首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A law firm can be understood as a social community specializing in the speed and efficiency of creating and transferring legal knowledge. Knowledge management was first introduced to law firms in order to help them create, share and apply knowledge more effectively: information technology (IT) might well play an important role in the success of such knowledge management initiatives. In this paper, IT support for knowledge management is linked to stages of growth, with a stages‐of‐growth model proposed that consists of four stages. The first stage addresses the end‐user tools made available to knowledge workers (people to technology), while the second involves information about who knows what (people to people). The third stage concerns the information held by knowledge workers (people to documents), with information systems actually solving knowledge problems constituting the fourth and final stage (people to systems). Stages‐of‐growth models have been widely used in both organizational research and IT management research: such models have also been criticized for their lack of empirical validity. This paper develops such a survey instrument in order to test a knowledge management technology stage model empirically.  相似文献   

2.
The article deals with the interaction of computers, informationtechnology, and legal education. It considers the technical achievementsof communications and information technology (C&IT) in the practiceand teaching of law, then the jurisprudential paradigms which underliethese issues. To the extent to which law is conceived as a form ofinformation, existing assumptions about the theory, practice, andteaching of law are challenged. Where, on the other hand, law is regardedas a collection of rules, reversal to formalism, driven by C&IT, isidentified as a concern for socio-legal scholars. Other concerns addressedby this article include the exclusive economics of the C&IT revolution,the power dynamics of technophobia, and the interaction of computersand gender. The article concludes with suggestions for alternative visonsof the future of C&IT and legal education.  相似文献   

3.
Crime Mapping and the Training Needs of Law Enforcement   总被引:4,自引:0,他引:4  
This paper explores some of the more recent developments within crime mapping and the broader application of geographical information technology within law enforcement. The information technology (IT) revolution and the reduction in computing costs since the 1980s has brought a range of analytical tools within the budgets of most police services, and one of the most significant changes has been in the way that spatial data are handled. Law enforcement has strong geographic currents at all levels of the organisation, and this paper examines three applications of geographical information systems (GIS) within policing: hotspot mapping; CompStat; and geographic profiling. The paper concludes by discussing the future training needs using a simple model of intelligence-led crime reduction. This model suggests that training for managers to enable a greater understanding of the analyses presented to them, and how to use mapping to further crime prevention and reduction, may be as important as increasing the technical ability of crime analysts. The challenge for the immediate future of crime reduction practice in law enforcement is less to worry about the training of analysts, and more to address the inability of law enforcement management to understand and act on the crime analysis they are given.  相似文献   

4.
《Digital Investigation》2014,11(3):160-174
Immature IT security, increasing network connectivity and unwavering media attention is causing an increase in the number of control system cyber security incidents. For forensic examinations in these environments, knowledge and skills are needed in the field of hardware, networks and data analysis. For forensic examiners, this paper is meant to be a crash course on control systems and their forensic opportunities, focussing on the differences compared to regular IT systems. Assistance from experienced field engineers during forensic acquisition of control systems seems inevitable in order to guarantee process safety, business continuity and examination efficiency. For people working in the control system community, this paper may be helpful to get an idea about specific forensic issues about which they would normally not bother, but may be crucial as soon as their systems are under attack or become part of a law enforcement investigation. For analysis of acquired data, existing tools for network security monitoring have useful functionality for forensic applications but are designed for real-time acquisition and often not directly usable for post-mortem analysis of acquired data in a forensically sound way. The constant and predictable way in which control systems normally behave makes forensic application of anomaly-based threat detection an interesting topic for further research.  相似文献   

5.
Abstract

Electronic legal education involves the use of information, communication and instructional technologies to enhance students’ learning of the law and to provide law teachers with environments and tools for teaching the law. With the fast growth of the Internet many Law schools and Law faculties are moving their education and training into web environments. This may open new ways of teaching and learning the law by providing students with an environment in which they can manage legal information and legal knowledge for their personal professional use. However, it is clear that throughout Europe there are divergent as well as convergent uses of the web and IT This article explores some of the issues inherent in this, and suggests a number of projects that would enable ICT in legal education to facilitate the aims of the Sorbonne‐Bologna process.  相似文献   

6.
Interpreting the content of the law is not limited to what a relevant lawmaker utters. This paper examines the extent to which implied and implicit content is part of the law, and specifically whether the Gricean concept of conversational implicature is relevant in determining the content of law. Recent work has focused on how this question relates to acts of legislation. This paper extends the analysis to case law and departs from the literature on several key issues. The paper's argument is based upon two points: (1) Precedent‐setting judicial opinions may consist of multiple conversations, of which some entail opposing implicata, and (2) if a particular precedent‐setting judicial opinion consists of multiple conversations, of which some entail opposing implicata, then no meaningful conversational implicatum is part of the content of that particular precedent‐setting opinion. Nevertheless, the paper's conclusion leaves open the prospect of gleaning something in between conversational implicature and what is literally said, namely, conversational impliciture.  相似文献   

