17 resultados para Illegal marijuana
Resumo:
Movie distribution on the Internet has become more common in recent years along with fast broadband internet connections. The problem so far has been that the greatest part of movie distribution on the Internet has been illegal. This is about to change because the major film distributors are finally starting to rent and sell movies more and more on the Internet due to their growing confidence in new copy protection methods. The importance of movie online distribution to the movie industry is still tiny but it is increasing rapidly as is investing in new business models and distribution methods in the USA and Europe. This thesis examines the basic concepts of online movie distribution, such as distribution techniques and copy protection, the main companies that rent and sell movies on the internet and their business models, the effects of movie piracy and non-commercial distribution channels. The intention was to provide the reader with an overview of different aspects of movie distribution on the Internet and its future. The conclusion was that movie distribution on the Internet will play a bigger financial part in the future although it was still too early to say just how significant that will be. We will probably see many corresponding distribution techniques, like peer-to-peer networks and streaming servers distributing and broadcasting movies to different end-user platforms like television, PC and portable media players. Internet distribution of movies will not revolutionize movie distribution in the next couple of years but it will make possible new efficient and inexpensive ways to distribute movies globally which will in turn increase the possibilities for revenue, especially for small independent movie producers and distributors.
Resumo:
The nature of client-server architecture implies that some modules are delivered to customers. These publicly distributed commercial software components are under risk, because users (and simultaneously potential malefactors) have physical access to some components of the distributed system. The problem becomes even worse if interpreted programming languages are used for creation of client side modules. The language Java, which was designed to be compiled into platform independent byte-code is not an exception and runs the additional risk. Along with advantages like verifying the code before execution (to ensure that program does not produce some illegal operations)Java has some disadvantages. On a stage of byte-code a java program still contains comments, line numbers and some other instructions, which can be used for reverse-engineering. This Master's thesis focuses on protection of Java code based client-server applications. I present a mixture of methods to protect software from tortious acts. Then I shall realize all the theoretical assumptions in a practice and examine their efficiency in examples of Java code. One of the criteria's to evaluate the system is that my product is used for specialized area of interactive television.
Resumo:
Suomen uusi osakeyhtiölaki tuli voimaan 1.9.2006. Tutkielmassa on selvitetty uuden osakeyhtiölain keskeisimpiä vaikutuksia osakeyhtiöiden ja niiden osakkaiden verotukseen. Tutkielmassa on tarkasteltu uuden osakeyhtiölain nimellisarvotonta pääomajärjestelmää, varojenjakotapoja sekä yritysjärjestelytilanteita yhtiö- ja vero-oikeudelliselta kannalta. Valtiovarainministeriön asettama yritysverotuksen kehittämistyöryhmä on muistiossaan ehdottanut muutoksia verolakeihin uuden osakeyhtiölain vuoksi. Työryhmä on ehdottanut mm. osinkoverotuksen alaa ja peitellyn osingonjaonverottamista laajennettavaksi ja laittoman varojenjaon verotusta kiristettäväksi. Tutkielmassa on tarkasteltu työryhmän ehdotuksia ja pohdittu ehdotusten vaikutusta käytännön yritystoimintaan elinkeinoverolain näkökulmasta. Työryhmän ehdotukset eivät kuitenkaan kata kaikkia tilanteita. OYL:ssa mahdollistetut uudet yritysmuodonmuutos- ja yritysjärjestelytilanteet eivät toistaiseksi ole toteutettavissa veroneutraalisti. Verolainsäädännön joustamattomuuden vuoksi useat uuden lain mahdollistamattoimintavaihtoehdot eivät ole yhtiöiden käytettävissä. Muutoksia verolakeihin on odotettavissa aikaisintaan vuoden 2007 eduskuntavaalien jälkeen. Ennen verolakien uudistamista verotuskäytäntö on epävarmaa, mikä tehokkaasti estää uusien toimintamahdollisuuksien toteuttamisen.
