首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   160篇
  免费   4篇
  国内免费   3篇
管理学   13篇
民族学   2篇
人口学   9篇
丛书文集   5篇
理论方法论   9篇
综合类   42篇
社会学   63篇
统计学   24篇
  2024年   1篇
  2023年   5篇
  2021年   2篇
  2020年   8篇
  2019年   8篇
  2018年   13篇
  2017年   6篇
  2016年   2篇
  2015年   10篇
  2014年   9篇
  2013年   27篇
  2012年   7篇
  2011年   5篇
  2010年   11篇
  2009年   6篇
  2008年   9篇
  2007年   4篇
  2006年   5篇
  2005年   8篇
  2004年   6篇
  2003年   2篇
  2002年   5篇
  2001年   4篇
  2000年   1篇
  1997年   1篇
  1994年   1篇
  1992年   1篇
排序方式: 共有167条查询结果,搜索用时 19 毫秒
1.
In 2016, without the knowledge of its citizens, Baltimore City Police deployed a military aerial surveillance technology called Wide Area Motion Imagery (WAMI), which can track the movements of every person in public view over the entire city. Though the trial of the “spy plane,” as the program was dubbed, quickly ended in scandal, organizers from Baltimore’s low-income minority neighborhoods successfully rebooted the program in 2020, this time framing WAMI partly as a tool of “sousveillance” (watching “from below”) that can track the movements of police officers. The paper shows how organizers “rebranded” WAMI around two conceptions of sousveillance—“citizen-centered” and “state-centered”—creating an unlikely coalition of supporters from both pro- and anti-policing sides of the criminal justice reform debate. But while the renewed program has vowed to be a “Big Brother” to the state, it will continue to be used for traditional surveillance, raising troubling questions about privacy. The article sheds light on the politics of watching and being watched in the era of technology-driven criminal justice reform.  相似文献   
2.
ABSTRACT

We describe two recently proposed machine learning approaches for discovering emerging trends in fatal accidental drug overdoses. The Gaussian Process Subset Scan (Herlands, McFowland, Wilson, & Neill, 2017 Neill, D. B. (2017). Multidimensional tensor scan for drug overdose surveillance. Journal of Public Health Informatics, 9(1), e20. doi:10.5210/ojphi.v9i1.7598[Crossref] [Google Scholar]) enables early detection of emerging patterns in spatio-temporal data, accounting for both the complex, correlated nature of the data and the fact that detecting subtle patterns requires integration of information across multiple spatial areas and multiple time steps. We apply this approach to 17 years of county-aggregated data for monthly opioid overdose deaths in the New York City metropolitan area, showing clear advantages in the utility of discovered patterns as compared to typical anomaly detection approaches. To detect and characterize emerging overdose patterns that differentially affect a subpopulation of the data, including geographic, demographic, and behavioral patterns (e.g., which combinations of drugs are involved), we apply the Multidimensional Tensor Scan (Neill, 2017 Neill, D. B. (2017). Multidimensional tensor scan for drug overdose surveillance. Journal of Public Health Informatics, 9(1), e20. doi:10.5210/ojphi.v9i1.7598[Crossref] [Google Scholar]) to 8 years of case-level overdose data from Allegheny County, Pennsylvania. We discover previously unidentified overdose patterns which reveal unusual demographic clusters, show impacts of drug legislation, and demonstrate potential for early detection and targeted intervention. These approaches to early detection of overdose patterns can inform prevention and response efforts, as well as understanding the effects of policy changes.  相似文献   
3.
在智能化和法治化的新时代,公共视频监控图像信息综合应用已成为社会治理社会化、法治化、智能化和专业化的重要方式。公共视频监控系统成为政府部门和社会组织保护公共安全以及公民人身、财产安全的技术项目。公共视频监控图像信息的技术手段和法律属性需要以立法形式加以规定。公共视频监控图像信息综合应用需要在权利保护的法律制度中进行,尤其是视频监控图像信息公开使用与信息安全、隐私权保护之间的法律制度设计。因此,公共视频监控图像信息的法律规制工作应对法律主体、基本原则、权利体系、法律监管、法律责任做出明确规定。  相似文献   
4.
This article analyzes the social construction of border surveillance and policing in reality-based television. Utilizing content analytic methods to document and decode popular images of borders, mobility, and insecurity, it assesses three programs from Australia, the UK, and the United States. Despite claims of offering accurate and unfiltered depictions, the programs are ideological and provide visions of enforcement that reinforce stereotypes regarding the risks of permeable borders and exonerate intensive regimes of surveillance and securitization. Our findings suggest this occurs in three ways. First, the programs inflate the extent and seriousness of lawlessness associated with cross-border movement. Second, they offer individualistic explanations of crime that cite personal choices and pathologies as determinants. Finally, alongside neglecting their perspectives and interpretations of events, when compared to the reality of official statistics, the programs disproportionately feature suspected offenders as members of marginalized groups. The social and political implications of these findings are discussed.  相似文献   
5.
