首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   217篇
  免费   2篇
各国政治   2篇
工人农民   2篇
世界政治   1篇
外交国际关系   4篇
法律   157篇
中国共产党   1篇
中国政治   8篇
政治理论   12篇
综合类   32篇
  2023年   5篇
  2022年   16篇
  2021年   13篇
  2020年   8篇
  2019年   12篇
  2018年   19篇
  2017年   8篇
  2016年   7篇
  2015年   12篇
  2014年   30篇
  2013年   13篇
  2012年   9篇
  2011年   10篇
  2010年   4篇
  2009年   8篇
  2008年   5篇
  2007年   9篇
  2006年   11篇
  2005年   3篇
  2004年   4篇
  2003年   6篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有219条查询结果,搜索用时 15 毫秒
71.
《Digital Investigation》2014,11(4):261-272
Internet technologies are beginning to influence the sale and supply of illicit drugs in Australia. One such technology, an online marketplace known as Silk Road, had dramatically increased in popularity since its worldwide launch in February 2011. This research and paper were completed prior to the Silk Road's founder, Ross Ulbricht being arrested on 2 October 2013 and Silk Road being taken off line. This research paper will consider such factors; as the increasing use of internet by Australians, the popularity of shopping online and the variance in the quality and price of products available on Silk Road to those available in other drug markets. The case study will provide an in-depth look at Silk Road from an Australian perspective and in light of the continuing popularity of illicit drug use in Australia. Though Silk Road is currently off line, ‘Bitcoin’ has survived and it will only be a matter of time before a substitute for Silk Road emerges.  相似文献   
72.
《Digital Investigation》2014,11(4):273-294
A major challenge to digital forensic analysis is the ongoing growth in the volume of data seized and presented for analysis. This is a result of the continuing development of storage technology, including increased storage capacity in consumer devices and cloud storage services, and an increase in the number of devices seized per case. Consequently, this has led to increasing backlogs of evidence awaiting analysis, often many months to years, affecting even the largest digital forensic laboratories. Over the preceding years, there has been a variety of research undertaken in relation to the volume challenge. Solutions posed range from data mining, data reduction, increased processing power, distributed processing, artificial intelligence, and other innovative methods. This paper surveys the published research and the proposed solutions. It is concluded that there remains a need for further research with a focus on real world applicability of a method or methods to address the digital forensic data volume challenge.  相似文献   
73.
74.
《Digital Investigation》2014,11(1):20-29
The release of Internet Explorer 10 marks a significant change in how browsing artifacts are stored in the Windows file system, moving away from well-understood Index.dat files to use a high performance database, the Extensible Storage Engine. Researchers have suggested that despite this change there remain forensic opportunities to recover InPrivate browsing records from the new browser. The prospect of recovering such evidence, together with its potential forensic significance, prompts questions including where and when such evidence can be recovered, and if it is possible to prove that a recovered artefact originated from InPrivate browsing. This paper reports the results of experiments which answer these questions, and also provides some explanation of the increasingly complex data structures used to record Internet activity from both the desktop and Windows 8 Applications. We conclude that there is a time window between the private browsing session and the next use of the browser in which browsing records may be carved from database log files, after which it is necessary to carve from other areas of disk. It proved possible to recover a substantial record of a user's InPrivate browsing, and to reliably associate such records with InPrivate browsing.  相似文献   
75.
With professional and home Internet users becoming increasingly concerned with data protection and privacy, the privacy afforded by popular cloud file synchronisation services, such as Dropbox, OneDrive and Google Drive, is coming under scrutiny in the press. A number of these services have recently been reported as sharing information with governmental security agencies without warrants. BitTorrent Sync is seen as an alternative by many and has gathered over two million users by December 2013 (doubling since the previous month). The service is completely decentralised, offers much of the same synchronisation functionality of cloud powered services and utilises encryption for data transmission (and optionally for remote storage). The importance of understanding BitTorrent Sync and its resulting digital investigative implications for law enforcement and forensic investigators will be paramount to future investigations. This paper outlines the client application, its detected network traffic and identifies artefacts that may be of value as evidence for future digital investigations.  相似文献   
76.
Widespread use of cloud computing and other off-shore hosting and processing arrangements make regulation of cross border data one of the most significant issues for regulators around the world. Cloud computing has made data storage and access cost effective but it has changed the nature of cross border data. Now data does not have to be stored or processed in another country or transferred across a national border in the traditional sense, to be what we consider to be cross border data. Nevertheless, the notion of physical borders and transfers still pervades thinking on this subject. The European Commission (“EC”) is proposing a new global standard for data transfer to ensure a level of protection for data transferred out of the EU similar to that within the EU. This paper examines the two major international schemes regulating cross-border data, the EU approach and the US approach, and the new EC and US proposals for a global standard. These approaches which are all based on data transfer are contrasted with the new Australian approach which regulates disclosure. The relative merits of the EU, US and Australian approaches are examined in the context of digital identity, rather than just data privacy which is the usual focus, because of the growing significance of digital identity, especially to an individual's ability to be recognized and to transact. The set of information required for transactions which invariably consists of full name, date of birth, gender and a piece of what is referred to as identifying information, has specific functions which transform it from mere information. As is explained in this article, as a set, it literally enables the system to transact. For this reason, it is the most important, and most vulnerable, part of digital identity. Yet while it is deserving of most protection, its significance has been largely under-appreciated. This article considers the issues posed by cross border data regulation in the context of cloud computing, with a focus on transaction identity and the other personal information which make up an individual's digital identity. The author argues that the growing commercial and legal importance of digital identity and its inherent vulnerabilities mandate the need for its more effective protection which is provided by regulation of disclosure, not just transfer.  相似文献   
77.
