首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   293篇
  免费   31篇
各国政治   3篇
工人农民   1篇
世界政治   3篇
外交国际关系   7篇
法律   229篇
中国共产党   1篇
中国政治   28篇
政治理论   17篇
综合类   35篇
  2024年   1篇
  2023年   12篇
  2022年   11篇
  2021年   13篇
  2020年   10篇
  2019年   21篇
  2018年   19篇
  2017年   23篇
  2016年   19篇
  2015年   19篇
  2014年   43篇
  2013年   31篇
  2012年   11篇
  2011年   17篇
  2010年   14篇
  2009年   13篇
  2008年   5篇
  2007年   12篇
  2006年   6篇
  2005年   7篇
  2004年   6篇
  2003年   3篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
排序方式: 共有324条查询结果,搜索用时 15 毫秒
111.
112.
《Digital Investigation》2014,11(1):20-29
The release of Internet Explorer 10 marks a significant change in how browsing artifacts are stored in the Windows file system, moving away from well-understood Index.dat files to use a high performance database, the Extensible Storage Engine. Researchers have suggested that despite this change there remain forensic opportunities to recover InPrivate browsing records from the new browser. The prospect of recovering such evidence, together with its potential forensic significance, prompts questions including where and when such evidence can be recovered, and if it is possible to prove that a recovered artefact originated from InPrivate browsing. This paper reports the results of experiments which answer these questions, and also provides some explanation of the increasingly complex data structures used to record Internet activity from both the desktop and Windows 8 Applications. We conclude that there is a time window between the private browsing session and the next use of the browser in which browsing records may be carved from database log files, after which it is necessary to carve from other areas of disk. It proved possible to recover a substantial record of a user's InPrivate browsing, and to reliably associate such records with InPrivate browsing.  相似文献   
113.
《Digital Investigation》2014,11(3):154-159
Since mid-2012, France and Germany have had to deal with a new form of payment card skimming. This fraud consists of adding a wireless embedded system into a point-of-sale payment terminal with the fraudulent goal of collecting payment card data and personal identification numbers (PIN).This case study details the strategy adopted to conduct the digital forensic examination of these skimmers. Advanced technologies and analyses were necessary to reveal the skimmed data and provide useful information to investigators for their cross-case analysis.To go further than a typical digital forensic examination, developments based on embedded systems were made to help investigators find compromised payment terminals and identify criminals.Finally, this case study provides possible reactive and proactive new roles for forensic experts in combating payment card fraud.  相似文献   
114.
With professional and home Internet users becoming increasingly concerned with data protection and privacy, the privacy afforded by popular cloud file synchronisation services, such as Dropbox, OneDrive and Google Drive, is coming under scrutiny in the press. A number of these services have recently been reported as sharing information with governmental security agencies without warrants. BitTorrent Sync is seen as an alternative by many and has gathered over two million users by December 2013 (doubling since the previous month). The service is completely decentralised, offers much of the same synchronisation functionality of cloud powered services and utilises encryption for data transmission (and optionally for remote storage). The importance of understanding BitTorrent Sync and its resulting digital investigative implications for law enforcement and forensic investigators will be paramount to future investigations. This paper outlines the client application, its detected network traffic and identifies artefacts that may be of value as evidence for future digital investigations.  相似文献   
115.
In this article, the role of consent is discussed in the framework of fundamental rights and in the context of mobile health technologies (mHealth), such as smart phones, mobile phones or tablet/palm-held computing devices to provide healthcare. The authors surmise how, in practice, although there will be more emphasis on informed consent formally, there will be less space for genuine individual consent. This betrays a focus more on the letter of consent rules in data protection than their spirit. This risks reducing consent to a tick box operation in a manner analogous to consumer transactions, something manifestly unsuitable for consent, even if only in informational terms, during medical procedures.  相似文献   
116.
The anthropocentric nature of forensic sciences has been changing continuously over the years and this process is continuing today. Due to its universality and multilateral implementation, and the fragmented nature of forensic epistemology, the information provided by forensic genetics can play a pivotal role in forensic science. At the same time, the link between forensic genetics and non-human forensic biological evidence has become unquestionable. It may highlight the modern requirements of forensic science, and this connection is also able to provide useful and sufficient examples for developmental processes in wildlife forensics. Obviously, the local formations, organizations, and operations of wildlife forensics can be different worldwide, but the detection and punishment of wildlife-related criminal behavior, as well as the prevention of further crimes, play a relevant role in these processes everywhere.  相似文献   
117.
随着汽车相关案件频发和媒体的高度关注,汽车电子数据鉴定逐渐成为电子数据鉴定的热点方向.通过分析汽车电子数据鉴定的典型需求,将其分为事故调查、痕迹溯源和功能鉴定三类.结合汽车电子数据鉴定的技术标准和鉴定工具,系统性地介绍了汽车中具有证据价值的电子控制单元、事件数据记录系统、车载信息娱乐系统、汽车行驶记录仪、汽车行车记录仪...  相似文献   
118.
Ontologies are widely used in different disciplines as a technique for representing and reasoning about domain knowledge. However, despite the widespread ontology‐related research activities and applications in different disciplines, the development of ontologies and ontology research activities is still wanting in digital forensics. This paper therefore presents the case for establishing an ontology for digital forensic disciplines. Such an ontology would enable better categorization of the digital forensic disciplines, as well as assist in the development of methodologies and specifications that can offer direction in different areas of digital forensics. This includes such areas as professional specialization, certifications, development of digital forensic tools, curricula, and educational materials. In addition, the ontology presented in this paper can be used, for example, to better organize the digital forensic domain knowledge and explicitly describe the discipline's semantics in a common way. Finally, this paper is meant to spark discussions and further research on an internationally agreed ontological distinction of the digital forensic disciplines. Digital forensic disciplines ontology is a novel approach toward organizing the digital forensic domain knowledge and constitutes the main contribution of this paper.  相似文献   
119.
ABSTRACT

It is the contention of this article that South African companies should use a cause-related marketing (CRM) strategy to advance their business objectives, at the same time communicate their involvement in uplifting and investing in society. Communicating corporate socially responsible activities is important for a number of reasons. It is necessary to create awareness and an understanding of current corporate social responsibility (CSR) policies, strategies and attitudes, to define an integrated strategy for the future. These policies and activities must be communicated internally and externally in order to enhance an organisation's reputation, loyalty and relationship among all stakeholders. This could ultimately lead to potential increases in customer traffic and sales that will positively affect the bottom line and lead to bigger corporate social investments by a company. Besides these advantages, effective cause-related marketing strategies could also secure preferential treatment of investors within a highly competitive business environment.  相似文献   
120.
Abstract

Mobile phone text messaging often is more affordable than voice messaging in the developing world. Its similarity to instant messaging and other Internet synchronous communication technologies suggests that overuse and addiction-like tendencies might be found among users, as has been identified with similar technology applications. Symptoms related to components of addiction diagnoses were found to be prevalent among 21respondents to a survey, all of whom completed questionnaires at the University of Mauritius. Between 6% and 11% of respondents showed symptoms of addiction related to tolerance, withdrawal, displacement of attention to school or work, and the inability to diminish use. Displacement of people was common among a higher percentage of respondents. The number of messages sent, and the perceived skill at using SMS technology were significant predictors of the number of addiction criteria exhibited by respondents. Among the small percentage who revealed symptoms of addiction, usage of text messaging was double to triple that found in most of the rest of the population sample studied. While gender had been shown to be a predictor of overuse tendencies in past studies, no gender differences were found for addiction measures, but males were heavier users of text messaging than females.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号