首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   208篇
  免费   2篇
各国政治   2篇
工人农民   2篇
外交国际关系   3篇
法律   155篇
中国共产党   1篇
中国政治   7篇
政治理论   11篇
综合类   29篇
  2023年   5篇
  2022年   16篇
  2021年   12篇
  2020年   8篇
  2019年   11篇
  2018年   19篇
  2017年   8篇
  2016年   7篇
  2015年   11篇
  2014年   27篇
  2013年   13篇
  2012年   8篇
  2011年   10篇
  2010年   4篇
  2009年   8篇
  2008年   5篇
  2007年   9篇
  2006年   11篇
  2005年   3篇
  2004年   3篇
  2003年   5篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有210条查询结果,搜索用时 15 毫秒
1.
Often, criminal acts involving a vehicle are caught on digital video surveillance systems. While potentially useful for an investigation, the recording conditions are typically less than optimal for the extraction of key information for the identification of the perpetrator, such as a license plate. Providing the make, model and year of a questioned vehicle is a common request for examiners, to narrow the field of potential suspect vehicles. This study seeks to compare the performance of a nonpeer-reviewed make, model, and year determination between two separate groups, specifically, trained forensic image examiners and nontrained individuals. Results show that even with varied image capture conditions and quality, the trained forensic image examiners more correctly and completely identified the test group of questioned vehicles make, model, and year.  相似文献   
2.
数字内容交易目前在全球数字化背景下蓬勃发展,其中,有关数字内容的瑕疵担保责任问题备受关注;立法上欧盟在新出台的《有关提供数字内容和服务的合同交易指令》中有三个条款对此作了专门规定,同时,德国也将此规定完全予以转化适用。基于现有欧盟背景下德国法有关数字内容瑕疵担保责任的比较分析,可知其不但能准确认定数字内容交易中的瑕疵形态与有效提供救济,而且有助于消费者保护。根据我国现有一般物之瑕疵担保规定并结合我国民法典编纂以及域外法经验,在解释论上,通过相关类案的比较分析,我国就此有借鉴适用的必要性;在立法论上,今后在我国《民法典》的解释与适用过程中,可先在《民法典(合同编)》司法解释中原则性地规定有关数字内容瑕疵担保责任,再另行制定具有针对性的单行法,从而有助于数字时代的我国消费者保护与数字经济发展。  相似文献   
3.
《Science & justice》2020,60(5):399-402
Whilst the field of digital forensics is now well established, its research community can be considered relatively emerging in comparison to the associated areas of traditional forensic and computer sciences. As a result, this comment article takes a quick look at the demographics of digital forensics research over the last 20 years, with metadata from 6589 articles being extracted and analysed from Scopus in order to provide a brief insight into this field’s research activity.  相似文献   
4.
唐要家 《长白学刊》2021,(1):106-113
数字经济发展要求对传统监管体制进行重构,通过监管体制创新来促进数字经济高质量发展。数字经济监管体制创新的基本导向为:始终坚持审慎包容的基本原则,将促进开放共享和鼓励创新作为政策基点、维护市场竞争作为政策重心、确保监管体制与政策动态有效作为政策理念。中国数字经济监管体制创新的基本路径为:建立相对完善的监管法律体系,构建"平台+政府"双中心协同监管的治理主体结构,形成与数字经济相适应的监管机构体制,实现审慎包容监管原则制度化,创新监管实施体制和政策手段。  相似文献   
5.
The big data era has a high impact on forensic data analysis. Work is done in speeding up the processing of large amounts of data and enriching this processing with new techniques. Doing forensics calls for specific design considerations, since the processed data is incredibly sensitive. In this paper we explore the impact of forensic drivers and major design principles like security, privacy and transparency on the design and implementation of a centralized digital forensics service.  相似文献   
6.
