首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   281篇
  免费   16篇
工人农民   9篇
世界政治   4篇
外交国际关系   17篇
法律   142篇
中国共产党   1篇
中国政治   38篇
政治理论   28篇
综合类   58篇
  2024年   2篇
  2023年   9篇
  2022年   2篇
  2021年   9篇
  2020年   7篇
  2019年   5篇
  2018年   7篇
  2017年   13篇
  2016年   14篇
  2015年   11篇
  2014年   38篇
  2013年   39篇
  2012年   28篇
  2011年   12篇
  2010年   22篇
  2009年   20篇
  2008年   15篇
  2007年   13篇
  2006年   9篇
  2005年   4篇
  2004年   7篇
  2003年   6篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1998年   1篇
  1995年   1篇
排序方式: 共有297条查询结果,搜索用时 19 毫秒
21.
公共安全视频系统具有覆盖面广,重点突出的特点,还具有对监控区域实时反映、客观记录其情况的属性。侦查刑事案件时.可以通过发现和查看犯罪现场周围存在的公共安全视频系统资料挖掘侦查线索、获取犯罪证据,随着案件侦查的推进,结合案件前期信息综合运用.还可以进一步借助涉案区域存在的视频系统发现犯罪嫌疑人的行踪去向,指挥案件侦查活动的实施,这是一种充分利用现实社会资源为侦查工作服务的侦查方法。  相似文献   
22.
视频监控技术是公安机关打击和防控违法犯罪常用的一种技术手段,在刑事现场勘查中也有着举足轻重的作用。正确运用视频监控技术,可以明确现场勘查取证重点,可以有效采取现场紧急措施,可以快速甄别现场痕迹物证,可以提高侦查实验结果的可靠性。  相似文献   
23.
Child sexual abuse is often difficult to prove due to a lack of physical evidence. In many instances, the only evidence is a child's statement given during a forensic interview. Forensic interviews are conducted to assess whether the child has been abused, to develop a plan to protect a child's safety pending trial, and to provide further investigative leads. Note taking by the interviewer is currently the primary method for documenting what takes place in a forensic interview. Research shows that this form of documentation is problematic because interviewers tend to omit abuse‐related details in their notes. This Note suggests that federal law should require that forensic interviews of children in child sexual abuse cases be video recorded. State law can provide for a policy of video recording even in the absence of a federal law mandate. Video recording would better preserve the child's statements thereby improving the reliability of the information that is obtained during forensic interviews. The child's demeanor would also be fully captured on video as opposed to getting lost in an interviewer's notes.  相似文献   
24.
全程录音录像制度对于规范执法行为,保障犯罪嫌疑人基本权利,促进司法公正具有重要意义。全程录音录像不是单纯意义上的技术性措施,其构建应当放在整个刑事诉讼架构中进行,辅以必要的配套措施,明确违反全程录音录像规定的制裁性后果,合力形成完整的制度体系。在当前的社会发展条件下,全程录音录像制度的构建尚难以“一步到位”,仍需循序渐进推行,并在主客观条件具备之时全面实施,切实发挥制度的应有功能。  相似文献   
25.
监视,作为一种全球普遍存在的社会现象,起源于现代资本主义形态和官僚制实践的增长。现代监视理论是资本主义企业、官僚组织、民族国家、机器式的工艺和新型社会连带发展的自然产物;后现代监视理论则是关于以科技为基础的、以身体为监视对象的、日常的和普遍存在的监视的理论。由边沁和福柯所解释的、与监狱和规诫理念相关联的全景监视范式受到新的社会现实和监视理论的挑战。以风险社会管理为背景,治理可以作为监视研究的一个新路径。  相似文献   
26.
