首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   55篇
  免费   1篇
工人农民   1篇
外交国际关系   2篇
法律   41篇
中国政治   6篇
政治理论   2篇
综合类   4篇
  2023年   2篇
  2019年   3篇
  2018年   5篇
  2017年   4篇
  2016年   10篇
  2015年   3篇
  2014年   5篇
  2013年   5篇
  2012年   2篇
  2011年   1篇
  2010年   1篇
  2007年   5篇
  2006年   2篇
  2005年   1篇
  2004年   4篇
  2002年   2篇
  2000年   1篇
排序方式: 共有56条查询结果,搜索用时 15 毫秒
1.
目前恐怖袭击猖獗,建立具有反恐应急指挥作用的公共安全系统已愈发重要。本文从系统研发的角度,阐述系统的数据库建设及主要功能,最后就系统建设需要重点考虑的问题进行了讨论。  相似文献   
2.
李巧毅 《政法学刊》2005,22(1):90-92
近年来,在我国房地产业发展的过程中,引入了香港地区的商品房预售按揭贷款制度我国引入后的按揭制度与香港按揭制度因法律制度的根本不同而存在区别,应将其界定为以一般债权为标的物的权利质押的方式,并将其与抵押、让与担保等相关法津制度进行区别,进一步完善我国的在建工程权利质押制度  相似文献   
3.
Spamming is a major threat to the formation of public trust in the Internet and discourages broader civil participation in the emerging information society. To the individual, spams are usually little more than a nuisance, but collectively they expose Internet users to a panoply of new risks while threatening the communications and commercial infrastructure. Spamming also raises important questions of criminological interest. On the one hand it is an example of a pure cybercrime – a harmful behaviour mediated by the Internet that is the subject of criminal law, while on the other hand, it is a behaviour that has in practice been most effectively contained technologically by the manipulation of ‘code’ – but at what cost? Because there is not an agreed meaning as to what constitutes ‘online order’ that renders it simply and uncritically reducible to a set of formulae and algorithms that can be subsequently imposed (surreptitiously) by technological processes. The imposition of order online, as it is offline, needs to be subject to critical discussion and also checks and balances that have their origins in the authority of law. This article deconstructs and analyses spamming behaviour, before exploring the boundaries between law and code (technology) as governance in order to inform and stimulate the debate over the embedding of cybercrime prevention policy within the code itself.  相似文献   
4.
庄乾龙 《时代法学》2012,10(2):37-43
司法实践中电子邮件加密方法主要有对称密钥加密与非对称密钥加密两类,结合数字认证、数字签名等辅助加密技术,可以相应提高加密级别,增加电子邮件安全性。一般而言,加密电子邮件可靠性要高于非加密电子邮件,加密电子邮件证据能力受解密程序影响。电子邮件证据证明力受加密方法、行为人对电子邮件控制程度等因素影响。电子邮件证据证明力随加密级别的提高而提高。  相似文献   
5.
正Dear Readers,Forum is a column that provides a space for varying perspectives on contemporary Chinese society.We invite you to submit personal viewpoints on past and current topics(in either English or Chinese).yanwei@bjreview.com Please provide your name and address along with your comments Deng Xiaoping’s role as the father of reform in modern China is historically secure.In his vast biography of the Chinese leader published in 2011,American academic  相似文献   
6.
Hope is an important factor in psychological resilience and change, and recovery from mental health difficulties. Recently, there has been an increased focus on recovery-oriented practice within forensic mental health settings. Several policies include calls for mental health practitioners to inspire hope for recovery in the individuals they work with. However, there is little suggestion of how to implement such recommendations in practice or research exploring how staff foster hope in forensic settings. This study used grounded theory to explore nurses’ perspectives and experiences of hope within a medium secure setting. A model was developed from the data that integrated nurses’ beliefs about hope, practices to develop service users’ hope and the emotional impact of this work. The nurses’ values played a significant role in their work to develop hope. Recommendations are made to help manage the emotional impact and address challenges unique to fostering hope within forensic settings.  相似文献   
7.
Introduction: The use of seclusion as a means of managing the extreme behaviours forensic patients in secure settings is a controversial yet often common practice, despite there being little evidence that seclusion as a practice has any significant therapeutic value for the patient. The aim of this study was to explore the use of seclusion and whether this differs as a function of gender and diagnosis across secure services. Method: This study collated data from 11 medium and low secure hospitals that admit male and female patients, with some services providing services for patients with intellectual disability (with or without co-morbid disorders), and others for patients with mental illness and/or personality disorder only. Results: Both gender and diagnosis were associated with differential seclusion rates. Seclusions were three times longer for patients in the non-ID compared to the ID service. Male seclusions (for any diagnosis) were around twice as long as those in female services. Female ID patients spent significantly less time in seclusion compared to other groups. Female ID was associated with two to three times the number of seclusion events per patient compared to other groups. No statistically significant association between the type of service and the reason for a patient being secluded. Conclusions: A range of organisational factors that determine the use and duration of seclusion are cited and merit further exploration. High rates of psychiatric co-morbidity and the complexity of patients admitted to services may also mediate risk and use of seclusion. The study supports the use of early intervention techniques and the adoption of positive behaviour support.  相似文献   
8.
This paper examines the characteristics of a group of 64 young men, who were consecutively admitted to Bluebird House, an NHS mixed gender, adolescent forensic, medium secure hospital. The characteristics examined focus on the young men’s clinical presentations, as informed by the Millon Adolescent Clinical Inventory, and their ICD10 (WHO 1992) diagnoses. The paper also examines the males’ route into, and out of, Bluebird House, as well as their risk profiles, especially with regards to others, as informed by Structured Assessment of Violence Risk in Youth findings and staff recorded incidents. Correlational analysis is performed to try and understand this population, with statistically significant findings highlighted. The discussion considers the trajectory for some of these young men into adult personality disorders, their presentation and prognosis compared to their female counterparts, and how their presentation contrasts with adult male forensic populations.  相似文献   
9.
This service evaluation project explored service users’ experiences of positive behavioural support (PBS) within a medium secure mental health service. Interpretative phenomenological analysis (IPA) was used to analyse interviews with ten service users. Four main themes emerged from the data: My plan; How I understand PBS; How PBS has helped me, the benefits; and Making the plan work. Overall, service users viewed their experience of having a PBS plan positively. They reflected that the plans offered staff greater understanding of their behaviours and needs, enabling them to receive appropriate support. Service users valued the experience of being involved in the process, offering important insights into their experiences. They also expressed frustrations about staff not following the plan and not understanding why they had a plan whilst others did not. Limitations of the study, clinical implications and ideas for future research have been discussed.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号