Fighting Terror Online

Size: px
Start display at page:

Download "Fighting Terror Online"

Transcription

1 Fighting Terror Online

2 Martin Charles Golumbic Fighting Terror Online The Convergence of Security, Technology, and the Law

3 Martin Charles Golumbic Caesarea Rothschild Institute University of Haifa Mount Carmel, Haifa 31905, Israel ISBN: e-isbn: Library of Congress Control Number: c 2008 Springer Science+Business Media, LLC All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed on acid-free paper springer.com

4 Foreword This book finds its roots in the horror that engulfed us all around the globe as we experienced and watched with disbelief the events of September 11, Naturally, policy-makers around the world rushed to examine their law enforcement capabilities and the suitability of these tools to the new war on terror. This examination resulted in a wave of legislation around the world, aimed at increasing the power of law enforcement agencies. The digital environment was a major focus of these regulatory and legislative attempts. Given the horror of the events and the haste to provide law enforcement agencies with the best tools possible to fight the new threat, policy-makers moved forward without much public discussion. Legislators around the world rushed to do the same. No real public debate took place before the USA PATRIOT Act was approved by Congress, 6 weeks after 9/11. 1 Our concern is that the public s voice is also needed in this process. Once the sky over Manhattan cleared a bit, it was time for us to take a step back and assess the fallout from that horrific day. As academics who focus on digital law, my colleagues Michael Birnhack and Niva Elkin- Koren, focused their attention on examining how the events and the war on terror that followed affected the digital environment, especially the Internet, and what would be their future effects. We decided to explore these issues in a unique academic forum, together with students of the Faculty of Law and co-sponsored by the Caesarea Edmond de Rothschild Foundation Institute for Interdisciplinary Applications of Computer Science at the University of Haifa, Israel. A group of 17 outstanding students, some of whom were jointly majoring in law and computer science, 1 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, 2001, Pub. L. No , 105, , 204, 212, 814, 115 Stat. 272 (2001). v

5 vi Foreword participated in a research seminar during the fall semester of The goal was defined as the formulation of an appropriate policy at the interface between security and technology, human rights and economic policy. Research was conducted in teams, followed by group discussions. To complete the research stage and to learn about the views of experts and professionals working in these areas, we organized a workshop (Shefayim, December 26 27, 2001) where dozens of researchers and practitioners from various areas of computer science, law, communications and media, strategic studies and philosophy met for two intense days of discussions. Lawyers and jurists came from academia, from the private sector, and from the public sector with representatives from the Israeli Ministries of Justice, Defense, and Communication to discuss their experiences and views. We also heard the opinions of those who are directly involved in the digital environment, including researchers in the field of encryption, defense personnel, lawyers, and businesspeople. An exceptional dynamic was created over the two days of informative lectures and fruitful discussions, making absolutely clear the need for independent discussion and interdisciplinary research on issues related to law and technology. Following the research workshop and the forum, a Hebrew-language position paper was authored and distributed to policy-makers and others in Israel. Continuing in this direction, Elkin-Koren and Birnhack conducted further research, which resulted in an article on the Invisible Handshake, 2 addressing vital issues on the role of knowledge in the global world and the reemergence of the State in the digital environment. Pursuing such interdisciplinary aspects of law, technology and computer science, this book evolved and developed into a volume whose topics are of concern and interest to a worldwide audience. The book provides a snapshot of the legal regime in the 9/11 aftermath and a general framework for understanding the emerging legal and technological issues. The legal response to online security threats is gradually maturing and will evolve further in the coming decade. The fundamental principles, however, are likely to remain the same. 2 Michael D. Birnhack & Niva Elkin-Koren, The Invisible Handshake: The Reemergence of the State in the Digital Environment, 8 Virginia J. of Law and Tech. no. (6), (2003), 1 57.

6 Preface The unprecedented events that have taken place in recent years have led legislators and governments throughout the world to reconsider and restructure their policies regarding security issues. Today, worldwide attention is being given to a new security threat, in the form of global terrorism. Legal systems are being called upon to provide a response to these threats, in all areas of life, including the online environment. Among its many tools, global terror also uses advanced technological methods. This fact presents a difficult challenge to policymakers. Therefore, we have chosen to focus this book on the issue of formulating appropriate policy at the interface between security and technology, human rights and economic policy. The fundamental issue the tension between security needs and civil rights is not new. A great deal of experience has been amassed in various countries in this regard, and the question that now arises is whether the existing system of principles and laws, developed on the basis of experience gathered in the concrete world, is applicable to the digital environment. This book presents the position that the online environment is a significant and relevant theater of activity in the fight against terror, and will identify the threats, the security needs, and the issues that are unique to this environment. We examine whether the unique characteristics of this environment require new legal solutions, or whether existing solutions are sufficient. Three areas of online activity are identified that require reexamination: security, monitoring, and propaganda. For each of these, we will indicate the issues, examine existing legal arrangements, and offer guidelines for formulating legal policy. There is a demonstrated need to relate to the digital environment as a battlefront, map the new security threats, and thereby hope to provide focus to the pressing discussion on today s legislative and technological agenda. vii

7 Acknowledgments We are proud to acknowledge the University of Haifa students who, under the guidance of Dr. Michael Birnhack and Prof. Niva Elkin-Koren, coauthored the original Hebrew position paper aimed at policy-makers, and whose work inspired and served as the basis for this research: Eran Aloni, Rachel Aridor, Eran Bar-Or, Yael Bregman, Udi Einhorn, Keren Elisha, Gal Eschet, Alon Fiul, Haviva German, Eyal Greener, Shahar Grinberg, Efy Michaeli, Tal Ron, Nir Segal, Miri Shai, Asaf Zabari, and Ben Zohar. The Workshop and Forum, which served as the incubators for this book, took place thanks to the generous support of the Caesarea Edmond Benjamin de Rothschild Foundation Institute for Interdisciplinary Applications of Computer Science at the University of Haifa. We would like to express our appreciation to the Institute and its sponsors. A distinguished list of experts contributed time and energy to the Forum and Workshop making valuable contributions. The participants gave definition to the questions under discussion, presented a range of viewpoints regarding the issues on the agenda, and offered a clearer perspective on points that were still ambiguous. We would like to thank all of them (in alphabetical order): Professor Niv Ahituv, Mr. Oded Cohen, Professor Amos Fiat, Dr. Irith Hartman, Dr. Daphne Lamish, Dr. Fania Oz- Salzberger, and Professor Gabi Weimann. Translating and editing the original position paper required a great deal of work, and we would like to thank Miriam Daya, Stephanie Nakache, and Perry Zamek. For the task of expanding, researching and rewriting the position paper into book form, we would especially like to acknowledge and thank our research assistants Sara Kaufman and Yael Bregman- Eschet, as well as Diane Romm for the final editing. The framework of the current book benefited from the evolving research on the topic by my distinguished colleagues Michael Dan Birnhack and Niva Elkin-Koren. It would have been impossible to bring ix

8 x Acknowledgments this book to light without their leadership in this area. As the co-directors of the Center for Law and Technology at the University of Haifa, they are inspiring a new generation of researchers with new challenges, ideas and questions to be solved. They would especially like to thank Yochai Benkler, Robert Brauneis, Julie Cohen, Amitai Etzioni, Michael Froomkin, Ellen Goodman, Irit Haviv-Segal, Orin Kerr, Neil Netanel, Dawn Nunziato, David Post, Joel Reidenberg and the participants at the Public Design Workshop at NYU School of Law, Rutgers Law School Faculty Colloquium, the Dean Dinwoodey Center for Intellectual Property Studies at George Washington University Law School, the Telecommunication Policy Research Conference (September 2002), the joint colloquia of the Faculties of Law at the University of Haifa and Tel Aviv University, and the Privacy Symposium: Securing Privacy in the Internet Age (Stanford Law School, March 2004).

9 Contents Introduction... 1 GlobalWarsinaGlobalInformationEnvironment... 1 TheDeclineoftheState... 4 TheComebackoftheState... 6 Balancing Wars through the Law DigitalLaw TheLawofDigitalWars An Outline of the Book The Balance Between Security and Civil Rights Mapping the Threats: Preventing Physical and Virtual TerroristAttacks Designing Policies to Address New Security Threats InformationWarfare Data Security Gathering Information and Surveillance Regulation of Encryption Products TerrorPropaganda Preserving Civil Liberties TheRighttoPrivacy Freedom of Expression Enforcement ElectronicCommerceandInnovation Ramifications for Research and Development EncryptionRegulationandElectronicCommerce The Legal Situation: Prevention and Enforcement in the Information Age TheInternationalScene ProtectionoftheRighttoPrivacy xi

10 xii Contents International Regulation for Protection of Personal Data International Regulation of Encryption Products International Regulation of Decryption Products TheUnitedStates ProtectionoftheRighttoPrivacy Protection of the Freedom of Speech American Regulation of Encryption Products American Regulation of Decryption Products TheEuropeanUnion ProtectionoftheRighttoPrivacy EURegulationofEncryption EURegulationofCopyright Other Countries Britain Canada Australia The Legal Framework in Israel TheRighttoPrivacy SearchandSeizure SecretMonitoringinIsraeliLaw Freedom of Speech Liability of Service Providers EnforcementofHackingProhibitions IsraeliRegulationofEncryption The Framework of the Legal Arrangements up to The Framework of the Legal Arrangements After FreedomofOccupation PropertyRights Technological Issues What is Encryption? The Technological Basis The Basic Principle of Encryption: Letter Replacement SymmetricalEncryption AsymmetricalEncryption:PublicKeyandPrivateKey TheRSAEncryptionMethod AnalysisoftheRSAMethod HowisInformationGatheredontheInternet? General Background Means of Collecting Information and Monitoring theinternet

11 Contents xiii CollectionofinformationontheserverorthePC Recommendations: Is There a Need for New Regulations? The Existing System s Suitability for the Internet ImplementingExistingLegalRegulationsfortheInternet ProtectingtheRighttoPrivacy The Liability of Internet Service Providers Regulating Encryption Products to Protect Freedom ofoccupation Concluding Remarks Name Index Subject Index

12 Introduction In recent years, it has become tragically apparent that terrorism is a global phenomenon. The response the war on terror has thus, unsurprisingly and necessarily, become global too. 1 When terrorism takes place in public spaces, shopping malls, subways, buses, restaurants and cafes, the war on terror takes the form of camera monitors, airport checks, data surveillance, and the increased presence of security forces in all these spaces. Terrorists make use of the public media by relying on the certainty that their brutal acts will be reported in headline news, so they can capture the front page to achieve their political gains. The war on terror then responds with hot debates in newspaper columns, television talk shows, radio call-in shows, documentary movies, and public squares. Whether it is London s Hyde Park or a regular park bench of the elderly in Smallville, all of these attributes reflect the characteristics of modern wars, or perhaps post-modern warfare. They are no longer limited to a geographic front; the enemy is not always a visible army, and in some cases, it is not always possible to identify the enemy at all. Global Wars in a Global Information Environment The global war on terror is a war orchestrated by national states that are increasingly losing their role as the centers of power in modern times. Redefining national borders is no longer the goal of the new global war. 1 The term war on terror is controversial in itself, and terrorism, too, is difficult to define. The term war on terror has been applied in many contexts over the past century. This book uses the term as it was first applied by President George W. Bush in his address to a joint session of Congress on September 20, See M. C. Golumbic, Fighting Terror Online. 1 C Springer 2008

13 2 Introduction Terrorists often set a far more ambitious objective for themselves, that of shaking the fundamental principles of the free world and setting new cultural hegemonies. Terrorism threatens civilians, everywhere and nowhere in particular. Individuals still seek security across national borders. States, however, can no longer provide a remedy against terror and, unfortunately, too often fail to secure the personal safety of their citizens. The enemy becomes an undefined them, while we remain we. Old dichotomies and long-established, bloody principles of war collapse, while new ones emerge to replace them. The new war on terror takes place in yet another arena, the digital information environment, namely the Internet. The use of means of communications in the context of war is not new. Wherever communications have been used in the battlefield, they have also been a target. This is true of the pigeon carrying a message between the king and his soldiers, of human messengers running between camps, of the telegraph, the telephone, the radio, and recently the Internet. A message can kill; a message can save lives. It is a target and a crucial tool, always an enigma to be deciphered, interpreted and applied. War and technology have always walked hand in hand. The machinery of war is considered one of the most powerful, motivating forces of technological progress. Most technologies have been developed as tools for warfare, been adopted as such soon after being developed in the nonmilitary market, or been created as a spin-off of warfare research. 2 The Internet is no different. This seemingly civilian and egalitarian information environment was conceived and born as a defensive infrastructure, to be resilient to attacks by the enemy. 3 It is now also being used by the new enemy, and law enforcement has no choice but to follow the terrorists, treating the Internet as a war zone. Yet, the extension of the current war on terror into the Internet is not just another development in the linear history of technological progress and war. Fighting terrorism today is unlike any other war in history. Much of the difference lies in the unique characteristics of the digital environment, which has tremendous potential and power to change the way in which we live. Within the very first few minutes of their first Internet use, most users realize its special nature and its potential for humankind. It 2 For the history of war and technology and their complex relationship, see Martin L. van Crevald, Technology and War: From 2000 B.C. to the Present (New York, 1991). 3 See Richard T. Griffiths, History of the Internet, Internet for Historians, Chapter Two: From ARPANET to World Wide Web (2002), available at htm.

