
µç×Ó¿Õ¼ä(cyberspace)µÄ·¢Õ¹Óë¹æÖÆ(2002)
×÷ÕߣºÕÅÓÀΰ¡¡À´×Ô£º·¨ÂÉÇÅ¡¡Ê±¼ä£º2004-12-17 22:49:20 µã»÷£º
×¢£º
1.תÒý×Ô¹ù³ÏÖÒ£º¡¶µç×ÓÉÌÎñ·¢Õ¹ÓëÎÒ¹úµÄµç×ÓÉÌÎñ×ÜÌå¿ò¼Ü¡·£¨¶þ£©£¼http://www.eccn.net/lilun/£¾
2.Nada Alees Geha, A Journey into Cyberspace and Its Effect on the Right to Development, 8 Tul. J. Int'l & Comp. L. 391(2000).
3.John Perry Barlow, Declaration of the Independence of Cyberspace.
4.A Framework For Global Electronic Commerce
5.µäÐ͵ÄÂÛÊöÈç James Boyle, Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors, 66 U Cin L Rev 177, 178 (1997)£¬ÔÚ¸ÃÎÄÖУ¬×÷ÕßÐû³Æ£¬"³¤ÆÚÒÔÀ´£¬ÈÈÐÄÓÚ»¥ÁªÍøµÄÈËÃǼáÐÅ£º»¥ÁªÍø½«ÊÇÃâÓÚÕþ¸®¸ÉÔ¤Ö®Îï¡£"×öÎªÍøÂç×ÔÖÎģʽµÄ´ú±íÈËÎÔòÊǵç×ӿռ䷨ÂÉÑо¿Î¯Ô±»áÖ÷ϯDavid R. JohnsonºÍÃÀ¹úÇÇÖζشóѧµÄDavid Post½ÌÊÚ£¬ÔÚÏÂÃæÕâЩÎÄÕÂÖУ¬ËûÃǽ¨Á¢ÁËÍøÂç×ÔÖÎģʽµÄϵͳÀíÂÛ£º David Johnson and David Post, Law And Borders--The Rise of Law in Cyberspace, 48 Stan L Rev 1367,(1996)£». David Post and David R. Johnson, Borders, Spillovers, and Complexity: Rule-making Processes in Cyberspace (Apr 5, 1997) ; David Post and David R. Johnson, The New 'Civic Virtue' of the Internet £¨Feb 1998£©; David G. Post, Governing Cyberspace, 43 Wayne L Rev 155 (1996); David G. Post, Anarchy, State, and the Internet: An Essay on Law-Making in Cyberspace£¨1995£© ÓëÖ®³ÖÏàͬ»òÏà½ü¹ÛµãµÄ»¹ÓУº John T. Delacourt, The International Impact of Internet Regulation, 38 Harv Intl L J 207 (1997); John Parry Barlow, A Cyberspace Independence Declaration, 65 U. Chi. L. Rev. 1199£¨1997£©; Dan L. Burk, Federalism in Cyberspace, 28 Conn L Rev 1095 (1996); Joel R. Reidenberg, Governing Networks and Rule-making in Cyberspace, 45 Emory L J 911 (1996).µÈ£¬ÔÚÉÏÊöÕâЩѧÕߵIJÎÓëÏ£¬ÐγÉÁË·´¶ÔÕþ¸®¹ÜÀí»¥ÁªÍøµÄϵͳµÄ×ÔÖÎģʽÀíÂÛ¡£±ÊÕßÒÔ϶Ô×ÔÖÎģʽµÄ½éÉܺÍÅúÆÀ£¬Ã»ÓÐÌØÊâ˵Ã÷µÄ£¬¾ùÒý×ÔÉÏÊöÎÄÕ¡£
6.Llewellyn J. Gibbons, No Regulation, Government Regulation, or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 Cornell J.L. & Pub. Pol'y 475 (1997)
7.ͬע£´¡£
8.B.carpenter, Architectural principles of the Internet. Network Working Group document (1958), June 1996.
9.[Ó¢]µÙÄ·.²®ÄÉ˹£ÀîÖø£º¡¶±àÖ¯ÍòÎ¬Íø¡·£¬ÕÅÓîºêµÈÒ룬ÉϺ£ÒëÎijö°æÉ磱£¹£¹£¹Äê°æ£¬µÚ47Ò³¡£
10.Developments in the Law-The Law of Cyberspace, V: The Domain Name System: A Case Study of The Significance of Norms to Internet Governance, 112 Harv.L.Rev.1657, *1658.
