Further Computer Contracts M‐T Michèle Rennie Sweet and Maxwell 1989. ISBN 0 421 40330 6
Formalism in AI and Computer Science Philip Leith Ellis Horwood 1990. ISBN 1 3325549 2
Electronically Recorded Evidence ‐ A Guide to the Use of Tape and Video Recordings in Criminal and Civil Proceedings Sybil Sharpe Fourmat Publishing 1989. ISBN 1 85190 071 3
Computer Law Chris Reed(ed) Blackstone Press Limited 1990. ISBN 1 85 431037 2
EDI and American Law: A Practical Guide Benjamin Wright Electronic Data Interchange Association 1989. ISBN 0 96 238750 9
Computer Software Protection and Semiconductor Chips Dr Dirk Schroeder (Butterworth's Current EC Legal Developments Series) 1990. ISBN 0 406 04021 4
Computers and the Law David I Bainbridge (Pitman) 1990. ISBN 0 273 03170 8 相似文献
Plastic and Electronic Money: New Payment Systems and Their Implications Patrick Frazer Woodhead Faulkner Limited 1985 £35
A User's Guide To Computer Contracting: Forms, Techniques and Strategies Davis, Allen, Bowman and Armstrong Harcourt Brace Jovanovich 1985, $75
Legal Protection of Computer Programs and Data C. Millard Sweet & Maxwell/Stevens 1985, £24
Piracy of Phonograms Gillian Davies ESC Publishing Ltd. 1986. 2nd edition. £17.95.
Biotechnology and Patent Protection—An International Review F. K. Beier, R. S. Crespi and J. Straus O.E.C.D. 1985, £5
Protecting Privacy in Two‐Way Electronic Services David H. Flaherty Mansell Publishing Company 1985, £23.50
High‐Tech Espionage Jay Tuck Sidgwick and Jackson Ltd 1980, £10.95 相似文献
The militia (police), created in 1917, has been mandated to prevent crime through intelligence activities, direct intervention, and citizen education. In 1966, it was given the responsibility for the supervision of offenders newly released from correctional institutions. Peoples Volunteer Brigades and the DRUZHINNIKS aid the militia in crime prevention.
The courts also make use of non-professionals in the persons of lay assessors to insure that the accused is judged by his “peers.” The court system itself is inquisitorial in nature as opposed to the American accusational model. As the accused person moves through pre-trial and trial procedures, one can see how his “rights” may be legally abridged at every step.
Russian courts have a variety of sentences from which to choose, ranging in harshness from public censure to death by shooting. Deprivation of liberty may be applied by degree from “education” to compulsory labor to strict incarceration. The Soviets are attempting an organized plan of diversionary sentencing, in order to reduce prison populations to all but the most dangerous offenders.
Correctional facilities depend on inmate commissions to keep order and motivate good behavior through group influence and peer pressure. Inmates as well as civilians have “a national duty to mind other people's business.”
In the United States, justice is fragmented into a variety of jurisdictions: municipal, county, state, and federal, each with its own law enforcement agencies, courts, and correctional agencies. Further, there is only limited coordination among the various segments of the system. There is little argument to the proposition that the American “system” of criminal justice is inefficient.
Unlike America's disjointed system, the Russian Criminal justice system is unified; militia (police), procurators (prosecutors), courts, and correctional facilities operate under a centralized coordinating body. This body is characterized by a unity of purpose and a high degree of systemic integration (Juviler, 1979, p. 1). 相似文献
The average age for execution for the 42 reporting nations was 18. The United States of America was the only nation reporting for less than 16 years old. The following “methods of execution” were reported:
1.Hanging (N = 26, 57%)
2.Shooting (N = 11, 24%)
3.Beheading (N = 7, 15%)
Nations also excluded from the death penalty for the following reasons:
1.Mental Illness
2.Juveniles
3.Pregnant Woman
Only 7 nations reported “open” or “public” executions. 相似文献
“When you point your finger at someone, three fingers are pointing back at you.”
—Anonymous 相似文献
Anini spear-headed a four-month reign of terror between August and December 1986 that gripped part of Nigeria. While he and his gang reigned, they killed, maimed, kidnapped, robbed, and raped their victims. The episodes were replicated with increasing sophistication, brazenness and arrogance. At the end of it all, 20 persons—11 policemen and nine civilians were dead. Indeed, Anini's siege on Nigeria has been described as “a nightmare” and “a metaphor of horror.”
