首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   613篇
  免费   0篇
工人农民   15篇
外交国际关系   446篇
法律   152篇
  2014年   38篇
  2013年   52篇
  2012年   56篇
  2011年   77篇
  2010年   58篇
  2009年   67篇
  2008年   35篇
  2007年   35篇
  2006年   37篇
  2005年   38篇
  2004年   42篇
  2003年   43篇
  2002年   35篇
排序方式: 共有613条查询结果,搜索用时 683 毫秒
221.
The EU Proposal for a General Data Protection Regulation has caused a wide debate between lawyers and legal scholars and many opinions have been voiced on the issue of the right to be forgotten. In order to analyse the relevance of the new rule provided by Article 17 of the Proposal, this paper considers the original idea of the right to be forgotten, pre-existing in both European and U.S. legal frameworks. This article focuses on the new provisions of Article 17 of the EU Proposal for a General Data Protection Regulation and evaluates its effects on court decisions. The author assumes that the new provisions do not seem to represent a revolutionary change to the existing rules with regard to the right granted to the individual, but instead have an impact on the extension of the protection of the information disseminated on-line.  相似文献   
222.
This article analyses the jurisdictional principles employed by Australian courts in establishing personal jurisdiction in traditional settings and its extension to e-commerce cases. The Australian courts apply the court rules to exercise personal jurisdiction over defendants. The article discusses these rules relating to serving process within and outside Australia and jurisdiction based on the submission of the parties. The adequacies of principles like forum-non-conveniens, forum selection clauses which are vital in the personal jurisdiction inquiry are analysed. The unique High Court decision in Dow Jones v. Gutnick is discussed and the approach followed by the court critically analysed to highlight the excessive exercise of personal jurisdiction. Other cases concerning the internet are also discussed to highlight the approaches followed to establish personal jurisdiction in internet and e-commerce cases. It is argued that the drawbacks highlight the need for legislation to regulate personal jurisdiction in e-commerce cases.  相似文献   
223.
The existence of a fundamental right to the protection of personal data in European Union (EU) law is nowadays undisputed. Established in the EU Charter of Fundamental Rights in 2000, it is increasingly permeating EU secondary law, and is expected to play a key role in the future EU personal data protection landscape. The right's reinforced visibility has rendered manifest the co-existence of two possible and contrasting interpretations as to what it come to mean. If some envision it as a primarily permissive right, enabling the processing of such data under certain conditions, others picture it as having a prohibitive nature, implying that any processing of data is a limitation of the right, be it legitimate or illegitimate. This paper investigates existing tensions between different understandings of the right to the protection of personal data, and explores the assumptions and conceptual legacies underlying both approaches. It traces their historical lineages, and, focusing on the right to personal data protection as established by the EU Charter, analyses the different arguments that can ground contrasted readings of its Article 8. It also reviews the conceptualisations of personal data protection as present in the literature, and finally contrasts all these perspectives with the construal of the right by the EU Court of Justice.  相似文献   
224.
This is a brief comment on a meeting held at the Council of Europe in Strasbourg, which discussed ways of improving transnational access to data by law enforcement through the Cybercrime Convention. In particular, the possible introduction of a new protocol, and a guidance note on art. 32(b), were considered. It is argued that there are serious concerns with both proposals. Moreover, the meeting revealed a surprising lack of knowledge as to current levels of cooperation between law enforcement and foreign service providers.  相似文献   
225.
While police attitudes and behaviors have been the subject of a large number of studies conducted since the 1960s, very few studies had assessed Chinese police officers’ work-related attitudes and compared them with those of the U.S. police cadets. Using survey data collected from 263 Chinese and American police cadets, the research empirically tested whether Chinese and American police cadet attitudes differed across four attitudinal dimensions: aggressive patrol, order maintenance, legal restrictions, and distrust of citizens. Bivariate and multivariate results showed that Chinese cadets displayed occupational outlooks that distinguished them from their American counterparts. Chinese cadets supported aggressive patrol and were more distrustful of citizens than their American counterparts. American cadets were more favorable of order maintenance activities and more accepting of legal restrictions compared with Chinese cadets. Implications for future research and policy are discussed.  相似文献   
226.

