全文获取类型
收费全文 | 145篇 |
免费 | 3篇 |
专业分类
各国政治 | 2篇 |
工人农民 | 7篇 |
世界政治 | 5篇 |
外交国际关系 | 1篇 |
法律 | 48篇 |
中国政治 | 11篇 |
政治理论 | 4篇 |
综合类 | 70篇 |
出版年
2024年 | 1篇 |
2021年 | 4篇 |
2020年 | 3篇 |
2019年 | 3篇 |
2018年 | 3篇 |
2017年 | 3篇 |
2016年 | 1篇 |
2015年 | 3篇 |
2014年 | 9篇 |
2013年 | 15篇 |
2012年 | 4篇 |
2011年 | 10篇 |
2010年 | 5篇 |
2009年 | 7篇 |
2008年 | 10篇 |
2007年 | 12篇 |
2006年 | 11篇 |
2005年 | 5篇 |
2004年 | 11篇 |
2003年 | 9篇 |
2002年 | 4篇 |
2001年 | 8篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1997年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 2篇 |
排序方式: 共有148条查询结果,搜索用时 15 毫秒
51.
Christopher P. Salas-Wright Margaret Lombe Von E. Nebbitt Leia Y. Saltzman Taqi Tirmazi 《Victims & Offenders》2018,13(1):84-101
Youth reporting independently elevated levels of religiosity and self-efficacy tend to abstain from externalizing behavior. However, little is known about the ways in which religiosity and self-efficacy interrelate to impact youth externalizing. Drawing from a sample of African American youth from public housing communities (N = 236), we use latent profile analysis to identify subtypes of youth based on self-reported religiosity and self-efficacy and, in turn, examine links with crime. Compared to youth in other subgroups, those classified as both highly religious and highly self-efficacious reported less involvement in minor and severe delinquency, but not violence. 相似文献
52.
The analysis of parliamentary debates is at the confluence of a number of developments in political science. What light can automated and semi‐automated techniques throw on such analysis? In this paper we compare two such approaches, one semi‐automated (Hamlet) and the other fully automated (Alceste). We use both approaches to identify the prominent themes in debate and to assess how far speakers who favour different positions adopt a distinct pattern of discourse. We seek to assess how far the two approaches yield convergent or divergent analyses. Selecting a second reading debate from the UK House of Commons on a private member's bill on abortion in July 1966, we are able to show similarities of analysis despite the detailed differences between the two approaches. In particular, the analysis in Hamlet al.lows identification of the extent to which individual speakers employ one type of vocabulary rather than another. Alceste is able to provide a statistical basis for the different classes of vocabulary that occur in the debate. However, the two programs rest upon quite different assumptions about the relationship between syntax and meaning, with implications for the practice of political science. 相似文献
53.
张岳 《河南公安高等专科学校学报》2003,(6):62-64
目前,计算机网络犯罪十分严重,已成为不可忽视的社会问题。我国应制定更为系统的法律,为治理计算机网络犯罪提供必要的法律保障。 相似文献
54.
The use of a scanner to control the photography of fingerprints, shoeprints and other trace contacts which fluoresce under irradiation from an argon ion laser is described. This scanner has been built to cover areas varying in size from a single fingerprint to a shoeprint and provides for variable speed, step size and angle of radiation which are all very important in this highly specialised area of photography. 相似文献
55.
Colin R. Davies 《Computer Law & Security Report》2011,27(6):601-619
This article addresses and analyses the issues concerning the ownership of computer generated works within patents and copyright, and concludes that the current regime is woefully inadequate to deal with the growing use of more and more intuitive artificial intelligence systems in the production of such works. It considers the respective claims of interested parties to such rights before moving on to a consideration of the creation of a new legal personality to which such rights could be granted to resolve the difficulties inherent in the current system. 相似文献
56.
Deeanna M. Button 《Criminal Justice Studies》2015,28(4):484-502
LGBQ youth are more likely to consider, plan, and/or attempt suicide compared to their heterosexual peers. Evidence from the general population suggests that risky behaviors, like suicide, may be mediated by protective factors, including social support and self-efficacy. Using Agnew’s general strain theory and data from a statewide probability sample, the results of this study suggest that victimization, as a source of strain, is a risk factor for both LGBQ and heterosexual youth suicidality. While social support and self-efficacy reduce the risk of suicidality among heterosexual youth, they are not significant protective factors for LGBQ youth. Theoretical and policy implications are discussed. 相似文献
57.
计算机犯罪及电子证据问题 总被引:3,自引:0,他引:3
随着计算机技术及计算机网络的应用日趋广泛,涉及计算机的犯罪也越发严重且形式多样。以计算机及其网络为依托的电子数据在证明案件事实的过程中起着重要的作用。应尽快明晰电子数据在计算机犯罪中作为证据使用的相关法律问题。 相似文献
58.
Mineo Yoshino Hideaki Matsuda Satoshi Kubota Kazuhiko Imaizumi Sachio Miyasaka Sueshige Seta 《Forensic Science International Supplement Series》1997,90(3):288
This system consists of two main units, namely a video superimposition system and a computer-assisted skull identification system. The video superimposition system is comprised of the following five parts: a skull-positioning box having a monochrome CCD camera, a photo-stand having a color CCD camera, a video image mixing device, a TV monitor and a videotape recorder. The computer-assisted skull identification system is composed of a host computer including our original application software, a film recorder and a color printer. After the determination of the orientation and size of the skull to those of the facial photograph using the video superimposition system, the skull and facial photograph images are digitized and stored within the computer, and then both digitized images are superimposed on the monitor. For the assessment of anatomical consistency between the digitized skull and face, the distance between the landmarks and the thickness of soft tissue of the anthropometrical points are semi-automatically measured on the monitor. The wipe images facilitates the comparison of positional relationships between the digitized skull and face. The software includes the polynomial functions and Fourier harmonic analysis for evaluating the match of the outline such as the forehead and mandibular line in both the digitized images. 相似文献
59.
计算机犯罪是现代社会一种危害极大的新型犯罪。文章对计算机非法文件的检验方式方法进行研究 ,提出相关的侦查方法 ,有效的防范和打击犯罪分子。 相似文献
60.
试论安全审计对计算机犯罪的追踪取证 总被引:2,自引:0,他引:2
蒲利君 《四川警官高等专科学校学报》2003,15(4):35-38
当前计算机犯罪日益严重,计算机网络中安全审计系统能事前控制人员或设备的访问行为,并能事后获得直接电子证据,充分利用安全审计功能是对计算机犯罪进行追踪取证的有效方法。而安全审计的策略、措施直接影响审计效果。 相似文献