首页 > 最新文献

Legal Issues in the Digital Age最新文献

英文 中文
Data Protection Regulation and International Arbitration: Can There Be Harmonious Coexistence (with the GDPR Requirements Concerning Cross-Border Data Transfer)? 数据保护法规与国际仲裁:能否和谐共存(与GDPR关于跨境数据传输的要求)?
Pub Date : 2021-07-27 DOI: 10.17323/2713-2749.2021.2.21.48
Elena Mazetova
Recent global trends are producing powerful growth in the digital environment, and its spread is prompting adoption of strict and comprehensive regulation to ensure data protection. This results in a number of difficulties, one of which is lack of consistency between data protection regulation and the regulatory regimes applicable to specific industries and institutions. That inconsistency is particularly evident in the field of international arbitration — one of the most widely used and convenient methods for resolving international disputes. The principles and fundamental concepts that largely define international arbitration, such as autonomy of the parties and confidentiality, have made its use very well accepted and widespread. However, data protection requirements often force the parties that are subject to them to make a difficult choice between the basic principles of international arbitration and the requirements of data protection regulation. This bind has come about because data protection regulation, which generally imposes comprehensive compliance obligations, rarely takes into account the specifics of the industries in which it will be applied. In this article it is analyzing application of the GDPR requirements that pertain to cross-border data transfer from the perspective of international arbitration in order to illustrate difficulties and regulatory gaps that may be encountered by the entities interested in thorough compliance with the applicable regulations.
最近的全球趋势正在推动数字环境的强劲增长,其蔓延促使采取严格和全面的监管措施,以确保数据保护。这导致了许多困难,其中之一是数据保护法规与适用于特定行业和机构的监管制度之间缺乏一致性。这种不一致在国际仲裁领域尤其明显- -这是解决国际争端最广泛使用和最方便的方法之一。在很大程度上界定国际仲裁的原则和基本概念,例如当事方的自治和保密,使国际仲裁的使用得到广泛接受和广泛。然而,数据保护要求往往迫使受其约束的各方在国际仲裁的基本原则和数据保护条例的要求之间作出艰难的选择。之所以会出现这种绑定,是因为数据保护法规通常会规定全面的合规义务,但很少考虑到它将适用于的行业的具体情况。本文将从国际仲裁的角度分析与跨境数据传输有关的GDPR要求的应用,以说明有意彻底遵守适用法规的实体可能遇到的困难和监管缺口。
{"title":"Data Protection Regulation and International Arbitration: Can There Be Harmonious Coexistence (with the GDPR Requirements Concerning Cross-Border Data Transfer)?","authors":"Elena Mazetova","doi":"10.17323/2713-2749.2021.2.21.48","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.2.21.48","url":null,"abstract":"Recent global trends are producing powerful growth in the digital environment, and its spread is prompting adoption of strict and comprehensive regulation to ensure data protection. This results in a number of difficulties, one of which is lack of consistency between data protection regulation and the regulatory regimes applicable to specific industries and institutions. That inconsistency is particularly evident in the field of international arbitration — one of the most widely used and convenient methods for resolving international disputes. The principles and fundamental concepts that largely define international arbitration, such as autonomy of the parties and confidentiality, have made its use very well accepted and widespread. However, data protection requirements often force the parties that are subject to them to make a difficult choice between the basic principles of international arbitration and the requirements of data protection regulation. This bind has come about because data protection regulation, which generally imposes comprehensive compliance obligations, rarely takes into account the specifics of the industries in which it will be applied. In this article it is analyzing application of the GDPR requirements that pertain to cross-border data transfer from the perspective of international arbitration in order to illustrate difficulties and regulatory gaps that may be encountered by the entities interested in thorough compliance with the applicable regulations.","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122623376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Law and Digital Transformation 法律与数字化转型
Pub Date : 2021-07-27 DOI: 10.17323/2713-2749.2021.2.3.20
Y. Tikhomirov, Nikolai Kichigin, Fatima V. Tsomartova, Sayana Balkhayeva
The coexistence of digitization and law fuels their mutual influence and calls for scholarly inquiry into their mutual impacts and the effects thereof. Technization of society has contributed to society’s development, and the objectives and vectors of this process have been in many ways informed by public and other social institutions, including law. Like before, digitization at its current stage combines social and technological mechanisms of managing societal processes, ingrained into the wide socio-economic context and connected with the implementation of the nation’s strategic objectives. Similar phenomena and processes have a strong impact beyond Russia’s borders as well. All this poses challenges for law. The article is an attempt to analyze legal challenges of digitization applying the method of comprehensive, intersectional and systemic analysis, which breaks down the excessive compartmentalization of sector-specific legal sciences and takes into account the relationship between national and international law, as well as advances in other social sciences. The new digital technologies transform law’s functionality, and this, firstly, is reflected in the dynamically developing sector-specific legislation, and secondly, adds a distinctive dimension to the new laws and regulations of general character that create the basis for digitization. Digitization transforms the way subjects of law operate and the volumes of legal relations between them; generates new forms of administrative decision-making and of liability for non-implementationof these decisions; problematizes the subject area of the legal nature of technical (electronic) legal acts and the place they occupy in the legislative and regulatory framework; highlights the issue of the potential and limitations of automation of law. The study leads the researchers to conclude that in the age of digital transformation of economy, social sphere and public administration, law steadily continues to function as the regulator of socio-economic and other processes in society, ensuring both stability and the necessary transformational activities of individuals and public institutions.