Resumo:
1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.
Resumo:
Ohjelmistojen tietoturva on noussut viime aikoina entistä tärkeämpään rooliin. Ohjelmistojen suunnittelu pitää alusta alkaen hoitaa siten, että tietoturva tulee huomioitua. Ohjelman helppokäyttöisyys ei saisi ajaa tietoturvan edelle, eikä myöskään ohjeiden lukematta jättäminen saa tarkoittaa tietoturvan menetystä. Tärkeä osa ohjelmistojen tietoturvaa on myös ohjelmiston laillinen käyttö. Se miten laiton käyttö estetään sen sijaan on erittäin vaikeaa toteuttaa nykyjärjestelmissä. Työn tarkoituksena oli tutkia Intellitel Communications Oy:n sanomayhdyskäytävää, Intellitel Messaging Gateway, tuotetietoturvan näkökulmasta, löytää sieltä mahdolliset virheet ja myös korjata ne.
Resumo:
Java™ 2 Platform, Micro Edition on eräs johtava sovellusalusta, joka mahdollistaa kolmannen osapuolen sovellusten luomisen matkapuhelimiin, kommunikaattoreihin ja taskutietokoneisiin. Java-alusta keskeinen etu on sovellusten dynaaminen asentaminen. Käyttäjä ei ole rajoitettu esiasennettuihin sovelluksiin vaan voi asentaa niitä itse tarpeen mukaan. Tämän diplomityö käsittelee erilaisia Java sovellusten (MIDlettien) lataus ja asennusmenetelmiä. Diplomityö antaa yhteenvedon merkittävimmistä asennus teknologioista. Pääpaino on MIDP-standardin mukaisella langattomalle asennuksella (Over-The-Air provisioning) sillä se on kaikkein laajimmin käytetty menetelmä. Muita käsiteltäviä menetelmiä ovat WAP Push ja paikallinen asennus Bluetoothin ja Infrapunalinkin avulla. MIDletit, kuten mitkä tahansa ohjelmat, ovat alttiita laittomalle kopioinnille. Tämä diplomityö kuvaa menetelmiä, joilla laiton kopiointi voidaan estää. Yksi esimerkki on OMA™ DRM standardi. Diplomityö kuvaa myös kuinka kopiointisuojaus voidaan yhdistää olemassa oleviin asennusmenetelmiin. Java sovelluksia, MIDlettejä, käytetään yhä erilaisimpiin tarkoituksiin jolloin tarvitaan myös uusia asennusmenetelmiä. Yksi tällainen menetelmä on asentaminen erillisistä laitteista. Diplomityö kuvaa useita menetelmiä asentamiseen erillisistä laitteista. Käsitellyr menetelmät pohjautuvat Bluetooth teknologiaan ja yhtä lukuun ottamatta perustuvat standardin määrittelemiin Bluetooth profiileihin File Transfer Profile, Personal Area Networking Profile ja Object Push Profile. Toinen asennustapa on sovellusten edelleen lähettäminen toiseen puhelimeen. Diplomityö kuvaa kuinka OMA DRM standardi voidaan yhdistää tällaisen asennuksen ja ehdottaa kahta vaihtoehtoista menetelmää. Yksi perustuu Bluetoothin Object Push Profiiliin ja toinen Infrapunalinkin käyttöön. Toinen perustuu multimediaviestiin ja sähköpostiin.
Resumo:
In liberalized electricity markets, which have taken place in many countries over the world, the electricity distribution companies operate in the competitive conditions. Therefore, accurate information about the customers’ energy consumption plays an essential role for the budget keeping of the distribution company and for correct planning and operation of the distribution network. This master’s thesis is focused on the description of the possible benefits for the electric utilities and residential customers from the automatic meter reading system usage. Major benefits of the AMR, illustrated in the thesis, are distribution network management, power quality monitoring, load modelling, and detection of the illegal usage of the electricity. By the example of the power system state estimation, it was illustrated that even the partial installation of the AMR in the customer side leads to more accurate data about the voltage and power levels in the whole network. The thesis also contains the description of the present situation of the AMR integration in Russia.
