全文获取类型
收费全文 | 91篇 |
免费 | 0篇 |
专业分类
外交国际关系 | 1篇 |
法律 | 67篇 |
中国共产党 | 1篇 |
中国政治 | 9篇 |
政治理论 | 1篇 |
综合类 | 12篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 1篇 |
2021年 | 3篇 |
2019年 | 6篇 |
2018年 | 13篇 |
2017年 | 2篇 |
2016年 | 4篇 |
2015年 | 3篇 |
2014年 | 7篇 |
2013年 | 6篇 |
2012年 | 11篇 |
2011年 | 4篇 |
2010年 | 4篇 |
2009年 | 3篇 |
2008年 | 3篇 |
2006年 | 3篇 |
2005年 | 3篇 |
2004年 | 2篇 |
2003年 | 1篇 |
2002年 | 4篇 |
2001年 | 1篇 |
2000年 | 2篇 |
1997年 | 1篇 |
1996年 | 1篇 |
排序方式: 共有91条查询结果,搜索用时 15 毫秒
81.
The term ‘cloud computing’ has begun to enter the lexicon of the legal world. The term is not new, but the implications for obtaining and retaining evidence in electronic format for the resolution of civil disputes and the prosecution of alleged criminal activities might be significantly affected in the future by ‘cloud’ computing. This article is an exploratory essay in assessing the effect that ‘cloud’ computing might have on evidence in digital format in criminal proceedings in the jurisdiction of England & Wales. 相似文献
82.
Taking advantage of flexible resource provisions enabled by Cloud Computing, many businesses have recently migrated their IT applications and data to the Cloud, allowing them to respond to new demands and requests from customers. However, Cloud Computing also moves functions and responsibilities away from local ownership and management to a third-party provided service, and brings with it a set of associated legal issues, such as data protection, licensing, intellectual property rights and the need to comply to necessary regulation. In this paper we evaluate commonly-observed Cloud Computing use cases against the law applying to Cloud Computing to find where legal problems may arise. We derive a general architecture for Clouds and use it to illustrate common Cloud Computing usage patterns. The use cases are assessed against evaluation criteria derived from the relevant Cloud Computing law for the data processing of end-user details and materials, including roles and responsibilities necessary for legal compliance. The Data Protection Directive of the European Union has been used in this evaluation, as it is a commonly accepted and influential directive in the field of data processing legislation. 相似文献
83.
Cloud computing is an information technology technique that promises greater efficiency and reduced-cost to consumers, businesses and public institutions. However, to the extent it has brought better efficiency and minimal cost, the emergence of cloud computing has posed a significant regulatory challenge on the application of data protection rules particularly on the regime regulating cross-border data flow. The Data Protection Directive (DPD), which dates back to 1995, is at odds with some of the basic technological and business-related features of the cloud. As a result, it is claimed that the Directive hardly offers any help in using the legal bases to ‘process’ and ‘transfer’ data as well as to determine when a transfer to a third country occurs in cloud computing. Despite such assertions, the paper argues that the ECJ's Bodil Lindqvist decision can to a certain extent help to delineate circumstances where transfer should and should not occur in the cloud. Concomitantly, the paper demonstrates that controllers can still make the most of the available possibilities in justifying their ‘processing’ as well as ‘transferring’ of data to a third country in cloud arrangements. In doing so, the paper also portrays the challenges that arise down the road. All legal perspectives are largely drawn from EU level though examples are given from member states and other jurisdictions when relevant. 相似文献
84.
Sungwook Hong Ph.D. Jae‐Hee Park M.Sc. Ju‐Hee Park M.Sc. Han‐byeol Oh M.Sc. Eun‐Ju Choi M.Sc. Il‐Han Cho M.Sc. Yoon‐Jung Mok M.Sc. 《Journal of forensic sciences》2019,64(4):1040-1047
Latent fingermark developing methods from food (mandarin, egg, banana, apple, potato, carrot, eggplant, onion, bell pepper, and tomato) surface has been studied by 10 methods, including powdering method, small particle reagent method, and cyanoacrylate fuming method. The foods were stored under two conditions (room temperature and refrigerator) before fingermark deposition and aged for 2, 24, 48, and 72 h before fingermark development. In most of the food surfaces used in this study, cyanoacrylate fuming with 80% relative humidity was superior to the powder or small particle reagent methods. The quality of the fingermarks varied depending on the storage conditions before the fingermark deposition (in the refrigerator or at ambient temperature) and the time elapsed since the fingermark deposition. However, the storage conditions before the fingermark deposition and the time elapsed since the fingermark deposition did not show any correlation with the quality of the fingermark. 相似文献
85.
