全文获取类型
收费全文 | 489篇 |
免费 | 9篇 |
专业分类
各国政治 | 7篇 |
工人农民 | 39篇 |
世界政治 | 13篇 |
外交国际关系 | 34篇 |
法律 | 195篇 |
中国共产党 | 15篇 |
中国政治 | 54篇 |
政治理论 | 48篇 |
综合类 | 93篇 |
出版年
2025年 | 10篇 |
2024年 | 27篇 |
2023年 | 19篇 |
2022年 | 34篇 |
2021年 | 20篇 |
2020年 | 30篇 |
2019年 | 21篇 |
2018年 | 19篇 |
2017年 | 16篇 |
2016年 | 12篇 |
2015年 | 15篇 |
2014年 | 22篇 |
2013年 | 36篇 |
2012年 | 24篇 |
2011年 | 15篇 |
2010年 | 26篇 |
2009年 | 17篇 |
2008年 | 16篇 |
2007年 | 24篇 |
2006年 | 20篇 |
2005年 | 19篇 |
2004年 | 18篇 |
2003年 | 11篇 |
2002年 | 18篇 |
2001年 | 6篇 |
2000年 | 3篇 |
排序方式: 共有498条查询结果,搜索用时 0 毫秒
161.
论数字化学习能力和综合信息素养 总被引:1,自引:0,他引:1
李雨 《辽宁公安司法管理干部学院学报》2013,(4):132-133
信息时代全球化的背景下,知识信息化的发展速度前所未有.学习方法、学习资源、学习环境数字化从一种趋势将发展成一种必然.然而数字化的学习离不开信息环境,个人的信息素养是数字化学习的支撑.信息技术可以帮助我们如何发现信息,如何利用信息和如何分析信息等等.数字化的学习能力和综合信息素养的完美结合,才是学习知识、传播知识、应用知识、共享知识的最有效的途径. 相似文献
162.
《人权》2024,23(1):143-172
The advent of the big data era has presented unprece-dented challenges to remedies for personal information infringement in areas such as damage assessment,proof of causation,determination of illegality,fault assessment,and liability.Traditional tort law is un-able to provide a robust response for these challenges,which severely hinders human rights protection in the digital society.The dynamic system theory represents a third path between fixed constitutive ele-ments and general clauses.It both overcomes the rigidity of the\"all-or-nothing\"legal effect evaluation mechanism of the\"element-effect\"model and avoids the uncertainty of the general clause model.It can effectively enhance the flexibility of the legal system in responding to social changes.In light of this,it is necessary to construct a dynamic foundational evaluation framework for personal information infringe-ment under the guidance of the dynamic system theory.By relying on the dynamic interplay effect of various foundational evaluation ele-ments,this framework can achieve a flexible evaluation of the consti-tutive elements of liability and the legal effects of liability for personal information infringement.Through this approach,the crisis of person-al information infringement in the era of big data can be mitigated,and the realization of personal information rights as digital human rights can be promoted. 相似文献
163.
As the closed-circuit television (CCTV) security industry transitioned from analog media to digital video recorders (DVRs) with digital storage, the law enforcement community struggled with the means with which to collect the recordings. New guidelines needed to be established to determine the collection method which would be efficient as well as provide the best quality evidence from live DVRs. A test design was developed to measure, quantify, and rank the quality of acquisition methods used on live systems from DVRs typically used in digital CCTV systems. The purpose was to determine guidelines for acquiring the best quality video for investigative purposes. A test pattern which provided multiple quantifiable metrics for comparison between the methods of acquisition was used. The methods of acquisition included direct data download of the proprietary file and open file format as well as recording the video playback from the DVR via the available display monitor connections including the composite video, Video Graphics Array (VGA), and high-definition multimedia interface (HDMI). While some acquisition methods may provide the best quality evidence, other methods of acquisition are not to be discounted depending on the situation and need for efficiency. As an investigator that needs to retrieve video evidence from live digital CCTV systems, the proprietary file format, overall, provides the best quality evidence. However, depending on the circumstance and as recording technology continues to evolve, options other than the proprietary file format may provide quality that is equal to or greater than the proprietary file format. 相似文献
164.
This study compares the media discourses on euroscepticism in 2014 in six countries (the UK, Ireland, France, Spain, Sweden and Denmark). We assessed the extent to which the mass media's reporting of euroscepticism indicates the Europeanization of public spheres. Using a mixed‐methods approach combining latent Dirichlet allocation (LDA) topic modelling and qualitative coding, we find that approximately 70 per cent of print articles mentioning ‘euroscepticism’ or ‘eurosceptic’ are framed in a non‐domestic (i.e., European) context. In five of the six cases studied, articles exhibiting a European context are strikingly similar in content, with the British case as the exception. However, coverage of British euroscepticism drives Europeanization in other member states. Bivariate logistic regressions further reveal three macro‐level structural variables that significantly correlate with a Europeanized media discourse: the newspaper type (tabloid or broadsheet), the presence of a strong domestic eurosceptical party and relationship to the EU budget (net contributor or receiver of EU funds). 相似文献
165.