Resumo:
Peer-to-Peer (P2P) technology has revolutionized file exchange activities besides enhancing processing power distribution. As such, this technology which is nowadays made freely available to all internet users also imposes a threat as it enables the illegal distribution of copyrighted digital work. P2P technology continuously evolves in a greater pace than copyright legislation, leading to compatibility gaps between the applicability of copyright law and the illicit file sharing and downloading. Such issues give high incentives to consumers to practise piracy using P2P systems with a low perception of risk towards prosecution, leading to substantial losses for copyright owners. This study focuses on developing insights for content owners on consumer behaviour towards piracy in Finland, where quantitative analyses are assessed using a data set based on a survey conducted by the Helsinki Institute for IT. The research approach investigates the significance of three fundamental areas in relation to evaluate consumer behaviour as: environmental-related factors, innovation-related factors and consumer-related. each of these are integrates concepts derived in previous theoretical models such as the technology acceptance model, theory of reasoned action, theory of planned behaviour, the issue-risk-judgement model and the Hunt & Vitell’s model.
Resumo:
Mining has severe impacts on its surrounding. Particularly in the developing countries it has degraded the environment and signigicantly altered the socio-economical dynamics of the hosts. Especially relocation disrupts people from their homes, livelihoods, cultures and social activities. Mining industry has failed to develop the local host and streghten its governance structures; instead it has further degraded the development of mineral rich third world countries, which are among the world poorest ones. Cash flows derived from mining companies have not benefitted the crass-root level that however, bears most of the detrimental impacts. Especially if the governance structure of the host is weak, the sudden wealth is likely to accelerate disparities, corruption and even fuel wars. Environmental degradation, miscommunication, mistrust and disputes over land use have created conflicts between the communities and a mining company in Obuasi, Ghana; a case study of this thesis. The disputes are deeply rooted and further fuelled by unrealistic expectations and broken promises. The relations with artisanal and illegal miners have been especially troublesome. Illegal activities, mainly encroachment of the land and assets of the mine, such as vandalising tailings pipes have resulted in profits losses, environmental degradation and security hazards. All challenges mentioned above have to be addressed locally with site-specific solutions. It is vital to increase two-way communication, initiate collaboration and build capacity of the stakeholders such as local communities, NGOs and governance authorities. The locals must be engaged to create livelihood opportunities that are designed with and for them. Capacity can also be strengthened through education and skills training, such as women’s literacy programs. In order to diminish the overdependence of locals to the mine, the activities have to be self -sufficient and able to survive without external financial and managerial inputs. Additionally adequate and fair compensation practises and dispute resolution methods that are understood and accepted by all parties have to be agreed on as early as possible.
