Search results for 'Court records Access control' (try it on Scholar)

1000+ found
Sort by:
  1. Karen Eltis (2012). Courts, Litigants and the Digital Age: Law, Ethics and Practice. Irwin Law.score: 420.0
     
    My bibliography  
     
    Export citation  
  2. Randi Burnstine (2000). Evidence: Supreme Court of Georgia Denies Law Firm Access to Hospital Records. Journal of Law, Medicine and Ethics 28 (3):314-315.score: 243.0
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  3. Steve Barker, Guido Boella, Dov M. Gabbay & Valerio Genovese (2009). A Meta-Model of Access Control in a Fibred Security Language. Studia Logica 92 (3):437 - 477.score: 162.0
    The issue of representing access control requirements continues to demand significant attention. The focus of researchers has traditionally been on developing particular access control models and policy specification languages for particular applications. However, this approach has resulted in an unnecessary surfeit of models and languages. In contrast, we describe a general access control model and a logic-based specification language from which both existing and novel access control models may be derived as particular (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  4. Eugenia L. Siegler & Andrew B. Cohen (2011). Conflicts Over Control and Use of Medical Records at the New York Hospital Before the Standardization Movement. Journal of Law, Medicine and Ethics 39 (4):640-648.score: 126.0
    Historians of medicine generally credit the hospital standardization movement of the early 20th century with establishing the record as a sign of hospital and staff quality. The medical record's role had already been the subject of intense interest at the New York Hospital several decades before, however. In the 1880s malpractice and insurance concerns caused the administration to attempt to supervise record creation, quality, and access, over the objections of physicians. Contemporary concerns about the uses of the medical record (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  5. Timothy Morton (2011). Objects as Temporary Autonomous Zones. Continent 1 (3):149-155.score: 118.0
    continent. 1.3 (2011): 149-155. The world is teeming. Anything can happen. John Cage, “Silence” 1 Autonomy means that although something is part of something else, or related to it in some way, it has its own “law” or “tendency” (Greek, nomos ). In their book on life sciences, Medawar and Medawar state, “Organs and tissues…are composed of cells which…have a high measure of autonomy.”2 Autonomy also has ethical and political valences. De Grazia writes, “In Kant's enormously influential moral philosophy, autonomy (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  6. Guido Boella Steve Barker, M. Gabbay Dov & Valerio Genovese (2009). A Meta-Model of Access Control in a Fibred Security Language. Studia Logica 92 (3).score: 108.0
    The issue of representing access control requirements continues to demand significant attention. The focus of researchers has traditionally been on developing particular access control models and policy specification languages for particular applications. However, this approach has resulted in an unnecessary surfeit of models and languages. In contrast, we describe a general access control model and a logic-based specification language from which both existing and novel access control models may be derived as particular (...)
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  7. Beverly Woodward (2001). Confidentiality, Consent and Autonomy in the Physician-Patient Relationship. Health Care Analysis 9 (3):337-351.score: 103.5
    In the practice of medicine there has long been a conflict between patient management and respect for patient autonomy. In recent years this conflict has taken on a new form as patient management has increasingly been shifted from physicians to insurers, employers, and health care bureaucracies. The consequence has been a diminshment of both physician and patient autonomy and a parallel diminishment of medical record confidentiality. Although the new managers pay lip service to the rights of patients to confidentiality of (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  8. Laurent Bussard, Anna Nano & Ulrich Pinsdorf (2009). Delegation of Access Rights in Multi-Domain Service Compositions. Identity in the Information Society 2 (2):137-154.score: 99.0
    Today, it becomes more and more common to combine services from different providers into one application. Service composition is however difficult and cumbersome when there is no common trust anchor. Hence, delegation of access rights across trust domains will become essential in service composition scenarios. This article specifies abstract delegation, discusses theoretical aspects of the concept, and provides technical details of a validation implementation supporting a variety of access controls and associated delegation mechanisms. Abstract delegation allows to harmonize (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  9. David B. Resnik (2003). Strengthening the United States' Database Protection Laws: Balancing Public Access and Private Control. Science and Engineering Ethics 9 (3):301-318.score: 96.0
    This paper develops three arguments for increasing the strength of database protection under U.S. law. First, stronger protections would encourage private investment in database development, and private databases have many potential benefits for science and industry. Second, stronger protections would discourage extensive use of private licenses to protect databases and would allow for greater public control over database laws and policies. Third, stronger database protections in the U.S. would harmonize U.S. and E.U. laws and would thus enhance international trade, (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  10. Caroline Uyttendaele, Marie-Francine Moens & Jos Dumortier (1998). Salomon: Automatic Abstracting of Legal Cases for Effective Access to Court Decisions. [REVIEW] Artificial Intelligence and Law 6 (1):59-79.score: 96.0
