首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   508篇
  免费   5篇
各国政治   9篇
工人农民   3篇
世界政治   6篇
外交国际关系   59篇
法律   262篇
中国共产党   5篇
中国政治   16篇
政治理论   22篇
综合类   131篇
  2023年   7篇
  2022年   19篇
  2021年   24篇
  2020年   18篇
  2019年   15篇
  2018年   34篇
  2017年   12篇
  2016年   12篇
  2015年   17篇
  2014年   43篇
  2013年   39篇
  2012年   19篇
  2011年   32篇
  2010年   16篇
  2009年   47篇
  2008年   39篇
  2007年   35篇
  2006年   26篇
  2005年   11篇
  2004年   15篇
  2003年   11篇
  2002年   6篇
  2001年   10篇
  2000年   2篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有513条查询结果,搜索用时 151 毫秒
1.
Often, criminal acts involving a vehicle are caught on digital video surveillance systems. While potentially useful for an investigation, the recording conditions are typically less than optimal for the extraction of key information for the identification of the perpetrator, such as a license plate. Providing the make, model and year of a questioned vehicle is a common request for examiners, to narrow the field of potential suspect vehicles. This study seeks to compare the performance of a nonpeer-reviewed make, model, and year determination between two separate groups, specifically, trained forensic image examiners and nontrained individuals. Results show that even with varied image capture conditions and quality, the trained forensic image examiners more correctly and completely identified the test group of questioned vehicles make, model, and year.  相似文献   
2.
当代技术实践的文化多样性表明,技术并非是个处于社会文化影响之外的单一封闭过程,而是一个沉浸在社会背景、经济结构、文化习俗以及美学爱好等文化因素中并被社会建构起来的现象。本文从技术发展所植根的文化因素入手,探讨技术文化选择的可能性与现实性,进而分析技术文化选择的动力、价值评价与创新文化生态,最终将技术创新视为一个包含着技术属性、经济属性和社会属性的复杂文化过程,并为创新政策的理论和实践提供新的视野和方法。  相似文献   
3.
省会城市刑事技术工作应作为全国刑事技术体系的独立一层来构建,其内部业务部门的设置应主要以专业特性为依据,现有“法医检验鉴定中心”应改在整个刑事技术工作的统一平台上合理运行。  相似文献   
4.
数字图像处理在刑侦技术工作中的应用是刑事技术领域的一场革命,将计算机数字图像处理技术融入传统的刑侦技术工作中是必然的趋势,它将为现代刑侦工作带来新的发展机遇。文章就数字图像处理技术的概念、主要研究内容、在刑侦技术工作中的优越性及具体应用等作了较为详细的介绍  相似文献   
5.
The big data era has a high impact on forensic data analysis. Work is done in speeding up the processing of large amounts of data and enriching this processing with new techniques. Doing forensics calls for specific design considerations, since the processed data is incredibly sensitive. In this paper we explore the impact of forensic drivers and major design principles like security, privacy and transparency on the design and implementation of a centralized digital forensics service.  相似文献   
6.
Lawful Interception (LI) of data communications is an essential tool for Law Enforcement Agencies (LEA) in order to investigate criminal activities carried out or coordinated by means of Internet. However, the ability to secretly monitor the activities of citizens also has a great impact on civil rights. Therefore, democratic societies must prevent abuse and ensure that LI is only employed in specific cases with justifiable grounds or a probable cause. Nowadays, in many countries each interception must be authorized by a wiretap warrant, usually issued by a judge. However, this wiretap warrant is merely an administrative document that should be checked by the network or service operator before enabling the monitoring of its customers, whose communications are later handed over to a LEA in plaintext. This paper proposes the idea of employing a Digital Wiretap Warrant (DWW), which further protects the civil liberties, security and privacy of LI by ensuring that monitoring devices can only be enabled with a valid DWW, and by encrypting the captured data so only the authorized LEA is able to decrypt those communications. Moreover, in the proposed DWW framework all digital evidence is securely time-stamped and signed, thus guaranteeing that it has not been tampered with, and that a proper chain of custody has been met. In particular this paper proposes how to apply the DWW concept to the lawful interception framework defined by the ETSI LI Technical Committee, and evaluates how the additional security mechanisms could impact the performance and storage costs of a LI platform.  相似文献   
7.
Technologies play crucial roles in security politics. In a recent push to understand the dynamic interplay between technologies and politics, IR scholars increasingly draw on reflexive research traditions. The aim is to understand the social and political practices that influence the shape, design and use of security technologies instead of assuming that technologies have linear, independent effects on politics. This SPSR debate draws on this new perspective and applies it to topics salient in Swiss public debate. Its contributions analyze how cybersecurity, predictive policing, drones, artificial intelligence, targeted sanctions, urban design and spyware are deliberated, negotiated, programmed and critiqued in Switzerland. They chart different analytical avenues with which to address the recursive and non‐linear relationship between security politics and technologies, and, by familiarizing readers with the tenets and diversity of reflexive political science research, seek to give that longstanding scholarly research tradition better visibility in the Swiss political science community.  相似文献   
8.
练习摹仿是摹仿者在摹仿笔迹时常用的手段。由于中文签名字数少,更利于摹仿,所以鉴定练习的摹仿签名真伪就更加困难。练习摹仿签名的实验得出:整个摹仿过程是一个逐渐接近被摹仿者签名的过程。在不易被摹仿的特征里,往往反映的是书写者的书写习惯,还有一部分反映的既不是摹仿者的书写特征,也不是被摹仿者的书写特征,是摹仿的综合作用引起的特征。  相似文献   
9.
《Science & justice》2020,60(5):399-402
Whilst the field of digital forensics is now well established, its research community can be considered relatively emerging in comparison to the associated areas of traditional forensic and computer sciences. As a result, this comment article takes a quick look at the demographics of digital forensics research over the last 20 years, with metadata from 6589 articles being extracted and analysed from Scopus in order to provide a brief insight into this field’s research activity.  相似文献   
10.
Digital citizenship is becoming increasingly normalized within advanced democratic states. As society and governmental institutions become reliant on digital technologies, citizens are expected to be and act digitally. This article examines the governance of digital citizens through a case study of digitalization efforts in Denmark. Drawing on multiple forms of data, the article showcases how digital citizens are governed through a combination of discursive, legal and institutional means. The article highlights the political, but also institutional work that goes into making citizens digital. Providing this case study, the article contributes to current critical perspectives on the digital citizen as a new political figure. It adds new insights into digital citizenship by connecting this figure to wider processes of neoliberalization and state restructuring, pushing for a more pronounced focus on governmental practices.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号