首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
法律   2篇
政治理论   1篇
综合类   1篇
  2015年   1篇
  2014年   1篇
  2011年   1篇
  2003年   1篇
排序方式: 共有4条查询结果,搜索用时 0 毫秒
1
1.
This paper was prepared as the basis for a class discussion rather than to illustrate either effective or ineffective handling of an administrative situation. It may be appropriate for public affairs, business and public policy, and/or crisis management courses at the undergraduate or graduate level. In conjunction with this case, it may be useful to use the framework for crisis management developed by Dr Ian I. Mitroff, the Harold Quinton Distinguished Professor of Business Policy at the Marshall School of Business, University of Southern California. This best practice model is discussed in ‘Managing Crises Before They Happen’, which Mitroff published in 2001 with Gus Anagnos, Vice President of Comprehensive Crisis Management. This case leads the audience through the Ford–Firestone tyre crisis from 1997—when Ford began to learn of a problem with Firestone tyres on its popular Explorer sport‐utility vehicle—up until the summer of 2001, just after Ford recalled 13 million Firestone tyres and the National Highway Transportation and Safety Administration cleared Ford of further investigation into potential defects in the Explorer. The case addresses potential causes of the tyre problem, how Ford handled the crisis from a corporate public affairs perspective and, tangentially, how Firestone handled the issue. Copyright © 2003 Henry Stewart Publications  相似文献   
2.
《Digital Investigation》2014,11(1):20-29
The release of Internet Explorer 10 marks a significant change in how browsing artifacts are stored in the Windows file system, moving away from well-understood Index.dat files to use a high performance database, the Extensible Storage Engine. Researchers have suggested that despite this change there remain forensic opportunities to recover InPrivate browsing records from the new browser. The prospect of recovering such evidence, together with its potential forensic significance, prompts questions including where and when such evidence can be recovered, and if it is possible to prove that a recovered artefact originated from InPrivate browsing. This paper reports the results of experiments which answer these questions, and also provides some explanation of the increasingly complex data structures used to record Internet activity from both the desktop and Windows 8 Applications. We conclude that there is a time window between the private browsing session and the next use of the browser in which browsing records may be carved from database log files, after which it is necessary to carve from other areas of disk. It proved possible to recover a substantial record of a user's InPrivate browsing, and to reliably associate such records with InPrivate browsing.  相似文献   
3.
网络搜索式侦查指的是侦查人员通过网络搜索引擎对相关信息情报进行查找和分析的调查手段,分为专门网络搜索式侦查和一般网络搜索式侦查。网络搜索式侦查的构成要素包括引入网络搜索范围内的各种信息、以数字网络为主体的设备、具有一定的信息情报经验与技能的侦查人员。网络搜索式侦查的运行需要侦查信息的录入与存储、侦查信息的搜索与分析、侦...  相似文献   
4.
伴随着都市化进程的加速,为了满足日益加重的公共建设任务,美国法中的开发者负担制度,作为将公共建设任务转移至私人开发主体的规制政策模式于20世纪中后期在地方各州层面开始大量出现。各州法院针对开发者负担制度形成了三种不同的形式化审查标准,亦即"合理关系"标准、"特定且唯一原因"标准以及"理性关联"标准,这些司法审查标准之间存在显著差异,形成了司法审查的地方主义特色。联邦最高法院提出的"根本关联"与"大致合比例"的司法审查标准,非但没有就此统一地方层面殊异的审查标准,反而使得开发者负担制度的合法性审查更加复杂化。20世纪90年代各州大规模的影响费立法,吸收了各州法院司法审查的特殊标准,体现了司法过程对规制政策的影响;同时,影响费立法中咨询委员会等程序装置,也鲜明反映了现代规制国家的制度特征。  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号