11.ͬע£¸¡£
12.ͬע£¸¡£
13.±ÊÕßÔÚ´ËÓÿÆÑ§Ê·Ñ§¼ÒT£®S.¿â¶÷¹ØÓÚ¿ÆÑ§Ñо¿·¶Ê½µÄ¸ÅÄ¶Ô×ÔÖÎģʽÂÛÕßµÄÁ¢³¡½øÐÐÆÀ¼Û£º T£®S.¿â¶÷¹ØÓÚ·¶Ê½µÄ¸ÅÄîÖ¸"ÒÔÒ»ÖÖ»òÒ»ÖÖÒÔÉϹýÈ¥µÄ¿ÆÑ§³É¾ÍΪ¼áʵ»ù´¡µÄÑо¿£¬ÕâЩ³É¾Í±»Ä³Ð©Ìض¨µÄ¿ÆÑ§½çÈËÊ¿ÔÚÒ»¶¨Ê±ÆÚÀï³ÐÈÏÆäÌṩÁ˽øÒ»²½Êµ¼ùµÄ»ù´¡¡£" "Ò»ÏîÑо¿·¶Ê½¾ÍÊÇ¿ÆÑ§½çµÄÒ»¸öÊÀ½ç¹Û£¬ÒÔ¼°ËüµÄÒ»ÕûÌ×ÐÅÑöºÍ³Ðŵ¨D¨D¸ÅÄîµÄ¡¢ÀíÂ۵ġ¢·½·¨Â۵ġ¢Êֶεġ£·¶Ê½Ö¸µ¼¿ÆÑ§Ñ¡ÔñÎÊÌ⣬ÆÀ¼ÛÊý¾Ý¡¢ÒÔ¼°Ö÷ÕÅÀíÂÛ¡£" £¨Kuhn, Thomas S. The structure of Scientific Revolutions. 2d ed. Chicago: University of Chicago Press. P 10.£©
14.Mark Gould£¬Governance of the Internet: A UK Perspective-Paper for IIP workshop on coordination and Administration of the Internet (http://aranea.law.bris.ac.uk/)
15.¹ú¼Ê»¥ÁªÍø½«È«Çò¼¸°ÙÍǫ̀µçÄÔÖ÷»úÈçÖ©ÖëÍø°ãÁªÔÚÒ»Æð£»Ö÷»úÖ®¼ä»¥ÏàѰ·Ã¡¢½»»»ÐÅÏ¢£¬¶ø²»³ö´í£¬ÊÇÒòΪÿһ̨µçÄÔÖ÷»úÔÚ»¥ÁªÍøÖж¼ÓÐÒ»¸öÍøÂçµØÖ·£¬ÊõÓïΪIPµØÖ·£¨Internet Protocol£©¡£IPµØÖ·ÊÇÒ»×é¿ÝÔïÄѼǵÄÊý×Ö£¬ÀýÈ磺192.41.16.10¡£ÎªÁËʹIPµØÖ·ÈÝÒ×¼ÇÒ䣬µçÄÔÍøÂç¿ÆÑ§¼Ò¾Í·¢Ã÷ÁË"ÓòÃû"(Domain Name)µÄ·½·¨£¬½«Ã¿Ò»¸öµçÄÔÖ÷»úIPµØÖ·¶ÔÓ¦ÈÎÒâÒ»×éÓÐÒâÒåµÄÓ¢ÎÄ×Öĸ£¬ËüÈ·¶¨ÁËÎÒÃÇÒª·ÃÎÊÕ¾µãµÄÍøÖ·¡£ÓòÃû¶ÔÓÚÍøÂçÊÀ½çµÄÓÐÐò·Ç³£ÖØÒª£¬Ëü±»ÐÎÏóµÄ³ÆÖ®Îªµç×Ó¿Õ¼äµÄ"²»¶¯²ú"¡£
16.Internet Governance: Towards Voluntary Multilateralism, Keynote Address by Dr. Pekka Tarjanne, ITU Secretary-General
