首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The Internet remains the odd child of international law. While forever more universal law venues such as conferences, edited volumes or research projects consider “the Internet” a peculiar, interesting aspect of its well-recognized disciplines, international scholarship fails to address the global network as a whole, stalling the application of the fully developed and well-suited international law apparatus to the global community's biggest contemporary challenge. “Internet governance” is still perceived by legal scholars as construed to international relations and, at best, a potential ground for soft law in a distant future. That is not the case: Internet governance, with all its challenges, has been shaping international law for almost two decades. The latest unveilings of the ways in which the Internet impacts global policies and laws caught the public eye with the 2018 Cambridge Analytica scandal and, previously, with the 2013 Snowden revelations, yet as surprising as they might have been to the average user, they are direct results of network's architecture and its governance model. This paper looks at the evolving concept of “Internet's public core” as an opportunity to bridge this dogmatic gap. We identify the scope and meaning of “Internet's core” and assess its legitimacy within existing international normative frameworks. We argue that the technical components crucial to the flawless operation of the global network, such as the Domain Name System and Internet's backbone networks, can be effectively protected with international law.  相似文献   

2.
《Justice Quarterly》2012,29(2):237-258

This article is an inquiry into the role of scandal in controlling organizational deviance. It examines the dynamics of scandal and the limits of the scandal process in producing organizational reform. The history of scandal and reform in the FBI (1950–83) provides the empirical basis for the inquiry.

It is concluded that a strategy of increasing public access to “normally” concealed organizational information, which would strengthen public disclosure of organizationally deviant practices, is also a strategy for controlling organizational deviance. The study finds that some aspects of organizational structure and process are more subject to change through the mechanism of scandal than other aspects.  相似文献   

3.
4.
5.
Abstract. This paper combines reflections on the current “state of war” in the Middle East with an epistemological discussion of the meaning and implications of the category “war” itself, in order to dissipate the confusions arising from the idea of a “War on Terror.” The first part illustrates the insufficiency of the ideal type involved in dichotomies which are implicit in the naming and classifications of wars. They point nevertheless to a deeper problem which concerns the antinomic character of a collective institution of violence. The second part discusses the extent to which, in spite of the historical transformations in the means and political objectives of wars, the contemporary confrontation still obeys the rules of warfare described by Clausewitz, particularly with respect to temporality (“friction”). The third part discusses “non‐clausewitzian” aspects of the “new wars” defined by Martin Van Creveld and Mary Kaldor, while suggesting that they have left aside the most salient contradiction illustrated by the US interventions, which results from the combination of a claim to universal sovereignty and a reduction of war to generalized police operations.  相似文献   

6.
This article presents a critical reevaluation of the thesis—closely associated with H. L. A. Hart, and central to the views of most recent legal philosophers—that the idea of state coercion is not logically essential to the definition of law. The author argues that even laws governing contracts must ultimately be understood as “commands of the sovereign, backed by force.” This follows in part from recognition that the “sovereign,” defined rigorously, at the highest level of abstraction, is that person or entity identified by reference to game theory and the philosophical idea of “convention” as the source of signals with which the subject population has become effectively locked, as a group, into conformity.  相似文献   

7.
The superposition of artificial intelligence (AI) and non-state power has aggravated changes in state functions, and has downgraded centralism of political state. The “Intelligent Leviathan” will persist in objectifying the “individual.” The relationship mode of “human-human” being transformed into the mode of “humantechnology-human, ” is giving rise to a new social structure, while state power together with non-state power, law and the algorithm, as well as ethics and technologies, are creating a new order. The major threat to freedoms and rights is horizontal non-state power, instead of vertical state power. Going through profound changes, legal scenarios need reconstruction of “kindness” dimension for balancing the “rights priority” theory, while the “obligations standard” should be recovered in the sense of legal technology to rectify the “rights standard” and to resolve the “rights disability.”  相似文献   

