排序方式: 共有613条查询结果,搜索用时 15 毫秒
361.
Harvey Sicherman Author Vitae 《Orbis》2011,55(3):458-462
King Hussein had come to embody his country and bequeathed a much more robust state than the one he inherited, the author argues. 相似文献
362.
Purpose
The current study tests the shadow of sexual assault hypothesis and extends recent research by examining whether the fear of physical harm or the fear of sexual assault has a greater impact on fear of other crimes.Methods
To determine the unique interaction between gender and fear, we conduct separate analyses among men and women.Results
While fear of physical harm and fear of sexual intrusion are both predictive of fear of home invasion, robbery, and murder, fear of physical harm has a significantly greater impact across all types of fear (e.g., home invasion, robbery, murder).Conclusions
Despite previous empirical evidence that suggests fear operates differently among men and women, our findings suggest that fear of physical harm - rather than fear of sexual intrusion - is a more robust predictor of fear of crime among both men and women. 相似文献363.
In the last few years there has been a lot of buzz around a so-called ‘right to be forgotten’. Especially in Europe, this catchphrase is heavily debated in the media, in court and by regulators. Since a clear definition has not emerged (yet), the following article will try to raise the veil on this vague concept. The first part will weigh the right’s pros and cons against each other. It will appear that the ‘right to be forgotten’ clearly has merit, but needs better definition to avoid any negative consequences. As such, the right is nothing more than a way to give (back) individuals control over their personal data and make the consent regime more effective. The second part will then evaluate the potential implementation of the right. Measures are required at the normative, economical, technical, as well as legislative level. The article concludes by proposing a ‘right to be forgotten’ that is limited to data processing situations where the individual has given his or her consent. Combined with a public interest exception, this should (partially) restore the power balance and allow individuals a more effective control over their personal data. 相似文献
364.
Roads are ever more congested, pollution keeps rising and traffic-related deaths remain at unacceptable levels. It is clear that society’s needs with regard to transportation and mobility have become unsustainable. Intelligent Transport Systems (ITS) are often heralded as a potential solution to this problem, yet have still to yield tangible results. The EU has, however, adopted the ITS Directive, aiming for an EU-wide implementation of ITS solutions. Three questions are raised. First, can the ITS Directive really provide for the required substantial provisions in this field? Second, as ITS solutions are often deemed to be pervasive and intrusive, how does the ITS Directive interact with the EU legal framework on privacy and data protection? Third, given the involvement of private commercial entities in the field of providing road, traffic and travel data, can a public–private partnership be found to allow for the re-use of both public and private sector data in ITS solutions? 相似文献
365.
Richard Maher Author Vitae 《Orbis》2011,55(1):53-68
The decline in the United States’ relative position is in part a consequence of the burdens and susceptibilities produced by unipolarity. Contrary to the conventional wisdom, the U.S. position both internationally and domestically may actually be strengthened once this period of unipolarity has passed. 相似文献
366.
John Lehman Author Vitae 《Orbis》2011,55(3):347-350
Former Secretary of the Navy remembers his classmate from the University of Pennsylvania's International Relations program. Their subsequent careers intersected often in the years ahead—in Philadelphia, Washington, and beyond. John Lehman said Harvey “was an invaluable counsel on matters great and small, professional and personal.” 相似文献
367.
368.
369.
Some technological implications for ascertaining the contents of contracts in web-based transactions
Eliza Mik Author Vitae 《Computer Law & Security Report》2011,27(4):368-376
This paper points out some unexpected relationships between specific aspects of contract law and specific Internet-related technologies. The discussion is not about the interplay between “Law” and “Technology,” or the “Law” and the “Internet.” The aim is modest: to identify some theoretical chokepoints created by the technologies involved in web-based commerce and to point out the legal uncertainties persisting in this area. The analysis is confined to the process of contract formation, not to matters of substantive law. It is during this process that parties assume their contractual obligations and the contents of a contract crystallize. 相似文献
370.
Bruce Kuklick Author Vitae 《Orbis》2011,55(4):685-699
In the period after World War II, an eclectic assortment of scholars, policymakers, and managers presided over the creation of academic centers for the study of war. This article examines the intellectual and administrative assumptions of many of these actors. Made up of academic scholars from the fields of political science, sociology, and economics, they advanced a vision based on what might be called “instrumentalist-positivist social science,” but in appeals to donors they employed basic scientific language.1 相似文献