首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   1篇
法律   15篇
中国政治   1篇
政治理论   2篇
综合类   1篇
  2019年   4篇
  2017年   1篇
  2014年   2篇
  2013年   1篇
  2012年   1篇
  2011年   4篇
  2010年   2篇
  2009年   2篇
  2005年   2篇
排序方式: 共有19条查询结果,搜索用时 15 毫秒
1.
在计算机图像处理技术用于文件检验工作的同时,也被一些犯罪分子所利用。文章阐述了利用计算机图像处理技术伪变造文件的手段、特点及对其进行检验的方法,以期对该类文件的检验工作有所裨益。  相似文献   
2.
Electronic commerce has brought about business and technological changes globally, and these global changes have given rise to major legal reforms across nations. In the fast-changing global digital economy, states need strategies to maintain competitiveness of their markets while simultaneously ensuring the secure and effective use of technologies involved in conducting electronic transactions. This paper examines how the use and recognition of electronic signatures are regulated in Southeast Asia – the region that has shown the most significant growth in global e-commerce in past few years. Based on a comparative analysis of the laws of four representative ASEAN member states – namely Singapore, Thailand, Malaysia, and Vietnam, this paper argues that there is a regional trend towards adopting more liberal and technology-neutral standards for electronic signatures. Electronic signature regulation in Southeast Asia is now built upon limited technological neutrality (or the so-called “two-tiered” approach) as a shared regulatory understanding, but this approach is operationalized differently in each state due to distinctive national contexts. Within the common legal framework, each state has developed its own system of control and management with respect to higher-level signatures (using advanced technologies). The principle of technological neutrality, a concept originally developed for the regulation of technologies in response to the liberalization of telecommunications market, has been the central theme of discussions on the e-transactions policy-making scene. As the author shows, in the process through which states localize the global standards of technological neutrality, ASEAN as a vehicle of regulatory change has played an essential role in translating this principle to the national context.  相似文献   
3.
This article examines the two most influential international initiatives on electronic signatures (UNCITRAL’s 1996 Model Law on Electronic Commerce and the 1999 EU Electronic Signature Directive). It considers whether the legislative approaches in Australia and the United Kingdom based on these initiatives are helpful in deciding whether lower level signature methods such as simple email messages are likely to satisfy a legal requirement for a signature. The conclusion reached is that they are unhelpful. The article goes on to consider whether legislative amendments based on UNCITRAL’s 2001 Model Law on Electronic Signatures or the 2005 UN Convention on the Use of Electronic Communications in International Contracts would improve the identified weaknesses. It concludes that such an update would clarify some issues, but that overall it will not solve the difficulties. The article ends with a brief speculation on the likely attributes of a more helpful approach.  相似文献   
4.
Security concerns with regard to the use of electronic signatures in the electronic environment seem to represent a potential barrier to their usage. This paper presents an empirical study that examines businesses' perceived security concerns with the use of the electronic signature technology for executing contracts and commercial transactions and whether such issues represent a disincentive for their usage. The findings of the study reveal that there are significant security concerns in the business community with regard to the use of electronic signatures. However, such perceptions seem to be primarily driven by a lack of awareness and understanding. Advising prospective users of electronic signatures about the kind of safeguards that could be put in place to minimise risks associated with their usage can be a useful step towards overcoming their fears and hesitance.  相似文献   
5.
Forensic document examiners (FDE) called upon to distinguish a genuine from a forged signature of an elderly person are often required to consider the question of age‐related deterioration and whether the available exemplars reliably capture the natural effects of aging of the original writer. An understanding of the statistical relationship between advanced age and handwriting movements can reduce the uncertainty that may exist in an examiner's approach to questioned signatures formed by elderly writers. The primary purpose of this study was to systematically examine age‐related changes in signature kinematics in healthy writers. Forty‐two healthy subjects between the ages of 60–91 years participated in this study. Signatures were recorded using a digitizing tablet, and commercial software was used to examine the temporal and spatial stroke kinematics and pen pressure. Results indicated that vertical stroke duration and dysfluency increased with age, whereas vertical stroke amplitude and velocity decreased with age. Pen pressure decreased with age. We found that a linear model characterized the best‐fit relationship between advanced age and handwriting movement parameters for signature formation. Male writers exhibited stronger age effects than female writers, especially for pen pressure and stroke dysfluency. The present study contributes to an understanding of how advanced age alters signature formation in otherwise healthy adults.  相似文献   
6.
The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity and exposes flaws in popular legal arguments on the subject. Problems of mistaken identity must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence of identity theft and the greater difficulty of authenticating the other transacting party. The trend to preserve the privacy of Internet users indirectly clashes with efforts to ensure transactional security in e-commerce. An indispensable prerequisite of the latter is the ability to identify the other party to the contract. The problem of mistaken identity is not new – but it assumes a different scale in e-commerce transactions.  相似文献   
7.
B. Found  D.K. Rogers   《Science & justice》2005,45(4):199-206
Many forensic document examiners are hesitant to express authorship opinions on photocopied handwriting as the photocopying process results in less feature information than original writing. This study aimed to test the accuracy of 15 examiners' opinions regarding whether photocopied questioned signatures were genuine or simulated. Each examiner received the same set of original signature exemplars, from one individual, and a set of eighty questioned photocopied signatures comprising of genuine and simulated signatures. The overall misleading (error) rate for the grouped examiners' opinions was 0.9% providing strong evidence that examiners can make accurate observations regarding the authorship of non-original handwriting.  相似文献   
8.
The Recall of MPs Act 2015 allows constituents to petition for their MP to be unseated. A petition of recall is opened, for six weeks, if an MP has received a custodial sentence or been suspended from the House of Commons for ten or more sitting days. Should 10 per cent of constituents sign the petition, a by‐election is required, which the deposed MP has the right to contest. The first test of the Act came in 2018, when Ian Paisley, MP for North Antrim, was suspended from the Commons for thirty days. This article examines how the Act was implemented and assesses whether procedural oddities played any part in the petition failing to attract sufficient signatures to trigger a by‐election.  相似文献   
9.
10.
Identity-based cryptography has attracted attention in the cryptographic research community in recent years. Despite the importance of cryptographic schemes for applications in business and law, the legal implications of identity-based cryptography have not yet been discussed. We investigate how identity-based signatures fit into the legal framework. We focus on the European Signature Directive, but also take the UNCITRAL Model Law on Electronic Signatures into account. In contrast to previous assumptions, identity-based signature schemes can, in principle, be used even for qualified electronic signatures, which can replace handwritten signatures in the member states of the European Union. We derive requirements to be taken into account in the development of future identity-based signature schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号