首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   351篇
  免费   4篇
各国政治   8篇
世界政治   4篇
外交国际关系   10篇
法律   255篇
中国共产党   1篇
中国政治   19篇
政治理论   17篇
综合类   41篇
  2023年   1篇
  2022年   11篇
  2021年   13篇
  2020年   10篇
  2019年   9篇
  2018年   51篇
  2017年   7篇
  2016年   7篇
  2015年   7篇
  2014年   44篇
  2013年   34篇
  2012年   35篇
  2011年   32篇
  2010年   19篇
  2009年   32篇
  2008年   14篇
  2007年   11篇
  2006年   5篇
  2005年   3篇
  2004年   2篇
  2003年   3篇
  2002年   1篇
  2001年   2篇
  2000年   1篇
  1988年   1篇
排序方式: 共有355条查询结果,搜索用时 23 毫秒
31.
《Digital Investigation》2014,11(3):224-233
The allocation algorithm of the Linux FAT32 file system driver positions files on disk in such a way that their relative positions reveal information on the order in which these files have been created. This provides an opportunity to enrich information from (carved) file fragments with time information, even when such file fragments lack the file system metadata in which time-related information is usually to be found.Through source code analysis and experiments the behaviour of the Linux FAT allocator is examined. How an understanding of this allocator can be applied in practice is demonstrated with a case study involving a TomTom GPS car navigation device. In this case, time information played a crucial role. Large amounts of location records could be carved from this device's flash storage, yielding insight into the locations the device has visited—yet the carved records themselves offered no information on when the device had been at the locations. Still, bounds on the records' time of creation could be inferred when making use of filesystem timestamps related to neighbouring on-disk positions.Finally, we perform experiments which contrast the Linux behaviour with that of Windows 7. We show that the latter differs subtly, breaking the strong relation between creation order and position.  相似文献   
32.
33.
作为社会学科研究的国际问题研究需要回答四个方面的问题:描述性的问题、解释性的问题、预测性研究和对策性研究。严格遵循社会科学研究的程序,这四个方面的国际问题研究就会表现出一些共同特点:客观性或者说可重复性、规律性或者说普遍意义、简约性或者说主次分明。大数据研究能够让决策者获得更加全面、充分的信息,从而采取更加具有针对性的政策;在进行描述性的国际问题研究时,大数据可以起到十分突出、甚至是革命性的作用;在解释性的问题方面,大数据的长处是用来发现相关性,而不是做出因果解释;大数据还可以发现有价值的解释性问题;大数据在预测和对策研究方面的优势十分明显,它所发现的规律性现象不仅可以用来预测,也可以帮助人们做出选择。大数据应用到国际问题研究领域也有其局限性,有些局限性是这一方法本身所具有的,例如不能进行因果机制的分析和解释;有一些是国际问题研究领域所具有的,例如"成本-收益问题"、数据主权问题等。在国际问题研究领域,大数据并不适合用于做战略研究,而更多适宜于对国际发展态势的宏观描述以及为具体的外交行为提供精准的指导方案。总之,大数据有助于发现更全面和客观的事实、提出更多规律性的问题以及帮助研究进行预测和做出选择,但大数据自身不能完成整个解释的过程,需要研究者进行专业的因果机制的分析和解释。  相似文献   
34.
The use of digital technologies, functioning thanks to data processing, has been conquering many sectors of the world economy and it is possible that, in the near future, only a few markets will still be excluded from this industrial revolution. Therefore, even if one chose unreasonably to disregard the many innovations that the digital economy has brought about, its development seems quite inexorable, although it is true that this new stage in human progress raises some concerns. In particular, many worry about the millions of passive and powerless digital consumers who, facing a few huge and influential companies without any education or awareness, could succumb and find themselves poorer, victimized, and manipulated. The paper proposes to react to this state of affairs without further fueling the fear of the digital revolution and without the thought that regulation can be used only as a shield to protect fragile digital consumers. Rather, by taking inspiration from some regulatory actions undertaken by the European Union, the paper bears in mind that regulation can be used as a sword in the hands of consumers to finally assign them a lead role in digital markets. New rules to empower consumers and to make them take autonomous and independent decisions as to the management of their personal data as well as to the merits of digital firms can be envisaged. After all, one of the cultural roots of Western societies is that every individual should be enabled to be faber ipsius fortunae.  相似文献   
35.