Although most surveillance studies scholars assume privacy is antithetical to surveillance, critics have recently warned that privacy-based criticisms may facilitate surveillance. That being said, we do not yet have data that show whether privacy claims were used in the past to legitimate government surveillance. This paper addresses that gap by analyzing claims made over one of the U.S.’s most controversial surveillance issues: government control over encryption technologies. A review of Congressional hearings and statements on the Congressional Record (n?=?112) reveals that from 1993 to 1999, public debates were dominated by a market liberalization discourse in which participants supported loosening encryption controls as a way to protect privacy from criminal intrusions in market transactions. Also playing a role was a strong skepticism toward government power and a preference for markets as managers of crime prevention. Challenged by these critiques, lawmakers withdrew regulatory proposals and spent the following decade working quietly with private firms to ensure law enforcement surveillance capability. These findings show the expansion of privacy for consumers and entrepreneurs has in fact been used to achieve the contraction of privacy from law enforcement and intelligence agencies.  相似文献   
6.
ABSTRACT

This paper considers how personal data protections figure into the design process of wearable technology. The data question is becoming especially important in the face of recent innovations in biotechnology that capitalize on the new fungibility of biology and electronics, in which new biotech wearables capitalize on the ability to analyze and track changes in blood, sweat, and tears. Interviews and participant observation with wearable tech designers, data scientists, fashion tech entrepreneurs, and select experts in cybersecurity and intellectual property law, reveal a range of approaches to data protection in design within the culture where wearables are beginning to merge with biotech. While a few respondents were extremely vigilant about protecting consumer’s privacy, the majority felt that when consumers ‘opt in’ to data sharing, they should be cognizant of the risks. From their perspective, it is not necessarily the producer’s responsibility to protect user's personal data. These attitudes present a problematic logic, which leaves users vulnerable to data exploitation. The paper concludes by arguing that this laissez-faire culture is the environment in which wearable biotech is being developed and will be deployed. This emerging technology raises issues about bodies, data, and ownership in crucial need of analysis and critique to push its move into the mainstream toward more equitable and inclusive ends.  相似文献   
7.
《Sociological Forum》2018,33(1):73-94
Based on ethnographic data on South Asian Muslims in Los Angeles and analysis of publications of the largest Muslim organization in North America, this article shows how Muslim Americans manage their hypervisibility in the post‐9/11 security atmosphere, which has intensified after ISIS terrorist attacks at home and abroad. At the individual level, Muslim Americans try to distance themselves from the “Muslim” label, which associates them with “terrorists.” Instead, many self‐categorize into the seemingly more favorable “moderate” identity, which could sometimes render Muslims politically passive. Contrastingly, Muslim organizations strive to construct a “Muslim American” identity that can allow Muslims to engage in mainstream politics by reframing Islam as compatible with American values. Theoretically, this article engages with the scholarship on security, surveillance, and visibility to show how the observed's visibility is not always only repressive but can also be used to resist imposed categories. However, findings reflect how the racialization of Muslims and the security regime give these strategies a double edge—while providing some advantages, these do little to dismantle Muslims’ hypervisibility and the security atmosphere. Overall, findings shed light on the contemporary issue of Muslim identification—not just in terms of how others see Muslims but also how Muslims see themselves.  相似文献   
8.
The spectre of environmental ‘domestic extremism’ has long been postulated by police leaders and security analysts in Britain. It is a narrative that has justified the commitment of enormous amounts of government resources towards police intelligence work directed at non-violent direct action campaigns. Most controversially, this has included the long-term infiltration of environmental (and other) activist groups by undercover police. This article provides a critical analysis of the justifications put forward in support of the covert surveillance of environmental activists in Britain. The paper proceeds by way of a single case study – a high profile, environmental direct action protest in the north of England – in order to reveal the levels of abuse, manipulation and deception at the basis of undercover protest policing. Through their court case, the activists involved with this action were able to obtain rare insights into the police authorisation documents for the undercover operation that had led to their arrests. An analysis of these documents provides us with a glimpse of the contradictory justifications given by senior police officers for infiltration – now under scrutiny by a public inquiry.  相似文献   
9.
Silicon Valley, California – home of Apple, Facebook, Twitter, Google, and so on – is widely regarded as the epicentre of the information revolution. However, it is not just a technical or economic phenomenon; it has also made a social revolution. The article evaluates Silicon Valley from a normative perspective, seeking to identify its real societal impact, negative as well as positive. A select review of significant literature is followed by exposition of primary data, based on in situ face-to-face interviews with Valley occupants; these range from the chief technology officer of a global brand to a homeless, unemployed Vietnam War veteran. The article organises its findings under three headings: the nature of information revolution; iCapitalism as a new technoeconomic synthesis; and the normative crisis of the information society. It concludes with a warning about ongoing attempts to clone Silicon Valley around the world.  相似文献   
10.
What factors determine whether and how deeply countries will commit to the international human rights regime? Using data for up to 142 countries between 1966 and 2000, this article analyzes patterns of membership to the International Human Rights Covenants. The analysis produced two main conclusions. First, the potential costs associated with joining a treaty, rather than its substantive content, motivates the decision to join. Treaties that protect different rights but establish comparable implementation mechanisms exhibit similar patterns of membership, whereas treaties that protect identical rights but establish different implementation provisions exhibit dissimilar patterns of membership. Second, rates of treaty membership differ by level of commitment. Countries that sign human rights treaties differ from countries that ratify. Results are interpreted with respect to four theories of commitment and compliance: realism, liberalism, constructivism, and sociological institutionalism. Theories that emphasize the importance of a treaty’s costs (realism and institutionalism) fare better than theories that prioritize a treaty’s content (liberalism and constructivism).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号