期刊文献+
共找到808篇文章
< 1 2 41 >
每页显示 20 50 100
Cryptocurrency technology revolution:are Bitcoin prices and terrorist attacks related?
1
作者 Yu Song Bo Chen Xin‑Yi Wang 《Financial Innovation》 2023年第1期1293-1312,共20页
As a financial innovation of the information age,cryptocurrency is a complex concept with clear advantages and disadvantages and is worthy of discussion.Exploring from a terrorism perspective,this study uses the time-... As a financial innovation of the information age,cryptocurrency is a complex concept with clear advantages and disadvantages and is worthy of discussion.Exploring from a terrorism perspective,this study uses the time-varying parameter/stochastic volatil-ity vector autoregression model to explore the risk hedging and terrorist financing capabilities of Bitcoin.Empirical results show that both terrorist incidents and brutality may explain Bitcoin price,but their effects are slightly different.Compared to terrorist brutality,terrorist incidents have a weaker impact on Bitcoin price,showing that Bitcoin investors are more concerned about the number of deaths than the frequency of ter-rorist attacks.In turn,the impact of Bitcoin price on terrorist attacks is negligible.Bitcoin is a potential means of financing terrorism,but it does not currently play an important role.Our research findings can help investors analyze and predict Bitcoin prices and help improve the theoretical system of anti-terrorist financing,helping to maintain world peace and security. 展开更多
关键词 terrorist incident terrorist brutality Bitcoin price TIME-VARYING
在线阅读 下载PDF
Review on emergency medical response against terrorist attack 被引量:4
2
作者 De-Wen Wang Yao Liu Ming-Min Jiang 《Journal of Medical Colleges of PLA(China)》 CAS 2014年第1期15-18,共4页
Terrorism is a global issue and a constant international threat. As a result, anti-terrorism and emergency response strategies are tasks of critical importance that have a direct impact on the national security of eve... Terrorism is a global issue and a constant international threat. As a result, anti-terrorism and emergency response strategies are tasks of critical importance that have a direct impact on the national security of every country in the world. This paper reviews new characteristics of international anti-terrorism measures and offers an in-depth reflection on emergency medical response countermeasures; additionally, this paper presents the goals of related research, which include: 1) to present a model of a highly efficient medical response command; 2) to introduce the pre-planning phases of the emergency medical response; 3) to establish a response system capable of handling various types of terror attacks; 4) to promote anti-terrorism awareness to the general public and emphasize its prevention; and 5) to continue basic investigations into emergency medical responses for various types of terrorist attacks(for example, the classifications and characteristics of new injuries, pathophysiology, prevention and treatment of the resultant stress disorders, improved high-efficiency medical response measures and equipment, etc.). 展开更多
关键词 terrorist ATTACKS MEDICAL RESCUE
原文传递
Understanding the Interrelationship Between Global Terrorist Attacks and the Citizen's Wellbeing." The Complexity of Terrorism 被引量:1
3
作者 Aida Huerta-Barrientos Pablo Padilla Longoria 《Sociology Study》 2016年第5期283-292,共10页
