全文获取类型
收费全文 | 219篇 |
免费 | 1篇 |
专业分类
工人农民 | 5篇 |
世界政治 | 3篇 |
外交国际关系 | 16篇 |
法律 | 105篇 |
中国政治 | 21篇 |
政治理论 | 25篇 |
综合类 | 45篇 |
出版年
2024年 | 4篇 |
2023年 | 5篇 |
2022年 | 2篇 |
2021年 | 3篇 |
2020年 | 5篇 |
2019年 | 8篇 |
2018年 | 6篇 |
2017年 | 7篇 |
2016年 | 11篇 |
2015年 | 8篇 |
2014年 | 28篇 |
2013年 | 33篇 |
2012年 | 24篇 |
2011年 | 12篇 |
2010年 | 13篇 |
2009年 | 8篇 |
2008年 | 8篇 |
2007年 | 12篇 |
2006年 | 8篇 |
2005年 | 2篇 |
2004年 | 4篇 |
2003年 | 5篇 |
2002年 | 1篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1997年 | 1篇 |
排序方式: 共有220条查询结果,搜索用时 0 毫秒
131.
Harry Wechsler 《政策研究评论》2012,29(1):63-89
The central position of this article is that validation and interoperability are paramount for the effective and ethical use of biometrics. Illuminating the relevance for policymakers of the science underlying the security and privacy aspects of biometrics, this article calls for adequate and enforceable performance metrics that can be independently corroborated. Accordingly, the article considers biometrics and forensics for the dual challenges of addressing security and privacy using smart identity management. The discussion revolves around the concepts of “personally identifiable information” (PII) and interoperability with emphasis on quantitative performance analysis and validation for uncontrolled operational settings, variable demographics, and distributed and federated operations. Validation metrics includes expected rates of identification/misidentification, precision, and recall. The complementary concepts of identity and anonymity are addressed in terms of expected performance, functionality, law and ethics, forensics, and statistical learning. Biometrics encompasses appearance, behavior, and cognitive state or intent. Modes of deployment and performance evaluation for biometrics are detailed, with operational and adversarial challenges for both security and privacy described in terms of trustworthiness, vulnerabilities, functional creep, and feasibility of safeguards. The article underscores how lack of interoperability is mostly due to overfitting and tuning to well‐controlled settings, so that validation merely confirms “teaching to the test” rather than preparation for real‐world deployment. Most important for validation is reproducibility of results including full information on the experimental design used, that forensic exclusion is allowed, and that scientific methods for performance evaluation are followed. The article concludes with expected developments regarding technology use and advancements that bear on security and privacy, including data streams and video, de‐anonymization and reidentification, social media analytics and cyber security, and smart camera networks and surveillance. 相似文献
132.
133.
随着侦查理论研究和实践的广泛运用,利用视频监控侦查破案势必成为一条全新、简捷、高效的侦查途径。但当前视频监控在建设、运用和法律规范方面仍存在一些尚需解决的问题。随着"科技强警"理念的不断深入,我们要积极转变传统思维,使视频监控在侦查实践中的作用最大化发挥,从而更好地保障社会稳定和公民基本权利。 相似文献
134.
王庭大 《中国延安干部学院学报》2009,(6):22-28
建国以来,党的制度建设道路是曲折的,期间有停滞,但更有突破,最终走向全面推进和深入发展。党不断改革完善自身领导制度,坚持科学执政民主执政依法执政,健全完善组织制度,建立健全党内民主制度和监督制度。党的制度建设的经验表明,党必须坚持把制度建设放在更加重要的位置,加强党内规章制度建设,实现党内民主的制度化、程序化,坚持党内规章制度与国家法律法规的协调配合,努力增强制度的科学性、系统性。 相似文献
135.