《Forensic Science International: Genetics Supplement Series》2019,7(1):182-184
Storage of tissue samples in high ambient-temperature can affect the quality of forensic evidence. Experiments were conducted to investigate the potential use of 3 tissue storage solutions for the preservation and transfer of forensic specimen in high ambient temperature conditions, i.e., DMSO, Longmire’s buffer, and trehalose solution. Results showed that DNA in tissue was best preserved in DMSO buffer. Samples preserved in Longmire’s buffer gave DNA analysis results for temperatures up to 60 °C, however, amplification between replications were not reproducible. For those tissue samples preserved in trehalose solution, DNA markers larger than 300 bp were absent, and irreproducible amplification results were detected at a higher level when the storage temperature increased, and storage time was over 2 weeks. Tissue storage condition at high temperature over 1 week is not recommended. Experimental results here provided an alternative collection and preservation method for tissue samples at ambient temperature (without cold-storage) for subsequent DNA analysis. These can potentially be implemented in forensic biological evidence collection, preservation and transfer in hot climates. 相似文献
86.
《Forensic Science International: Genetics Supplement Series》2019,7(1):117-119
Sample storage is of paramount importance in forensic genetics laboratories since only optimal storage enables successful recovery of DNA from old bones that contain very low amount of severely degraded DNA. When identification of missing persons from skeletal remains is completed, bone sample is routinely stored at -20 °C for long-term storage for retesting in future, if necessary. After molecular genetic analyses of Slovenian Second World War (WWII) victims, small fragments of femurs were stored at -20 °C. Reduction in DNA recovery has been observed in frozen liquid DNA extracts by some authors and the goal of our study was to explore how freezing of bone samples affects the preservation of DNA. To achieve this goal, the difference in DNA yield in extracts obtained from WWII bones analyzed in 2009 (data from published paper) and DNA yield in extracts obtained from the same bones (piece sampled next to the one used in 2009) taken out of the freezer after long-term storage on -20 °C for 10 years was examined, using the same extraction method and the same quantification kit. Up to 100 ng DNA/g of bone powder was obtained from 57 WWII femurs and up to 31 ng DNA/g of bone powder from the same femurs investigated after long-term storage in this study. 0,5 g of bone powder was decalcified using full demineralization extraction method. The DNA was purified in a Biorobot EZ1 device (Qiagen) and DNA quantity determined with the Human Quantifiler kit (TFS). Statistical analysis showed significant difference in DNA yield in extracts obtained from WWII bones in 2009 and extracts obtained from the same bones stored at -20 °C after 10 years. As reported for frozen liquid DNA extracts, reduction in recovery of DNA was confirmed for frozen bone samples as well. 相似文献
87.
The authentication rules of material evidence is very important for justice. The core of authentication system of real evidence is storage chain rules. We can only accept the evidence in the condition of legally custodian, evidence collected under legal procedure, the transfer without delay, the transport under control, the suitable environment. The authentication system of real evidence also contents the exception of storage chain rules. 相似文献
88.
Kit Burden 《Computer Law & Security Report》2018,34(4):886-889
The sourcing and outsourcing markets are being challenged by the simultaneous impacts of a number of new technologies and delivery mechanisms; this article addresses the impacts being felt by the market participants and the contractual structures they seek to put in place as a result. 相似文献
89.
胡峰 《中共长春市委党校学报》2002,(5):29-31
随着市场化改革的推进,我国政府加快了国有企业产权制度改革的步伐,越来越多的国有企业被纳入民营化的序列,产权结构多元化的格局基本形成,但从目前产权制度改革的实践来看,远未达到预期目的,国有企业产权制度改革要实现实质性突破,必须转变观念,从价值形态上认识存量资产的优势,借存量的调整和优化,实现资产由存量向增量的跨越,确保国有企业产权制度改革达到预期目的。 相似文献
90.
张木林 《贵州社会主义学院学报》2016,(4):10-14
针对传统的统战工作模式老旧、效率不高,不能系统地、有效地利用新的信息技术平台问题,就目前贵州大数据产业发展的黄金时期,提出以"云上贵州"系统平台为依托,建设贵州统战智库,详细阐述六类统战成员各自的特征,借此夯实完善统战队伍人才建设;并运用"云上贵州"搭建四个统战成员平台,创新统战工作的服务方式,以便更好地推动统战工作稳步持续发展,开启统战工作新篇章。 相似文献