6 resultados para Child Protection, Criminal Law, Child Rights, Queensland Legal System

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article begins by setting out the human rights provisions that apply to social media expression. It then provides insight into the part social media plays within our society by analysing the social media landscape and how it facilitates a ‘purer’ form of expression. The social media paradox is explored through the lens of current societal issues and concerns regarding the use of social media and how these have manifested into litigation. It concludes by analysing the tension that the application of an array of criminal legislation and jurisprudence has created with freedom of expression, and whether this can successfully mitigated by the Director of Public Prosecution’s Interim Guidelines.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Book review: Heidelberg, Dordrecht, London, and New York, Springer, 2010, 189 pp., £93.55 (hardcover), ISBN 978-3-642-04330-7, e-ISBN 978-3-642-04331-4

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the area of international environmental law this thesis proposes the formulation of one-step planning and permitting regulation for the integrated utilisation of new surface mines as depositories for municipal solid waste. Additionally, the utilisation of abandoned and currently operated surface mines is proposed as solid waste landfills as an integral step in their reclamation. Existing laws, litigation and issues in the United Kingdom, the U.S. and Canada are discussed because of their common legal system, language and heritage. The critical shortage of approved space for disposal of solid waste has caused an urgent and growing problem for both the waste disposal industry and society. Surface mining can serve three important environmental and societal functions inuring to the health and welfare of the public: (1) providing basic minerals for goods and construction; (20 sequentially, to provide critically needed, safe burial sites for society's wastes, and (3) to conserve land by dual purpose use and to restore derelict land to beneficial surface use. Currently, the first two functions are treated environmentally, and in regulation, as two different siting problems, yet they both are earth-disturbing and excavating industries requiring surface restoration. The processes are largely duplicative and should be combined for better efficiency, less earth disturbance, conservation of land, and for fuller and better reclamation of completed surface mines returning the surfaces to greater utility than present mined land reclamation procedures. While both industries are viewed by a developed society and its communities as "bad neighbours", they remain essential and critical for mankind's existence and welfare. The study offers successful examples of the integrated process in each country. The study argues that most non-fuel surface mine openings, if not already safe, can economically, through present containment technology, be made environmentally safe for use as solid waste landfills. Simultaneously, the procedure safeguards and monitors protection of ground and surface waters from landfill contamination.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article evaluates the way in which copyright infringement has been gradually shifting from an area of civil liability to one of criminal penalty. Traditionally, consideration of copyright issues has been undertaken from a predominantly legal and/or economic perspectives. Whereas traditional legal analysis can explain what legal changes are occurring, and what impact these changes may have, they may not effectively explain ‘how’ these changes have come to occur. The authors propose an alternative inter-disciplinary approach, combining legal analysis with critical security studies, which may help to explain in greater detail how policies in this field have developed. In particular, through applied securitisation theory, this article intends to demonstrate the appropriation of this field by a security discourse, and its consequences for societal and legal developments. In order to explore how the securitisation framework may be a valid approach to a subject such as copyright law and to determine the extent to which copyright law may be said to have been securitised, this article will begin by explaining the origins and main features of securitisation theory, and its applicability to legal study. The authors will then attempt to apply this framework to the development of a criminal law approach to copyright infringement, by focusing on the security escalation it has undergone, developing from an economic issue into one of international security. The analysis of this evolution will be mainly characterised by the securitisation moves taking place at national, European and international levels. Finally, a general reflection will be carried out on whether the securitisation of copyright has indeed been successful and on what the consequences of such a success could be.