17.A. Michael Froomkin£¬Of Governments And Governance£¬14 Berkeley Tech. L.J. 619£¨Spring, 1999£©
18.ͬע£±£·¡£
19.ÔÚIPµØÖ·ºÍÓòÃû¹ÜÀíµÄ·Ö¹¤ÉÏ£¬ÃÀ¹ú¹ú¼Ò¿ÆÑ§Ñ§»á£¨National Science Foundation¼ò³ÆNSF£©Öƶ¨IPµØÖ·ºÍÓòÃûµÄ¼¼Êõ±ê×¼£»ÍøÂç·½°¸¹«Ë¾£¨Network Solutions, Inc£©¶ÔÈ«ÇòµçÄÔÖ÷»úIPµØÖ·ºÍÓòÃû·ÖÅäºÍ¹ÜÀí£»ÃÀ¹úµç»°µç±¨¹«Ë¾(AT&T) ÔòÌṩ³¬¼¶µçÄÔÊý¾Ý¿â£¬´¢´æÈ«ÇòµçÄÔÖ÷»úIPµØÖ·ºÍ¶ÔÓ¦µÄÓòÃû£»¹ú¼Ê»¥ÁªÍøÖÐÐÄ(InterNIC)Ôòͳ³ïÒÔÉÏÈý¸ö»ú¹¹µÄ¹ØÏµ£¬²¢¾ßÌ帺ÔðÈ«Çò»¥ÁªÍøµÚ¶þ²ãÓòÃûµÄ×¢²á¡£ÊÀ½çÉÏÈκÎÒ»²¿µçÄÔÖ÷»úÒªÁªÉÏInternet£¬Ê×ÏÈÒªÏòÍøÂç·½°¸¹«Ë¾ÉêÇëIPµØÖ·£¬È»ºóÏòInterNIC×¢²áÓòÃû£¬ÕⲿÖ÷»úµÄIPµØÖ·ºÍÓòÃû¾Í±»´æÈëAT&TµÄÊý¾Ý¿âÖУ¬¾ÍÔÚ¹ú¼Ê»¥ÁªÍøÖÐÕ¼ÁËÒ»¸öÍøµã¡£1996Äê11ÔÂ12ÈÕ£¬ÎªÁ˱£Ö¤ÓòÃûÕþ²ßµÄ¹«Õý¡¢¹«Æ½¡¢¹«¿ª£¬ÓÉInternetлᣨISOC£©¡¢»¥ÁªÍø·ÖÖ·»ú¹¹£¨IANA£©¡¢Internet¼Ü¹¹Î¯Ô±»á£¨IAB£©¡¢ÃÀ¹úÁª°îÍøÂçίԱ»á£¨FNC£©¡¢¹ú¼ÊͨѶÁªÃË£¨ITU£©¡¢¹ú¼ÊÉ̱êлᣨINTA£©¡¢ÒÔ¼°ÊÀ½ç֪ʶ²úȨ×éÖ¯£¨WIPO£©¹²Í¬·¢Æð²¢×éÖ¯ÁËÒ»¸ö»ú¹¹£¬³ÆÎª¹ú¼Ê»¥ÁªÍø·½°¸Î¯Ô±»á£¨IAHC£©,¸ºÔð¹ÜÀíInternet×î¸ßÓòÃû(TLD)¡£
ÓÉÓÚÓòÃû¹æÔòÖÆ¶¨»ú¹¹ºÍÕùÒé½â¾ö»ú¹¹»ù±¾ÉÏÔÚÃÀ¹ú£¬Ëü¶ÔµØ·½ÐÔÉ̱êÓëÓòÃûÖØºÏÎÊÌâ¡¢¿ç¹úÓòÃûÕùÒé½â¾öµÈ´øÀ´Á˲»±ã£¬¾¡¹ÜÔÚÃÀ¹úÕþ²ßµÄ³«µ¼Ï£¬¶Ô¶¥¼¶ÓòÃû·½°¸½øÐÐÁ˸ĸµ«Ð§¹û²¢²»Ã÷ÏÔ¡£
