首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   96篇
  免费   17篇
世界政治   1篇
外交国际关系   4篇
法律   100篇
中国政治   5篇
政治理论   2篇
综合类   1篇
  2023年   1篇
  2020年   5篇
  2019年   5篇
  2018年   12篇
  2017年   8篇
  2016年   9篇
  2015年   1篇
  2014年   2篇
  2013年   39篇
  2012年   2篇
  2011年   2篇
  2010年   2篇
  2009年   3篇
  2008年   4篇
  2007年   3篇
  2006年   2篇
  2005年   4篇
  2004年   3篇
  2002年   5篇
  1989年   1篇
排序方式: 共有113条查询结果,搜索用时 15 毫秒
101.
When planning large-scale incidents or bombing campaigns, terrorists often conduct reconnaissance research to identify key targets. This may include taking photographs of potential target locations. Identifying an effective real-time method to distinguish between genuine photographers and those with more sinister intent may be beneficial for law enforcement and security agencies. Participants took photographs in a public place with a genuine intent (truth tellers) or sinister intent (liars). After taking these photographs, the participants were approached by an undercover interviewer (a mime artist) who asked them whether he could see the photographs. Later, the participants discussed their photographs in a formal interview. First, liars were less cooperative in their interaction with the undercover interviewer than truth tellers. Second, in the formal interview, liars mentioned some security features that appeared in the photographs more than truth tellers. The findings suggest that ‘using photographs to detect deception’ is a subject that could prove important to explore to benefit forensic and counter-terrorist practice.  相似文献   
102.
Our research suggests that a true norm of ethical negotiation behavior exists within the legal profession. This conclusion is tempered, however, with the knowledge that a large minority of our research respondents — at times approaching one‐third of them — engaged in unethical and even fraudulent behavior. Additionally, the survey respondents were not saddled with the pressures that practicing attorneys typically confront (pressures likely to make people behave less, rather than more, ethically). In an attempt to understand the reasons for such a high frequency of unethical negotiation, we have identified three major contributing factors: too many lawyers have only a superficial understanding of rules that are more complicated than they appear; lawyers frequently take their “zealous advocate” role too far, thereby placing client loyalty above other important values such as respect for truth and justice; and the practice of law and the people who are drawn to it are highly competitive. To address these factors, we suggest approaching the problem from several different angles. In the classroom, we suggest a focus on the relevant legal standards, including a focus on the often misunderstood law of fraudulent misrepresentations. Because many students fail to appreciate the differences between “ethical” behavior, the floor of socially acceptable conduct, and the expectations that others have for how they will be treated, we also suggest that lawyer training programs focus on the important role that personal relationships and one's reputation play in the legal profession, and how falling short in these areas can decrease one's negotiation effectiveness. For the profession itself, we also suggest clarifying the attorney rules of conduct and provide a number of tactics and strategies to defend against lying and deception during negotiation. Finally, we recognize there are certain psychological factors at play that can cause people to engage in behavior inconsistent with their personal sense of ethics. We believe the only way to avoid these lapses is to integrate conscious and reflective practices that can bring ethical concerns to the forefront of lawyers' decision‐making and thought processes.  相似文献   
103.
104.
Written by an academic and former undercover police officer, this article consists of an initial response to Basia Spalek and Mary O’Rawe’s article “Researching Counter-terrorism: A Critical Perspective from the Field in Light of Allegations and Findings of Covert Activities by Undercover Police Officers”. It acknowledges the importance of concerns raised by Spalek and O’Rawe in regard to undercover policing and seeks to identify areas for constructive debate both in the immediate future and in the long term. Mike German’s book Thinking Like a Terrorist is referenced to illustrate a potential model of best practice when police officers are tasked to infiltrate groups or cells carrying out acts of terrorism and political violence. Likewise, Rachel Monaghan’s article “Terrorism in the Name of Animal Rights” is referenced to suggest that German’s model might apply in respect of acts of terrorism and political violence committed in support of animal rights no less than when committed in support of far right politics. German’s book also serves to illustrate an argument that prior employment as an undercover police officer might not necessarily undermine trust in that officer's subsequent work of a different nature. Crucial here, is the author’s claim that his subsequent police partnership work with Muslim groups in London was based on reciprocal trust and did not employ deception, axiomatic to undercover policing, in any respect. Although the author is presently restricted by ongoing investigations and legal proceedings, the article outlines a basis on which he might contribute his experience of undercover policing to future discussions.  相似文献   
105.
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.  相似文献   
106.
