首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35篇
  免费   0篇
工人农民   1篇
世界政治   1篇
外交国际关系   3篇
法律   15篇
中国共产党   1篇
中国政治   2篇
政治理论   4篇
综合类   8篇
  2021年   1篇
  2019年   3篇
  2018年   4篇
  2016年   2篇
  2015年   1篇
  2014年   7篇
  2013年   1篇
  2012年   1篇
  2011年   3篇
  2010年   1篇
  2009年   2篇
  2008年   2篇
  2006年   1篇
  2005年   1篇
  2003年   4篇
  2002年   1篇
排序方式: 共有35条查询结果,搜索用时 15 毫秒
11.
缉捕战术在刑事侦查中的运用   总被引:1,自引:0,他引:1  
缉捕战术是缉捕人员在缉捕活动中所使用的各种计谋方法,是缉捕人员在对敌斗争中进行斗智斗勇的方式。缉捕战术应坚持依法缉捕、敌变我变、知己知彼、快速及时、战术合成的原则,并灵活运用政策攻心,以柔克刚、谈判对话,创造战机、围而不捕,威而不逼、伪装突袭,勇猛出击、引蛇出洞,诱其入网、跟踪盯梢,顺藤摸瓜等战术。  相似文献   
12.
Advances in artificial intelligence (AI) have attracted great attention from researchers and practitioners and have opened up a broad range of beneficial opportunities for AI usage in the public sector. Against this background, there is an emerging need for a holistic understanding of the range and impact of AI-based applications and associated challenges. However, previous research considers AI applications and challenges only in isolation and fragmentarily. Given the lack of a comprehensive overview of AI-based applications and challenges for the public sector, our conceptual approach analyzes and compiles relevant insights from scientific literature to provide an integrative overview of AI applications and related challenges. Our results suggest 10 AI application areas, describing their value creation and functioning as well as specific public use cases. In addition, we identify four major dimensions of AI challenges. We finally discuss our findings, deriving implications for theory and practice and providing suggestions for future research.  相似文献   
13.
This article investigates the mobilization potential of online voter information tools known as “Voting Advice Applications” (VAAs). We argue that an observational approach utilizing survey data constitutes the best available method for causal inference where VAAs are popular—and we are thus most interested in VAA turnout effects—because randomized experiments are likely to run into double cross-over problems. We suggest that matching offers key improvements over existing methods to tackle self-selection into VAA use in observational studies. To improve confidence in selection on observables, we complement matching estimates with an extensive sensitivity analysis, including a placebo test. Empirically, we study the effect of smartvote, a popular VAA from Switzerland, on turnout in the 2007 Swiss federal election. We find that smartvote usage significantly increased the individual-level probability to vote. Our results suggest that smartvote was, on the aggregate, responsible for about 1.2 % points of the total tally with an estimated cost of nine Swiss Francs (7.5 U.S. dollars or 1.4 “Big Macs”) per additional vote. Promising as well, we find that the mobilization effect was more pronounced among younger voters. Our findings point to the value of VAAs compared to traditional get out the vote tactics.  相似文献   
14.
This article examines the extent to which Privacy by Design can safeguard privacy and personal data within a rapidly evolving society. This paper will first briefly explain the theoretical concept and the general principles of Privacy by Design, as laid down in the General Data Protection Regulation. Then, by indicating specific examples of the implementation of the Privacy by Design approach, it will be demonstrated why the implementation of Privacy by Design is a necessity in a number of sectors where specific data protection concerns arise (biometrics, e-health and video-surveillance) and how it can be implemented.  相似文献   
15.
公安应用写作课教师要提高教学质量和效果,必须不断改善自身形象,提高自身素质,要通晓公安业务和法律,熟悉办案程序;关注本学科的发展现状和研究动态,及时掌握各种新的信息;注意大量搜集各种例文,提高感受和鉴别能力;积极参与写作实践,了解文书运作过程;掌握现代化教育技术,探索新的教学模式;努力开展教学和科学研究,不断提高学术素养;增强敬业精神和责任心,加大对写作教学和研究精力的投入。  相似文献   
16.
