首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   438篇
  免费   8篇
各国政治   2篇
工人农民   1篇
世界政治   4篇
外交国际关系   8篇
法律   298篇
中国共产党   2篇
中国政治   32篇
政治理论   23篇
综合类   76篇
  2023年   1篇
  2022年   12篇
  2021年   12篇
  2020年   11篇
  2019年   9篇
  2018年   53篇
  2017年   10篇
  2016年   10篇
  2015年   4篇
  2014年   50篇
  2013年   44篇
  2012年   51篇
  2011年   42篇
  2010年   24篇
  2009年   45篇
  2008年   22篇
  2007年   14篇
  2006年   1篇
  2005年   6篇
  2004年   8篇
  2003年   5篇
  2002年   3篇
  2001年   3篇
  2000年   2篇
  1996年   1篇
  1990年   1篇
  1988年   2篇
排序方式: 共有446条查询结果,搜索用时 15 毫秒
111.
信用卡犯罪若干疑难问题探析   总被引:2,自引:0,他引:2  
谢望原  史全领 《法学论坛》2005,20(5):104-112
本文针对信用卡犯罪理论上和实践中存在的诸多疑难问题进行了深入研究。笔者认为:盗窃信用卡并使用的定性应具体问题具体分析,不宜笼统地以盗窃罪论处;对捡拾信用卡及其后续行为的认定应分而论之;盗划信用卡应当以信用卡诈骗罪论处;与信用卡有关的勾结犯罪、持有犯罪、恶意透支等问题也应区别对待。此外,笔者还对信用卡犯罪在立法上存在的空缺及司法上存在的错误倾向提出了建设性完善意见。  相似文献   
112.
Part of the ongoing debate between Cantor and Land and Greenberg centers on differing opinions about the question of interest in Cantor and Land (1985). We begin this article with our opinion that Cantor and Land's theory relates changes in the business cycle to changes in the aggregate rate of crime. We then question whether year-to-year changes adequately reflect changes in the business cycle, which last on average 4 years, and we refer to an article by Cook and Zarkin (1985) which presents an alternative method of measuring business cycle changes. We also discuss how Greenberg's use of cointegration provides an alternative way of addressing the difficult statistical problem of nonstationarity without resorting to first differences. Our final contribution involves noticing that opportunity and motivational theories of crime can be structurally identified by focusing on different types of crime rather than temporal lags. We demonstrate this idea by splitting car theft into joyriding and theft for profit. We show that joyriding appears to be driven by opportunity, while the causal structure of theft for profit is less clear.  相似文献   
113.
王利荣 《现代法学》2011,33(4):97-105
定性盗窃须依据实体标准,《刑法修正案(八)》扩大盗窃犯罪圈却有收紧制裁圈之效;司法解释虽在立法基础上具体定性规则,数额的经年不变却可能令犯罪圈隐性扩张;为此,个案情节的适用能够起到内敛犯罪圈的作用。定性盗窃还须经程序控制,因为出罪案件未经刑事诉讼程序的过滤,相关立法及司法解释之疏漏可能被遮蔽,因动机、赔偿情节豁免出罪的理由可能不甚清晰。  相似文献   
114.
Over the past decade, a substantial effort has been put into developing methods to classify file fragments. Throughout, it has been an article of faith that data fragments, such as disk blocks, can be attributed to different file types. This work is an attempt to critically examine the underlying assumptions and compare them to empirically collected data. Specifically, we focus most of our effort on surveying several common compressed data formats, and show that the simplistic conceptual framework of prior work is at odds with the realities of actual data. We introduce a new tool, zsniff, which allows us to analyze deflate-encoded data, and we use it to perform an empirical survey of deflate-coded text, images, and executables. The results offer a conceptually new type of classification capabilities that cannot be achieved by other means.  相似文献   
115.