8.
One of the major changes that has taken place over the past twenty to thirty years has been the extension of the legal recognition and protections for same-sex relationships in a wide range of countries. A number of jurisdictions, including China, are considering the approach that they will adopt. This article seeks firstly to consider the justifications for the legal recognition of same-sex relationships by the state. Three main, compelling rationales are identified which are rooted in notions of the equality of all persons, the dignity and liberty of individuals to form close personal relationships, and the social benefits of recognizing close, personal relationships of same-sex couples. The second part of this article then turns to consider the manner in which same-sex relationships should be recognized. Four models are identified: a “Partial Rights” model; a “Civil Partnerships” model; a “Marriage Equality” model, and a “Diversity of Relationships” model. Reasons for and against these particular models will be examined. In the conclusion, it shall be argued that the choice of model that has been adopted can be seen to depend on a number of factors: the manner in which equality is conceived in that society; the understanding of same-sex relationships therein, and the religious and cultural opposition to same-sex relationships in that society. The models are also not states of affairs that are fixed for all time and many countries have progressed from less extensive forms of recognition to wider recognition over time. Ultimately, it shall be argued that the rationales underlying the recognition of close personal relationships in the law support the “Marriage Equality” model or the “Diversity of Relationships” model. This article thus seeks to provide an understanding of the rationales and models for recognizing same-sex relationships that have been adopted around the world: Its focus is thus comparative but may, in this way, be useful to lawmakers and advocates for legal reform in this area in China and other jurisdictions around the world.  相似文献   

9.
PurposePublic opinion scholarship has identified the media as a driving force behind decidedly negative public sentiment about crime and justice. We draw on this media cultivation framework to examine whether the highly publicized sexual abuse scandal within the Catholic Church impacted public opinion.MethodsUsing data from a 2010 CBS/New York Times national poll we investigate how exposure to news coverage detailing the abuse affected levels of public confidence in the Church’s ability to protect children.ResultsContrasting with prior research, we uncovered a positive impact of media exposure. Catholics with greater media consumption about the scandal were significantly more confident in the Church’s ability to prevent sexual abuse. In addition, indicating a “boomerang” effect of coverage, Catholics who felt the media coverage unfairly targeted the Church held more optimistic views. Supporting the substitution thesis, religiosity mediated these effects among this group. This positive impact was not just limited to Catholics, however. Non-Catholics who perceived the media coverage to be biased felt more positively about the Church’s ability to address sex crime in the future.ConclusionMedia consumption of the sexual abuse scandal does not exert a negative influence on public confidence in the Church.  相似文献   

10.
This article describes the almost total failure of legal systems to criminalize, regulate or restrict the crimes of capitalism and its institutions in the “uber/gig” economy. It examines how the technologically-enabled theft of time, space and wages from employees has been normalized and even celebrated. These unregulated excesses have exacerbated political, cultural and economic inequality and threatened or destroyed quality of life for millions. To understand why and how these harmful practices have attracted so little regulatory or criminal attention, the article examines how neoliberal capitalism, in its constant search for new ways to outsource costs and maximize profits, intersects with the democratic state and its professed obligation to prevent capital from “going too far” at the expense of citizens of that state.  相似文献   

11.
In traditional or Old China, (especially from the 1890s through 1940s), soldiers seemed to enjoy “unlimited” opportunities to engage in bandit activities (e.g., looting villages, setting civilian houses on fire, extorting landlords, abducting and trafficking children, gang raping women, etc.). One important factor that allowed these armed personnel to commit various criminal acts was that China did not have an integrated military system before the 1950s. Therefore, state managers usually could not supervise (let along regulate) the behavior of soldiers. Given that an institutionalized system that could put soldiers under state control was missing, it was not surprising that when soldiers were sent to a certain battlefield that villages, rural towns, and cities surrounding that combat zone were always raided and looted by soldiers turned bandits. Unlike those “wicked” soldiers who became involved in various social evils related to banditry, hundreds of thousands of “good” bandits in Old China joined regular troops. This “righteous act” basically was connected with the fact that almost all bandits, as desperados, lived in a “Darwinian” world. Since this world is governed entirely by the law of competition (i.e., only the “strongest” and the “smartest” could survive), leaders of bandit gangs usually could not ascertain whether they can continue doing those “businesses” that do require investment in the foreseeable future. As a result of this uncertainty, joining regular armies (if this “application” was officially approved by the authorities) was normally the “best choice” for armed bandits (whether they were core members or followers). In other words, becoming a part of government troops usually allowed chiefs and adherents of bandit gangs to enjoy miscellaneous benefits (such as formal military rank, social position, and state-controlled resources like stipend, ammunition, and weapons). As these benefits include the elements of legitimacy and economic security, “big brothers” of bandit blocs generally wished that their personal troops could be transformed into part of the formal troops in order that the marginalized and illicit status of such private troops be terminated. In this paper, the issue of military delinquency will be explored; by using the interactive relationship between Chinese soldiers and Chinese bandits during the period of late-nineteenth to mid-twentieth centuries as an example, the goal of this article is to examine those socioeconomic contexts that provide military personnel with opportunities to perpetrate antisocial or criminal behaviors. Four “Big Jobs” will be performed in this paper: first, the structural factors which, before the 1950s, gave Chinese soldiers opportunities to commit bandit acts will be addressed; then, the environmental causes that motivated marginalized populations (chiefly males) to join bandit gangs will be listed. After these two issues have been inspected, the connection between soldier-bandits and bandit-soldiers will be analyzed. The implications of this relationship will be summarized in the final section.  相似文献   

