Journal of Research and Practice in Information Technology最新文献

筛选
英文 中文
СONSIDERATION OF CLAIMES CANCELLATION OF DECISIONS BY NATIONAL COURTS THAT HAVE ENTERED INTO FORCE BY THE SUPREME COURT OF FINLAND Сonsideration关于撤销芬兰最高法院生效的国家法院判决的索赔
Journal of Research and Practice in Information Technology Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4361
Vitolds Zahars, V. Jilkine
{"title":"СONSIDERATION OF CLAIMES CANCELLATION OF DECISIONS BY NATIONAL COURTS THAT HAVE ENTERED INTO FORCE BY THE SUPREME COURT OF FINLAND","authors":"Vitolds Zahars, V. Jilkine","doi":"10.17770/acj.v4i73.4361","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4361","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67926291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PROSPECTS OF DEVELOPMENT THE JUDICIARY AND PHASED EXPANSION OF THE SCOPE OF JUDICIAL CONTROL IN PRE-TRIAL PROCEEDINGS 展望司法发展前景,逐步扩大审前程序司法控制范围
Journal of Research and Practice in Information Technology Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4353
M. Myrzakhanova, Yerlan Myrzakhanov, A. Dananova
{"title":"PROSPECTS OF DEVELOPMENT THE JUDICIARY AND PHASED EXPANSION OF THE SCOPE OF JUDICIAL CONTROL IN PRE-TRIAL PROCEEDINGS","authors":"M. Myrzakhanova, Yerlan Myrzakhanov, A. Dananova","doi":"10.17770/acj.v4i73.4353","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4353","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"39"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67924540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-JUSTICE SYSTEM IN BULGARIA: ELECTRONIC TOOLS FOR DEVELOPMENT OF E-JUSTICE 保加利亚的电子司法系统:电子司法发展的电子工具
Journal of Research and Practice in Information Technology Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4358
M. Petrova
{"title":"E-JUSTICE SYSTEM IN BULGARIA: ELECTRONIC TOOLS FOR DEVELOPMENT OF E-JUSTICE","authors":"M. Petrova","doi":"10.17770/acj.v4i73.4358","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4358","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"48"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67925969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THEORETICAL PROBLEMS ASSOCIATED WITH THE LEGAL CONCEPT OF TERM “GENOCIDE” 与“种族灭绝”一词法律概念有关的理论问题
Journal of Research and Practice in Information Technology Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4356
Armens Gabrieljans
{"title":"THEORETICAL PROBLEMS ASSOCIATED WITH THE LEGAL CONCEPT OF TERM “GENOCIDE”","authors":"Armens Gabrieljans","doi":"10.17770/acj.v4i73.4356","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4356","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"27"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67924755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VALUE OF OBSERVANCE OF THE PROCEDURAL FORM OF INVESTIGATIVE ACTIONS IN CRIMINAL PROCEDURE 侦查行为程序形式在刑事诉讼中的价值
Journal of Research and Practice in Information Technology Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4359
Marina Sumbarova
{"title":"VALUE OF OBSERVANCE OF THE PROCEDURAL FORM OF INVESTIGATIVE ACTIONS IN CRIMINAL PROCEDURE","authors":"Marina Sumbarova","doi":"10.17770/acj.v4i73.4359","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4359","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"14"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67926100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CRIMINAL LIABILITY FOR SOCIAL HATRED AND ENMITY INSTIGATION, DIFFICULTIES WITH THEIR THEORETICAL AND PRACTICAL APPLICATIONS 社会仇恨和煽动仇恨的刑事责任,其理论和实际应用的难点
Journal of Research and Practice in Information Technology Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4360
Ēriks Treļs
{"title":"CRIMINAL LIABILITY FOR SOCIAL HATRED AND ENMITY INSTIGATION, DIFFICULTIES WITH THEIR THEORETICAL AND PRACTICAL APPLICATIONS","authors":"Ēriks Treļs","doi":"10.17770/acj.v4i73.4360","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4360","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"19"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67926275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NATIONAL CYBERSECURITY STRATEGIES IN MEMBER STATES OF THE EUROPEAN UNION 欧盟成员国的国家网络安全战略