数字化与法律的共存助长了它们的相互影响,并要求对它们的相互影响及其影响进行学术研究。社会的技术化促进了社会的发展,这一进程的目标和途径在许多方面受到公共机构和其他社会机构,包括法律的影响。与以往一样,现阶段的数字化结合了管理社会进程的社会和技术机制,植根于广泛的社会经济背景,并与国家战略目标的实施联系在一起。类似的现象和过程也对俄罗斯境外产生了强烈的影响。所有这些都给法律带来了挑战。本文试图运用全面、交叉和系统的分析方法来分析数字化带来的法律挑战,打破了特定领域法学的过度划分,并考虑到国内法与国际法的关系,以及其他社会科学的进展。新的数字技术改变了法律的功能,这首先体现在动态发展的特定部门立法中,其次,为创造数字化基础的一般性新法律法规增加了一个独特的维度。数字化改变了法律主体的运作方式和他们之间法律关系的数量;产生新的行政决策形式和不执行这些决定的责任;对技术(电子)法律行为的法律性质的主题领域及其在立法和管理框架中的地位提出问题;强调了法律自动化的潜力和局限性。研究得出结论,在经济、社会领域和公共行政的数字化转型时代,法律稳步地继续发挥社会经济和其他社会进程的调节作用,确保个人和公共机构的稳定和必要的转型活动。
{"title":"Law and Digital Transformation","authors":"Y. Tikhomirov, Nikolai Kichigin, Fatima V. Tsomartova, Sayana Balkhayeva","doi":"10.17323/2713-2749.2021.2.3.20","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.2.3.20","url":null,"abstract":"The coexistence of digitization and law fuels their mutual influence and calls for scholarly inquiry into their mutual impacts and the effects thereof. Technization of society has contributed to society’s development, and the objectives and vectors of this process have been in many ways informed by public and other social institutions, including law. Like before, digitization at its current stage combines social and technological mechanisms of managing societal processes, ingrained into the wide socio-economic context and connected with the implementation of the nation’s strategic objectives. Similar phenomena and processes have a strong impact beyond Russia’s borders as well. All this poses challenges for law. The article is an attempt to analyze legal challenges of digitization applying the method of comprehensive, intersectional and systemic analysis, which breaks down the excessive compartmentalization of sector-specific legal sciences and takes into account the relationship between national and international law, as well as advances in other social sciences. The new digital technologies transform law’s functionality, and this, firstly, is reflected in the dynamically developing sector-specific legislation, and secondly, adds a distinctive dimension to the new laws and regulations of general character that create the basis for digitization. Digitization transforms the way subjects of law operate and the volumes of legal relations between them; generates new forms of administrative decision-making and of liability for non-implementationof these decisions; problematizes the subject area of the legal nature of technical (electronic) legal acts and the place they occupy in the legislative and regulatory framework; highlights the issue of the potential and limitations of automation of law. The study leads the researchers to conclude that in the age of digital transformation of economy, social sphere and public administration, law steadily continues to function as the regulator of socio-economic and other processes in society, ensuring both stability and the necessary transformational activities of individuals and public institutions.","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123261354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Issue of State Sovereignty in Cyberspace 网络空间的国家主权问题
Pub Date : 2021-07-27 DOI: 10.17323/2713-2749.2021.2.49.67
Liudmila Terentieva
The author examines a special approach to establishing the sovereignty of the state in relation to cyberspace, the extraterritorial characteristics of which determine the question of the implementation of the territorial supremacy of the state. The author concludes that the understanding of the state’s sovereignty in relation to cyberspace lies not in detailing a set of measures in the form of sovereign powers undertaken in this area, but in constructing the boundaries of cyberspace both in relation to the technical component of the network infrastructure that supports the smooth functioning of the Network, and in in relation to the virtual component of cyberspace. To achieve the goal of the study, the author proposed to combine social, technological and subjective approaches, understanding by cyberspace an artificial telecommunication environment for the implementation of public relations controlled by a wide range of subjects (states, intergovernmental organizations, non-governmental organizations, individuals, etc.), the functioning and maintenance of which is carried out by means of software-technical infrastructure in the form of its physical part (telecommunication networks, computers, servers, routers, processors, satellites, etc.) and a virtual part (operating systems, data transmission standards, hardware applications, software, etc.).