Crime prevention through environmental design (CPTED) is now routinely adopted in many parts of the world. The role assumed by police in CPTED practices has however received limited academic attention. Through an analysis of available documentation and interviews with local government planners from 10 Sydney councils, this article provides a (partial) understanding of the historical and contemporary roles police have played in the development and implementation of CPTED guidelines in New South Wales (NSW), Australia. It is argued that the NSW Police Force was a pivotal driver of the introduction of planning guidelines to ensure crime risks are considered when new developments are being planned. However, the ongoing contribution of police appears to have waned, largely due to administrative, practical and operational realities. These findings have relevance for ongoing CPTED practice and the work of specialist policing roles more generally.  相似文献   
17.
The focus of this paper is on the class of robots for personal or domestic use, which are connected to a networked repository on the internet that allows such machines to share the information required for object recognition, navigation and task completion in the real world. The aim is to shed light on how these robots will challenge current rules on data protection and privacy. On one hand, a new generation of network-centric applications could in fact collect data incessantly and in ways that are “out of control,” because such machines are increasingly “autonomous.” On the other hand, it is likely that individual interaction with personal machines, domestic robots, and so forth, will also affect what U.S. common lawyers sum up with the Katz's test as a reasonable “expectation of privacy.” Whilst lawyers continue to liken people's responsibility for the behaviour of robots to the traditional liability for harm provoked by animals, children, or employees, attention should be drawn to the different ways in which humans will treat, train, or manage their robots-in-the-cloud, and how the human–robot interaction may affect the multiple types of information that are appropriate to reveal, share, or transfer, in a given context.  相似文献   
18.
Drones are aircraft that have no onboard, human pilot. Through the twentieth century, piloted aircraft made far greater progress than drones. During the twenty-first century, on the other hand, changes in both drone technologies and drone economics have been much more rapid. Particularly in the case of small, inexpensive devices, the question arises as to whether existing regulatory frameworks can cope. To answer that question, it is necessary to document the nature and characteristics of drones, the dimensions across which they vary, the purposes to which they are put, and the impacts that they appear likely to have. The analysis concludes that careful consideration is needed of the adequacy of controls over the impacts of drones on two important values – public safety, and behavioural privacy.  相似文献   
19.
Any specific technology derives attributes from the generic technologies of which it is an instance. A drone is a flying computer. It is dependent on local data communications from its onboard sensors and to its onboard effectors, and on telecommunications links over which it receives data-feeds and command-feeds from terrestrial and perhaps airborne sources and from satellites. A drone acts on the world, and is therefore a robot. The remote pilots, and the operators of drone facilities such as cameras, depend on high-tech tools that interpret data that display transmitted, enhanced and generated image and video, and that enable the composition of commands. So drone operators are already cyborgs. Many drones carry cameras and are used for surveillance. Computing, data communications, robotics, cyborgisation and surveillance offer power and possibilities, but with them come disbenefits and risks. Critical literatures exist in relation to all of those areas. An inspection of those literatures should provide insights into the limitations of drones, and the impacts and implications arising from their use.  相似文献   
20.
In the early 1990s, unmanned aerial vehicles (UAV) were used exclusively in military applications by various developed countries. Now with its ease of availability and affordability in the electronic device market, this aerial vehicular technology has augmented its familiarity in public and has expanded its usage to countries all over the world. However, expanded use of UAVs, colloquially known as drones, is raising understandable security concerns. With the increasing possibility of drones' misuse and their abilities to get close to critical targets, drones are prone to potentially committing crimes and, therefore, investigation of such activities is a much-needed facet. This motivated us to devise a comprehensive drone forensic framework that includes hardware/physical and digital forensics, proficient enough for the post-flight investigation of drone's activity. For hardware/physical forensics, we propose a model for investigating drone components at the crime scene. Additionally, we propose a robust digital drone forensic application with a primary focus on analyzing the essential log parameters of drones through a graphical user interface (GUI) developed using JavaFX 8.0. This application interface would allow users to extract and examine onboard flight information. It also includes a file converter created for easy and effective 3D flight trajectory visualization. We used two popular drones for conducting this research; namely, DJI Phantom 4 and Yuneec Typhoon H. The interface also provides a visual representation of the sensor recordings from which pieces of evidence could be acquired. Our research is intended to offer the forensic science community a powerful approach for investigating drone-related crimes effectively.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号