Terrorism is a global phenomenon that over the last 44 years more than 140,000 terrorist events have been carried out. In the period from 1970-2001, the five countries with the largest number of terrorist attacks were... Terrorism is a global phenomenon that over the last 44 years more than 140,000 terrorist events have been carried out. In the period from 1970-2001, the five countries with the largest number of terrorist attacks were Colombia, Peru, El Salvador, United Kingdom, and India. On the other hand, in the post-2001 context, the five countries with the largest number of terrorist attacks were Iraq, Pakistan, Afghanistan, India, and Thailand. One method for measuring in an aggregate way, how many people have suffered under terrorist attacks at national level is to analyze the correlation between some national wellbeing indicators and the number of terrorist attacks. The aim of this study is to analyze empirically the correlation between the global terrorist attacks and the countries wellbeing indicators. Five indicators show a strong relationship with the number of terrorist attacks in the case of the four most attacked countries in the post-2001 context. The authors consider that their findings can support the design of new strategies for preventing terrorist activities taking into account certain socio-economic and political drivers. The authors conclude that as such drivers are socio-complex, so it is necessary to adopt the complex adaptive system (CAS) approach to provide a new way of thinking about terrorism. 展开更多
关键词 terrorist attacks national wellbeing global governance CORRUPTION DRUGS
在线阅读 下载PDF
The possibility of a human-borne with bioagent terrorist at foreign Forward Operating Bases entry control point:the perceptions of U.S. military or security personnel,a preliminary report
4
作者 George Edafese Alakpa John W.Collins Jr 《Journal of Medical Colleges of PLA(China)》 CAS 2016年第1期22-27,共6页
Background:The global war on terrorism has prompted an increase in the deployment of security personnel from multi-national forces on foreign lands,especially in places where known terrorist groups are based.The aim o... Background:The global war on terrorism has prompted an increase in the deployment of security personnel from multi-national forces on foreign lands,especially in places where known terrorist groups are based.The aim of this study was to obtain U.S.military and security personnel's perceptions of the possibility of encountering a humanborne with bioagent(HBBA) terrorist at an entry control point(ECP).Methods:This study was a mixed-method,cross-sectional,survey-based,time-limited study.A validated,five-option Likert scale questionnaire with Cronbach's alphas of 0.82 and 0.894 for Constructs 1 and 2 was distributed to over 113 respondents with combat experience.Results:The results indicated that 92.3% of the respondents thought it was possible for a terrorist to employ a biological agent to cause terror; 61.5% claimed it was either possible or very possible,and 26.9% claimed it was somewhat possible for a terrorist carrying a biological agent to successfully breach a combat Forward Operating Bases(FOB) ECP undetected.26.9% of the respondents agreed that "ECP soldiers are knowledgeable about bioagents(BA)",only 15.4% responded that ECP soldiers have effective devices for detecting a BA on a terrorist at an ECP.Conclusion:Despite some limitations,this pre-study tends to indicate that while many U.S.military or security personnel acknowledge the possibility of an HBBA terrorist breach and the vulnerability of U.S.combat post ECPs to a BA breach,the soldiers at the ECPs lack adequate knowledge or devices to effectively detect a BA on a terrorist at an ECP. 展开更多
