首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30篇
  免费   8篇
各国政治   4篇
工人农民   3篇
世界政治   2篇
外交国际关系   1篇
法律   26篇
政治理论   2篇
  2020年   1篇
  2019年   2篇
  2018年   5篇
  2017年   4篇
  2016年   2篇
  2014年   1篇
  2013年   5篇
  2011年   1篇
  2010年   1篇
  2009年   3篇
  2008年   3篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
  2002年   1篇
  1999年   2篇
  1994年   2篇
  1992年   1篇
  1990年   1篇
排序方式: 共有38条查询结果,搜索用时 62 毫秒
31.
This study examines the Internet neutrality issue in Korea by analyzing the debates among the stakeholders. It addresses the dynamic discussions of the issues by identifying how diverse groups of stakeholders are affected by various actions taken by the emergence of Internet neutrality. It presents a statistical analysis that reveals the factors implicated in the Internet neutrality debate and significant differences among individuals on opposing sides in the debate. The findings reveal insights into the connection between specific factors and positions in the Internet neutrality debate. The findings show that the issue of Internet neutrality is complex and as multifaceted as the parties' diverse interests. It concludes by proposing an effective model to govern Internet neutrality in Korea, based on the typology proposed by Strover.  相似文献   
32.
In this paper, we review literature on antiforensics published between 2010 and 2016 and reveal the surprising lack of up‐to‐date research on this topic. This research aims to contribute to this knowledge gap by investigating different antiforensic techniques for devices running Windows 7, one of the most popular operating systems. An approach which allows for removal or obfuscation of most forensic evidence is then presented. Using the Trojan software DarkComet RAT as a case study, we demonstrate the utility of our approach and that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive. Up‐to‐date information regarding how forensic artifacts can be compromised will allow relevant stakeholders to make informed decisions when deciding the outcome of legal cases involving digital evidence.  相似文献   
33.
Though anti‐American terrorism springs these days as much from Yemen and the “virtual ummah” as from Afghanistan, President Obama has nontheless further committed US troops to stabilizing a country well‐known as the graveyard of empires. What can the only Muslim country that belongs to NATO offer by way of advice? How best can the US keep its focus on the terrorist threat despite its diversion in Afghanistan? Turkey's former envoy to Afghanistan and two of Europe's leading experts on Islamist terrorism offer their views.  相似文献   
34.
35.
36.
37.
The advent of cloud computing has led to a dispersal of user data across international borders. More than ever before, law enforcement investigations into cybercrime and online criminal activity require cooperation between agencies from multiple countries. This paper examines recent changes to the law in Australia in relation to the power of law enforcement agencies to effectively investigate cybercrime insofar as individuals and organisations make use of cloud infrastructure in connection with criminal activity. It concludes that effective law enforcement operations in this area require harmonious laws across jurisdictions and streamlines procedures for granting assistance between law enforcement agencies. In conjunction with these mechanical developments, this paper posits that law enforcement officers require a systematised understanding of cloud infrastructure and its operation in order to effectively make use of their powers.  相似文献   
38.
Given the relatively new phenomenon of online child exploitation – an important area of criminological and policy concern – it is difficult to obtain long term trend data on reported convictions. Existing legislative and prosecution-based approaches, while important, are unlikely to be adequate. This analysis of the legislative and prosecution-based responses in five Commonwealth countries (Australia, Canada, New Zealand, South Africa and United Kingdom), highlights the need for clear national and international definitions as the lack of consistency in the international legislative environment creates opportunities for sexual exploitation of children. To provide a multi-faceted and non-prosecutorial approach to address online child exploitation including the commercial exploitation of children, this paper identifies five potential research questions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号