14 Global Wars in a Global Information Environment 3 is already apparent that the digital environment is reshaping our personal lives, our political institutions and organizational structures, our habits and economy. Now it is also a war zone. Cyberspace is filled with a myriad of targets for terrorists and creates a new type of vulnerability in modern societies. As Thomas Ridge, former Director of Homeland Security, who emphasized America s critical need for a coordinated, comprehensive national strategy to protect against terrorist threats and attacks, noted: Information technology pervades all aspects of our daily lives, of our national lives. Its presence is felt almost every moment of every day, by every American. It pervades everything from a shipment of goods, to communications, to emergency services, and the delivery of water and electricity to our homes. All of these aspects of our life depend on a complex network of critical infrastructure information systems. Protecting this infrastructure is critically important. Disrupt it, destroy it or shut down these information networks, and you shut down America as we know it and as we live it and as we experience it every day. We need to prevent disruptions; and when they occur, we need to make sure they are infrequent, short and manageable. This is an enormously difficult challenge. It is a technical challenge, because we must always remain one step ahead of the hackers. It s a legal challenge, because this effort raises cutting-edge questions of both privacy and civil liberties. It s a political challenge, because the government must act in partnership with the private sector, since most of the assets that are involved in this effort are owned by the private sector, which owns and operates the vast majority of America s critical infrastructure. 4 This book explores the intersection where the war on terror meets the digital environment. Once we replace our enthusiasm for the tremendous educational, political, cultural, and social opportunities in the digital environment with the new mindset of the law enforcement agents who are responsible for the safety of the citizenry, the Internet no longer seems a garden of roses. The digital environment, like other civil spheres, hosts a mixture of obedient citizens and covert terrorists, mingled therein, who utilize the Net for their vicious purposes. It has a dual nature, as it simultaneously hosts users with benevolent intentions and those who use it to wreak destruction. Therefore, the innocent public arena necessarily becomes the object of law enforcement efforts. Once it was the pigeon, the messenger delivering secrets among the battle stations, that was targeted by enemy intelligence. If it were caught, the harm was the disclosure of the information carried by the bird. However, Internet communication is 4 See White House, Office of the Press Secretary, News Release, Oct. 9, 2001, available at

15 4 Introduction not a pigeon. It is the engine of civilization in post-modern times. If it is shot down or intercepted, it is not just the carrier that loses; we all lose. Of course, we cannot afford to shut down the Internet, so the question becomes how the bird can be captured without killing it. Herein lies the dilemma to be explored in the chapters that follow. TheDeclineoftheState The war on terror sheds light on and challenges the role of the State any state in the digital environment. By State we mean the democratic system of government, which is elected by the people to govern themselves, a government that, in liberal democracies, acts as the representative of the people itself. The development of the digital environment during the last decade of the twentieth century is associated with a general decline in the role of the State. By the end of the twentieth century, it seemed that we had entered a post-national era. The advances of technology mean that citizens rely less on the State to provide various needs. Once communications, commerce, education and consumption of information, culture and entertainment are conducted over international networks, physical borders matter less and less. 5 Some governments around the world realized this immediately and sought to limit their citizens access to the Internet. A Chinese surfer has a very different Internet experience than that of a French surfer, not to mention an Iranian or a North Korean versus an Italian. 6 Some states have attempted to reinstate or transpose the physical borders into cyberspace. The well-known decision of French courts to require U.S.-based Yahoo! to prevent French surfers from accessing Nazi memorabilia on Yahoo! s auction site is a clear illustration, 7 as is Google s reported agreement to 5 See David R. Johnson & David G. Post, Law and Borders: The Rise of Law in Cyberspace, 48 Stan. L.Rev (1996); BORDERS IN CYBERSPACE: INFORMATION POLICY AND THE GLOBAL INFORMATION INFRASTRUCTURE (Brian Kahin & Charles Nesson, eds., MIT Press, 1997). 6 See the country studies performed by the OpenNet Initative, available at opennetinitiative.net. 7 See the decision in France: League Against Racism and Anti-Semitism (LICRA) v. Yahoo! Inc., Yahoo! France (County Court, Paris, ), available at and a related decision on the enforceability of the French decision in the United States: Yahoo! Inc. v. La Ligue Contre Le Racisme Et L Antisemitisme, 433 F.3d 1199 (9th Cir. 2006), cert. denied, La Ligue Contre le Racisme et l Antisemitisme v. Yahoo! Inc., 126 S.Ct (2006). For a discussion, see Joel R. Reidenberg, Yahoo and Democracy on the Internet, 42JURIMETRICS 261 (2002).

16 TheDeclineoftheState 5 censor the search results of Chinese users. 8 The New York Times limited the access of British users to a story about a pending terror investigation in the UK, citing adherence to local UK sub-judice law. 9 These cases illustrate the tension between global technology and the local sovereignty of states. States lose their power when faced with borderless alternatives, and almost instinctively, attempt to hold on to their territorial power and re-establish it in the online environment. The State s loss of power also raises some doubts as to the very legitimacy of the State. If it no longer plays a fundamental role in our lives, perhaps the State is obsolete. While this is obviously an extreme claim, one to which we do not subscribe, it might imply that in particular areas, the State, which functions through the rule of law within national borders, may no longer be useful in Cyberland. Consider the contours of free speech, for instance. A state may attempt to regulate obscenity and declare all obscene content not to be speech for the purpose of its free speech jurisprudence. This is the legal situation in the United States. Such a declaration results in a legal debate as to the definition of obscenity, but that is an American debate. 10 The point here is that once access to obscene material is easily available through the Internet, the local definitions whatever they are no longer matter. Or, consider another example virtual casinos. Once citizens realize that they can gamble online, while physically located in their no-gambling allowed state, it suddenly seems that the old rule is no longer valid. Of course, we might re-validate it, for example by imposing duties on financial intermediaries, 11 but the doubts raised by the new technologies are arrows shot at the core of the legitimacy of the State. States have also lost power to corporations. As local corporations grow into giant global, multinational entities, operating in many countries, they can juggle funds and activities between them. Some of the biggest global corporations have become so powerful that they are richer than most states, and they have learned that they can manipulate local governments 8 See Michael Liedtke, Google Agrees to Censor Results in China, AP, Jan. 24, 2006, available at 9 See Tom Zeller, Times Withholds Web Article in Britain, New York Times, August 29, The current judicial test to determine the contours of obscenity were outlined in Miller v. California, 413 U.S. 15 (1973). The Supreme Court struggled with its application to cyberspace. In the context discussed here, an interesting controversy revolved around one element of the Miller test, that which addresses contemporary community standards. How should a community be identified on the Internet? See Ashcroft v. American Civil Liberties Union, 535 U.S. 564 (2002). 11 See Unlawful Internet Gambling Enforcement Act of 2006, codified as 31 U.S.C

17 6 Introduction to meet their needs. When some developed countries pushed for a new global order in intellectual property laws, for example, they were impelled to do so by the multinational corporations acting from within these countries. 12 The rise of multinational corporations is the result of many factors, with the information-based economy and global technologies comprising just two aspects thereof. Whatever the reasons may be, however, the result is that the State has lost power. Yet another reason for the demise of the power of the State is that new technologies offer code as a substitute for the main tool of governance that the State traditionally held the law. Joel Reidenberg pointed to Lex Informatica, 13 and Lawrence Lessig coined the phrase code is law. 14 Technology, goes the argument, affects the way in which we behave no less than state-issued laws. In many cases, code actually replaces the law. Where the law fails to protect our privacy, Privacy Enhancing Technologies (PETs) attempt to provide an answer. When copyright owners are disappointed with the legal protection provided by the State, they turn to Digital Rights Managements (DRMs) to fill in the void. The result is the commodification of information, at the expense of a free, open commons. 15 Contracts embedded in code are self-executed, meaning that the parties no longer rely on the State to provide enforcement. Instead, it is code that serves as the solution. The overall consequence is that the Internet, a distributed network that belongs to no one and is run by no government, is packed with the commercial interests of multinational corporations who have only one goal: promoting their own self-interests. This is where the decline of the State is most visible. The Comeback of the State Faced with the decline of their power, states have found themselves weaker than ever before and unequipped to face the new global terrorism. The decline of the State in the digital environment reached its lowest point 12 See Pamela Samuelson, The Copyright Grab, Wired 4.01 (1996); Peter Drahos, Negotiating Intellectual Property Rights: Between Coercion and Dialogue, in Global Intellectual Property Rights: Knowledge, Access and Development 161 (Peter Drahos & Ruth Mayne, eds., 2002). 13 Joel R. Reidenberg, Lex Informatica: The Formulation of Information Policy Rules through Technology, 76 Texas L. Rev. 553 (1998). 14 Lawrence Lessig, CODE AND OTHER LAWS OF CYBERSPACE (New York, Basic Books, 1999). 15 For a critical analysis of the process of commodification, see The Commodification of Information (Niva Elkin-Koren & Neil Netanel, eds., Kluwer Information Law Series, 2002). For a discussion of the counter-forces pushing towards a commons-based environment, see Yochai Benkler, THE WEALTH OF NETWORKS (2006).

18 The Comeback of the State 7 just before the realization that a new kind of threat was at work that of global terrorism. Moreover, a new type of war a war on terror would be required in response to the threat, despite the lack of agreement on how such a war should be handled. Faced with new threats of global terrorism and the need to undertake enforcement measures in the online environment, governments around the world found themselves struggling to reinstate their power in the digital environment. Some would argue that this process was, and still is, inevitable, and that the war on terror merely serves as a cover for the continued attempts by states to assert their control over a network that remains out of reach for local governments and threatens their sovereignty. However, traditional governmental tools do not fit the new digital arena. During the temporary absence of the State from the information arena, the latter has changed. Perhaps it has not yet fully matured, but the information arena has surely developed some habits. There are powerful private entities in this arena, and many of these have acquired their power by pushing governments to change their internal laws in favor of these influential groups. Intellectual property laws, especially copyright laws, and rules regulating the liability of Online Service Providers (OSPs) are chief examples 16, as well as new rules governing online commercial competition, such as the new life of the ancient tort of trespass to chattels. 17 Governments wishing to regain control must adapt to the new situation. The State has done so by holding hands with the private nodes of power. The invisible handshake 18 between the market and the State represents the cooperation between governments and large market players that emerged in the information environment during the late 1990s. While this partnership is significant, it is invisible to most users. As Richard Clarke, former special advisor to President Bush for Cyber Security, appointed shortly after 9/11, warned: America has built cyberspace, and America must now defend its cyberspace. But it can only do that in partnership with industry. [...] Private sector companies own and operate most of our critical infrastructure 16 Niva Elkin-Koren, Copyright Law and Social Dialogue on the Information Superhighway: The Case Against Copyright Liability of Bulletin Board Operators, 13CARDOZO ARTS &ENT. L.J. 345 (1995). 17 Niva Elkin-Koren, Let the Crawlers Crawl: On Virtual Gatekeepers and the Right to Exclude Indexing, 26 U. Dayton L. Rev. 179 (2001). 18 Michael D. Birnhack & Niva Elkin-Koren, The Invisible Handshake: The Reemergence of the State in the Digital Environment, 8VIRGINIA J. OF LAW AND TECH. no. 6 (2003), 1 57.