关键词 Human-borne with bioagent(HBBA) terrorist BIOTERRORISM Combat post ECP
原文传递
Medical aspects of terrorist bombings: A focus on damage control surgery and damage control resuscitation
5
作者 Ventsislav M Mutafchiyski Georgi I Popivanov Kirien C Kjossev 《Journal of Medical Colleges of PLA(China)》 CAS 2014年第2期103-108,共6页
Although terrorist bombings have tormented the world for a long time, currently they have reached unprecedented levels and become a continuous threat without borders, race or age. Almost all of them are caused by impr... Although terrorist bombings have tormented the world for a long time, currently they have reached unprecedented levels and become a continuous threat without borders, race or age. Almost all of them are caused by improvised explosive devices. The unpredictability of the terrorist bombings, leading to simultaneous generation of a large number of casualties and severe "multidimensional" blast trauma require a constant vigilance and preparedness of every hospital worldwide. Approximately 1.0%-2.6% of all trauma patients and 7% of the combat casualties require a massive blood transfusion. Coagulopathy is presented in 65% of them with mortality exceeding 50%. Damage control resuscitation is a novel approach, developed in the military practice for treatment of this subgroup of trauma patients. The comparison with the conventional approach revealed mortality reduction with 40%-74%, lower frequency of abdominal compartment syndrome(8% vs 16%), sepsis(9% vs 20%), multiorgan failure(16% vs 37%) and a significant reduction of resuscitation volumes, both crystalloids and blood products. Damage control surgery(DCS) and damage control resuscitation(DCR) are promising new approaches, contributing for the mortality reduction among the most severely wounded patients. Despite the lack of consensus about the optimal ratio of the blood products and the possible influence of the survival bias, we think that DCR carries survival benefit and recommend it in trauma patients with exsanguinating bleeding. 展开更多
关键词 terrorist bombings traumatic coagulopathy damage control resuscitation
原文传递
Posttraumatic Stress Disorder Mediated by Exposure Level in French Civil Firefighters Following a Terrorist Attack: Some Hypotheses towards a Structural Model
6
作者 Angelika Wolman Jean-Marie Stève +3 位作者 Marion Samor Evelyne Bouteyre Themistoklis Apostolidis Abdessadek El Ahmadi 《World Journal of Neuroscience》 2020年第3期121-134,共14页
To date, few studies have investigated the impact of organizational factors such as organizational status or the rank of firefighters on the development of posttraumatic stress disorder (PTSD) following a terrorist at... To date, few studies have investigated the impact of organizational factors such as organizational status or the rank of firefighters on the development of posttraumatic stress disorder (PTSD) following a terrorist attack. To fill this gap in the scientific literature, this field study aimed to investigate the consequences of terrorist attacks on firefighters’ psychological health in terms of PTSD. Data were collected in France following two terrorist attacks. PTSD was assessed with the PCL-S (DSM-IV) 3 to 6 months after the events. Confirmatory factor analyses (CFAs) with existing PTSD models were inconclusive, leading us to find a two-factor model via an exploratory factor analysis (EFA). A cluster analysis showed different symptom profiles that were influenced by the exposure level. Elements for a structural model explaining PTSD symptoms are proposed and suggest a central role of the exposure level. Firefighters I/II represented an at-risk sub-population, suggesting that PTSD was mainly experienced among those who performed tasks not common to their occupation. 展开更多
