首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Over the past few months there has been renewed debate at the UK Intellectual Property Office (“UK IPO”) and in the UK courts over whether computer programs can be considered patentable inventions. In particular, concern persists that the UK authorities and the European Patent Office (“EPO”) are applying different tests for the patentability of computer software, even though they are applying the same legislation. This article reviews the positions taken by the UK and the EPO tribunals, and how these impact upon businesses wishing to patent inventions encompassed in software.  相似文献   

2.
The Juvenile/Family Court has significant problems in dealing efficiently and effectively with its caseload. Due to the pressure of “serious” juvenile crime, a large volume of status offense and minor crime cases, although of significant social consequence, are dismissed by the court. The concept of “neighborhood justice” has provided one basis for dealing with such cases.This is a report of a process evaluation of New Jersey's Juvenile Conference Committee (JCC) program, which provides an extensive network of citizen tribunals as an arm of the court. The evaluation was designed to explore both structural and procedural aspects of the JCC with a focus on policy implications. Results show that the JCC is a major diversion mechanism. Questions are raised, however, as to the purpose of intervention in cases of minor delinquency and the adequacy of current JCC procedures in dealing with such cases. The conclusion is reached that the citizens' tribunal is an important mechanism for community development.  相似文献   

3.
This study investigated the extent to which group influence (and particularly the modeling aspects of groups) specifies the relationship between the certainty of punishment and deviant behavior. An experiment was conducted in which sixty males played a game of “chicken” against a computer. The study was designed to assess the influence of subjects' exposure to deviant behavior by “models,” subjects' knowledge of the outcomes of deviance for the “models,” and the interaction of these variables with the probability of punishment. Analysis showed that exposure to the behavioral outcomes of models' deviant conduct either enhanced or weakened the effects of certainty of punishment, depending upon whether the models were rewarded or punished for their deviant behavior. Implications of the findings for the development of a theory of deterrence are drawn, and suggestions for future research are made.  相似文献   

4.
Experiments were conducted to test three hypotheses within a maximum security juvenile institution: (1) that the Overcontrolled Hostility (OH) scale, the Socialization (So) scale, and the Hand Test may be used to differentiate dangerous from nondangerous inmates; (2) that an instrument can be constructed that will differentiate dangerous from nondangerous youths; and (3) that there is a negative correlation between staff's perception of a youth's degree of dangerousness and their desire to not work with dangerous youths.The So, OH, and Hand Test were administered as was a twenty-five-word adjective checklist (the “TB”) with four response levels so that low scores signified dangerousness. A questionnaire produced a list of subjects with whom staff wanted to work and those with whom they did not want to work.The hypothesis that the So scale, the OH scale, and the Hand Test could discriminate between dangerous and nondangerous “subjects” was not confirmed. The hypothesis that an instrument could be constructed that would differentiate dangerous from nondangerous youths was confirmed. The hypothesis that staff's perception of dangerousness affects their working relationship with youths was solidly confirmed.  相似文献   

5.
“Partnership” and “partnering” are two of the most frequently used terms in public sector procurement. They may be used by both customers and suppliers to justify their respective negotiating positions. A supplier may argue that, since the agreement is a “partnership agreement”, there should be no service credits or liquidated damages payable. The customer on the other hand, may argue, on similar grounds, that it wants to benchmark the supplier and have a broad right to audit every aspect of the supplier’s business.But despite being well used phrases, most guidance relating to these concepts does not define how “partnerships” or “partnering” is to work in practice. While most talk of the supplier and the customer working together “in partnership” with common aims, there is little information available as to how this will be incorporated into agreements, particularly in the context of large scale IT procurements.1 The purpose of this article is to review the available guidance and detail some of the ways in which this guidance can be incorporated into legal agreements.  相似文献   

6.
Carnivore is a surveillance technology, a software program housed in a computer unit, which is installed by properly authorized FBI agents on a particular Internet Service Provider’s (ISP) network. The Carnivore software system is used together with a tap on the ISP’s network to “intercept, filter, seize and decipher digital communications on the Internet”. The system is described as a “specialized network analyzer” that works by “sniffing” a network and copying and storing a warranted subset of its traffic. In the FBI’s own words “Carnivore chews on all data on the network, but it only actually eats the information authorized by a court order”. This article, in two parts, will provide an overview of the FBI’s Carnivore electronic surveillance system. The Carnivore software’s evolution, its ‘prey’ and the system’s relationship with Internet Service Providers will be the focus of the study. (Although the FBI’s Carnivore surveillance system is now officially called DCS1000, as the surveillance system is more commonly referred to as “Carnivore”, that term will be used throughout). Also addressed in the article are misconceptions about Carnivore, publicly available sniffer programs, Carnivore’s functionality, methods to counter Carnivore as well as the software’s limitations. In addition, the pertinent American law allowing for wiretapping and electronic surveillance as well as programs and policies outside the United States regarding electronic surveillance are surveyed, and an overview of ECHELON, the global interception and relay system, is provided. The aim is to provide the paper’s readers with a better understanding of these surveillance systems: naturally, only through an in-depth knowledge can the benefits and dangers they present for the public (government), private (individual communications users) and technical industry (ISPs) be understood.  相似文献   