作者探讨了在网络空间中确立国家主权的一种特殊方法,其域外特征决定了国家领土至上的实施问题。作者的结论是,理解国家对网络空间的主权不在于在这一领域以主权权力的形式采取一系列措施,而在于构建网络空间的边界,这既涉及支持网络顺利运行的网络基础设施的技术组成部分,也涉及网络空间的虚拟组成部分。为了实现研究目标,作者提出将社会、技术和主观方法结合起来,通过网络空间理解一个人为的电信环境,以实施由广泛主体(国家、政府间组织、非政府组织、个人等)控制的公共关系。其功能和维护是通过软件技术基础设施以其物理部分(电信网络、计算机、服务器、路由器、处理器、卫星等)和虚拟部分(操作系统、数据传输标准、硬件应用程序、软件等)的形式进行的。
{"title":"The Issue of State Sovereignty in Cyberspace","authors":"Liudmila Terentieva","doi":"10.17323/2713-2749.2021.2.49.67","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.2.49.67","url":null,"abstract":"The author examines a special approach to establishing the sovereignty of the state in relation to cyberspace, the extraterritorial characteristics of which determine the question of the implementation of the territorial supremacy of the state. The author concludes that the understanding of the state’s sovereignty in relation to cyberspace lies not in detailing a set of measures in the form of sovereign powers undertaken in this area, but in constructing the boundaries of cyberspace both in relation to the technical component of the network infrastructure that supports the smooth functioning of the Network, and in in relation to the virtual component of cyberspace. To achieve the goal of the study, the author proposed to combine social, technological and subjective approaches, understanding by cyberspace an artificial telecommunication environment for the implementation of public relations controlled by a wide range of subjects (states, intergovernmental organizations, non-governmental organizations, individuals, etc.), the functioning and maintenance of which is carried out by means of software-technical infrastructure in the form of its physical part (telecommunication networks, computers, servers, routers, processors, satellites, etc.) and a virtual part (operating systems, data transmission standards, hardware applications, software, etc.).","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122147292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Problems of Typology of Armed Conflicts in Cyberspace 网络空间武装冲突的类型学问题
Pub Date : 2021-07-27 DOI: 10.17323/2713-2749.2021.2.82.103
Sergey Garkusha-Bozhko
The development of information technologies in the modern world affects all spheres of human activity, including the sphere of military activities of states. The current level of development of military information technologies allows us to talk about a new fifth possible theatre of military operations, namely, cyberspace. The Tallinn Manual on International Law Applicable to Cyber Operations, developed in 2013 and updated in 2017 by experts from the NATO States, also confirms the likelihood of armed conflict in cyberspace. It is indisputable fact that cyber operations committed in the context of an armed conflict will be subject to the same rules of International Humanitarian Law that apply to such armed conflict. However, many cyber operations that can be classified as military operations may be committed in peacetime and are common cybercrimes. In such circumstances, it is imperative to distinguish between such cybercrimes and situations of armed conflict in cyberspace. Due to the fact, that there are only two types of armed conflict — international and non-international, this problem of differentiation raises the question of the typology of armed conflicts in relation to cyberspace. The main questions within the typology of cyber armed conflicts are: whether an international armed conflict can start solely as a result of a cyber-attack in the absence of the use of traditional armed force; and how to distinguish between ordinary criminal behaviour of individuals in cyberspace and non-international armed conflict in cyberspace? The purpose of this article is to provide answers to these urgent questions. The author analyses the following criteria that play a role in solving the above problems: criteria for assigning a cyber attack to a state and equating such a cyber-attack with an act of using armed force in a cyber armed conflict of an international character; and criteria for the organization of parties and the intensity of military actions in a non-international cyber armed conflict. Based on the results of this analysis, the author gives relevant suggestions for solving the above issues.
现代世界信息技术的发展影响着人类活动的各个领域,包括国家的军事活动领域。目前军事信息技术的发展水平使我们能够谈论一个新的第五个可能的军事行动战区,即网络空间。由北约成员国专家于2013年制定并于2017年更新的《适用于网络行动的国际法塔林手册》也确认了网络空间发生武装冲突的可能性。在武装冲突背景下实施的网络行动将受到适用于此类武装冲突的国际人道法规则的约束,这是不争的事实。然而,许多可以归类为军事行动的网络行动可能发生在和平时期,是常见的网络犯罪。在这种情况下,必须将此类网络犯罪与网络空间武装冲突情况区分开来。由于只有两种类型的武装冲突——国际性和非国际性,这种区分问题提出了与网络空间有关的武装冲突类型的问题。网络武装冲突类型学中的主要问题是:在没有使用传统武装力量的情况下,国际武装冲突是否可以仅因网络攻击而开始;如何区分网络空间中个人的普通犯罪行为和网络空间中的非国际性武装冲突?本文的目的就是为这些紧迫的问题提供答案。笔者分析了在解决上述问题中发挥作用的以下标准:将网络攻击归为国家的标准,并将这种网络攻击等同于在国际性网络武装冲突中使用武力的行为;以及在非国际性网络武装冲突中各方组织和军事行动强度的标准。根据分析结果,笔者提出了解决上述问题的相关建议。
{"title":"Problems of Typology of Armed Conflicts in Cyberspace","authors":"Sergey Garkusha-Bozhko","doi":"10.17323/2713-2749.2021.2.82.103","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.2.82.103","url":null,"abstract":"The development of information technologies in the modern world affects all spheres of human activity, including the sphere of military activities of states. The current level of development of military information technologies allows us to talk about a new fifth possible theatre of military operations, namely, cyberspace. The Tallinn Manual on International Law Applicable to Cyber Operations, developed in 2013 and updated in 2017 by experts from the NATO States, also confirms the likelihood of armed conflict in cyberspace. It is indisputable fact that cyber operations committed in the context of an armed conflict will be subject to the same rules of International Humanitarian Law that apply to such armed conflict. However, many cyber operations that can be classified as military operations may be committed in peacetime and are common cybercrimes. In such circumstances, it is imperative to distinguish between such cybercrimes and situations of armed conflict in cyberspace. Due to the fact, that there are only two types of armed conflict — international and non-international, this problem of differentiation raises the question of the typology of armed conflicts in relation to cyberspace. The main questions within the typology of cyber armed conflicts are: whether an international armed conflict can start solely as a result of a cyber-attack