950 resultados para Power-law exponent


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Vol. 2 has title: England's improvement by sea and land. The second part : Containing, I. An account of its scituation, and the growths, and manufactures thereof. II. The benefit and necessity of a voluntary-register. III. A method for improving the Royal-navy, lessening the growing power of France, and obtaining the fishery. IV. Advantageous proposals for the city of London, for the preventing of fires therein; and for lessening the great charge of the trained bands. V. The way to make New-Haven in Sussex, fit to receive ships of burthen. VI. Seasonable discourses of the tin, iron, linnen, and woollen trades; with advantageous proposals for improving them all : Illustrated with seven large copper-plates / By Andrew Yarranton, gent. London : Printed, to be sold by Tho. Parkhurst ..., 1698.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using the work and ideas of French theorist Michel Foucault the writer examines s 3LA of the Crimes Act, which provides law enforcement officers with power to compel a person to reveal their private encryption keys and other personal information, and concludes that such a section creates fear, redirects flow of power between law enforcement agencies and citizens, and creates resistance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

How and why corporatism exists and persists within Australian law schools - as a form of knowledge, corporatism's success is attributable to the convergence of a range of historical, social and political contingencies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Discriminatory language became an important social issue in the west in the late twentieth century, when debates on political correctness and minority rights focused largely on the issue of respect in language. Japan is often criticized for having made only token attempts to address this issue. This paper investigates how one marginalized group—people with disabilities—has dealt with discriminatory and disrespectful language. The debate has been played out in four public spaces: the media, the law, literature, and the Internet. The paper discusses the kind of language, which has generated protest, the empowering strategies of direct action employed to combat its use, and the response of the media, the bureaucracy, and the literati. Government policy has not kept pace with social change in this area; where it exists at all, it is often contradictory and far from clear. I argue that while the laws were rewritten primarily as a result of external international trends, disability support groups achieved domestic media compliance by exploiting the keen desire of media organizations to avoid public embarrassment. In the absence of language policy formulated at the government level, the media effectively instituted a policy of self-censorship through strict guidelines on language use, thereby becoming its own best watchdog. Disability support groups have recently enlisted the Internet as an agent of further empowerment in the ongoing discussion of the issue.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

* Work supported by the Lithuanian State Science and Studies Foundation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tobacco companies are increasingly turning to trade and investment agreements to challenge measures aimed at reducing tobacco use. This study examines their efforts to influence the Trans-Pacific Partnership (TPP), a major trade and investment agreement which may eventually cover 40% of the world's population; focusing on how these efforts might enhance the industry's power to challenge the introduction of plain packaging. Specifically, the paper discusses the implications for public health regulation of Philip Morris International's interest in using the TPP to: shape the bureaucratic structures and decision-making processes of business regulation at the national level; introduce a higher standard of protection for trademarks than is currently provided under the Agreement on Trade Related Aspects of Intellectual Property Rights; and expand the coverage of Investor-State Dispute Settlement which empowers corporations to litigate directly against governments where they are deemed to be in breach of investment agreements. The large number of countries involved in the TPP underlines its risk to the development of tobacco regulation globally.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A hagyományos szavazási játékok speciális átruházható hasznosságú, kooperatív játékok, úgynevezett egyszerű játékok, ahol a játékosok a pártok, és az egyes koalíciók értéke 1 vagy 0 attól függően, hogy az adott koalíció elég erős-e az adott jogszabály elfogadásához, vagy sem. Ebben a cikkben bevezetjük az általánosított súlyozott szavazási játékok fogalmát, ahol a pártok mandátumainak száma a valószínűségi változó. Magyar példákon keresztül mutatjuk be az új megközelítés használhatóságát. / === / Voting games are cooperative games with transferable utility, so-called simple games, where the players are parties and the value of a coalition may be 0 or 1 depending on its ability to pass a new law. The authors introduce the concept of generalized weighted voting games where the parties' strengths are random variables. taking examples from Hungary to illustrate the use of this approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study explores how great powers not allied with the United States formulate their grand strategies in a unipolar international system. Specifically, it analyzes the strategies China and Russia have developed to deal with U.S. hegemony by examining how Moscow and Beijing have responded to American intervention in Central Asia. The study argues that China and Russia have adopted a soft balancing strategy of to indirectly balance the United States at the regional level. This strategy uses normative capabilities such as soft power, alternative institutions and regionalization to offset the overwhelming material hardware of the hegemon. The theoretical and methodological approach of this dissertation is neoclassical realism. Chinese and Russian balancing efforts against the United States are based on their domestic dynamics as well as systemic constraints. Neoclassical realism provides a bridge between the internal characteristics of states and the environment which those states are situated. Because China and Russia do not have the hardware (military or economic power) to directly challenge the United States, they must resort to their software (soft power and norms) to indirectly counter American preferences and set the agenda to obtain their own interests. Neoclassical realism maintains that soft power is an extension of hard power and a reflection of the internal makeup of states. The dissertation uses the heuristic case study method to demonstrate the efficacy of soft balancing. Such case studies help to facilitate theory construction and are not necessarily the demonstrable final say on how states behave under given contexts. Nevertheless, it finds that China and Russia have increased their soft power to counterbalance the United States in certain regions of the world, Central Asia in particular. The conclusion explains how soft balancing can be integrated into the overall balance-of-power framework to explain Chinese and Russian responses to U.S. hegemony. It also suggests that an analysis of norms and soft power should be integrated into the study of grand strategy, including both foreign policy and military doctrine.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper is a constructivist attempt to understand a global political space where states as actors (the traditional domain of international relations theory and international law) are joined by international organizations, firms, NGOs, and others. Today we know that many supposedly private or international orders (meaning sources of order other than the central institutions of the territorial state) are engaged in the regulation of large domains of collective life in a world where the sources of power are multiple, sovereignties are overlapping, and anarchy is meaningless. The paper begins with an attempt, discussed in the first section, to sort out what the rule of law might mean in the context of the WTO, where we soon see that it can only be understood by also considering the meaning of Administrative Law. Much of the debate about rule of law depends on positivist and centralist theories of “law,” whose inadequacy for my purposes leads, in the second section, to a discussion of legal pluralism and implicit law in legal theory. These approaches offer an alternative theoretical framework that respects the role of the state while not seeing it as the only source of normativity. The third section looks directly at WTO law and dispute settlement. I tr y to show that the sources and interpretations of law in the WTO and the trading system cannot be reduced to the Dispute Settlement Body. I conclude in the fourth section with some suggestions on how a WTO rule of law could be understood as democratic.