The Uses of History in Law and economics Ron harris During the last quarter of the twentieth century, the humanities and social sciences have turned toward history something that culminated in the 1990s, and this phenomenon was evident in law as well. However until recently law and economics, the most infuential post-World War
文件格式: PDF大小: 400.2KB页数: 39
KEEPING LEGAL HISTORY MEANINGFUL Richard H. pildes For nearly a generation after the end of reconstruction, conventionally identified as the 1876 disputed Presidential election and subsequent withdrawal of federal troops from the South black Americans' political participation remained surprisingly robust. Even in the 1890s, half of black men continued to vote in key gubernatorial races in Southern states
文件格式: PDF大小: 105.46KB页数: 23
“现代化冲击下的世界”丛书总序 以西方眼光衡量,中国人常被认为过份倚赖与尊重群体 另一方面,中华民族作为一个整体,却又十分自足,即使受 到外界极大刺激或面对种种炫惑,也往往无动于中。从中国 近代学术史的发展趋向来观察,这种看法似乎是不无道理的 在上一个世纪,讲求西学的前驱如魏源、王韬、郑观应等犹 如空谷足音,响应乏人,固不待言
文件格式: PDF大小: 1.3MB页数: 373
Beyond Preemption: The Law and Policy of Intellectual Property Licensing Mark A. Lemleylt Table of Contents Introduction ion Retween article and Int I. The Tension Between Article 2B and Intellectual Property A. Article 2B's Expansion of the Scope and Power of Contractsintellectu B. Potential Conflicts with Intellectual Property Law
文件格式: PDF大小: 268.37KB页数: 57
This paper contains the chapters on public enforcement of law and on criminal law from a general, forthcoming book, Foundations of Economic Analysis of Lany(Harvard University Press, 2003 ). By public law enforcement is meant the use of public law enforcement agents
文件格式: PDF大小: 403.23KB页数: 77
The financial privacy law passed by Congress in 1999 has been the target of scathing criticism. On one side, banks and other financial institutions have complained about the high costs of the billions of notices sent to consumers, apparently to widespread consumer indifference. On the other side, privacy
文件格式: PDF大小: 379.65KB页数: 60
Customary international law is an enigma It is produced by the decentralized actions of states, and it generally lacks centralized enforcement mechanisms. Political science realists and some rationalist legal scholars argue that customary international law cannot affect state behavior: that it is\epiphenomenal.\ This article develops a model of an n-player prisoner's dilemma in the customary international law context that shows that it is plausible that states would comply with customary international law under certain
文件格式: PDF大小: 286.21KB页数: 47
COMPARATIVE LAW WITHOUT LEAVING HOME: WHAT CIVIL PROCEDURE CAN TEACH CRIMINAL PROCEDURE, AND VICE VERSA David A. Sklansky Stephen C. Yeazell' This is a plea for comparative work in civil and criminal procedure. We do not argue here that American civil and criminal procedure should be counterpoised more
文件格式: PDF大小: 314.37KB页数: 54
present discussion it is useful to distinguish among four crime different general approaches(three of which seek to reduce principally through the operations of the law enforcement criminal motivation), which are distinguished by their own and criminal justice systems. These \formal\ systems of set of objectives and techniques. These four approaches to rime pr enti control serve the dual purpose of deterring law-breaking crime prevention are:
文件格式: PDF大小: 85.67KB页数: 12
1. Introduction This section discusses the legal protection of information and the security issues of computer data and electronic information systems and is organised into four parts: First, it focuses briefly on the basic conceptual distinction between information and data, providing a basis of understanding of the primary object of legal and technical means of protection. Second, access to Government information will be discussed
文件格式: PDF大小: 74.84KB页数: 17