in the absence of the use of traditional armed force; and how to distinguish between ordinary criminal behaviour of individuals in cyberspace and non-international armed conflict in cyberspace? The purpose of this article is to provide answers to these urgent questions. The author analyses the following criteria that play a role in solving the above problems: criteria for assigning a cyber attack to a state and equating such a cyber-attack with an act of using armed force in a cyber armed conflict of an international character; and criteria for the organization of parties and the intensity of military actions in a non-international cyber armed conflict. Based on the results of this analysis, the author gives relevant suggestions for solving the above issues.","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125601653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quest of Data Colonialism and Cyber Sovereignty: India’s Strategic Position in Cyberspace 数据殖民主义与网络主权的追求:印度在网络空间的战略地位
Pub Date : 2021-07-27 DOI: 10.17323/2713-2749.2021.2.68.81
Shubhendu Gupta, Reeta Sony
The dawn of the neocolonial project has seen the emergence of a new space: data. Data is a raw material that can be stitched, processed and marketed in the same way as the East India Company (EIC) used to do with India’s cotton. EIC, which started as one of the world’s first joint-stock companies, turned into a wild beast, building a corporate lobby with the help of lawyers and MP shareholders to amend legislation in its favor. The EIC became a particularly atrocious and innovative colonial project that directly or indirectly controlled continents, thanks to an army larger than the army of any nation-state at the time. The Drain Theory of Dadabhai Naroji have opened India’s eyes to how the EIC was taking raw material from the country and converting it into a finished product that was marketed in India again in the same way as raw data is being processed outside India and then marketed here today. In today’s digital era, big corporations need not own big armies, as companies are protected by nation-states and bailed out when required. Today, one does not need to travel overseas to explore and conquer Gold, God and Glory; instead, they are a click away. The neocolonial project runs on digital platforms, while the popular narrative of bridging the digital divide and giving internet access to millions of people resembles the idea of the “white savior” liberating the “noble savage” through modern Western education. Facebook’s grand plan of providing free internet to all can be best understood as a neocolonial strategy to mine the data of billions by equating it with water and land. Similarly, the Cambridge Analytica scandal provides an example of how neocolonial forces can influence the fundamental democratic process of electing a government. Therefore, nations endorsing democratic values should be especially wary of the trap of neocolonialist forces, as such nations are particularly vulnerable to their project. This paper critically study the cyber security infrastructure and policies in India and analyze the India’s approach towards cyber sovereignty and data colonialism and thereafter examine the India’s strategic position in cyberspace and suggest policy recommendations.
新殖民主义项目的曙光见证了一个新空间的出现:数据。数据是一种原材料,可以被缝制、加工和销售,就像东印度公司(East India Company, EIC)过去处理印度棉花一样。EIC最初是世界上最早的股份制公司之一,后来变成了一头野兽,在律师和国会议员股东的帮助下,建立了一个企业游说团体,以修改有利于自己的立法。EIC成为了一个特别残暴和创新的殖民项目,直接或间接地控制了各大洲,这要归功于当时一支比任何民族国家的军队都要庞大的军队。Dadabhai Naroji的流失理论让印度人看到了EIC是如何从印度获取原材料,并将其转化为成品,再在印度销售的,就像印度境外处理原始数据,然后在这里销售一样。在当今的数字时代,大公司不需要拥有庞大的军队,因为公司受到民族国家的保护,并在需要时得到纾困。今天,人们不需要到海外去探索和征服黄金、上帝和荣耀;相反,他们是一个点击。新殖民主义项目在数字平台上运行,而弥合数字鸿沟、让数百万人接入互联网的流行说法,类似于“白人救世主”通过现代西方教育解放“高贵野蛮人”的想法。Facebook向所有人提供免费互联网的宏伟计划,最好被理解为一种新殖民主义战略,通过将互联网等同于水和土地,来挖掘数十亿人的数据。同样,剑桥分析公司丑闻提供了一个例子,说明新殖民主义势力如何影响选举政府的基本民主过程。因此,支持民主价值观的国家应特别警惕新殖民主义势力的陷阱,因为这些国家特别容易受到新殖民主义计划的影响。本文批判性地研究了印度的网络安全基础设施和政策,分析了印度对网络主权和数据殖民主义的态度,随后研究了印度在网络空间的战略地位,并提出了政策建议。
{"title":"Quest of Data Colonialism and Cyber Sovereignty: India’s Strategic Position in Cyberspace","authors":"Shubhendu Gupta, Reeta Sony","doi":"10.17323/2713-2749.2021.2.68.81","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.2.68.81","url":null,"abstract":"The dawn of the neocolonial project has seen the emergence of a new space: data. Data is a raw material that can be stitched, processed and marketed in the same way as the East India Company (EIC) used to do with India’s cotton. EIC, which started as one of the world’s first joint-stock companies, turned into a wild beast, building a corporate lobby with the help of lawyers and MP shareholders to amend legislation in its favor. The EIC became a particularly atrocious and innovative colonial project that directly or indirectly controlled continents, thanks to an army larger than the army of any nation-state at the time. The Drain Theory of Dadabhai Naroji have opened India’s eyes to how the EIC was taking raw material from the country and converting it into a finished product that was marketed in India again in the same way as raw data is being processed outside India and then marketed here today. In today’s digital era, big corporations need not own big armies, as companies are protected by nation-states and bailed out when required. Today, one does not need to travel overseas to explore and conquer Gold, God and Glory; instead, they are a click away. The neocolonial project runs on digital platforms, while the popular narrative of bridging the digital divide and giving internet access to millions of people resembles the idea of the “white savior” liberating the “noble savage” through modern Western education. Facebook’s grand plan of providing free internet to all can be best understood as a neocolonial strategy to mine the data of billions by equating it with water and land. Similarly, the Cambridge Analytica scandal provides an example of how neocolonial forces can influence the fundamental democratic process of electing a government. Therefore, nations endorsing democratic values should be especially wary of the trap of neocolonialist forces, as such nations are particularly vulnerable to their project. This paper critically study the cyber security infrastructure and policies in India and analyze the India’s approach towards cyber sovereignty and data colonialism and thereafter examine the India’s strategic position in cyberspace and suggest policy recommendations.","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital Law and Digital Rights in Russia: Polemical Notes 俄罗斯的数字法律和数字权利:辩论笔记