Yee‐Yang Teing B.Sc. Ali Dehghantanha Ph.D. Kim‐Kwang Raymond Choo Ph.D. Tooska Dargahi Ph.D. Mauro Conti Ph.D. 《Journal of forensic sciences》2017,62(3):641-654
Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under‐explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log‐in to and log‐out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in‐depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices. 相似文献
166.
Abdullah Azfar M.Sc. Kim‐Kwang Raymond Choo Ph.D. Lin Liu Ph.D. 《Journal of forensic sciences》2017,62(2):435-456
An Android social app taxonomy incorporating artifacts that are of forensic interest will enable users and forensic investigators to identify the personally identifiable information (PII) stored by the apps. In this study, 30 popular Android social apps were examined. Artifacts of forensic interest (e.g., contacts lists, chronology of messages, and timestamp of an added contact) were recovered. In addition, images were located, and Facebook token strings used to tie account identities and gain access to information entered into Facebook by a user were identified. Based on the findings, a two‐dimensional taxonomy of the forensic artifacts of the social apps is proposed. A comparative summary of existing forensic taxonomies of different categories of Android apps, designed to facilitate timely collection and analysis of evidentiary materials from Android devices, is presented. 相似文献
167.
Christopher F.R. Tassone B.Sc. Ben Martini Ph.D. Kim‐Kwang Raymond Choo Ph.D. 《Journal of forensic sciences》2017,62(5):1197-1204
Digital forensic visualization is an understudied area despite its potential to achieve significant improvements in the efficiency of an investigation, criminal or civil. In this study, a three‐stage forensic data storage and visualization life cycle is presented. The first stage is the decoding of data, which involves preparing both structured and unstructured data for storage. In the storage stage, data are stored within our proposed database schema designed for ensuring data integrity and speed of storage and retrieval. The final stage is the visualization of stored data in a manner that facilitates user interaction. These functionalities are implemented in a proof of concept to demonstrate the utility of the proposed life cycle. The proof of concept demonstrates the utility of the proposed approach for the storage and visualization of digital forensic data. 相似文献
168.
ABSTRACTIn response to the upsurge in acts of sexual violence against women in India, Parliament passed the Criminal Law (Amendment) Act of 2013, amending existing statutes and rules of evidence relating to crimes of sexual violence and the practices of forensic professionals in the country. While a step in the right direction, this law paid little attention to forensic evidence in sexual violence cases, which can provide a more objective, scientific account of events, aid in the reconstruction of crimes, and help strengthen cases against perpetrators. The objectives of this article are twofold: to raise awareness for the need for a more prominent role of forensic evidence in sexual violence cases and to recommend ways to establish uniform and comprehensive policies and procedures on the collection and preservation of forensic evidence in order to ensure that cases of sexual violence against women are heard in Indian courts. 相似文献
169.
ABSTRACT It is the contention of this article that South African companies should use a cause-related marketing (CRM) strategy to advance their business objectives, at the same time communicate their involvement in uplifting and investing in society. Communicating corporate socially responsible activities is important for a number of reasons. It is necessary to create awareness and an understanding of current corporate social responsibility (CSR) policies, strategies and attitudes, to define an integrated strategy for the future. These policies and activities must be communicated internally and externally in order to enhance an organisation's reputation, loyalty and relationship among all stakeholders. This could ultimately lead to potential increases in customer traffic and sales that will positively affect the bottom line and lead to bigger corporate social investments by a company. Besides these advantages, effective cause-related marketing strategies could also secure preferential treatment of investors within a highly competitive business environment. 相似文献
170.
Raymond J. Johansen D.M.D. C. Michael Bowers D.D.S. J.D. 《Journal of forensic sciences》2013,58(2):534-536
Dental identification of unknown human remains continues to be a relevant and reliable adjunct to forensic investigations. The advent of genomic and mitochondrial DNA procedures has not displaced the practical use of dental and related osseous structures remaining after destructive incidents that can render human remains unrecognizable, severely burned, and fragmented. The ability to conclusively identify victims of accident and homicide is based on the availability of antemortem records containing substantial and unambiguous proof of dental and related osseous characteristics. This case report documents the use of digital comparative analysis of antemortem dental models and postmortem dentition, to determine a dental identification. Images of dental models were digitally analyzed using Adobe PhotoshopTM software. Individual tooth anatomy was compared between the antemortem and postmortem images. Digital superimposition techniques were also used for the comparison. With the absence of antemortem radiographs, this method proved useful to reach a positive identification in this case. 相似文献