20.Ëùν×ÔȻ¢¶ÏÊǹæÄ£¾¼ÃÔì³ÉµÄÒ»ÖÖ×´¿ö£¬ËüʹµÃijһÐÐÒµÖ»ÓÐÔÚÒ»¸öÆóÒµÉú²úµÄʱºò²Å×îÓÐЧÂÊ¡£ÕâÔì³ÉÒÔϽá¹û£¬ÒªÃ´ÊÇÒ»¸öÒѾ´æÔڵĢ¶ÏÆóÒµ¶ÀÕ¼Êг¡£¬ÆäËûÆóÒµÄÑÒÔ½øÈ룻»òÕßÁ½¸öÒÔÉÏµÄÆóÒµ½øÈëÔì³É¸ºÀûÈó¡£µçÐÅÒµ¾ßÓеäÐ͵Ä×ÔȻ¢¶ÏÌØÕ÷¡£¨D¨D²Î¼ûÕÅάӣ¬ÐÅÏ¢¡¢¹ÜÖÆÓëÖйúµçÐÅÒµµÄ¸Ä¸ï£¬¡¶Öйú¹æÖÆÓ뾺Õù£ºÀíÂÛºÍÕþ²ß¡·£¬Éç»á¿ÆÑ§ÎÄÏ׳ö°æÉç2000Äê6ÔµÚÒ»°æ£¬µÚ233Ò³¡£
21.ÍôÏò¶«£¬»¥ÁªÍøµÄ¹æÖÆÎÊÌ⣬¡¶Öйú¹æÖÆÓ뾺Õù£ºÀíÂÛºÍÕþ²ß¡·£¬Éç»á¿ÆÑ§ÎÄÏ׳ö°æÉç2000Äê6ÔµÚÒ»°æ£¬µÚ262£263Ò³¡£
22.Lawrence Lessig, The Constitution of Code: Limitations on Choice-Based Critiques of Cyberspace Regulation. 5 CommLaw Conspectus 181(Summer, 1997)
23.Timothy S. Wu, Note, Cyberspace Sovereignty?--The Internet and the International System, 10 Harv. J.L. & Tech 647 (1997)
24.Jack L. Goldsmith ,AGAINST CYBERANARCHY. 65 U. Chi. L. Rev. 1199(Fall 1998)
25.²ÜÅæÁØÖø£¬¡¶Õþ¸®ÓëÊг¡¡·£¬Õã½ÈËÃñ³ö°æÉç1998Äê6ÔµÚÒ»°æ£¬µÚ142Ò³¡£
26.ÍôÏò¶«£¬»¥ÁªÍøµÄ¹æÖÆÎÊÌ⣬¡¶Öйú¹æÖÆÓ뾺Õù£ºÀíÂÛºÍÕþ²ß¡·£¬Éç»á¿ÆÑ§ÎÄÏ׳ö°æÉç2000Äê6ÔµÚÒ»°æ£¬µÚ262£263Ò³¡£
27.Michael Froomkin, The Metaphor is the Key: Cryptography, the Clipper Chip, and the Constitution, 143 U. Pa. L. Rev. 709 (1995)
28.´«Í³µÄ¼ÓÃܼ¼ÊõÊÇÃØÃÜÃÜÔ¿¼ÓÃܼ¼Êõ£¬Ò²³Æµ¥ÃÜÔ¿¼ÓÃܼ¼Êõ£¬¼òµ¥µÄ˵¾ÍÊÇ"Ò»°ÑÔ¿³×¿ªÒ»°ÑËø"£¬Ö»ÓÐÎÕÓÐÏàͬԿ³×µÄÈ˲ÅÄܹ»½â¿ªÏàÓ¦µÄ¼ÓÃÜÐÅÏ¢¡£ÕâÔÚÐÅϢʱ´úÊÇÒ»¼þºÜ·±Ëö¡¢ÉõÖÁÊDz»¿ÉÄܵÄÊ£¬Èç¹ûÏëºÍÐí¶à×Ô¼º¸ù±