Objective

The objective of this study was to estimate the benefits and costs of using electronic monitoring (EM) and home detention to reduce crime committed by parolees and probationers.

Method

Data from a national survey of state prison inmates was adjusted and used to estimate the number of crimes that would have been committed by all parolees and probationers over the course of one year in the absence of EM and home detention. The data were analyzed in combination with existing analyses of the effectiveness and costs of EM and home detention and the economic costs of crime to estimate the benefit-cost ratio of nationwide implementation of EM and home detention with all parolees and probationers.

Results

EM plus home detention could avert an estimated 781,383 crimes every year. The social value of the annual reduction in crime is $481.1 billion. Society would gain $12.70 for every dollar expended on the proposed intervention.

Conclusion

EM plus home detention could be an effective deterrent to crime and could have enormous social benefits, especially if it is applied early and saves what would otherwise be habitual offenders from a life of crime.  相似文献   
227.
Business Registers (BRs) are a very important information resource for investors, creditors, financial institutions and public authorities. The possibility to aggregate and interconnect these data at a European level could enhance the transparency of companies towards those actors and add a great deal of value to the raw Business Register data. The European BRITE project intended to provide adequate tools to meet these demands. BRITE will provide easier access and cross-border interoperability of Business Register data throughout Europe. On the other hand, the processing of BR data within the BRs and BRITE triggers several important European legislations such as the Data Protection Directive and the Directive on the re-use of public sector information. In this paper, the processing of BR data will be analysed from the perspective of both data protection and public sector information laws, analysing as well the relation between both regulations. Do these regulations strike an optimal balance between the interests of private data vendors to re-use BR data and enhance business transparency and the need to protect the personal data of natural persons?  相似文献   
228.
The developments of technology in communications industry have radically altered the ways in which we communicate and exchange information. Along with the speed, efficiency, and cost-saving benefits of the digital revolution come new challenges to the security and privacy of communications and information traversing the global communications infrastructure. As is with any technology the misuse of technology is noticed similarly the encryption technology. Encryption and other advanced technologies may be used, with direct impact on law enforcement and therefore some restrictions are necessary in the interests of national security. The problem, however, is ensuring that the restriction is legitimate and solely for in the interests of national security, the state not being allowed to interfere and keep a track on individuals' activities and private lives without sufficient cause. The individual needs encryption to protect their personal privacy and confidential data such as medical information, personal financial data, and electronic mail. In a networked environment, such information is increasingly at risk of being stolen or misused. Therefore, encryption is critical to building a secure and trusted global information infrastructure. Digital computers have changed the landscape considerably and the entire issue, at its simplest level, boils down to a form of balancing of interests. The specific legal and rights-related problems arising from the issue of cryptography and privacy in the Indian context are examined in this paper.  相似文献   
229.
Four years from the European Court of Justice's seminal rulings on database right in the British Horseracing Board and Fixtures Marketing cases, the Court has once again looked at the extent of protection this right affords. The earlier decisions had suggested the right was weak, with many databases not qualifying for protection and the extent of infringement required being difficult to meet. However, the ECJ's recent ruling in the Directmedia case (C-304/07) handed down in late-2008 is more positive for database owners. Adopting the reasoning of the Advocate General, the ECJ has clarified the types of acts which can constitute infringement of database right and confirmed they are broad in scope. The outcome and implications of the ruling are discussed below.  相似文献   
230.
This paper examines the concept of digital identity which the author asserts is now evident in the United Kingdom as a consequence of the Identity Cards Act (UK) 2006 and the National Identity Scheme it establishes. The nature and functions of the concept, particularly the set of information which constitutes an individual's transactional identity, are examined. The paper then considers the central question of who, or what, is the legal person in a transaction i.e. who or what enters into legal relations. The analysis presents some intriguing results which were almost certainly not envisaged by the legislature. The implications extend beyond the United Kingdom to similar schemes in other jurisdictions, and to countries, like Australia, which may implement such a scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号