Pub Date : 2021-05-04 DOI: 10.17323/2713-2749.2021.1.3.16
E. Talapina
Digitalization has become omnipresent today. No longer limited to the security sphere, digital technologies are actively transforming society as a whole. However, the conservative institution of law does not always respond promptly to changes, and many lawyers believe that the traditional legislation in force is sufficient to handle this new object of regulation. Yet the fact is that this object cannot be called traditional from the regulatory standpoint. Technology has a powerful impact on both law and the state and so requires new solutions. Under such circumstances, it is important to gain a legal understanding of digitalization without delay. The purpose of this article is to analyze the current state of legal regulation of digital technologies in Russia. By employing classical legal methods for analyzing doctrine, legislation and jurisprudence, the author comes to the conclusion that digital law is a new branch of law. At the same time, its most significant aspect is the regulation of digital rights — subjective rights associated with the use of digital technologies. Despite the neutral and universal character of technologies, a comparative legal approach allows us to identify the specific features of Russian digital law, as well as the nuances of the regulation and protection of digital rights in Russia. The present article reflects the author’s position and strives to inspire further discussion about these issues.
如今,数字化已经无处不在。数字技术不再局限于安全领域,它正在积极地改变整个社会。然而,保守的法律制度并不总是对变化作出迅速反应,许多律师认为,现行的传统立法足以处理这种新的监管对象。然而,事实是,从监管的角度来看,这个对象不能被称为传统。技术对法律和国家都有强大的影响,因此需要新的解决方案。在这种情况下,毫不拖延地获得对数字化的法律理解是很重要的。本文的目的是分析俄罗斯数字技术法律监管的现状。笔者运用经典法学方法对理论、立法和法学进行分析,认为数字法是一个新的法律分支。与此同时,其最重要的方面是对数字权利的监管,即与使用数字技术相关的主观权利。尽管技术具有中立性和普遍性,但比较法律方法使我们能够识别俄罗斯数字法的具体特征,以及俄罗斯数字权利监管和保护的细微差别。本文反映了作者的立场,并努力激发对这些问题的进一步讨论。
{"title":"Digital Law and Digital Rights in Russia: Polemical Notes","authors":"E. Talapina","doi":"10.17323/2713-2749.2021.1.3.16","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.1.3.16","url":null,"abstract":"Digitalization has become omnipresent today. No longer limited to the security sphere, digital technologies are actively transforming society as a whole. However, the conservative institution of law does not always respond promptly to changes, and many lawyers believe that the traditional legislation in force is sufficient to handle this new object of regulation. Yet the fact is that this object cannot be called traditional from the regulatory standpoint. Technology has a powerful impact on both law and the state and so requires new solutions. Under such circumstances, it is important to gain a legal understanding of digitalization without delay. The purpose of this article is to analyze the current state of legal regulation of digital technologies in Russia. By employing classical legal methods for analyzing doctrine, legislation and jurisprudence, the author comes to the conclusion that digital law is a new branch of law. At the same time, its most significant aspect is the regulation of digital rights — subjective rights associated with the use of digital technologies. Despite the neutral and universal character of technologies, a comparative legal approach allows us to identify the specific features of Russian digital law, as well as the nuances of the regulation and protection of digital rights in Russia. The present article reflects the author’s position and strives to inspire further discussion about these issues.","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117352915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Criminal law treatment of deviant behavior in media and social networks 媒体与社交网络中越轨行为的刑法处理
Pub Date : 2021-05-04 DOI: 10.17323/2713-2749.2021.1.123.144
Y. Gracheva, S. Malikov, A. Chuchaev
It would be difficult to imagine modern society without information and telecommunication networks, including media and social networks that promote the development of the economy, education, medicine, etc. Media and social networks are an important means of communication and especially so during the coronavirus lockdown; however, the more people are involved in cyberspace, the more crimes are committed there. The subject of this study is deviant behavior on media and social networks with the objectives of identifying the main types of deviant behavior, ascertaining the techniques used to impair public relations protected by criminal law, assessing the existing measures in criminal law that prevent deviant behavior on the internet, and proposing new measures that may be necessary. General scientific (dialectical, logical, systematic) and special legal (comparative legal, formal legal, legal modeling) methods are applied. More than 80% of cybercrime in Russia involves theft using modern social engineering technology for phishing. Although the Supreme Court of the Russian Federation has recommended otherwise, these thefts are treated as a different class in the theory of criminal law and judicial practice. One of the ways to achieve uniformity in law enforcement is to exclude special types of fraud from the Criminal Code of the Russian Federation. Another common way of taking possession of someone else’s property is to use a computer program to freeze a system until a certain amount of money has been transferred to a particular account. A gap in the treatment of such acts by criminal law is identified and ways to eliminate it are proposed. The 2020 pandemic highlighted the role of internet in spreading various pieces of fake news; Federal Law No. 100-FZ of April 1, 2020, which supplemented Articles 207.1 and 207.2 of the Criminal Code, was an effective and timely response. Media and social networks are often used as a platform forinciting, preparing and/or organizing the commission of a crime or other offenses.The study of cyberterrorism shows that there is no need to introduce an independentstandard for such acts. Cybercrime also includes attacks on privacy, and the articleexplores internet harassment in detail by delineating different types of it and the legalresponse to them. A proposal to amend the wording of Article 137 of the CriminalCode is judged sound.