¾²»ÈÏʶµÄÈËʵÏÖÃØÃÜͨѶ£¬ÓÃÕâÖÖÃØÃÜÃÜÔ¿¼ÓÃܼ¼Êõ¾Í¸ù±¾²»¿ÉÄÜ¡£ÐÅϢʱ´úµÄ¹«¿ªÃÜÔ¿¼ÓÃܼ¼Êõ½â¾öÁËÕâ¸öÄÑÌ⣬ÔÚ¹«¿ªÃÜÔ¿¼ÓÃܼ¼ÊõÖУ¬¼ÓÃÜÃÜÔ¿Óë½âÃÜÃÜÔ¿ÊDz»Ò»ÑùµÄ¡£ÎÒ¿ÉÒÔ½«ÎҵļÓÃÜÃÜÔ¿¹«¿ª£¬³ÉΪ¹«¿ªÃÜÔ¿£¬¶øÈÔ½«½âÃÜÃÜÔ¿±£ÃÜ£¬×÷ÎªÃØÃÜÃÜÔ¿¡£ÈκÎÈËÈç¹ûÏëÏòÎÒ·¢ËͼÓÃÜÏûÏ¢£¬¶¼¿ÉÒÔÕÒµ½ÎҵĹ«¿ªÃÜÔ¿£¬È»¶ø£¬ÒÔÆä¼ÓÃܵÄÏûϢȴ±ØÐëÓÃÎÒ×Ô¼º±£ÁôµÄÃØÃÜÃÜÔ¿²ÅÄܽâÃÜ¡£
29.[ÃÀ]µÂÎÖ½ðÖø£º¡¶·¨Âɵ۹ú¡·£¬Àî³£ÇåÒ룬Öйú´ó°Ù¿ÆÈ«Êé³ö°æÉç1996Äê1ÔµÚ1°æ£¬µÚ£²£¸£²Ò³¡£
30.Lawrence Lessig, Reading the Constitution in Cyberspace, 45 Emory L.J. 869 (1996)
31.Lawrence Lessig½ÌÊÚÔÚ Reading the Constitution in Cyberspace, 45 Emory L.J. 869 (1996)£»Constitution and Code, 27 Cumb. L. Rev. 1 (1997)£»The Constitution of Code: Limitations on Choice-Based Critiques of Cyberspace Regulation. 5 CommLaw Conspectus 181(Summer, 1997)ÈýƪÎÄÕÂÖжÔÕâÒ»ÎÊÌâ½øÐÐÁËÏêϸµÄ²ûÊö¡£
32.Lawrence Lessig, Reading the Constitution in Cyberspace, 45 Emory L.J. 869 (1996)
33.Ñî½â¾ý£º¡¶¹ØÓÚÐÐÕþ·¨ÀíÂÛ»ù´¡Èô¸É¹ÛµãµÄÆÀÎö¡·£¬ÊÕÓÚÂÞºÀ²ÅÖ÷±à£º¡¶ÏÖ´úÐÐÕþ·¨µÄƽºâÀíÂÛ¡·£¬±±¾©´óѧ³ö°æÉç1997Äê5ÔµÚÒ»°æ£¬µÚ326Ò³¡£
34.ͬע£³£²¡£
35.ͬע£³£²¡£
36.ͬע£³£²¡£
37.ÍõС¶«Öø£¬¡¶ÐÅϢʱ´úµÄÊÀ½çµØÍ¼¡·£¬ÖйúÈËÃñ´óѧ³ö°æÉç1997Äê12ÔµÚÒ»°æ£¬µÚ190Ò³¡£
