首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   26篇
  免费   8篇
各国政治   3篇
工人农民   2篇
外交国际关系   1篇
法律   26篇
政治理论   2篇
  2020年   1篇
  2019年   2篇
  2018年   5篇
  2017年   4篇
  2016年   2篇
  2014年   1篇
  2013年   3篇
  2011年   1篇
  2009年   3篇
  2008年   3篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
  2002年   1篇
  1999年   1篇
  1994年   2篇
  1992年   1篇
  1990年   1篇
排序方式: 共有34条查询结果,搜索用时 31 毫秒
1.
Illuminating on the power transition theory, realists are more than convinced of potential structural conflicts in both economic and security realms due to China’s rise. They see China as a dormant source of challenges to American preeminence, economic policies of the west as evident in the recent negotiation discourses (e.g., G-20 and G-8 meetings), the “western” norms of diplomacy (e.g., Washington consensus) in developing countries including in Africa, and security concerns of its neighboring states. However, China will be able to avoid this claimed inevitability by abiding to peaceful ideas deeply embedded in “New Security Concept,” “peaceful rise theory,” “peaceful development” and a “harmonious world” doctrine. This paper argues that China will be able to rise peacefully because of the efficacy of practicing liberalism and constructivism at large in its diplomacy. China is increasingly and genuinely embracing shared norms and institutions, gradually gravitating East Asian regional order to its favor in the form of power constellation.  相似文献   
2.
Advances in technologies including development of smartphone features have contributed to the growth of mobile applications, including dating apps. However, online dating services can be misused. To support law enforcement investigations, a forensic taxonomy that provides a systematic classification of forensic artifacts from Windows Phone 8 (WP8) dating apps is presented in this study. The taxonomy has three categories, namely: Apps Categories, Artifacts Categories, and Data Partition Categories. This taxonomy is built based on the findings from a case study of 28 mobile dating apps, using mobile forensic tools. The dating app taxonomy can be used to inform future studies of dating and related apps, such as those from Android and iOS platforms.  相似文献   
3.
4.
5.
Stephen Choo 《亚洲事务》2013,44(3):361-373
The Anglo-Nepali War of 1814 to 1816 was one of Britain's least distinguished military performances. It was just about a victory, but it produced no heroic feats and thus it was duly forgotten by the Victorians as it failed to fit into the cult of imperialism and the British Raj. But subsequently, as the exploits of Empire became unfashionable, the wars dear to the Victorians were forgotten. But the memory of the Anglo-Nepali War was resurrected as it formed an integral part of the enduring legend of the Gurkhas.  相似文献   
6.
Jaewoo Choo 《East Asia》2006,23(3):91-106
It is a truism that Northeast Asian states could benefit very much if they were to cooperate in the energy security realm. However, to many, especially economists, their behaviour to this common sense solution has been bewildering: there has been simply no progress towards this end and it still remains a puzzle, even to many energy specialists. This article attempts to answer a simple question: Why do the Northeast Asian states, namely China, Japan, Korea, and Russia, not cooperate? For its analysis, the author of the article relies on content analysis of recently released official governmental long-term energy policy and strategy documents of these states, and notes that cooperation for energy security reasons at the regional level is conspicuously absent, which possibly implies a lack of desire and willingness to do so amongst themselves. The article, however, deliberately omits from its study Korea, simply because no such long-term energy policy exists today. It attributes the major cause to the strong propensity by energy specialists to interchangeably use the concepts of ‘energy cooperation’ and ‘energy security’ in their analysis.  相似文献   
7.
Three categories of organised groups that exploit advances in information and communications technologies (ICT) to infringe legal and regulatory controls: (1) traditional organised criminal groups which make use of ICT to enhance their terrestrial criminal activities; (2) organised cybercriminal groups which operate exclusively online; and (3) organised groups of ideologically and politically motivated individuals who make use of ICT to facilitate their criminal conduct are described in this article. The need for law enforcement to have in-depth knowledge of computer forensic principles, guidelines, procedures, tools, and techniques, as well as anti-forensic tools and techniques will become more pronounced with the increased likelihood of digital content being a source of disputes or forming part of underlying evidence to support or refute a dispute in judicial proceedings. There is also a need for new strategies of response and further research on analysing organised criminal activities in cyberspace.
Kim-Kwang Raymond ChooEmail:
  相似文献   
8.
9.
10.
Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under‐explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log‐in to and log‐out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in‐depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号