    The SALOMON project is a contribution to the automatic processing of legal texts. Its aim is to automatically summarise Belgian criminal cases in order to improve access to the large number of existing and future cases. Therefore, techniques are developed for identifying and extracting relevant information from the cases. A broader application of these techniques could considerably simplify the work of the legal profession.A double methodology was used when developing SALOMON: the cases are processed by employing additional knowledge to (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  11. Cornelia Butler Flora (2001). Access and Control of Resources: Lessons From the Sanrem Crsp. [REVIEW] Agriculture and Human Values 18 (1):41-48.score: 96.0
    Attention to differences within communities is important in working toward sustainability of an agro-ecosystem. In the Sustainable Agriculture and Natural Resource Management Collaborative Research Support Program, gender made a difference in terms of access and control over key resources – financial, human, natural, and social capital – critical for project success. Efforts to build social capital among women proved critical in developing both collective and households strategies for sustainability. The sites differed greatly in both landscape and lifescape. Women's (...)
    No categories
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  12. R. S. Rosenberg (2001). Controlling Access to the Internet: The Role of Filtering. [REVIEW] Ethics and Information Technology 3 (1):35-54.score: 91.0
    Controlling access to the Internet by means of filtering softwarehas become a growth industry in the U.S. and elsewhere. Its usehas increased as the mandatory response to the current plagues ofsociety, namely, pornography, violence, hate, and in general,anything seen to be unpleasant or threatening. Also of potentialconcern is the possible limitation of access to Web sites thatdiscuss drugs, without distinguishing advocacy from scientificand informed analysis of addiction. With the rise of an effectivecreationist movement dedicated to the elimination of (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  13. Erik D. Reichle, Keith Rayner & Alexander Pollatsek (2003). The E-Z Reader Model of Eye-Movement Control in Reading: Comparisons to Other Models. Behavioral and Brain Sciences 26 (4):445-476.score: 90.0
    The E-Z Reader model (Reichle et al. 1998; 1999) provides a theoretical framework for understanding how word identification, visual processing, attention, and oculomotor control jointly determine when and where the eyes move during reading. In this article, we first review what is known about eye movements during reading. Then we provide an updated version of the model (E-Z Reader 7) and describe how it accounts for basic findings about eye movement control in reading. We then review several alternative (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  14. Lijana Štarienė (2010). Cudak V. Lithuania and the European Court of Human Rights Approach to the State Immunity Doctrine. Jurisprudence 120 (2):159-175.score: 90.0
    The application of the state immunity doctrine with regard to the guarantee of access to court in the case-law of the European Court of Human Rights has been proved to be a complicated issue. In the ECHR’s case-law before the case Cudak v. Lithuania, the application of the state immunity doctrine had been considered as a proportionate restriction of the right of access to court even in cases of the realization of the protection of the (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  15. Erin Gallagher-Cohoon (2013). “Illegal Loves and Sexual Deviancy: Homosexuality as a Threat in Cold War Canada”. Constellations 4 (2).score: 85.5
    This paper analyzes the criminalization and medicalization of homosexuality during the early twentieth century in Canada. Through court records and medical texts the discourse of homosexuality as a threat to the family unit and to the nation is contextualized within Cold War rhetoric. A Foucaultian conceptualization of power and discipline helps frame questions regarding homosexuality as a criminal offense and as a mental illness. It is argued that both state control and societal pressures constructed the homosexual as (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  16. LarsOlov Bygren, Gunnar Kaati & Sören Edvinsson (2001). Longevity Determined by Paternal Ancestors' Nutrition During Their Slow Growth Period. Acta Biotheoretica 49 (1).score: 81.0
    Social circumstances often impinge on later generations in a socio-economic manner, giving children an uneven start in life. Overfeeding and overeating might not be an exception. The pathways might be complex but one direct mechanism could be genomic imprinting and loss of imprinting. An intergenerational "feedforward" control loop has been proposed, that links grandparental nutrition with the grandchild's growth. The mechanism has been speculated to be a specific response, e.g. to their nutritional state, directly modifying the setting of the (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
  17. D. J. Kenny (1982). Confidentiality: The Confusion Continues. Journal of Medical Ethics 8 (1):9-11.score: 81.0
    The author, a regional health authority administrator, argues that `ownership' is a side issue in legal and moral arguments over confidentiality of medical records. Nor is it practicable, he argues, for doctors alone to control all access to the medical records. He proposes the principle of `custodianship' of confidential information, to be accepted by an institution as a whole, as a possible way of resolving the problem. In commentaries on this and the following article an academic (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  18. Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre (2009). Fibred Security Language. Studia Logica 92 (3):395-436.score: 81.0
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  19. C. Nixon (2001). Maternal Guardianship by “Nature” and “Nurture”: Eighteenth-Century Chancery Court Records and Clarissa. Intertexts 5 (2):128-155.score: 81.0
    No categories
     
