18 resultados para Cases (Law)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article is concerned with the availability of “proprietary restitution” in cases of mistaken payments. It is argued that the mistake of the claimant is an insufficient justification for proprietary restitution, however a close analysis of the case law demonstrates that the presence of additional factors can justify the availability of proprietary restitution in specific circumstances. The basis of proprietary restitution is to be found in the breach of a duty which arises separately from the claim for unjust enrichment. The significant contribution of this article is the analysis that knowledge merely creates a duty to maintain the fund until restitution is made, and that knowledge cannot establish the breach of this duty. Importantly, breach of this duty is established by a second condition which is demonstrated by the wilful misconduct of the recipient. It is this conduct which justifies the imposition of the constructive trust. By adopting this analysis, the proprietary claim in the context of mistaken transfers can be classified as forming part of the law of wrongs, rather than the law of unjust enrichment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Contract Law Concentrate is a high quality revision guide which covers the main topics found on undergraduate courses. The clear, succinct coverage of key legal points within a specific topic area, including key cases, enables students to quickly grasp the fundamental principles of contract law. Written by Jill Poole, an experienced teacher and examiner and author of Textbook on Contract Law and Casebook on Contract Law, the book focuses on the needs of students to pass their exams. A number of pedagogical features help with the preparation for exams and suggest ways to improve marks. This guide has been rigorously reviewed and is endorsed by students and lecturers for level of coverage, accuracy, and exam advice. Packed with essential information, key cases, revision tips, exam Q&As, and more, Contract Law Concentrate is also supported by extensive online resources to take your learning further (www.oxford.com/lawrevision/): · Test your knowledge with the multiple choice questions and receive feedback on your answers. · Revise the facts and discussions of key cases using the interactive flashcards. · Learn the important terms and definitions using the interactive glossary. · Check that you have covered the main points of a topic using the key facts lists. · Achieve better marks following the advice on revision and exam technique by experienced examiner Nigel Foster.