很难想象没有信息和电信网络的现代社会,包括促进经济、教育、医学等发展的媒体和社会网络。媒体和社交网络是重要的沟通手段,尤其是在冠状病毒封锁期间;然而,参与网络空间的人越多,犯罪就越多。本研究的主题是媒体和社交网络上的越轨行为,目的是识别越轨行为的主要类型,确定用于损害受刑法保护的公共关系的技术,评估现行刑法中防止互联网越轨行为的措施,并提出可能需要的新措施。一般的科学方法(辩证的、逻辑的、系统的)和特殊的法律方法(比较法、形式法、法律建模)的应用。俄罗斯超过80%的网络犯罪涉及利用现代社会工程技术进行网络钓鱼的盗窃行为。虽然俄罗斯联邦最高法院另有建议,但这些盗窃行为在刑法理论和司法实践中被视为不同的一类。实现执法统一的方法之一是将特殊类型的欺诈行为从俄罗斯联邦刑法中排除。另一种占有他人财产的常见方法是使用计算机程序冻结系统,直到一定数量的钱被转移到特定账户。指出了刑法在处理这类行为方面存在的差距,并提出了消除这一差距的方法。2020年的大流行凸显了互联网在传播各种假新闻方面的作用;2020年4月1日颁布的第100-FZ号联邦法是对《刑法》第207.1条和第207.2条的有效和及时的回应。媒体和社交网络经常被用作煽动、准备和/或组织犯罪或其他犯罪的平台。对网络恐怖主义的研究表明,没有必要为此类行为引入一个独立的标准。网络犯罪还包括对隐私的攻击,这篇文章通过描述不同类型的网络骚扰以及对它们的法律回应,详细探讨了网络骚扰。修改刑法第一百三十七条措辞的建议被认为是合理的。
{"title":"Criminal law treatment of deviant behavior in media and social networks","authors":"Y. Gracheva, S. Malikov, A. Chuchaev","doi":"10.17323/2713-2749.2021.1.123.144","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.1.123.144","url":null,"abstract":"It would be difficult to imagine modern society without information and telecommunication networks, including media and social networks that promote the development of the economy, education, medicine, etc. Media and social networks are an important means of communication and especially so during the coronavirus lockdown; however, the more people are involved in cyberspace, the more crimes are committed there. The subject of this study is deviant behavior on media and social networks with the objectives of identifying the main types of deviant behavior, ascertaining the techniques used to impair public relations protected by criminal law, assessing the existing measures in criminal law that prevent deviant behavior on the internet, and proposing new measures that may be necessary. General scientific (dialectical, logical, systematic) and special legal (comparative legal, formal legal, legal modeling) methods are applied. More than 80% of cybercrime in Russia involves theft using modern social engineering technology for phishing. Although the Supreme Court of the Russian Federation has recommended otherwise, these thefts are treated as a different class in the theory of criminal law and judicial practice. One of the ways to achieve uniformity in law enforcement is to exclude special types of fraud from the Criminal Code of the Russian Federation. Another common way of taking possession of someone else’s property is to use a computer program to freeze a system until a certain amount of money has been transferred to a particular account. A gap in the treatment of such acts by criminal law is identified and ways to eliminate it are proposed. The 2020 pandemic highlighted the role of internet in spreading various pieces of fake news; Federal Law No. 100-FZ of April 1, 2020, which supplemented Articles 207.1 and 207.2 of the Criminal Code, was an effective and timely response. Media and social networks are often used as a platform forinciting, preparing and/or organizing the commission of a crime or other offenses.The study of cyberterrorism shows that there is no need to introduce an independentstandard for such acts. Cybercrime also includes attacks on privacy, and the articleexplores internet harassment in detail by delineating different types of it and the legalresponse to them. A proposal to amend the wording of Article 137 of the CriminalCode is judged sound.","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121959758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart contract: from definition to certainty 智能合约:从定义到确定性
Pub Date : 2021-05-04 DOI: 10.17323/2713-2749.2021.1.100.122
Y. Truntsevsky, V. Sevalnev
The purpose of the present article is to gain an understanding of the opportunities and difficulties created by the introduction and development of the practice of network (smart) contracts. Our research methodology is based on a holistic set of principles and methods of scholarly analysis employed by modern legal science. It uses a dialectical method involving both general approaches (structural system method, formal logical method, analysis and synthesis of individual elements, individual features of concepts, abstraction, generalization, etc.) and particular methods (legal technical, systematic, comparative, historical, and grammatical methods, method of the unity of theory and practice, etc.). We analyze the views of lawyers and other specialists from Russia and abroad, legislative innovations in the field of digital technologies, the practice of blockchain-based smart contracts, and the main risks (whether legal, technological, operational, or criminogenic) of smart contracts for economic activities with a study of their causes. In the present-day situation, it is necessary to move from the legal definition of the smart contract and its legal and technological characteristics, advantages and disadvantages to the implementation of startups in a wide range of areas, especially business, public regulation, and social relations. Scholarly and information support for such processes will contribute to the development of industry, public administration and digital technology applications to improve the life of individual citizens and society as a whole. The introduction of smart contracts does not require the adoption of new laws or regulations. Instead, one should adapt and, possibly, modify existing legal principles at the legislative and judicial levels to pave the way for the use of smart contracts and other new technologies. The system of contract law provides a sufficient framework for regulating transactions without the introduction of any new legal categories. We propose approaches to the legal definition of the smart contract and identify a set of problems that must be solved at the legislative and technical legal levels in order to implement smart contracts effectively in different spheres of life.