    My bibliography  
     
    Export citation  
  20. Karen S. Peddle (2007). In the Name of the Father: The Elizabethan Response to Recusancy by Married Catholic Women, 1559–1586. [REVIEW] Feminist Legal Studies 15 (3):307-328.score: 81.0
    The extraction of a pecuniary penalty for the recusancy of married women was a heavily contested issue in the Parliament of Elizabeth. Under the rules of coverture, married women controlled no property. It was thus ineffective to fine them, for they were unable to pay the penalty. As a result, the government attempted to hold husbands responsible for the penalties of their wives through the use of recognizances under the auspices of the Commissions for Causes Ecclesiastical, a prerogative court. (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  21. Wei Sun, Da-xin Liu & Tong Wang (2006). International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-A Model of XML Access Control with Dual-Level Security Views. In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer-Verlag. 3842--799.score: 81.0
    No categories
     
    My bibliography  
     
    Export citation  
  22. David Barnard (2002). In the High Court of South Africa, Case No. 4138/98: The Global Politics of Access to Low-Cost AIDS Drugs in Poor Countries. [REVIEW] Kennedy Institute of Ethics Journal 12 (2):159-174.score: 78.0
    : In 1998, 39 pharmaceutical manufacturers sued the government of South Africa to prevent the implementation of a law designed to facilitate access to AIDS drugs at low cost. The companies accused South Africa, the country with the largest population of individuals living with HIV/AIDS in the world, of circumventing patent protections guaranteed by intellectual property rules that were included in the latest round of world trade agreements. The pharmaceutical companies dropped their lawsuit in the spring of 2001 after (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  23. D. J. Willison, C. Emerson, K. V. Szala-Meneok, E. Gibson, L. Schwartz, K. M. Weisbaum, F. Fournier, K. Brazil & M. D. Coughlin (2008). Access to Medical Records for Research Purposes: Varying Perceptions Across Research Ethics Boards. Journal of Medical Ethics 34 (4):308-314.score: 72.0
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  24. L. Abramsky (2001). Genetic Information: Acquisition, Access, and Control: Edited by Alison K Thompson and Ruth F Chadwick, New York, Kluwer Academic/Plenum Publishers, 1999, 348 Pages, $115 (Hc). [REVIEW] Journal of Medical Ethics 27 (3):213-a-214.score: 72.0
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  25. Holk Cruse & Malte Schilling (2013). How and to What End May Consciousness Contribute to Action? Attributing Properties of Consciousness to an Embodied, Minimally Cognitive Artificial Neural Network. Frontiers in Psychology 4.score: 72.0
    An artificial neural network called reaCog is described which is based on a decentralized, reactive and embodied architecture to control non-trivial hexapod walking in unpredictable environment (Walknet) as well as insect-like navigation (Navinet). In reaCog, these basic networks are extended in such a way that the complete system, reaCog, adopts the capability of inventing new behaviors and - via internal simulation - of planning ahead. This cognitive expansion enables the reactive system to be enriched with additional procedures. Here, we (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  26. Respecting Privacy (2010). This Essay Will Address the Practical Conflicts for Journalists, Their Employers, the Owners of News Organizations, and the Public Regarding Issues of Privacy in Reporting the News. Privacy Will Be Understood, Here, as Control Over Access to Oneself and to Certain Kinds of Information About Oneself. First, the Relevant Inter-Ests of the Public, Journalists, and News Organizations Will Be Discussed. Then, Building on Deni Elliott and David Ozar (Chap. 1 in This Volume), Ethical Principles Will Be ... [REVIEW] In Christopher Meyers (ed.), Journalism Ethics: A Philosophical Approach. Oxford University Press. 215.score: 72.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  27. William H. Allen (1993). The Rise of the Botanical Database Computerized Information Offers Increased Efficiency, Access to Unpublished Records, and New Ways of Asking Questions. Bioscience 43 (5):274-279.score: 72.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  28. George J. Annas, Daryl Matthews & Leonard H. Glantz (1980). Patient Access to Medical Records. Journal of Law, Medicine and Ethics 8 (2):17-18.score: 72.0
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  29. Wendy G. Lehnert (1986). Lexical Access and Discourse Planning: Bottom-Up Interference or Top-Down Control Troubles? Behavioral and Brain Sciences 9 (3):528.score: 72.0
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  30. S. M. Canick (1996). Indiana Court Rules on Prisoners' Access to OTC Drugs. Journal of Law, Medicine and Ethics: A Journal of the American Society of Law, Medicine & Ethics 24 (3):271.score: 72.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  31. Stanislaw Cebrat (2003). Genetic Information. Acquisition, Access, and Control. Edited by Alison K. Thompson & Ruth F. Chadwick. Pp. 348. (Kluwer Academic/Plenum Publishers, New York, 1999.) $115, ISBN 0-306-46052-1, Hardback. [REVIEW] Journal of Biosocial Science 35 (1):153-160.score: 72.0
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  32. Simon Clarke (2003). Paternalism and Access to Medical Records. Journal of Information Ethics 12 (1):80-91.score: 72.0
     
