首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6篇
  免费   0篇
世界政治   1篇
法律   3篇
中国政治   1篇
综合类   1篇
  2018年   1篇
  2013年   2篇
  2008年   2篇
  2003年   1篇
排序方式: 共有6条查询结果,搜索用时 21 毫秒
1
1.
We studied the predictive, comparative, and incremental validity of three measures of psychopathic features (Psychopathy Checklist: Youth Version [PCL:YV]; Antisocial Process Screening Device [APSD]; Childhood Psychopathy Scale [CPS]) vis-à-vis criminal recidivism among 83 delinquent youth within a truly prospective design. Bivariate and multivariate analyses (Cox proportional hazard analyses) showed that of the three measures, the CPS was most consistently related to most types of recidivism in comparison to the other measures. However, incremental validity analyses demonstrated that all of the predictive effects for the measures of psychopathic features disappeared after conceptually relevant covariates (i.e., substance use, conduct disorder, young age, past property crime) were included in multivariate predictive models. Implications for the limits of these measures in applied juvenile justice assessment are discussed.  相似文献   
2.
多道心理测试(CPS)是一种利用被测谎人说谎时植物神经系统产生的生理参数变化进行测谎的刑事技术,为现在的刑事司法实务所普遍应用;脑电波测试(ERP)是另一种利用被测谎人说谎时人脑事件相关电位的变化进行测谎的刑事技术,其仍处于实验研发阶段。通过对这两种测谎在刑事技术上的比较归纳,来揭示他们在侦查实务中的异同,并就与测谎有关的若干刑事司法问题展开思考具有重要意义。  相似文献   
3.
付翠 《政法学刊》2013,(6):69-73
ERP测谎技术作为一种新兴的测试技术不断应用于实际测试过程中,而为了保证测试的准确性,往往会将ERP测谎技术和CPS测谎技术结合使用。但两种测谎技术的测试顺序是否会对测试结论存在影响还无定论,因此文章拟利用同一模拟案件情境对被测人分别进行CPS和ERP测谎,并以测试顺序为变量来分析不同的测试顺序对测试结论是否具有显著影响,以期为心理测试实践提供一定的参考意见。  相似文献   
4.
事件相关电位心理测试技术与传统的多道心理生理测试技术相比,遵循着不同的基本原理和机制,由此带来二者在心理测量学上的差异。文章拟从心理测量学的行为样本、标准化、难度客观性测量以及信度、效度五个方面来分析两种测试方式的差异。  相似文献   
5.
Sensemaking provides a framework for understanding and interpreting managers' working lives, based on a thorough critique of rational choice models. It refutes rational choice, and aims not to predict, prove or control but simply to explain: the making of sense. This article, based on the author's original prizewinning MBA thesis, presents research undertaken in 2005–2006 on the uses of sensemaking in understanding local government organisations' contrasting experiences of performance management systems: an internal system in Canadian city government, and an externally-imposed system in the form of the now abandoned Comprehensive Performance Assessment (CPA) in British local government. Key literature utilised includes social and organisational psychologist Karl Weick, British complexity theorists such as Ralph Stacey, and a literature on the politics of organisational behaviour (such as Guy Peters et al.). A critique of rational choice and summary of sensemaking precedes an account of phenomenological case study research across two countries, undertaken using ethnographic field methods. The author argues that using sensemaking to understand performance management systems provides a further imperfect means of making sense of inherent organisational equivocality. These systems are radically interpreted as devices for making sense of experience in organisations in which human behaviour cannot be expected to be forever accurately predicted and controlled. Conclusions with enduring relevance for practising managers are presented on the personal, tactical, methodological and philosophical ‘uses’ of sensemaking in managers' working lives.  相似文献   
6.
Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to be enforced from May 2018). We use the case study of the emergent smart energy supply chain to frame, scope out and consolidate the breadth of security concerns at play, and the regulatory responses. We argue the industrial IoT brings four security concerns to the fore, namely: appreciating the shift from offline to online infrastructure; managing temporal dimensions of security; addressing the implementation gap for best practice; and engaging with infrastructural complexity. Our goal is to surface risks and foster dialogue to avoid the emergence of an Internet of Insecure Industrial Things.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号