Resumo:
Sustainability is the aim of forest management and forest regulation in many countries. Accordingly, forest management has been steered towards more environmentally friendly methods and new regulatory instruments have been introduced. At the same time, wood trade and forest industry have become a global business. Even if the importance of national forest legislation has not decreased, it has been widely acknowledged that national regulation of forest management is no longer sufficient. The movement of goods does not acknowledge boundaries, even though most negative environmental and social consequences stay in the country of origin of wood and other raw materials. As a partial solution to this dilemma, different kinds of regulations have been developed. Various forest certification schemes and wood trade regulation in the EU (995/2010) are examples of efforts to prevent illegal logging and unsustainable forestry. The Finland-based forest industry is to a varying extent dependent on wood trade from Russia. Especially in the 1990‟s, ethical questions concerning import of wood from Russian old growth forests near the Finnish border were widely discussed. Consequently, forest industry enterprises have developed systems to trace the origin of wood and to buy certified wood from Russia. The aim of the research has been to evaluate Finnish and Russian forest regulations in order to investigate what kind of forest management these regulations enhance, and to what extent ecologically sustainable forest management has been integrated into different forms of regulation. I have examined Finnish and Russian forest regulation in four separate articles based on the topics of the Russian Forest Code, forest certification and other voluntary forest protection measures in Russia, Finnish forest certification and Finnish forest legislation. One objective has been to analyse the roles voluntary forest certification plays in promoting sustainable forest management in different countries. In my research, I have mainly concentrated on ecological sustainability and protection of biodiversity, although other aspects of sustainable forest management have been touched upon in different articles. In the following I shall conclude the findings of my research. When the current Russian Forest Code (2006) was being adopted, the main emphasis was not on ecological issues, but on reorganizing forest governance. The role of ecological requirements was even slightly diminished during the legislative reform. There are, nevertheless, still stipulations aiming at ecological sustainability, such as the division of forests into different forest management categories and various protection zones. In 2000, FSC forest certification arrived in Russia, at present covering already 28 million hectares of forests. The PEFC scheme is now in use as well, but to a much lesser extent. If properly implemented, Russian forest certification schemes clearly improve the level of ecological and social sustainability of forestry in Russia. Certification criteria, however, are partly in conflict with the Russian forest legislation and certified enterprises have been forced to pay fines or to negotiate with forest authorities. This clearly indicates that even if Russian forest legislation has otherwise been liberalized to a certain extent, some significant paternalism still exists. Voluntary, hands-on biodiversity protection measures are not valued, and they are not part of the official protection policies as in many other countries. However, there have been some regional solutions to this dilemma. In the Republic of Karelia forest authorities have approved a set of forest biodiversity protection rules created by a local NGO and a forest industry enterprise. By following these local rules, an enterprise can avoid fines for protection measures. The current Finnish Forest Act was adopted in 1996. It brought forest legislation into a new era as some ecological aspects were integrated into forest legislation. The various soft-law forest management recommendations further increased the level of biodiversity protection. My evaluation of the overall legitimacy of the Finnish forest legislation and forest management paradigm revealed, however, several problematic issues. As part of this study I analysed the history of the current forest management paradigm. This analysis revealed the path dependency which still hinders the protection of biodiversity and clearly decreases the general legitimacy of forest management. Due to several historical reasons only even-structured forest management based on clear cuts has for decades been officially approved in Finland. Due to increasing demands of forest owners the legislation is finally being revised. Yet, the official approval of uneven-structured forest management would not be enough to fully improve ecological, social and cultural legitimacy. The latest ecological theories and knowledge of endangered species should be taken into account in the on-going reform of forest legislation as well as the modernisation. Forest legislation is one of the very few spheres of Finnish environmental legislation where openness and participation are still considered a threat. The first Finnish forest certification scheme, PEFC, was established in 2000. It now covers more than 20 million hectares, about 95% of the forests in Finland. PEFC Finland does not require a higher level of biodiversity protection than the recommendations by Tapio (the Development Centre for Forestry), but certification has unified forest management practices and requires more protection measures than mere forest legislation. The study suggests that in Finland PEFC has not functioned as an instrument which would substantially improve the level of forest management. Rather it has supported the status quo of the forest sector. While the ecological and social responsibility of Finland-based forest corporations was one impetus for this research, I want to conclude that there are problems related to forest legislation and non-state regulation in both Finland and Russia. If an enterprise buying wood from Russia buys only certified wood, and carefully avoids wood coming from high conservation value forests that are either ecologically or socially valuable, it can be claimed to be as sustainably produced as in Finland. However, there must be continuous scrutiny of the circumstances. In Russia, the level of the compliance of certification criteria varies considerably, and there are vast unprotected invaluable forest areas. The utilisation of these areas should not be based on short-sighted decisions or lack of consensus among stakeholders.