《Science & justice》2023,63(1):116-126
Given the size and complexity of many digital forensic science device examinations, there is a need for practitioners to formally and strategically determine a course of conduct which allows them to undertake the most robust and efficient examination possible. This work outlines both the need for practitioners to have a digital evidence strategy (DES) when tackling any given examination scenario, how to construct one and the concerns which exist when no formal DES is in place. Approaches to DES development are examined and the context to which they should be deployed are analysed, with focus being on the use of DESs at the examination/processing stage of the investigative workflow. Finally, a ‘DES skeleton’ is offered to guide practitioners as they seek to create their own DES.  相似文献   
7.
Do online and offline voters differ in terms of policy preferences? The growth of Internet voting in recent years has opened up new channels of participation. Whether or not political outcomes change as a consequence of new modes of voting is an open question. Here we analyze all the votes cast both offline (n = 5.7 million) and online (n = 1.3 million) and compare the actual vote choices in a public policy referendum, the world's largest participatory budgeting process, in Rio Grande do Sul in June 2014. In addition to examining aggregate outcomes, we also conducted two surveys to better understand the demographic profiles of who chooses to vote online and offline. We find that policy preferences of online and offline voters are no different, even though our data suggest important demographic differences between offline and online voters.  相似文献   
8.
Digital citizenship is becoming increasingly normalized within advanced democratic states. As society and governmental institutions become reliant on digital technologies, citizens are expected to be and act digitally. This article examines the governance of digital citizens through a case study of digitalization efforts in Denmark. Drawing on multiple forms of data, the article showcases how digital citizens are governed through a combination of discursive, legal and institutional means. The article highlights the political, but also institutional work that goes into making citizens digital. Providing this case study, the article contributes to current critical perspectives on the digital citizen as a new political figure. It adds new insights into digital citizenship by connecting this figure to wider processes of neoliberalization and state restructuring, pushing for a more pronounced focus on governmental practices.  相似文献   
9.
Lawful Interception (LI) of data communications is an essential tool for Law Enforcement Agencies (LEA) in order to investigate criminal activities carried out or coordinated by means of Internet. However, the ability to secretly monitor the activities of citizens also has a great impact on civil rights. Therefore, democratic societies must prevent abuse and ensure that LI is only employed in specific cases with justifiable grounds or a probable cause. Nowadays, in many countries each interception must be authorized by a wiretap warrant, usually issued by a judge. However, this wiretap warrant is merely an administrative document that should be checked by the network or service operator before enabling the monitoring of its customers, whose communications are later handed over to a LEA in plaintext. This paper proposes the idea of employing a Digital Wiretap Warrant (DWW), which further protects the civil liberties, security and privacy of LI by ensuring that monitoring devices can only be enabled with a valid DWW, and by encrypting the captured data so only the authorized LEA is able to decrypt those communications. Moreover, in the proposed DWW framework all digital evidence is securely time-stamped and signed, thus guaranteeing that it has not been tampered with, and that a proper chain of custody has been met. In particular this paper proposes how to apply the DWW concept to the lawful interception framework defined by the ETSI LI Technical Committee, and evaluates how the additional security mechanisms could impact the performance and storage costs of a LI platform.  相似文献   
10.
Data recovery is an important component of digital forensic research. Although recovering data from hard drives or small-scale mobile devices has been well studied, solid-state disks (SSDs) have a very different internal architecture and some additional functions, and it is not clear whether these differences will have an effect on data recovery. Data scrambling is an additional function of an SSD controller which can improve data reliability, but makes data recovery difficult. In this research, the dedicated flash software was first introduced that can acquire the physical image of an SSD without destroying the device hardware. Based on the software, a validation experiment was presented to evaluate the effect of data scrambling on data recovery and the causes of the effect were analyzed. Then two approaches to descrambling the data in the flash chips were proposed and their advantages and disadvantages discussed. After that, a procedure to identify the scrambling seeds that are used to descramble the scrambled data was described. Finally, descrambling software was implemented based on the second descrambling method. The experiment shows that this software can successfully descramble the data from an SSD flash drive regardless of the internal structure of the scrambler in the SSD controller and can generate an unscrambled physical image on which most existing data-recovery techniques can be effective.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号