首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
为完善国家秘密保护法律制度,现行《刑法》规定了故意泄漏国家秘密罪。在司法实践中,需严格把握本罪的构成要件,并以此为基础,准确区分此罪与彼罪,正确施以刑罚。  相似文献   

2.
从公安边防机关执法中存在的"选择性执法"的几种现象入手,剖析其法律因素、经济原因和社会根源;从执法人员树立公正执法理念、增强法治意识、加强内外部执法监督和完善相关法律等方面,提出了防止"选择性执法"的建议,试图建立一种严格、公正、文明的执法秩序.  相似文献   

3.
行政处罚中违法主体作为单位或个人时,因法律适用的不同导致具体行政行为的结果不同.两个法律概念在实践中往往有混淆不清的界限,这很可能成为执法不公正的根源.另外,由于公权力没有救济的途径,也可能直接导致执法目的难以实现.所以,正确区分违法主体中单位和个人的法律责任是必要的.  相似文献   

4.
在消防监督管理中,执法裁量权存在被滥用的危险.结合消防执法工作实践,思考探索建立一个包括内部监督制约机制和外部监督制约机制在内的双向裁量监控体系,内外结合,从而更加有效地规制消防行政裁量权的运作.  相似文献   

5.
就新《消防法》的实施,结合工作实际,通过分析当前消防行政处罚中存在的问题,说明积极推进消防行政处罚裁量基准制度的必要性,并从理论层面对消防行政处罚裁量基准进行了阐述,提出了掌握裁量基准、完善工作机制、确保规范执法三点建议。  相似文献   

6.
从消防监督检查的重要性和遵守消防执法程序的必要性入手,阐述消防监督机关在消防责任事故罪构成中的地位和作用、消防监督人员与玩忽职守罪的关系.  相似文献   

7.
消防刑事案件的立案必须是受理的案件具备犯罪事实条件、符合立案标准、属于公安消防机构管辖范围.消防刑事案件的立案审查是实现立案符合法律要求、保障刑事执法活动正确实施的基础工作,亦是在<公安部关于公安消防机构办理刑事案件有关问题的通知>发布实施后公安消防机构所面临的新课题.  相似文献   

8.
从消防执法的视角,分析了责令限期改正的法律属性及立法变化,指出了消防法中责令限期改正的立法缺失和执法问题,并就此提出了相应的立法建议和执法意见,以解决消防执法中如何正确适用责令限期改正的问题。  相似文献   

9.
侯欣一 《兵团建设》2012,(22):50-51
要全面推进依法治国。推进科学立法、严格执法、公正司法、全民守法,坚持法律面前人人平等,保证有法必依、执法必严、违法必究。完善中国特色社会主义法律体系,加强重点领域立法,拓展人民有序参与立法途径。推进依法行政,做到严格规范公正文明执法。进一步深化司法体制改革,确保审判机关、检察机关依法独立公正行使审判权、检察权。深入开展法制宣传教育,提高领导干部运用法治思维和法治方式深化改革、推动发展、化解矛盾、维护稳定能力。党领导人民制定宪法和法律,党必须在宪法和法律范围内活动。任何组织或者个人都不得有超越宪法和法律的特权,绝不允许以言代法、以权压法、徇私枉法。  相似文献   

10.
正确适用我国刑法 ,准确邪教组织犯罪 ,关键是分析把握邪教组织犯罪的基本特征和构成特征 ,特别是其本质特征和行为特征。在适用法律认定邪教组织犯罪过程中 ,重点解决罪名认定和犯罪行为性质认定等此罪彼罪问题。  相似文献   

11.
为了保证视线角速率在弹目碰撞前收敛到零附近的较小邻域内从而达到准平行接近的状态,本文基于自抗扰控制的不确定性估计补偿思想,应用反演控制方法设计了一种考虑导弹自动驾驶仪二阶动态特性和目标机动的三维有限时间收敛导引律。根据有限时间收敛控制理论,严格证明了系统的有限时间收敛特性;为抑制量测噪声,将传统跟踪微分器进行改进并应用于扩张状态观测器与反演控制的设计中。仿真结果表明:在自动驾驶仪响应延迟情况下,所设计的导引律能够导引导弹在有限时间内精确地拦截高速机动目标;改进的跟踪微分器精度高、响应快;基于改进跟踪微分器的扩张观测器估计效果理想。  相似文献   

