全文获取类型
收费全文 | 935篇 |
免费 | 43篇 |
专业分类
各国政治 | 19篇 |
工人农民 | 40篇 |
世界政治 | 9篇 |
外交国际关系 | 25篇 |
法律 | 457篇 |
中国共产党 | 23篇 |
中国政治 | 115篇 |
政治理论 | 82篇 |
综合类 | 208篇 |
出版年
2024年 | 3篇 |
2023年 | 16篇 |
2022年 | 25篇 |
2021年 | 33篇 |
2020年 | 23篇 |
2019年 | 31篇 |
2018年 | 36篇 |
2017年 | 26篇 |
2016年 | 30篇 |
2015年 | 40篇 |
2014年 | 72篇 |
2013年 | 70篇 |
2012年 | 53篇 |
2011年 | 56篇 |
2010年 | 32篇 |
2009年 | 59篇 |
2008年 | 49篇 |
2007年 | 60篇 |
2006年 | 68篇 |
2005年 | 51篇 |
2004年 | 32篇 |
2003年 | 28篇 |
2002年 | 26篇 |
2001年 | 21篇 |
2000年 | 17篇 |
1999年 | 8篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1993年 | 2篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有978条查询结果,搜索用时 31 毫秒
141.
Sarah Beechay 《Family Court Review》2019,57(4):539-553
New York State's current lack of legislation criminalizing the threat of revenge porn allows repetitive, invasive, and embarrassing attacks on the morality and sexuality of victims. This can have a severe impact on survivors of domestic violence who are prevented from leaving dangerous situations by threats of dissemination. Victims of revenge porn and domestic violence often face isolation, threats of violence, and thoughts of suicide. This Note proposes that threats of revenge porn become family offenses under the New York Family Court Act § 812. 相似文献
142.
Seth Wyatt Fallik 《Police Practice and Research》2019,20(2):185-200
Citizens and victims perceive the criminal justice system to be protracted. Blame for lengthy delays has disproportionately fallen on detective work. To that end, these analyses explore how long it took 184 detectives to work index crimes. Data suggest that more serious crimes, cases with a known suspect, and offenses that did not result in an arrest are most likely to be investigated and worked more promptly by detectives. Detectives, however, continue to exercise a great deal of discretion in if and when cases are worked once they are assigned. These findings are discussed as they relate to police performance indicators, the allocation of departmental resources, issues of crime control, and citizen satisfaction with the police. 相似文献
143.
File system forensics is an important part of Digital Forensics. Investigators of storage media have traditionally focused on the most commonly used file systems such as NTFS, FAT, ExFAT, Ext2-4, HFS+, APFS, etc. NTFS is the current file system used by Windows for the system volume, but this may change in the future. In this paper we will show the structure of the Resilient File System (ReFS), which has been available since Windows Server 2012 and Windows 8. The main purpose of ReFS is to be used on storage spaces in server systems, but it can also be used in Windows 8 or newer. Although ReFS is not the current standard file system in Windows, while users have the option to create ReFS file systems, digital forensic investigators need to investigate the file systems identified on a seized media. Further, we will focus on remnants of non-allocated metadata structures or attributes. This may allow metadata carving, which means searching for specific attributes that are not allocated. Attributes found can then be used for file recovery. ReFS uses superblocks and checkpoints in addition to a VBR, which is different from other Windows file systems. If the partition is reformatted with another file system, the backup superblocks can be used for partition recovery. Further, it is possible to search for checkpoints in order to recover both metadata and content.Another concept not seen for Windows file systems, is the sharing of blocks. When a file is copied, both the original and the new file will share the same content blocks. If the user changes the copy, new data runs will be created for the modified content, but unchanged blocks remain shared. This may impact file carving, because part of the blocks previously used by a deleted file might still be in use by another file. The large default cluster size, 64 KiB, in ReFS v1.2 is an advantage when carving for deleted files, since most deleted files are less than 64 KiB and therefore only use a single cluster. For ReFS v3.2 this advantage has decreased because the standard cluster size is 4 KiB.Preliminary support for ReFS v1.2 has been available in EnCase 7 and 8, but the implementation has not been documented or peer-reviewed. The same is true for Paragon Software, which recently added ReFS support to their forensic product. Our work documents how ReFS v1.2 and ReFS v3.2 are structured at an abstraction level that allows digital forensic investigation of this new file system. At the time of writing this paper, Paragon Software is the only digital forensic tool that supports ReFS v3.x.It is the most recent version of the ReFS file system that is most relevant for digital forensics, as Windows automatically updates the file system to the latest version on mount. This is why we have included information about ReFS v3.2. However, it is possible to change a registry value to avoid updating. The latest ReFS version observed is 3.4, but the information presented about 3.2 is still valid. In any criminal case, the investigator needs to investigate the file system version found. 相似文献
144.
