排序方式: 共有636条查询结果,搜索用时 62 毫秒
621.
John R. Schmidt Author Vitae 《Orbis》2008,52(1):107-122
Most interventions by outside forces to promote democracy in post-conflict states since WWII have failed. The most successful were in societies, such as Germany and Japan, featuring relatively high per capita GNP and diversified middle class economies. Among societies in general, prospects for democracy tend to diminish as per capita GNP decreases. The effects of conflict make democracy promotion considerably more difficult, particularly when poorer societies are plagued by weak institutions, corruption, religious extremism and ethnic, religious or factional animosities. Even if outsiders are able to control violence and actively promote democracy, success will depend on the underlying political culture and willingness of key political actors to play by democratic rules once the outsiders have gone. Hence, outsiders need to develop the best possible understanding of their prospects for success before committing to intervention, particularly when the resource demands are likely to be high. 相似文献
622.
The English High Court recently refused to grant an injunction to restrain The Times newspaper from publishing the identity of an anonymous political blogger (The author of a blog v Times Newspapers Limited [2009] EWHC 1358 (QB)). The facts of the case were unusual: there was no clearly unlawful behaviour by the blogger, who was also a police officer highly critical of political figures and policies. There was also no relationship between the blogger and the journalist who deduced the blogger's identity; the court therefore focussed on the tort of misuse of private information and countervailing public interests, such as freedom of expression. This article describes the approach of the court and considers the earlier case of Mahmood v Galloway ([2006] EWHC 1286 (QB)) concerning an undercover journalist's attempt to prevent publication of photographs showing what he looked like. It also discusses whether data protection law could have a role to play in future cases concerning attempts to preserve an online author's anonymity. The conclusion of the article is that this case does not spell the end of all anonymous blogging. 相似文献
623.
Due to a strong “Can Do” spirit and a well-engrained, albeit simplistic, notion of civilian control over the military, senior military leaders are disinclined to publicly share their disagreement with emerging national security policy. Many senior officers mistakenly believe that there are no alternatives other than just silently executing, resigning, or retiring when confronted with bad policy formulation. There are, however, options available to senior uniformed leaders when confronted with policy formulation that they, in their professional opinion, believe is flawed. Depending on the degree to which the civilian authorities are receptive to military advice and the magnitude of the threat to national security involved in the policy, senior military leaders can choose among many alternatives to widen the policy debate. 相似文献
624.
David Betz Author VitaeAuthor Vitae 《Orbis》2009,53(2):319-336
625.
Carmel Davis Author Vitae 《Orbis》2009,53(1):122-136
Why a combatant command for Africa? I argue that AFRICOM was formed to implement the U.S. national security strategy that seeks to strengthen states and eliminate ungoverned space, as well as establish relationships with African states that offer a means to greater state stability and foster economic development. In so doing, it counters global jihadist by denying them haven among weak governments or in ungoverned areas. It protects U.S. interests in resources by helping governments become more stable. And it competes with the Chinese approach that could worsen the status quo of ineffective states and ungoverned space. Indeed, the U.S. approach of increasing state effectiveness makes African countries less susceptible to the problems that may arise from the Chinese approach and so serves China's interests in access to natural resources. 相似文献
626.
Gabriela KennedyAuthor VitaeSarah DoyleAuthor Vitae Brenda LuiAuthor Vitae 《Computer Law & Security Report》2009,25(1):106-112
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
627.
Fanny CoudertAuthor Vitae 《Computer Law & Security Report》2009,25(2):145-154
CCTV networks are progressively being replaced by more flexible and adaptable video surveillance systems based on internet protocol (IP) technologies. The use of wireless IP systems allows for the emergence of flexible networks and for their customization, while at the same time video analytics is easing the retrieval of the most relevant information. These technological advances, however, bring with them threats of a new kind for fundamental freedoms that cannot always be properly assessed by current legal safeguards. This paper analyses the ability of current data protection laws in providing an adequate answer to these new risks. 相似文献
628.
Andrew R. Wilson Author Vitae 《Orbis》2008,52(2):358-371
This article proposes three lesson plans for teaching Asian military history to High School students. Each case study—Sun Tzu's Art of War, the Mongols, and the Rise and Fall of Imperial Japan—is structured around a primary source in translation and is designed to highlight the depth and diversity of the Asian experience with war. They allow us to see the East as more than a venue for the West's wars and also to appreciate the array of indigenous military and strategic cultures that have arisen and competed in Asia over the last three millennia. 相似文献
629.
630.
Michael DizonAuthor VitaeHelen KemmittAuthor Vitae Joanne PairmanAuthor VitaeNick WlochAuthor Vitae 《Computer Law & Security Report》2009,25(3):288-291
This is the latest edition of Baker & McKenzie's column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside websites are included where possible. No responsibility is assumed for the accuracy of information contained in these links 相似文献