首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   156篇
  免费   2篇
外交国际关系   1篇
法律   135篇
中国政治   3篇
政治理论   1篇
综合类   18篇
  2021年   1篇
  2020年   2篇
  2019年   2篇
  2018年   26篇
  2017年   4篇
  2015年   2篇
  2014年   15篇
  2013年   15篇
  2012年   25篇
  2011年   11篇
  2010年   20篇
  2009年   20篇
  2008年   2篇
  2007年   4篇
  2006年   2篇
  2005年   3篇
  2004年   2篇
  2002年   1篇
  2001年   1篇
排序方式: 共有158条查询结果,搜索用时 15 毫秒
101.
相对于男性的隐私权而言,女性的隐私权在网络时代受到的冲击是最大的。由于各种社会群体经济地位和社会文化结构的差异,同样的权利实际上会对其产生不同的边际效用。最终导致看似相等的权利实际上没有起到平等的保护作用。隐私权对于女性有更高的边际效用,对较低社会经济地位的女性阶层有更高的边际效用。应该以较低社会经济地位阶层女性的权利需要来设计和完善隐私权。  相似文献   
102.
We now live in a world of Big Data, massive repositories of structured, unstructured or semi-structured data. This is seen as a valuable resource for organisations, given the potential to analyse and exploit that data to turn it into useful information. However, the cost and risk of continuing to hold that data can also make it a burden for many organisations.  相似文献   
103.
The present paper surveys the prospects and possibilities of regulating the application areas of Future and Emerging Technologies (FET) – or in a broader sense, of influencing the future way of life – at the intersection of law, technology and society. It dissects the anticipated further erosion of personal privacy – the focus area of the essay – caused by technological developments and related interests. After sketching out an ironic dystopia, in which the idea of transparency is foisted upon the public by future technological developments, the author contemplates the relationships between legal regulation and the underlying values in the predictable but unknowable milieu of future life conditions. While studying the immutability of fundamental values, the author offers a brief survey of the role of public opinion, as well as of the limitations of taking into account the majority opinion, followed by a thought experiment about the possible ways of regulating the “Code”, approaching it from the direction of two fundamental rights, the right to human dignity and the freedom of academic research. After reaching conflicting conclusions and making a few suggestions about possible ways to regulate the area, the author makes a proposal about the introduction of a small-scale experimental tool, metaphorically named as a predictive learning model of regulation. Despite the difficulties and the uncertainties, the essay's overall perspective on the role of legal regulation is not a pessimistic one, as long as it is used flexibly and in conjunction with other means of regulation.  相似文献   
104.
In this paper, the author sets out the way in which the UK approach to privacy protection is able to extend its reach to anonymous postings. Whilst anonymity might sometimes be seen as one of the essential characteristics of communicating on-line, it does not provide an impenetrable veil of protection in respect of a privacy violation claim. Instead, there are avenues available to identify anonymous communicators, which have implications both for internet freedom and jurisdiction in cyberspace. In the UK, our common law has not denied bloggers, or other on-line contributors, anonymity per se. However, it will be argued that recent UK judgments represent a warning to anonymous communicators that they can be held liable for what they post on-line and that naivety is no defence at law. Whilst on-line platforms allow people to effectively become journalists; to become publishers, as familiar users, they should become more aware of the consequences of their on-line postings and appreciate that they will not be able to escape from the application of third party disclosure orders. However, as these are not without their problems, it is possible that anonymous communicators may have the last laugh.  相似文献   
105.
隐私权承载了极其丰富的法律价值:它明确隐私利益的权属;有效对抗公权力;成就民法总则部分设定的法律人像;更为重要的是,它可以为现代人注入新的人性元素。确认隐私权的法律价值有助于隐私权立法。  相似文献   
106.
The principle of information security safeguards is a key information privacy principle contained in every privacy legislation measure, framework, and guideline. This principle requires data controllers to use an adequate level of safeguards before processing personal information. However, privacy literature neither explains what this adequate level is nor how to achieve it. Hence, a knowledge gap has been created between privacy advocates and data controllers who are responsible for providing adequate protection. This paper takes a step toward bridging this knowledge gap by presenting an analysis of how Data Protection and Privacy Commissioners have evaluated the adequacy level of security protection measures given to personal information in selected privacy invasive cases. This study addresses both security measures used to protect personal information against unauthorized activities and the use of personal information in authentication mechanisms. This analysis also lays a foundation for building a set of guidelines that can be used by data controllers for designing, implementing, and operating both technological and organizational measures used to protect personal information.  相似文献   
107.
解读隐私权     
隐私权是自然人所享有的个人私事或生活安宁不为他人知晓或侵扰的权利,包括隐私信息隐瞒权、隐私信息支配权和私人生活安宁权。它是当事人实现正当隐私利益的行为依据。隐私权是一种人格权,隐私权的意义在于保护公民基于合法隐私之上的人格利益。我国虽有一些保护隐私的法律条款,但在隐私权的保护方面仍存在着一定的不足。  相似文献   
108.
The Art. 29 Working Party (hereinafter “Art. 29 WP”) is an influential body comprised of representatives from the Member State Data Protection Authorities2 established under the Data Protection Directive 95/46/EC, has recently issued an opinion with the Working Party on Police and Justice. This is quite significant, since the opinion sets out some of the issues that will need to be addressed in the lead up to the revision of the Data Protection Directive 95/46/EC.3 This comes at a time, when there have been discussions on the current application of the European Data Protection Directive to the internet,4 (such as social networking) and the recent European Commission’s consultation on the legal framework for the fundamental right to protection of personal data. Not least, there have been a number of cases brought before the European Court of Justice dealing with the partial implementation of the Data Protection Directive 95/46/EC.5The aim of this paper is to consider in detail the issues set out by the Art. 29 WP and the likely challenges in revising the Data Protection Directive 95/46/EC.  相似文献   
109.
This paper aims to provide a comparative overview and evaluation of various legal frameworks for electronic communications security in light of the recent developments in the electronic communications sector. The article also includes an insight on European Union and Turkish legal environment for data protection security in electronic communications sector.  相似文献   
110.
This article provides an analysis of the legal and public discourse concerning the ''right of privacy'' in the 1960s. During that period the legal community had ambivalent feelings about recognizing the right of privacy, and scholars split on the question of whether legal formalism or legal realism should dominate American jurisprudence. This ambivalence created a situation where a wide range of public rhetors articulated a common appeal for expanding the right to privacy. When Justice Douglas and the rest of the United States Supreme Court eventually recognized the privacy right in Griswold v. Connecticut (1965), many legal scholars worried that this was an exercise in judicial activism. Yet, the legal arguments that were used in defending the establishment of the ''right of privacy'' mirrored the public defenses of that right that appeared in the broader rhetorical culture.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号