排序方式: 共有633条查询结果,搜索用时 15 毫秒
461.
462.
463.
464.
465.
Andrew C. Mertha Author Vitae 《Orbis》2009,53(2):233-249
This article addresses property rights in China under four headings. I begin by placing the Chinese case within the larger context of property rights literature. The second section reviews the existing scholarship on property rights in China and identifies existing lacunae. The third section provides the broad contours of the contemporary Chinese intellectual and political discourse over property rights in China. And finally, I offer several cases of property rights that illustrate the variation in the scope of the concept of property rights in China and suggest possible avenues for future research.
The right of property is the guardian of every other right, and to deprive the people of this is in fact to deprive them of their liberty.- Arthur Lee, Virginia, 1775
You reproach us with planning to do away with your property. Precisely so; that is just what we intend.- Karl Marx and Friedrich Engels1
The fact that a legal or economic model does not exist for an activity or a behavior is no reason to oppose it, because the laws can develop out of experience and practice.- Wu Guoping, Yangtze Water Resources Commission2相似文献
466.
Gabriela KennedySarah Doyle Brenda LuiAuthor Vitae 《Computer Law & Security Report》2009,25(3):297-304
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
467.
468.
Rasika DayarathnaAuthor Vitae 《Computer Law & Security Report》2009,25(2):165-172
The principle of information security safeguards is a key information privacy principle contained in every privacy legislation measure, framework, and guideline. This principle requires data controllers to use an adequate level of safeguards before processing personal information. However, privacy literature neither explains what this adequate level is nor how to achieve it. Hence, a knowledge gap has been created between privacy advocates and data controllers who are responsible for providing adequate protection. This paper takes a step toward bridging this knowledge gap by presenting an analysis of how Data Protection and Privacy Commissioners have evaluated the adequacy level of security protection measures given to personal information in selected privacy invasive cases. This study addresses both security measures used to protect personal information against unauthorized activities and the use of personal information in authentication mechanisms. This analysis also lays a foundation for building a set of guidelines that can be used by data controllers for designing, implementing, and operating both technological and organizational measures used to protect personal information. 相似文献
469.
470.
Kathleen A. FoxAuthor Vitae Matt R. NoblesAuthor VitaeRonald L. AkersAuthor Vitae 《Journal of criminal justice》2011,39(1):39