首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   210篇
  免费   2篇
各国政治   2篇
工人农民   2篇
外交国际关系   3篇
法律   155篇
中国共产党   1篇
中国政治   7篇
政治理论   11篇
综合类   31篇
  2023年   5篇
  2022年   16篇
  2021年   12篇
  2020年   8篇
  2019年   11篇
  2018年   19篇
  2017年   8篇
  2016年   7篇
  2015年   11篇
  2014年   27篇
  2013年   13篇
  2012年   8篇
  2011年   10篇
  2010年   4篇
  2009年   8篇
  2008年   6篇
  2007年   10篇
  2006年   11篇
  2005年   3篇
  2004年   3篇
  2003年   5篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有212条查询结果,搜索用时 57 毫秒
181.
《Science & justice》2021,61(5):586-596
This study explores digital forensics (DF) reporting practices and compares the results with other forensic science disciplines. Forty reports were obtained from a quasi-experiment involving DF examiners, and a quantitative content analysis was performed to determine which conclusion types they applied and which content they included with relevance to the credibility of the reported results. A qualitative analysis was performed to examine the certainty expressions used in the conclusions. The results were compared to a study of eight forensic science disciplines performed by Bali et al. [24,26]. The results show that the DF examiners tend to present their conclusions either as Categorical conclusion or Strength of support (SoS) conclusion types and that they address source, activity, and offence level issues in their conclusions. The content analysis indicates deficiencies in DF reporting practices, and several of the challenges seem to be shared with other FS disciplines. The analysis of certainty expressions showed that a plethora of expressions was used, and that they lacked reference to an established framework. The results indicate that more research on DF evaluation and reporting practices is necessary and justifies a need for enhanced focus on quality control and peer review within the DF discipline.  相似文献   
182.
Digital devices now play an important role in the lives of many in society. Whilst they are used predominantly for legitimate purposes, instances of digital crime are witnessed, where determining their usage is important to any criminal investigation. Typically, when determining who has used a digital device, digital forensic analysis is utilised, however, biological trace evidence or fingerprints residing on its surfaces may also be of value. This work provides a preliminary study which examines the potential for fingerprint recovery from computer peripherals, namely keyboards and mice. Our implementation methodology is outlined, and results discussed which indicate that print recovery is possible. Findings are intended to support those operating at-scene in an evidence collection capacity.  相似文献   
183.
Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to enhance the efficiency and effectiveness of their own operations. This paper will discuss the organized criminal exploitation of digital technology, by looking at a number of illustrative cases from Asia and around the world. It will discuss the various types of “conventional” organized crime that can be facilitated by digital technology, as well as terrorism, which itself can be regarded as a special kind of organized criminal activity. One fundamental question that the paper will seek to address is whether the activities of Asian organized crime have become substantively different as a result of technology, or whether traditional organized criminal activities in Asia are merely being conducted on a more efficient and effective basis. The paper will note the transnational nature of much organized criminal activity, and will discuss mechanisms for the control of organized crime in the digital age.  相似文献   
184.
The High Court has recently delivered judgment on the judicial review of the Digital Economy Act 2010 (DEA) and the draft Costs Order1 on application by BT and Talktalk.2 Mr Justice Kenneth Parker rejected the application on all but one ground (one aspect of the cost sharing arrangement). See: The Queen on the Application of British Telecommunications Plc, Talktalk Telecom Group Plc v The Secretary of State for Business, Innovation and Skills [2011] EWHC 1021 (Admin), Judgment of 20. April 2011.  相似文献   
185.
数字图书馆的版权保护和版权例外   总被引:3,自引:0,他引:3  
网络时代数字图书馆应运而生 ,相应的数字图书馆的版权保护问题也日益突出。文章阐述了数字作品的版权归属、版权保护力度的扩大、数字图书馆对版权保护的冲击、版权保护应有一定的限制 ,以及数字图书馆为了平衡版权人、图书馆、读者三方面的利益机制而常用的版权例外的各种具体方法。  相似文献   
186.
数字城市:一种新的城市生存发展方式   总被引:1,自引:0,他引:1  
数字城市是城市现代化的必然结果,也是一种新的城市生存发展方式。我国数字城市发展呈现出“城市数字化工程初见成效、信息化试点城市逐年增多、数字城市基础设施建设初具规模、数字城市解决方案问世、数字城市论坛与日俱增”等特点。数字城市是一项复杂的社会系统工程,构建中国式数字城市必须采取综合政策措施,这对于推进中国城市化与信息化的协调发展具有十分重要的意义。  相似文献   
187.
四川汉族青少年面部中线软组织厚度的数字X线测量   总被引:4,自引:0,他引:4  
目的测量四川汉族青少年(8~20岁)人群面部中线软组织厚度,探讨其生长发育变化规律,为法医人类学的面部重建提供的基础数据。方法选取974例(男496,女478)头颅侧位数字X线片,分13个年龄段(8~20岁),选择面部10个标志点的软组织厚度测量,并进行描述性统计学分析。结果四川汉族青少年人群面部10个标志点的中线软组织平均厚度,在青少年阶段大多数测量标志点随年龄增长而增厚;男女性面部中线软组织厚度统计学分析存在性别差异(P<0.05),在15岁之后差异增大,且LLI点显著差异性在9~20岁之间均存在(P<0.01)。结论四川汉族青少年面部中线软组织厚度有随年龄增长而增厚的趋势,男女面部软组织厚度存在性别差异。  相似文献   
188.
The Digital Britain interim report was published on 29 January 2009 by the DCMS and BERR with the final report being due out in June. The Report divides itself into four areas for ‘action’; namely Digital Networks, Digital Content, Universal Connectivity and Equipping Everyone to Benefit from Digital Britain. The level of action proposed in each case varies widely and the Report has come under criticism for delivering little in the way of concrete promises or clearly defined strategy. This article summarises and analyses a number of the key purported actions from the Report in order to consider whether it is indeed an appropriate step towards an action plan that would secure the Britain's place at the forefront of the new media age.  相似文献   
189.
信息网络时代版权保护制度正在衍变。文章探讨了信息网络时代版权保护制度的两大变革。第一,在版权侵权责任的归责原则上对传统的过错责任原则作了变革,产生了“通知后责任”制度,也就是其他论著中所说的网络服务提供者间接侵权制度,在这一点上,文章试图从一个新的角度也就是归责原则的变更角度对之进行探讨。第二是版权保护的中心从复制权转移到传播权的趋向,这一点还未引起学界的重视,文章试图论证这种变革正在发生。在数字世界,控制传播比控制复制具有更大的意义。  相似文献   
190.
目的系统筛选颌面影像法医学同一认定的识别指标,制定全口牙型识别指标编码。方法随机选取620例有牙齿治疗史者、150例牙齿有病变无治疗史者的数字全口牙位曲面体层片进行观测,根据牙齿的生理变异、病理改变和治疗特征筛选全口牙型识别指标,并按设计的编码标准和原则对其全口牙型逐一编码,最后分别统计两组全口牙型的多样性以评估其价值。结果620例牙齿有治疗史者中共有619种全口牙型编码,全口牙型多样性为99.84%;150例牙齿有病变无治疗史者中共有146种全口牙型编码,全口牙型多样性为97.33%。结论选出的全口牙型识别指标对牙齿异常者进行法医学同一认定具有实际应用价值。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号