首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  免费   0篇
世界政治   1篇
法律   19篇
综合类   1篇
  2022年   1篇
  2020年   1篇
  2018年   2篇
  2014年   1篇
  2013年   2篇
  2011年   2篇
  2010年   2篇
  2009年   2篇
  2008年   2篇
  2007年   6篇
排序方式: 共有21条查询结果,搜索用时 17 毫秒
1.
The existing literature seriously misinterprets the available evidence on the predictability of high rate criminal offending and thus the potential value of statistical treatment rules that impose stiffer punishments on offenders with higher predicted risk of recidivism. The misinterpretation results from the failure to take account of the fact that the data used in existing risk assessment exercises come from environments characterized by informal (and sometimes formal) attempts by judges and other actors to base penal treatments on expected recidivism. Findings of little or no predictive power for baseline covariates may simply indicate the efficient use of the available information. We lay out the problem in detail, provide examples from several literatures and then consider general solutions to the problem.
Jeffrey SmithEmail:
  相似文献   
2.
This paper is the fifth in a series of six in relation to the development of a harmonised method for the profiling of amphetamine [L. Aalberg, K. Andersson, C. Bertler, H. Borén, M.D. Cole, J. Dahlén, Y. Finnon, H. Huizer, K. Jalava, E. Kaa, E. Lock, A. Lopes, A. Poortman-van der Meer, E. Sippola, Development of a harmonised method for the profiling of amphetamines I. Synthesis of standards and compilation of analytical data, Forensic Sci. Int. 149 (2005) 219-229; L. Aalberg, K. Andersson, C. Bertler, M.D. Cole, Y. Finnon, H. Huizer, K. Jalava, E. Kaa, E. Lock, A. Lopes, A. Poortman-van der Meer, E. Sippola, J. Dahlén, Development of a harmonised method for the profiling of amphetamines II. Stability of impurities in organic solvents, Forensic Sci. Int. 149 (2005) 231-241]. The third paper [K. Andersson, K. Jalava, E. Lock, L. Aalberg, Y. Finnon, H. Huizer, E. Kaa, A. Lopes, A. Poortman-van der Meer, M.D. Cole, J. Dahlén, E. Sippola, Development of a harmonised method for the profiling of amphetamines III. Development of the gas chromatographic method, Forensic Sci. Int., in press] dealt with the optimisation of the gas chromatographic and detection methods whereas the fourth paper [K. Andersson, K. Jalava, E. Lock, Y. Finnon, S. Stevenson, L. Aalberg, H. Huizer, E. Kaa, A. Lopes, A. Poortman-van der Meer, M.D. Cole, J. Dahlén, E. Sippola, Development of a harmonised method for the profiling of amphetamines IV. Optimisation of sample preparation, Forensic Sci. Int., in press] concerned the optimisation of the extraction method prior to GC analysis. This paper is a study of the optimised method in order to determine its stability. Investigations of within and between day variations were carried out in four laboratories. Moreover, variations between laboratories were also determined. Both flame ionisation detector (FID) and MS detection were used. One laboratory studied nitrogen-phosphorous detector (NPD) detection as well. For this task, 12 batches of amphetamine were prepared. Six of them were synthesised via the Leuckart route, three via the nitrostyrene route and three via the reductive amination route [A.M.A. Verweij, Impurities in illicit drug preparations: amphetamine and methamphetamine, Forensic Sci. Rev. 1 (1989) 2-11]. Taking into account all studied target compounds and the average results from four laboratories, the within day variation was around 6% for FID and 5% for MS, the between days variation was around 10% for FID and 8% for MS. For NPD detection, within day variation was 5% and between days variation 9% (only one laboratory). Finally, the inter-laboratory variation was about 12% for FID (four laboratories) and 10% for MS (three laboratories).  相似文献   
3.
The present paper1 aims both at introducing the legal aspects of the protection of minors in cyberspace and analysing and criticizing certain main features embedded in this legal approach of young people protection. After a short introduction underlining the concept of child’s rights and the reason why this right has been particularly proclaimed in the context of the cyberspace, the first section describes the new technological features of the ICT environment and linked to this evolution the increasing risks the minors are confronted with. A typology of cyber abuses is proposed on the basis of these considerations. A list of EU or Council of Europe texts directly or indirectly related to the minors’ protection into the cyberspace is provided. The second section intends to analyse certain characteristics of the legal approach as regards the ways by which that protection is conceived and effectively ensured. Different principles and methods might be considered as keywords summarizing the legal approach and to a certain extent, fixing a partition of responsibilities taking fully into account the diversity of actors might be deduced from the different regulatory documents.The third section comes back to the different complementary means by which the Law is envisaging the minors’ protection. The obligation to create awareness about the potential risks minors might incur definitively is the first one. The omnipresent reference in all the legal texts to the role of self-regulatory interventions constitutes another pillar of the protection envisaged by the Law. After having described the multiple instruments developed in the context of this self-regulation (labels, codes of conduct, hotlines, ODR…) or even co-regulation, the paper examines the conditions set by the European legislators as regards these instruments. Technology might be considered as a fourth method for protecting children. Our concern will be to see how the Law is addressing new requirements as regards the technological solutions and their implementation. The present debates about the liability of the actors involved in applications or services targeted or not vis-à-vis the minors like SNS or VSP operators are evoked. As a final point the question of the increasing competences of LEA and the reinforcement of the criminal provisions in order to fight cyber abuses against minors will be debated. In conclusion, we will address final recommendations about the way by which it would be possible to reconcile effective minors’ protection and liberties into the cyberspace.  相似文献   
4.
