Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Une étude consacrée à la notion, en pleine expansion et encore méconnue, qu'est la sincérité en droit. L’exigence de sincérité se déploie aujourd’hui dans toutes les branches du droit : finances, élections, débat parlementaire, procédure… Aucun domaine n’échappe à son irrésistible progression. Malgré ce développement, la compréhension de la notion demeure encore partielle et fragmentaire, faute d’avoir fait l’objet jusqu’à présent d’une étude d’ensemble. Quel est son contenu ? Son unité ? Son effectivité ? Afin de répondre aux attentes des universitaires et des praticiens confrontés à l’utilisation de cette notion, l’ouvrage, issu d'un colloque organisé à l'Université de Nice dans le cadre du CEDORE (Centre d'études du droit des organisations européennes), analyse l’exigence juridique de sincérité dans tous les domaines où elle se trouve employée. Construit autour de trois axes (discipliner, authentifier, exprimer), correspondant aux trois grandes fonctions jouées par la sincérité en droit positif, l’ouvrage apportera au lecteur une connaissance approfondie des multiples facettes que revêt cette exigence dans les diverses branches du droit.
Professional ethics. Deontology --- Good faith (Law) --- Authentication --- Finance, Public --- Congresses --- moyens de preuve --- droit --- Bona fides (Law) --- Bad faith (Law) --- Ignorance (Law) --- Mistake (Law) --- Contracts --- Non-contentious jurisdiction --- Legal documents --- Legalization --- bewijsmiddelen --- recht --- Law and legislation --- E-books --- Good faith (Law) - Congresses --- Authentication - Congresses --- Finance, Public - Congresses --- Authentification --- Bonne foi (droit) --- Principe de sincérité (finances publiques)
Choose an application
Law, Medieval --- Legal documents --- Law --- Canon law --- History --- Influence --- Congresses --- Documents --- Documents, Legal --- Authentication --- Commercial documents --- Legal instruments --- Legalization --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Public law (Canon law) --- Ecclesiastical law --- Rescripts, Papal --- Catholic Church --- Law, Medieval - Congresses --- Legal documents - Europe - History - To 1500 - Congresses --- Law - Spain - History - To 1500 - Congresses --- Canon law - Influence - Congresses --- Papes --- Moyen Age --- Droit médiéval --- Actes instrumentaires --- Droit --- Droit canonique --- Europe --- Jusqu'à 1500 --- Espagne
Choose an application
Ayahuasca --- the international drug control system --- Ayahuasca in South America and the world --- ethnohistory of Ayahuasca usage in the Peruvian Amazonian --- Hoasca ethnomedicine --- Nove Vegetais (Nine Herbs) --- Uniao do Vegetal --- ideology --- Ayahuasca groups --- the Netherlands --- the study of contemporary religion --- psychonautic use of ayahuasca --- the global expansion of ayahuasca --- medicine --- psychology --- pharmacology --- pharmacology of ayahuasca --- psychopharmacology --- the ritual use of ayahuasca --- mental health --- the UDV --- the religious use of hoasca --- spiritual healing --- medical-scientific knowledge --- ritual ayuasca use and health --- Jacques Mabit --- Ayahuasca healing --- ethics --- legalization of ayahuasca --- Brazil --- law on drugs --- religious groups --- the United States --- religious freedom in the USA --- Canada --- international law --- the Santo Daime Church in the Netherlands --- Santo Daime in Germany --- Italy --- religious drug use --- Santo Daime --- Santo Daime in Spain --- ayahuasca in France
Choose an application
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.
Computer security --- Data protection --- Privacy, Right of --- Engineering & Applied Sciences --- Social Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Psychology --- Information Technology --- Computer Science (Hardware & Networks) --- Privacy. --- Computer networks --- Computers --- Identification. --- Authentication. --- Security measures. --- Access control. --- Authentication --- Forensic identification --- Computer network security --- Network security, Computer --- Security of computer networks --- Law and legislation --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Algorithm Analysis and Problem Complexity. --- Contracts --- Non-contentious jurisdiction --- Legal documents --- Legalization --- Social psychology --- Secrecy --- Solitude --- Information Systems. --- Computer software. --- Cryptology. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Software, Computer --- Computer systems --- Application software. --- Algorism --- Algebra --- Arithmetic --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Communication systems --- Distributed processing --- Computer networks. --- Cryptography. --- IT Operations. --- Computer and Information Systems Applications. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This volume examines the basic layers of the standard-based creation and usage of legislation. In particular, it addresses the identification of legislative documents, their structure, the basic metadata and legislative changes. Since mature technologies and established practices are already in place for these layers, a standard-based approach is a necessary aspect of the up-to-date management of legislative resources. Starting out with an overview of the context for the use of XML standards in legislation, the book next examines the rationale of standard-based management of legislative documents. It goes on to address such issues as naming, the Akoma-Ntoso document model, the contribution of standard-based document management to handling legislative dynamics, meta-standards and interchange standards. The volume concludes with a discussion of semantic resources and a review on systems and projects.
Law -- Data processing. --- Semantic Web. --- XML (Document markup language). --- Legislation --- Legal documents --- Information storage and retrieval systems --- XML (Document markup language) --- Semantic Web --- Text processing (Computer science) --- Engineering & Applied Sciences --- Law, Politics & Government --- Computer Science --- Law, General & Comparative --- Data processing --- Law --- Technological innovations. --- Documents --- Documents, Legal --- Extendible Markup Language (Document markup language) --- eXtensible Markup Language (Document markup language) --- Law. --- Computer graphics. --- Computers. --- Law and legislation. --- Mass media. --- Media Law. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Legal Aspects of Computing. --- Authentication --- Commercial documents --- Legal instruments --- Legalization --- Semantic integration (Computer systems) --- Semantic networks (Information theory) --- World Wide Web --- Microformats --- Document markup languages --- Mass media --- Computer vision. --- Computers --- IT Law, Media Law, Intellectual Property. --- Cyberspace --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Law and legislation --- Optical data processing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Mass communication --- Media, Mass --- Media, The --- Communication --- Optical equipment
Listing 1 - 5 of 5 |
Sort by
|