7.
二十世纪初,美国法学进行了一场与心理学的交叉研究尝试。心理学家闵斯特伯格首倡进行法学与心理学的交叉研究,受到著名法学家威格摩尔的激烈反击以及一些心理学家的反对。但是,也有部分心理学家随后开始进行法律行为实验研究及法律心理学研究,法学界的著名学者哈钦斯针对一系列具体主题进行法学与心理学的交叉研究,而威格摩尔在反击之后也开始在这一领域展开研究。此次交叉研究为二战后行为法学派在美国法学界的兴起提供了基础。我们可以由此思考法学对于交叉研究的接受度,以及那个时代心理学影响法学研究的可能。并通过20世纪美国法学各类交叉研究的繁荣,反思我国当下司法实践的现代化变革及法学研究范式的发展。  相似文献   

8.
Judges articulate their role in controversial cases of medical ethics in terms of deference to Parliament, lest their personal morality be improperly brought to bear. This hides a wide range of law‐making activities, as parliamentary sovereignty is diffused by ‘intermediate law‐makers’, and judicial activity is more subtle than the deference account implies. The nature of litigation raises questions about the contributions of other legal personnel and also the nature of the parties' interests in test‐cases. While judges demonstrate an awareness of some of these issues and anxiety about the constitutional legitimacy of their work, a more nuanced account is needed of their proper role. This may be built on Austin's theory of tacit legislation. It may draw from human rights law. However, considerable work is required before the complexities of hidden law‐making can be properly incorporated into the province of medical jurisprudence.  相似文献   

9.
Abstract

I have been teaching Ethnic Minorities and the Law at undergraduate and Masters level for some eight years now. It is my conviction that the subject has achieved a certain maturity and that it is high time that serious notice was taken of it in legal education circles at all levels. This article presents some reflections on approaches adopted and experiences of being involved in teaching this field. In the next section some of the reactions that are likely to be encountered when working in this area are discussed briefly. In the following section the nature and extent of ethnic diversity in the UK are outlined, and some of the limits in academic and policy conceptualisations of this diversity are highlighted. There follows a critical discussion of the various paradigms within which legal knowledge has framed discussion relating to ethnic minorities in the UK. This forms a prelude to the introduction of legal‐pluralist perspectives which, it is argued, offer the most positive approach in the area of ethnic minority legal studies. Lastly, some of the practical issues that arise in teaching about ethnic minorities in law are discussed.  相似文献   

10.
Issues of Internet jurisdiction remain a key challenge for the application of law to the online environment. Despite of a large volume of academic writings on the topic, these issues continue to be perceived as complex and inaccessible. This article aims to provide an accessible introduction to private international law as it applies to the Internet. As such, it is hoped that it may be a useful resource for courses in IT law, Internet law, e-commerce law or the like, as well as for anyone looking to refresh their understanding of exactly what it is that people are struggling with in the field we may call Internet jurisdiction.  相似文献   

11.
A number of articles have been written about IT law aspects of the euro, and there is the implication that there is something special about euro implementation from the IT law point of view. While there are particular issues arising with the rounding and conversion rules, the conclusion in this article is that, even though the euro is not 'just another currency', a euro IT project is just like most other complex IT projects … only more so. A euro IT project for a multinational in Europe could be as big as any which that company has yet handled, because it may well involve the introduction of entirely new financial and accounting systems. For that reason, customers should follow proper contractual and project procedures. Suppliers should be careful about what they include in their warranties and specifications and should avoid over-general or overgenerous warranties. In response, end-users must allow as much time as possible, make the effort to scope their requirements, to understand what they need, and to make sure that their contracts and schedules capture all those needs.  相似文献   

12.
Abstract

Situated learning, focusing on the pragmatic and social aspects of learning, has as its basis the notion that learning is essentially dependent on the immediate situation of action. It is a strength of the theory that it supports learner‐centred instructional design (ID), and supports a constructivist approach to ID. Nevertheless, even a learner‐centred theory such as situated learning requires more if its product is to be successful in facilitating learning. Student learning requires management at every level: within individual learning activities, within a module syllabus and within a curriculum. The contextual issues which go to make up such management, and the relations between situated learning theory and learning management, are the focus of this paper. We shall argue that it is essential for the success of embedded IT that instructional designers pay attention to learning management issues, that they signal the presence of these issues in their courseware documentation, and that lecturers and tutors who use the courseware should take these issues into account when implementing and embedding computer‐based learning in the curriculum.

As an example of this argument we take our computer‐based learning program the Virtual Court Action. This program was designed to be used in the learning and teaching of procedural law in a Scottish university law curriculum. Using document assembly techniques and email, this program emulates part of a civil court action in a Scottish court, with identical personnel, legal documents and procedure. The place of situated learning theory in its design is described, and the learning management issues germane to its implementation are analysed. Finally, we show how the attention paid to learning management issues contributed to the success of the program.