关键词 PTSD Firefighters terrorist Attack RANK SEM
暂未订购
Modeling heterogeneous behaviors with different strategies in a terrorist attack
7
作者 Le BI Tingting LIU +3 位作者 Zhen LIU Jason TEO Yumeng ZHAO Yanjie CHAI 《Virtual Reality & Intelligent Hardware》 EI 2023年第4期351-365,共15页
Existing simulations of terrorist attacks do not consider individual variations.To overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist attacks.We constructe... Existing simulations of terrorist attacks do not consider individual variations.To overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist attacks.We constructed an emotional model that integrated personality and visual perception for pedestrians.The emotional model was then integrated with pedestrian relationship networks to establish a decision-making model that sup-ported pedestrians’altruistic behaviors.A mapping model has been developed to correlate antisocial personality traits with attack strategies employed by terrorists.Experiments demonstrate that the proposed algorithm can generate practical heterogeneous behaviors that align with existing psychological research findings. 展开更多
关键词 terrorist attack simulation Computer animation Big Five personality Intelligent decision making Heterogeneous behaviors
在线阅读 下载PDF
Improvised Technique for Analyzing Data and Detecting Terrorist Attack Using Machine Learning Approach Based on Twitter Data
8
作者 Aditi Sarker Partha Chakraborty +3 位作者 S. M. Shaheen Sha Mahmuda Khatun Md. Rakib Hasan Kawshik Banerjee 《Journal of Computer and Communications》 2020年第7期50-62,共13页
Social media are interactive computer mediated technology that facilitates the sharing of information via virtual communities and networks. And Twitter is one of the most popular social media for social interaction an... Social media are interactive computer mediated technology that facilitates the sharing of information via virtual communities and networks. And Twitter is one of the most popular social media for social interaction and microblogging. This paper introduces an improved system model to analyze twitter data and detect terrorist attack event. In this model, a ternary search is used to find the weights of predefined keywords and the Aho-Corasick algorithm is applied to perform pattern matching and assign the weight which is the main contribution of this paper. Weights are categorized into three categories: Terror attack, Severe Terror Attack and Normal Data and the weights are used as attributes for classification. K-Nearest Neighbor (KNN) and Support Vector Machine (SVM) are two machine learning algorithms used to predict whether a terror attack happened or not. We compare the accuracy with our actual data by using confusion matrix and measure whether our result is right or wrong and the achieved result shows that the proposed model performs better. 展开更多
关键词 terrorist Ternary Search Aho-Corasick Automata Confusion Matrix
在线阅读 下载PDF
Using Multi-Attribute Decision Methods in Mathematical Modeling to Produce an Order of Merit List of High Valued Terrorists
9
作者 William P. Fox 《American Journal of Operations Research》 2014年第6期365-374,共10页
