首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   118篇
  免费   0篇
各国政治   2篇
世界政治   1篇
法律   44篇
中国政治   7篇
政治理论   1篇
综合类   63篇
  2022年   1篇
  2021年   2篇
  2019年   3篇
  2018年   2篇
  2016年   1篇
  2015年   1篇
  2014年   8篇
  2013年   6篇
  2012年   1篇
  2011年   10篇
  2010年   2篇
  2009年   7篇
  2008年   11篇
  2007年   11篇
  2006年   10篇
  2005年   5篇
  2004年   9篇
  2003年   9篇
  2002年   4篇
  2001年   8篇
  2000年   1篇
  1999年   1篇
  1997年   1篇
  1986年   1篇
  1984年   1篇
  1983年   2篇
排序方式: 共有118条查询结果,搜索用时 15 毫秒
101.
研究生培养机制改革与创新是新时期我国研究生教育与管理的一项重要内容。以网络技术和多媒体教学为主要特征的信息时代的到来,给研究生培养机制带来了深刻的变革,赋予研究生培养机制以新的特点和新的发展趋势,并给其教育与管理带来了双面影响。我们可以充分依托和发挥网络环境的巨大优势,通过研究生和培养单位的双向努力,共同构建研究生培养机制的网络化、现代化、国际化和谐化。  相似文献   
102.
Repeat burglary victimisation: a tale of two theories   总被引:2,自引:0,他引:2  
Research consistently demonstrates that crime is spatially concentrated. Considering repeat burglary, studies conducted across a variety of countries and for different periods of time demonstrate that events also cluster in time. Two theories have been proposed to explain patterns of repeat victimisation. The first suggests that repeat victimisation is the consequence of a contagion-like process. If a home has been burgled on one occasion, the risk to the home is boosted, most likely because offenders will return to exploit good opportunities further (e.g. to steal replaced items or those left behind). In contrast, the second suggests that repeat victimisation may be explained by time-stable variation in risk across homes and a chance process. Different offenders independently target attractive locations for which risk is flagged. Understanding the contribution of the two explanations is important for both criminological understanding and crime reduction. Hitherto, research concerned with repeat victimisation has adopted a top-down methodology, analysing either victimisation or offender data. In this paper, results are reported for a simple micro-simulation experiment used to examine patterns of victimisation under conditions where the contributions of both theoretical mechanisms are varied. The findings suggest that increasing the heterogeneity of target attractiveness can generate spatial concentrations of crime not dissimilar to those discussed above, but that a contagion-like process is (also) required to generate the time course of repeat victimisation. The implications of the findings are discussed.
Shane D. JohnsonEmail:

Shane D. Johnson   is a Reader at the University College London (UCL) Jill Dando Institute of Crime Science. He has a PhD and an MA in Psychology and a BSc in Computer Science. He has particular interests in the spatial and temporal distribution of crime, crime forecasting, computer simulation, evaluation methods, and design against crime. He has conducted work for a variety of sponsors, including the Arts and Humanities Research Council, the Engineering and Physical Science Research Council, and the Home Office, and he currently coordinates an international research network funded by the British Academy. He has published over 50 original research papers on a range of topics within the fields of criminology and forensic psychology in journals including the Journal of Quantitative Criminology, Criminology and Public Policy and the British Journal of Criminology.  相似文献   
103.
To combat the problem of encryption key recovery from main memory using cold boot-attacks, various solutions has been suggested, but most of these have been implemented on the x86 architecture, which is not prevalent in the smartphone market, where instead ARM dominates.One existing solution does exist for the ARM architecture but it is limited to key sizes of 128 bits due to not being able to utilise the full width of the CPU registers used for key storage. We developed a test-implementation of CPU-bound key storage with 256-bit capacity, without using more hardware resources than the previous solution. We also show that access to the key can be restricted for programs executing outside the kernel space.  相似文献   
104.
This article investigated the moderating role of age on the positive relationship between computer self-efficacy (CSE) and intention to use e-government services.The Technology Acceptance Model was used as the theoretical framework for this study while the data was analyzed with SPSS. The results showed that age as a demographic factor was significant and positively moderates the impact of CSE on the intention to use e-government services. Also, CSE was a significant predictor of the intention to use but age does not have a direct significant impact on the intention to use. The implications of these findings are discussed.  相似文献   
105.
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.  相似文献   
106.
正Sept.8-11,2014,Xiamen,China Exhibitions,Matchmaking of Capital and Projects,Release of Authoritative Information,High-level Networking A premier forum that sets trends for global capital The International Investment Forum(IIF)is the premier channel for China to release  相似文献   
107.
计算机网络犯罪及其取证初探   总被引:1,自引:0,他引:1  
计算机网络犯罪形形色色,但都会被计算机系统或网络设备“记录”下数据。计算机取证(Computerforensics)又称为数字取证或电子取证,是对计算机犯罪的证据进行获取、保存、分析和出示,它实质上是一个详细扫描计算机系统以及重建入侵事件的过程。计算机取证既需要应用数据,又需要有些软件或工具在运行过程中产生的记录运行状态和操作结果的系统数据。  相似文献   
108.
二十一世纪是信息时代。教育的历史告诉我们,教育的每次重大变革和发展都离不开科学技术,自上世纪九十年代以来,多媒体和计算机网络开始应用于教学,现在已成为现代教育的技术基础。充分利用以校园网为基础综合教育资源,建设具有现代教育思想、教育理念,掌握现代教育技术,适应21  相似文献   
109.
With much information available from open sources on the internet, computer generated databases have become commonplace. The question whether computer generated databases can be protected under the sui generis database right has hitherto received little attention. This article investigates this question and finds that the substantiality of investment, the definition of the rights holder and the interpretation of exclusive rights raise fundamental issues.  相似文献   
110.
随着互联网的发展,人们对其熟悉和依赖程度越来越高,但由于所采用的P2P技术尚有不够完善之处,因而在为我们日常生活提供便利的同时,也给不法分子利用互联网传播淫秽电子信息带来了可乘之机。自2006年以来,巴西警方通过采用"EspiaMule"软件及国内外多方合作等举措有效打击了这一犯罪,并取得了较好的成效,具有一定的借鉴意义。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号