A reductio ad absurdum takes the principles of a doctrine, applies them exactly as their creators did only to an entirely different subject and with horrendous results, and thus shows what absurd conclusions are logically compatible with the original thesis. This article applies the tenets of the Chicago law and economics tradition, as adumbrated by two of its most distinguished practitioners, Coase and Posner. It shows that on the basis of this canon a case can be made out for freeing O.J. Simpson—even if he did indeed kill his wife. The article is an attempt to show that the libertarian reliance on personal and private property rights is a much more robust thesis than the Chicago precept of wealth maximization.  相似文献   
116.
数据挖掘是指从数据库或数据仓库中提取隐含的、未知的及有潜在应用价值的信息或模式。数据挖掘技术应用于预防小区犯罪,采用CRISP-DM方法论,通过数据理解、数据准备、模型选择、建立模型、训练模型、评估模型等流程,可以对犯罪分布区域、犯罪分子惯用手段、犯罪行为特征、受害人特征、受害人群识别等进行分析,识别高犯罪率的小区及犯罪特征。  相似文献   
117.
铁路不仅是社会的主要交通运输工具 ,也是一个社会人财物高度聚集的流动的开放性的公共场所。旅客财物被盗窃 (以下简称旅财 )是铁路上的最多发案件 ,直接侵害广大旅客的财产安全 ,不仅给广大旅客造成了非常大的经济损失 ,而且损害了铁路企业的声誉 ,有时甚至对国家的军事、科技、外交等产生重要影响。无论是从案件构成的规律特点 ,还是案件的管辖上来看 ,铁路旅财案件都有着很强的特殊性。铁路旅财案件的主要特点 :(一 )犯罪主体的多样性 ;(二 )作案时空的选择性 ;(三 )作案手段的多样化与技术性 ;(四 )现场痕迹易被破坏 ,现场多有目击者。铁路旅财案件的主要侦查对策 :(一 )调查访问 ;(二 )追击堵截 ;(三 )通报协查 ;(四 )现场勘验 ;(五 )以物找人 ;(六 )利用情报资料 ;(七 )使用特情 ;(八 )抓获现行。  相似文献   
118.
盗窃案件具有发案高、现场多、情况多变、痕迹物证分布复杂、现场容易被破坏和伪装等特点。因而盗窃案件现场勘查质量的高低 ,往往直接影响案件的侦破工作。针对当前盗窃案件现场勘查中存在的问题 ,文章提出 :1 加强对现场勘查重要性认识 ;2 规范现场勘查的各个环节 ;3 不断增强技术人员的业务素质 ;4 建立现场勘查信息系统 ;5 建立更加合理的激励机制。  相似文献   
119.
The purpose of this paper is to assess the effects of data aggregation on a specification of the relationship between sex and arrest rate trends. The analysis focuses on the empirical implications when arrest data are aggregated across dimensions that are likely to affect the sex-crime relationship. The data for the analysis consist of 4,119,358 male and female adult arrests in New York State for the 13-year period ending in 1984. Results indicate that race, regional differences, and the legal seriousness of the arrest charge produce significantly different patterns of sex convergence across time. On the basis of these results, we suggest serious limitations in past analyses of female crime rates and in the value of Uniform Crime Report (UCR) data for addressing theoretically relevant questions concerning the social correlates of official crime.  相似文献   
120.
Comparison of antemortem and postmortem dental records is a leading method of victim identification, especially for incidents involving a large number of decedents. This process may be expedited with computer software that provides a ranked list of best possible matches. This study provides a comparison of the most commonly used conventional coding and sorting algorithms used in the United States (WinID3) with a simplified coding format that utilizes an optimized sorting algorithm. The simplified system consists of seven basic codes and utilizes an optimized algorithm based largely on the percentage of matches. To perform this research, a large reference database of approximately 50,000 antemortem and postmortem records was created. For most disaster scenarios, the proposed simplified codes, paired with the optimized algorithm, performed better than WinID3 which uses more complex codes. The detailed coding system does show better performance with extremely large numbers of records and/or significant body fragmentation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号