Perhaps Justice Omo-Agege, the Chairman of the First Benin Robbery and Firearms Tribunal which tried Anini and his cohorts, said it best when he wrote:
Anini will forever be remembered in the history of crime in this country, but it would be of unblessed memory. Few people if ever, would give the name to their children. 相似文献
Information Technology: The Challenge to Copyright. James Lahore, Gerald Dworkin and Yvonne Smyth Sweet & Maxwell and The Centre for Commercial Law Studies 1984, £12.00
Data Processing and the Law Edited by Colin Campbell Sweet and Maxwell 1984, £20.00
Le droit des Contrats Informatiques — Principes — Applications Centre de Recherches informatique et droit des Facultes Universitaires de Namur Maison Ferdinand Larder (Brussels), 1983, 45 FB
Computer Insecurity Adrian R.D. Norman Chapman and Hall 1983, £14.95
The Data Protection Act Richard Sizer and Philip Newman Gower Publishing, 1984, £16.95
The Data Protection Act 1984 Professor Bryan Niblett Oyez Longman Publishing, 1984, £18.00
The Data Protection Act 1984 — A Guide to the New Legislation J. A. L. Sterling CCH Editions, 1984, £15.00
Privacy and Data Protection — An International Bibliography Professor David H. Flaherty Mansell Publishing, 1984, £23.50
Computer Contracts R Morgan & G Stedman Oyez Longman Publishing 1984, 2nd Edition, £27.50
Computer Contracts Handbook Michele Rennie Sweet & Maxwell 1984, £15.00
Computer Contracts — An International Guide to Agreements and Software Protection Hilary Pearson Financial training 1984, £14.95 相似文献
The Law of Electronic Commerce: EDI, Fax and E‐Mail Technology, Proof and Liability Benjamin Wright Little, Brown and Company 1991. ISBN Q 316 95632 5 $95
Crime and the Computer Martin Wasik Oxford University Press 1991. ISBN 0 19 825621 3 £35
Broadcasting: the New Law Nicholas Reville Butterworths ISBN 0 406 001375 £16
Regulating the Media Thomas Gibbons Sweet and Maxwell ISBN 0 421 37450 0 £27.50
Legal Protection of Computer Software Ranald Robertson Longman 1991. ISBN 0 851 21684 6 £35
The Computerised Lawyer: a Guide to the Use of Computers in the Legal Profession Philip Leith Springer‐Verlag 1991.
Winning with Computers: Trial Practice in the 21st Century John C Tredennick Jr, Editor ABA Section on Law Practice Management 1991. ISBN 0 89707 658 3 $90
The Age of Information Stephen Saxby Macmillan 1990. ISBN 0 333 54832 9 £25
Computer Security: Hackers Penetrate DOD Computer Systems: Testimony before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate (A General Accounting Office Report) James Brock, Jr 1991. GAO/T‐IMTEC‐92–5
Computer Contracts Morgan and Stedman (4th Edition) Longman Commercial Series 1991. ISBN 0–85121–6854 £60 相似文献
Design—The Modern Law and Practice Ian Morris and Barry Quest Butterworths. 1987. £45
Computers and the Law Richard Mawry and Keith Salmon BSP Professional Books,(Oxford, London, Edinburgh) 1988, £19.95
Television by Satellite—Legal Aspects Stephen de B. Bate (ed.) ESC Publishing Limited. 1987. £32.75.
Computer Software: Legal Protection in the United Kingdom Henry Carr E.S.C. Publishing Ltd 1987, £32.50.
Patents in Chemistry and Biotechnology Philip W Grubb Clarendon Press 1987. £12.50.
The International Handbook on Computer Crime Computer‐related Economic Crime and the Infringements of Privacy Ulrich Sieber John Wiley & Sons 1987. £24.95.
Computer Law: Theory and Practice Naomi Assia Advocate 相似文献
Publishing and Multimedia Law Michael Henry 1994, London: Butterworths Pp. xxviii + 820 + diskette (hardback)
Blackstone's Guide to the Trade Marks Act 1991 Ruth Annand and Helen Norman Pp. 411 £19.95 相似文献
This paper is an objective treatment of how the ancient Roman police went ‘'out of control'’ on the first Good Friday in their mistreatment of the prisoner, Jesus, and what lessons can be learned to help us cope with today's pandemic problem, police abuse.
This writer herein describes the organization of the criminal justice system in the ancient Roman provinces and the occupational pressures exerted on the individual police officer. This article brings to bear profile information available on the Roman police and suggests how their propensities could manifest themselves in the abuse of prisoners, such as Jesus. Identifying the striking similarities between the self‐image of the ancient Roman police officer and his present day counterpart, the writer offers insights to help understand today's incidents of police brutality and provides lessons for reducing their frequency.
