首页 > 最新文献

Journal of Research and Practice in Information Technology最新文献

英文 中文
СONSIDERATION OF CLAIMES CANCELLATION OF DECISIONS BY NATIONAL COURTS THAT HAVE ENTERED INTO FORCE BY THE SUPREME COURT OF FINLAND Сonsideration关于撤销芬兰最高法院生效的国家法院判决的索赔
Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4361
Vitolds Zahars, V. Jilkine
{"title":"СONSIDERATION OF CLAIMES CANCELLATION OF DECISIONS BY NATIONAL COURTS THAT HAVE ENTERED INTO FORCE BY THE SUPREME COURT OF FINLAND","authors":"Vitolds Zahars, V. Jilkine","doi":"10.17770/acj.v4i73.4361","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4361","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67926291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PROSPECTS OF DEVELOPMENT THE JUDICIARY AND PHASED EXPANSION OF THE SCOPE OF JUDICIAL CONTROL IN PRE-TRIAL PROCEEDINGS 展望司法发展前景,逐步扩大审前程序司法控制范围
Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4353
M. Myrzakhanova, Yerlan Myrzakhanov, A. Dananova
{"title":"PROSPECTS OF DEVELOPMENT THE JUDICIARY AND PHASED EXPANSION OF THE SCOPE OF JUDICIAL CONTROL IN PRE-TRIAL PROCEEDINGS","authors":"M. Myrzakhanova, Yerlan Myrzakhanov, A. Dananova","doi":"10.17770/acj.v4i73.4353","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4353","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"39"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67924540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-JUSTICE SYSTEM IN BULGARIA: ELECTRONIC TOOLS FOR DEVELOPMENT OF E-JUSTICE 保加利亚的电子司法系统:电子司法发展的电子工具
Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4358
M. Petrova
{"title":"E-JUSTICE SYSTEM IN BULGARIA: ELECTRONIC TOOLS FOR DEVELOPMENT OF E-JUSTICE","authors":"M. Petrova","doi":"10.17770/acj.v4i73.4358","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4358","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"48"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67925969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THEORETICAL PROBLEMS ASSOCIATED WITH THE LEGAL CONCEPT OF TERM “GENOCIDE” 与“种族灭绝”一词法律概念有关的理论问题
Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4356
Armens Gabrieljans
{"title":"THEORETICAL PROBLEMS ASSOCIATED WITH THE LEGAL CONCEPT OF TERM “GENOCIDE”","authors":"Armens Gabrieljans","doi":"10.17770/acj.v4i73.4356","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4356","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"27"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67924755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VALUE OF OBSERVANCE OF THE PROCEDURAL FORM OF INVESTIGATIVE ACTIONS IN CRIMINAL PROCEDURE 侦查行为程序形式在刑事诉讼中的价值
Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4359
Marina Sumbarova
{"title":"VALUE OF OBSERVANCE OF THE PROCEDURAL FORM OF INVESTIGATIVE ACTIONS IN CRIMINAL PROCEDURE","authors":"Marina Sumbarova","doi":"10.17770/acj.v4i73.4359","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4359","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"14"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67926100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CRIMINAL LIABILITY FOR SOCIAL HATRED AND ENMITY INSTIGATION, DIFFICULTIES WITH THEIR THEORETICAL AND PRACTICAL APPLICATIONS 社会仇恨和煽动仇恨的刑事责任,其理论和实际应用的难点
Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4360
Ēriks Treļs
{"title":"CRIMINAL LIABILITY FOR SOCIAL HATRED AND ENMITY INSTIGATION, DIFFICULTIES WITH THEIR THEORETICAL AND PRACTICAL APPLICATIONS","authors":"Ēriks Treļs","doi":"10.17770/acj.v4i73.4360","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4360","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"19"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67926275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NATIONAL CYBERSECURITY STRATEGIES IN MEMBER STATES OF THE EUROPEAN UNION 欧盟成员国的国家网络安全战略
Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4355
S. Dimitrova, S. Stoykov, Yosif Kochev
Searching for solutions to the problems related to cybersecurity which occurred in the early 1990s, with their steadily increasing negative effects, has long gone beyond the borders of a single science and hence requires a complex interdisciplinary approach. The new challenges facing the international community and the information and communication technologies cross the national borders and the individual countries fail to deal independently and effectively with the new threats against cybersecurity only by policies at national level aiming at ensuring a high level of protection of its citizens and the networks of state power. The need for collective efforts to protect cyberspace has increased significantly and at present the European Union is one of the most influential players in the field of international policies pertaining to cybersecurity. Most often cybersecurity refers to: Ø measures for protecting information techno logies; Ø the included within those measures information, ongoing processes and the related physical and virtual elements (which, taken together, comprise cyber space); Ø the level of protection resulting from the implementation of those measures. Virtually all elements in cyberspace are at risk as their interconnection renders it difficult to determine the scope and framework of cybersecurity. One of the necessary conditions for the creation and development of an EU policy on cybersecurity is an understanding of what the term “cybersecurity” denotes. Achieving this can be difficult for several reasons. Some the main challenges and difficulties include its wide range and multiple aspects that influence the different spheres of social relations between EU citizens and between the Member States of the European Union. The scientific research and analysis of the authors of this publication are focused in this direction.
