{"title":"RELATIONSHIP AND INTERACTION OF INTERNATIONAL PUBLIC, INTERNATIONAL PRIVATE LAW AND NATIONAL LAW","authors":"Aleksandrs Baikovs, I. Bulgakova","doi":"10.17770/acj.v3i88.4419","DOIUrl":"https://doi.org/10.17770/acj.v3i88.4419","url":null,"abstract":"The purpose of this paper is to analyze the interplay between international public and private law and national law, and to provide an assessment of the theory of public and private law and its interrelationship.Private international law is closely linked to public international law. However, if public international law is an autonomous system of law, then private international law is an integral part of national law, since it governs cross-border private law relations.The objectives of the study stem from its purpose, namely:to clarify the nature and understanding of international public and private law; to clarify the relationship between international public and private law and national (internal) law. The object of the research is the problems of the relation and interrelation of international public and private law.As a result of the study, several conclusions were drawn, which are as follows: 1) public international law is an independent legal system, but private international law is an integral part of national law; 2) there is a relationship between public international law and private international law; 3) general theoretical categories and concepts are partly incompatible with the nature of both international public and private international law; 4) the value, validity, and credibility of contemporary theoretical research in international law largely depends on the inclusion of relevant categories andThe following methods have been used in the research: analysis and synthesis, induction and deduction, abstracting, generalization, analogy, idealization, formalization, axiomatic method, systematic and historical research.","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"108"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49011154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TOPICAL ISSUES OF TOBACCO PRODUCTS’ ILLICIT TRADE","authors":"Valdis Naglis","doi":"10.17770/acj.v3i88.4301","DOIUrl":"https://doi.org/10.17770/acj.v3i88.4301","url":null,"abstract":"Criminal offences related to the illicit movement of tobacco products are among the most complex forms of crime affecting not only the state but also the economic processes in it. Via the development of modern technologies, it becomes more wide-spread, latent, and more influential as a result of international communication and transnational activities. Recently, the topicality has increased concerned with the illicit production of tobacco products, people who engage in this type of illegal activities get caught more and more frequently. The aim of the research: to study the norms of the Criminal Law article regarding the illegal circulation of tobacco products, to express an opinion on the improvement necessity of the Criminal Law norm, to find possible identification of the most significant problems related to it, as well as to make proposals for a more effective solution of this issue.","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"99-107"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48755567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CORRELATION OF THE RESULTS OF THE EXPERIMENTS’ SERIES IN VISUALIZATION OF PAPILLAE PATTERN PRINTS AND THEIR RECOVERY FROM A DECEASED HUMAN SKIN","authors":"A. Zīle","doi":"10.17770/acj.v3i88.4418","DOIUrl":"https://doi.org/10.17770/acj.v3i88.4418","url":null,"abstract":"The phenomenon of human skin bears in the fact that in commitment of a crime it may be at the same time both a traceforming object and a trace-bearing object. Therefore, the presence of papillae pattern prints on human (victim) skin has long been of experts’ interest. Several experimental series have been conducted with the aim of finding the most optimal method for visualization and recovery of papillae pattern prints from a deceased human skin. One such experimental series was also carried out by the author of the paper.The aim of this paper is to correlate the results of experimental series. The following tasks were set to achieve the aim: to summarize the raw data and the results of the experimental series; to study and analyze common and different in raw data; to study and analyze the potential impact of differences in raw data on the outcome; to study and analyze raw data that can and cannot be influenced. The problem of the study is the divergence of views and opinions concerning the theoretical and practical aspects of the method applied. The novelty of the study is in analysis of raw data and results of experimental series, correlation of results.Analyzing the raw data of the experimental series and the results obtained by the author and foreign researchers it was stated that both similar and different raw data were used in the experimental series; there were experimental series where more raw data were used than in other experimental series; a difference was found between theoretical and practical aspects.","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"5"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44835878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PUNISHMENT