The authors present a methodology and an example of preparing an order of merit list to rank terrorist based upon decision maker weights. This research used an old terrorist data set as our base data to keep the infor... The authors present a methodology and an example of preparing an order of merit list to rank terrorist based upon decision maker weights. This research used an old terrorist data set as our base data to keep the information unclassified. This data is used to demonstrate this methodology. The authors perform numerical iterative criteria weight sensitivity analysis to show the effects on the model’s outputs in changes in the weights. Through their analysis the most critical criterion is identified. 展开更多
关键词 RANKING terroristS TOPSIS AHP Criteria WEIGHTS Pairwise Comparisons Sensitivity Analysis
暂未订购
Epidemio-Clinical Profile of Psychotrauma in Military Victims of Terrorists Attacks in Benin in December 2021
10
作者 Guy-Gérard Aza-Gnandji David Sinet Koivogui +2 位作者 Kokou Messanh Agbémèlé Soedje Tchedié Etdéchié Elvyre Klikpo Josiane Ezin Houngbe 《Open Journal of Psychiatry》 2023年第S2期503-517,共15页
Introduction: In December 2021, Beninese soldiers were victims of armed terrorist attacks. This study aims to determine the psychological impact of the events experienced on the victims in order to better prevent post... Introduction: In December 2021, Beninese soldiers were victims of armed terrorist attacks. This study aims to determine the psychological impact of the events experienced on the victims in order to better prevent post-traumatic stress disorder. Materials and methods: This is a descriptive cross-sectional study conducted from December 13 to 14, 2021, i.e. 12 days after the oldest event and 4 days after the most recent. The experience of the event was assessed with the Peritraumatic Distress Inventory and the Peritraumatic Dissociation Experiences Questionnaire. Symptoms experienced in the hours and days after the event were assessed with the Revised Event Impact Scale. Results: 36 soldiers were included out of the 38 survivors, i.e. 94.73%. They were 51.43% victims of the night assault, 37.14% of the ambush on patrol and 11.43% of the explosion of vehicle on mine, all male. The average age was 31 years with extremes of 25 and 49 years. The 25 - 30 year olds predominated, 52.78%. 100% of soldiers had significant peritraumatic dissociation, of which 94.44% also had significant peritraumatic distress. 100% of the soldiers had manifestations of intrusion, 89% of manifestations of avoidance and 83% of manifestations of hyperexcitation. 88.89% had an index for acute stress including 100% of victims of night assault and vehicle explosion on mine. Conclusion: This study shows a high prevalence of peritraumatic reactions, recognized factors favoring post-traumatic stress disorder, and the interest of their evaluation for medical and psychological help adapted to the victims. 展开更多
关键词 Psychotrauma Peritraumatic Dissociation Peritraumatic Distress terrorist Attacks MILITARY
在线阅读 下载PDF
Spatio-temporal orediction of terrorist attacks based on GCN-LSTM
11
作者 Yingjie Du Ning Ding Hongyu Lv 《Journal of Safety Science and Resilience》 2025年第2期186-195,共10页
