首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20篇
  免费   2篇
法律   19篇
综合类   3篇
  2021年   2篇
  2020年   2篇
  2017年   2篇
  2013年   2篇
  2012年   1篇
  2011年   1篇
  2009年   2篇
  2008年   1篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
  1999年   2篇
  1998年   1篇
  1997年   1篇
  1994年   1篇
  1992年   1篇
排序方式: 共有22条查询结果,搜索用时 15 毫秒
21.
Abstract

Facial composite images are often used in the criminal investigation process to facilitate the search for and identification of someone who has committed a crime. Since the use of facial composite images is sometimes relied upon as an integral part of an investigation, it is important to ascertain information about the various decisions made and procedures implemented by law enforcement regarding the use of composites. A 39-item survey was developed to examine the prevalence of a number of procedures related to composite production, including the systems implemented, criteria for selecting systems, law enforcement training, satisfaction with systems, legal challenges, and procedural issues with respect to interviewing multiple witnesses and the distribution of composite images. Surveys were distributed to 1637 city, state and county law enforcement agencies nationwide; 163 completed surveys were returned. This paper summarizes our survey results and discusses the implications for investigative procedures, law enforcement training, and future research needs.  相似文献   
22.
The popular social networking site, Facebook, recently launched a facial recognition tool to help users tag photographs they uploaded to Facebook. This generated significant controversy, arising as much as anything, from the company’s failure to adequately inform users of this new service and to explain how the technology works.The incident illustrates the sensitivity of facial recognition technology and the potential conflict with data privacy laws. However, facial recognition has been around for some time and is used by businesses and public organisations for a variety of purposes – primarily in relation to law enforcement, border control, photo editing and social networking. There are also indications that the technology could be used by commercial entities for marketing purposes in the future.This article considers the technology, its practical applications and the manner in which European data protection laws regulate its use. In particular, how much control should we have over our own image? What uses of this technology are, and are not, acceptable? Ultimately, does European data protection law provide an adequate framework for this technology? Is it a framework which protects the privacy of individuals without unduly constraining the development of innovative and beneficial applications and business models?  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号