7.
Public markets, private orderings and corporate governance   总被引:1,自引:0,他引:1  
In the New Property Rights approach the degree of incompleteness of markets is taken independently of the cost of the public ordering and of their efficiency relatively to private orderings. In this approach “public markets,” similarly to a Swiss cheese, are either assumed to be nonexistent empty holes (because of infinite third party verification costs) or assumed to be smooth and efficient (because of zero third party verification costs). When we allow for positive but not infinite third party verification costs we are necessarily pushed back to the insights of Commons, Coase, Fuller and Williamson. The degree of (in)completeness of public markets becomes an endogenous economic problem and managers can be seen as agents that make “second order” specific investments to run specific relations that cannot be efficiently handled by public markets. Managers and the public authorities build respectively private and public “legal equilibria” that set the working rules within which transactions can take place. Private and public legal equilibria are not only substitutes but also complements. This complementarity is an important source of the path dependency that characterizes the development of different legal systems. The framework is applied to GM’s acquisition of Fisher Body. We suggest that, contrary to the claims of the New property Rights approach, the advantages of the acquisition were not due to the superior incentives of the new private owners but should be rather related to the replacement of public markets by the new private ordering set up by Alfred Sloan.  相似文献   

8.
This article argues that traditional views of employment as both financially necessary and morally imperative for guaranteeing a relatively smooth transition from adolescence to responsible adult status are naive in the context of a postindustrial society. Increased youth unemployment since the mid-1970s has excited considerable anxiety and debate about the criminal potential of “youth,” generating debate and research claiming a causal link between youth unemployment and crime. Analyzing this gives rise to inquiry about some of the old assurances and certitudes of full-time, waged labor in a context where full-time, waged labor is steadily becoming a minority activity for most people of working age. The pursuance of youth, political, and economic policies based on assumptions about an indefinite growth in the labor market, or a return to the “full-time employment” of the past, are problematic and require rethinking. Rather than providing corrective measures that entail the restoration of now unfeasible certainties (“full” employment), effort can be better spent appreciating the significance of the shift toward a postindustrial society and considering other ways of providing the inner stability and the fundamental social experiences for young people once obtained through waged work.  相似文献   

9.
The first version of this article was written and published in 1989 in Tartu in Russian.1 As perestroika gathered strength the possibility emerged to take a fresh academic look on concepts which had been dogmatically frozen by “historical Marxism” for many years. One of those laying in the dead end was the Marxist concept of law together with its relation to violence. For a young scholar studying at Tartu University 15 years ago, there was always a possibility to try to apply some ideas and approaches drawn from Yuri Lotman’s articles and lectures. The power of his ideas and its brilliant presentation had already for years fascinated everybody dealing with problems of society and culture in Tartu. The other sources of the present analysis are the ideas about the nature of law and legal communication as they appeared in the 1920s–30s in the works of several Soviet scholars as Eugene Pashukanis and Mikhail Reisner. Both scientists were later condemned and forgotten in the Soviet Union. I also felt very comfortable with the understanding of the nature of law as “language of interaction” expressed and developed by the American lawyer and scholar Lon L. Fuller. The present article focuses only on the logic of communication based on the principle of exchange, reciprocity/contract and mechanism (code) of symbolic equalizations necessary, for achieving such reciprocity. But it is appropriate to point out that in a broader context, contract and reciprocity in society are balanced by different types of principles of human interaction. In this broader understanding, L. Fuller and Y. Lotman are close in their interpretations of cultural interaction and human communication. If we compare Fuller’s article “Two Principles of Human Association”2 to Lotman’s “‘Contract’ and ‘Devotion’ as Archetypical Models of Culture”3 we see their approaches are in fact complementary.1 Kannike, S.H., “O nekotorykh svjazjakh pravovogo obshchenija s nasilijem. Istorija I sovremennost’”, in Tartu Ülikooli Toimetised 850. Studia luridica. Historia et theoria3 (Tartu: Tartu Ülikool, 1989), 76–932 Fuller, L., “Two Principles of Human Association”, in L. Fuller, (ed), The Principles of Human Order(Durham: N.C. Duke University Press, 1981), 67–853 Lotman, Y.M., ““Dogovor” i “vruchenie sebja” kak arhitipicheskie modeli kul’tury”, in Uchenye zapiski Tartuskogo gosudarstvennogo universiteta 513. Trudy po russkoi I slavjanskoi filologii 332. Literaturovedenije: problemy literaturnoi tipologii I istoricheskoi preemstvennosti(Tartu, 1981), 3–16  相似文献   