Terrorist attacks represent a significant threat to national order,social stability,and economic security.Accurate prediction of such attacks is a critical task for casualty reduction,enhanced decision-making,and opti... Terrorist attacks represent a significant threat to national order,social stability,and economic security.Accurate prediction of such attacks is a critical task for casualty reduction,enhanced decision-making,and optimal resource distribution in counter-terrorism efforts.This paper introduces an innovative spatio-temporal fusion framework that combines graph convolutional network(GCN)with long short-term memory(LSTM)models.By capturing and merging spatio-temporal features from relevant events,the proposed GCN-LSTM model achieves remarkable accuracy in predicting terrorist attacks.The experimental results demonstrate outstanding perfor-mance,with the model attaining minimal RMSE and MAE values of 0.037 and 0.031,respectively,surpassing all baseline models(LSTM,GCN,and CNN-LSTM-Transformer).Through its effective interpretation of complex spatio-temporal patterns underlying terrorist attacks,our model substantially enhances the predictive accuracy across diverse time horizons.These findings carry crucial implications for enhancing counter-terrorism strategies. 展开更多
关键词 terrorist attacks Spatio-temporal prediction Graph convolutional networks Long short-termmemory COUNTER-TERRORISM
原文传递
东南亚恐怖组织融资基因信息链构建及影响机理分析
12
作者 李灿松 王涛 唐晓雨 《情报杂志》 北大核心 2025年第11期90-98,共9页
[研究目的]东南亚地区一直被视为全球反恐战争的“第二战线”,恐怖组织持续的资金供给增加了东南亚地区恐怖活动发生的几率,严重威胁地区乃至全球和平与发展,只有解透东南亚恐怖组织融资的源汇过程并切断资金来源,动摇其赖以生存的经济... [研究目的]东南亚地区一直被视为全球反恐战争的“第二战线”,恐怖组织持续的资金供给增加了东南亚地区恐怖活动发生的几率,严重威胁地区乃至全球和平与发展,只有解透东南亚恐怖组织融资的源汇过程并切断资金来源,动摇其赖以生存的经济基础,才能有效遏制恐怖主义的滋生。[研究方法]在探讨基因与恐怖组织融资理论关系的基础上,构建东南亚恐怖组织融资的基因谱系和信息链,进而解析其影响机理。[研究结果/结论]东南亚恐怖组织融资基因编码信息链是建立在需求侧与供给侧上,并通过供给与需求的关系进行资金流通,以实现恐怖组织融资的源汇过程。东南亚恐怖融资基因划分为遗传形DNA、变异形DNA和复合形DNA三种模式,其基因谱系呈现一种“变异”优势,即科学技术的进步使得传统型恐怖组织融资方式逐渐被新型恐怖组织融资方式所取代。在政治环境、经济全球化以及政府监管的影响下,导致恐怖组织融资行为改变,资金的来源、性质和流向不断转换,进而实现资金表面“合法化”。 展开更多
关键词 恐怖主义 恐怖融资 基因信息链 社会网络 东南亚
在线阅读 下载PDF
耦合式恐怖袭击防控探究
13
作者 裴明 《湖北警官学院学报》 2025年第1期50-61,共12页
耦合式恐怖袭击是除独狼式恐怖袭击、协同式恐怖袭击、团队(体)式恐怖袭击、模仿式恐怖袭击、跨境式恐怖袭击和自杀式恐怖袭击外,恐怖主体用以宣传恐怖思想、实施恐怖袭击、获取恐怖收益的重要袭击模式。耦合式恐怖袭击在袭击主体、袭... 耦合式恐怖袭击是除独狼式恐怖袭击、协同式恐怖袭击、团队(体)式恐怖袭击、模仿式恐怖袭击、跨境式恐怖袭击和自杀式恐怖袭击外,恐怖主体用以宣传恐怖思想、实施恐怖袭击、获取恐怖收益的重要袭击模式。耦合式恐怖袭击在袭击主体、袭击目标和袭击时间等维度具有耦合性,并由行为体、承袭体和致损体构成耦合式恐怖袭击要素体;由耦合束、耦合场和耦合力组建耦合式恐怖袭击耦合体;由耦合剂、传播链和示范簇生成耦合式恐怖袭击介质体。耦合式恐怖袭击在袭击要素体分类掌控、袭击耦合体有效掌控和袭击介质体实时掌控等维度存在防控难点,可以解析行为体样态、承袭体存续、致损体适配以有效掌控耦合式恐怖袭击要素体;分析耦合束形成、耦合场运行、耦合力影响以有效掌控耦合式恐怖袭击耦合体;探析耦合剂粘合、传播链运转、示范簇辐射以有效掌控耦合式恐怖袭击介质体,进而有效防控耦合式恐怖袭击。 展开更多
关键词 恐怖袭击 袭击模式 耦合式恐怖袭击
在线阅读 下载PDF
海外利益恐怖侵袭防控策略探究
14
作者 裴明 古开月 《辽宁警察学院学报》 2025年第1期30-38,共9页
海外利益是恐怖袭击主体实施袭击的重要目标。为有效保护海外利益安全,使其免受恐怖主义威胁,防控主体需要系统分析海外利益恐怖侵袭的防控工作。从海外利益恐怖侵袭的释义出发,剖析其具有的目的性、选择性和操纵性等特征,解构其由行为... 海外利益是恐怖袭击主体实施袭击的重要目标。为有效保护海外利益安全,使其免受恐怖主义威胁,防控主体需要系统分析海外利益恐怖侵袭的防控工作。从海外利益恐怖侵袭的释义出发,剖析其具有的目的性、选择性和操纵性等特征,解构其由行为主体、具体目标和行为方式形成的运行机理,探索海外利益恐怖侵袭防控的难点与策略,有利于维护国家主权、保护国际合作、守护世界安宁,为有效开展海外利益安全保护工作提供些许智慧、方案和力量。 展开更多
关键词 海外利益 恐怖主义 恐怖袭击
在线阅读 下载PDF
恐怖袭击事件命名实体识别研究
15
作者 李林瑛 王孙和 +1 位作者 卢睿 陈志浩 《辽宁警察学院学报》 2025年第2期91-96,共6页
恐怖袭击事件文本中含有丰富的涉恐实体,如涉恐人物、恐怖袭击目标、恐怖袭击组织等。恐怖袭击文本中实体往往较为复杂,传统的静态词向量的命名实体识别模型存在分词误差传递问题,并且无法表征不同语境中存在的一词多义。针对这些问题,... 恐怖袭击事件文本中含有丰富的涉恐实体,如涉恐人物、恐怖袭击目标、恐怖袭击组织等。恐怖袭击文本中实体往往较为复杂,传统的静态词向量的命名实体识别模型存在分词误差传递问题,并且无法表征不同语境中存在的一词多义。针对这些问题,本文提出结合了BERT及全局指针网络的涉恐文本命名实体识别模型,通过BERT学习结合上下文的动态词向量表示,再由双向长短时记忆网络获取文本信息,采用全局指针识别备选涉恐实体片段,并送入实体分类器得到最终实体类别。实验结果表明:该模型的F1值达到92.01%,在涉恐语料的命名实体识别任务中具有有效性。 展开更多
关键词 恐怖袭击 命名实体识别 全球恐怖主义数据库 全局指针
在线阅读 下载PDF
恐怖主义犯罪侦查中大数据应用困境与优化路径
16
作者 张巍 《山西警察学院学报》 2025年第2期60-69,共10页
随着以数据为本质的大数据等新兴信息技术的发展,恐怖主义犯罪的手段和方式亦发生了巨大的变化。利用大数据对恐怖主义犯罪进行分析,实现对恐怖主义犯罪发生前后的实时预警和侦查打击是有效应对恐怖主义犯罪的手段之一。但在恐怖主义犯... 随着以数据为本质的大数据等新兴信息技术的发展,恐怖主义犯罪的手段和方式亦发生了巨大的变化。利用大数据对恐怖主义犯罪进行分析,实现对恐怖主义犯罪发生前后的实时预警和侦查打击是有效应对恐怖主义犯罪的手段之一。但在恐怖主义犯罪侦查中的大数据应用仍存在数据安全、数据壁垒、大数据技术与人才匮乏和公民个人隐私保护等困境。要破解恐怖主义犯罪侦查中的大数据应用困境,就必须建立数据安全管理制度,保障数据安全;破除数据壁垒,建立数据共享机制;加强大数据技术人才培养,强化大数据运用基础;建立公民个人信息安全的保障制度,保护公民个人信息权。 展开更多