We are the middle of a global identity crisis. New notions of identity are made possible in the online world where people eagerly share their personal data and leave ‘digital footprints’. Multiple, partial identities emerge distributed across cyberspace divorced from the physical person. The representation of personal characteristics in data sets, together with developing technologies and systems for identity management, in turn change how we are identified. Trustworthy means of electronic identification is now a key issue for business, governments and individuals in the fight against online identity crime. Yet, along with the increasing economic value of digital identity, there are also risks of identity misuse by organisations that mine large data sets for commercial purposes and in some cases by governments. Data proliferation and the non-transparency of processing practices make it impossible for the individual to track and police their use. Potential risks encompass not only threats to our privacy, but also knowledge-engineering that can falsify digital profiles attributed to us with harmful consequences. This panel session will address some of the big challenges around identity in the digital age and what they mean for policy and law (its regulation and protection). Questions for discussion include: What does identity mean today? What types of legal solutions are fit for purpose to protect modern identity interests? What rights, obligations and responsibilities should be associated with our digital identities? Should identity management be regulated and who should be held liable and for what? What should be the role of private and public sectors in identity assurance schemes? What are the global drivers of identity policies? How can due process be ensured where automated technologies affect the rights and concerns of citizens? How can individuals be more empowered to control their identity data and give informed consent to its use? How are biometrics and location-tracking devices used in body surveillance changing the identity landscape?  相似文献   
27.
The over-representation of black children in US out of home care results from racial bias in placement decisions and a political choice to address startling rates of child poverty by investigating parents instead of tackling poverty's societal roots. The impact of state disruption and supervision of African American families is intensified when it is concentrated in inner-city neighbourhoods – the system's ‘racial geography.’ A small case study of a black neighbourhood in Chicago with high rates of out of home placement found profound effects on both family and community social relationships, as well as reliance on child protective services for financial assistance, linking surveillance of black families to the neoliberal shrinking of public programmes. The surveillance of African American women by the child welfare system is also intensified by these women's disproportionate involvement in the prison system. Acknowledging racial bias in child welfare reveals the need to radically transform the system from one that relies too much on punitive disruption of families to one that generously supports them.  相似文献   
28.
《Digital Investigation》2014,11(2):120-140
In this paper, we present a passive approach for effective detection and localization of region-level forgery from video sequences possibly with camera motion. As most digital image/video capture devices do not have modules for embedding watermark or signature, passive forgery detection which aims to detect the traces of tampering without embedded information has become the major focus of recent research. However, most of current passive approaches either work only for frame-level detection and cannot localize region-level forgery, or suffer from high false detection rates for localization of tampered regions. In this paper, we investigate two common region-level inpainting methods for object removal, temporal copy-and-paste and exemplar-based texture synthesis, and propose a new approach based on spatio-temporal coherence analysis for detection and localization of tampered regions. Our approach can handle camera motion and multiple object removal. Experiments show that our approach outperforms previous approaches, and can effectively detect and localize regions tampered by temporal copy-and-paste and texture synthesis.  相似文献   
29.
Reverse projection photogrammetry has long been used to estimate the height of an individual in forensic video examinations. A natural extrapolation would be to apply the same technique on a video to estimate the speed of an object by determining the distance traveled between two points over a set amount of time. To test this theory, five digital video recorders (DVRs) were connected to a single fixed camera to record a vehicle traveling down a track. The vehicle's speed was measured through Doppler radar by a trained operator and the speedometer of the vehicle was also recorded with a video camera. The recorded video was examined and the frames that best depict the beginning and end of the vehicles course were selected. Two reverse projection photogrammetric examinations were performed on the selected frames to establish the position of the vehicle. The distance between the two points was measured, and the time elapsed between the two points was examined. The outcome provided an accurate speed result with a standard degree of uncertainty. This study proves the feasibility of using video data and reverse projection photogrammetry to determine the speed of a vehicle with a limited set of variables. Further research is needed to determine how additional variables would impact the standard degree of uncertainty.  相似文献   
30.
The current study analyzes police use of force as a series of time-bound transactions between officers, civilians, and bystanders. The research begins with a systematic social observation of use-of-force events recorded on police body-worn cameras in Newark, New Jersey. Researchers measure the occurrence and time stamps for numerous participant physical and verbal behaviors. Data are converted into a longitudinal panel format measuring all observed behaviors in 5-second intervals. Panel logistic regression models estimate the effect of each behavior on use of force in immediate and subsequent temporal periods. Findings indicate certain variables influence use of force at a distinct point in time, whereas others exert influence on use of force across multiple time periods. The most influential variables relate to authority maintenance theoretical constructs. This finding supports prior perspectives arguing that police use of force largely results from officer attempts to maintain constant authority over civilians during face-to-face encounters. Nonetheless, a range of additional variables reflecting procedural justice, civilian resistance, and bystander presence significantly affect when police use force during civilian encounters. Results provide nuance to theoretical frameworks considering use of force as resulting from the interplay between officer and civilian actions and reactions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号