Online platforms, which are at the forefront of today's economy, are subject to intensive competition law enforcement. However, the platform business model presents challenges for the application of competition law. Most notably, they appear to offer consumers a great number of their products for free. The explanation for most of these supposedly free products is offered by two-sided market theory: consumers may not be paying, but the ‘other’ side of the market is. This other side of the market often consists of advertisers, which pay the platform for access to the consumers’ information (to target advertisements) and attention (to show the advertisements). As many of these platforms are now potentially dominant, they come within the scope of competition law's abuse of dominance provision, including the doctrines of predatory and excessive pricing. These price-based theories need to adapt to the often price-less platform business model in order to prevent competition authorities from making both type I and type II enforcement errors. At the same time, competition law enforcement needs to consider—and at times give priority to—other branches of law that address abusive behaviour concerning free products. Through the use of case studies, this article therefore suggests ways in which abuse of dominance assessments can take into account the economic reality of free products.  相似文献   
36.
Held at Southampton University's Highfield campus and hosted by iCLIC, an interdisciplinary core on Law, the Internet and Culture, the Data Mining and Data Sharing workshop brought together attendees and speakers from industry, government, academia and a range of disciplines alike. The workshop comprised two sessions, each with a keynote and an associated panel. The first session was chaired by Eleonora Rosati and dealt with copyright and database rights, data mining and data sharing. The second session, chaired by Sophie Stalla-Bourdillon, focussed on data protection, data mining and data sharing. The following report covers both sessions, associated panel discussions and the subsequent question and answer sessions.  相似文献   
37.
Attacks on operating system access control have become a significant and increasingly common problem. This type of security threat is recorded in a forensic artifact such as an authentication log. Forensic investigators will generally examine the log to analyze such incidents. An anomaly is highly correlated to an attacker's attempts to compromise the system. In this paper, we propose a novel method to automatically detect an anomaly in the access control log of an operating system. The logs will be first preprocessed and then clustered using an improved MajorClust algorithm to get a better cluster. This technique provides parameter-free clustering so that it automatically can produce an analysis report for the forensic investigators. The clustering results will be checked for anomalies based on a score that considers some factors such as the total members in a cluster, the frequency of the events in the log file, and the inter-arrival time of a specific activity. We also provide a graph-based visualization of logs to assist the investigators with easy analysis. Experimental results compiled on an open dataset of a Linux authentication log show that the proposed method achieved the accuracy of 83.14% in the authentication log dataset.  相似文献   
38.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
39.
The present paper1 aims both at introducing the legal aspects of the protection of minors in cyberspace and analysing and criticizing certain main features embedded in this legal approach of young people protection. After a short introduction underlining the concept of child’s rights and the reason why this right has been particularly proclaimed in the context of the cyberspace, the first section describes the new technological features of the ICT environment and linked to this evolution the increasing risks the minors are confronted with. A typology of cyber abuses is proposed on the basis of these considerations. A list of EU or Council of Europe texts directly or indirectly related to the minors’ protection into the cyberspace is provided. The second section intends to analyse certain characteristics of the legal approach as regards the ways by which that protection is conceived and effectively ensured. Different principles and methods might be considered as keywords summarizing the legal approach and to a certain extent, fixing a partition of responsibilities taking fully into account the diversity of actors might be deduced from the different regulatory documents.The third section comes back to the different complementary means by which the Law is envisaging the minors’ protection. The obligation to create awareness about the potential risks minors might incur definitively is the first one. The omnipresent reference in all the legal texts to the role of self-regulatory interventions constitutes another pillar of the protection envisaged by the Law. After having described the multiple instruments developed in the context of this self-regulation (labels, codes of conduct, hotlines, ODR…) or even co-regulation, the paper examines the conditions set by the European legislators as regards these instruments. Technology might be considered as a fourth method for protecting children. Our concern will be to see how the Law is addressing new requirements as regards the technological solutions and their implementation. The present debates about the liability of the actors involved in applications or services targeted or not vis-à-vis the minors like SNS or VSP operators are evoked. As a final point the question of the increasing competences of LEA and the reinforcement of the criminal provisions in order to fight cyber abuses against minors will be debated. In conclusion, we will address final recommendations about the way by which it would be possible to reconcile effective minors’ protection and liberties into the cyberspace.  相似文献   
40.
After viewing a crime video, participants answered 16 answerable and 6 unanswerable questions. Those in the "voluntary guess" condition had a "don't know" response option; those in the "forced guess" condition did not. One week later the same questions were answered with a "don't know" option. In both experiments, information generated from forced confabulation was less likely remembered than information voluntarily self-generated. Further, when the same answer was given to an unanswerable question both times, the confidence expressed in the answer increased over time in both the forced and the voluntary guess conditions. Pressing eyewitnesses to answer questions, especially questions repeated thrice (Experiment 2), may not be an effective practice because it reliably increases intrusion errors but not correct recall.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号