本文的目的是了解网络(智能)合约实践的引入和发展所带来的机遇和困难。我们的研究方法是基于一套完整的原则和现代法律科学所采用的学术分析方法。它采用辩证的方法,既包括一般方法(结构系统方法、形式逻辑方法、单个要素的分析和综合、概念的个别特征、抽象、概括等),也包括特殊方法(法律技术方法、系统方法、比较方法、历史方法和语法方法、理论和实践相结合的方法等)。我们分析了来自俄罗斯和国外的律师和其他专家的观点,数字技术领域的立法创新,基于区块链的智能合约的实践,以及智能合约在经济活动中的主要风险(无论是法律、技术、操作还是犯罪),并研究了其原因。在当前的情况下,有必要从智能合约的法律定义及其法律和技术特征、优势和劣势转向在广泛领域,特别是商业、公共监管和社会关系中实施创业。对这些进程的学术和信息支持将有助于工业、公共行政和数字技术应用的发展,以改善公民个人和整个社会的生活。引入智能合约不需要采用新的法律或法规。相反,人们应该在立法和司法层面调整和修改现有的法律原则,为智能合约和其他新技术的使用铺平道路。合同法制度在不引入任何新的法律类别的情况下,为规范交易提供了充分的框架。我们提出了智能合约的法律定义方法,并确定了一系列必须在立法和技术法律层面解决的问题,以便在不同的生活领域有效地实施智能合约。
{"title":"Smart contract: from definition to certainty","authors":"Y. Truntsevsky, V. Sevalnev","doi":"10.17323/2713-2749.2021.1.100.122","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.1.100.122","url":null,"abstract":"The purpose of the present article is to gain an understanding of the opportunities and difficulties created by the introduction and development of the practice of network (smart) contracts. Our research methodology is based on a holistic set of principles and methods of scholarly analysis employed by modern legal science. It uses a dialectical method involving both general approaches (structural system method, formal logical method, analysis and synthesis of individual elements, individual features of concepts, abstraction, generalization, etc.) and particular methods (legal technical, systematic, comparative, historical, and grammatical methods, method of the unity of theory and practice, etc.). We analyze the views of lawyers and other specialists from Russia and abroad, legislative innovations in the field of digital technologies, the practice of blockchain-based smart contracts, and the main risks (whether legal, technological, operational, or criminogenic) of smart contracts for economic activities with a study of their causes. In the present-day situation, it is necessary to move from the legal definition of the smart contract and its legal and technological characteristics, advantages and disadvantages to the implementation of startups in a wide range of areas, especially business, public regulation, and social relations. Scholarly and information support for such processes will contribute to the development of industry, public administration and digital technology applications to improve the life of individual citizens and society as a whole. The introduction of smart contracts does not require the adoption of new laws or regulations. Instead, one should adapt and, possibly, modify existing legal principles at the legislative and judicial levels to pave the way for the use of smart contracts and other new technologies. The system of contract law provides a sufficient framework for regulating transactions without the introduction of any new legal categories. We propose approaches to the legal definition of the smart contract and identify a set of problems that must be solved at the legislative and technical legal levels in order to implement smart contracts effectively in different spheres of life.","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rights to Intellectual Works Generated with Artificial Intelligence: A Russian View in the Global Context 人工智能产生的知识作品的权利:全球背景下的俄罗斯观点
Pub Date : 2021-05-04 DOI: 10.17323/2713-2749.2021.1.42.63
V. Kalyatin
The broad use of artificial intelligence in creating intellectual works poses difficulties for legislators and courts in choosing the proper legal framework for such works and defining the place of artificial intelligence in the legal system as a whole. In this article, we shall study different models of regulating such issues and analyze the prospects and consequences of their use. We show that only a few of many different models for copyrighting AI-generated works are viable and that the most promising among them is the introduction of a special limited related right for the person who organizes the use of the AI application. This model resembles already existing civil law approaches to protecting the rights of phonogram producers, broadcasting and cablecasting organizations, and database creators. Thus, the inclusion of artificial intelligence into the IP domain does not require reconstructing the legal framework but only adapting existing approaches.