Rather than leave the police officer with a low opinion of his or her profession, the writer identifies several Roman officers who treated Jesus with respect and courtesy and hence can serve as role models in treating the general public. 相似文献
Computer Law, Colin Tapper, Longman, London and New York, 1983 Third Edition, £9.50
Understanding Computer Contracts, Martin Edwards, Waterlow Publishers, 1983 £6.50
Data Protection: Perspectives on Information Privacy, Edited by Colin Bourn & John Benyon, Department of Adult Education, University of Leicester, 1983 £5
The Computer in Court, Alistair Kelman and Richard Sizer, Gower Publishing Company, 1982 £15.50
Principles of Database Systems, Jeffrey D Ullman, Pitman Publishing Ltd, 1982 Second Edition £13.95
Computers and the Law Teacher, A report of the proceedings of a conference held at North Staffordshire Polytechnic, Edited by David V Marshall, North Staffordshire Polytechnic, 1983 £3 相似文献
Legal Protection of Computer Programs in Europe — a Guide to the EC Directive Bridget Czarnota and Robert J Hart Butterworths 1991. ISBN 0 406 00542 7
Intellectual Property Rights in Sound Recordings, Film and Video J A L Sterling Sweet and Maxwell 1992. ISBN 0 421 4570 9
The European Market Place James Hogan Macmillan 1991. ISBN 0 333 51858 6
Intellectual Property D Bainbridge Pitman 1992. ISBN 0 273 034265 X 相似文献
Complex litigation is an area of legal practice particularly apt to benefit from the use of modern information technology both before trial and during the trial. Complex litigation involves such a diversity of issues, allegations of fact, and divergent opinions as to be difficult to retain within the short term memory of one human brain for the length of time taken by the exposition of the evidence and argument followed by judicial analysis and expression of the judgment.
This type of litigation also benefits from intervention by the Court in the preparations for trial, and in that endeavour information technology would also be most helpful.
In this article I shall try to review in very general terms what is done and what could be attempted. I shall generally concentrate on civil rather than criminal litigation.
The views expressed are my views alone. 相似文献
Though Social Control Theory has received great empirical support from many American studies, cross-cultural verification remains to be seen. The study described here intends to test Social Control Theory by using self-reported data collected from 3717 Chinese junior and senior high school students of northern Taiwan. Major correlates of self-reported delinquency are presented and discussed. Apparently, Social Control Theory received much support from the Chinese data, while both strain theory and subculture deviance theory were not verified. Social Control Theory is said to be the most appropriate theory to explain the origin as well as the increase of juvenile delinquency in Chinese society. 相似文献
Method: Drawing on existing evidence, the group was developed and piloted on a sample of 12 male Young Offenders (mean age 19.85 years) in custody with a history of SI. Participants were measured on observable SI behaviour, SI thoughts and urges and psychological distress. A within subject design was utilised with measures at baseline, 6 months and 1 year.
Results: At 12 months follow-up, a significant reduction in SI acts, time spent on SI monitoring, severity of urges and difficulty resisting SI. Psychological distress was also reduced.
Conclusions: SIGPI could be a potentially promising intervention and further investigation into its efficacy is warranted. 相似文献
As in America, Israel's prisons are overcrowded; most of the correctional facilities are unfit for human habitation; sanitary conditions are poor; occupational, vocational, and educational opportunities are virtually non-existent; and rehabilitation exists in name only. The recidivist rate of criminal offenders is as high in Israel as in the U.S. Various Israeli commissions in recent years have decried the prison conditions and have called for reform but, again as in the U.S., the problem has defied an acceptable solution.
Israel's probation services are part of the country's social services delivery system rather than the penal or judicial systems. That is the case because, unlike the U.S. conception, probation in Israel is not considered a punishment. Probation services are utilized by the Criminal Justice System, but organizationally they are not part of it. Still, the functions carried out by the Israeli probation officers very much resemble those of their counterparts in the U.S. Probation services in Israel have not expanded in recent years, even though the number of incarcerated offenders has increased.
Corrections has never been a priority in Israel and will not be so long as the country remains preoccupied with security matters. On the other hand, the crime rate continues to increase and so does the prison population. Consequently, the country's correctional problems and policies, in all their dimensions, should be re-examined, and the sooner the better. 相似文献
The data show that most of the inmates had a loose attachment to their families prior to the time they committed the offense that led to their imprisonment, most of the offenders are lower-class persons. There is an inverse correlation between socioeconomic measures and involvement in property crimes (p =.01) and crimes without victims (p=.001). Also, there is no significant relationship between socioeconomic measures and crimes against persons. Family bond measures are significantly correlated with involvement in property crimes (p=.001), crimes without victims (p =.001), and personal crimes (p =.01). But there is no significant relationship between family bond measures and involvement in smuggling contrabands.
The inmates' criminality can be explained in terms of the breakdown of kinship ties and poor economic conditions in Nigeria. 相似文献
Past literature has examined the relationship between the cynicism scale and other attitudinal constructs. Despite the fact that the scale is intended to predict behavior, correlations between the scale and behavioral criterion variables have not been reported.
In this paper we present the results of conventional reliability analysis on a sample of black police union activists. The twenty item scale is resubjected to a five factor varimax solution. Only eight items are observed to reload on factors initially observed by Regoli (1976) and indicate little stability within internal factor configurations. 相似文献