首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   935篇
  免费   43篇
各国政治   19篇
工人农民   40篇
世界政治   9篇
外交国际关系   25篇
法律   457篇
中国共产党   23篇
中国政治   115篇
政治理论   82篇
综合类   208篇
  2024年   3篇
  2023年   16篇
  2022年   25篇
  2021年   33篇
  2020年   23篇
  2019年   31篇
  2018年   36篇
  2017年   26篇
  2016年   30篇
  2015年   40篇
  2014年   72篇
  2013年   70篇
  2012年   53篇
  2011年   56篇
  2010年   32篇
  2009年   59篇
  2008年   49篇
  2007年   60篇
  2006年   68篇
  2005年   51篇
  2004年   32篇
  2003年   28篇
  2002年   26篇
  2001年   21篇
  2000年   17篇
  1999年   8篇
  1998年   1篇
  1997年   4篇
  1996年   3篇
  1993年   2篇
  1991年   1篇
  1989年   1篇
  1988年   1篇
排序方式: 共有978条查询结果,搜索用时 31 毫秒
141.
New York State's current lack of legislation criminalizing the threat of revenge porn allows repetitive, invasive, and embarrassing attacks on the morality and sexuality of victims. This can have a severe impact on survivors of domestic violence who are prevented from leaving dangerous situations by threats of dissemination. Victims of revenge porn and domestic violence often face isolation, threats of violence, and thoughts of suicide. This Note proposes that threats of revenge porn become family offenses under the New York Family Court Act § 812.  相似文献   
142.
Citizens and victims perceive the criminal justice system to be protracted. Blame for lengthy delays has disproportionately fallen on detective work. To that end, these analyses explore how long it took 184 detectives to work index crimes. Data suggest that more serious crimes, cases with a known suspect, and offenses that did not result in an arrest are most likely to be investigated and worked more promptly by detectives. Detectives, however, continue to exercise a great deal of discretion in if and when cases are worked once they are assigned. These findings are discussed as they relate to police performance indicators, the allocation of departmental resources, issues of crime control, and citizen satisfaction with the police.  相似文献   
143.
File system forensics is an important part of Digital Forensics. Investigators of storage media have traditionally focused on the most commonly used file systems such as NTFS, FAT, ExFAT, Ext2-4, HFS+, APFS, etc. NTFS is the current file system used by Windows for the system volume, but this may change in the future. In this paper we will show the structure of the Resilient File System (ReFS), which has been available since Windows Server 2012 and Windows 8. The main purpose of ReFS is to be used on storage spaces in server systems, but it can also be used in Windows 8 or newer. Although ReFS is not the current standard file system in Windows, while users have the option to create ReFS file systems, digital forensic investigators need to investigate the file systems identified on a seized media. Further, we will focus on remnants of non-allocated metadata structures or attributes. This may allow metadata carving, which means searching for specific attributes that are not allocated. Attributes found can then be used for file recovery. ReFS uses superblocks and checkpoints in addition to a VBR, which is different from other Windows file systems. If the partition is reformatted with another file system, the backup superblocks can be used for partition recovery. Further, it is possible to search for checkpoints in order to recover both metadata and content.Another concept not seen for Windows file systems, is the sharing of blocks. When a file is copied, both the original and the new file will share the same content blocks. If the user changes the copy, new data runs will be created for the modified content, but unchanged blocks remain shared. This may impact file carving, because part of the blocks previously used by a deleted file might still be in use by another file. The large default cluster size, 64 KiB, in ReFS v1.2 is an advantage when carving for deleted files, since most deleted files are less than 64 KiB and therefore only use a single cluster. For ReFS v3.2 this advantage has decreased because the standard cluster size is 4 KiB.Preliminary support for ReFS v1.2 has been available in EnCase 7 and 8, but the implementation has not been documented or peer-reviewed. The same is true for Paragon Software, which recently added ReFS support to their forensic product. Our work documents how ReFS v1.2 and ReFS v3.2 are structured at an abstraction level that allows digital forensic investigation of this new file system. At the time of writing this paper, Paragon Software is the only digital forensic tool that supports ReFS v3.x.It is the most recent version of the ReFS file system that is most relevant for digital forensics, as Windows automatically updates the file system to the latest version on mount. This is why we have included information about ReFS v3.2. However, it is possible to change a registry value to avoid updating. The latest ReFS version observed is 3.4, but the information presented about 3.2 is still valid. In any criminal case, the investigator needs to investigate the file system version found.  相似文献   
144.
