首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51篇
  免费   1篇
工人农民   1篇
世界政治   2篇
法律   28篇
中国共产党   1篇
中国政治   1篇
政治理论   4篇
综合类   15篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   6篇
  2019年   1篇
  2018年   2篇
  2017年   3篇
  2016年   1篇
  2015年   1篇
  2014年   4篇
  2013年   3篇
  2012年   5篇
  2011年   3篇
  2010年   3篇
  2009年   5篇
  2008年   5篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2000年   1篇
排序方式: 共有52条查询结果,搜索用时 15 毫秒
51.
La Porta, Lopez-de-Silanes, and Shleifer (J Financ 61:1–32, 2006) (LLS) have undertaken an empirical analysis, making a critical but somewhat provocative proposition that “securities laws ‘facilitating’ private enforcement, rather than providing for public enforcement, benefit the securities market.” After briefly providing a theoretical connection to the existing law and economics literature, I attempt to empirically advance this LLS proposition two-fold, particularly on the ‘joint use of regulation and the liability rule,’ by exploring the most meaningful word ‘facilitate’ therein. Firstly, I explore the cross-country LLS data associated with the specific case of an initial public offering to seek possibly more solid evidence on the facilitating effect. Secondly, motivated by LLS, I pursue a within-country positive analysis, regarding the major determinants of the joint use, but across overall harmful activities covered in the Korean Securities Law. The major tenet underscoring this second empirical exploration was the clear message from the existing theoretical literature that the joint use should be adopted in a selective manner even within a single substantive statute, because it usually governs vastly different harmful activities. Finally, I call for some essential research agenda, prior to approving the ineffectiveness of public enforcement claimed in the second part of the LLS proposition.
Iljoong KimEmail:
  相似文献   
52.
This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence.The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date.This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally.In this article, the authors examine whether static and dynamic IP addresses are “personal data” as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号