首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   107篇
  免费   11篇
各国政治   3篇
工人农民   2篇
世界政治   3篇
外交国际关系   7篇
法律   43篇
中国共产党   1篇
中国政治   21篇
政治理论   14篇
综合类   24篇
  2023年   3篇
  2022年   1篇
  2021年   2篇
  2020年   4篇
  2019年   5篇
  2018年   2篇
  2017年   7篇
  2016年   7篇
  2015年   3篇
  2014年   10篇
  2013年   16篇
  2012年   5篇
  2011年   7篇
  2010年   8篇
  2009年   5篇
  2008年   4篇
  2007年   5篇
  2006年   3篇
  2005年   4篇
  2004年   7篇
  2003年   2篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
排序方式: 共有118条查询结果,搜索用时 0 毫秒
11.
在珠江三角洲的调查发现,流动人口底数不清、企业任意隐瞒民工数量的现象并非鲜见。其中既有因收费产生的经济动因,也有社会心理原因和制度缺失的因素。农民工的生存证明权被剥夺是最严重的权益侵害,意味着一切权益的剥夺,影响和谐社会秩序的稳定与发展。社会与政府对此不能视而不见,要有所作为。  相似文献   
12.
QQ取证及其司法鉴定方法研究   总被引:3,自引:0,他引:3  
简要介绍QQ取证及其司法鉴定研究的发展现状。分析QQ消息传输协议、数据库文件结构、Msg2.0.db文件的加密机制,重点研究QQ聊天记录及其他证据信息获取的思路和方法。在结合QQ取证鉴定案例的基础上,提出将手机与QQ进行融合取证的新思路,并对QQ取证及其司法鉴定的发展方向进行展望。  相似文献   
13.
Microsoft released a new communication platform, Microsoft Teams, in 2017. Due in part to COVID-19, the popularity of communication platforms, like Microsoft Teams, increased exponentially. Given its user base and increased popularity, it seems likely that digital forensic investigators will encounter cases where Microsoft Teams is a relevant component. However, because Microsoft Teams is a relatively new application, there is limited forensic research on the application particularly focusing on mobile operating systems. To address this gap, an analysis of data stored at rest by Microsoft Teams was conducted on the Windows 10 operating system as well as on Android and Apple iOS mobile operating systems. Basic functionalities, such as messaging, sharing files, participating in video conferences, and other functionalities that Teams provides, were performed in an isolated testing environment. Cellebrite UFED Physical Analyzer and Magnet AXIOM Examine tools were used to analyze the mobile devices and the Windows device, respectively. Manual or non-automated investigation recovered, at least partially, the majority of artifacts across all three operating systems. In this study, a total of 77.6% of the populated artifacts were partially or fully recovered in the manual investigation. On the other hand, forensic tools used did not automatically recover many of the artifacts found with the manual investigation. Only 13.8% of artifacts were partially or fully recovered by the forensic tools across all three devices. These discovered artifacts and the results of the investigations are presented in order to aid digital forensic investigations.  相似文献   
14.
Globalisation has challenged the way industrial development takes place. Fragmented and decentralised global production and the rapid growth of consumer markets in emerging economies demand a more sophisticated framework to analyse development paths than does the dichotomy of export orientation and import substitution. This article proposes a typology based on (a) specialisation in the global value chain and (b) market orientation to distinguish different development trajectories and then applies the typology to mobile phone manufacturing in four East Asian countries. This study finds that globalisation does not lead to the convergence of development paths, but promotes cross-national divergence depending on countries’ positions in the value chain and market niches. Both Korea and Taiwan emerge as key players in global markets, yet in different parts of the global value chain. Their common orientation toward global markets strikingly contrasts the inability of Japanese firms to translate their domestic success overseas. Finally, Chinese firms concurrently engage in different development paths, making the country’s multi-path approach unique. The implications of these findings are discussed in terms of industrial development in East Asia in an era of globalisation.  相似文献   
15.