12.
Forensic mental health providers (FMHPs) typically do not release records to the examinee. The Health Insurance Portability and Accountability Act (HIPAA) federal regulations might change this position, given that they have created a basic right of access to health care records. This legislation has led to a disagreement regarding whether HIPAA regulates forensic evaluations. The primary argument (and the majority of scholarly citations) has been that such evaluations do not constitute “health care.” Specifically, in this position, the nature and purpose of forensic evaluations are not considered related to treatment (amelioration of psychopathology) of the patient. In addition, it asserts that HIPAA applies solely to treatment services; thus, forensic evaluations are inapplicable to HIPAA. We describe the evidence for and against this argument, the strengths and limitations of the evidence, and recent court decisions related to it. The weakest part of the “HIPAA does not regulate forensics” argument is that HIPAA has no exclusion criteria based on type of services. It only creates an inclusion criteria for providers; once “covered,” all services provided by that provider are thence forward “covered.” Authoritative evidence for patient access can be found in the HIPAA regulations themselves, the US Department of Health and Human Services’ commentaries, additional statements and disciplinary cases, the research literature, other agency opinion, and legal opinion. It appears that the evidence strongly suggests that, for those forensic mental health practitioners who are covered entities, HIPAA does apply to forensic evaluations. The implication is that FMHPs potentially face various federal, state, and civil sanctions for refusing to permit patient access to records.  相似文献   

13.
On the morning of December 17, 1827, nine convicts were executed by public hanging in Hobart Town, the capital of the British colony of Van Diemen's Land (now the Australian state of Tasmania). Two months previously they had drowned senior Constable George Rex on Small Island, which was part of the penal settlement at Macquarie Harbor, in front of five bound and gagged witnesses. They offered no defence at their trial. Examination of the Tasmanian colonial convict records shows that “suicide by lottery” involved convicts choosing two men, one to die and the other to kill him. The witnesses would earn a respite when taken away for the trial, and the murderer would be executed. “Death by gallows” could be considered a nineteenth‐century version of an orchestrated suicide reminiscent of more modern “death by cop.” This category of “judicial” murder‐suicide expands the range of contemporary classifications of dyadic deaths.  相似文献   

14.

Newspapers as a record of the day's events and chronicle for public business have been part of the United States' unofficial governing system for several hundred years. The expression “newspaper of record”; has specific meaning and import for librarians, historians and lawyers. This article compares the statutory characteristics of “newspapers of record”; with the qualities of modern electronic newspapers delivered by on‐line delivery services. The article concludes that the definitions of “newspapers of record”; used by librarians, historians and statutes may not be met yet by electronic editions of newspapers. Thus, on‐line newspapers may not be able to carry legal notices.  相似文献   

15.
Where does international law (IL) draw its authority from a still weakly institutionalized international scene deprived of the warrants of a state? To address this classical debate, the article draws from a case study on the social and professional structure of the “international legal community” as it emerged during the 1920s as part of the rise of multilateralism and international organizations. It focuses on the “situation of the international lawyers” of the time, starting with the multiple and often antagonistic roles they play (as legal advisers, scholars, judges, diplomats, politicians, etc.) and the variety of interests and causes they defend (states, international organizations, professional interests, etc.) in international politics. It argues this heteronomy of international lawyers helps understand the autonomization of international law. Far from being opposed to one another it has often been assumed—realism and idealism, national loyalty and international loyalty, political logic and learned logic—actually gain when analyzed as various modes of affirming a single cause—that of an international rule of law. This attention given to the “situation of international lawyers” and to the way they manage their various allegiances also accounts for the particular vision of the “International” and of “Law and Politics” relationships that are encapsulated in this emerging international corpus juris.  相似文献   