In many Western countries, citizen knowledge of terrorist events is intrinsically shaped by the style of broadcasted messages published by the media. Media discourses regarding terrorist acts raise questions about how such rhetoric elicits fear in people who typically experience such events through news reports. However, we do not fully understand the impact of the media on perceptions of terrorism as clearly as we understand the relationship between the media and fear of crime. This study examines how media sources accessed actively (e.g. through newspapers; Internet) or passively (e.g. through television; radio) influence knowledge and fear of terrorism. We find receiving information about terrorism from multiple media sources increases fear of terrorism, but media sources accessed passively are not as influential as media sources accessed more actively. These results highlight how media consumption from various sources may affect one’s fear of terrorism, and further illustrates how the role of perceived knowledge may exacerbate or mitigate fear. Implications for policy and practice are discussed. 相似文献
145.
Effect of History and Context on Forensic Pathologist Interpretation of Photographs of Patterned Injury of the Skin 下载免费PDF全文
William R. Oliver M.D. 《Journal of forensic sciences》2017,62(6):1500-1505
In a previous study, a survey‐based analysis of pathologist diagnoses of patterned injury was performed. Subjects were provided with photographs of “classic” injuries and asked to diagnose the lesion in the absence of history or context. There was a relatively low diagnostic consensus among respondents. A second survey suggested that the disparate answers were not due to a strong belief in different diagnoses, but instead reflected how the respondents dealt with ambiguity. A third survey was created that asked participants to evaluate patterned injuries of the skin, but provided history and contextual information. The addition of history and contextual information increased consensus from a median of 80% to 98% on a per‐question basis. Confidence increased from a median of 56%–92%. These results demonstrate the importance of history and context in medical diagnosis of patterned injuries of the skin. 相似文献
146.
Identification of Mobile Phone and Analysis of Original Version of Videos through a Delay Time Analysis of Sound Signals from Mobile Phone Videos 下载免费PDF全文
This study designs a method of identifying the camera model used to take videos that are distributed through mobile phones and determines the original version of the mobile phone video for use as legal evidence. For this analysis, an experiment was conducted to find the unique characteristics of each mobile phone. The videos recorded by mobile phones were analyzed to establish the delay time of sound signals, and the differences between the delay times of sound signals for different mobile phones were traced by classifying their characteristics. Furthermore, the sound input signals for mobile phone videos used as legal evidence were analyzed to ascertain whether they have the unique characteristics of the original version. The objective of this study was to find a method for validating the use of mobile phone videos as legal evidence using mobile phones through differences in the delay times of sound input signals. 相似文献
147.
WeChat is one of the most popular instant-messaging smartphone applications in the world. At the end of 2015, WeChat had 697 million monthly active users from over 200 countries. Although WeChat was designed originally for communication between relatives and friends, its abundant social functions are now also used by criminals for communication, and even for the organization and coordination of criminal acts. Therefore, communication records of social networking services like WeChat extracted from the smartphones of criminals are always the vital digital evidences for the investigation and prosecution of criminal cases. At present, only a few literatures focused on WeChat forensics. This paper describes several common questions that arise in forensic examinations of Android WeChat and provides corresponding technical methods that are useful to address these questions. This paper is intended to provide vital references for the investigators and researchers working on the digital forensics. 相似文献
148.
Identifying the source camera of images is becoming increasingly important nowadays. A popular approach is to use a type of pattern noise called photo-response non-uniformity (PRNU). The noise of image contains the patterns which can be used as a fingerprint. Despite that, the PRNU-based approach is sensitive towards scene content and image intensity. The identification is poor in areas having low or saturated intensity, or in areas with complicated texture. The reliability of different regions is difficult to model in that it depends on the interaction of scene content and the characteristics of the denoising filter used to extract the noise. In this paper, we showed that the local variance of the noise residual can measure the reliability of the pixel for PRNU-based source camera identification. Hence, we proposed to use local variance to characterize the severeness of the scene content artifacts. The local variance is then incorporated to the general matched filter and peak to correlation energy (PCE) detector to provide an optimal framework for signal detection. The proposed method is tested against several state-of-art methods. The experimental results show that the local variance based approach outperformed other state-of-the-art methods in terms of identification accuracy. 相似文献
149.
如果能够在东北亚地区建立IT产业的共同体,将很有可能带动其他产业的联合,最终走向全面地联合,从而提升东北亚地区合作的层次。东北亚国家已经开始在IT领域进行了一定程度的合作,但是在东北亚地区建立IT共同体的道路不会是一帆风顺的,有许多因素会影响到东北亚IT共同体的最终形成。 相似文献
150.
Felix Schläpfer 《Swiss Political Science Review》2011,17(1):75-91
Abstract: Surveys are sometimes used to assess preferences towards policy issues that are remote from experience and that have never been publicly discussed. How do these preferences of isolated survey respondents compare with preferences expressed by voters who have access to advice from competing political parties? I address this question by conducting a field experiment with a sample of the general public in which I experimentally control the subjects’ access to the actual positions of competing parties and interest groups on specific novel policy propositions. Access to party positions decreased approval of the proposed environmental policy among right‐wing voters by over fifty percent, and this effect was similar for different educational groups. When voters had access to party positions, their policy preferences were more consistent with their general political orientation. I conclude by discussing implications of these results for the debate about voter competence and for preference elicitation using surveys. 相似文献