以委托—代理理论和信息经济学中的监督模型为基础,通过对政府和公务员二者在完全信息静态博弈下的混合战略分析可见,租金的高低、政府监督的成本和对寻租的公务员惩罚的力度是影响公务员寻租的三个主要因素。我们应通过健全社会舆论与群众监督机制,提高公务员的道德水平,加大对公务员寻租行为的法制惩罚力度,加大对寻租者的物质惩罚力度,健全社会主义市场经济体制,消除租源等措施来防止公务员寻租。 相似文献
136.
江焕辉 《北京人民警察学院学报》2014,(2):78-82
从理性选择角度分析作案人,可以推测其在实施犯罪后大多会逃离犯罪现场,销毁犯罪证据,隐匿身份,这些活动过程必然会在一定的时间、空间得以体现。而以案件现场为基准点,根据视频监控系统中记录犯罪嫌疑人案发前的活动情况、案发后活动行踪,以还原行为轨迹,从而分析其下一步将会出现的时间点和活动区域。狭义的目标轨迹概念是指造型体在时空运动中,通过信息交换,遗留在承受体上记录其社会交互活动状况的总和。它以社会网络分析、信息交换、数据挖掘等原理为支撑。可以以人员轨迹、车辆轨迹、涉案的特定物等为标识,通过运用时序、空间、信息联查等方法,分析视频监控信息中的目标轨迹。 相似文献
137.
At present, very little research has been devoted to investigating the ability of laser scanning technology to accurately measure height from surveillance video. The goal of this study was to test the accuracy of one particular laser scanner to estimate suspect height from video footage. The known heights of 10 individuals were measured using an anthropometer. The individuals were then recorded on video walking along a predetermined path in a simulated crime scene environment both with and without headwear. The difference between the known heights and the estimated heights obtained from the laser scanner software were compared using a one-way t-test. The height estimates obtained from the software were not significantly different from the known heights whether individuals were wearing headwear (p = 0.186) or not (p = 0.707). Thus, laser scanning is one technique that could potentially be used by investigators to determine suspect height from video footage. 相似文献
138.
Jonida Milaj 《International Review of Law, Computers & Technology》2016,30(3):115-130
Developments in technology have created the possibility for law enforcement authorities to use for surveillance purposes devices that are in the hands or private premises of individuals (e.g. smart phones, GPS devices, smart meters, etc.). The extent to which these devices interfere with an individual's private sphere might differ. In the European Union, surveillance measures are considered lawful if they have been issued in conformity with the legal rules and the proportionality principle. Taking a fundamental rights approach, this paper focuses on the information needed for adopting proportionate decisions when authorizing the use for surveillance of devices that are not built for surveillance purposes. Since existing methods of privacy assessment of technologies do not offer the required information, this paper suggests the need for a new method of assessing privacy implications of technologies and devices which combines an assessment of privacy aspects with the different dimensions of surveillance. 相似文献
139.
Mthobeli Ngcongo 《Communicatio》2016,42(1):56-74
Communication technologies, such as the mobile phone, often represent a double-edged sword in romantic relationships. While the mobile phone can enhance the quality of communication, it can simultaneously become a source of conflict. The dialectic framework of communication privacy management offers a nuanced lens from which to investigate rules for the use of the mobile phone in the dyadic of romantic relationships. This study investigates mobile phone usage rules that are negotiated by adolescents and young adults in romantic relationships. The study specifically focuses on rules around mobile privacy management. Findings from in-depth interviews indicate that the negotiation of rules is a crucial part of young adult relationships. Enhancing trust and fostering harmony were important factors in the rule development process. The implications, limitations, and future possibilities for research are discussed. 相似文献
140.
视频监控系统在侦查中的应用价值 总被引:2,自引:0,他引:2
刘启刚 《河北公安警察职业学院学报》2010,10(4):24-27
严峻的犯罪形势要求公安机关转变侦查破案的思维方式,创新打击犯罪的策略方法,向科技要警力。视频监控系统在打击犯罪中具有传统侦查手段所不具备的独特价值,在预防犯罪、抓获犯罪嫌疑人、固定证据和案件串并等方面发挥着重要的作用。但视频监控系统在建设、具体应用和法律规范方面还存在一些问题需要研究解决。 相似文献