Abstract: Using Blood Oxygen Level Dependent (BOLD) functional MRI (fMRI) to detect deception is feasible in simple laboratory paradigms. A mock sabotage scenario was used to test whether this technology would also be effective in a scenario closer to a real‐world situation. Healthy, nonmedicated adults were recruited from the community, screened, and randomized to either a Mock‐crime group or a No‐crime group. The Mock‐crime group damaged and stole compact discs (CDs), which contained incriminating video footage, while the No‐crime group did not perform a task. The Mock‐crime group also picked up an envelope from a researcher, while the No‐crime group did not perform this task. Both groups were instructed to report that they picked up an envelope, but did not sabotage any video evidence. Participants later went to the imaging center and were scanned while being asked questions regarding the mock crime. Participants also performed a simple laboratory based fMRI deception testing (Ring‐Watch testing). The Ring‐Watch testing consisted of “stealing” either a watch or a ring. The participants were instructed to report that they stole neither object. We correctly identified deception during the Ring‐Watch testing in 25 of 36 participants (Validated Group). In this Validated Group for whom a determination was made, computer‐based scoring correctly identified nine of nine Mock‐crime participants (100% sensitivity) and five of 15 No‐crime participants (33% specificity). BOLD fMRI presently can be used to detect deception concerning past events with high sensitivity, but low specificity.  相似文献   
107.
Children's lie-telling behavior to conceal the transgression of a parent was examined in 2 experiments. In Experiment 1 (N = 137), parents broke a puppet and told their children (3-11-year-olds) not to tell anyone. Children answered questions about the event. Children's moral understanding of truth- and lie-telling was assessed by a second interviewer and the children then promised to tell the truth (simulating court competence examination procedures). Children were again questioned about what happened to the puppet. Regardless of whether the interview was conducted with their parent absent or present, most children told the truth about their parents' transgression. When the likelihood of the child being blamed for the transgression was reduced, significantly more children lied. There was a significant, yet limited, relation between children's lie-telling behavior and their moral understanding of lie- or truth-telling. Further, after children were questioned about issues concerning truth- and lie-telling and asked to promise to tell the truth, significantly more children told the truth about their parents' transgression. Experiment 2 (N = 64) replicated these findings, with children who were questioned about lies and who then promised to tell the 'truth more likely to tell the truth in a second interview than children who did not participate in this procedure before questioning. Implications for the justice system are discussed.  相似文献   
108.
Child witnesses must undergo a competence examination in which they must show appropriate conceptual understanding of lying and truth-telling, and promise to tell the truth. Three experiments (Ns = 123, 103, 177) were conducted to address the assumptions underlying the court competence examination that (1) children who understand lying and its moral implications are less likely to lie and (2) discussing the conceptual issues concerning lying and having children promising to tell the truth promotes truth-telling. Both measures of lying and understanding of truth- and lie-telling were obtained from children between 3 and 7 years of age. Most children demonstrated appropriate conceptual knowledge of lying and truth-telling and the obligation to tell the truth, but many of the same children lied to conceal their own transgression. Promising to tell the truth significantly reduced lying. Implications for legal systems are discussed.  相似文献   
109.
Scientific content analysis (SCAN) is a technique that claims to enable the detection of deception in written statements. The underlying assumption is that statements of self-experienced events differ in several ways – such as liveliness and concreteness – from imaginary statements. It is used in many countries as an investigative tool. Nevertheless, little research on the reliability and validity of the SCAN technique is available. In this paper, two studies are presented. The first study focuses on the accuracy of SCAN to detect deception by three groups of raters with a different level of experience. This study shows a lack of validity of SCAN. Study 2 investigated the inter-rater reliability as a possible explanation for the poor validity results, and found little agreement between raters in identifying SCAN criteria. Overall, results indicate that the psychometric qualities of SCAN as an investigative tool is insufficient for use in police practice.  相似文献   
110.
The present study validates a novel version of the Reaction time-based Concealed Information Test (RT-CIT) adapted for young children (7–10 years). Their ability to deny the possession of relevant information was related to individual differences in intelligence, processing speed, executive functioning and affective problems. The comparison between the knowledgeable group of children (N = 84) who took part in a mock surprise scenario and the unknowledgeable group (N = 78) indicated that by early school-age the RT-CIT can be considered a relatively reliable diagnostic tool for detecting concealed information. We found evidence indicating that executive functions are predictors of children's proficiency in concealing information; however, the specific interrelations were complex (children with lower inhibition and spatial working memory, but with better shifting performance were easier to detect as possessing concealed information). Finally, we found limited evidence for a substantial association between parent-reported emotional problems and children's proficiency in concealing information. This investigation has practical implications for the development of rigorous protocols to detect children's concealed knowledge within legal environments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号