首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   190篇
  免费   11篇
工人农民   7篇
世界政治   3篇
外交国际关系   11篇
法律   98篇
中国政治   19篇
政治理论   25篇
综合类   38篇
  2024年   1篇
  2023年   4篇
  2022年   1篇
  2021年   4篇
  2020年   3篇
  2019年   3篇
  2018年   9篇
  2017年   8篇
  2016年   11篇
  2015年   7篇
  2014年   24篇
  2013年   30篇
  2012年   21篇
  2011年   6篇
  2010年   11篇
  2009年   8篇
  2008年   8篇
  2007年   11篇
  2006年   12篇
  2005年   5篇
  2004年   4篇
  2003年   5篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1995年   2篇
排序方式: 共有201条查询结果,搜索用时 0 毫秒
101.
Adding to the current debate, this article focuses on the personal data and privacy challenges posed by private industry's use of smart mobile devices that provide location-based services to users and consumers. Directly relevant to personal data protection are valid concerns about the collection, retention, use and accessibility of this kind of personal data, in relation to which a key issue is whether valid consent is ever obtained from users. While it is indisputable that geo-location technologies serve important functions, their potential use for surveillance and invasion of privacy should not be overlooked. Thus, in this study we address the question of how a legal regime can ensure the proper functionality of geo-location technologies while preventing their misuse. In doing so, we examine whether information gathered from geo-location technologies is a form of personal data, how it is related to privacy and whether current legal protection mechanisms are adequate. We argue that geo-location data are indeed a type of personal data. Not only is this kind of data related to an identified or identifiable person, it can reveal also core biographical personal data. What is needed is the strengthening of the existing law that protects personal data (including location data), and a flexible legal response that can incorporate the ever-evolving and unknown advances in technology.  相似文献   
102.
正Thirteen years ago,a mid-air crash between a U.S.surveillance plane and a Chinese fighter jet off south China’s Hainan Island resulted in the disap-pearance and presumed death of the Chinese pilot.The American plane,severely damaged,was forced to make an emergency landing on the island.A diplomatic row ensued,and bilateral relations plunged to a low point.While the past decade has witnessed an across-the-board expansion in positive Sino-U.S.ties,risks of such  相似文献   
103.
The article links the literatures on citizenship studies and electronic democracy by analyzing the extent to which theories and practices of citizenship are being transformed in the age of the Internet. Distinguishing between the different citizenship traditions of liberal-individualism and civic-republicanism, we analyze the interplay between generic technological tools and the divergent historical legacies of citizenship in Turkey and Britain. Based on our analysis of governmental portals, main e-government applications, and censorship and surveillance practices, we argue that new information and communication technologies (ICTs) serve the states' interests by enabling increased surveillance capabilities, more efficient bureaucracy, better border controls and criminal investigations. In both countries, citizens benefit from electronic service-delivery applications primarily as consumers of public services, while their role as citizens are not particularly enhanced. Parallel to these convergence tendencies, we observe striking differences in the way electronic citizenship is practiced in these two countries, stemming from different traditions of citizenship as well as different levels of democracy consolidation. Despite some of the transformative power of the ICTs, their use is largely shaped by the existing understandings of citizenship in both countries.  相似文献   
104.
公共场所图像监视是以监视社会理论为理论基础的,是现代科技技术发展在监视领域的呈现和利用。公共场所图像监视限定于公共机构在公共场所设置和运转的图像监视,具有维护公共安全的正当性,同时也呈现对隐私权等公民权利的干预性。作为公权力运作的公共图像监视,在法律保留原理下应当受到法律规范,同时也应契合公益、比例和正当程序等原则要求,并建立体系化的公共图像监视的影响评价、设置、管理、利用、救济等具体制度。在多部地方性公共图像监视规范文件的探索下,我国亟待出台统一的公共场所图像监视法(或条例)。  相似文献   
105.
Techniques of 2D–3D superimposition are widely used in cases of personal identification from video surveillance systems. However, the progressive improvement of 3D image acquisition technology will enable operators to perform also 3D–3D facial superimposition. This study aims at analyzing the possible applications of 3D–3D superimposition to personal identification, although from a theoretical point of view. Twenty subjects underwent a facial 3D scan by stereophotogrammetry twice at different time periods. Scans were superimposed two by two according to nine landmarks, and root‐mean‐square (RMS) value of point‐to‐point distances was calculated. When the two superimposed models belonged to the same individual, RMS value was 2.10 mm, while it was 4.47 mm in mismatches with a statistically significant difference (p < 0.0001). This experiment shows the potential of 3D–3D superimposition: Further studies are needed to ascertain technical limits which may occur in practice and to improve methods useful in the forensic practice.  相似文献   
106.
In this paper, I introduce the Forensic Field Map (FFM) that provides a two-dimensional view on the forensic field. This field is by definition very broad, encompassing a wide range of scientific areas and activities. The forensic work that supports solving criminal cases ranges from recognizing and preserving traces at crime scenes to explaining forensic results as expert witness in court. This goes hand in hand with the development of scientifically based methods and tooling as well as legal, forensic and laboratory procedures. Although the FFM came into being while developing a (visual) framework for digital forensic investigations, the framework turned out to be generically applicable to other forensic disciplines.  相似文献   
107.
张喜德 《桂海论丛》2003,19(1):32-36
十六大强调要加强对领导干部的培养与监督.当代高素质领导干部的培养、监督是相互依存、相互制约、相互作用的,培养是监督的对象与载体,监督是培养的巩固与强化.二者统一于共同的培养目标、内容和评价标准之中."三个代表"是当代高素质领导干部培养、监督的根本目标、核心内容、主要评价标准.  相似文献   
108.
Efforts to install crime cameras in public are sometimes met with resistance from segments of the community who raise concerns over personal privacy. Drawing on an example from Las Vegas, NV, this paper explores community acceptance of CCTV cameras placed in a high-crime public location. In doing so, the paper applies a theoretical model that describes the mechanism by which private citizens accept interventions developed by police or other security officials. The paper analyzes specific privacy concerns raised by camera opponents and classifies the methods that police used to address those concerns and gain community support.  相似文献   
109.
文章分析了社会治安视频监控真实直观性、覆盖系统性、应用便捷性、警示震慑性和广泛的参与性等特点,并由此阐述了社会治安视频监控为侦查工作提供了有力的要件支撑,使打击犯罪更加精准快捷,提高了办案效率,减少了办案成本,并在一定程度上起到了将犯罪行为扼制在萌芽阶段的作用。  相似文献   
110.
In this article, we will compare ethical issues raised by first and second generation biometrics. First generation biometrics use characteristics readily visible to the naked eye to ensure that the person identified is the person he claims to be, whereas second generation biometrics focus on behavioral patterns with the aim of predicting suspicious behavior or hostile intentions. While the collection of biometric features for identification is visible to the person involved, capturing biometric features from a distance may go unnoticed. Our study of a range of U.S. and European projects of second generation biometrics, particularly of Future Attribute Screening Technology and Automatic Detection of Abnormal Behaviour and Threats in crowded Spaces, shows that if data subjects are not aware of the processing of their data, and if behavioral patterns are interpreted without any knowledge of the subject's will and motives, there are risks of discrimination and stigmatization. Thus, second generation biometrics raise some new ethical concerns besides issues of integrity, privacy, and data protection and further underscore the importance of the principle of informed consent in order to maintain public trust.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号