19 8 Introduction cyberspace systems. So we have been working closely with industry. [...] We ll be working even more with them in the future, to secure our cyberspace from a range of possible threats, from hackers to criminals to terrorist groups, to foreign nations, which might use cyber war against us in the future. 19 The invisible handshake is a simple phenomenon, yet a disturbing one, because it makes the State reliant on the cooperation of corporations for executing some of its basic roles, such as regulation and enforcement. Such is the case when online service providers are asked to report suspicious behavior to the authorities or are asked to implement various filtering systems. Privatizing the State s enforcement functions liberates law enforcement agencies from some of the restraints that limit the exercise of power by governments. It therefore renders useless some traditional checks and balances that safeguard individual liberty and provide guarantees against governmental abuse of power. When dot.com holds hands with dot.gov, law enforcement tasks are de-facto privatized to non-elected, commercially motivated entities, accountable to no one. The State is back in the picture, but in a completely new way. One of the main tools that the State has traditionally used to perform its designated tasks is the law. The American founding fathers taught us that the government is one of laws, not of men. The powers of the State were determined by the law, examined under the law, and limited by the law. The law served as a space where old war-related dilemmas were addressed. The law is also the language of the invisible handshake and occupies the space where the current comeback of the State is taking place. When the state acts indirectly through private corporations, it bypasses the fundamental checks and balances set in constitutional law. Balancing Wars through the Law Wartime dilemmas are not a new phenomenon. How should a sovereign country treat civilian populations in an occupied territory during wartime? How should prisoners of war be treated, particularly if they are believed to have information that can save many lives (the ticking bomb case)? As 19 See White House, Office of the Press Secretary, News Release, Oct. 9, 2001, available at

20 Balancing Wars through the Law 9 the war extends beyond the battlefield itself, what are the ethical, political, or legal limits? 20 Propaganda and other means of psychological warfare raise yet another set of problems. Can a government deliberately circulate disinformation in order to mislead the enemy, even though it may confuse or mislead its own people? Can the press report everything that it knows? Is information about military activity fit to print? Is there a limit to the freedom of speech of citizens who object to the war and openly support the enemy or who may even urge soldiers to disobey their commanders? These and many other issues cannot be ignored. Many of the answers are difficult to find. Usually, the places to which we look in our search for answers are in ethics, politics, and perhaps justice. The law is often the focal point where all these considerations converge. A constitution often reflects the morality of the people, and courts strive to interpret it to maintain its integrity to this morality. 21 Where politicians often limit their view to the here and now with their horizons often not extending beyond the next elections the law has the ability to consider both the immediate problem and the long-term implications thereof. This is by no means an easy task. Courts often lack the ability and expertise to evaluate military needs. They are often hesitant, as they should be, and are frequently afraid to make bold decisions when it comes to military issues. This is only natural and understandable. Few are willing to take the risk when human lives are at stake. It is thus not surprising that courts seek escape routes, usually in doctrines of non-justiciability. However, sometimes courts do not have the luxury of avoiding the hard cases. They might turn to international law, but often it is constitutional law that serves as the legal framework for addressing war-related dilemmas. During World War II, the U.S. Supreme Court approved the detention of American citizens of Japanese origin, in the notorious Korematsu case. 22 While the case is considered one of the darkest decisions of the U.S. Supreme Court, it is also regarded as a paradigm of an elaborate methodology of constitutional balancing. Today, this method is utilized in many legal systems in liberal democracies. For example, the European Convention on Human Rights (ECHR) reflects the understanding that human rights are not absolutes and that on some occasions rights need to 20 See Gabriel Weimann, TERROR ON THE INTERNET:THE NEW ARENA, THE NEW CHALLENGES (USIP Press Books, 2006). 21 For constitutional interpretation based on morality, see Ronald Dworkin, FREEDOM S LAW: THE MORAL READING OF THE AMERICAN CONSTITUTION (Harvard University Press, 1996). 22 See Korematsu v. United States, 323 U.S. 214 (1944).

21 10 Introduction be balanced against each other. Sometimes it is a social need that requires compromising on human rights. Freedom of the press can be halted in order to avoid disclosing a secret military operation as it is taking place. The privacy of suspects may be violated if there is a reasonable basis for believing that they are hiding crucial enemy secrets. Sometimes liberty itself may be compromised in order to extract vital information from a suspect, such as knowledge of a bomb about to explode on a city bus (the ticking bomb problem ). These constitutional tools provide a framework for the law in regulating some-war-related dilemmas. Surely, not all problems can be solved in solemn judicial chambers. In many cases, the balancing of military interests with human rights is so difficult that it is almost unbearable. However, we may be comforted by the fact that legal systems have gained knowledge and experience in dealing with these complex matters. As legal systems have learned from each other s experience, especially since the end of World War II, our legal understanding of human rights continues to develop and the law is better equipped to address these questions. Digital Law Today, liberal democracies are faced with a new kind of war the war on terror and a new battlefield the Internet. Are the old laws of war still relevant? In answering this question, we need to bear in mind the complex and dialectic relationship between law and technology. It is wrong as a matter of description and useless as a matter of normative judgment to declare that one of the two rivals law or technology trumps the other. 23 Indeed, it is often the case that the law is challenged by new technologies. In this sense, the law often lags behind new technologies. Most legal rules were drafted before the advent of the Internet. For instance, how does copyright law apply in the digital environment? Simple acts that do not trigger copyright issues at all in the physical world, such as lending a book to a friend, might suddenly be treated as copying, publishing, distributing, or displaying to the public when performed in the digital context. In response to the new environment, some rules have been drafted to address problems such as those related to defamatory speech posted on a website. Should the law treat the website operator as it treats the publisher 23 Niva Elkin-Koren, Making Technology Visible: Liability of Intent Service Providers for Peerto-Peer Traffic, 9 NYU J. OF LEGIS. AND PUBLIC POLICY 15 (2006).

22 Digital Law 11 of a book or a newspaper? Should ISPs be exempted from liability for any injurious materials exchanged by their patrons? 24 The law, by its very nature, is often called upon to address disputes over uses of new platforms and therefore must respond to the challenges of new technologies. Sometimes new rules are drafted by the legislature, and other times courts interpret old rules so that they fit the new technology. Some of these new or renewed rules might fail, but then they will be replaced by even newer ones. The American experience with regulating children s access to online pornography is an example. 25 In yet other cases, technology responds to the legal rule. The rise of non-centralized peer-to-peer filesharing systems, like Kazaa after the legal defeat of Napster, is a wellknown example. 26 Finally, in some cases, technology may substitute for law. Code may replace law in protecting privacy, as in the cases of Privacy Enhancing Technologies (PETs) such as P3P and anonymizer.com. 27 Rather than imposing access restrictions to online materials, one may simply use a filter. Instead of prohibiting unauthorized copying, Digital Rights Management systems, used in formats such as ebooks and pdf files, may limit the technical ability to redistribute or make copies. In this sense, code becomes law. However, even this type of regulation by code would be subject to the law and its underlying principles. 24 See 47 U.S.C. 230, and its interpretation in Zeran v. America Online, Inc., 129 F.3d 327 (4th Cir. 1997). See also Batzel v. Smith, 333 F.3d 1081 (9th Cir. 2003), and compare it to the European solution to the problem of ISP liability, in Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on Certain Legal Aspects of Information Society Services, in particular Electronic Commerce, in the Internal Market (Directive on Electronic Commerce), articles Congress and the Courts are still engaged in a 10-year old struggle in which Congress enacts laws that are then invalidated by the courts. This process is repeated over and over, generally with Congress losing the battle. For example, Congress enacted the Communications Decency Act of 1996 (CDA), which was declared unconstitutional in Reno v. ACLU, 929 F. Supp. 824 (E.D. Pa., 1996), aff d, Reno v. ACLU, 521 U.S. 844 (1997). Following these decisions, Congress enacted the Child Online Protection Act (COPA), which, after several tests in the lower courts and the Supreme Court, is still under preliminary injunction. See American Civil Liberties Union v. Reno, 31 F.Supp.2d 473 (E.D.Pa. 1999), aff d, American Civil Liberties Union v. Reno, 217 F.3d 162 (3rd Cir., 2000), reve d, Ashcroft v. American Civil Liberties Union, 535 U.S. 564 (2002); remanded, American Civil Liberties Union v. Ashcroft, 322 F.3d 240 (3rd Cir. 2003), aff d and remanded, Ashcroft v. American Civil Liberties Union, 542 U.S. 656 (2004). At the time of this writing, the trial on the merits of the case is taking place in the District Court (Oct. 2006). 26 See A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir. 2001). Later cases discussed various other p2p systems, finding they violate copyright. In re Aimster Copyright Litigation, 334 F.3d 643 (7th Cir. 2003); Metro-Goldwyn-Mayer Studios, Inc. v. Grokster Ltd 125 S.Ct (2005). 27 See and respectively.

23 12 Introduction When new laws are made, be it by the legislature, courts, or the executive branch, and when we evaluate new laws, we need to bear this complex relationship in mind. Laws reflect ideology, ethics, social norms, and cultural values. They have a goal and a purpose, namely, to improve our lives in the community. The law is a fundamental social instrument in modern democracies, a fact that is sometimes forgotten. Hence, we should not seek to get rid of our laws too quickly. We should decipher them and study their underlying purpose. We should then study the new technologies, the opportunities that are embedded within them and the values that they reflect, as well as their negative consequences. When devising legal solutions, one should bear in mind that whatever stance is chosen, it is likely to have an effect. Technology might respond to a law in a way that would render the law obsolete within 10 minutes after it takes effect. We should seek solutions by going back and forth between the law, with its social goals, and technology, including its opportunities and negative consequences, in order to find the equilibrium between them. The Law of Digital Wars This book attempts to tie together three elements that converge here: security, technology, and the law. Should the law regulate the conflicts between national security needs and human rights when it comes to the digital environment? How can it best do so? What is the golden path that will allow us to achieve our optimal security goals while causing minimal harm to our civil activities, which all take place in the same arena? These issues are put in the context of the new threats posed by global terrorism and the war on terror, as well as the decline of the State and its reemergence in the digital environment. It is the context of a dynamic technology that interacts dialectically with the law. An Outline of the Book We begin by outlining the framework of this book, that is, the comeback of the State in the digital environment. Chapter 1 will present the main theme of the book the balance between the need for security and the safeguarding of civil liberties. We will first map the threats, both physical and virtual, particularly in the areas of data protection and monitoring of

24 An Outline of the Book 13 information, and then address the issues of psychological and informational warfare, with a focus on propaganda. Security threats within the online environment can also be classified based on the type of damage caused, whether physical or non-physical. In the category of non-physical damage, we can include the term soft war, referring to the dissemination of false information for propaganda purposes and demoralization. The legal problems that arise in connection with the issues of incitement, sedition, disinformation, hostile propaganda, and hate speech have been dealt with in depth in the pre-digital environment. Within that framework, many legal systems have devised a series of constitutional balances to guide both the executive and the judiciary branches. The issues covered include the tension between security needs and the freedom of the press, the public interest in the maintenance of order versus the freedom to demonstrate, and the limits on forms of political expression that offend the majority. The chapter continues with a discussion of the preservation of civil liberties in the information age. Individual subsections will deal with topics about the right to privacy, freedom of speech, freedom of occupation, market intervention and research and development considerations, and the influence of encryption regulation on electronic commerce. Building on this theoretical basis, Chapter 2 demonstrates how legal systems worldwide have dealt with these challenges. Here we examine international regulations, as well as laws in the United States, the European Union, and several other countries including Britain, Canada, and Australia in an effort to determine how the world is balancing the threat of online terrorism with the need to safeguard civil rights. A similar examination of how the Israeli legal system is dealing with this challenge is the focus of Chapter 3. Chapter 4 offers a technical examination of encryption and explains how information is gathered on the Internet. Encryption software is one of the most common and effective means of protection. In the legal sphere, the threat of information warfare demands a reconsideration of the regulation of encryption products. Such products serve the State in securing the information in its possession, but may also serve hostile groups in achieving their aims. The regulation of encryption products is an issue that emphasizes the questions underlying the whole discussion: the balance between security needs and individual rights, the cost of intervention in the marketplace, and, fundamentally, the applicability of traditional legal concepts to the online environment. Finally, Chapter 5 assesses the law s ability to regulate technology in its efforts to assist law enforcement agencies in the war on terror and offers recommendations for new regulations.