Resumo:
Tutkielman tavoitteena on paneutua yksityisen pysäköinninvalvonnan lain-tulkinnallisiin ongelmiin Suomessa. Lähtökohtana kysymyksenasettelulle on kansallinen lainsäädäntö, oikeustapaukset, sopimusoikeudelliset peri-aatteet ja oikeuskirjallisuus. Julkinen pysäköinninvalvonta on Suomessa poliisin ja kuntien vastuulla. Suomessa ei ole voimassa yksityistä pysäköinninvalvontaa koskevaa omaa lakia. Yksityisen pysäköinninvalvonnan on nykyisellään katsottu si-sältävän merkittävää julkisen vallan käyttöä, jolloin se tekee siitä perustus-lain vastaista. Samalla yksityinen pysäköinninvalvonta voidaan kuitenkin nähdä sopimukseen perustuvana, laillisena, liiketoimena. Näkökulmien pohdinta tuo esiin laintulkinnallisia ongelmia sekä ongelmia, jotka liittyvät sopimuksen syntymisen kriteereihin.
Resumo:
Tutkielman ensisijaisina tavoitteena on selvittää syitä, jotka johtavat mukautetun tilintarkastuskertomuksen antamiseen pk-yritykselle. Empiria-osuuden toissijaisena tavoitteena on selvittää, millainen on ammatillisen harkinnan osuus tilintarkastajan päätöksenteossa ja kuinka esiin tulleita seikkoja voidaan ryhmitellä teemoittain. Empiirinen osuus suoritettiin laadullisena tutkimuksena. Tutkielman aineiston muo-dostavat haastattelut ja pk-yrityksille annetut mukautetut tilintarkastuskertomukset. Haastattelut toteutettiin puolistrukturoidun ja teemahaastattelun välimaastoon sijoittuvalla haastattelumuodolla. Haastateltavina oli viisi KHT-tilintarkastajaa. Haastattelutulokset analysoitiin kokoamalla litteroiduista haastatteluista eri kokonaisuudet teemoittain. Tilintarkastuskertomuksiin liittyvät tulokset analysoitiin kokoamalla excel-taulukkoon kirjoitetuista perustelut- kappaleiden tiedoista eri kokonaisuudet teemoittain. Tutkimustulosten perusteella mukautetun tilintarkastuskertomuksen antamiseen johtavia syitä on useita ja ne poikkeavat toisistaan hyvin paljon. Syyt luokitellaan teemoittain seuraavasti: lainvastaisuudet, toiminnan kannattavuus ja rahoitus, kirjanpitoon ja tilinpäätökseen liittyvät syyt sekä hallinto. Edellä mainituista teemoista useimmiten toistuivat lainvastaisuudet ja toiminnan kannattavuuteen ja rahoitukseen liittyvät syyt. Lainvastaisuuden teemaan liittyvistä syistä toistui eniten osakepääoman menetyksen rekisteröimättä jättäminen. Toiminnan kannattavuuden ja rahoituksen teemaan liittyvistä syistä esiintyi oman pääoman menettämisen lisäksi liiketoiminnan kannattamattomuus eli tappion tekeminen. Tutkimustuloksista yksi mielenkiintoisimpia on hallintoon liittyvät mukauttamisen syyt. Hallinnon teemaan liittyvä syy tutkimusaineistossa oli omistajien keskinäinen eripura, mikä näkyy tilinpäätöksen allekirjoitussivulla allekirjoitusten puuttumisena ja asian nou-semisena tilintarkastuskertomukseen.
