首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15篇
  免费   0篇
工人农民   1篇
法律   8篇
中国政治   2篇
政治理论   1篇
综合类   3篇
  2022年   1篇
  2018年   1篇
  2017年   1篇
  2014年   2篇
  2013年   1篇
  2012年   1篇
  2010年   2篇
  2009年   1篇
  2008年   1篇
  2005年   3篇
  2004年   1篇
排序方式: 共有15条查询结果,搜索用时 31 毫秒
1.
近年来,全国各地匿名信敲诈案件大量发生。作案人使用伪造的或非本人的身份证到银行申领信用卡,书写或打印匿名信件对知名人士或各类企业、各级党政机关人员进行敲诈,严重扰乱和影响了社会正常生活秩序,甚至严重危害社会公共安全。文件检验是侦破此类案件的重要手段和突破口。  相似文献   
2.
匿名威胁爆炸案的新特点及其现场处置对策   总被引:1,自引:0,他引:1  
近些年北京发生匿名威胁爆炸案件显现猛升势头,并出现一些新的特点.对这类案件的现场处置应遵循"信、严、快、判、细、敢"六字方针.  相似文献   
3.
新《刑事诉讼法》规定,鉴定意见应经质证才能作为定案依据.这一刚性规定促使鉴定人必须履行出庭作证义务,从而提高了鉴定意见证据效力对质证程序的依赖程度,鉴定人出庭作证制度的完善就格外重要.鉴定人屏蔽作证方式为这一问题的探寻提供了微观视角,我国已经存在证人屏蔽作证的司法实践,但是对于鉴定人屏蔽作证的正当性还存在争议,而这些争议实质上是鉴定人屏蔽作证与传统诉讼法原理的冲突与解决,具体反映在鉴定人屏蔽作证应当遵循的原则、程序设置、配套措施等方面.  相似文献   
4.
隐名出资的股权状态,不同于“出资人—股权—公司”的传统认定结构,涉及对内对外多重法律关系。现有相关规定深受契约法思维定式的影响,忽视了公司的程式地位,不仅使得股东认定标准在司法实践中存在摇摆,而且严重困扰隐名出资的制度定型。从组织法视域出发,隐名出资可分为“借名取利型”和“借名经营型”两种类型,基于此,能够在公司程式运行、股权争议状态、善意取得等环节合理划定各主体间的关系,完成隐名出资的完整应用。此二元类型的划分以“行权”作为核心要素,从公司关系角度分析“名实分离”的两个主体与公司之间的关系,通过重点识别实际出资人在组织法中的规范位置,实现对隐名出资的理论解读。  相似文献   
5.
隐名投资人股东资格认定问题研究   总被引:1,自引:0,他引:1  
王芳 《河北法学》2012,(1):100-101,102,103,104,105,106,107
股东是公司关系中最为重要的角色,股东资格又是股东地位的法律基础。隐名投资争议中隐名投资人股东资格的认定遂成为理论及实务界的难题。为了给司法实践提供有效解决的路径,在已有理论研究的基础上展开讨论,从厘清基本概念出发,对争议进行类型化的处理,提出借用《合同法》的隐名代理制度和代理人身份不公开制度来解释隐名投资的内外关系,并结合案例分析,提出相应的解决办法。  相似文献   
6.
The paper deals with identity management in cross-border and cross-sector communication in e-government. The new ALUCID (automatic, liberal and user-centric electronic identity) technology based on new principles of anonymous and automatic identity enables markedly different and simpler identity management with strong authentication support. This paper aims to compare ALUCID with PKI (public key infrastructure, a well-known identity management technology used in cross-border and cross-sector environment of e-government) from user's and government's point of view. It focuses on organizational aspects of eID issuing and verification, various interoperability issues, language issues, legislative framework variety, cultural differences and privacy protection issues related to identity use and management. The specific features of the ALUCID technology which was designed to support the specific needs of e-government in a cross-border and cross-sector environment are also described herein.  相似文献   
7.
On 7th January 2013 the Anonymous hacking collective launched a White House petition asking the Obama administration to recognize DDoS11. Distributed Denial of Service attacks, thereafter referred to as DDoS attacks as a valid form of protest, similar to the Occupy protests. The ‘Occupy’ movement against financial inequality has become an international protest phenomenon stirring up the debate on the legal responses to acts of civil disobedience. At the same time, online attacks in the form of DDoS are considered by many as the digital counterparts of protesting. While the law generally acknowledges a certain level of protection for protesting as a manifestation of the rights to free speech and free assembly, it is still unclear whether DDoS attacks could qualify as free speech. This paper examines the analogies between offline protests and DDoS attacks, discusses legal responses in both cases and seeks to explore the scope for free speech protection.  相似文献   
8.
我国《合同法》第402条、第403条是对英美法隐名代理与不公开被代理人身份的代理的借鉴,分别规定了我国的隐名代理与间接代理制度。间接代理与行纪虽然存在一定的相似性,但两者也存在着明显的区别。绝不能将间接代理归入行纪,也不能认为行纪为典型的间接代理。  相似文献   
9.
The distribution or consumption of traditional drugs has become the subject of stringent penalties throughout most of the world and synthetic designer drugs have become the alternative. Novel psychoactive substances, also called ‘legal highs’, are highly varied in terms of chemical composition. These substances are advertised and distributed as an alternative to traditional drugs on the Internet, making identification of new substances and enforcement difficult. For this article, we downloaded and analysed 28 Russian-language online drug marketplaces which distribute traditional and novel psychoactive substances. All marketplaces used a noncontact drug dealing method where the seller and the buyer communicate through the Internet to arrange for payment and delivery of drugs without meeting face-to-face. Geographic information, price, amount, substance type and payment method data were extracted. Findings indicate such marketplaces are able to operate due to the ability of their clients to pay anonymously with the virtual currencies Qiwi and Bitcoin.  相似文献   
10.
论电子合同当事人的行为能力   总被引:2,自引:0,他引:2  
在电子交易中,无行为能力人和限制行为能力人缔结的合同效力确定,适用我国<合同法>第47条规定.对于一些权利和义务比较简单的电子交易,以虚拟的"主体"身份出现的消费者应该可以不提供真实身份.商家在电子交易中的行为能力应由官方管理的因特网认证机构按网上交易的要求,核实商家的真实身份,签发一份"电子证书",用来说明其合法性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号