Fighting Terror Online

Fighting Terror Online Fighting Terror Online Martin Charles Golumbic Fighting Terror Online The Convergence of Security, Technology, and the Law Martin Charles Golumbic Caesarea Rothschild Institute University of Haifa Mount

More information

< F5FB77CB6BCBD672028B0B6A46AABE4B751A874A643295F5FB8D5C5AA28A668ADB6292E706466>

< F5FB77CB6BCBD672028B0B6A46AABE4B751A874A643295F5FB8D5C5AA28A668ADB6292E706466> A A A A A i A A A A A A A ii Introduction to the Chinese Editions of Great Ideas Penguin s Great Ideas series began publication in 2004. A somewhat smaller list is published in the USA and a related, even

More information

國立中山大學學位論文典藏.PDF

國立中山大學學位論文典藏.PDF I II III The Study of Factors to the Failure or Success of Applying to Holding International Sport Games Abstract For years, holding international sport games has been Taiwan s goal and we are on the way

More information

香港藝術發展局委託報告

香港藝術發展局委託報告 香 港 藝 術 發 展 局 委 託 報 告 香 港 藝 團 與 內 地 交 流 資 料 結 集 和 分 析 A STUDY ON CULTURAL EXCHANGE OF LOCAL ARTS GROUPS WITH THE MAINLAND 終 期 報 告 香 港 大 學 文 化 政 策 研 究 中 心 2006 年 12 月 香 港 藝 團 與 內 地 交 流 資 料 結 集 和 分 析 許 焯

More information

2005 4,,,,,,,,,,,,, (2001 ) ;() ( 1997 ) ; ( 1997 ) ; () (1996 ) ;,: ( 1995 ) ; (1995 ),,,, (J13) (J9) (J10), (J19) (J17) 58

2005 4,,,,,,,,,,,,, (2001 ) ;() ( 1997 ) ; ( 1997 ) ; () (1996 ) ;,: ( 1995 ) ; (1995 ),,,, (J13) (J9) (J10), (J19) (J17) 58 ,,,, 44 %,,,,,,,,,,,, 57 2005 4,,,,,,,,,,,,, (2001 ) ;() ( 1997 ) ; ( 1997 ) ; () (1996 ) ;,: ( 1995 ) ; (1995 ),,,, (J13) (J9) (J10), (J19) (J17) 58 ,,,,,,,,,,, 1945 11 5,, ( ) : ; 1945 11,,,,,:, 1987,802,

More information

<4D6963726F736F667420576F7264202D20B5DAC8FDB7BDBE57C9CFD6A7B8B6D6AEB7A8C2C98696EE7DCCBDBEBF2E646F63>

<4D6963726F736F667420576F7264202D20B5DAC8FDB7BDBE57C9CFD6A7B8B6D6AEB7A8C2C98696EE7DCCBDBEBF2E646F63> 題 目 : 第 三 方 網 上 支 付 之 法 律 問 題 探 究 Title:A study on legal issues of the third-party online payment 姓 名 Name 學 號 Student No. 學 院 Faculty 課 程 Program 專 業 Major 指 導 老 師 Supervisor 日 期 Date : 王 子 瑜 : 1209853J-LJ20-0021

More information

Your Field Guide to More Effective Global Video Conferencing As a global expert in video conferencing, and a geographically dispersed company that uses video conferencing in virtually every aspect of its

More information

國家圖書館典藏電子全文

國家圖書館典藏電子全文 i ii Abstract The most important task in human resource management is to encourage and help employees to develop their potential so that they can fully contribute to the organization s goals. The main

More information

rights and interests of doctors and patients. But it is insufficient jurisprudential basis and legitimacy crisis of legal forms through the form of mi

rights and interests of doctors and patients. But it is insufficient jurisprudential basis and legitimacy crisis of legal forms through the form of mi 1 Vol. 3 6 No. 1 36 2 0 1 8 1 Hebei Law Science Jan. 2 0 1 8 DOI 10. 16494 /j. cnki. 1002-3933. 2018. 01. 011 511436 DF36 A 1002-3933 2018 01-0117-13 Study on the Jurisprudential Basis on the Implementation

More information

經濟部智慧財產局

經濟部智慧財產局 經 濟 部 智 慧 財 產 局 我 國 著 作 權 合 理 使 用 實 務 見 解 之 研 究 期 末 報 告 書 執 行 單 位 益 思 科 技 法 律 事 務 所 中 華 民 國 一 一 年 十 二 月 八 日 I 我 國 著 作 權 合 理 使 用 實 務 見 解 之 研 究 期 末 報 告 書 計 畫 主 持 人 賴 文 智 : 益 思 科 技 法 律 事 務 所 所 長 臺 灣 大 學 法

More information

Microsoft Word - TIP006SCH Uni-edit Writing Tip - Presentperfecttenseandpasttenseinyourintroduction readytopublish

Microsoft Word - TIP006SCH Uni-edit Writing Tip - Presentperfecttenseandpasttenseinyourintroduction readytopublish 我 难 度 : 高 级 对 们 现 不 在 知 仍 道 有 听 影 过 响 多 少 那 次 么 : 研 英 究 过 文 论 去 写 文 时 作 的 表 技 引 示 巧 言 事 : 部 情 引 分 发 言 该 生 使 在 中 用 过 去, 而 现 在 完 成 时 仅 表 示 事 情 发 生 在 过 去, 并 的 哪 现 种 在 时 完 态 成 呢 时? 和 难 过 道 去 不 时 相 关? 是 所 有

More information

論法院作成出版品禁止發行之衡量標準

論法院作成出版品禁止發行之衡量標準 論 法 院 作 成 出 版 品 禁 止 發 行 裁 定 之 衡 量 標 準 - 以 日 本 實 務 及 學 說 討 論 為 中 心 - A Study on the Stardard of Issuing a Preliminary Injunction -Comparative with the Japanese Practice and Theory- 詹 融 潔 Jung-Chieh Chan

More information

Microsoft Word - 第四組心得.doc

Microsoft Word - 第四組心得.doc 徐 婉 真 這 四 天 的 綠 島 人 權 體 驗 營 令 我 印 象 深 刻, 尤 其 第 三 天 晚 上 吳 豪 人 教 授 的 那 堂 課, 他 讓 我 聽 到 不 同 於 以 往 的 正 義 之 聲 轉 型 正 義, 透 過 他 幽 默 熱 情 的 語 調 激 起 了 我 對 政 治 的 興 趣, 願 意 在 未 來 多 關 心 社 會 多 了 解 政 治 第 一 天 抵 達 綠 島 不 久,

More information

<4D6963726F736F667420576F7264202D203338B4C12D42A448A4E5C3C0B34EC3FE2DAB65ABE1>

<4D6963726F736F667420576F7264202D203338B4C12D42A448A4E5C3C0B34EC3FE2DAB65ABE1> ϲ ฯ र ቑ ጯ 高雄師大學報 2015, 38, 63-93 高雄港港史館歷史變遷之研究 李文環 1 楊晴惠 2 摘 要 古老的建築物往往承載許多回憶 也能追溯某些歷史發展的軌跡 位於高雄市蓬 萊路三號 現為高雄港港史館的紅磚式建築 在高雄港三號碼頭作業區旁的一片倉庫 群中 格外搶眼 這棟建築建成於西元 1917 年 至今已將近百年 不僅躲過二戰戰 火無情轟炸 並保存至今 十分可貴 本文透過歷史考證

More information

UDC The Policy Risk and Prevention in Chinese Securities Market

UDC The Policy Risk and Prevention in Chinese Securities Market 10384 200106013 UDC The Policy Risk and Prevention in Chinese Securities Market 2004 5 2004 2004 2004 5 : Abstract Many scholars have discussed the question about the influence of the policy on Chinese

More information

hks298cover&back

hks298cover&back 2957 6364 2377 3300 2302 1087 www.scout.org.hk scoutcraft@scout.org.hk 2675 0011 5,500 Service and Scouting Recently, I had an opportunity to learn more about current state of service in Hong Kong

More information

國立中山大學學位論文典藏

國立中山大學學位論文典藏 I II III IV The theories of leadership seldom explain the difference of male leaders and female leaders. Instead of the assumption that the leaders leading traits and leading styles of two sexes are the

More information

2005 5,,,,,,,,,,,,,,,,, , , 2174, 7014 %, % 4, 1961, ,30, 30,, 4,1976,627,,,,, 3 (1993,12 ),, 2

2005 5,,,,,,,,,,,,,,,,, , , 2174, 7014 %, % 4, 1961, ,30, 30,, 4,1976,627,,,,, 3 (1993,12 ),, 2 3,,,,,, 1872,,,, 3 2004 ( 04BZS030),, 1 2005 5,,,,,,,,,,,,,,,,, 1928 716,1935 6 2682 1928 2 1935 6 1966, 2174, 7014 %, 94137 % 4, 1961, 59 1929,30, 30,, 4,1976,627,,,,, 3 (1993,12 ),, 2 , :,,,, :,,,,,,

More information

C o n t e n t s...7... 15 1. Acceptance... 17 2. Allow Love... 19 3. Apologize... 21 4. Archangel Metatron... 23 5. Archangel Michael... 25 6. Ask for

C o n t e n t s...7... 15 1. Acceptance... 17 2. Allow Love... 19 3. Apologize... 21 4. Archangel Metatron... 23 5. Archangel Michael... 25 6. Ask for Doreen Virtue, Ph.D. Charles Virtue C o n t e n t s...7... 15 1. Acceptance... 17 2. Allow Love... 19 3. Apologize... 21 4. Archangel Metatron... 23 5. Archangel Michael... 25 6. Ask for a Sign... 27 7.

