侵占罪。  相似文献   
143.
  总被引:1,自引:0,他引:1  
Near repeat analysis has been increasingly used to measure the spatiotemporal clustering of crime in contemporary criminology. Despite its predictive capacity, the typically short time frame of near repeat crime patterns can negatively affect the crime prevention utility of near repeat analysis. Thus, recent research has argued for a greater understanding of the types of places that are most likely to generate near repeat crime patterns. The current study contributes to the literature through a spatiotemporal analysis of residential burglary and motor vehicle theft in Indianapolis, IN. Near Repeat analyses were followed by multinomial logistic regression models to identify covariates related to the occurrence of initiator (the first event in a near repeat chain) and near repeat (the subsequent event in a near repeat chain) events. The overall findings provide additional support for the argument that neighborhood context can influence the formation and context of spatiotemporal crime patterns.  相似文献   
144.
    
Theft, burglary, and vehicle theft are among the most frequently committed and least commonly cleared Part I offenses in the United States, but have received disproportionately little attention in the clearance literature. This study contributes to recent efforts to remedy this shortage by presenting offense-specific analyses of burglary, larceny, and vehicle theft clearance rates in a sample of 110 large US cities. Data were gathered from the Uniform Crime Report, the Law Enforcement Management and Administrative Statistics survey, and the American Community Survey. Independent variables comprised social disorganization measures (e.g. residential instability, poverty, etc.) and policing variables, including the use of broken windows policing. Although broken windows policing is related to higher clearance rates in a few prior studies, that effect was not observed in the present work. Racial diversity and police spending per capita (which were negatively associated with clearance rates) were the only variables that were significantly associated with the clearance of all three crimes.  相似文献   
145.
行为人盗窃空白现金支票后,偷盖财务章和人名章并加以使用的行为定性,实践中存在一定争议,就此问题进行探索性的思考,并结合实际提出自己不成熟的见解,以期为今后的工作提供一定的参考。  相似文献   
146.
12种身份失窃犯罪在美国是个普遍存在的问题。为使民众更好地保护自己的个人信息不受侵犯,美国贸易委员会出版了一系列的小册子,提醒民众加以预防。在美国,联邦贸易委员会希望消费者和商家更多地了解个人信息和隐私的重要性。美国公众可以随时免费获得这些宣传手册,也可以浏览联邦贸易委员会网站或者阅读该委员会的众多期刊,以获得更多的此类信息。  相似文献   
147.
存款名义人通过身份证挂失提取他人借用本人身份证存放于本人名义下的卡内钱款的行为在学理上有侵占罪和盗窃罪两种对立的观点。行为准确定性的症结在于对存款占有以及占有支配力归属的不同理解。应当肯定的是,存款占有作为事实上的支配状态,银行享有对存款现金的事实支配,而实际持卡人和存款名义人同时享有对存款债权的事实支配,当二者发生重叠冲突时,存款名义人的支配效力大于实际持卡人,是存款债权占有的合法归属者。那么,存款名义人通过挂失提取存款的行为就属于将合法占有的他人存款债权变为非法所有,应当成立侵占罪。  相似文献   
148.
盗窃铁路器材案件是指盗窃正在使用、备用或废旧的铁路器材案件的统称。铁路器材被盗现场勘查主要解决的问题:作案时间、地点、工具、手段、人数,侵害的目标、过程,作案人特点,作案动机目的,案件性质,串并案依据以及下一步的工作意见等。  相似文献   
149.
秦汉盗罪及其立法沿革   总被引:4,自引:0,他引:4  
闫晓君 《法学研究》2004,26(6):137-146
将张家山汉简《盗律》与相关文献记载相结合 ,通过汉《盗律》与唐律的比较 ,可以看到秦汉时期各种类型的盗罪的特点及相关立法 ,《盗律》的沿革轨迹也是清晰可见。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号