16.
Magna Carta has long been understood as a source of inspiration for the U.S. Constitution, and especially its enshrinement of the writ of habeas corpus — the right of any prisoner to test his or her detention according to the law. In the “Suspension Clause” of the U.S. Constitution (Article I, Section 8), Congress is granted permission to suspend habeas corpus only “when in cases of Rebellion or Invasion the public Safety may require it.” This article surveys two failed attempts by the U.S. government to suspend the writ of habeas corpus. The first (which was actually the very first such attempt) was in 1807 and followed revelations of the so-called Burr Conspiracy. The second (incidentally the most recent in American history) occurred during the War on Terror and culminated with the Supreme Court’s decision of Boumediene vs Bush in 2008. A close examination of these two historical episodes reveals just how different were the constitutional processes of the early republic and contemporary times. Additionally, comparing the uses of Magna Carta during the two episodes demonstrates marked changes in American political culture. Historical consciousness, vital to early Americans’ understanding of their political system, has shifted to an elite level. Likewise, the protection of fundamental liberties has migrated from the popular branch of government (Congress) to the elite one (the Supreme Court). This article considers the implication of this shift in both constitutional processes and historical consciousness.  相似文献   

17.
贾志强 《法学研究》2022,44(1):120-134
目前我国刑事值班律师制度规范背后折射出有权机关抑制辩方权利的倾向。根据法律规范意旨,只要被追诉人没有辩护人,国家就应“强制指派”值班律师介入案件。将“约见”解读为国家指派值班律师需以被追诉人申请为前提,这混淆了律师会见与介入案件的关系,且将国家责任转嫁给个人,弱化了对被追诉人获得最低限度法律援助权利的保障。相关规范性文件将值班律师阅卷权能限定为“查阅”,但基于法律援助法第37条的文义、控辩平等之程序公正底线要求等因素,值班律师阅卷权能还应包括“摘抄”“复制”。《法律援助值班律师工作办法》第10条第2款规定,值班律师有量刑异议时,只要其认可犯罪嫌疑人认罪认罚的自愿性,就应在具结书上签字。这是对值班律师功能“见证化”的公开宣示,与2018年刑事诉讼法第201条的意旨以及值班律师实质性参与量刑协商的改革要求相矛盾。值班律师应被赋予拒绝签字的权利。“实质性参与”应是目前完善值班律师制度的基本方向。  相似文献   

18.
Gustavo Gozzi 《Ratio juris》2017,30(2):186-204
This essay analyzes the doctrine of “humanitarian intervention” in the frame of international law in the second half of nineteenth century and identifies the ground of legitimation of this intervention in the violation of presumed universal laws of humanity. The analysis emphasizes the transformation of the paradigm of “humanitarian intervention” into the current doctrine of the “responsibility to protect,” which under the rubric of “responsibility” legitimizes limitations on a state's sovereignty in cases where the state fails to guarantee the protection of its own population. This reconstruction of the genealogy of “humanitarian intervention” illustrates the continual exceptions to the principle of nonintervention, which means that the Westphalian principle of sovereignty has always been violated. Both doctrines—humanitarian intervention and the responsibility to protect—can be considered “hegemonic techniques” that use so‐called universal concepts in order to legitimize unilateral power interests.  相似文献   

19.
This article examines trademark parody in statutory and mass media case law by, in part, analyzing several key cases which illustrate the use of quantitative social science research in the determination of trademark parody infringement. Although the definition and nature of trademark parody has not been settled definitively, courts’ attitudes toward survey evidence, particularly its probative value and materiality in the determination of copyright and trademark infringement litigation, have evolved over time. Courts now admit survey evidence if it meets certain methodological conditions. In trademark parody litigation, survey evidence pointing to a “likelihood of confusion” has evolved as the standard test of trademark infringement. However, there are questions whether vague, subjective concepts like “a likelihood of confusion” and “perception of substantial similarity” between trademarks can be adequately measured by consumer surveys. It is argued that multi‐method research which has both quantitative and qualitative aspects would provide more reliable data than the “one‐shot” surveys or case studies that are widely used in settling trademark infringement cases.  相似文献   

20.
《Science & justice》2022,62(3):377-384
Cell service areas may change over time as sites or cells are adjusted, decommissioned or introduced, and there may have been changes between the time of calls and the analysis undertaken. The manner in which survey data is used as part of an analysis is of particular relevance as the data gathered may not reflect the state of the network at the time of calls and thus potentially mislead. Overlaying “historic” data (potentially generated before the calls) with “targeted” surveys (usually generated after the calls) may enable an assessment of possible network changes, or whether additional cells may also have served at a given location at a previous time. This paper outlines a case in which there was a significant time gap between the analysis of call data records and the date on which they were generated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号