More information

,,,,, 1945,,,,,,,,4,,,,,,,,, ( ), ;, ;,,,? (1992 ) (,1993 ), (1945 4 7 ), () 3,143, ( ) ( ), ( ) :,015 2 15

,,,,, 1945,,,,,,,,4,,,,,,,,, ( ), ;, ;,,,? (1992 ) (,1993 ), (1945 4 7 ), () 3,143, ( ) ( ), ( ) :,015 2 15 ,,,,,,,,,,,,,,,,,,,,,1945 8,1946,,,,,,,, 14 ,,,,, 1945,,,,,,,,4,,,,,,,,, ( ), ;, ;,,,? (1992 ) (,1993 ), (1945 4 7 ), () 3,143, ( ) ( ), ( ) :,015 2 15 2002 1,,,,,, :( ),,,,,,, ;,,,,,,,:,, (1945 8 29 ),

More information

124 第十三期 Conflicts in the Takeover of the Land in Taiwan after the Sino-Japanese War A Case in the Change of the Japanese Names of the Taiwanese Peopl

124 第十三期 Conflicts in the Takeover of the Land in Taiwan after the Sino-Japanese War A Case in the Change of the Japanese Names of the Taiwanese Peopl 123 戰後初期臺灣土地接收的糾紛 以更改日式姓名的臺人遭遇為例 124 第十三期 Conflicts in the Takeover of the Land in Taiwan after the Sino-Japanese War A Case in the Change of the Japanese Names of the Taiwanese People Abstract By Ho Fung-jiao

More information

2009.05

2009.05 2009 05 2009.05 2009.05 璆 2009.05 1 亿 平 方 米 6 万 套 10 名 20 亿 元 5 个 月 30 万 亿 60 万 平 方 米 Data 围 观 CCDI 公 司 内 刊 企 业 版 P08 围 观 CCDI 管 理 学 上 有 句 名 言 : 做 正 确 的 事, 比 正 确 地 做 事 更 重 要 方 向 的 对 错 于 大 局 的 意 义 而 言,

More information

Chinese oil import policies and reforms 随 着 经 济 的 发 展, 目 前 中 国 石 油 消 费 总 量 已 经 跃 居 世 界 第 二 作 为 一 个 负 责 任 的 大 国, 中 国 正 在 积 极 推 进 能 源 进 口 多 元 化, 鼓 励 替 代

Chinese oil import policies and reforms 随 着 经 济 的 发 展, 目 前 中 国 石 油 消 费 总 量 已 经 跃 居 世 界 第 二 作 为 一 个 负 责 任 的 大 国, 中 国 正 在 积 极 推 进 能 源 进 口 多 元 化, 鼓 励 替 代 Chinese oil import policies and reforms SINOPEC EDRI 2014.8 Chinese oil import policies and reforms 随 着 经 济 的 发 展, 目 前 中 国 石 油 消 费 总 量 已 经 跃 居 世 界 第 二 作 为 一 个 负 责 任 的 大 国, 中 国 正 在 积 极 推 进 能 源 进 口 多 元 化,

More information

Microsoft Word - 24.doc

Microsoft Word - 24.doc 水 陸 畢 陳 晚 明 飲 食 風 尚 初 探 蕭 慧 媛 桃 園 創 新 技 術 學 院 觀 光 與 休 閒 事 業 管 理 系 摘 要 飲 食 是 人 類 維 持 與 發 展 生 命 的 基 礎 之 一, 飲 食 風 尚 會 隨 著 社 會 地 位 物 質 條 件 以 及 人 為 因 素 轉 移, 不 同 階 層 的 飲 食 方 式, 往 往 標 誌 著 他 們 的 社 會 身 分, 甚 至 反

More information

1 * 1 *

1 * 1 * 1 * 1 * taka@unii.ac.jp 1992, p. 233 2013, p. 78 2. 1. 2014 1992, p. 233 1995, p. 134 2. 2. 3. 1. 2014 2011, 118 3. 2. Psathas 1995, p. 12 seen but unnoticed B B Psathas 1995, p. 23 2004 2006 2004 4 ah

More information

致 谢 本 论 文 能 得 以 完 成, 首 先 要 感 谢 我 的 导 师 胡 曙 中 教 授 正 是 他 的 悉 心 指 导 和 关 怀 下, 我 才 能 够 最 终 选 定 了 研 究 方 向, 确 定 了 论 文 题 目, 并 逐 步 深 化 了 对 研 究 课 题 的 认 识, 从 而 一

致 谢 本 论 文 能 得 以 完 成, 首 先 要 感 谢 我 的 导 师 胡 曙 中 教 授 正 是 他 的 悉 心 指 导 和 关 怀 下, 我 才 能 够 最 终 选 定 了 研 究 方 向, 确 定 了 论 文 题 目, 并 逐 步 深 化 了 对 研 究 课 题 的 认 识, 从 而 一 中 美 国 际 新 闻 的 叙 事 学 比 较 分 析 以 英 伊 水 兵 事 件 为 例 A Comparative Analysis on Narration of Sino-US International News Case Study:UK-Iran Marine Issue 姓 名 : 李 英 专 业 : 新 闻 学 学 号 : 05390 指 导 老 师 : 胡 曙 中 教 授 上 海

More information

東吳大學

東吳大學 律 律 論 論 療 行 The Study on Medical Practice and Coercion 林 年 律 律 論 論 療 行 The Study on Medical Practice and Coercion 林 年 i 讀 臨 療 留 館 讀 臨 律 六 礪 讀 不 冷 療 臨 年 裡 歷 練 禮 更 老 林 了 更 臨 不 吝 麗 老 劉 老 論 諸 見 了 年 金 歷 了 年

More information

University of Science and Technology of China A dissertation for master s degree Research of e-learning style for public servants under the context of

University of Science and Technology of China A dissertation for master s degree Research of e-learning style for public servants under the context of 中 国 科 学 技 术 大 学 硕 士 学 位 论 文 新 媒 体 环 境 下 公 务 员 在 线 培 训 模 式 研 究 作 者 姓 名 : 学 科 专 业 : 导 师 姓 名 : 完 成 时 间 : 潘 琳 数 字 媒 体 周 荣 庭 教 授 二 一 二 年 五 月 University of Science and Technology of China A dissertation for

More information

A study on the Fire Safety of Interior Finishes: Residential Buildings in Kaohsiung City taken as Examples between the interior design of safety and skill tests of Scholastic. A Thesis Submitted to Institute

More information

ABSTRACT ABSTRACT Based on analyzing public corporation in foreign countries, this paper studies basic theories of public legal establishment, with our country s reality in the social transferring period

More information

中 國 學 研 究 期 刊 泰 國 農 業 大 學 บ นทอนเช นก น และส งผลก บการด ดแปลงจากวรรณกรรมมาเป นบทภาพยนตร และบทละคร โทรท ศน ด วยเช นก น จากการเคารพวรรณกรรมต นฉบ บเป นหล

中 國 學 研 究 期 刊 泰 國 農 業 大 學 บ นทอนเช นก น และส งผลก บการด ดแปลงจากวรรณกรรมมาเป นบทภาพยนตร และบทละคร โทรท ศน ด วยเช นก น จากการเคารพวรรณกรรมต นฉบ บเป นหล วารสารจ นศ กษา มหาว ทยาล ยเกษตรศาสตร การเล อกสรรของย คสม ยท แตกต างก น โดยว เคราะห การด ดแปลง บทละครโทรท ศน หร อบทภาพยนต จากผลงานคลาสส กวรรณกรรม สม ยใหม ของจ น The Choice of Times Film Adaptation of Chinese

More information

南華大學數位論文

南華大學數位論文 Rebuilding The Golden Town Everyday Life and Space at Jin-gua-shi 1897-1987.. ABSTRACT Rebuilding The Golden Town Everyday Life and Space at Jin-gua-shi ABSTRACT This thesis focuses on the formation of

More information

,,,,, (,1988: 630) 218

,,,,, (,1988: 630) 218 * 1 19 20 * 1,,,,, (,2006) 217 2018. 1 1959 453 1959 472 1 20 20 1928 1929 2014 20 30 1,,,,, (,1988: 630) 218 2003 405 1930 2005 1 2005 2 20 20 1930 2003 405 1934 1936 2003 411 2003 413 2005 206 2005 219

More information

政治哲學要跨出去!

政治哲學要跨出去! 台 灣 中 國 大 陸 研 究 之 回 顧 與 前 瞻 71 台 灣 中 國 大 陸 研 究 之 回 顧 與 前 瞻 * 楊 開 煌 一 前 言 二 學 科 之 建 立 與 發 展 三 歷 史 的 回 顧 四 反 省 代 結 論 本 文 主 要 是 透 過 歷 史 的 回 顧 來 檢 討 在 台 灣 的 中 國 大 陸 研 究 發 生 與 發 展 的 歷 程 本 文 作 者 以 個 人 親 與 的

More information

Abstract There arouses a fever pursuing the position of being a civil servant in China recently and the phenomenon of thousands of people running to a

Abstract There arouses a fever pursuing the position of being a civil servant in China recently and the phenomenon of thousands of people running to a Abstract There arouses a fever pursuing the position of being a civil servant in China recently and the phenomenon of thousands of people running to attend the entrance examination of civil servant is

More information

摘 要 互 联 网 的 勃 兴 为 草 根 阶 层 书 写 自 我 和 他 人 提 供 了 契 机, 通 过 网 络 自 由 开 放 的 平 台, 网 络 红 人 风 靡 于 虚 拟 世 界 近 年 来, 或 无 心 插 柳, 或 有 意 噱 头, 或 自 我 表 达, 或 幕 后 操 纵, 网 络

摘 要 互 联 网 的 勃 兴 为 草 根 阶 层 书 写 自 我 和 他 人 提 供 了 契 机, 通 过 网 络 自 由 开 放 的 平 台, 网 络 红 人 风 靡 于 虚 拟 世 界 近 年 来, 或 无 心 插 柳, 或 有 意 噱 头, 或 自 我 表 达, 或 幕 后 操 纵, 网 络 上 海 外 国 语 大 学 硕 士 学 位 论 文 论 文 题 目 从 偶 像 符 号 的 消 解 到 消 费 符 号 的 建 构 网 络 红 人 的 形 象 变 迁 研 究 学 科 专 业 传 播 学 届 别 2013 届 姓 名 孙 清 导 师 王 玲 宁 I 摘 要 互 联 网 的 勃 兴 为 草 根 阶 层 书 写 自 我 和 他 人 提 供 了 契 机, 通 过 网 络 自 由 开 放 的

More information

第二章 研究方法與目的

第二章 研究方法與目的 東 吳 大 學 法 學 院 法 律 學 系 碩 士 在 職 專 班 法 律 專 業 組 碩 士 論 文 財 稅 資 訊 提 供 義 務 之 探 討 The Obiligation Of Government To Provide The Tax Information 指 導 教 授 : 張 文 郁 博 士 研 究 生 : 梁 盈 潔 中 華 民 國 一 三 年 九 月 東 吳 大 學 法 學 院

More information

60 台 灣 社 會 學 第 九 期 From Chinese Original Domicile to Taiwanese Ethnicity: An Analysis of Census Category Transformation in Taiwan Fu-chang Wang Instit

60 台 灣 社 會 學 第 九 期 From Chinese Original Domicile to Taiwanese Ethnicity: An Analysis of Census Category Transformation in Taiwan Fu-chang Wang Instit 由 中國省籍 到 台灣族群 戶口普查籍別類屬轉變之分析 王甫昌 中央研究院社會學研究所 這篇論文有兩個目的 一是釐清台灣戶口普查中籍別類屬形成與 轉變的歷史 社會 與政治過程 二是定位籍別類屬在戰後台灣政治 與社會體制中的意義與角色 特別是它與當代台灣族群關係的關連 針對第一個目的 本文首先探究歷次戶口普查中 籍別項目的統計類 屬與統計方式之變化 除了將籍別類屬變化區分為四個階段之外 也 經由歷史材料分析

More information

穨6街舞對抗中正紀念堂_林伯勳張金鶚_.PDF

穨6街舞對抗中正紀念堂_林伯勳張金鶚_.PDF ( ) 115 115140 Journal of City and Planning(2002) Vol.29, No.1, pp.115140 90 10 26 91 05 20 2 3 --- ( ) 1. 2. mag.ryan@msa.hinet.net 3. jachang@nccu.edu.tw 1018-1067/02 2002 Chinese Institute of Urban

More information

3 Why would Chen risk ending the recent dance of détente between Taipei and Beijing a dance he has helped choreograph? Political analysts say Chen in

3 Why would Chen risk ending the recent dance of détente between Taipei and Beijing a dance he has helped choreograph? Political analysts say Chen in ) 1 8 3 http://www.president.gov.tw/php-bin/shownews.php4. 2. 2002 8 3 2002 7 21 91 7 22 20027 29 7 21 91 7 31 1 3 Why would Chen risk ending the recent dance of détente between Taipei and Beijing a dance