38.ÔÚWTOµÄÓйØÐÒéÖУ¬Éæ¼°µç×Ó¿Õ¼ä¹ú¼ÊÒ»Ì廯µÄµÄ·¨ÂÉÎļþÖ÷ÒªÓÐËĸö£¬¼´»õÎïóÒ×Öеġ¶ÐÅÏ¢¼¼ÊõÐÒé¡·£¨ITA£©£¬·þÎñóÒ×Öеġ¶·þÎñóÒ××Üж¨¡·£¬¡¶»ù´¡µçÐÅÐÒé¡·£¬ÒÔ¼°ÓëóÒ×ÓйصÄ֪ʶ²úȨж¨¡£´ËÍ⣬»¹ÓÐÒ»¸öÕýÔÚÌÖÂÛÖеÄÒéÌâÊǵç×ÓÉÌÎñ¡£
39.Views & Perspectives: China's Accession to the WTO
40.A. Michael Froomkin£¬Of Governments And Governance£¬14 Berkeley Tech. L.J. 619£¨Spring, 1999£©
41.¾Ý·͸É籨µÀ£¬Öйú»¥ÁªÍø×ÉѯÖÐÐÄ2000Äê11ÔºͰÄÃÅ¡¢Ïã¸Û¡¢Ì¨ÍåµÈÆäËû´óÖлªµØÇøµÄµ±¾Ö½¨Á¢ÁËÒ»Ì×ͳһ¹æ¶¨£¬¹ÜÀíÖÐÎÄ»¥ÁªÍøÓòÃû£¬ÃÀ¹úÉÌÎñ²¿ÖúÀí²¿³¤Â޵£¬¶ÔÖйúµÄÕâÒ»Õþ²ßÌá³öÁËÅúÆÀ£¬Ëû˵£¬¿ØÖÆ»¥ÁªÍøµÄÊÇ×ÔÓÉÊг¡¹æÂÉ¡£Ëû°ÑÕþ¸®µÄ¹ÜÀí²µ³âΪÂäÎéµÄ¹ÛÄ˵³ÉÊǶԻ¥ÁªÍø·¢Õ¹µÄ»ù±¾²»Àí½â¡£Ëû˵£¬¾ÍÏóÔÚ¿ª·¢»ÄÂùÎ÷²¿Ò»Ñù£¬ËÔÚ»¥ÁªÍøÕ¼ÓÐÁìÏȵØÎ»£¬Ë¾ÍÓµÓпØÖÆÈ¨£¬Ó¦¸Ã×ðÖØÕâÖÖÊг¡¹æÂÉ¡£Â޵»¹ÅúÅÐÖйúÊÔͼ¶Ô»¥ÁªÍøÊ©¼ÓÕþ¸®¿ØÖƵÄ×ö·¨¡£ËûÈÏΪÕþ¸®²»Ó¦µ±ÔÚÆäÖÐÆð×÷Óá£ÕâÖÖ³åÍ»×îºÃÁô¸øË½ÓªÆóҵȥ´¦Àí¡£ÂÞµÂ˵£¬»¥ÁªÍøÊµÖÊÉϾÍÊDZܿªÕþ¸®µÄ¿ØÖÆ£¬µ±È»ËûÃÇ»á¸Ðµ½²»¸ßÐË¡£
±¾ÎÄ·¢±íÔÚ¡¶ÐÐÕþ·¨ÂÛ´Ô¡·£¨µÚËÄ¾í£©£¨ÂÞºÀ²ÅÖ÷±à£¬·¨Âɳö°æÉç2001Äê°æ£©
£¨±¾ÎÄÃÉÕÅÓÀΰ²©Ê¿ÊÚȨÔڴ˵ÇÔØ£¬×ªÔØÊÂÒËÇëÓëÕÅÓÀΰ²©Ê¿ÊÚȨÁªÏµ¡££©
[Ê×Ò³] [ÉÏÒ»Ò³] [ÏÂÒ»Ò³] [ĩҳ]
¡¾±¾ÎÄ×÷ÕߣºÕÅÓÀ࣬À´×Ô£º·¨ÂÉÇÅ£¬ÒýÓü°×ªÔØÓ¦×¢Ã÷×÷Õߺͳö´¦¡£ÈçÐèÆ¸ÇëÂÉʦ£¬ÇëÁ¢¼´ÖµçÑî´º±¦¸ß¼¶ÂÉʦ£º1390 182 6830¡¿
¹Ø×¢·¨ÂÉÇÅ΢ÐŹ«ÖÚÆ½Ì¨ | Ñî´º±¦¸ß¼¶ÂÉʦµç×ÓÃûƬ |
![]() | ![]() |
¡ô
Çë×¢ÒâÎÄÃ÷ÓÃÓÇëÎðÈËÉí¹¥»÷¡£
¡ô
Çë×ðÖØÍøÉϵÀµÂ£¬×ñÊØÖлªÈËÃñ¹²ºÍ¹ú¸÷ÏîÏà¹Ø·¨ÂÉ·¨¹æ¡£