Resumo:
Online sexual solicitation (solicitation) of youth has received widespread media and research attention during the last decade. The prevalence rates of youth who have experienced solicitation or solicitation attempts vary between studies depending on the methodology used (e.g., whether youth or adults are the target study group). In studies focusing on youth victims, the prevalence of solicitation attempts made by adults during the past year is typically reported to be between 5 and 9%. Adults who solicit youth online have been found to use deception and other manipulative behaviors to gain access to sexual activities with youth. However, previous studies have lacked a control group of adults who solicit other adults online. Without this comparison, one could argue that deceiving others online about one’s identity, and engaging in manipulative behaviors, is an inherent part of most online sexual interactions with strangers. Additionally, little is known about the associations between manipulative behaviors and the solicitation outcomes. In research concerning offline sexual behaviors, it has been noted that situational factors, such as sexual arousal, may alter both sexual interest and behavior. The effects of situational factors on online sexual behaviors have been less extensively studied (especially so with a quantitative approach); no studies have to date focused on adults’ solicitation of youth. Investigating the role of a lowered sexual age preference and the role of situational factors in the soliciting adults could be an important step in order to receive deeper knowledge of the role of traits and states in the context of solicitation. Additionally, there is a lack of knowledge of the effect of the age of the youth. Although previous studies on solicitation has found that older youth, compared with younger youth and children, are more often solicited, the possible reasons for this have not been investigated. Are adults who solicit youth affected by legal deterrence (through the legal age of consent), is it because older youth are more available online, or are the adults’ age preferences merely a product of a normally distributed age preference in the population? The purpose of the present thesis was fivefold: 1) to obtain an estimate of the frequency of adults’ solicitation of youth as self-reported and observed in actual behavior; 2) to explore whether the legal age of consent (LAC) affects solicitation frequency, or whether a normally distributed sexual age preference more accurately describe the proportion of solicited youth of different ages; 3) to investigate the associations of both traits (e.g., lower sexual age preference) and states (immediate situational factors, such as alcohol intoxication), and the solicitation target; 4) to explore whether adults who solicit youth and adults who solicit adults are equally deceitful and manipulative online, and whether the different solicitation outcomes are as common in both groups; and 5) to investigate whether the deceitful and manipulative behaviors engaged in had different associations with the solicitation outcomes depending on the age of the solicited. In the survey study, a convenience sample of 1393 adult participants (aged 18 years or older) self-reported any online communication with strangers during the past year. Of these, 56% (776 respondents) reported that they had solicited or attempted to solicit at least one stranger. Of the respondents, 453 (58.4%) were men, and 323 (41.6%) were women. Participants with only adult contacts (18 years or older) constituted the majority (640 respondents). In contrast, 136 individuals reported a youth contact (a 13 year old or younger, or a 14 to 17-year old). Approximately half of the participants were men in the adult contact group, while 75% of the participants were men in the youth contact group. Approximately 60% of the participants with youth contacts were recruited from two websites associated with a pedophilic sexual interest. In an online quasi-experimental study, with researchers impersonating youth of different ages (10–18 year olds) in chat rooms, 251 online conversations with chat room visitors made up the entire sample. All chat room visitors alleged to be men. The self-reported frequency of having solicited youth (0–17-year olds) during the past year was approximately 10% in our sample of adults who reported communicating with any strangers online. When we observed this behavior in chat rooms, we found that approximately 