More information

前 言 一 場 交 換 學 生 的 夢, 夢 想 不 只 是 敢 夢, 而 是 也 要 敢 去 實 踐 為 期 一 年 的 交 換 學 生 生 涯, 說 長 不 長, 說 短 不 短 再 長 的 路, 一 步 步 也 能 走 完 ; 再 短 的 路, 不 踏 出 起 步 就 無 法 到 達 這 次

前 言 一 場 交 換 學 生 的 夢, 夢 想 不 只 是 敢 夢, 而 是 也 要 敢 去 實 踐 為 期 一 年 的 交 換 學 生 生 涯, 說 長 不 長, 說 短 不 短 再 長 的 路, 一 步 步 也 能 走 完 ; 再 短 的 路, 不 踏 出 起 步 就 無 法 到 達 這 次 壹 教 育 部 獎 助 國 內 大 學 校 院 選 送 優 秀 學 生 出 國 研 修 之 留 學 生 成 果 報 告 書 奧 地 利 約 翰 克 卜 勒 大 學 (JKU) 留 學 心 得 原 就 讀 學 校 / 科 系 / 年 級 : 長 榮 大 學 / 財 務 金 融 學 系 / 四 年 級 獲 獎 生 姓 名 : 賴 欣 怡 研 修 國 家 : 奧 地 利 研 修 學 校 : 約 翰 克 普

More information

附件1:

附件1: 附 件 1: 全 国 优 秀 教 育 硕 士 专 业 学 位 论 文 推 荐 表 单 位 名 称 : 西 南 大 学 论 文 题 目 填 表 日 期 :2014 年 4 月 30 日 数 学 小 组 合 作 学 习 的 课 堂 管 理 攻 硕 期 间 及 获 得 硕 士 学 位 后 一 年 内 获 得 与 硕 士 学 位 论 文 有 关 的 成 果 作 者 姓 名 论 文 答 辩 日 期 学 科 专

More information

目 次 論 漢 代 的 宴 飲 文 化... 韓 秀 利 1 北 宋 市 肆 飲 食 的 美 感 追 求 以 東 京 夢 華 錄 為 中 心 的 考 察... 劉 香 蘭 19 旅 行 社 資 訊 管 理 系 統 課 程 及 專 業 認 證 推 廣 可 行 性 之 研 究 以 醒 吾 技 術 學 院 觀 光 系 為 例... 丁 寧 李 菊 芬 39 我 國 國 內 線 航 空 公 司 競 合 賽

More information

摘 要 摘 要 隨 著 自 由 行 的 實 施, 越 來 越 多 的 內 地 旅 客 進 入 澳 門, 有 效 地 帶 動 了 澳 門 旅 遊 博 彩 酒 店 和 零 售 等 行 業 的 發 展 然 而, 伴 隨 旅 客 數 量 的 增 加, 旅 遊 糾 紛 也 層 出 不 窮, 這 無 疑 為 以

摘 要 摘 要 隨 著 自 由 行 的 實 施, 越 來 越 多 的 內 地 旅 客 進 入 澳 門, 有 效 地 帶 動 了 澳 門 旅 遊 博 彩 酒 店 和 零 售 等 行 業 的 發 展 然 而, 伴 隨 旅 客 數 量 的 增 加, 旅 遊 糾 紛 也 層 出 不 窮, 這 無 疑 為 以 題 目 : 隨 團 訪 澳 內 地 旅 客 與 澳 門 旅 遊 業 者 對 旅 遊 相 關 法 律 的 認 知 ---- 從 旅 遊 糾 紛 的 角 度 出 發 Title:Study on Cognition of Laws on Tourism Dispute between Package-tour Visitors from Mainland China and Local Tourist

More information

硕 士 学 位 论 文 论 文 题 目 : 北 岛 诗 歌 创 作 的 双 重 困 境 专 业 名 称 : 中 国 现 当 代 文 学 研 究 方 向 : 中 国 新 诗 研 究 论 文 作 者 : 奚 荣 荣 指 导 老 师 : 姜 玉 琴 2014 年 12 月

硕 士 学 位 论 文 论 文 题 目 : 北 岛 诗 歌 创 作 的 双 重 困 境 专 业 名 称 : 中 国 现 当 代 文 学 研 究 方 向 : 中 国 新 诗 研 究 论 文 作 者 : 奚 荣 荣 指 导 老 师 : 姜 玉 琴 2014 年 12 月 硕 士 学 位 论 文 论 文 题 目 : 北 岛 诗 歌 创 作 的 双 重 困 境 专 业 名 称 : 中 国 现 当 代 文 学 研 究 方 向 : 中 国 新 诗 研 究 论 文 作 者 : 奚 荣 荣 指 导 老 师 : 姜 玉 琴 2014 年 12 月 致 谢 文 学 是 我 们 人 类 宝 贵 的 精 神 财 富 两 年 半 的 硕 士 学 习 让 我 进 一 步 接 近 文 学,

More information

9 * B0-0 * 16ZD097 10 2018 5 3 11 117 2011 349 120 121 123 46 38-39 12 2018 5 23 92 939 536 2009 98 1844 13 1 25 926-927 3 304 305-306 1 23 95 14 2018 5 25 926-927 122 1 1 self-ownership 15 22 119 a b

More information

2011 2011 A B A 18 A 2006 2007 2008 2007 2007a 2007b 2007 2010 2010 2011 2009 2007 2011 23

2011 2011 A B A 18 A 2006 2007 2008 2007 2007a 2007b 2007 2010 2010 2011 2009 2007 2011 23 A 18 * A 18 A D035. 1 A 1674-2486 2015 02-0022 - 25 Bennett 1976 Cell 1977 Whyte 1974 * chennabo@ mail. sysu. edu / 12YJC840048 13YJA810002 985 22 2011 2011 A B A 18 A 2006 2007 2008 2007 2007a 2007b 2007

More information

WTO

WTO 10384 200015128 UDC Exploration on Design of CIB s Human Resources System in the New Stage (MBA) 2004 2004 2 3 2004 3 2 0 0 4 2 WTO Abstract Abstract With the rapid development of the high and new technique

More information

985 Journal of CUPL No.2 A Bimo nt hly Mar ch 2 0 1 0 ABSTRACTS Getting to the Root and Compromising China with the West: Rebuilding the Chinese Legal System 5 Yu Ronggen /Professor,

More information

,20,, ; ;,,,,,,,, 20 30,,,,,, ( 2000 ) ( 2002 ) ( ) ( ) ( ), ( ) :, ;:, ; 20 ( ) (181 ) 185

,20,, ; ;,,,,,,,, 20 30,,,,,, ( 2000 ) ( 2002 ) ( ) ( ) ( ), ( ) :, ;:, ; 20 ( ) (181 ) 185 20 (1900 1930) 20,,,,,, 20,,20, (,50 ),, 90, 184 ,20,, ; ;,,,,,,,, 20 30,,,,,, ( 2000 ) ( 2002 ) ( 2002 6 ) 20 20 40 ( 2002 4 ) ( 2000 2 ), ( 2002 4 ) :, 1995 2 ;:, 1997 3 ; 20 ( 2003 4 ) (181 ) 185 2004

More information

M M. 20

M M. 20 37 1 Vol. 37 No.1 2 0 1 6 1 TSINGHUA JOURNAL OF EDUCATION Jan. 2 0 1 6 4. 0 100872 1. 0 2. 0 3. 0 4. 0 4. 0 4. 0 G640 A 1001-4519 2016 01-0006 - 10 DOI 10. 14138 /j. 1001-4519. 2016. 01. 000610 11-12 18

More information

從詩歌的鑒賞談生命價值的建構

從詩歌的鑒賞談生命價值的建構 Viktor E. Frankl (logotherapy) (will-to-meaning) (creative values) Ture (Good) (Beauty) (experiential values) (attitudinal values) 1 2 (logotherapy) (biological) (2) (psychological) (3) (noölogical) (4)

More information

601988 2010 040 113001 2010 8 26 2010 8 12 2010 8 26 15 15 2010 15 0 0 15 0 0 6035 20022007 20012002 19992001 200720081974 1999 2010 20082008 2000 197

601988 2010 040 113001 2010 8 26 2010 8 12 2010 8 26 15 15 2010 15 0 0 15 0 0 6035 20022007 20012002 19992001 200720081974 1999 2010 20082008 2000 197 BANK OF CHINA LIMITED 3988 2010 8 26 ** ** *** # Alberto TOGNI # # # * # 1 601988 2010 040 113001 2010 8 26 2010 8 12 2010 8 26 15 15 2010 15 0 0 15 0 0 6035 20022007 20012002 19992001 200720081974 1999

More information

USPTO Academic research Corporate needs Global/International Inventors Libraries News Media/Publication Patent Attorney or Agent USPTO e (ebusiness Ce

USPTO Academic research Corporate needs Global/International Inventors Libraries News Media/Publication Patent Attorney or Agent USPTO e (ebusiness Ce I 2002.03.27 2 http://www.uspto.gov/ http://www.wipo.org/ http://ipdl.wipo.int/ esp@cenet http://www.european-patent-office.org/ http://ep.espacenet.com/ http://www.cpo.cn.net/ 3 4 USPTO USPTO First time

More information

東方設計學院文化創意設計研究所

東方設計學院文化創意設計研究所 東 方 設 計 學 院 文 化 創 意 設 計 研 究 所 碩 士 學 位 論 文 應 用 德 爾 菲 法 建 立 社 區 業 餘 油 畫 課 程 之 探 討 - 以 高 雄 市 湖 內 區 為 例 指 導 教 授 : 薛 淞 林 教 授 研 究 生 : 賴 秀 紅 中 華 民 國 一 o 四 年 一 月 東 方 設 計 學 院 文 化 創 意 設 計 研 究 所 碩 士 學 位 論 文 Graduate

More information

<4D F736F F D D3620B3AFB24DA8712DB747AFE0AC46A9B2BB50A4BDB0C8ADDBB27AA4A7B1B4B0512E646F63>

<4D F736F F D D3620B3AFB24DA8712DB747AFE0AC46A9B2BB50A4BDB0C8ADDBB27AA4A7B1B4B0512E646F63> 文 官 制 度 季 刊 第 一 期 民 98 年 1 月 頁 115-137 廉 能 政 府 與 公 務 倫 理 之 探 討 * 陳 清 秀 摘 要 馬 總 統 在 就 職 演 說 明 確 宣 示, 新 政 府 重 要 任 務 之 一 就 是 要 樹 立 廉 能 政 治 的 新 典 範, 新 政 府 上 台 後, 廉 能 亦 為 行 政 院 施 政 方 針 之 一, 人 事 行 政 局 本 於 行

More information

: : : : : ISBN / C53:H : 19.50

: : : : : ISBN / C53:H : 19.50 : : : : 2002 1 1 2002 1 1 : ISBN 7-224-06364-9 / C53:H059-53 : 19.50 50,,,,,,, ; 50,,,,,,,, 1 ,,,,,,,,,,,,,, ;,,,,,,,,, 2 ,,,, 2002 8 3 ( 1 ) ( 1 ) Deduction One Way of Deriving the Meaning of U nfamiliar

More information

Microsoft Word - bxyj2007_01_zongdi225.doc

Microsoft Word - bxyj2007_01_zongdi225.doc 以 科 学 发 展 观 为 统 领 深 入 贯 彻 落 实 国 务 院 23 号 文 件 全 面 提 高 保 险 业 服 务 社 会 主 义 和 谐 社 会 的 能 力 吴 定 富 ( 中 国 保 险 监 督 管 理 委 员 会, 北 京 100032) [ 摘 要 ]2006 年, 我 国 保 险 业 社 会 地 位 稳 步 提 高, 国 际 影 响 力 不 断 扩 大, 发 展 环 境 日 益

More information

Abstract Today, the structures of domestic bus industry have been changed greatly. Many manufacturers enter into the field because of its lower thresh

Abstract Today, the structures of domestic bus industry have been changed greatly. Many manufacturers enter into the field because of its lower thresh SWOT 5 Abstract Today, the structures of domestic bus industry have been changed greatly. Many manufacturers enter into the field because of its lower threshold. All of these lead to aggravate drastically

More information

曹美秀.pdf

曹美秀.pdf 2006 3 219 256 (1858-1927) (1846-1894) 1 2 3 1 1988 70 2 1998 51 3 5 1991 12 37-219- 4 5 6 7 8 9 10 11 12 13 14 15 4 1998 5 1998 6 1988 7 1994 8 1995 725-732 9 1987 170 10 52 11 1994 121 12 2000 51 13

More information

Prasenjit Duara 3 nation state Northwestern Journal of Ethnology 4 1. A C M J M M

Prasenjit Duara 3 nation state Northwestern Journal of Ethnology 4 1. A C M J M M N.W.J.E 1001-5558 2012 02-0115-14 C95 A 1945 N. W. Journal of Ethnology 2012 2 73 2012.No.2 Total No.73 1 2 56 Prasenjit Duara 3 nation state Northwestern Journal of Ethnology 4 1. A C 1945. 2 1905. M.

