首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 875 毫秒
1.
This article summarizes key developments of interest to the Commonwealth in the regulation of international disaster response over the last year. It includes discussion of global and regional instruments impacting on Commonwealth states as well as steps taken at the national level by some Commonwealth members.  相似文献   

2.
3.
The source or basis of the force of international law or legitimacy of international law is a basic issue in international jurisprudence and the heart of controversy among scholars pro and con international law. In the development of the discipline of international law, this issue has been extensively discussed along various academic paths. In the background of globalization, the demonstration on the “legitimacy” of international institutions by the school of international institution in the field of international relations, including the “source of legitimacy”, the acquisition of legitimacy or legalization, and even the “legitimationskrise”, sheds helpful light on further study of the “legitimacy” of international law.  相似文献   

4.
Netherlands International Law Review - This article is occasioned by this year’s visit of the Institut de droit international to The Hague. It addresses the seminal role that the Institut (f....  相似文献   

5.
6.
After the Cold War and the quick development of globalization, non-state acts by international organizations, transnational corporations and nongovernmental organizations (NGOs), etc., are becoming more active. Global issues with regard to, inter alia, environment, human rights, terrorism are constantly emerging, which bring great challenge to the Westphalia System that is based on state sovereignty and centered on the national state. At the same time, the values, which include “individualism” and “global justice,” are constantly casting impact on international legal system. Doubtlessly, in the current context of international relations, “justice among states” is still the reasonable positioning of the value of modern international law. However, making “individualism” and “global justice” compatible and modifying “justice among states” is an inevitable trend. At the same time, the rule brought about by the modification on the value of justice must be handled properly.  相似文献   

7.
The engagement of the United States is critical to the success of any international effort against global climate change. Although international climate efforts require long-lasting, credible commitments by participating countries, risk of failure to deliver on such commitments rises with the degree of gap that the domestic institutions permit between the executive and the legislature. The U.S. withdrawal from the Kyoto Protocol indicated that the Clinton administration’s effort to bring international solutions into the domestic arena before domestic consensus was obtained was counterproductive. The congressional politics over budgetary allocation regarding the Bush administration’s technology policies showed that general preference to a technology-oriented approach to climate change alone did not ensure the credibility of international commitments. These cases revealed that the U.S. climate diplomacy was lacking in domestic institutional mechanisms that bring the executive branch’s deal at international negotiations, and the legislators’ preferences at home, closer together. For the U.S. to take leadership in international climate cooperation, domestic institutional frameworks which reconcile the interests of the two branches are necessary. This paper suggests that such domestic institutional frameworks feature two components: regular channels of communication between the two political branches; and, incentive mechanisms for the two branches to swiftly come to terms with each other.
Kentaro TamuraEmail: Phone: +81-46-855-3812Fax: +81-46-855-3809
  相似文献   

8.
This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence.The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date.This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally.In this article, the authors examine whether static and dynamic IP addresses are “personal data” as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector.  相似文献   

9.
LI  Ju-qian 《美中法律评论》2009,6(12):59-59,62
The author Prof. Kim has studied in the fields of international law and space law for 28 years, and has published more than 30 articles in English and Japanese in prestigious law journals and books in the United States, the United Kingdom, Canada, Germany, Japan, The Netherlands, Singapore, the Philippines and Macau. His new book entitled Essays for the study of the international air and space law (English language: 540 pages and Japanese language 246 pages, total 786 pages) was published by the Korean Studies Information Co., Ltd. on December 15, 2008.  相似文献   

10.
Article 18 of the Charter of Fundamental Rights of the European Union enshrines the right to asylum. Nonetheless, despite its ‘constitutionalisation’ within primary law, asylum remains a far too amorphous right, whose axiological potential has gone virtually unnoticed in the ongoing migratory crisis. The paper will argue that this is partly due to the fact that the Court of Justice on a few occasions has declined to clarify the scope of Article 18. The provision at issue therefore remains a pathological element that requires an adequate diagnosis on which accurate prognoses can be based. In an attempt to diagnose the right to asylum enshrined in Article 18 of the Charter of Fundamental Rights of the EU, this paper will compare different hermeneutical approaches and reflect on the contextualisation of the mentioned provision through the lens of domestic and EU case law and in the light of the recent EU–Turkey Statement. The article will ultimately propose to interpret the EU asylum legislation as instrumental to the effective exercise of the right to asylum.  相似文献   

11.

