Law and Communication in Qin and Western Han China

2010 ◽  
Vol 53 (5) ◽  
pp. 679-711
Author(s):  
Charles Sanft

AbstractThis article gathers and examines information about the legal practices of Qin and Western Han China, and demonstrates that these served communicative functions. Law in early imperial China not only penalized antisocial behavior, it was also a medium for communication between the central government, the common population, and officials. The information so transmitted comprised institutional and personal information, including that which facilitated the function of reputation on a national scale. There is also important evidence that people at the time recognized the communicative possibilities of legal practice, as reflected in cases where they manipulated penal communication for individual benefit.

2019 ◽  
Vol 7 (3) ◽  
pp. 35-57
Author(s):  
Daniela Nova Manríquez

Abstract This research aims to prove the effectiveness of Spanish as a Second Language lessons for Haitians designed by volunteers in Santiago de Chile. The methodology used through the study was based on the application of two questionnaires to Haitian students in order to compare results, and finally obtain an average that reflects the achievement of the communicative functions expected. Results indicate that neither the lessons planned, material giver nor the Common European Framework of Reference for Languages fulfilled such expectations. Findings are discussed in relation to previous studies on methodologies for Spanish as a Second Language for Haitian immigrants in Chile (Toledo, 2016)


2015 ◽  
pp. 1638-1652
Author(s):  
Panagiotis Kitsos ◽  
Aikaterini Yannoukakou

The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.


2020 ◽  
Author(s):  
Yu-Min Fu ◽  
Yu-Chen Hsu ◽  
Hung-Pin Huang

<p>In Taiwan, the regional drainage is the system of two or more of urban, agricultural and enterprise drainages. Communities locate in or around the urban river, farmland or estuary are significantly involved in four services of ecosystem services. From 2016, central government forced each public construction project has to implement ecologic check work. However, these check work did not yet follow the idea of ecosystem services so that the operation of public construction projects in these two years could not reach the target completely. This study introduces the idea of ecosystem services into the ecologic check work of regional drainage projects to explore the feasibility of selected parameters in ecosystem services.          </p><p>This study refers to ecosystem service strategies such as the Millennium Ecosystem Assessment (MEA, 2005), the Economics of Ecosystems and Biodiversity (TEEB, 2010) and the Common International Classification of Ecosystem Services (CICES, 2017), considering the extensiveness, feasibility, and regional characteristics of regional drainage for ecosystem services. In addition, this study designs two checklist forms for master plan and project, respectively. After implementing ecologic check work for three cases in Taiwan, the result explores the feasibility of ecosystem services in regional drainage system.   </p>


2016 ◽  
Vol 4 (11) ◽  
pp. 0-0
Author(s):  
Вячеслав Воронин ◽  
Vyacheslav Voronin

Part 3 of article 60 of the Criminal Code of the Russian Federation refers to the common criteria of individualization of punishment the nature and degree of public danger of committed crime in each criminal case. The purpose of this article is to analyze the legal practice of this provision, as well as the construction of clarification on the issue of taking into consideration the public danger, which will be useful for the judiciary. For this purpose the author supposes to solve following problems: analysis of dogmatic ideas about the nature and degree of public danger; search for factors that courts consider in determining public danger in judicial practice; analysis of the survey data of judges from different regions of the country. As a result the author concludes that the nature of public danger depends on the object of the offense and cannot influence on individualization of punishment, because it was considered by the legislator when constructing the corresponding article of the Special Part and therefore should be excluded from Part 3 of art. 60 of the Criminal Code of the Russian Federation. Degree of public danger when individualizing is determined subject to the objective and subjective elements of a crime. The author proposed to make recommendations on considering into account degree of public danger in the judgment 22.12.2015 No. 58 adopted by the Plenum of the Supreme Court of the Russian Federation “On practice of criminal sentencing by courts of the Russian Federation”.