10.
In August, 1972, the New York City Police Department promulgated administrative shooting guidelines and shooting incident review procedures far more restrictive than former statutory “defense of life” and “fleeing felon” justifications for police shooting. Using a data base that includes all reported New York City police firearms discharges and serious assaults on police between 1971 and 1975, this article examines the effects of the new guidelines and procedures on shooting frequencies, patterns, and consequences.Great decreases in “fleeing felon” shootings, “warning shots,” and shooting-opponent injuries and deaths were found to be associated with the new rules. This change also appeared to have a favorable effect on line-of-duty officer deaths and serious injuries. The implications of these findings are discussed.  相似文献   

11.
Nowhere in public law is the idea of personal loyalty to superiors mentioned, yet criminal justice practitioners suffer from a “personal loyalty syndrome.” This syndrome holds them responsible to an altogether different set of loyalty expectations. They are often compelled to offer personal loyalty to unworthy superiors and, as a result, violate constitutional provisions, legal requirements, or the public good. While no organizational rules require any such loyalty, criminal justice practitioners are invariably taught that issues of loyalty at the workplace are so important that one cannot survive without personal loyalty to superiors. They are also reminded that violating such a “commandment” is a cardinal sin that can destroy one's career. This article discusses the arguments for and against personal loyalty to superiors and the dangers inherent in such relationships. It explains the grammar of loyalty at the workplace, explores the paradoxes of personal loyalty to superiors, and suggests a duty-based model as an alternative to the current model.  相似文献   

12.
A mass fatality DNA identification effort is a complex process in which direct matching and kinship analysis is used for identifying human remains. Kinship DNA identification is an important tool in the identification process in which victim's DNA profiles are compared to the profiles of “known” biologically related reference samples. Experience from the 9/11 World Trade Center DNA identification efforts showed that forms used to record biological relationships are important and that inaccurately documented information may hamper the kinship analysis and DNA identification process. In the identification efforts following Hurricane Katrina, a Family and/or Donor Reference Collection (FDRC) form was used as a means to document the reported relationship between the reference DNA donor and the purported missing individual. This FDRC form was developed based upon lessons learned from 9/11 and the Tsunami identification efforts. This paper analyses the effectiveness of the FDRC form used in the Hurricane Katrina kinship DNA identification efforts and proposes an improved sample collection form for kinship and other donor reference samples. The data presented can be used to enhance the accuracy of the data collection process through an improved sample collection form, streamlining the DNA kinship identification process and decreasing the burden on valuable resources.  相似文献   

13.
Legislative and policy initiatives can be viewed as a problem-solving process that includes the following steps: [1] problem identification, [2] identification of objectives, [3] strategies, [4] evaluation of strategies, [5] decision(s), and [6] implementation. This paper uses policies related to technology transfer as a “test case” issue area. It identifies four historical phases for technology transfer—extension service, space-defense spin-off, intergovermental, international, and technology commercialization—and their related objectives. Seven technology-transfer models are presented for accomplishing these objectives: intermediary mechanisms, decentralized invention management, cooperative research, patent waivers, personal incentives, personnel-exchange programs, and foreign patent rights. Actual examples, evaluation criteria, and resulting decisions are subsequently presented. Finally, implementation issues (regulations, technical assistance and training, and financial considerations) are discussed. Sally A. Rood, a public-sector consultant, recently co-authored a handbook on technology transfer for the US Conference of Mayors. She produces a series of bi-monthly bulletins on economic development for the Academy for State and Local Government and the National Council for Urban Economic Development. She is working on her Ph.D. in Public Administration.  相似文献   

14.
This paper analyzes the phenomenon of “identification” by an individual with actors in his environment. It argues that individuals interpret their environment according to “frames,” which they, as recipients of a message, derive by a complex process of interpretation of the communication setting. The paper also argues that individuals identify with actors in their environment, because this identification increases their utility vis-à-vis a “neutral” watching of their environment. The paper applies this approach to a variety of real life examples, in particular to voting.  相似文献   

