首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9篇
  免费   0篇
工人农民   1篇
外交国际关系   1篇
法律   6篇
政治理论   1篇
  2017年   1篇
  2015年   1篇
  2014年   1篇
  2013年   1篇
  2010年   1篇
  2009年   2篇
  2007年   1篇
  1992年   1篇
排序方式: 共有9条查询结果,搜索用时 15 毫秒
1
1.
After the Cold War ended,former traditional security threats withered while non-traditional ones sprouted.More recently as both traditional and non-traditional security threats bloom,concern spreads over whether international security governance can be effective.Worse still,major Western countries' zeal for global governance has cooled,while they turn from being advocates of global governance to obstacles,making the future dimmer.  相似文献   
2.
The study used Taiwanese National Health Insurance Research Database to investigate the types of injuries suffered by those patients hospitalized for intimate partner violence and the types of hospital care provided to victims 18 years of age or older from 1997 to 2009. In total, there were 836 cases and 3.57 times more female than male, the average hospital stay length was 9.37 days, and the average hospital costs totaled approximately NT$ 47,563.53. On average, there were approximately 2.86 injuries per abuse victim, and intracranial injuries were the most common injury (28.83 %). Many of the abused patients went to regional hospitals (44.14 %), and the largest percentage of hospitalized patients (50.24 %) was among 25–44-year-olds. In the study period, the hospitalization rate for females was significantly higher than for males; moreover, the overall rate of hospitalization for intimate partner violence increased significantly.  相似文献   
3.
The present study was designed to investigate the current status of mandated treatment in prison for sexual offenders in Taiwan. The information-gathering methods were composed of two parts: questionnaires and interviews. The results showed the difficulties of mandated treatment in prison, including poor client adherence, the lack of consistent disciplines for the therapists, a standardized algorithm, and explicit laws and rules, the safety concerns of the therapists, and a shortage of staff. The development of mandated treatment in prison of sexual offenders in Taiwan is still in its early stage, and the treatment models have not yet been integrated. A cooperative and collaborative center for the mandated treatment in prison of sexual offenders and an integrated rule and treatment model should be set up in the future.  相似文献   
4.
5.
The Internet community has been addressing the unethical behavior of juvenile delinquents for years. Nevertheless, the concepts of hacker shame and ethics have received little empirical study from a theoretical perspective in the field of cyber criminology. Braithwaite's re-integrative Shaming Theory posits that it can restrain individuals from committing future offenses, and that those who participate in this shaming process are less likely to consider breaking the law in the first place. Among the abundance of criminological theories, the re-integrative Shaming Theory may be the most suitable theory to restrain hacker activities. This study focuses on the working relationship between nine juvenile delinquents and the shaming mechanism applied to them. However, applying this approach to reduce recidivism among computer hackers requires a great deal of time and effort. It is proposed that the state of shame or remorse is associated with the compounded affective processes of hacker ethics. The proposed solution creates a code of ethics for hackers, distinguishes right from wrong, and ensures a greater success for Braithwaite's re-integrative shaming methods. This paper discusses the problems and solutions related to the Shaming Theory, as well as their usefulness in the context of community-based restorative justice. It is argued that re-integrative shaming, without appropriate consideration for the offender's personal code of ethics, is insufficient when handling hacking offenses committed by juveniles. Our main concern is to find out how to help or encourage the offender's reintegration and re-entering into the community, and how s/he can avoid failure. It is hoped that our proposed strategy can prevent future offending behaviors by these juveniles. Implications drawn from the findings are discussed, and suggestions are offered to ensure the success of this theory when applied to juvenile hackers.  相似文献   
6.
In the Gambia numerous projects have been implemented to boost vegetable production. A survey was conducted in Kanifing Municipality and Western Division of the Gambia to determine the level of technology development and transfer. The result shows that the total membership of the intervention sites is 726 and 1,115 growers in the non-intervention sites respectively. From the survey 92% of farmers considered variety improvement as a priority area for technology development. The result indicated that 45% of the respondents regard that 80% of technologies comes research and farmers and 90% of technology dissemination to farmers is through the public extension system, and 20% of respondents mentioned farmer groups. The aim of this study was therefore to examine acquisition, technology development, and transfer to farmers and to come with appropriate strategies of technology transfer in The Gambia in the areas of production and marketing of vegetables.   相似文献   
7.
Hmong American youth have been in the United States for 40 years, and yet research still suggests a binary portrayal of their experiences—model minorities or struggling delinquents. In this study, we use critical discourse analysis to examine academic literature and the construction of “Hmong American youth.” We examine academic literature discursive practices and power in controlling the discourse on Hmong American youth and shaping practices and policies. Using critical discourse analysis, we call attention to academic literature and its power, and challenge researchers to reconstruct a more complex discourse of Hmong American youth that captures their histories, possibilities, and desires.  相似文献   
8.
A review of 155 cases of electrocution were investigated to determine the role of human factors, such as carelessness and intoxication, as contributions. The cases were retrieved by computer coding from the repository of the Armed Forces Institute of Pathology, covering the period 1955-1988. The cases are predominantly of military origin. Cases were divided into low-voltage electrocution (N = 47), high-voltage electrocution (N = 79), lightning strikes (N = 16), and unclassified (N = 13). For each group, data is presented on the circumstances of the incident and the pathologic findings. Blatant carelessness, misuse or improper maintenance of equipment, and intoxication are analyzed as contributory factors.  相似文献   
9.
Cyber activity has become an essential part of the general public's everyday life. The hacking threats of Cyber-crime are becoming more sophisticated as internet communication services are more popular. To further confirm the final finding of Cyber-crime, this study proposes three analytical tools to clarify the Cyber-crime issues by means of Ideal Log, M-N model and MDFA (Multi-faceted Digital Forensics Analysis) strategy, where Ideal Log is identified as a traceable element of digital evidence including four elements of IP Address, Timestamp, Digital Action, and Response Message. M-N model applies a formal method for collating and analyzing data sets of investigation-relevant logs in view of connected time with ISP logs. MDFA strategy attempts to outline the basic elements of Cyber-crime using new procedural investigative steps, and combining universal types of evidential information in terms of Evidence, Scene, Victim, and Suspect. After researchers figure out what has happened in Cyber-crime events, it will be easier to communicate with offenders, victims or related people. SoTE (Strategy of Triple-E) is discussed to observe Cyber-crime from the viewpoints of Education, Enforcement and Engineering. That approach is further analyzed from the fields of criminology, investigation and forensics. Each field has its different focus in dealing with diverse topics, such as: the policy of 6W1H (What, Which, When, Where, Who, Why, and How) questions, the procedure of MDFA strategy, the process of ideal Logs and M-N model. In addition, the case study and proposed suggestion of this paper are presented to counter Cyber-crime.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号