‘Acting on the world to learn about concepts is not a straightforward issue.‘1

‘Old‐fashioned pocket knives … have a device for removing stones from horses’ hooves. People with this device may know its use and be able to talk wisely about horses, hooves and stones. But they may never betray ‐ or even recognise ‐ that they would not begin to know how to use this implement on a horse.‘2  相似文献   

13.
There are a number of salient public policy issues in the family law field that have invoked impassioned policy debates on a recurrent basis. In the absence of a body of research to address these critical concerns, advocates under the guise of social science scholarship have exacerbated the confusion and controversy by construing the scant available research evidence to justify their own ends, without regard to the relevance, quality, utility, and limitations of the studies. This is one of two articles on this problem that we have named “scholar‐advocacy bias.” In this article, we discuss the difference between truth in social science and truth in law. We identify common ways in which social science researchers and reviewers of research—wittingly or unwittingly—can become advocates for ideological positions and social policies at the expense of being balanced reporters of research evidence as illustrated by recent debates about overnight parenting of infants and toddlers. We also consider how adherence to established scientific principles and methods prevents the misuse of research in this way.  相似文献   

14.
If 'computing and law' as a discipline is to push forward and develop, it will do so best within the context of the law school rather than as a joint enterprise between law and other disciplines. It is in the law school that the understanding of the nature of law is at its height. Yet there are problems here-law schools have a strained relationship with technology and their concept of the breadth of 'legal scholarship' can be limited by conventional (or ideologically-biased) views of law and an undergraduate-oriented view of the law school's purpose. There are also problems arising from the nature of communications between lawyers and computer scientists. In this article, I highlight these problems and also argue for a more developed and extended view of legal scholarship which will be able to incorporate study and research of the impact of the computer upon legal society as well as the legal control of the unwanted elements arising from these new technologies. Most writings on IT and the law school concentrate upon its use as an educational tool. My interest here is not so much in this side of things, but in the research culture of the law school. Whilst there is sometimes a view that the linkage of law school and IT is purely related to the use of technology in legal education, the remit is wider and includes the understanding of the link between substantive law and the context of the new computerized world and also the impact of the computer in the practice of law. This latter aspect is becoming increasingly important with the Woolf reforms and computerization of the procedural elements of law, but also in substantive law: for example, administrative systems are becoming more and more mediated by technology, and administrative law must be reviewed and re-worked in this context.  相似文献   

15.
There is a simple view of the role of C&IT (computers and information technology) in the legal academy that states, 'C&IT is just a tool. Use it or abuse it as you will. It has no ideology. It can no more be a bad thing than can a car or a chisel'. It is an additional resource on top of whatever we had before. I want to link that claim to a set of analogous claims about the relationship between law and science and law and mathematics, and subject them to scrutiny. I shall call these claims (that science, mathematics and computers are 'just' tools) collectively the 'neutrality claim'. So far as concerns computers, I shall suggest that C&IT in law has a tendency either towards reaction or towards reductionism in how we understand law in the academy. I will finish by considering an area in which computers have been relatively more successful-chess-and trying to work through the similarities and distinctions.  相似文献   

16.
Failed IT projects cost the taxpayer millions every year and consequently there is an increasing recognition that IT projects must be sufficiently flexible to deal with the never-ending revolution in the field of information technology. This article explores the issues involved.  相似文献   

17.

The pilot study reported here was a one‐off study about self‐assessment by students of a law assignment (a problem in the law of Tort). The project was conceived as a result of concern about too much assessment/marking and its effect on staff time (and research and other scholarly activities) and also as a result of discussions the author had with his faculty colleagues and other colleagues outside his institution. This report focuses on the following issues: definition and problems of self‐assessment, aims of the study, review of the literature, method of study, findings and discussion of the findings.  相似文献   

18.
CLSR welcomes occasional comment pieces on issues of current importance in the law and technology field. In this note Christopher Rees of Taylor Wessing LLP, London offers a personal viewpoint on current projects connected with digital identity and Geoinformation and what such research tells us about the future direction of Information Law.  相似文献   

19.
Cloud computing is a technology that facilitates improved productivity, improved efficiency and lower costs. This technology has the potential to improve the reliability and scalability of organizational systems and leads to an enhanced focus on core business and strategy. Despite the Australian Federal Government's ‘cloud-first’ strategy and policies and the Queensland State Government's ‘digital-first’ strategy, the adoption of cloud services at the local government level has been limited, largely due to a lack of specificity among government regulations and a lack of regulations that provide support to local governments. This empirical study deploys a mixed research method designed to develop a cloud regulations model to assist governments in adopting cloud computing services. By integrating Australian Cloud Policy Frameworks with the extant research on cloud computing, this study conducted 21 field interviews with Information Technology (IT) managers and surveyed 480 IT staff from Australia's 47 local governments. This research paper presents and validates a revised set of factors used to develop government regulations specific to cloud computing adoption. The factors that we found to be statistically significant were cost, quality of services, security, privacy, management, government-based facilitating conditions, and firm-based facilitating conditions regulations. Based on these findings, this research concludes that government regulation is a significant aspect in decision making for the adoption of any new technology such as cloud computing.  相似文献   

20.
Public administrations have experienced in the last two decades a revolutionary process concerning procedures and instruments. The success of the PA services based on IT technologies has produced new needs for providing even more advanced services and solutions. One technology that has been attracting the research community is agent technology. This paper will describe how agent technology could be exploited to enhance PA services and discuss the issues related to their implementation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号