5.
Direct PCR is fast becoming a popular method in forensic science due to the advantages of saving time and money in the lab while increasing the probability of obtaining substantial results has a positive rippling effect. A laboratory is able to reduce the time spent on processing trace DNA samples, which can lead to investigators receiving important information in a timely manner that may not have been possible using standard methods. This study highlights the benefits of direct PCR in forensic casework by analysing trace and touch DNA on a range of substrates and exploring the loss of initial DNA due to extraction.  相似文献   
6.
The author starts by questioning the main privacy challenges raised by our present and future information society viewed as a “global village”. Apart from a comparison with the traditional village of our parents, he identifies the two complementary and not dissociable facets of our privacy: the right to seclusion and the right to participate fully in our society. According to the first German Constitutional Court recognizing the right to informational self-determination as a new constitutional right, he underlines the need to analyse the data protection as a tool for ensuring both the citizens' dignity and our democracy.  相似文献   
7.
《Science & justice》2022,62(5):610-620
Document fraud is a transnational form of crime, and its serial character has already been highlighted. To combat this phenomenon, the Interstate Database of Fraudulent Identity Documents (BIDIF) has been created and implemented in Switzerland. It supports the comparison of documents and the detection of series, i.e., documents that share a common source. To efficiently use such a system, forensic document examiners would benefit from a harmonised and proven profiling method. Thus, the aim of this study is to develop a method for comparing documents and establishing series. The method is meant to improve the detection capabilities of forensic document examiners operating BIDIF or engaged in the profiling of fraudulent documents. First, a method based on the visual characteristics of digitised images of fraudulent identity documents has been developed. Subsequently, the method was qualitatively and quantitatively evaluated using four tests. The first test verified the ability of the method to detect pre-existing series. The second test checked the capability of the method to detect links amongst isolated documents. Finally, two further tests were carried out to compare the method impact on the successful detection of series. These tests were carried out by professional forensic document examiners and Master students in forensic science, respectively. This allowed a comparison of the method influence on series detection. The method allowed a significant increase in the number of series and links detected, while also decreasing the occurrence of false negatives and false positives. Furthermore, links were more rapidly detected.  相似文献   
8.
Smuggling of methamphetamine is affected by enforced regulation and international situation, resulting in changes of precursors and synthetic methods used. Enantiomer ratio of methamphetamine can provide information concerning its precursor and synthetic method. This information is useful for the prevention of smuggling methamphetamine and its precursor, and resultant reduction of methamphetamine abuse. In the present study, we investigated on the enantiomer ratios of 433 crystalline methamphetamine samples seized in Korea from 1994 to 2005. Excluding 17 samples of low purity, 416 samples were used for enantiomer profiling. The methamphetamine samples were derivatized with (S)-(+)-alpha-methoxy-alpha-(trifluoromethyl)phenylacetyl chloride ((S)-(+)-MTPACl), and the derivatives were analyzed by GCMS in selected ion monitoring (SIM) mode. The enantiomer ratios of the samples were calculated from the standard calibration curves of each enantiomer, both of which showed good linearity in the range of 0-1.2 microg. Most of the seizures were pure S(+)-enantiomer, but 21% (95 of 416 samples) contained R(-)-enantiomer above 1%. They began to appear from 1997, and increased continuously up to 50% in the year 2005 (55 of 111 samples). From this study, we could find out that alternative precursors have been used recently for the illicit manufacture of methamphetamine seized in Korea.  相似文献   
9.
The authors contend that the emerging ubiquitous Information Society (aka ambient intelligence, pervasive computing, ubiquitous networking and so on) will raise many privacy and trust issues that are context dependent. These issues will pose many challenges for policy-makers and stakeholders because people's notions of privacy and trust are different and shifting. People's attitudes towards privacy and protecting their personal data can vary significantly according to differing circumstances. In addition, notions of privacy and trust are changing over time. The authors provide numerous examples of the challenges facing policy-makers and identify some possible responses, but they see a need for improvements in the policy-making process in order to deal more effectively with varying contexts. They also identify some useful policy-making tools. They conclude that the broad brush policies of the past are not likely to be adequate to deal with the new challenges and that we are probably entering an era that will require development of “micro-policies”. While the new technologies will pose many challenges, perhaps the biggest challenge of all will be to ensure coherence of these micro-policies.  相似文献   
10.
在全球范围内,随着计算机技术和网络技术的发展,网络犯罪案件数量也迅速增长,并成为一个严重的社会问题。人们普遍关注高科技在应对网络犯罪中应发挥的作用,却常常忽略传统侦查手段的应用,如在犯罪人特征描述领域。有证据表明,在网路犯罪领域确实通常存在着一些区别性的特征,这是犯罪人特征描述适用的基础。应针对网络犯罪和犯罪人特征描述的内容,探讨两者结合的可能性和方式,并分析其中存在的问题及未来的发展。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号