首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   87篇
  免费   1篇
各国政治   2篇
工人农民   1篇
世界政治   2篇
外交国际关系   1篇
法律   43篇
中国政治   6篇
政治理论   9篇
综合类   24篇
  2022年   3篇
  2021年   3篇
  2020年   3篇
  2019年   1篇
  2018年   1篇
  2017年   2篇
  2016年   2篇
  2015年   5篇
  2014年   10篇
  2013年   10篇
  2012年   3篇
  2011年   8篇
  2010年   6篇
  2009年   7篇
  2008年   9篇
  2007年   3篇
  2006年   3篇
  2005年   2篇
  2004年   1篇
  2003年   1篇
  2002年   2篇
  2001年   2篇
  1998年   1篇
排序方式: 共有88条查询结果,搜索用时 15 毫秒
61.
随着3G网络时代的到来以及手机通讯技术的不断发展,手机定位技术得到不断的完善与发展。精确定位在侦查中以及紧急事件中的应用、“模糊定位”在社交网络中的应用既为我们带来了机遇与便捷,也隐藏着一定的问题。因此,以犯罪侦查学为视角,专题研究手机定位技术的应用以及在应用中存在的问题,提出相应的解决对策,对于预防手机定位技术在侦查和社交网络应用中的危害性很有必要。  相似文献   
62.
This article examines the implications of the 2011 phone hacking scandal for press freedom in the United Kingdom. Specifically, it argues that the language of rights has too long dominated public discourse, which has led to discussion of media responsibilities being evaded. The article argues that there is now an opportunity for a radical restructuring of the relationship between the press, the public, and the political system that restores the media to their rightful role as a watchdog on government and steward of the people. It points to the need for independent regulation of the press and a statutory right of reply as means through which the relationship between media and citizen can be recast on the grounds of obligation and responsibility but argues that it is only when we move away from a framework grounded in rights to one grounded in responsibilities that meaningful change can flourish.  相似文献   
63.
胡卫东  葛婧 《河北法学》2005,23(4):125-128
绝大部分手机用户都有被短信骚扰的经历,这种骚扰让人不堪忍受。短信骚扰属于违法行为,既违反了《消费者权益保护法》,也侵犯了公民的隐私权。为了保护手机用户的权益,应严格禁止群发短信广告,加强对个人资料的法律保护,明确短信骚扰的民事责任,理清举证责任。  相似文献   
64.
Anti-theft designs relating to mobile phones are reviewed. The physical and electronic design of handsets includes visual deterrents, owner-identification, and handset tracking options. The systems design of phone networks includes the blacklisting of stolen phones. Other measures include biometric-locking of handsets, and designs that encourage ‘safe’ phone use and transportation. Characteristics that promote anti-theft designs are proposed and form the acronym ‘IN SAFE HANDS’: identifiable, neutral, seen, attached, findable, executable, hidden, automatic, necessary, detectable, and secure. The set of characteristics is presented as a heuristic device to aid designing-out crime from frequently stolen electronic goods.
Graham FarrellEmail:
  相似文献   
65.
《Science & justice》2020,60(2):180-190
In forensic investigations it is often of value to establish whether two phones were used by the same person during a given time period. We present a method that uses time and location of cell tower registrations of mobile phones to assess the strength of evidence that any pair of phones were used by the same person. The method is transparent as it uses logistic regression to discriminate between the hypotheses of same and different user, and a standard kernel density estimation to quantify the weight of evidence in terms of a likelihood ratio. We further add to previous theoretical work by training and validating our method on real world data, paving the way for application in practice. The method shows good performance under different modeling choices and robustness under lower quantity or quality of data. We discuss practical usage in court.  相似文献   
66.
随着改革的深化与进一步的对外开放,特别是加入WTO之后,国内治安形势不容乐观.为有效控制犯罪,要求"110"报警系统必须作出快速反应,尽可能缩短现场反应时间.在手机普及、短信得到普遍运用并将进一步发展的条件下,开设"110"短信报警系统具有十分重要的现实意义.  相似文献   
67.
This article aims to contribute to the ongoing discourse about the issue of privacy in the mobile advertising domain. The article discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data. Major challenges are identified that should be addressed, so that fair information principles can be applied in the context of m-advertising. It also points out the limitations of these principles. Furthermore, the article discusses a range of models that is available for regulating the collection, use and disclosure of personal data, such as legislation, self-regulation and technical approaches. It is intended to promote an effective approach to improve consumer privacy in the mobile advertising domain.  相似文献   
68.
“交强险”中赔偿对象之我见   总被引:1,自引:0,他引:1  
万晓运 《时代法学》2009,7(4):62-66
“交强险”中的第三人特指“交强险”保单当事人以外的对被保险享有请求权的人。我国现行法律对“交强险”之第三人界定的范围比较狭窄,这对交通事故中许多无辜受害者的保护十分不利。而国外相关法律规定却相当人性化,我国应该借鉴他人的成功立法经验。  相似文献   
69.
在经济社会和信息技术快速发展的今天,公安高等教育面临发展的挑战和机遇。学科知识创新和教育信息技术创新是高等教育结构调整与改革的两个关键环节。学科知识创新使公安高等教育学科知识结构趋于更加合理的重组,教育信息技术创新从教学设计思想到公安实践与理论都突破了原有教材设计的局限性,两者构成了教学完整的系统设计思想。教育信息技术的有效应用是公安高等教育发展新的增长点,校园网的建设为公安教育信息化打下了坚实的基础,教育信息技术平台的构建催生了公安高等教育“学科联合体”教学新模式,民警无线移动媒体学习成为新一代公安教育的展开方式。  相似文献   
70.
The widespread use of mobile devices in comparison to personal computers has led to a new era of information exchange. The purchase trends of personal computers have started decreasing whereas the shipment of mobile devices is increasing. In addition, the increasing power of mobile devices along with portability characteristics has attracted the attention of users. Not only are such devices popular among users, but they are favorite targets of attackers. The number of mobile malware is rapidly on the rise with malicious activities, such as stealing users data, sending premium messages and making phone call to premium numbers that users have no knowledge. Numerous studies have developed methods to thwart such attacks. In order to develop an effective detection system, we have to select a subset of features from hundreds of available features. In this paper, we studied 100 research works published between 2010 and 2014 with the perspective of feature selection in mobile malware detection. We categorize available features into four groups, namely, static features, dynamic features, hybrid features and applications metadata. Additionally, we discuss datasets used in the recent research studies as well as analyzing evaluation measures utilized.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号