首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   28篇
  免费   0篇
各国政治   6篇
外交国际关系   3篇
法律   12篇
政治理论   7篇
  2023年   1篇
  2020年   1篇
  2019年   3篇
  2016年   1篇
  2015年   2篇
  2014年   2篇
  2013年   1篇
  2012年   2篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
  2003年   2篇
  2002年   1篇
  2000年   1篇
  1998年   2篇
  1996年   1篇
  1995年   1篇
  1987年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
排序方式: 共有28条查询结果,搜索用时 0 毫秒
21.
22.
Sexual assault is a serious crime that often has low conviction rates. Recent literature has demonstrated that there is potential for fragrances to be valuable in forensic reconstructions where there has been contact between individuals. However, developing appropriate evidence bases for understanding the nature of fragrance transfer in these contexts is needed. This article presents three experiments that address the transfer process of fragrances that have been transferred from a primary piece of fabric onto a secondary piece of fabric, in a manner that could occur during an assault. The three variables studied were the ageing time of the fragrances on the first fabric prior to transfer, the contact time between the two fabrics, and lastly the fabric type (of the primary material and the recipient material). The transfer was evaluated using a validated solid phase micro-extraction gas chromatography–mass spectrometry (SPME GC–MS) method. The findings demonstrated that all three variables had an impact on the transfer of fragrances between clothing fabrics. Generally, lower volatility compounds were transferred and recovered in larger amounts than higher volatility compounds. All fragrance compounds were successfully recovered from a secondary piece of fabric even when the contact time was as short as 10 s, and even when the perfume was aged on the primary fabric for as long as 48 h. The nature of the fragrance transfer also depended on the fabric type, so that a clear discrimination was observed between the fragrance transfer that occurred onto a natural fabric (cotton) and onto a synthetic fabric (polyester).  相似文献   
23.
Taking advantage of flexible resource provisions enabled by Cloud Computing, many businesses have recently migrated their IT applications and data to the Cloud, allowing them to respond to new demands and requests from customers. However, Cloud Computing also moves functions and responsibilities away from local ownership and management to a third-party provided service, and brings with it a set of associated legal issues, such as data protection, licensing, intellectual property rights and the need to comply to necessary regulation. In this paper we evaluate commonly-observed Cloud Computing use cases against the law applying to Cloud Computing to find where legal problems may arise. We derive a general architecture for Clouds and use it to illustrate common Cloud Computing usage patterns. The use cases are assessed against evaluation criteria derived from the relevant Cloud Computing law for the data processing of end-user details and materials, including roles and responsibilities necessary for legal compliance. The Data Protection Directive of the European Union has been used in this evaluation, as it is a commonly accepted and influential directive in the field of data processing legislation.  相似文献   
24.
This paper examines the reliability of the methods used to capture homicide events committed by far-right extremists in a number of open source terrorism data sources. Although the number of research studies that use open source data to examine terrorism has grown dramatically in the last 10 years, there has yet to be a study that examines issues related to selectivity bias. After reviewing limitations of existing terrorism studies and the major sources of data on terrorism and violent extremist criminal activity, we compare the estimates of these homicide events from 10 sources used to create the United States Extremist Crime Database (ECDB). We document incidents that sources either incorrectly exclude or include based upon their inclusion criteria. We use a “catchment-re-catchment” analysis and find that the inclusion of additional sources result in decreasing numbers of target events not identified in previous sources and a steadily increasing number of events that were identified in any of the previous data sources. This finding indicates that collectively the sources are approaching capturing the universe of eligible events. Next, we assess the effects of procedural differences on these estimates. We find considerable variation in the number of events captured by sources. Sources include some events that are contrary to their inclusion criteria and exclude others that meet their criteria. Importantly, though, the attributes of victim, suspect, and incident characteristics are generally similar across data source. This finding supports the notion that scholars using open-source data are using data that is representative of the larger universe they are interested in. The implications for terrorism and open source research are discussed.  相似文献   
25.
New technologies – with perhaps the most notable being radio and television – often change the face of political campaigns. The Internet, and particularly campaign websites with their concomitant technologies (e.g. interactive and multimedia features), has evolved at a faster rate than any other prior innovation. This raises a critical question: have website technologies altered how congressional candidates campaign? We address this question with a novel dataset from 2008. Not only do we chart technological change on sites over the course of the campaign but we also explore how and when candidates use certain technologies. We discover two critical and, to our knowledge, novel points. First, congressional candidates use these technologies to a much lesser extent than one may suspect. Second, their scant usage is driven by how certain technologies limit control of the candidate's message, the candidate's status in the race and other key variables such as the employment of campaign consultants. In sum, the Web 2.0 era (which began around 2008) does not appear to have dramatically altered congressional campaigns.  相似文献   
26.
Liberal democratic states like Australia manage criminal justice issues in ways which reflect an inbuilt tension between liberal and democratic values. Liberal democracies are responsive both to liberal claims and to democratic claims. As a result, policy debates and strategies can oscillate between (on the one hand) liberal sensitivity to individual rights and opposition to enhanced state capacity and (on the other hand) democratically legitimised community norms and collective values. Four crime-related policy debates — about the creation and operation of the National Crime Authority, about strategies for combating drug-related crime, about gun control legislation and about identity systems to counter money laundering, tax evasion and public benefit fraud — illustrate the characteristic liberal democratic mode of politics in operation. The spectrum of policy responses to crime issues within liberal democratic political systems corresponds to an analogous spectrum within criminology which encompasses individualistic and structuralist conceptions of the nature and causes of crime.  相似文献   
27.
This study examines whether Criminology's Routine Activities Theory (RAT) and related Lifestyle Theory (LST) can account for variation between the attributes of victims of fatal ideologically motivated attacks (akin to terrorism) and the victims of non-ideologically motivated homicide incidents committed by far-Right extremists in the United States. This article makes four contributions. First, we empirically test Criminology theory in the context of terrorism by using routine activities to devise four core hypotheses to explain differences between the two types of victims. Second, our investigation uniquely includes a non-terrorist comparison group (i.e., victims of homicides committed by extremists for personal reasons like greed). Third, our study focuses on ideological victimization. Terrorism researchers have usually ignored victims because of the difficulty in accessing the necessary data. Finally, we also make a methodological contribution by showing that criminology can build upon the terrorism literature by utilizing open-sources. Using data from the Extremist Crime Database (ECDB), the results of a multivariate analysis partially supported the hypotheses, showing that RAT and LST offer empirically supported theoretical constructs that have the ability to differentiate between ideological and non-ideological homicides.  相似文献   
28.
ABSTRACT

This study explores differences in perpetrators of suicide attacks and non-suicide attacks in the United States. The study uses data on far-right and Al Qaeda and affiliated/inspired terrorists between 1990 and 2013 from the United States Extremist Crime Database. Our analysis estimates logistic regression models to test whether suicide attackers were more likely to have exhibited specific risk factors for suicidality, while examining other prominent claims regarding patterns of suicide terrorism. Suicide attackers were no more likely than non-suicide attackers to have previously attempted suicide or to have been diagnosed as mentally ill. Suicide attackers were more likely, though, to have a history of substance abuse, to be loners, have served in the military, participated in paramilitary training, and be more ideologically committed to the cause. We found that Al Qaeda affiliated/inspired attackers were more likely than far-right attackers to have engaged in a suicide mission. With the current focus on Americans traveling to Syria and Iraq to receive training and fight for jihadist movements (e.g., the Islamic State), our findings appear relevant. Observers have expressed concern that these fighters may return and then commit attacks in their homeland. Law enforcement could make use of this study’s findings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号