首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 484 毫秒
1.
我们经常看到这样的报道,有些律师或当事人不服法官判决,在法庭上对法官粗暴无礼、辱骂和殴打司法工作人员,或聚众哄闹、冲击法庭、扰乱法庭秩序现象时有发生,且屡禁不止。但对这些行为如何定罪处罚,我国现行刑法却是"空白",而在国外,为了维护法庭的尊严,这些扰乱法庭的行为已构成"藐视法庭罪",  相似文献   

2.
我国《刑法》中的侵犯著作权罪中的"发行"行为与销售侵权复制品罪缠混难分,问题的源头在于司法解释出于扩大犯罪圈的考量,将"复制发行"理解为"复制并发行"。对两罪不加区隔,仅通过想象竞合或法条竞合理论解释的进路要么违反罪刑法定,要么违反罪刑均衡,不具有妥当性。将"发行"脱离知识产权法律文本另做解释的方案违反了法秩序统一原则,引发诸多问题。应当根据加功行为的不同故意等级区分"通谋型"加功与"明知型"加功,二者均成立帮助犯,但"通谋型"的加功处罚更重,以此区分侵犯著作权罪中的"发行"与销售侵权复制品罪。  相似文献   

3.
再现性危机已成为制约科研高质量发展的“瓶颈”。科研再现性危机主要有三大行为表现:科研统计的技术性“失真”、科研数据的过程性错误、科研决策的程序性“陷阱”。科研再现性危机主要科学域内在逻辑因素生发而成:学术无限自由引发科研行为失范,科研过程开放性缺失导致科研再现受限,不良专业文化滋生假阳性结果泛滥。对此,科研利益相关者需要在实验统计技术治理上修正P值域和设立置信区间,在科研过程治理上维护自由限度和推进开放科学,在科研专业文化治理上推进评价制度创新和改革公众科学媒体,在学科专业治理上改革科学课程体系和培养科学核心素养,在政府外部科学治理上推进政府科学政策改革和维护再现性研究合法性。  相似文献   

4.
科学道德失范的原因分析   总被引:3,自引:0,他引:3  
陈艳 《科技创业月刊》2006,19(3):154-155
科学道德失范现象是现今科技界普遍关注的问题,为什么会发生这么多的失范行为?本文从道德约束力的削弱、科学精神的匮乏、功利主义的泛滥以及科研管理体制不完善等几个方面来探讨引起科学道德失范的内外原因。  相似文献   

5.
阮云志 《科技管理研究》2012,32(17):187-190
科学界定学术道德及其相关概念是学术道德研究和建设的逻辑起点。对国内关于学术道德及其相关概念如学术、学术规范、学术道德规范、学术共同体、学术失范、学术道德失范、学术不端行为、科研不端行为、学术腐败行为等研究进行了简要的述评。  相似文献   

6.
网络举报作为一种新型举报方式,是公民参与反腐倡廉工作的重要方式。但在司法实践中,举报人受到打击报复的情况却屡屡发生。由于复杂的社会环境,不法分子所实施的打击报复行为往往隐秘而千变万化,根据其行为主体、手段、对象等各方面差异,对其刑法定性时有可能会涉及报复陷害罪、打击报复证人罪、打击报复会计、统计人员罪、故意伤害罪等罪名,故在对这些打击报复行为进行刑法定性时,不能一味地把所有的打击报复行为均界定为报复陷害罪,而应当具体问题具体分析。  相似文献   

7.
新媒体环境下公民通过网络媒体提供的平台表达观点,话语权较之传统媒体时代有了空前的提升。网络媒体在利益驱动下,一些行为活动偏离或者违背了主流社会的规范和要求,偏离了"正常的轨迹", 对正常的社会运行秩序产生搅动和破坏作用,产生了失范行为。这不仅会对网络媒体自身形象以及一部分网络行为者的正常的社会生活轨迹和秩序形成妨碍,而且也会对整个网络社会生活造成很大的影响,在一定程度上抑制网络正能量的发挥,因此要多管齐下、综合治理,净化网络环境。  相似文献   

8.
从经济学的视角探讨了科研道德失范行为的产生原因和治理途径。运用经济学的经典理论解释了个人和组织在科研活动中如何进行选择和决策;运用行为经济学的展望理论解释了科技工作者通过各种手段提升自己声誉的努力,并运用锚定效应、诱饵效应和金钱悖论分别阐释了科研不端行为的发生机制;运用信息经济学的委托-代理理论分析了国家宏观科研管理体制和科研项目运作方式中易于出现的逆向选择和道德风险问题;运用科学经济学的观点分析了科研活动中"胜者全得"和"马太效应"对科学家的影响;运用制度经济学中的制度变迁和路径锁定理论讨论了国家科研诚信制度建设和管理体制改革中存在的问题。  相似文献   

9.
论著作权刑法保护的立法完善   总被引:1,自引:0,他引:1  
倪大伟 《科教文汇》2008,(25):217-217
侵犯著作权的行为在我国近年有愈演愈烈的趋势,并且产生了一些新的侵权行为。相形之下,现行刑法中的相关规定在打击侵犯著作权行为的实践中渐显滞后。综观我国侵犯著作权立法的历史沿革和现行刑法中有关侵犯著作权罪的犯罪构成,结合司法实践,要从扩展刑法对著作权的保护范围,取消犯罪主观案件中的非法营利目的,侧重于对被害人的实质补偿,修改罚金刑、增强其可操作性,确立对侵犯著作权犯罪以自诉为主、公诉为辅的犯罪追诉模式和充分保护著作权人的权益以及社会公共利益等方面,进一步完善我国侵犯著作权罪的相关规定。  相似文献   

10.
王鹏 《金秋科苑》2011,(4):177-178
非法吸收公众存款罪属于破坏社会主义市场经济秩序类犯罪。近年,司法实践中出现了大量的"非法吸收公众存款罪"案例,引起了不少专家学者和法律实务者的关注。本罪立法模糊,很多地方的公、检机关把合法民间借贷行为也放进这个罪里,亦有同类行为不同判的现象,使司法实务出现混乱现象。并且本罪扩大化的倾向同我国加入世贸后打破金融垄断、鼓励金融市场竞争、民间金融合法化的趋势是背道而驰的。本文拟从该罪的犯罪构成入手,试着对该罪进行分析,以希望该罪能更加适应我国现状。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

14.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

17.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号