人工智能在创造智力作品方面的广泛应用,给立法者和法院在为这些作品选择适当的法律框架以及界定人工智能在整个法律体系中的地位方面带来了困难。在本文中,我们将研究监管此类问题的不同模式,并分析其使用的前景和后果。我们表明,在许多不同的人工智能生成作品的版权模式中,只有少数是可行的,其中最有前途的是为组织使用人工智能应用程序的人引入一种特殊的有限相关权利。这种模式类似于已经存在的保护录音制品制作者、广播和有线广播组织以及数据库创建者权利的民法方法。因此,将人工智能纳入知识产权领域不需要重建法律框架,而只需要适应现有的方法。
{"title":"Rights to Intellectual Works Generated with Artificial Intelligence: A Russian View in the Global Context","authors":"V. Kalyatin","doi":"10.17323/2713-2749.2021.1.42.63","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.1.42.63","url":null,"abstract":"The broad use of artificial intelligence in creating intellectual works poses difficulties for legislators and courts in choosing the proper legal framework for such works and defining the place of artificial intelligence in the legal system as a whole. In this article, we shall study different models of regulating such issues and analyze the prospects and consequences of their use. We show that only a few of many different models for copyrighting AI-generated works are viable and that the most promising among them is the introduction of a special limited related right for the person who organizes the use of the AI application. This model resembles already existing civil law approaches to protecting the rights of phonogram producers, broadcasting and cablecasting organizations, and database creators. Thus, the inclusion of artificial intelligence into the IP domain does not require reconstructing the legal framework but only adapting existing approaches.","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131515829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Palingenesis of Criminal Law in the Conditions of Digital Reality 数字现实条件下的刑法轮回
Pub Date : 2021-05-04 DOI: 10.17323/2713-2749.2021.1.145.159
E. Russkevich
The article proves that the influence of exponential and combinatorial technological changes has led to a crisis of criminal law, which is expressed in the inability to perform its basic functions due to the permanent and dynamic external environmental impact. The author identifies the following fundamental provisions that should be relied on when making decisions on the modernization of criminal law: the emergence of a new (informational) method of committing a crime does not a priori indicate that it is more dangerous than the traditional one, but in many respects indicates the problem of lag social control from the development of society and changes in crime; the adaptation of the norms of the criminal law to the conditions of the information society should not be associated with the construction of “digital twins” of traditional criminal law prohibitions; the introduction of appropriate amendments to the content of the norms is justified only in cases where the adaptive capacity of criminal legislation to manifestations of digital crime exhausts itself; the recognition of the use of information technologies as a qualifying feature of a crime in general must comply with the criteria for differentiating criminal liability justified in science. The article separately substantiates that the emergence of a “digital personality” will complete the beginning of the transition from the traditional criminal law of the industrial society of the 20th century towards the criminal law of the digital world of the 21th century (criminal law 2.0). First of all, this is due to the fact that artificial intelligence and “digital personality” will fundamentally change the scope of criminal law protection.
本文论证了指数型和组合型技术变革的影响导致了刑法的危机,表现为由于外部环境的永久性和动态性影响,刑法的基本功能无法发挥。笔者认为,在对刑法现代化问题作出判断时,应当依据以下基本规定:一种新的(信息化)犯罪方式的出现,并不先验地表明它比传统的犯罪方式更危险,而是在许多方面从社会的发展和犯罪的变化中表明了社会控制滞后的问题;刑法规范对信息社会条件的适应不应与传统刑法禁令的“数字孪生”构建相关联;只有在刑事立法对数字犯罪表现形式的适应能力耗尽的情况下,才有理由对规范的内容进行适当的修改;一般来说,承认使用信息技术是犯罪的一个合格特征,必须符合区分科学上证明合理的刑事责任的标准。文章分别论证了“数字人格”的出现将完成从20世纪工业社会的传统刑法向21世纪数字世界刑法(刑法2.0)过渡的开端。首先,这是因为人工智能和“数字人格”将从根本上改变刑法的保护范围。
{"title":"Palingenesis of Criminal Law in the Conditions of Digital Reality","authors":"E. Russkevich","doi":"10.17323/2713-2749.2021.1.145.159","DOIUrl":"https://doi.org/10.17323/2713-2749.2021.1.145.159","url":null,"abstract":"The article proves that the influence of exponential and combinatorial technological changes has led to a crisis of criminal law, which is expressed in the inability to perform its basic functions due to the permanent and dynamic external environmental impact. The author identifies the following fundamental provisions that should be relied on when making decisions on the modernization of criminal law: the emergence of a new (informational) method of committing a crime does not a priori indicate that it is more dangerous than the traditional one, but in many respects indicates the problem of lag social control from the development of society and changes in crime; the adaptation of the norms of the criminal law to the conditions of the information society should not be associated with the construction of “digital twins” of traditional criminal law prohibitions; the introduction of appropriate amendments to the content of the norms is justified only in cases where the adaptive capacity of criminal legislation to manifestations of digital crime exhausts itself; the recognition of the use of information technologies as a qualifying feature of a crime in general must comply with the criteria for differentiating criminal liability justified in science. The article separately substantiates that the emergence of a “digital personality” will complete the beginning of the transition from the traditional criminal law of the industrial society of the 20th century towards the criminal law of the digital world of the 21th century (criminal law 2.0). First of all, this is due to the fact that artificial intelligence and “digital personality” will fundamentally change the scope of criminal law protection.","PeriodicalId":410740,"journal":{"name":"Legal Issues in the Digital Age","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131714281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Legal Issues in the Digital Age
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1