15.
As the technology for Internet telephone service (“Voice Over IP” or “VOIP”) matures, and the quality of service improves, regulators in developed and developing countries are encountering significant and very different regulatory challenges. This article looks at the issues faced by regulators in developed country markets with a history of extensive service competition. A follow-up article will contrast the issues faced in developing country markets, particularly those where service competition is limited.  相似文献   

16.
Some historians have classed as servants only people living with their masters; some have excluded farm servants; some have included married domestics living with their own families. The archive of the Bolognese Confraternity of San Vitale, also known as Università dei Servitori, is analyzed in this article to show how one group of servants defined a “true” servant. Their solution was to exclude from their association people who performed what they deemed “filthy” tasks. They also excluded women, giving us a particular insight in the history of gender and masculinity. In their view, the “true” servants were bourgeois (and locally born) men rather than lower class (migrant) women who are often identified as the stereotypical servants. Moreover, most members of the association were married, they had their own families in Bologna and did not always live with their masters. This makes possible the analysis of married male servants living with their own families, a category of servant that has received less attention than life-cycle servants.  相似文献   

17.
The Supreme Court of Canada's (SCC) first case involving capacity and the refusal of involuntary psychiatric treatment involved a self described “professor” who had been referred to as “Canada's Beautiful Mind”. He had been found not criminally responsible on account of mental disorder for uttering death threats. While considered incapable of making a treatment decision by psychiatrists and a review board, three levels of court, including the SCC, found him to be capable. “Professor” Starson therefore continued to refuse treatment for his psychosis and spent over seven years detained because he refused the treatment required to become well enough to be released. This refusal of treatment is permitted under Ontario law, although it is not permitted in some other Canadian provinces, and in many other countries.This article describes Starson's situation, Ontario's law with respect to consent to treatment and relevant Canadian constitutional and criminal law. It provides an analysis of the Consent and Capacity Board decision and the court appeals. Implications from Starson's case are analyzed in relation to what happened to Starson, human rights and comparative law pertaining to involuntary patients' refusal of treatment, especially their relevance to the Canadian Charter of Rights and Freedoms, and laws in some other countries. Many Canadian and foreign jurisdictions where laws apparently accord with human rights codes do not allow a person to refuse the treatment required to restore their liberty. We conclude that a law that allows a person with a mental illness to be incarcerated indefinitely in a “hospital” because needed psychiatric treatment cannot, by law, be provided is not justifiable in a caring democratic jurisdiction.  相似文献   

18.
This paper argues that there are two tiers of entrepreneurship important for economic development. One is concerned with investments in productive technologies that improve productivity and better service consumer needs. The other is concerned with the creation of protective technologies that secure citizens’ private property rights vis-à-vis one another. In the developing world where governments cannot or do not protect citizens against predation, “institutional entrepreneurs” devise private mechanisms of property protection, providing the security required for productive entrepreneurship to grow. However, private protection technologies can be a double-edged sword. While private protection technologies enable some investment and exchange by securing citizens’ property where government does not, potential constraints on these technologies’ effectiveness may simultaneously limit their ability to expand investment and exchange beyond modest levels.  相似文献   

19.
The Data Protection Act 1998 (the “Act”), which implements the EU Data Protection Directive (95/46/EC), applies to personal data and governs the activities of data controllers and data processors in relation to such data. In Michael John Durant v. Financial Services Authority (2003), the scope of the Act was restricted. In particular, key provisions, including “personal data” and “relevant filing system”, became the subject of narrow judicial interpretation when the Court of Appeal sought to limit the “unjustifiable burden and expense” imposed on data controllers in complying with the Act. Although questioned by commentators and subject to investigation by the European Commission, the significant shift in approach initiated by Durant has been endorsed in two subsequent cases: (1) David Paul Johnson v. The Medical Defence Union (2004) and (2) Terence William Smith v. Lloyds TSB Bank Plc (2005). This article considers the main principles of the Act, how the Information Commissioner, the courts and the European Commission have responded to Durant and what happens next.  相似文献   

20.
One of the more widely publicized presentations about crime is “Scared Straight,” a documentary about a program in which juveniles visit inmates in a New Jersey penitentiary. It is the contention of this article that this film and the accompanying media coverage of it convey an ideology message concerning crime and criminals. Crime is presented as a matter of individual choice that has little relationship to any social variables. Criminals are portrayed in a one-dimensional manner as evil, vicious, and barely human. The documentary is a success because these images of crime and criminals conform to existing stereotypes. Based on these distorted images, the film and media coverage “market” a simplistic solution to crime that is compatible with their presentation of the crime problem.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号