scholarly journals Who Is the Rightful Owner? Young Children’s Ownership Judgments in Different Transfer Contexts

2018 ◽  
Vol 9 ◽  
Author(s):  
Zhanxing Li ◽  
Minli Qi ◽  
Jing Yu ◽  
Liqi Zhu
Keyword(s):  
2005 ◽  
Vol 5 (3) ◽  
pp. 465-494 ◽  
Author(s):  
Sung-jae Choi

The Dokdo issue has constituted a popular area of academic enquiry in both Korea and Japan, but few studies have extended their research parameters beyond the question of who is the rightful owner of this island. Whatever the legal merits of competing claims to Dokdo, the Dokdo issue has expanded to represent an important political focus in the domestic affairs of both states, and it remains an omnipresent irritant in Korea-Japan relations. A full understanding of this complex issue cannot be gained simply through legal and historical argument. With the aim of overcoming these existing inadequacies in the academic coverage of Dokdo, this article attempts to identify the dynamics in which extralegal and extrahistorical factors have interacted and complicated this contentious issue.


Author(s):  
Sabahi Borzu

This chapter focuses on one form of reparation in international law: restitution. Restitution requires the re-establishment of the situation that had existed before the commission of an internationally wrongful act or the status quo ante. Though restitution has been recognized as the primary remedy in international law, practical limitations have minimized its use in international investment law. Here, the power of tribunals to award restitution in international law and the enforceability of such awards are discussed. The two general forms of restitution are then explored: firstly, material restitution, which includes the restitution of property and of money wrongfully taken from a rightful owner; and, secondly, juridical restitution, which requires restoring the legal situation that existed before the commission of the wrongful act, and includes specific performance. The doctrines of impossibility and disproportionate burden are also discussed with their limiting effect on restitution.


1986 ◽  
Vol 3 (2) ◽  
pp. 77-96 ◽  
Author(s):  
G. A. Cohen

1. The present paper is a continuation of my “Self-Ownership, World Ownership, and Equality,” which began with a description of the political philosophy of Robert Nozick. I contended in that essay that the foundational claim of Nozick's philosophy is the thesis of self-ownership, which says that each person is the morally rightful owner of his own person and powers, and, consequently, that each is free (morally speaking) to use those powers as he wishes, provided that he does not deploy them aggressively against others. To be sure, he may not harm others, and he may, if necessary, be forced not to harm them, but he should never be forced to help them, as people are in fact forced to help others, according to Nozick, by redistributive taxation. (Nozick recognizes that an unhelping person may qualify as unpleasant or even, under certain conditions, as immoral. The self-ownership thesis says that people should be free to live their lives as they choose, but it does not say that how they choose to live them is beyond criticism.)


1989 ◽  
Vol 3 (39) ◽  
pp. 47-47
Author(s):  
W G Stanton
Keyword(s):  

2021 ◽  
Author(s):  
Shafitri Arindya Ramadhanty

This paper is the summary and/or the review of the journal article "The Impact of Minister of Marine Affairs and Fisheries Regulation Number 12 of 2020 on the Sustainability of Lobster in Indonesia" by Ahmad Zafrullah Tayibnapis, Lucia E. Wuryaningsih, and Radita Gora. The paper is for educational purposes and all credits belong to the rightful owner(s).


Author(s):  
Kevin Curran ◽  
Peter Breslin ◽  
Kevin McLaughlin ◽  
Gary Tracey

"Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network". Unauthorised access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Thus not only would accessing a server by cracking its password authentication system be unauthorised access, switching on a computer system without the permission of the person in charge of such a computer system would also be unauthorised access.


1996 ◽  
Vol 20 (2) ◽  
pp. 32-35 ◽  
Author(s):  
Ji Sun Sjögren

Ji Sun Sjögren was born in Korea and brought up in Belgium, where she was adopted by her Swiss mother and Swedish father at the age of two. The following account, inspired by the experience of visiting her native Korea for the first time, aged 26, is a moving testimony of what it can feel like to be caught between two worlds, despite a loving and largely happy upbringing. Above all she speaks up for the right of every child to know her or his origin and to be the rightful owner of a birth certificate. Ji Sun's account was written with the help of her adoptive father, Eric Sjögren, who is a journalist living in Brussels. Twenty years earlier, he himself had written a ‘misty-eyed, infatuated’ account of the first few years of living with his adopted daughter. It is partly in the light of the huge sympathetic response to that article that he encouraged Ji Sun to tell her own story.


1975 ◽  
Vol 3 (1) ◽  
pp. 55-63 ◽  
Author(s):  
Brendan Gail Rule ◽  
Ronald Dyck ◽  
Marilynn Mcara ◽  
Andrew R. Nesdale

Two studies using a university and a high school population were conducted in which subjects read a transcript of an interview including a description of an aggressive incident. The aggressor was attractive or unattractive, and his intentions in aggressing were either to hurt the victim (hostile aggression), to return a wallet to its rightful owner (social-instrumental) or to keep the wallet for himself (personal-instrumental). Subjects evaluated the aggressor on several dimensions. The results of both studies indicated that the manipulations were successful. Moreover, in both studies subjects evaluated the attractive aggressor as more right and less deserving of punishment than the unattractive aggressor. Both university and high school students judged an aggressor who hit for pro-social instrumental reasons as more right and less deserving of punishment than an aggressor who hit for personal reasons. For university students both hostile and personal-instrumental aggression were evaluated similarly. However, high school subjects evaluated an aggressor who hit for personal-instrumental reasons as more wrong and deserving of more punishment than an aggressor who hit for hostile reasons.


Author(s):  
M.D. Chernenko ◽  

The main purpose of confiscation of property as a measure of criminal law is not only the return of criminally obtained property to its rightful owner, but also depriving criminals of the opportunity to dispose of such property. To achieve this goal, the Russian Federation has developed and legislated the rules of various branches of law, including international law, a mechanism for identifying property subject to confiscation and ensuring its execution.


Author(s):  
Gaurav Gupta ◽  
Josef Pieprzyk

There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.


Sign in / Sign up

Export Citation Format

Share Document