首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14篇
  免费   2篇
法律   8篇
中国政治   2篇
政治理论   2篇
综合类   4篇
  2022年   1篇
  2019年   1篇
  2017年   1篇
  2015年   1篇
  2014年   2篇
  2013年   2篇
  2011年   1篇
  2010年   1篇
  2008年   1篇
  2007年   1篇
  2006年   2篇
  2005年   1篇
  2003年   1篇
排序方式: 共有16条查询结果,搜索用时 448 毫秒
1.
本文利用博弈论的研究方法,分析了权利身份化背景下集体剩余的存在以及女性和集体之间挤出博弈的展开,认为女性土地权益被侵害的体制根源在于土地权益的身份化,而女性土地权益的保护,归根到底也要通过土地权益的个体化或去身份化来完成。  相似文献   
2.
黄玉寅 《时代法学》2014,(1):114-120
澳门《娱乐场幸运博彩经营法律制度》第44条规定了三种特殊情境下政府得暂时介入博彩企业之经营,该条款十余载间却始终遭受政府弃用.公共政策的肇因固然可解释缘何第44条难以完成从“纸面中的法”向“行动中的法”的嬗变,但分析表明,条款自身的粗陋与模糊亦是澳门政府“弃法不用”的直接原因.基于性质归属,暂时介入是行政即时强制之一种,其蕴藏弱规制与强规制手段的双重品性.依此,文章以法治政府建设的二维要素——“合法性”与“最佳性”为分析工具,对暂时介入的启动时机、启动条件、介入主体、介入程序等进行了缜密设计,希冀能为暂时介入条款的完善提供修改路径与方向.  相似文献   
3.
This paper reports on a number of Eurobarometer surveys undertaken by the European Commission as a way of reflecting on Brexit and the challenges it poses to European identity. Our work with the surveys has been undertaken in the context of developing an educational game (RU EU?) which will explore European identity. European citizenship and identity have been strongly promoted by the EU but, while they appear to have been accepted at an elite level, the EU—and the UK in particular—have so far not constructed a narrative which has been supported by ‘ordinary’ citizens. Brexit has therefore exposed the failings of European elites in this regard. That said, there is some evidence that the complexities of Brexit have led to a strengthening of European identity in the other EU 27 countries.  相似文献   
4.
吕炳斌 《法学研究》2022,44(1):153-170
美国在知识产权全球治理中呈现出一味强化权利保护的价值倾向。受其影响,知识产权保护的国际规则呈现不断强化之势。但是,美国在国内法中存在对知识产权强化保护的平衡机制,有别于其对外片面输出强化保护规则。一味强化保护的知识产权制度会走向偏颇。我国在知识产权国际博弈和对话中需要提出自己的话语和话语体系,其前提是明确本国话语的价值取向。相比历史、文化取向而言,话语构造的价值取向路径具有优越性。在国际博弈中,我国宜秉持并提倡知识产权法的二元价值取向。二元价值取向契合知识产权法基本原理,体现了世界共同价值,其核心作用在于纠偏,我国应坚持和发扬这一价值取向。  相似文献   
5.
军事立法关乎国家、政府、军队、社会组织和个人多个权利主体的利益,所体现的权利和义务关系具有复杂性和多样性。军事法律制度要蕴含合理的经济理性,需要应用资源的稀缺性、主体行为的外部性和主体资源的有限性、主体诚信有限性等有关经济学理论来反映社会经济关系赋予军事法律制度的规定性。军事立法的经济学分析路径应遵循以下几个方向:军事权力与军人权益配置效率最大化,军事法律责任预防最优化,军事法律程序成本最小化等。这样研究的目的是达到:军事行为主体的对策行为均衡以促进合作、保障合作,军事立法多目标博弈均衡。  相似文献   
6.
We tested whether simulated child sexual abuse (CSA) interviews with computer-generated child avatars could improve interview quality. Feedback was provided not only on question types, as in previous research, but also on whether the conclusions drawn by the interviewers were correct. Twenty-one psychology students (average age M = 24.5) interviewed four different avatars which had a simulated story of either abuse or non-abuse. The participants were randomly divided into two groups: one received feedback on question types and conclusions after each simulated interview and the other one did not receive any feedback. Avatars revealed pre-defined ‘memories’ as a function of algorithms formulated based on previous empirical research on children's suggestibility. The feedback group used more open-ended and fewer closed questions. They also made more correct conclusions and found more correct details in the last two interviews compared to the no-feedback group. Feedback on both the question types and conclusions in simulated CSA interviews with avatars can improve the quality of investigative interviews in only one hour. The implications for training practice were discussed.  相似文献   
7.
8.
村落家族与村民自治在乡村政治中的博弈   总被引:1,自引:0,他引:1  
在国家行政化高度整合机制发生裂解和转换之后,村民在农村社会生活中重新借重血缘群体的力量,家族在村落成员的各个层面具有巨大的影响力。虽然村民自治是一种政府体制安排,但这种政治形态根植于多样化的制度性冲击和约束,也受到了农村经济制度状况以及由此决定的利益结构的制约和影响。因而我国乡村政治民主化进程始终伴随着村落家族与村民自治的博弈,在两者的博弈过程中,既可能产生冲突与紧张,又可能相互制衡甚至达成均衡。  相似文献   
9.
本文分析了现行价格听证制度面临的挑战,然后提出了基于讨论式博弈和综合集成技术的模拟听证方法,并对其参与者构成、过程安排、实际操作等进行了讨论。  相似文献   
10.
Criminal Exploitation of Online Systems by Organised Crime Groups   总被引:1,自引:0,他引:1  
This article considers how information and communications technologies (ICT) can be used by organised crime groups to infringe legal and regulatory controls. Three categories of groups are identified: traditional organised criminal groups which make use of ICT to enhance their terrestrial criminal activities; organised cybercriminal groups which operate exclusively online; and organised groups of ideologically and politically motivated individuals who make use of ICT to facilitate their criminal conduct. The activities of each group are then assessed in relation to five areas of risk: the use of online payment systems, online auctions, online gaming, social networking sites and blogs. It is concluded that the distinction between traditional organised crime groups and the other two groups—cybercriminal groups and ideologically/politically motivated cyber groups—is converging, with financially-motivated attacks becoming more targeted. Legislation will need to adapt to deal with new technological developments and threats that organised criminals seek to exploit.
Russell G. SmithEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号