¡ô
ÄúÓ¦µ±¶ÔÒòÄúµÄÐÐΪ¶øÖ±½Ó»ò¼ä½Óµ¼ÖµÄÃñÊ»òÐÌÊ·¨ÂÉÔðÈθºÔð¡£
¡ô ÇëÎðÔÚ´ËÌá³ö·¨ÂÉ×Éѯ£¬·¨ÂÉ×ÉѯÇëÈ¥·¨ÂÉÇÅÂÛ̳¡£
¡ô
±¾Õ¾ÓÐȨÔÚÍøÕ¾ÄÚ×ªÔØ»òÒýÓÃÄúµÄÆÀÂÛ¡£
¡ô ÍøÕ¾¹ÜÀíÔ±ÓÐȨɾ³ýÎ¥·´ÉÏÊöÌáʾµÄÆÀÂÛ¡£
¡ô
²ÎÓë±¾ÆÀÂÛ¼´±íÃ÷ÄúÒѾÔĶÁ²¢½ÓÊÜÉÏÊöÌõ¿î¡£
±¾Õ¾ÉùÃ÷£º
±¾Õ¾ËùÔØÖ®·¨ÂÉÂÛÎÄ¡¢·¨ÂÉÆÀÂÛ¡¢°¸Àý¡¢·¨ÂÉ×ÉѯµÈ£¬³ý·ÇÁíÓÐ×¢Ã÷£¬Öø×÷ȨÈ˾ùΪվ³¤Ñî´º±¦¸ß¼¶ÂÉʦ±¾ÈË¡£»¶ÓÆäËûÍøÕ¾Á´½Ó£¬µ«ÊÇ£¬Î´¾Õ¾³¤ÊéÃæÐí¿É£¬²»µÃÉÃ×ÔÕª±à¡¢×ªÔØ¡£ÒýÓü°¾Ðí¿É×ªÔØÊ±¾ùӦעÃ÷³ö´¦"·¨ÂÉÇÅ"£¬²¢Á´½Ó±¾Õ¾¡£±¾Õ¾ÍøÖ·£ºhttp://h2ukw.qnxnd.cn/¡£
±¾Õ¾ËùÓÐÄÚÈÝ£¨°üÀ¨·¨ÂÉ×Éѯ£©½ö¹©²Î¿¼£¬²»¹¹³É·¨ÂÉÒâ¼û£¬Õ¾³¤²»¶Ô×ÊÁϵÄÍêÕûÐÔºÍʱЧÐÔ¸ºÔð¡£ÄúÔÚ´¦Àí¾ßÌå·¨ÂÉÊÂÎñʱ£¬ÇëǢѯÓÐ×ÊÖʵÄÂÉʦ¡£±¾Õ¾½«Å¬Á¦Îª¹ã´óÍøÓÑÌṩ¸üºÃµÄ·þÎñ£¬µ«²»¶Ô±¾Õ¾ÌṩµÄÈκÎÃâ·Ñ·þÎñ×÷³öÕýʽµÄ³Ðŵ¡£±¾Õ¾ËùÔØÍ¶¸åÎÄÕ£¬ÆäÑÔÂÛ²»´ú±í±¾Õ¾¹Ûµã£¬ÈçÐèʹÓã¬ÇëÓëÔ×÷ÕßÁªÏµ£¬°æÈ¨¹éÔ×÷ÕßËùÓС£
Ê×ϯÖ÷³ÖÂÉʦ£ºÉϺ£Ñî´º±¦¸ß¼¶ÂÉʦ
ÉϺ£×îÔçµÄ70ºó¸ß¼¶ÂÉʦ¡£ÈëÑ¡¹ú¼ÊÖªÃû·¨ÂÉýÌåChina Business Law Journal¡°100λÖйúÒµÎñÓÅÐãÂÉʦ¡±£¬ÈÙ»ñFinance Monthly¡°2017ÖйúTMTÂÉʦ´ó½±"£¬²¢ÈëΧFinance Monthly¡°2016Öйú¹«Ë¾·¨ÂÉʦ´ó½±¡±£¬ÏµAsia Pacific Legal 500ºÍAsia Law Profiles¶àÄêÍÆ¼öÂÉʦ£¬Öйúó´Ù»á/Öйú¹ú¼ÊÉÌ»áµ÷½âÖÐÐĵ÷½âÔ±£¬¾ßÓÐÉÏÊй«Ë¾¶ÀÁ¢¶ÊÂÈÎÖ°×ʸñ¡¢ÏµÉϺ£¹úÓÐÆóÒµ¸ÄÖÆ·¨ÂɹËÎÊÍųÉÔ±£¬¾ßÓзḻµÄͶ×Ê¡¢²¢¹º·¨ÂÉ·þÎñ¾Ñé¡£[Ïêϸ½éÉÜ>>>]
ÒµÎñίÍÐÓÊÏ䣺LawBridge#163.com