    My bibliography  
     
    Export citation  
  33. Sondra Norton Fraleigh (1995). Bodies in Control The Roots of Power: Animate Form and Gendered Bodies by Maxine Sheets-Johnstone (Chicago & LaSalle, IL: Open Court Publishing Company, 1994). Journal of the Philosophy of Sport 22 (1):135-142.score: 72.0
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  34. Ma Gernsbacher (1987). Mechanisms That Control Referential Access. Bulletin of the Psychonomic Society 25 (5):335-335.score: 72.0
    No categories
     
    My bibliography  
     
    Export citation  
  35. Werner Heermann, Rasa Ragulskytė-Markovienė & Indrė Žvaigždinienė (2013). Interim Measures in Administrative Proceedings: Specifics of Environmental Cases. Jurisprudence 20 (1):207-233.score: 72.0
    Interim measures are procedural means that allow persons or States to have their rights preserved when a case is pending. Application of these measures especially in environmental cases is very important. In many of these cases (e.g. cases dealing with territorial planning, IPPC permits, environmental impact assessment, etc.) the claims deal with the protection of environment or its components (water, air, soil, etc.) as well as with the protection of public interest. Legal regulation of application of interim measures provided by (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  36. Paul D. Mclean (2004). Widening Access While Tightening Control: Office-Holding, Marriages, and Elite Consolidation in Early Modern Poland. Theory and Society 33 (2):167-212.score: 72.0
    No categories
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  37. Bill McManus (1995). Patient Access to Medical Records in Australia in the Light of Breen V Williams. Monash Bioethics Review 14 (2):38.score: 72.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  38. David J. Phillips (2000). Regulation of Activin's Access to the Cell: Why is Mother Nature Such a Control Freak? Bioessays 22 (8):689-696.score: 72.0
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  39. D. S. Short (1988). Confidentiality and Patient-Access to Medical Records. Ethics and Medicine: A Christian Perspective on Issues in Bioethics 4 (2):26.score: 72.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  40. Alan F. Westin (1977). Medical Records: Should Patients Have Access? Hastings Center Report 7 (6):23-28.score: 72.0
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  41. Donald J. Willison, Claudia Emerson, Karen V. Szala-Meneok, Elaine Gibson, Lisa Schwartz, Karen M. Weisbaum, François Fournier, Kevin Brazil & Michael D. Coughlin (2008). Access to Medical Records for Research Purposes: Varying Perceptions Across Research Ethics Boards. Journal of Medical Ethics 34 (4):308-314.score: 72.0
    Direct download  
     
