首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9篇
  免费   0篇
法律   6篇
中国政治   1篇
政治理论   1篇
综合类   1篇
  2019年   2篇
  2013年   1篇
  2012年   3篇
  2006年   1篇
  2004年   2篇
排序方式: 共有9条查询结果,搜索用时 15 毫秒
1
1.
Spamming is a major threat to the formation of public trust in the Internet and discourages broader civil participation in the emerging information society. To the individual, spams are usually little more than a nuisance, but collectively they expose Internet users to a panoply of new risks while threatening the communications and commercial infrastructure. Spamming also raises important questions of criminological interest. On the one hand it is an example of a pure cybercrime – a harmful behaviour mediated by the Internet that is the subject of criminal law, while on the other hand, it is a behaviour that has in practice been most effectively contained technologically by the manipulation of ‘code’ – but at what cost? Because there is not an agreed meaning as to what constitutes ‘online order’ that renders it simply and uncritically reducible to a set of formulae and algorithms that can be subsequently imposed (surreptitiously) by technological processes. The imposition of order online, as it is offline, needs to be subject to critical discussion and also checks and balances that have their origins in the authority of law. This article deconstructs and analyses spamming behaviour, before exploring the boundaries between law and code (technology) as governance in order to inform and stimulate the debate over the embedding of cybercrime prevention policy within the code itself.  相似文献   
2.
庄乾龙 《时代法学》2012,10(2):37-43
司法实践中电子邮件加密方法主要有对称密钥加密与非对称密钥加密两类,结合数字认证、数字签名等辅助加密技术,可以相应提高加密级别,增加电子邮件安全性。一般而言,加密电子邮件可靠性要高于非加密电子邮件,加密电子邮件证据能力受解密程序影响。电子邮件证据证明力受加密方法、行为人对电子邮件控制程度等因素影响。电子邮件证据证明力随加密级别的提高而提高。  相似文献   
3.
Abstract

The U.S. Congress, after a relatively slow start in the 1990s, is now making some progress in meeting the demands of online communications. Fueled by the growing use of e-mail by constituents and the development of online grassroots efforts, Congress has been inundated with e-mail. By using filtering systems, better software and hardware, and, most of all, better management techniques, many offices are now equipped to handle the great increase in electronic mail. While several steps behind the private sector, through fits and starts, Congress is attempting to catch up and meet the rising demand and volume of electronic communication. In some offices, there has been considerable progress in developing effective, interactive Web sites. These exceptional Web sites should serve as models of dynamic online communications, but for most congressional Web sites, there is a long way to go. Much depends on the attitudes and priorities set by lawmakers and their senior Staff.  相似文献   
4.
海上运输散货"合理损耗"短量索赔的抗辩   总被引:1,自引:1,他引:0  
就海上运输散装货物后经常发生的货物短量索赔,从实体法和程序法的角度进行了分析,认为承运人和实际承运人对散货运输中发生的合理损耗范围内的货物短量不负赔偿责任从定性角度应没有异议,而如何证明个案中合理损耗具体数量或范围的定量举证则是能否成功抗辩的关键。  相似文献   
5.
Law enforcement agencies routinely sample for gunshot residue (GSR) by bulk techniques and often submit swabs taken from other surfaces besides the hands of the suspect shooter. This study aims to establish the prevalence of antimony, barium, and lead on normally handled automobile surfaces by graphite furnace atomic absorption analysis. No positives were determined on 50 sampled automobile surfaces above cutoff (positive) from background levels. Transfers of GSR particles from shooter hands to automobile surfaces were found to potentially allow for positive GSR determinations, but such transfers seem to be dependent on the shooting conditions and length of GSR exposure. We determined that our bulk analysis method yields an overall 87.94 ± 5.52% extraction efficiency from cotton swabs, while the LOQ determinations strengthening the fact that bulk analysis methods are valid and valuable tools for GSR investigations.  相似文献   
6.
Throughout the years, DNA barcoding has gained in importance in forensic entomology as it leads to fast and reliable species determination. High‐quality results, however, can only be achieved with a comprehensive DNA barcode reference database at hand. In collaboration with the Bavarian State Criminal Police Office, we have initiated at the Bavarian State Collection of Zoology the establishment of a reference library containing arthropods of potential forensic relevance to be used for DNA barcoding applications. CO1‐5P’ DNA barcode sequences of hundreds of arthropods were obtained via DNA extraction, PCR and Sanger Sequencing, leading to the establishment of a database containing 502 high‐quality sequences which provide coverage for 88 arthropod species. Furthermore, we demonstrate an application example of this library using it as a backbone to a high throughput sequencing analysis of arthropod bulk samples collected from human corpses, which enabled the identification of 31 different arthropod Barcode Index Numbers.  相似文献   
7.
Five marijuana samples were compared using bulk isotope analysis compound-specific isotope ratio analysis of the extracted cannabinoids. Owing to the age of our cannabis samples, four of the five samples were compared using the isotope ratios of cannabinol (CBN), a stable degradation product of Δ(9)-tetrahydrocannabinol (THC). Bulk δ(13)C isotope analysis discriminated between all five samples at the 95% confidence level. Compound-specific δ(13)C isotope analysis could not distinguish between one pair of the five samples at the 95% confidence level. All the measured cannabinoids showed significant depletion in (13)C relative to bulk isotope values; the isotope ratios for THC, CBN, and cannabidiol were on average 1.6‰, 1.7‰, and 2.2‰ more negative than the bulk values, respectively. A more detailed investigation needs to be conducted to assess the degree fractionation between the different cannabinoids, especially after aging.  相似文献   
8.
随着钓鱼网站的活动日渐猖獗,钓鱼网站的数量逐渐激增,严重地影响我国电子商务、网上银行的发展,影响人们对互联网应用的信心,危害广大网络用户利益。钓鱼网站的影响和危害程度已经远远超过木马和病毒,成为我国互联网最大的安全威胁。因此,弄清钓鱼网站本质特征和主要类型、了解钓鱼网站的传播途径和危害方法,掌握钓鱼网站的鉴别方法和防范策略,以及遭遇钓鱼网站后的补救措施,显得非常必要。  相似文献   
9.
电子邮件传输中的安全性问题十分重要,一种在电子邮件终端实现的安全电子邮件系统可充分保障电子邮件传输中的机密性、完整性和可鉴别性。同时,该系统不需要对通用邮件服务器进行改动,因而部署简便、经济,实用性好。  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号