PRACTICES IN CASES OF CHILD SEXUAL ABUSE","authors":"Margarita Božko-Čače","doi":"10.17770/acj.v3i88.4413","DOIUrl":"https://doi.org/10.17770/acj.v3i88.4413","url":null,"abstract":"Sexual violence against a child is a global, complicated social and legal problem, existing in all the countries of the world. Sexual violence towards children is a serious violation of the child’s fundamental rights and still one of the main issues in Latvia, which in most cases takes place within families. In Latvia, despite the measures taken by the state and severity of criminal punishments, the number of sex crimes against children has increased since 2016. The aim of the study is to research the practices of criminal punishments for sexual violence against children, reveal and analyse the problems.In the paper, the author reveals topical issues and offers solutions. There should be a uniform case law on application of aggravating circumstances for the offences against morality and sexual integrity of children committed by a person who is the first and second degree relative to the child. If the victim materially depends on the perpetrator, as well as it should be provided as an aggravating circumstance if the offence is committed by a family member or a person staying with the child, but who is not the first and second degree relative. It is necessary to prosecute family members of the perpetrator if they were aware of sexual violence against the child, for not reporting about sexual violence against the child. Prevention of sexual violence against children should include a range of additional measures and close cooperation among public authorities. There is a necessity to establish a public register of persons convicted of sexual violence against children in Latvia, it is necessary to carry out administrative supervision of these persons after serving the additional sentence, as well as chemical castration of the persons half a year before the end of their imprisonment would be useful to prevent risk of recidivism.","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"64"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46844961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tree Automata for Schema-Level Filtering of XML Associations","authors":"V. Gowadia, C. Farkas","doi":"10.5220/0002575502980308","DOIUrl":"https://doi.org/10.5220/0002575502980308","url":null,"abstract":"In this paper we present query-filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represent security objects and to express the security policy. We present the concepts of a simple security object and an association security object. Our model allows us to express and enforce access control on XML trees and their associations. We propose a query-filtering technique that evaluates XML queries to detect disclosure of association-level security objects. We use tree automata to model-security objects. Intuitively a query Q discloses a security object o if and only if the (tree) automata corresponding to o accepts Q. We show that our schema-level method detects all possible disclosures, i.e., it is complete.","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"1 1","pages":"136-145"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42073026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE VIEW TO COLLISION OF NORMS OF THE CRIMINAL LAW","authors":"T. Jurkeviča, K. Šmits","doi":"10.17770/ACJ.V4I81.2842","DOIUrl":"https://doi.org/10.17770/ACJ.V4I81.2842","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"11"},"PeriodicalIF":0.0,"publicationDate":"2017-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46434094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AN INSIDE VIEW OF ORGANIZED CRIME IN ESTONIA ON THE EXAMPLE OF THREE CRIMINAL ORGANIZATIONS","authors":"R. Pullat","doi":"10.17770/acj.v4i81.2844","DOIUrl":"https://doi.org/10.17770/acj.v4i81.2844","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2017-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49374893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CRITERIA OF THE QUALITY OF CRIMINAL PROCEEDINGS AND THEIR IMPROVEMENT","authors":"I. Bulgakova","doi":"10.17770/ACJ.V4I81.2841","DOIUrl":"https://doi.org/10.17770/ACJ.V4I81.2841","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"19"},"PeriodicalIF":0.0,"publicationDate":"2017-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47912513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STRATEGICALLY ESSENTIAL ENERGY SUPPLY OBJECTS IMPORTANCE IN THE CRIMINAL LAW","authors":"Kārlis Piģēns","doi":"10.17770/acj.v4i81.2847","DOIUrl":"https://doi.org/10.17770/acj.v4i81.2847","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"31"},"PeriodicalIF":0.0,"publicationDate":"2017-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45388973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPACT OF ECONOMIC AND LEGAL THEORIES TO TAX SYSTEM","authors":"E. Golts","doi":"10.17770/ACJ.V4I81.2843","DOIUrl":"https://doi.org/10.17770/ACJ.V4I81.2843","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"45"},"PeriodicalIF":0.0,"publicationDate":"2017-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44948485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}