Journal of Research and Practice in Information Technology Pub Date : 2015-12-30 DOI: 10.17770/acj.v4i73.4355
S. Dimitrova, S. Stoykov, Yosif Kochev
{"title":"NATIONAL CYBERSECURITY STRATEGIES IN MEMBER STATES OF THE EUROPEAN UNION","authors":"S. Dimitrova, S. Stoykov, Yosif Kochev","doi":"10.17770/acj.v4i73.4355","DOIUrl":"https://doi.org/10.17770/acj.v4i73.4355","url":null,"abstract":"Searching for solutions to the problems related to cybersecurity which occurred in the early 1990s, with their steadily increasing negative effects, has long gone beyond the borders of a single science and hence requires a complex interdisciplinary approach. The new challenges facing the international community and the information and communication technologies cross the national borders and the individual countries fail to deal independently and effectively with the new threats against cybersecurity only by policies at national level aiming at ensuring a high level of protection of its citizens and the networks of state power. The need for collective efforts to protect cyberspace has increased significantly and at present the European Union is one of the most influential players in the field of international policies pertaining to cybersecurity. Most often cybersecurity refers to: Ø measures for protecting information techno logies; Ø the included within those measures information, ongoing processes and the related physical and virtual elements (which, taken together, comprise cyber space); Ø the level of protection resulting from the implementation of those measures. Virtually all elements in cyberspace are at risk as their interconnection renders it difficult to determine the scope and framework of cybersecurity. One of the necessary conditions for the creation and development of an EU policy on cybersecurity is an understanding of what the term “cybersecurity” denotes. Achieving this can be difficult for several reasons. Some the main challenges and difficulties include its wide range and multiple aspects that influence the different spheres of social relations between EU citizens and between the Member States of the European Union. The scientific research and analysis of the authors of this publication are focused in this direction.","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"4 1","pages":"54"},"PeriodicalIF":0.0,"publicationDate":"2015-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67924782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INHERITANCE BY CONTRACT COMPLEX INSTITUTION: PROBLEMATIC ISSUES ACTUALIZATION 契约继承的复杂制度:问题的实现
Journal of Research and Practice in Information Technology Pub Date : 2015-09-30 DOI: 10.17770/acj.v3i72.4338
Edvards Pilipsons
{"title":"INHERITANCE BY CONTRACT COMPLEX INSTITUTION: PROBLEMATIC ISSUES ACTUALIZATION","authors":"Edvards Pilipsons","doi":"10.17770/acj.v3i72.4338","DOIUrl":"https://doi.org/10.17770/acj.v3i72.4338","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"59"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67922578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE QUALIFICATION OF RAPE 强奸的资格
Journal of Research and Practice in Information Technology Pub Date : 2015-09-30 DOI: 10.17770/acj.v3i72.4337
Dainis Mežulis
{"title":"THE QUALIFICATION OF RAPE","authors":"Dainis Mežulis","doi":"10.17770/acj.v3i72.4337","DOIUrl":"https://doi.org/10.17770/acj.v3i72.4337","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"28"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67922305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DETERMINATION VALUE OF SMUGGLING GOODS 确定走私货物的价值
Journal of Research and Practice in Information Technology Pub Date : 2015-09-30 DOI: 10.17770/acj.v3i72.4339
Aleksejs Šaforostovs
{"title":"DETERMINATION VALUE OF SMUGGLING GOODS","authors":"Aleksejs Šaforostovs","doi":"10.17770/acj.v3i72.4339","DOIUrl":"https://doi.org/10.17770/acj.v3i72.4339","url":null,"abstract":"","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"3 1","pages":"50"},"PeriodicalIF":0.0,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67922467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信