More information

Paperless Printer, Job 17

Paperless Printer, Job 17 論 宗 教 容 忍 與 言 論 自 由 1 論 宗 教 容 忍 與 言 論 自 由 李 瑞 全 摘 要 : 宗 教 指 引 人 生 往 上 往 超 越 與 神 聖 價 值 的 追 求, 以 解 脫 人 生 之 有 限 和 各 種 的 苦 難, 提 升 生 命 的 價 值 與 在 有 限 中 取 得 無 限 的 價 值 自 由 是 人 類 生 命 中 不 可 被 剝 奪 的 條 件, 也 是 使 人

More information

虛與實:新世紀的博物館展示趨勢

虛與實:新世紀的博物館展示趨勢 81 82 83 (Muséum National d Histoire Naturelle) 84 LED (Grand Gallery at the National Museum of Natural History) 1793 1884 1 1995 1 2 (Troppen- 85 86 museum) 3 (Maritiem Museum Rotterdam) 4 (Guggenheim

More information

Newcomer-Thesis

Newcomer-Thesis Chinese Travel Agencies & The Internet Age: An Analysis of the Adoption of Internet Tourism in Chengdu, China Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Arts in

More information

D A

D A 2015 4 D822.333 A 0452 8832 2015 4 0014-12 14 The Second ASEAN Regional Forum: The ASEAN Regional Forum, A Concept Paper, in ASEAN Regional Forum Documents Series 1994-2006, ASEAN Secretariat, Jakarta,

More information

TLLFDEC2013.indd

TLLFDEC2013.indd GOOD PEOPLE MANAGEMENT AWARD 2 學教卓越 行政長官卓越教學獎 2010 / 2011 本校重視學生全人發展 致力提供具專業的教學環 6. 通識科的閱讀課藉報章及時事影片與同學進行課堂討 境 營造純樸良好的校風 建立優良的班級文化 積極提 論 提升學生的批判思考及高階思維能力 並藉不同形 升教學效能 善用資源為學生提供分組教學及各種增潤課 程 並成功為學生創造多元化的成功學習經驗

More information

BIBLID 0254-4466(2001)19:1 pp. 249-276 19 1 90 6 ** * ** 88 I 2000 8 249 250 19 1 251 1873-1929 1900 1 1902 1 35 1900 1960 7-12 252 19 1 2 3 2 1900 1902 3 2000 129-197 253 4 5 6 4 1902 1962 103 5 Joseph

More information

2005 3,, :,,,, (),,,,, [],,,,,,,,,,, (),, (,, ),,,,,,,,,,,,,,,,,,,,,,,,,( ),, :,,, :,?,,, :,1999,

2005 3,, :,,,, (),,,,, [],,,,,,,,,,, (),, (,, ),,,,,,,,,,,,,,,,,,,,,,,,,( ),, :,,, :,?,,, :,1999, (), 70,,,,,, :,31, 1555,;18,,, ;,, (1895),, 1 2005 3,, :,,,, (),,,,, [],,,,,,,,,,, (),, (,, ),,,,,,,,,,,,,,,,,,,,,,,,,( ),, :,,, :,?,,, :,1999,24 25 2 (),,,,,,, 1970,,,,,, ;,; :,,?? 1988,,, 1987 1990,,,

More information

A-錢穆宗教觀-171

A-錢穆宗教觀-171 台 南 應 用 科 大 學 報 第 32 期 人 文 管 理 類 頁 171-186 中 華 民 國 102 年 10 月 錢 穆 宗 教 觀 析 論 以 文 化 與 教 育 為 觀 察 核 心 梁 淑 芳 國 立 體 育 大 學 通 識 教 育 中 心 助 理 教 授 摘 要 國 學 大 師 錢 穆, 可 謂 一 代 通 儒 本 文 以 其 文 化 與 教 育 為 主, 輔 以 錢 穆 的 其 餘

More information

Microsoft Word - 11月電子報1130.doc

Microsoft Word - 11月電子報1130.doc 發 行 人 : 楊 進 成 出 刊 日 期 2008 年 12 月 1 日, 第 38 期 第 1 頁 / 共 16 頁 封 面 圖 話 來 來 來, 來 葳 格 ; 玩 玩 玩, 玩 數 學 在 11 月 17 到 21 日 這 5 天 裡 每 天 一 個 題 目, 孩 子 們 依 據 不 同 年 段, 尋 找 屬 於 自 己 的 解 答, 這 些 數 學 題 目 和 校 園 情 境 緊 緊 結

More information

目 錄 實 施 計 畫 1 專 題 演 講 因 應 十 二 年 國 民 基 本 教 育 課 程 綱 要 學 校 本 位 課 程 的 整 體 布 局 A-1 推 動 十 二 年 國 民 基 本 教 育 課 程 綱 要 相 關 配 套 措 施 A-10 分 組 研 討 法 規 研 修 B-1 課 程 教

目 錄 實 施 計 畫 1 專 題 演 講 因 應 十 二 年 國 民 基 本 教 育 課 程 綱 要 學 校 本 位 課 程 的 整 體 布 局 A-1 推 動 十 二 年 國 民 基 本 教 育 課 程 綱 要 相 關 配 套 措 施 A-10 分 組 研 討 法 規 研 修 B-1 課 程 教 高 級 中 等 學 校 學 科 中 心 105 年 度 研 討 會 會 議 手 冊 時 間 :105 年 5 月 18-19 日 地 點 : 明 湖 水 漾 會 館 ( 苗 栗 縣 頭 屋 鄉 ) 指 導 單 位 : 教 育 部 國 民 及 學 前 教 育 署 主 辦 單 位 : 普 通 型 高 級 中 等 學 校 課 程 推 動 工 作 圈 ( 國 立 宜 蘭 高 級 中 學 ) 協 辦 單 位

More information

P

P 100871 I0-03 A 1671-7511 2011 04-0072 - 11 6 18 1 2 3 4 2010-01 - 04 1 2 3 4 72 1 20 2 1 P309 310 1 2 73 1 3 2 1933 1 2 3 74 13 1976 7 2 1 2 P281 1929 1930 1935 1937 1948 1 2 1933 3 25 11 1998 5 ~ 1999

More information

A Study on the Relationships of the Co-construction Contract A Study on the Relationships of the Co-Construction Contract ( ) ABSTRACT Co-constructio in the real estate development, holds the quite

More information

國 立 新 竹 教 育 大 學 音 樂 學 系 音 樂 教 學 碩 士 班 學 位 論 文 新 瓦 屋 客 家 花 鼓 之 研 究 A Research on Hsin-Wa-Wu Hakka Flower-Drum 研 究 生 : 陳 怡 妃 指 導 教 授 : 明 立 國 中 華 民 國 九 十 八 年 三 月 本 論 文 獲 行 政 院 文 化 建 設 委 員 會 文 化 資 產 總 管 理

More information

: ( ),,,,, 1958,,, , 263, 231, ,,,,,,, 4, 51, 5, 46, 1950, :,, 839, 3711, ( ) ( ) 20 ( ),, 56, 2, 17, 2, 8, 1,,,,, :,,,, ;,,,,

: ( ),,,,, 1958,,, , 263, 231, ,,,,,,, 4, 51, 5, 46, 1950, :,, 839, 3711, ( ) ( ) 20 ( ),, 56, 2, 17, 2, 8, 1,,,,, :,,,, ;,,,, : (1950 1955) 1950,,,,,,, 1949, ( 200433) 10,,, 1950,,,,,,, : 1950,,,,,,??,,,,,,,,,,, :,,, 1991, 1, 3 178 : (1950 1955),,,,, 1958,,, 1950 1955, 263, 231, 32 1950,,,,,,, 4, 51, 5, 46, 1950, :,, 839, 3711,

More information

考試學刊第10期-內文.indd

考試學刊第10期-內文.indd misconception 101 Misconceptions and Test-Questions of Earth Science in Senior High School Chun-Ping Weng College Entrance Examination Center Abstract Earth Science is a subject highly related to everyday

More information

01 招 生 简 章 03 考 试 说 明 04 笔 试 样 题 2 emba.pbcsf.tsinghua.edu.cn

01 招 生 简 章 03 考 试 说 明 04 笔 试 样 题 2 emba.pbcsf.tsinghua.edu.cn 01 招 生 简 章 03 考 试 说 明 04 笔 试 样 题 2 emba.pbcsf.tsinghua.edu.cn 清 华 五 道 口 金 融 EMBA 招 生 简 章 金 融 EMBA 教 育 中 心 2012 年, 为 加 快 现 代 金 融 学 科 建 设, 培 养 高 端 金 融 人 才, 促 进 金 融 界 与 金 融 教 育 界 的 联 系, 提 高 金 融 研 究 水 平, 推

More information

Microsoft Word doc

Microsoft Word doc 中 考 英 语 科 考 试 标 准 及 试 卷 结 构 技 术 指 标 构 想 1 王 后 雄 童 祥 林 ( 华 中 师 范 大 学 考 试 研 究 院, 武 汉,430079, 湖 北 ) 提 要 : 本 文 从 结 构 模 式 内 容 要 素 能 力 要 素 题 型 要 素 难 度 要 素 分 数 要 素 时 限 要 素 等 方 面 细 致 分 析 了 中 考 英 语 科 试 卷 结 构 的

More information

Microsoft Word - 01馮樹勳三校.doc

Microsoft Word - 01馮樹勳三校.doc 國 文 學 報 第 五 十 五 期 2014 年 6 月 頁 1~34 臺 北 : 國 立 臺 灣 師 範 大 學 國 文 學 系 I S S N : 1 0 1 9-6 7 0 6 DOI:10.6239/BOC.201406.01 馮 樹 勳 ( 收 稿 日 期 :102 年 8 月 16 日 ; 接 受 刊 登 日 期 :103 年 4 月 28 日 ) 提 要 鹽 鐵 論 文 本 真 實 地

More information

Microsoft Word - ChineseSATII .doc

Microsoft Word - ChineseSATII .doc 中 文 SAT II 冯 瑶 一 什 么 是 SAT II 中 文 (SAT Subject Test in Chinese with Listening)? SAT Subject Test 是 美 国 大 学 理 事 会 (College Board) 为 美 国 高 中 生 举 办 的 全 国 性 专 科 标 准 测 试 考 生 的 成 绩 是 美 国 大 学 录 取 新 生 的 重 要 依

More information

國立中山大學學位論文典藏

國立中山大學學位論文典藏 i Examinations have long been adopting for the selection of the public officials and become an essential tradition in our country. For centuries, the examination system, incorporated with fairness, has

More information

诚 实 守 信 公 平 交 易 好 的 伦 理 为 经 营 之 道 我 们 的 价 值 观 我 们 的 日 常 工 作 让 客 户 和 消 费 者 展 露 微 笑 我 们 关 注 员 工 产 品 和 业 务 的 不 断 改 善 和 进 步 我 们 珍 视 我 能 做 到 的 态 度 和 精 神, 尝

