首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42篇
  免费   0篇
外交国际关系   3篇
法律   27篇
中国共产党   1篇
中国政治   2篇
政治理论   1篇
综合类   8篇
  2022年   3篇
  2021年   2篇
  2019年   2篇
  2018年   1篇
  2017年   4篇
  2016年   1篇
  2015年   1篇
  2014年   1篇
  2013年   4篇
  2012年   2篇
  2011年   5篇
  2010年   2篇
  2009年   3篇
  2008年   4篇
  2007年   1篇
  2006年   1篇
  2005年   2篇
  2004年   1篇
  2002年   2篇
排序方式: 共有42条查询结果,搜索用时 15 毫秒
21.
充分发挥天津市哲学社会科学高级人才库管理系统的作用,为天津人力资源的有序利用和开发奠定良好的基础。  相似文献   
22.
Existing studies on legislative malapportionment often conceptualize and measure this phenomenon with little regard to intertemporal variations and the malapportionment-generating process (MGP). Our conceptualization leads us to introduce a measure called α-divergence that can identify the vote inequality derived from various stages of MGP. Using an originally created database that covers 440 elections in 112 countries, we decompose the overall degree of malapportionment into three stages: malapportionment that arises at the stages of interstate apportionment, intrastate districting, and allotment of seats to special districts. We also provide analyses that can decompose the demographic and political factors contributing to the trends of the overall degree of malapportionment for selected countries.  相似文献   
23.
South Africa has recently been at the epicentre of a spate of horrific violence, with reports of rape and murder making headlines almost daily. Disturbingly regarded as the ‘rape capital of the world’, South Africa has never before required a more urgent need for the effective use of DNA profiling in aiding investigations as now. Although South Africa has conducted DNA profiling since 1998, there has been no supporting legislative framework for its use thus far. The ‘DNA Bill’ has recently been passed by Parliament and we reflect on the key events that have brought us to this milestone.The DNA Project, a non-profit organisation, has long been lobbying to pass such legislation, as well as providing free DNA awareness workshops to a variety of first-on-the-crime-scene personnel. As with all new DNA legislation, there arises an essential need to intensify training and awareness around the DNA process, from the crime scene to the court room, in order for the value of DNA evidence be realised. Enacting legislation is only a step on a journey to effectively utilise DNA profiling resources in a more intelligent manner and it is necessary that significant investment be continually made towards the improvement and advancement of this exceptional technology and tool.  相似文献   
24.
The realm of the ocean is scarcely studied by criminologist despite it being a component of the space of society. With the growth of maritime piracy in the past decade, this void has become increasingly palpable. The aim of this article is to catalyze more research in the field by providing an introduction and overview of the topic. The article starts by clarifying what piracy is, reviewing and evaluating some of its definitions and typologies. Furthermore, using the new Contemporary Maritime Piracy Database, the article charts the location of contemporary piracy. The article outlines factors that have been suggested as precursors of piracy before suggesting some key areas for future research.  相似文献   
25.
It is now apposite to speak of the ‘data centric world’. Businesses are paying ever more attention to their own, and others’ data, as a way of adding value to the organisation and conferring competitive advantage. This in turn is focusing attention on legal rights in data across many business sectors, where we’re starting to see more disputes. Data is funny stuff in and of itself - effectively inert in legal terms. It is more precise to speak of ‘legal rights in relation to data’. Those rights are IP rights - copyright, database right, confidentiality, patents and trade marks - and contract rights. Each IP right has its own rules, and applying those rules to data leads to a complex, multi-layered analysis where the law is unsettled and uncertain. This means that data is an area where contract is very often king, so most businesses regulate access to data by means of a series of agreements. The most commonly contested points in negotiations are around licence scope, derived data, commingled data and post term use.  相似文献   
26.