12.
READY,SET, TRACE     
Tracing small arms and light weapons has been identified as an important component in reducing the illicit trafficking of weapons to regions of conflict as well as use in violent crime. At the national, regional and international levels policy makers and practitioners are working to make tracing more effective. This article outlines some of the key elements of an effective tracing regime and reviews where areas of agreement currently exist. It concludes with observations on some of the challenges facing countries as they try to implement these systems and respond to the problem of illicit arms trafficking.  相似文献   

13.
ABSTRACT

While the drone has become synonymous with the War on Terror, the asymmetric iconography of the battlefield is shifting. Commercially available off-the-shelf (COTS) drones are increasingly prevalent features of global battlefields, employed by non-state actors in both visualising such spaces, and the directing and inflicting of harm. As such usage increases, so too do concerns around their evolving adoption, adaptation, and potential portability into homeland spheres. While cognizant of the range of positive drone applications, it is asserted that drones nonetheless remain simultaneously bound to an inverse potential for exploitation. In examining drone risk, this article approaches the consumer drone through a series of sites and spaces through which it is technically and socially constructed. Reflecting upon industry innovation, community-driven experimentation, and evolving airspace – it calls for greater attention to the drone’s malleability, arguing that understandings of COTS drones must remain attentive to both drone potential and potential drone threat.  相似文献   

14.
This essay reviews seven recent books and reports that focus upon the use of US armed drones in Pakistan's Federally Administered Tribal Areas (FATA). This essay synthesizes a historical account of the program, critically interrogates key arguments and evidence advanced by the authors, and draws attention the particular problems that confront those who live in the FATA and the second-class citizenship that the Pakistani state has bestowed upon them for reasons of domestic and foreign policy concerns. This review essay does not intend to be the final word on any of the ongoing policy debates. But it does hope to enable a wider audience to take part in these important deliberations.  相似文献   

15.
16.
17.
This paper uses game theory and modeling to address the role of incentive structures and information dynamics in nuclear inspections. The traditional argument is that compliant states should be willing to allow inspections to prove their innocence, while proliferating states are likely to impede inspections. This argument does not take into account the historical variation in inspection, signaling, and sanctioning behaviors. Using a game theoretic analysis and model, it is shown that the separation of proliferators from nonproliferators only occurs when the likelihood of proliferation is high and punishment costs are moderate. The model assumes that states can choose how much to cooperate with inspectors and must pay opportunity or secrecy costs when inspections are effective. The results are tested against a set of real-life cases, providing support for the claims of historical variation and the model's deductive propositions.  相似文献   

18.
19.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

20.
Why are some countries prone to ethno-nationalist conflict, whereas others are plagued by class conflict? This is a question that has seldom been raised and rarely been examined empirically. This paper presents a social-structural theory to account for the variable incidence of these two forms of political instability. These two types of conflict result from distinct principles of group solidarity – ethnicity and class – and since each individual is simultaneously a member of an ethnic group (or many such groups) and a particular class, these two principles vary in the degree to which they are mutually exclusive or cross-cutting. The degree of economic stratification between groups and economic segmentation within them shapes the relative salience of each principle of group solidarity in any society and is associated with a characteristic form of political mobilization. In places where between-group inequalities are high, and within-group inequalities low, ethnicity should be the dominant principle of group solidarity and serve as the primary basis of group conflict. By contrast, in countries where between-group inequalities are low, and within-group inequalities high, class is more likely to serve as the dominant principle of group solidarity, and conflicts along class lines are more likely. We test these conjectures with data in over 100 countries on cross-cutting cleavages, ethnic war, and class conflict. The results are supportive of the theory, and provide evidence that how groups are stratified and segmented in societies shapes the type of civil war.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号