In many Western countries, citizen knowledge of terrorist events is intrinsically shaped by the style of broadcasted messages published by the media. Media discourses regarding terrorist acts raise questions about how such rhetoric elicits fear in people who typically experience such events through news reports. However, we do not fully understand the impact of the media on perceptions of terrorism as clearly as we understand the relationship between the media and fear of crime. This study examines how media sources accessed actively (e.g. through newspapers; Internet) or passively (e.g. through television; radio) influence knowledge and fear of terrorism. We find receiving information about terrorism from multiple media sources increases fear of terrorism, but media sources accessed passively are not as influential as media sources accessed more actively. These results highlight how media consumption from various sources may affect one’s fear of terrorism, and further illustrates how the role of perceived knowledge may exacerbate or mitigate fear. Implications for policy and practice are discussed.  相似文献   
145.
In a previous study, a survey‐based analysis of pathologist diagnoses of patterned injury was performed. Subjects were provided with photographs of “classic” injuries and asked to diagnose the lesion in the absence of history or context. There was a relatively low diagnostic consensus among respondents. A second survey suggested that the disparate answers were not due to a strong belief in different diagnoses, but instead reflected how the respondents dealt with ambiguity. A third survey was created that asked participants to evaluate patterned injuries of the skin, but provided history and contextual information. The addition of history and contextual information increased consensus from a median of 80% to 98% on a per‐question basis. Confidence increased from a median of 56%–92%. These results demonstrate the importance of history and context in medical diagnosis of patterned injuries of the skin.  相似文献   
146.
This study designs a method of identifying the camera model used to take videos that are distributed through mobile phones and determines the original version of the mobile phone video for use as legal evidence. For this analysis, an experiment was conducted to find the unique characteristics of each mobile phone. The videos recorded by mobile phones were analyzed to establish the delay time of sound signals, and the differences between the delay times of sound signals for different mobile phones were traced by classifying their characteristics. Furthermore, the sound input signals for mobile phone videos used as legal evidence were analyzed to ascertain whether they have the unique characteristics of the original version. The objective of this study was to find a method for validating the use of mobile phone videos as legal evidence using mobile phones through differences in the delay times of sound input signals.  相似文献   
147.
WeChat is one of the most popular instant-messaging smartphone applications in the world. At the end of 2015, WeChat had 697 million monthly active users from over 200 countries. Although WeChat was designed originally for communication between relatives and friends, its abundant social functions are now also used by criminals for communication, and even for the organization and coordination of criminal acts. Therefore, communication records of social networking services like WeChat extracted from the smartphones of criminals are always the vital digital evidences for the investigation and prosecution of criminal cases. At present, only a few literatures focused on WeChat forensics. This paper describes several common questions that arise in forensic examinations of Android WeChat and provides corresponding technical methods that are useful to address these questions. This paper is intended to provide vital references for the investigators and researchers working on the digital forensics.  相似文献   
148.
Identifying the source camera of images is becoming increasingly important nowadays. A popular approach is to use a type of pattern noise called photo-response non-uniformity (PRNU). The noise of image contains the patterns which can be used as a fingerprint. Despite that, the PRNU-based approach is sensitive towards scene content and image intensity. The identification is poor in areas having low or saturated intensity, or in areas with complicated texture. The reliability of different regions is difficult to model in that it depends on the interaction of scene content and the characteristics of the denoising filter used to extract the noise. In this paper, we showed that the local variance of the noise residual can measure the reliability of the pixel for PRNU-based source camera identification. Hence, we proposed to use local variance to characterize the severeness of the scene content artifacts. The local variance is then incorporated to the general matched filter and peak to correlation energy (PCE) detector to provide an optimal framework for signal detection. The proposed method is tested against several state-of-art methods. The experimental results show that the local variance based approach outperformed other state-of-the-art methods in terms of identification accuracy.  相似文献   
149.
如果能够在东北亚地区建立IT产业的共同体,将很有可能带动其他产业的联合,最终走向全面地联合,从而提升东北亚地区合作的层次。东北亚国家已经开始在IT领域进行了一定程度的合作,但是在东北亚地区建立IT共同体的道路不会是一帆风顺的,有许多因素会影响到东北亚IT共同体的最终形成。  相似文献   
150.
Abstract: Surveys are sometimes used to assess preferences towards policy issues that are remote from experience and that have never been publicly discussed. How do these preferences of isolated survey respondents compare with preferences expressed by voters who have access to advice from competing political parties? I address this question by conducting a field experiment with a sample of the general public in which I experimentally control the subjects’ access to the actual positions of competing parties and interest groups on specific novel policy propositions. Access to party positions decreased approval of the proposed environmental policy among right‐wing voters by over fifty percent, and this effect was similar for different educational groups. When voters had access to party positions, their policy preferences were more consistent with their general political orientation. I conclude by discussing implications of these results for the debate about voter competence and for preference elicitation using surveys.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号