30% of the chat room visitors who believed they interacted with a 10 to 14 year old attempted to solicit the youth. We found that solicitation attempts increased equally much when increasing the age of the impersonated youth from 14 to 16, as from 16 to 18. Thus, we concluded that a normally distributed age preference in the population was a more plausible explanation to the effect of the age of the solicited, rather than the LAC (here; 15 and 16). If the chat room visitors would have been deterred only by the LAC, we would have expected that the change in amount of solicitation attempts from an illegal age group to a legal age group would have been significantly stronger than changes between age groups within illegal-illegal and legal-legal groups. Our subsample of survey participants from the pedophilia-related websites expectedly reported that they had solicited youth more often in comparison to the sample gathered through general (i.e., not associated with any particular sexual preference) websites. We also found that participants with a youth contact reported higher levels of sexual arousal and shame before the sexual interaction with their online contact, compared with participants with an adult contact. Additionally, the participants with youth contacts who reported consumption of child- and adolescent pornography also reported being more sexually aroused before the interaction, compared to the participants with youth contacts who did not report consumption of these kinds of pornography. We also found clear indications that the online sexual interaction had an alleviatory effect on reported levels of sadness, boredom and stress, independent of the age of the contact. Generally, the participants with youth and adult contacts reported deceiving their contacts as often and suggesting keeping the communication a secret from someone as often. Participants with a youth contact, however, reported using more persuasion techniques for online sexual purposes or for the purpose of an offline meeting, compared to those with an adult contact. In the chat rooms, we found that more indirect ways of future sexual communication (e.g., continuing chatting) was suggested by the chat room visitors that were under the assumption of interacting with youth aged 10 to 14, compared with more direct means (e.g., meeting offline). Survey participants with youth contacts who had used deception, suggested keeping the interactions a secret, and/or persuaded their contact by appealing to the contacts feelings of love and attachment for the participant had also more often engaged in cybersex with the contact. No other manipulative behaviors were associated with the other investigated solicitation outcomes (receiving a sexual picture, meeting offline, and engaging in sexual contact offline) within this group of participants. However, using deception, suggesting secrecy and using persuasion was also positively associated with certain solicitation outcomes within participants with an adult contact. In summary, adults’ solicitation of youth is much more frequent when observed in chat rooms than self-reported. Additionally, an underlying lowered sexual age preference seems to be a motivating factor on a group level in adults who solicit youth. We concluded that directed prevention efforts should be made on pedophiliarelated websites. Additionally, the role of situational factors, especially sexual arousal in persons with a pedo- or hebephilic sexual interest should be investigated further in the context of online sexual solicitation.
Resumo:
Suurpetojen kannanhoitoon, ja etenkin suden kannanhoitoon liittyvä monitahoinen konfl ikti esiintyy jännitteinä paikallisyhteisöjen ja keskushallinnon, maaseudun ja kaupunkien sekä maallikoiden ja tutkijoiden välillä. Suurpetopolitiikan legitimiteettikriisi näkyy kansallisen kannanhoidon tavoitteiden ja toimenpiteiden kiistämisenä passiivisin ja aktiivisin toimin. Tällä ajankohtaisella ongelmalla on mittavat historialliset juuret. Luonnon ja ihmisen välinen suhde on ollut jatkuvaa tasapainottelua konfl iktien ja niiden hallinnan kanssa, ja suurpedot ovat väistämättä olleet konfl iktin keskiössä lajityypillisten piirteidensä vuoksi. Tämän tutkimuksen tavoitteena on osoittaa ympäristöhistoriallisen tutkimusotteen kautta suomalaisen vahinkoeläinhistorian keskeiset toimet ja toimijat, sekä ymmärtää vahinkoeläinten kannanhoidon tavoite- ja toimenpideasettelun vaikutukset eläinpopulaatioihin historiallisessa ja ekologisessa kontekstissa. Tutkimuksen