This paper contains the chapters on public enforcement of law and on criminal law from a general, forthcoming book, Foundations of Economic Analysis of Lany(Harvard University Press, 2003 ). By public law enforcement is meant the use of public law enforcement agents
文件格式: PDF大小: 403.23KB页数: 77
The financial privacy law passed by Congress in 1999 has been the target of scathing criticism. On one side, banks and other financial institutions have complained about the high costs of the billions of notices sent to consumers, apparently to widespread consumer indifference. On the other side, privacy
文件格式: PDF大小: 379.65KB页数: 60
Customary international law is an enigma It is produced by the decentralized actions of states, and it generally lacks centralized enforcement mechanisms. Political science realists and some rationalist legal scholars argue that customary international law cannot affect state behavior: that it is\epiphenomenal.\ This article develops a model of an n-player prisoner's dilemma in the customary international law context that shows that it is plausible that states would comply with customary international law under certain
文件格式: PDF大小: 286.21KB页数: 47
COMPARATIVE LAW WITHOUT LEAVING HOME: WHAT CIVIL PROCEDURE CAN TEACH CRIMINAL PROCEDURE, AND VICE VERSA David A. Sklansky Stephen C. Yeazell' This is a plea for comparative work in civil and criminal procedure. We do not argue here that American civil and criminal procedure should be counterpoised more
文件格式: PDF大小: 314.37KB页数: 54
present discussion it is useful to distinguish among four crime different general approaches(three of which seek to reduce principally through the operations of the law enforcement criminal motivation), which are distinguished by their own and criminal justice systems. These \formal\ systems of set of objectives and techniques. These four approaches to rime pr enti control serve the dual purpose of deterring law-breaking crime prevention are:
文件格式: PDF大小: 85.67KB页数: 12
1. Introduction This section discusses the legal protection of information and the security issues of computer data and electronic information systems and is organised into four parts: First, it focuses briefly on the basic conceptual distinction between information and data, providing a basis of understanding of the primary object of legal and technical means of protection. Second, access to Government information will be discussed
文件格式: PDF大小: 74.84KB页数: 17
We might distinguish between two types of constitutional re- gimes, one codifying, the other transformative. A codifying consti- tutional regime aims at preserving something essential from the then- current constitutional or legal culture to protect it against change in the future; a transformative constitutional regime aims at changing g something essential in the then-current constitutional or legal cul- ture to make it different in the future. The picture of the codifying
文件格式: PDF大小: 135.15KB页数: 44
The foundational White Paper\Copyright and Digital Media in a Post-Napster World, by the Berkman Center for Internet Society and GartnerG2, explores a variety of issues surrounding the current digital media ecosystem. The White Paper examines
文件格式: PDF大小: 295.67KB页数: 36
这是一部以理论形态(论著)为对象、以人物为重点的中国近代美学思想史。因为广义的美学史研究,还可以涉及到文学艺术、自然风光、民情风俗、典章制度,乃至生产技术各个领域。而现在只取狭义的美学史的写法,严格一点,叫作美学思想史,更为确切。 第一部分 启蒙意义美学思想 第一章 龚自珍 第二章 魏源 第三章 阮元和包世臣 第二部分 太平天国美学思想 第四章 洪仁 第三部分 古典传统美学的余绪和终结 第五章 曾国藩 第六章 刘熙载 第四部分 改良主义美学思想 第七章 康有为 第八章 梁启超 第九章 黄遵宪 第十章 严复 第五部分 诗歌美学研究的新动向 第十一章 陈廷焯和况周颐 第十二章 陈衍 第六部分 文学、戏剧、绘画美学思想 第十三章 刘师培 第十四章 林纾 第十五章 吴梅 第七部分 中西美学思想会冲和结合 第十六章 王国维 第八部分 民主主义美学思想 第十七章 章 炳麟 第十八章 柳亚子 第十九章 蔡元培 第二十章 早期鲁迅
文件格式: PDF大小: 2.47MB页数: 713
温斯基在他的《回忆录》中说,仅仅法国人,他们对我 国学术的促进作用,要比整个欧洲加在一起,还要大得多。这 最少对我国18世纪的先进社会思想来说,是完全正确的。我 国先进社会思想从法国影响中得到的教益,要比从其余整个 欧洲影响中得到的多得多。实在说,当时,其余整个欧洲也 都处于法国的有力影响之下①
文件格式: PDF大小: 1.76MB页数: 457