Web数据库安全应用策略   总被引:1,自引:0,他引:1  
Web数据库的安全是一个系统性、综合性的课题。想要建立完美的安全体系是困难的,实际中的Web数据库系统会采取多种技术来构建安全体系。只有通过不断地改进和完善安全手段,才能提高系统的可靠性。  相似文献   
27.
《Science & justice》2021,61(4):410-418
A data structure is proposed that can store forensic data obtained by experts from different disciplines and acquired using different instruments. This data structure, called TraceBase, is congruent with the forensic examination in the laboratory. We describe the design as well as its planned introduction in casework.The back-end of TraceBase is based on PostgreSQL and can be accessed by front-end applications such as the open-source LibreOffice office suite. The back-end regulates the flexible and robust storage of data, as well as the relation between items, samples, and analyses. The front-end applications allow the user to enter or retrieve data in an easy fashion, while the modular structure ensures that different aspects, such as the data entry, the processing and reporting of entered data, can be optimised individually. Additional analyses can be introduced and linked to items or samples already present.The database is designed such that data from several sources, different forensic disciplines and data acquired by different analytical techniques can be entered. When data needs to be retrieved for further analysis, a subcollection can be filtered for use in a specific situation.  相似文献   
28.
The NoSQL DBMS provides an efficient means of storing and accessing big data because its servers are more easily horizontally scalable and replicable than relational DBMSs. Its data model lacks a fixed schema, so that users can easily dynamically change the data model of applications. These characteristics of the NoSQL DBMS mean that it is increasingly used in real-time analysis, web services such as SNS, mobile apps and the storage of machine generated data such as logs and IoT (Internet of Things) data. Although the increased usage of the NoSQL DBMS increases the possibility of it becoming a target of crime, there are few papers about forensic investigation of NoSQL DBMS.In this paper, we propose a forensic investigation framework for the document store NoSQL DBMS. It is difficult to cover all of the NoSQL DBMS, as 'NoSQL' includes several distinct architectures; our forensic investigation framework, however, is focused on the document store NoSQL DBMS. In order to conduct an evaluative case study, we need to apply it to MongoDB, which is, a widely used document store NoSQL DBMS. For this case study, a crime scenario is created in an experimental environment, and then we propose in detail a forensic procedure and technical methods for MongoDB. We suggested many substantial technical investigation methods for MongoDB, including identifying real servers storing evidences in a distributed environment and transaction reconstruction method, using log analysis and recovering deleted data from the MongoDB data file structure.  相似文献   
29.
This article focuses on the so-called “brutalization” of terrorism. The brutalization thesis as part of the larger theoretical concept of “new terrorism” argues that “new terrorism” is more brutal than “old terrorism.” Many scholars claim that the 9/11 attacks mark the beginning of a new era of terrorism that has lifted international as well as domestic terrorism to a new level of violent brutality. Others argue that this process had already started in the early 1990s. After discussing possible ways to operationalize a brutalization of terrorism, for example focusing on suicide bombings or terrorist attacks against soft targets, this article tests the empirical credibility of the brutalization thesis regarding both potential starting points. Data from the Global Terrorism Database (GTD) shows that only three out of nine indicators increased significantly during the 1990s, partially backing the idea of a general brutalization, whereas increasing numbers of suicide attacks and beheadings after 9/11 support the notion of a qualitative change in terrorism and its brutality connected with the idea of maximizing media and public attention. Yet, these developments are regionally limited and the brutality of this “new terrorism” exceeds the levels known from the zenith of “old terrorism” in the 1970s and 1980s in only a few cases.  相似文献   
30.
Data from 117 countries over the period 2006 to 2011 are used to estimate a macroeconomic cross-country system of equations that examines the association between terrorism, self-reported life satisfaction, and national income. Results indicate that terrorism is negatively associated with life satisfaction, whereas no such association is found between terrorism and real GDP per worker. Stark contrasts are found, however, between OECD and non-OECD members. In all, our results suggest that the social costs of terrorism are potentially much higher than the economic costs, and measuring only the conventional economic costs of terrorism significantly underestimates the true costs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号