toinen tavoite on tuottaa synteesi nykypäivän suurpetojen kannanhoidon tavoite- ja toimenpiteiden tarkoituksenmukaisuudesta ja vaikuttavuudesta historiallisessa kontekstissa ja esittää uudenlainen lähestymismalli sosiaalisesti kestävämmälle suurpetopolitiikalle. Vahinkoeläinhistoriaa käsitellään deduktiivisella ja rekonstruktiivisella tutkimusotteella käyttäen aineistona lakitekstejä, maksettuja tapporahoja, sanomalehtikirjoituksia, sidosryhmien kirjoituksia sekä eläintieteellisiä julkaisuja. Etenkin laeissa ja asetuksissa eri eläimistä asetetut tapporahat ja toisaalta saalistilastojen perusteella maksetut palkkiot on nostettu tässä tutkimuksessa merkittävään rooliin asenteiden tulkinnan välineenä. Tarkastelu ulotetaan nisäkkäiden lisäksi myös lintuihin, jotka ovat edellä mainitun aineiston valossa olleet merkittävä vainottu eläinryhmä. Nykypäivän petokonfl iktin tarkastelussa keskiöön nostetaan suurpetoasenteet, niiden muodostuminen ja vaikutus suurpetopolitiikan tavoitteiden ja toimenpiteiden kiistämisessä. Suurpetopolitiikan legitimiteettikriisiä tarkastellaan paikallisten uhmakkuutena hallintoa kohtaan ja tulkinta keinoista puuttua sosiopoliittiseen rikokseen rakennetaan tätä ajatusta vasten. Suurpetojen salakaatajat toimivat yhteisönsä puolesta ja saavat tukensa toimilleen yhteisöltään. Sosiopoliittinen rikos ei siten ole ainoastaan salakaatajien vaan sen sijaan yhteisön yhteinen. Salakaatajat ja paikallisyhteisö pyrkivät häivyttämään yhteiskunnassa viranomaisten ja sidosryhmien taholta toimintaan liittämää stigmaa ja siten oikeuttamaan tekonsa vallitsevissa olosuhteissa. Arvoristiriitoihin perustuvat konfl iktit ovat haasteellisia hallita ja lähtökohtana on oltava ymmärrys siitä, että etenkin suteen liittyvät jännitteet ja ristiriidat ihmisten välisissä suhteissa ovat väistämättömiä. Tunnistamalla historiallisen aineiston merkittävyys nykypäivän ongelmakeskeisen kannanhoidon ratkaisun tietopohjana on mahdollista rakentaa sosiaalisesti kestävämpää suurpetojen kannanhoitoa. Tässä väitöskirjatyössä painotetaan suurpetoihin liittyen ajatusta, jonka mukaan paikallisilta suurpetoalueilla eläviltä ihmisiltä tai sidosryhmien edustajilta ei edellytetä arvomaailman muuttumista, vaan hyväksytään heidän käsityksensä suurpetojen roolista vahingontekijöinä. Sen sijaan vahvistetaan suurpetojen välineellistä roolia paikallisyhteisöjen resurssina ja oleellisten sidosryhmien roolia yhteisön toimijoina psykologisen omistajuuden rakentamisen kautta. Suurpetojen kestävä kannanhoito vaatii siten riistahallinnon toimintakulttuurin muutosta ja uudenlaista suhdetta yhteiskunnan eri toimijoihin.
Resumo:
The topic is white collar crime in its organizational form. The research question is why otherwise law-abiding people engage in wrongful behavior within legitimate organizations and what kinds of dynamics are involved in wrongful organizational processes. This is a theoretical inquiry the method of which is to bring together relevant literature on organizational behavior regardless of the branch of science. In addition to criminological and sociolegal writings, I mostly refer to works of social psychology and organization theory. At first, I discuss the terminological multiplicity related to organizational white collar crime. In conclusion from a critical analysis of the dominant terms and definitions, I argue for the concept of organizational wrongdoing. The approach of organizational wrongdoing captures unethical, illegal and criminal organizational behavior. Thus, it is not retricted by legislative categories but ethical reasoning. The approach aims at grasping a behavioral entity, and state law crimes do not constitute an ontology of behavior. In order to understand organizational wrongdoing, the dominant criminological theories applied to white collar crime are discussed. To a surprisingly large extent, they lack a sophisticated organizational perspective and do not offer viable frameworks for building a plausible theory of organizational white collar crime. In order to fill the gap, I incorporate the social psychological dynamics of organizational behavior and present several findings on collective behavior that criminological theorization must come to terms with. ------ This publication has been first presented and accepted as a master's thesis at the Faculty of Law, University of Turku. It has been published on the series: Criminal Law and Judicial Procedure, Series B: 15, in print format. The publication was digitized in 2015 and published online.