全文获取类型
收费全文 | 195篇 |
免费 | 12篇 |
专业分类
各国政治 | 31篇 |
工人农民 | 5篇 |
世界政治 | 11篇 |
外交国际关系 | 16篇 |
法律 | 85篇 |
中国政治 | 1篇 |
政治理论 | 55篇 |
综合类 | 3篇 |
出版年
2023年 | 1篇 |
2021年 | 2篇 |
2020年 | 4篇 |
2019年 | 6篇 |
2018年 | 5篇 |
2017年 | 7篇 |
2016年 | 15篇 |
2015年 | 6篇 |
2014年 | 7篇 |
2013年 | 47篇 |
2012年 | 7篇 |
2011年 | 11篇 |
2010年 | 5篇 |
2009年 | 9篇 |
2008年 | 5篇 |
2007年 | 7篇 |
2006年 | 9篇 |
2005年 | 1篇 |
2004年 | 7篇 |
2003年 | 4篇 |
2002年 | 1篇 |
2001年 | 3篇 |
2000年 | 5篇 |
1999年 | 4篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1981年 | 1篇 |
排序方式: 共有207条查询结果,搜索用时 31 毫秒
161.
Rodger Jamieson Lesley Pek Wee Land Donald Winchester Greg Stephens Alex Steel Alana Maurushat Rick Sarre 《Computer Law & Security Report》2012
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three. 相似文献
162.
Greg Pogarsky 《Journal of Quantitative Criminology》2007,23(1):59-74
Conflicting evidence exists on how criminal propensity moderates deterrent effects, and there is little empirical evidence
on this issue from relatively experienced offenders. This study tested how variation in criminal propensity (operationalized
as “low self-control”) moderates deterrent effects in a sample of convicted offenders in New Jersey’s Intensive Supervision
Program in 1989 and 1990. Offenders’ perceptions of the risks and consequences from violating ISP were associated with whether
they successfully completed ISP. Moreover, lower self-control did not diminish, and if anything, enhanced these deterrent
effects.
相似文献
Greg PogarskyEmail: |
163.
164.
165.
166.
167.
Greg M. Shaw 《Political science quarterly》2007,122(1):184-185
168.
169.
170.