2017 ◽  
Vol 5 (9) ◽  
pp. 205 ◽  
Author(s):  
Mustafa Onur Kan ◽  
Gizem Utlu

The purpose of this study is to determine the errors in case markers in the texts formed by Syrian students, who learn Turkish as a foreign language. The study group of this research, which is designed as a case study, comprises of a total of 60 Syrian students in A1 and A2 level, studying in the temporary education center of Al-Nassaj, which is affiliated with the district of Antakya, Hatay. The determination of the levels of the students was based on the description of the linguistic competences proposed by The Common European Framework of Reference for Languages (CEFR). A placement test was administered to the students in line with the description proposed by the CEFR, and a total of 30 students in A1 and 30 students in A2 were included to the study. A personal information form as well as writing forms, which had been developed by the researchers, were employed in the data collection. The analysis of the data obtained from the writing forms was performed through descriptive analysis method. An evaluation meeting was held with a faculty member specialized in the field of Turkish education in order to ensure the reliability of the data, and a consensus has been reached on the data.The study revealed that in terms of the total number of words used by the students, the students in A1 made 8 errors in case markers for each 100 words whereas those in A2 made 9.3 errors in case markers for each 100 words. It is remarkable that the students in A1 made the most errors in the genitive case markers whereas those in A2 made the most errors in locative case markers. There was no error in the ablative case markers in the texts produced by the students in A1. The study further found that the number of such errors made by the students in A2 was very low.


Balcanica ◽  
2002 ◽  
pp. 49-60
Author(s):  
Milena Milin

Following the Symposium on distribution of the Illyrians (4th to 2nd centuries B.C., Sarajevo, 1964), the view that the northern border of the Illyrians ran along the line even much southerner than the Sava (nn.2-8) has been firmly established in our archeology; this attitude has been extended to the Illyrian tribes in Roman times (n.7). At the same time, historians of the pre-Roman and Roman periods in the Balkans still hold the view of predominantly Illyrian origins of the tribes from Lower Pannonia, between the Danube and the lower course of the Sava river (n.9), based on contemporary historiographic epigraphic and linguistic evidence. Therefore, the author dwelled on the issue whether the Illyrian name, and in which meaning, may be applied to the inhabitants of Lower Pannonia in the Roman times as well. According to ancient literary sources (Strabo and Apian) it follows that the Pannonian tribes in the ancient times were deemed to be Illyrian (pp. 2-3). Furthermore in mythology, the Pannonios was the descendant of Illyrians (App. Illyr. 2; cf. Papazoglu 1969, 265 n. 233), which points to the common awareness of being part of Lower Pannonia and other Illyrian tribes. Important evidence for this issue is deemed to be anthroponyms as well; Pannonian names in the research to date have shown to be different from Illyrian (p. 7 with note). The author gives the examples of names Dassius and Liccaius, epigraphically confirmed with Breuck and Amantino (6, note 30, and p. 7 with note), which she considers to have originated from Illyrian territory proper; that is proved by a wax tablet from Dacia, where the words Dassius Verzonis, Pirusta ex Kavieretio and Liccaius Epicadi were written (tab. cer. VI; cf. p. 8). As is well known, parts of the Illyrian population from southern Dalmatia were relocated to work in Dacia mines; that this is the case here as well is proved by referring to an Illyrian ethnic, Pirust, as well as the name of the village. On account of the closeness in spiritual and cultural spheres, the awareness of the common mythical forefather, similarities or sameness in anthroponyms, there is no justification, at least regarding the Roman times, for distinguishing the inhabitants of Pannonia from (other) Illyrians, even if the issue of their ethnical connection or identicalness is not considered.