Two ideas concerning the link between bullying in school and violence on the streets are investigated. (1) Bullying and victimization in school is a product of the school situation and people's inability to choose their levels of exposure to others. According to this hypothesis, bullying is largely a phenomenon that is isolated to the school context. (II) Bullying behaviour in school and inflicting damage to others outside school is a reflection of a more general aggressive behaviour pattern and, hence, bullying in school and violence on the streets will, to a great extent, involve the same individuals. The literature offers suggestions that either could be the case. Participants were 2915 14-year-olds in a medium-sized county in Sweden who responded to a self-report questionnaire.Theresults showed that bullying others in school was strongly linked to violent behaviour and weapon-carrying on the streets, both among boys and girls. It was also found that bullying others in school was related to being violently victimized on the streets. The findings remained the same when statistically controlling for loitering and nights spent away from home, which were both related to bullying behaviour. It is concluded that bullying behaviour in school is in many cases a part of a more general violent and aggressive behaviour pattern and that preventive efforts targeting individuals with bullying behaviour in school could, according to the present study, decrease violence among adolescents out in the community as well.  相似文献   

12.
13.
South Africa was colonized by European powers from as early as the seventeenth century and all aspects of the indigenous population were transformed, alternatively, subjected to the norms of life of the colonial powers. This led to the erosion of African names and the replacement therefore by colonial names. The South African Geographical Names Council Act is intended to address this legacy.  相似文献   

14.
15.
Yang  Wei  Yu  Xiang  Zhang  Ben  Huang  Ziyang 《The Journal of Technology Transfer》2021,46(1):138-171
The Journal of Technology Transfer - Global economic integration is driving countries and companies to increasingly pursue internationalized innovation activities. During this process,...  相似文献   

16.
Liverpool Law Review - This article examines the ethical thinking of Levinas, from which Derrida’s Law of Hospitality is derived, to see if it is sustainable in the face of Badiou’s...  相似文献   

17.
It has long been thought that by using morphine to alleviate the pain of a dying patient, a doctor runs the risk of causing his death. In all countries this kind of killing is explicitly or silently permitted by the law. That permission is usually explained by appealing to the doctrine of double effect: If the use of morphine shortens life, that is only an unintended side effect. The paper evaluates this view, finding it flawed beyond repair and proposing an alternative explanation. It is not the intention of the doctor that counts, but the availability of an “objective” palliative justification.  相似文献   

18.
19.
The commodification of digital identities is an emerging reality in the data-driven economy. Personal data of individuals represent monetary value in the data-driven economy and are often considered a counter performance for “free” digital services or for discounts for online products and services. Furthermore, customer data and profiling algorithms are already considered a business asset and protected through trade secrets. At the same time, individuals do not seem to be fully aware of the monetary value of their personal data and tend to underestimate their economic power within the data-driven economy and to passively succumb to the propertization of their digital identity. An effort that can increase awareness of consumers/users on their own personal information could be making them aware of the monetary value of their personal data. In other words, if individuals are shown the “price” of their personal data, they can acquire higher awareness about their power in the digital market and thus be effectively empowered for the protection of their information privacy. This paper analyzes whether consumers/users should have a right to know the value of their personal data. After analyzing how EU legislation is already developing in the direction of propertization and monetization of personal data, different models for quantifying the value of personal data are investigated. These models are discussed, not to determine the actual prices of personal data, but to show that the monetary value of personal data can be quantified, a conditio-sine-qua-non for the right to know the value of your personal data. Next, active choice models, in which users are offered the option to pay for online services, either with their personal data or with money, are discussed. It is concluded, however, that these models are incompatible with EU data protection law. Finally, practical, moral and cognitive problems of pricing privacy are discussed as an introduction to further research. We conclude that such research is needed to see to which extent these problems can be solved or mitigated. Only then, it can be determined whether the benefits of introducing a right to know the value of your personal data outweigh the problems and hurdles related to it.  相似文献   

20.
In the last 20 years, the risks of bribing foreign public officials have greatly increased for multinational companies based in OECD countries and those listed on their stock markets. Generally, these risks can be mitigated through corporate compliance programs. Such compliance programs are directed at reducing bribery and other unethical behavior in the private sector. This paper assesses how the international standard against transnational bribery has impacted anticorruption compliance programs in Argentina. It first traces the origins and logics behind corporate anticorruption compliance. It later describes the international standard against transnational bribery and, in the light of information collected through 16 in-depth interviews and a survey conducted among 70 companies based in Argentina, it assesses how corporate anticorruption programs work in this country. After distinguishing between “paper”, “cheap-talk” ideal-type programs and sound, truly committed ideal-type policies, it suggests that anticorruption compliance in Argentina is placed closer to the former than the latter, and it offers possible reasons for such findings.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号