Through an example of a study utilizing the case-law research method, this paper critically assesses whether taking into account both the findings of Mr La Rue (the United Nations Rapporteur on Human Rights) as well as some Court of Justice of the European Union's (CJEU) case-law, website blocking could be implemented in a way which is compatible with the European Convention on Human Rights (ECHR), in particular, with Article 10. Drawing upon, inter alia, Ofcom site blocking review, sections 17 and 18 of the Digital Economy Act 2010 (DEA), section 97A of the Copyright, Designs and Patents Act 1988 (CDPA), and some independent expert evidence, this paper's major argument is that in view of the CJEU SABAM v Scarlet and SABAM v Netlog, the UK government's decision to repeal the website blocking provisions of the DEA appears appropriate. The paper examines the findings of Fox v BT. It contrasts such findings with the CJEU's case-law and in light of the incompatibility of any website blocking measure with the cumulative three-part test set out in the United Nations Rapporteur on Human Rights discusses a number of implications. It concludes that given that the implementation of content blocking systems, such as Cleanfeed is likely to result in general monitoring being carried out; the UK government could possibly be in breach of EU law, namely, Article 15(1) of Directive 2000/31.  相似文献   
78.
Abstract

The new communication system of interconnected computer networks is altering the nature of political communication in many innovative and significant ways. In Greece, the development of the Internet as a mass communication medium has a history of no more than five years, and it is far from being a fully fledged medium of political communication. With the exception of relatively few cases, the use of the Internet has been shown to increase during the pre-election campaign periods. This paper presents the results of a research project, which explores the personal Web sites of the Greek parliamentarians in an off-campaign period. The research was conducted through the systematic observation, examination, and analysis of a sample of personal Web pages owned by cross-party elected members of the Greek Parliament.  相似文献   
79.
The recently proposed new Copyright Directive was released on 14 September 2016. It has been described by EU law-makers as the pillar of the copyright package promised by the European Commission (EC), to be delivered before the end of Mr. Juncker's mandate. In its Communication of 6 May 2015, the EC had stressed “the importance to enhance cross-border access to copyright-protected content services, facilitate new uses in the fields of research and education, and clarify the role of online services in the distribution of works and other subject-matter.” The proposed Copyright Directive is thus a key measure aiming to address two of these three issues. However it is not without shortfalls.We have therefore decided to publicly express our concerns and send an open letter to the European Commission, the European Parliament and the Council to urge them to re-assess the new provisions dealing with mandatory filtering of user-generated content in the light of the CJEU case law and the Charter of Fundamental Rights of the European Union.In a more extended statement, we examine in details the text of both the explanatory memorandum and the Directive itself.Our conclusions are:1. A comprehensive re-assessment of Article 13 and Recital 39 in the light of the Charter of Fundamental Rights of the European Union and the E-commerce Directive (in particular Article 15) including CJEU case law is needed, as the proposed Copyright Directive does not expressly address the issue of its compatibility with both of these texts.2. Recital 38 does not clarify the domain and effect of Article 13. Rather, it creates confusion as it goes against settled CJEU case law (relating to Articles 14 and 15 of the E-commerce Directive and Article 3 of the Infosoc Directive). Recital 38 should therefore be deleted or substantially re-drafted/re-phrased. If the EU wants to introduce a change in this regard it should clearly justify its choice. In any case, a recital in the preamble to a directive is not an appropriate tool to achieve this effect.We hope that this exercise will prove useful for the debate that has now begun both in the European Parliament and in the Council.  相似文献   
80.
The beginning of the 21st century saw the beginning of substantial debate on “open access” to the Internet and the related concept of “network neutrality”. This paper is a short introduction to some of the complexities of the debate, focussing on the difficulties of attempting to regulate rapidly developing technologies, as well as particular issues of price and market regulation in Australia. Generally, network neutrality advocates believe that without regulation, telecommunications companies will use their control over “last mile” infrastructure to engage in discriminatory and anti-competitive practices against content providers. Opponents argue that this concern is illusory, and regulatory restrictions requiring neutrality will in their turn restrict innovation by network providers. In Australia, most discussion has focussed on price and market regulation. However, many Australian opponents of network neutrality say that it is an American problem, irrelevant to Australia, because of different pricing models for the Australian broadband market.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号