5 resultados para Privacy Act 1988 (Cth)

em Helda - Digital Repository of University of Helsinki


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bestiality was in the 18th century a more difficult problem in terms of criminal policy in Sweden and Finland than in any other Christian country in any other period. In the legal history of deviant sexuality, the phenomenon was uniquely widespread by international comparison. The number of court cases per capita in Finland was even higher than in Sweden. The authorities classified bestiality among the most serious crimes and a deadly sin. The Court of Appeal in Turku opted for an independent line and was clearly more lenient than Swedish courts of justice. Death sentences on grounds of bestiality ended in the 1730s, decades earlier than in Sweden. The sources for the present dissertation include judgment books and Court of Appeal decisions in 253 cases, which show that the persecution of those engaging in bestial acts in 18th century Finland was not organised by the centralised power of Stockholm. There is little evidence of local campaigns that would have been led by authorities. The church in its orthodoxy was losing ground and the clergy governed their parishes with more pragmatism than the Old Testament sanctioned. When exposing bestiality, the legal system was compelled to rely on the initiative of the public. In cases of illicit intercourse or adultery the authorities were even more dependent on the activeness of the local community. Bestiality left no tangible evidence, illegitimate children, to betray the crime to the clergy or secular authorities. The moral views of the church and the local community were not on a collision course. It was a common view that bestiality was a heinous act. Yet nowhere near all crimes came to the authorities' knowledge. Because of the heavy burden of proof, the legal position of the informer was difficult. Passiveness in reporting the crime was partly because most Finns felt it was not their place to intervene in their neighbours' private lives, as long as that privacy posed no serious threat to the neighbourhood. Hidden crime was at least as common as crime more easily exposed and proven. A typical Finnish perpetrator of bestiality was a young unmarried man with no criminal background or mental illness. The suspects were not members of ethnic minorities or marginal social groups. In trials, farmhands were more likely to be sentenced than their masters, but a more salient common denominator than social and economical status was the suspects' young age. For most of the defendants bestiality was a deep-rooted habit, which had been adopted in early youth. This form of subculture spread among the youth, and the most susceptible to experiment with the act were shepherds. The difference between man and animal was not clear-cut or self-evident. The difficulty in drawing the line is evident both in legal sources and Finnish folklore. The law that required that the animal partners be slaughtered led to the killing of thousands of cows and mares, and thereby to substantial material losses to their owners. Regarding bestiality as a crime against property motivated people to report it. The belief that the act would produce human-animal mongrels or that it would poison the milk and the meat horrified the public more than the teachings of the church ever could. Among the most significant aspects in the problems regarding the animals is how profoundly different the worldview of 18th century people was from that of today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inter-enterprise collaboration has become essential for the success of enterprises. As competition increasingly takes place between supply chains and networks of enterprises, there is a strategic business need to participate in multiple collaborations simultaneously. Collaborations based on an open market of autonomous actors set special requirements for computing facilities supporting the setup and management of these business networks of enterprises. Currently, the safeguards against privacy threats in collaborations crossing organizational borders are both insufficient and incompatible to the open market. A broader understanding is needed of the architecture of defense structures, and privacy threats must be detected not only on the level of a private person or enterprise, but on the community and ecosystem levels as well. Control measures must be automated wherever possible in order to keep the cost and effort of collaboration management reasonable. This article contributes to the understanding of the modern inter-enterprise collaboration environment and privacy threats in it, and presents the automated control measures required to ensure that actors in inter-enterprise collaborations behave correctly to preserve privacy.