The analysis and improvements of bank performance is a challenging issue for bank managers. Among various banking services, mobile banking is one of the most risky fields that is prone to customer resistance. Mobile banking is a form of banking transaction carried out via a mobile phone. Mobile banking allows bank customers to check their account balances and perform credit card transaction, as well as provide information on the latest transaction made by customers. This paper summarizes experiences and results of productively using knowledge discovery and data mining techniques in a large detail bank data. Data mining is the process of extracting patterns from data. We review prior literature on mobile payments, analyze the various factors that impact mobile payment services markets, and suggest directions for future research in this risk management field. Our research work demonstrates the effectiveness and efficiency of data mining in analysis of retailing bank performance. We use classification and regression tree learning algorithm for proposing a customer adoption model of mobile banking according to some personal characteristics of customers.  相似文献   
16.
由于违法犯罪嫌疑人反侦查意识的增强,涉案的TF卡、U盘等存储介质内往往含有加密文件。在这些加密数据中往往包含着对侦查、起诉更有价值的信息。在这种情况下,对其中的数据进行解密成为数据能否成功提取的关键。本文针对一起涉及邪教案件中的加密解密原理进行研究,详细分析了基于异或运算的加密原理、解密原理及其方法,从而根据原理设计可以快速获取密钥的解密软件。在本案中,检验人员从检材中提取出加密程序,进行加密实验,通过对比加密前和加密后的数据,分析加密原理,研究解密方法。为了提高解密效率,检验人员通过C#语言开发Windows窗体应用程序,设计出了解密工具TFCrack。通过TFCrack可以方便快速获取密码,通过获取的密码可以快速解析出隐藏的数据。  相似文献   
17.
Advances in technologies including development of smartphone features have contributed to the growth of mobile applications, including dating apps. However, online dating services can be misused. To support law enforcement investigations, a forensic taxonomy that provides a systematic classification of forensic artifacts from Windows Phone 8 (WP8) dating apps is presented in this study. The taxonomy has three categories, namely: Apps Categories, Artifacts Categories, and Data Partition Categories. This taxonomy is built based on the findings from a case study of 28 mobile dating apps, using mobile forensic tools. The dating app taxonomy can be used to inform future studies of dating and related apps, such as those from Android and iOS platforms.  相似文献   
18.
This study designs a method of identifying the camera model used to take videos that are distributed through mobile phones and determines the original version of the mobile phone video for use as legal evidence. For this analysis, an experiment was conducted to find the unique characteristics of each mobile phone. The videos recorded by mobile phones were analyzed to establish the delay time of sound signals, and the differences between the delay times of sound signals for different mobile phones were traced by classifying their characteristics. Furthermore, the sound input signals for mobile phone videos used as legal evidence were analyzed to ascertain whether they have the unique characteristics of the original version. The objective of this study was to find a method for validating the use of mobile phone videos as legal evidence using mobile phones through differences in the delay times of sound input signals.  相似文献   
19.
徐彦 《青年论坛》2011,(2):52-56
中国已经步入第六媒介时代。这个时代,手机不仅仅是方便快捷的上网工具,同时也是时尚潮流和流行文化的代表符号。手机上网对于大学生而言更是具有强大的吸引力。为了准确掌握当前大学生手机上网的实际情况,预测大学生手机上网将会带来的社会变化以及人际关系,笔者在2010年7-8月,对杭州、宁波、厦门、重庆、西安、沈阳等高校的部分在校大学生进行了问卷调查,并结合访问情况,对数据进行了分析研究。此次调查得出三个方面的结论:一是手机上网已经成为大学生的基本生活方式;二是现有的手机上网条件决定了大学生对手机上网的喜好;三是大学生对手机上网的认知处在理性实用的范畴之内。  相似文献   
20.
Mobile customers are increasingly being tracked and profiled by behavioural advertisers to enhance delivery of personalized advertising. This type of profiling relies on automated processes that mine databases containing personally-identifying or anonymous consumer data, and it raises a host of significant concerns about privacy and data protection. This second article in a two part series on “Profiling the Mobile Customer” explores how to best protect consumers’ privacy and personal data through available mechanisms that include industry self-regulation, privacy-enhancing technologies and legislative reform.1 It discusses how well privacy and personal data concerns related to consumer profiling are addressed by two leading industry self-regulatory codes from the UK and the U.S. that aim to establish fair information practices for behavioural advertising by their member companies. It also discusses the current limitations of using technology to protect consumers from privacy abuses related to profiling. Concluding that industry self-regulation and available privacy-enhancing technologies will not be adequate to close important privacy gaps related to consumer profiling without legislative reform, it offers suggestions for EU and U.S. regulators about how to do this.2  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号