关键词 恐怖主义犯罪侦查 大数据应用 数据安全 数据壁垒 公民个人信息权
在线阅读 下载PDF
中国惩治危害国家安全罪立法若干新发展
17
作者 黄风 《港澳研究》 2025年第3期56-64,95,共10页
作为一部全国性法律,中国香港国安法第三章是中国自1997年全面修订《刑法》后针对危害国家安全罪进行的一次系统性立法。考虑到中国香港刑事法制的特点与习惯,该章采用明确列举的方式对四种危害国家安全罪的罪状加以具体表述;将分裂国... 作为一部全国性法律,中国香港国安法第三章是中国自1997年全面修订《刑法》后针对危害国家安全罪进行的一次系统性立法。考虑到中国香港刑事法制的特点与习惯,该章采用明确列举的方式对四种危害国家安全罪的罪状加以具体表述;将分裂国家罪、颠覆国家政权罪、恐怖活动罪以及勾结外国或者境外势力危害国家安全罪确定为对国家安全构成最大威胁的核心罪行;将部分以恐怖手段胁迫国家接受某种政治主张的罪行提升为危害国家安全的恐怖活动犯罪;通过合理设置背景要件的方式将请求、配合与协助外国或者境外势力进行干预活动的行为确定为勾结罪;在全国性刑事立法中首次引入“特别行政区永久性居民”的概念并要求该法律主体接受维护国家安全基本禁止性规范的约束;对我国《刑法》四十余年未改一字的保护管辖规范进行修订,使其更加符合维护国家安全的需要和各国相关立法的同类规则。 展开更多
关键词 中国香港国安法 危害国家安全罪 恐怖活动罪 勾结罪 保护管辖
在线阅读 下载PDF
基于大数据的恐怖活动犯罪预测性侦查研究 被引量:4
18
作者 王恺瑶 王彬 《湖北警官学院学报》 2025年第2期56-65,共10页
基于大数据、云计算、人工智能等技术衍生出的预测性侦查模式正在推动侦查工作从事后应对向事前预防转型,将该模式应用于预防和打击恐怖活动犯罪能够增强维护国家安全的全局性主动,推动构建反恐情报预警与共享机制,有效固定行为人涉恐... 基于大数据、云计算、人工智能等技术衍生出的预测性侦查模式正在推动侦查工作从事后应对向事前预防转型,将该模式应用于预防和打击恐怖活动犯罪能够增强维护国家安全的全局性主动,推动构建反恐情报预警与共享机制,有效固定行为人涉恐犯罪的证据,帮助侦查人员准确区分罪与非罪、此罪与彼罪。预测性侦查模型的构建需要从涉恐数据的收集和导入入手,利用数据碰撞、数据挖掘技术分析涉恐数据,总结其时空轨迹规律,在此基础上进行综合研判。涉恐数据的不当处理会侵犯行为人的基本权利,在预测性侦查的适用过程中,需要保障个人信息安全,完善涉恐数据共享机制,推行算法公开,坚持“人主机辅”,以平衡侦查权力与公民权利的冲突。 展开更多
关键词 大数据 恐怖活动犯罪 预测性侦查 国家安全
在线阅读 下载PDF
Forensic odontology identification response to terrorist attacks in Paris November 2015 被引量:4
19
作者 Steve Toupenay Aida Ben Cheikh +1 位作者 Bertrand Ludes Rufino Felizardo 《Forensic Sciences Research》 CSCD 2020年第3期214-222,共9页
The terrorist attacks of November 2015 led to the immediate death of 129 victims admitted to the Legal and Forensic Medicine Institute of Paris,including 41 unidentified.During the Disaster Victim Identification(DVI)o... The terrorist attacks of November 2015 led to the immediate death of 129 victims admitted to the Legal and Forensic Medicine Institute of Paris,including 41 unidentified.During the Disaster Victim Identification(DVI)operations,22 bodies were examined by the postmortem(PM)dental team with the aim of establishing PM odontograms.At the same time,the dental expert in the antemortem(AM)unit collected a large number of dental files,progressively filtered as the list of missing persons became reduced.Feedback from these events has highlighted the difficulties of implementing the DVI chain principles in a legal framework,published the day before the attacks,and also the technical complexity of collecting dental data on a week end of terror.The return on experience after this event has represented a paradigm shift on previous methods of DVI in Paris and even more in France.Indeed,the victim identification procedure was redesigned,integrating new technical means such as a CT scan directly on spot,allowing the extraction of maxillofacial data as soon as possible in order to support the PM dental examination team.Moreover,the National Dental Council proceeded to the overall remodeling of the dental identification unit,which is composed of trained members,from local,regional and national aspects.These forensic experts are dedicated,at the request of the legal authorities,to DVI operations and deployed throughout the country capable of managing AM and PM data.This unit aims also to share experiences and awarenessraising among health professionals and investigators in order to optimize a better submission of AM elements and also to enhance the major interest of odontology as a primary identifier in disaster. 展开更多
关键词 Forensic sciences forensic odontology terrorist attack forensic identification disaster victim identification
原文传递
上一页 1 2 41 下一页 到第
使用帮助 返回顶部