20世纪90年代初发生的与网络安全相关的问题,其负面影响稳步增加,寻找解决方案早已超出了单一科学的边界,因此需要复杂的跨学科方法。国际社会和信息通信技术面临的新挑战跨越国界,单个国家仅通过旨在确保其公民和国家权力网络的高水平保护的国家层面政策,无法独立有效地应对针对网络安全的新威胁。集体努力保护网络空间的必要性大大增加,目前,欧洲联盟是网络安全国际政策领域最具影响力的参与者之一。网络安全通常指的是:Ø保护信息技术的措施;Ø在这些措施中包括信息、正在进行的过程以及相关的物理和虚拟元素(它们共同构成网络空间);Ø因实施这些措施而产生的保护水平。网络空间中几乎所有元素都面临着风险,因为它们之间的相互联系使得确定网络安全的范围和框架变得困难。创建和发展欧盟网络安全政策的必要条件之一是理解“网络安全”一词的含义。由于几个原因,实现这一点可能很困难。一些主要挑战和困难包括影响欧盟公民之间和欧洲联盟成员国之间不同领域社会关系的范围广泛和多方面。本出版物作者的科学研究和分析都集中在这个方向上。
{"title":"NATIONAL CYBERSECURITY STRATEGIES IN MEMBER STATES OF THE EUROPEAN UNION","authors":"S. Dimitrova, S. Stoykov, Yosif Kochev","doi":"10.17770/acj.v4i73.4355","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4355","url":null,"abstract":"Searching for solutions to the problems related to cybersecurity which occurred in the early 1990s, with their steadily increasing negative effects, has long gone beyond the borders of a single science and hence requires a complex interdisciplinary approach. The new challenges facing the international community and the information and communication technologies cross the national borders and the individual countries fail to deal independently and effectively with the new threats against cybersecurity only by policies at national level aiming at ensuring a high level of protection of its citizens and the networks of state power. The need for collective efforts to protect cyberspace has increased significantly and at present the European Union is one of the most influential players in the field of international policies pertaining to cybersecurity. Most often cybersecurity refers to: Ø measures for protecting information techno logies; Ø the included within those measures information, ongoing processes and the related physical and virtual elements (which, taken together, comprise cyber space); Ø the level of protection resulting from the implementation of those measures. Virtually all elements in cyberspace are at risk as their interconnection renders it difficult to determine the scope and framework of cybersecurity. One of the necessary conditions for the creation and development of an EU policy on cybersecurity is an understanding of what the term “cybersecurity” denotes. Achieving this can be difficult for several reasons. Some the main challenges and difficulties include its wide range and multiple aspects that influence the different spheres of social relations between EU citizens and between the Member States of the European Union. The scientific research and analysis of the authors of this publication are focused in this direction.","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"54"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67924782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INHERITANCE BY CONTRACT COMPLEX INSTITUTION: PROBLEMATIC ISSUES ACTUALIZATION 契约继承的复杂制度:问题的实现
Pub Date : 2015-09-30 DOI: 10.17770/acj.v3i72.4338
Edvards Pilipsons
{"title":"INHERITANCE BY CONTRACT COMPLEX INSTITUTION: PROBLEMATIC ISSUES ACTUALIZATION","authors":"Edvards Pilipsons","doi":"10.17770/acj.v3i72.4338","DOIUrl":"https://doi.org/10.17770/acj.v3i72.4338","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"59"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67922578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE QUALIFICATION OF RAPE 强奸的资格
Pub Date : 2015-09-30 DOI: 10.17770/acj.v3i72.4337
Dainis Mežulis
{"title":"THE QUALIFICATION OF RAPE","authors":"Dainis Mežulis","doi":"10.17770/acj.v3i72.4337","DOIUrl":"https://doi.org/10.17770/acj.v3i72.4337","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"28"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67922305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DETERMINATION VALUE OF SMUGGLING GOODS 确定走私货物的价值
Pub Date : 2015-09-30 DOI: 10.17770/acj.v3i72.4339
Aleksejs Šaforostovs
{"title":"DETERMINATION VALUE OF SMUGGLING GOODS","authors":"Aleksejs Šaforostovs","doi":"10.17770/acj.v3i72.4339","DOIUrl":"https://doi.org/10.17770/acj.v3i72.4339","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"50"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67922467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Research and Practice in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1