排序方式: 共有30条查询结果,搜索用时 0 毫秒
21.
论反向域名侵夺——电子商务中域名争议解决程序的滥用 总被引:1,自引:0,他引:1
反向域名侵夺是一个与域名抢注同时出现却又远没有引起足够重视的问题,UDRP的制度和CNNIC的规定指出了反向域名侵夺的定义和常见形态,却没有具体给出认定标准。本文主要讨论反向域名侵夺的"恶意"判断方法,指出当前制度设计中的缺陷,建议在立法中加入保证金、暂停受诉等惩罚措施,在实质上防范域名争议解决程序的滥用。 相似文献
22.
文章借鉴国外的经验,阐述人质事件的处置原则,研究制定了处置此类事件的适合中国国情的基本环节。 相似文献
23.
高峰 《贵州警官职业学院学报》2006,18(4):5-8
突发性劫持事件的前期处置是一项专业性、组织性、突击性、应变性极强的举措,是对参战警务人员整体素质的严峻考验。反劫持的实战规律证明:了解并掌握突发性劫持事件前期处置的相关理念、环节、谋略、经验,对于成功地赢得反劫持“处突”行动胜利是必不可少的。 相似文献
24.
打击危害国际民航安全非法行为的国际公约与我国刑法相关规定的完善 总被引:1,自引:0,他引:1
危害国际航空安全非法行为的产生.既有一定的客观条件,也有一定的社会根源,它不仅表现为对机场秩序、航空器的破坏,更多的是对航空器的劫夺、在航空器上放置爆炸物,甚至如美国911事件将航空器当成武器,社会危害极大,及时地加以防止和打击刻不容缓.目前国际社会经过努力已经制定了一系列防止、制止航空领域中的危害行为的国际公约,规定了危害国际航空安全犯罪行为为国际犯罪,并就有关的罪名、管辖权的行使、起诉或引渡等问题进行了规定,推进了惩治和打击危害国际民航安全非法行为的国际合作.我国是国际公约的缔约国,国内刑法对如何惩治危害国际民航安全犯罪行为也作出了相应的规定,但与国际公约的衔接方面仍存在一些问题,有待于进一步完善. 相似文献
25.
Alastair Ruffell Ph.D. Alan McCabe Colm Donnelly Ph.D. Brian Sloan B.Sc. 《Journal of forensic sciences》2009,54(2):382-394
Abstract: Reburial of human remains and concerns regarding pathogens and pollution prompted the search for, and assessment of, a 156-year-old graveyard. To locate this graveyard, historic and anecdotal information was compared to landscape interpretation from aerial photography. To assess and map the contents, surface collapses, metal detector indications, and ground-penetrating radar (GPR) were used. Some 170 anomalies compatible with burials were identified on 200 MHz GPR data, 84 of which coincided with surface collapses, suggesting both noncollapsed ground, subsequent infill, and multiple inhumations. The graveyard was possibly split into Roman Catholic plots with multiple inhumations; Protestant plots; and a kileen, or graveyard for the unbaptized (often children). The work serves as one approach to the location and mapping of recent and historic unmarked graves. 相似文献
26.
劫持民用航空器犯罪对航空安全构成极大威胁,通常分为“逃亡型”和“政治斗争手段型”。我国早期的劫持民用航空犯罪基本属于“逃亡型”,随着国际形势的变化“政治斗争手段”成为了发展的主要趋势。因此,应当从立法规制、措施调整以及完善管理体系等多方面建构我国劫持民用航空器犯罪的防控体系。 相似文献
27.
论劫持人质事件应急处置机制 总被引:2,自引:0,他引:2
张跃兵 《湖北警官学院学报》2009,22(6):58-62
在劫持人质事件应急处置工作中,机制起着基础性的作用。劫持人质事件应急处置机制的科学构建将有助于提高处置措施的针对性和适用性,降低处置成本,减少处置中的随意性,提高处置效率。劫持人质事件应急处置是以劫持人质犯罪的构成为切入点,包括事先科学筹划措施、事中有效控制事态以及事后及时做好善后工作三个方面的处理机制。必须将各方面处理机制有机结合起来才能更好地实现预期的处置效果。 相似文献
28.
王晓旻 《贵州警官职业学院学报》2006,18(2):76-79
各种劫持人质犯罪活动不断增多,实施手法不断翻新,它对政活、经济、社会秩序、公共安全造成的负面影响也越来越大,探索劫持案件处置模型,有针对性地加强训练,具有积极的意义. 相似文献
29.
Using data that combines information from the Federal Aviation Administration, the RAND Corporation and a newly developed database on global terrorist activity, we are able to examine trends in 1,101 attempted aerial hijackings that occurred around the world from 1931 to 2003. We have especially complete information for 828 hijackings that occurred before 1986. Using a rational choice theoretical framework, we use continuous‐time survival analysis to estimate the impact of several major counterhijacking interventions on the hazard of differently motivated hijacking attempts and logistic regression analysis to model the predictors of successful hijackings. Some of these interventions use certainty‐based strategies of target hardening to reduce the perceived likelihood of success. Others focus on raising the perceived costs of hijacking by increasing the severity of punishment. We also assess which strategies were most effective in deterring hijackers whose major purpose was related to terrorism. We found support for the conclusion that new hijacking attempts were less likely to be undertaken when the certainty of apprehension was increased through metal detectors and law enforcement at passenger checkpoints. We also found that fewer hijackers attempted to divert airliners to Cuba once that country made it a crime to hijack flights. Our results support the contagion view that hijacking rates significantly increase after a series of hijackings closely clustered in time—but only when these attempts were successful. Finally, we found that the policy interventions examined here significantly decreased the likelihood of nonterrorist but not that of terrorist hijackings. 相似文献
30.
As unmanned aerial vehicles have become more affordable, their popularity with the general public and commercial organisations has seen significant growth in recent years. Whilst remaining a device for both the hobbyist and aircraft-enthusiast to enjoy, they are now also used for carrying out activities such as law enforcement surveillance, agricultural maintenance, acquiring specialist movie and sports event footage along with search and seizure activities. Conversely, despite maintaining many legitimate uses, there are also increasing media reports of unmanned aerial vehicle technology being abused, ranging from physical assaults due to negligent flights to breaches of Civil Aviation Authority Air Navigation Regulations, requiring a forensic analysis of these devices in order to establish the chain of events. This article presents an introductory discussion of unmanned aerial vehicle analysis and provides the results of a digital forensic investigation of a test Parrot Bebop unmanned aerial vehicle. Directions for the acquisition and analysis of the device's internal storage are provided along with an interpretation of on-board flight data, captured media and operating system. Further, as the device can be controlled via Android and iOS devices using the application FreeFlight3, forensic analysis of these devices is also presented. Results showed the ability to recover flight data from both the unmanned aerial vehicle and controller handsets along with captured media, however problems exist with establishing the definitive owner of the device, particularly if a user had abandoned it at the scene of a crime. 相似文献