诚 实 守 信 公 平 交 易 好 的 伦 理 为 经 营 之 道 我 们 的 价 值 观 我 们 的 日 常 工 作 让 客 户 和 消 费 者 展 露 微 笑 我 们 关 注 员 工 产 品 和 业 务 的 不 断 改 善 和 进 步 我 们 珍 视 我 能 做 到 的 态 度 和 精 神, 尝 行 为 准 则 我 们 的 指 路 明 灯 诚 实 守 信 公 平 交 易 好 的 伦 理 为 经 营 之 道 我 们 的 价 值 观 我 们 的 日 常 工 作 让 客 户 和 消 费 者 展 露 微 笑 我 们 关 注 员 工 产 品 和 业 务 的 不 断 改 善 和 进 步 我 们 珍 视 我 能 做 到 的 态 度 和 精 神, 尝 试 但 未 成 功 是 值 得 鼓 励 的, 而 退 缩

More information

厦 门 大 学 学 位 论 文 原 创 性 声 明 本 人 呈 交 的 学 位 论 文 是 本 人 在 导 师 指 导 下, 独 立 完 成 的 研 究 成 果 本 人 在 论 文 写 作 中 参 考 其 他 个 人 或 集 体 已 经 发 表 的 研 究 成 果, 均 在 文 中 以 适 当 方

厦 门 大 学 学 位 论 文 原 创 性 声 明 本 人 呈 交 的 学 位 论 文 是 本 人 在 导 师 指 导 下, 独 立 完 成 的 研 究 成 果 本 人 在 论 文 写 作 中 参 考 其 他 个 人 或 集 体 已 经 发 表 的 研 究 成 果, 均 在 文 中 以 适 当 方 学 校 编 码 :10384 分 类 号 密 级 学 号 : UDC 硕 士 学 位 论 文 浙 江 省 人 事 考 试 突 发 事 件 应 对 策 略 探 析 An Exploration of Zhejiang Province Personnel Examination Emergency Strategy 姜 海 峰 指 导 教 师 姓 名 : 王 玉 琼 教 授 专 业 名 称 : 公 共

More information

202 The Sending Back of The Japanese People in Taiwan in The Beginning Years After the World War II Abstract Su-ying Ou* In August 1945, Japan lost th

202 The Sending Back of The Japanese People in Taiwan in The Beginning Years After the World War II Abstract Su-ying Ou* In August 1945, Japan lost th 201 1945 8 1945 202 The Sending Back of The Japanese People in Taiwan in The Beginning Years After the World War II Abstract Su-ying Ou* In August 1945, Japan lost the war and had to retreat from Taiwan.

More information

untitled

untitled 20 90 1998 2001 1 Abstract Under the environment of drastic competitive market, risk and uncertainty that the enterprise faces are greater and greater, the profit ability of enterprise assets rises and

More information

14-2-人文封面

14-2-人文封面 107 14 2 99-116 2013 11 10 2015 3 2015 100 2015 95 7 1 2015 Constitutionalism 1998 1 Lane, 1996, p. 50 1 2010 37-68 2013 117 2 3 1 2 2015 49-51 3 101 2007 2014 2011 2014 39-45 8 7 Linz 2000, p. 70, 94-95

More information

台 灣 人 權 學 刊 第 三 卷 第 三 期 他 還 接 受 教 育 部 的 委 託, 長 年 擔 任 中 央 層 級 的 人 權 教 育 輔 善 團 的 指 導 教 授, 至 今 已 有 多 年 我 雖 然 不 是 很 了 解 為 什 麼 他 可 以 一 邊 承 擔 教 育 部 賦 予 的 任

台 灣 人 權 學 刊 第 三 卷 第 三 期 他 還 接 受 教 育 部 的 委 託, 長 年 擔 任 中 央 層 級 的 人 權 教 育 輔 善 團 的 指 導 教 授, 至 今 已 有 多 年 我 雖 然 不 是 很 了 解 為 什 麼 他 可 以 一 邊 承 擔 教 育 部 賦 予 的 任 人權教育在台灣的推動及其進取之道 但昭偉 台北市立大學教育系教授 摘要 2016 年台灣的大選結果 素來對人權倡議有較多同情的民主進步黨取得政權 假如這曾提出以人權立國的政黨重新要來推動人權教育 並期許以人權政策和 國際社會接軌 他們在人權教育的推動上究竟應該採取什麼樣的作為才會最有 效 在這篇論文中 本文作者先交待從 2000 年到 2015 年當中兩個執政黨在人 權教育上的作為 在交待過程中 作者從教育理論和實踐工作者的觀點來評述

More information

東莞工商總會劉百樂中學

東莞工商總會劉百樂中學 /2015/ 頁 (2015 年 版 ) 目 錄 : 中 文 1 English Language 2-3 數 學 4-5 通 識 教 育 6 物 理 7 化 學 8 生 物 9 組 合 科 學 ( 化 學 ) 10 組 合 科 學 ( 生 物 ) 11 企 業 會 計 及 財 務 概 論 12 中 國 歷 史 13 歷 史 14 地 理 15 經 濟 16 資 訊 及 通 訊 科 技 17 視 覺

More information

<4D6963726F736F667420576F7264202D205F4230365FB942A5CEA668B443C5E9BB73A740B5D8A4E5B8C9A552B1D0A7F75FA6BFB1A4ACFC2E646F63>

<4D6963726F736F667420576F7264202D205F4230365FB942A5CEA668B443C5E9BB73A740B5D8A4E5B8C9A552B1D0A7F75FA6BFB1A4ACFC2E646F63> 運 用 多 媒 體 製 作 華 文 補 充 教 材 江 惜 美 銘 傳 大 學 應 用 中 文 系 chm248@gmail.com 摘 要 : 本 文 旨 在 探 究 如 何 運 用 多 媒 體, 結 合 文 字 聲 音 圖 畫, 製 作 華 文 補 充 教 材 當 我 們 在 進 行 華 文 教 學 時, 往 往 必 須 透 過 教 案 設 計, 並 製 作 補 充 教 材, 方 能 使 教 學

More information

Shanghai International Studies University MANAGEMENT CONTRACT MODEL IN CHINESE HOTEL BASED ON ANALYSIS OF H GROUP'S HOTEL BUSINESS A Thesis Submitted

Shanghai International Studies University MANAGEMENT CONTRACT MODEL IN CHINESE HOTEL BASED ON ANALYSIS OF H GROUP'S HOTEL BUSINESS A Thesis Submitted 上 海 外 国 语 大 学 工 商 管 理 硕 士 学 位 论 文 从 业 主 角 度 看 我 国 酒 店 委 托 管 理 模 式 基 于 H 集 团 酒 店 业 务 的 案 例 研 究 学 科 专 业 : 工 商 管 理 硕 士 (MBA) 作 者 姓 名 : 胡 长 征 指 导 教 师 : 苏 宗 伟 答 辩 日 期 :2013 年 5 月 日 上 海 外 国 语 大 学 二 一 三 年 六 月

More information

093_114_Koh_khee_heong

093_114_Koh_khee_heong !"#$%!"#$%&'()*+,-.!"#$%&'!"#$%&'()1389 1464!"#$%&'()*+,-./01!"#$% &'()*+,!-.(/0123456789!"#$%&'()*+,-./01234567*8+,79:;!"#$%&'()*+,-./0/123(456789:;

More information

<4D6963726F736F667420576F7264202D20D0ECB7C9D4C6A3A8C5C5B0E6A3A92E646F63>

<4D6963726F736F667420576F7264202D20D0ECB7C9D4C6A3A8C5C5B0E6A3A92E646F63> 硕 士 专 业 学 位 论 文 论 文 题 目 性 灵 文 学 思 想 与 高 中 作 文 教 学 研 究 生 姓 名 指 导 教 师 姓 名 专 业 名 称 徐 飞 云 卞 兆 明 教 育 硕 士 研 究 方 向 学 科 教 学 ( 语 文 ) 论 文 提 交 日 期 2012 年 9 月 性 灵 文 学 思 想 与 高 中 作 文 教 学 中 文 摘 要 性 灵 文 学 思 想 与 高 中 作

More information

 

  二 六 年 十 二 月 第 三 十 八 期 專 題 論 文 宋 朝 士 大 夫 的 仁 義 觀 為 紀 念 文 天 祥 誕 辰 七 百 七 十 週 年 而 作 王 德 毅 1 明 代 燒 荒 考 兼 論 其 生 態 影 響 邱 仲 麟 25 試 論 黃 宗 羲 政 治 思 想 的 歷 史 意 義 中 西 公 私 觀 演 變 的 一 個 比 較 王 遠 義 65 職 分 與 制 度 錢 賓 四 與 中

More information

Microsoft Word - CMRO120114 ??????????????? Luxiaoyan

Microsoft Word - CMRO120114 ??????????????? Luxiaoyan 传 播 视 角 下 的 网 络 游 戏 新 媒 体 研 究 * 卢 小 雁 李 文 静 ( 浙 江 大 学 ) 内 容 摘 要 : 如 今, 随 着 科 技 的 发 展, 网 络 新 媒 体 的 发 展 如 日 中 天 媒 介 娱 乐 化 给 网 络 游 戏 产 业 的 不 断 发 展 壮 大 带 来 巨 大 市 场 和 受 众, 其 形 成 的 虚 拟 世 界 也 非 常 大 地 改 变 人 类

More information

<4D6963726F736F667420576F7264202D2031322D312DC2B2B4C2AB47A16DC5AAAED1B0F3B5AAB0DDA144A7B5B867A16EB2A4B1B4A277A548AED1A4A4BEC7A5CDB0DDC344ACB0A8D2>

<4D6963726F736F667420576F7264202D2031322D312DC2B2B4C2AB47A16DC5AAAED1B0F3B5AAB0DDA144A7B5B867A16EB2A4B1B4A277A548AED1A4A4BEC7A5CDB0DDC344ACB0A8D2> 弘 光 人 文 社 會 學 報 第 12 期 簡 朝 亮 讀 書 堂 答 問. 孝 經 略 探 以 書 中 學 生 問 題 為 例 趙 詠 寬 彰 化 師 範 大 學 國 文 學 系 博 士 班 研 究 生 摘 要 孝 經 是 十 三 經 中 字 數 最 少 的 經 典, 然 實 踐 性 高, 受 歷 來 帝 王 重 視 但 在 清 末 民 初, 傳 統 思 維 受 到 挑 戰, 被 視 為 維 護

More information

59-81

59-81 BIBLID 0254-4466(2001)19:2 pp. 59-81 19 2 90 12 * 59 60 19 2 1498-1583 6 1572 12 27 1525-1582 1572-1620 1368-1398 1426-1435 1450-1456 1610-1695 15 1538-1588 1535-1608 61 1 1503-1583 1516-1591 1472-1528

More information

第一章 緒論

第一章  緒論 歩 1 See Donold E. Nuechterlein, United States National Interests World (Kentucky: The University Press of Kentucky, 1973), 172. 2 1992 6 178 3 5 9 1991 1 4-7 25 4 2001 12 27-8 5 2000 5 205 6 5 9 1991 1

More information

南華大學數位論文

南華大學數位論文 I II Abstract This study aims at understanding and analysing the general situation and predicament of current educational development in Savigi tribe and probing the roles played by the school, the family

More information

政治哲學要跨出去!

政治哲學要跨出去! 日 本 規 範 非 營 利 組 織 的 法 制 改 革 之 研 究 71 日 本 規 範 非 營 利 組 織 的 法 制 改 革 之 研 究 林 淑 馨 摘 要 一 前 言 二 日 本 非 營 利 組 織 的 意 涵 與 範 疇 三 日 本 非 營 利 組 織 的 發 展 與 法 規 制 訂 的 經 過 四 特 定 非 營 利 活 動 促 進 法 的 內 容 及 意 義 之 析 評 五 日 本 非

More information