排序方式: 共有16条查询结果,搜索用时 448 毫秒
1.
本文利用博弈论的研究方法,分析了权利身份化背景下集体剩余的存在以及女性和集体之间挤出博弈的展开,认为女性土地权益被侵害的体制根源在于土地权益的身份化,而女性土地权益的保护,归根到底也要通过土地权益的个体化或去身份化来完成。 相似文献
2.
澳门《娱乐场幸运博彩经营法律制度》第44条规定了三种特殊情境下政府得暂时介入博彩企业之经营,该条款十余载间却始终遭受政府弃用.公共政策的肇因固然可解释缘何第44条难以完成从“纸面中的法”向“行动中的法”的嬗变,但分析表明,条款自身的粗陋与模糊亦是澳门政府“弃法不用”的直接原因.基于性质归属,暂时介入是行政即时强制之一种,其蕴藏弱规制与强规制手段的双重品性.依此,文章以法治政府建设的二维要素——“合法性”与“最佳性”为分析工具,对暂时介入的启动时机、启动条件、介入主体、介入程序等进行了缜密设计,希冀能为暂时介入条款的完善提供修改路径与方向. 相似文献
3.
Murray Stewart Leith Duncan Sim Arno van der Zwet Elizabeth Boyle 《The Political quarterly》2019,90(3):559-564
This paper reports on a number of Eurobarometer surveys undertaken by the European Commission as a way of reflecting on Brexit and the challenges it poses to European identity. Our work with the surveys has been undertaken in the context of developing an educational game (RU EU?) which will explore European identity. European citizenship and identity have been strongly promoted by the EU but, while they appear to have been accepted at an elite level, the EU—and the UK in particular—have so far not constructed a narrative which has been supported by ‘ordinary’ citizens. Brexit has therefore exposed the failings of European elites in this regard. That said, there is some evidence that the complexities of Brexit have led to a strengthening of European identity in the other EU 27 countries. 相似文献
4.
美国在知识产权全球治理中呈现出一味强化权利保护的价值倾向。受其影响,知识产权保护的国际规则呈现不断强化之势。但是,美国在国内法中存在对知识产权强化保护的平衡机制,有别于其对外片面输出强化保护规则。一味强化保护的知识产权制度会走向偏颇。我国在知识产权国际博弈和对话中需要提出自己的话语和话语体系,其前提是明确本国话语的价值取向。相比历史、文化取向而言,话语构造的价值取向路径具有优越性。在国际博弈中,我国宜秉持并提倡知识产权法的二元价值取向。二元价值取向契合知识产权法基本原理,体现了世界共同价值,其核心作用在于纠偏,我国应坚持和发扬这一价值取向。 相似文献
5.
军事立法关乎国家、政府、军队、社会组织和个人多个权利主体的利益,所体现的权利和义务关系具有复杂性和多样性。军事法律制度要蕴含合理的经济理性,需要应用资源的稀缺性、主体行为的外部性和主体资源的有限性、主体诚信有限性等有关经济学理论来反映社会经济关系赋予军事法律制度的规定性。军事立法的经济学分析路径应遵循以下几个方向:军事权力与军人权益配置效率最大化,军事法律责任预防最优化,军事法律程序成本最小化等。这样研究的目的是达到:军事行为主体的对策行为均衡以促进合作、保障合作,军事立法多目标博弈均衡。 相似文献
6.
We tested whether simulated child sexual abuse (CSA) interviews with computer-generated child avatars could improve interview quality. Feedback was provided not only on question types, as in previous research, but also on whether the conclusions drawn by the interviewers were correct. Twenty-one psychology students (average age M = 24.5) interviewed four different avatars which had a simulated story of either abuse or non-abuse. The participants were randomly divided into two groups: one received feedback on question types and conclusions after each simulated interview and the other one did not receive any feedback. Avatars revealed pre-defined ‘memories’ as a function of algorithms formulated based on previous empirical research on children's suggestibility. The feedback group used more open-ended and fewer closed questions. They also made more correct conclusions and found more correct details in the last two interviews compared to the no-feedback group. Feedback on both the question types and conclusions in simulated CSA interviews with avatars can improve the quality of investigative interviews in only one hour. The implications for training practice were discussed. 相似文献
7.
8.
村落家族与村民自治在乡村政治中的博弈 总被引:1,自引:0,他引:1
刘华安 《广东行政学院学报》2006,18(6):36-39
在国家行政化高度整合机制发生裂解和转换之后,村民在农村社会生活中重新借重血缘群体的力量,家族在村落成员的各个层面具有巨大的影响力。虽然村民自治是一种政府体制安排,但这种政治形态根植于多样化的制度性冲击和约束,也受到了农村经济制度状况以及由此决定的利益结构的制约和影响。因而我国乡村政治民主化进程始终伴随着村落家族与村民自治的博弈,在两者的博弈过程中,既可能产生冲突与紧张,又可能相互制衡甚至达成均衡。 相似文献
9.
基于讨论式博弈和综合集成技术的模拟听证:完善现行价格听证制度的一种途径 总被引:2,自引:0,他引:2
本文分析了现行价格听证制度面临的挑战,然后提出了基于讨论式博弈和综合集成技术的模拟听证方法,并对其参与者构成、过程安排、实际操作等进行了讨论。 相似文献
10.
This article considers how information and communications technologies (ICT) can be used by organised crime groups to infringe
legal and regulatory controls. Three categories of groups are identified: traditional organised criminal groups which make
use of ICT to enhance their terrestrial criminal activities; organised cybercriminal groups which operate exclusively online;
and organised groups of ideologically and politically motivated individuals who make use of ICT to facilitate their criminal
conduct. The activities of each group are then assessed in relation to five areas of risk: the use of online payment systems,
online auctions, online gaming, social networking sites and blogs. It is concluded that the distinction between traditional
organised crime groups and the other two groups—cybercriminal groups and ideologically/politically motivated cyber groups—is
converging, with financially-motivated attacks becoming more targeted. Legislation will need to adapt to deal with new technological
developments and threats that organised criminals seek to exploit.
相似文献
Russell G. SmithEmail: |