全文获取类型
收费全文 | 118篇 |
免费 | 0篇 |
专业分类
各国政治 | 2篇 |
世界政治 | 1篇 |
法律 | 44篇 |
中国政治 | 7篇 |
政治理论 | 1篇 |
综合类 | 63篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2019年 | 3篇 |
2018年 | 2篇 |
2016年 | 1篇 |
2015年 | 1篇 |
2014年 | 8篇 |
2013年 | 6篇 |
2012年 | 1篇 |
2011年 | 10篇 |
2010年 | 2篇 |
2009年 | 7篇 |
2008年 | 11篇 |
2007年 | 11篇 |
2006年 | 10篇 |
2005年 | 5篇 |
2004年 | 9篇 |
2003年 | 9篇 |
2002年 | 4篇 |
2001年 | 8篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1997年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 2篇 |
排序方式: 共有118条查询结果,搜索用时 15 毫秒
101.
研究生培养机制改革与创新是新时期我国研究生教育与管理的一项重要内容。以网络技术和多媒体教学为主要特征的信息时代的到来,给研究生培养机制带来了深刻的变革,赋予研究生培养机制以新的特点和新的发展趋势,并给其教育与管理带来了双面影响。我们可以充分依托和发挥网络环境的巨大优势,通过研究生和培养单位的双向努力,共同构建研究生培养机制的网络化、现代化、国际化和谐化。 相似文献
102.
Repeat burglary victimisation: a tale of two theories 总被引:2,自引:0,他引:2
Shane D. Johnson 《Journal of Experimental Criminology》2008,4(3):215-240
Research consistently demonstrates that crime is spatially concentrated. Considering repeat burglary, studies conducted across
a variety of countries and for different periods of time demonstrate that events also cluster in time. Two theories have been
proposed to explain patterns of repeat victimisation. The first suggests that repeat victimisation is the consequence of a
contagion-like process. If a home has been burgled on one occasion, the risk to the home is boosted, most likely because offenders will return to exploit good opportunities further (e.g. to steal replaced items or those left
behind). In contrast, the second suggests that repeat victimisation may be explained by time-stable variation in risk across
homes and a chance process. Different offenders independently target attractive locations for which risk is flagged. Understanding the contribution of the two explanations is important for both criminological understanding and crime reduction.
Hitherto, research concerned with repeat victimisation has adopted a top-down methodology, analysing either victimisation
or offender data. In this paper, results are reported for a simple micro-simulation experiment used to examine patterns of
victimisation under conditions where the contributions of both theoretical mechanisms are varied. The findings suggest that
increasing the heterogeneity of target attractiveness can generate spatial concentrations of crime not dissimilar to those
discussed above, but that a contagion-like process is (also) required to generate the time course of repeat victimisation.
The implications of the findings are discussed.
Shane D. Johnson is a Reader at the University College London (UCL) Jill Dando Institute of Crime Science. He has a PhD and an MA in Psychology and a BSc in Computer Science. He has particular interests in the spatial and temporal distribution of crime, crime forecasting, computer simulation, evaluation methods, and design against crime. He has conducted work for a variety of sponsors, including the Arts and Humanities Research Council, the Engineering and Physical Science Research Council, and the Home Office, and he currently coordinates an international research network funded by the British Academy. He has published over 50 original research papers on a range of topics within the fields of criminology and forensic psychology in journals including the Journal of Quantitative Criminology, Criminology and Public Policy and the British Journal of Criminology. 相似文献
Shane D. JohnsonEmail: |
Shane D. Johnson is a Reader at the University College London (UCL) Jill Dando Institute of Crime Science. He has a PhD and an MA in Psychology and a BSc in Computer Science. He has particular interests in the spatial and temporal distribution of crime, crime forecasting, computer simulation, evaluation methods, and design against crime. He has conducted work for a variety of sponsors, including the Arts and Humanities Research Council, the Engineering and Physical Science Research Council, and the Home Office, and he currently coordinates an international research network funded by the British Academy. He has published over 50 original research papers on a range of topics within the fields of criminology and forensic psychology in journals including the Journal of Quantitative Criminology, Criminology and Public Policy and the British Journal of Criminology. 相似文献
103.
To combat the problem of encryption key recovery from main memory using cold boot-attacks, various solutions has been suggested, but most of these have been implemented on the x86 architecture, which is not prevalent in the smartphone market, where instead ARM dominates.One existing solution does exist for the ARM architecture but it is limited to key sizes of 128 bits due to not being able to utilise the full width of the CPU registers used for key storage. We developed a test-implementation of CPU-bound key storage with 256-bit capacity, without using more hardware resources than the previous solution. We also show that access to the key can be restricted for programs executing outside the kernel space. 相似文献
104.
This article investigated the moderating role of age on the positive relationship between computer self-efficacy (CSE) and intention to use e-government services.The Technology Acceptance Model was used as the theoretical framework for this study while the data was analyzed with SPSS. The results showed that age as a demographic factor was significant and positively moderates the impact of CSE on the intention to use e-government services. Also, CSE was a significant predictor of the intention to use but age does not have a direct significant impact on the intention to use. The implications of these findings are discussed. 相似文献
105.
Rodger Jamieson Lesley Pek Wee Land Donald Winchester Greg Stephens Alex Steel Alana Maurushat Rick Sarre 《Computer Law & Security Report》2012
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three. 相似文献
106.
《北京周报(英文版)》2014,(32)
正Sept.8-11,2014,Xiamen,China Exhibitions,Matchmaking of Capital and Projects,Release of Authoritative Information,High-level Networking A premier forum that sets trends for global capital The International Investment Forum(IIF)is the premier channel for China to release 相似文献
107.
计算机网络犯罪及其取证初探 总被引:1,自引:0,他引:1
王刚 《四川警官高等专科学校学报》2006,18(4):52-58
计算机网络犯罪形形色色,但都会被计算机系统或网络设备“记录”下数据。计算机取证(Computerforensics)又称为数字取证或电子取证,是对计算机犯罪的证据进行获取、保存、分析和出示,它实质上是一个详细扫描计算机系统以及重建入侵事件的过程。计算机取证既需要应用数据,又需要有些软件或工具在运行过程中产生的记录运行状态和操作结果的系统数据。 相似文献
108.
崔军 《天津市工会管理干部学院学报》2006,14(2):48-50
二十一世纪是信息时代。教育的历史告诉我们,教育的每次重大变革和发展都离不开科学技术,自上世纪九十年代以来,多媒体和计算机网络开始应用于教学,现在已成为现代教育的技术基础。充分利用以校园网为基础综合教育资源,建设具有现代教育思想、教育理念,掌握现代教育技术,适应21 相似文献
109.
Maurice Schellekens 《Computer Law & Security Report》2011,27(6):620-629
With much information available from open sources on the internet, computer generated databases have become commonplace. The question whether computer generated databases can be protected under the sui generis database right has hitherto received little attention. This article investigates this question and finds that the substantiality of investment, the definition of the rights holder and the interpretation of exclusive rights raise fundamental issues. 相似文献
110.
随着互联网的发展,人们对其熟悉和依赖程度越来越高,但由于所采用的P2P技术尚有不够完善之处,因而在为我们日常生活提供便利的同时,也给不法分子利用互联网传播淫秽电子信息带来了可乘之机。自2006年以来,巴西警方通过采用"EspiaMule"软件及国内外多方合作等举措有效打击了这一犯罪,并取得了较好的成效,具有一定的借鉴意义。 相似文献