2021 ◽  
Vol 16 (1) ◽  
pp. 25
Author(s):  
Aigul A. Baibatyrova ◽  
Sholpan K. Zharkynbekova

This study explores the rhetorical strategies employed in topic generalizations of increasing specificity in the introductions from the leading peer-reviewed journals. Specifically, we identified the substeps in Move1-Step1, which show how the writers promote the significance of the research area. The qualitative approach enabled us to distinguish eight substeps provisionally outlining the common patterning of the discourse and to analyze the linguistic choices enhancing the persuasiveness of claims. Citation, attitude markers, boosters and hedges have been found the most effective devices for preserving balance between assertion and concession. The quantitative analysis of the texts defined the frequency rate of the substeps discerned including their total sum of occurrences and percentages per introduction. The substep level analysis has contributed to scrutinizing the subtle communicative functions of the rhetorical strategies in the textual structure.


2015 ◽  
pp. 91-136
Author(s):  
Dorota Krekora-Zając

The article is concerning analysis of legal status of human biological samples used in research purposes. Historical evolution of human body status, possible use of human biological samples and legal status of human biological samples under the European Community, Polish, Italian Law has been described in the article, as well as regulation in the Common Law countries. In author’s opinion the human biological samples should be recognized as a res for the legal purposes. Aforementioned approach provides the best protection of interests of both donors and biobanks. Paper contains conclusions de lege lata and de lege ferenda, including proposals of future legislation regarding biobanks and potential influence of foreign courts judicial decisions in this area on Polish legal practice.


2019 ◽  
Vol 7 (5) ◽  
pp. 65
Author(s):  
Sevtap Kanat

The purpose of this study is to examine the graphic design concept perceptions of university students who take graphic design education by using metaphors. The research was carried out with 160 students from the Department of Graphic Design at Inonu University, Hacı Bayram Veli University and Necmettin Erbakan University. A total of 142 students (87 female and 55 male) were considered to be surveyed. The students were asked a personal information form and an open-ended question via a questionnaire prepared by qualitative research method. The analysis of the survey data was evaluated by the content analysis method from qualitative research techniques. According to the analysis, the participants created 96 metaphors. The most repeated metaphors for graphic design are; Dreaming (7), Universe (6) and Freedom (6).The common characteristics of these metaphors produced by the participants were collected in eight sub-categories which are Effort /Labor dependent structure, Unlimited structure, Useful structure that facilitates, Multi-dimensional structure, Target-oriented structure, Changeable structure, Holistic structure, Uniform structure.According to the result obtained in the study, there are different perceptions of the graphic design based on gender and grades.


Author(s):  
Daleen Millard ◽  
Eugene Gustav Bascerano

A person whose privacy has been infringed through the unlawful, culpable processing of his or her personal information can sue the infringer’s employer based on vicarious liability or institute action based on the Protection of Personal Information Act 4 of 2013 (POPI). Section 99(1) of POPI provides a person (“data subject”), whose privacy has been infringed, with the right to institute a civil action against the responsible party. POPI defines the responsible party as the person who determines the purpose of and means for processing of personal information of data subjects. Although POPI does not equate a responsible party to an employer, the term “responsible party” is undoubtedly a synonym for “employer” in this context. By holding an employer accountable for its employees’ unlawful processing of a data subject’s personal information, POPI creates a form of statutory vicarious liability.Since the defences available to an employer at common law, and developed by case law, differs from the statutory defences available to an employer in terms of POPI, it is necessary to compare the impact this new statute has on employers. From a risk perspective, employers must be aware of the serious implications of POPI. The question that arises is whether the Act does not perhaps take matters too far.This article takes a critical look at the statutory defences available to an employer in vindication of a vicarious liability action brought by a data subject in terms of section 99(1) of POPI. It compares the defences found in section 99(2) of POPI and the common-law defences available to an employer fending off a delictual claim founded on the doctrine of vicarious liability. To support the argument that the statutory vicarious liability created by POPI is is too harsh, the defences contained in section 99(2) of POPI is further analogised with those available to an employer in terms of section 60(4) of the Employment Equity Act 55 of 1998 (EEA) and other comparable foreign data protection statutes. 


Sign in / Sign up

Export Citation Format

Share Document