    My bibliography  
     
    Export citation  
  42. Jane Bailey & Ian Kerr (2007). Seizing Control?: The Experience Capture Experiments of Ringley & Mann. [REVIEW] Ethics and Information Technology 9 (2):129-139.score: 64.0
    Will the proliferation of devices that provide the continuous archival and retrieval of personal experiences (CARPE) improve control over, access to and the record of collective knowledge as Vannevar Bush once predicted with his futuristic memex? Or is it possible that their increasing ubiquity might pose fundamental risks to humanity, as Donald Norman contemplated in his investigation of an imaginary CARPE device he called the “Teddy”? Through an examination of the webcam experiment of Jenni Ringley and the EyeTap (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  43. Ayimut Kiros-Meles & Mathew M. Abang (2008). Farmers' Knowledge of Crop Diseases and Control Strategies in the Regional State of Tigrai, Northern Ethiopia: Implications for Farmer–Researcher Collaboration in Disease Management. [REVIEW] Agriculture and Human Values 25 (3):433-452.score: 64.0
    Differences in perceptions and knowledge of crop diseases constitute a major obstacle in farmer–researcher cooperation, which is necessary for sustainable disease management. Farmers’ perceptions and management of crop diseases in the northern Ethiopian Regional State of Tigrai were investigated in order to harness their knowledge in the participatory development of integrated disease management (IDM) strategies. Knowledge of disease etiology and epidemiology, cultivar resistance, and reasons for the cultivation of susceptible cultivars were investigated in a total of 12 tabias (towns) in (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  44. Stuart Oultram (2012). Reflecting on the 'Patient Record Access Proposals' in the UK Government's Planned NHS–Life Sciences Partnership. Research Ethics 8 (3):169-177.score: 63.0
    In this article I review the principal arguments in favour of and against the UK government’s recent proposals to allow access to NHS patient records to life sciences companies as part of the NHS–Life Sciences partnership scheme.
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  45. Declan Smithies (2011). Attention is Rational-Access Consciousness. In Christopher Mole, Declan Smithies & Wayne Wu (eds.), Attention: Philosophical and Psychological Essays. Oxford University Press. 247--273.score: 54.0
    This chapter argues that attention is a distinctive mode of consciousness, which plays an essential functional role in making information accessible for use in the rational control of thought and action. The main line of argument can be stated quite simply. Attention is what makes information fully accessible for use in the rational control of thought and action. But what makes information fully accessible for use in the rational control of thought and action is a distinctive mode (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  46. Willem J. M. Levelt, Ardi Roelofs & Antje S. Meyer (1999). A Theory of Lexical Access in Speech Production. Behavioral and Brain Sciences 22 (1):1-38.score: 54.0
    Preparing words in speech production is normally a fast and accurate process. We generate them two or three per second in fluent conversation; and overtly naming a clear picture of an object can easily be initiated within 600 msec after picture onset. The underlying process, however, is exceedingly complex. The theory reviewed in this target article analyzes this process as staged and feedforward. After a first stage of conceptual preparation, word generation proceeds through lexical selection, morphological and phonological encoding, phonetic (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  47. Rima Ažubalytė (2010). A Victim's Right to Access Justice (text only in Lithuanian). Jurisprudence 122 (4):221-244.score: 54.0
    The right of a person, who is a victim of a criminal act, to access justice (court) according to the criminal legal order, is analyzed in this article. The right to appeal to a court is analyzed as a constituent part of the principle of accessibility to legal defence. Pre-eminently, the general constitutional fundamentals of the right towards legal defence are estimated. The provisions of the jurisprudence of the Constitutional Court of Lithuania, i.e. that the right (...)
    Translate to English
    | Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  48. Daniel R. Block, Noel Chávez, Erika Allen & Dinah Ramirez (2012). Food Sovereignty, Urban Food Access, and Food Activism: Contemplating the Connections Through Examples From Chicago. [REVIEW] Agriculture and Human Values 29 (2):203-215.score: 54.0
    The idea of food sovereignty has its roots primarily in the response of small producers in developing countries to decreasing levels of control over land, production practices, and food access. While the concerns of urban Chicagoans struggling with low food access may seem far from these issues, the authors believe that the ideas associated with food sovereignty will lead to the construction of solutions to what is often called the “food desert” issue that serve and empower communities (...)
    No categories
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  49. Saulius Katuoka & Eglė Leonavičiūtė (2012). Goals of Concentration Control and the Main Legal Tests for the Evaluation of Concentrations. Jurisprudence 19 (2):605-624.score: 54.0
    The main goal of concentration control and basic legal tests applied worldwide for the evaluation of concentrations, such as “dominance”, “significant impediment of competition” and “substantial lessening of competition” are analysed in this article. Every control, whatever its nature, is implemented in order to reach certain goals. In the first part of this article we analyse the goals of concentration control in different jurisdictions – mostly in the European Union, the USA and Lithuania. Four basic market security (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  50. Pavelas Ravluševičius (2011). The Enforcement of the Primacy of the European Union Law: Legal Doctrine and Practice. Jurisprudence 18 (4):1369-1388.score: 54.0
    The main subject of the present research is the enforcement of the European Union law in the domestic legal order. This topic was chosen considering the Treaty of Lisbon amending the Treaty on the European Union and the Treaty establishing the European Community and especially its declaration No. 17 on primacy of EU law. This article will explain the meaning of primacy of the European Union law and the resulting problems in some EU Member States, as well as possible solutions (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
1 — 50 / 1000