12 resultados para Criminal law of neglect

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article begins by setting out the human rights provisions that apply to social media expression. It then provides insight into the part social media plays within our society by analysing the social media landscape and how it facilitates a ‘purer’ form of expression. The social media paradox is explored through the lens of current societal issues and concerns regarding the use of social media and how these have manifested into litigation. It concludes by analysing the tension that the application of an array of criminal legislation and jurisprudence has created with freedom of expression, and whether this can successfully mitigated by the Director of Public Prosecution’s Interim Guidelines.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Book review: Heidelberg, Dordrecht, London, and New York, Springer, 2010, 189 pp., £93.55 (hardcover), ISBN 978-3-642-04330-7, e-ISBN 978-3-642-04331-4

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Book review of Prof Gardiner's work on Trusts, thrid edition.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Casenote considers nature of ruling in Fitzkriston v Panayi and its implications for the interpretation of S.54(2) Law of Property Act 1925

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this piece is to explain how the trust concept fits the overlapping analysis, presenting an example of why discrete categorisation is often unhelpful in understanding the operation of legal concepts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This piece argued that the accepted orthodoxy concerning the requirement that each individual piece of property is individually segregated for a valid trust to exist is unsupported by the case law, and that there is nothing wrong in principle or theory with a trust that exists for unsegregated property.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ashby wrote about cybernetics, during which discourse he described a Law that attempts to resolve difficulties arising in complex situations – he suggested using variety to combat complexity. In this paper, we note that the delegates to the UN Framework Convention on Climate Change (UNFCCC) meeting in Kyoto, 1997, were offered a ‘simplifying solution’ to cope with the complexity of discussing multiple pollutants allegedly contributing to ‘climate change’. We assert that the adoption of CO2eq has resulted in imprecise thinking regarding the ‘carbon footprint’ – that is, ‘CO2’ – to the exclusion of other pollutants. We propose, as Ashby might have done, that the CO2eq and other factors within the ‘climate change’ negotiations be disaggregated to allow careful and specific individual solutions to be agreed on each factor. We propose a new permanent and transparent ‘action group’ be in charge of agenda setting and to manage the messy annual meetings. This body would be responsible for achieving accords at these annual meetings, rather than forcing this task on national hosts. We acknowledge the task is daunting and we recommend moving on from Ashby's Law to Beer's Viable Systems approach.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article evaluates the way in which copyright infringement has been gradually shifting from an area of civil liability to one of criminal penalty. Traditionally, consideration of copyright issues has been undertaken from a predominantly legal and/or economic perspectives. Whereas traditional legal analysis can explain what legal changes are occurring, and what impact these changes may have, they may not effectively explain ‘how’ these changes have come to occur. The authors propose an alternative inter-disciplinary approach, combining legal analysis with critical security studies, which may help to explain in greater detail how policies in this field have developed. In particular, through applied securitisation theory, this article intends to demonstrate the appropriation of this field by a security discourse, and its consequences for societal and legal developments. In order to explore how the securitisation framework may be a valid approach to a subject such as copyright law and to determine the extent to which copyright law may be said to have been securitised, this article will begin by explaining the origins and main features of securitisation theory, and its applicability to legal study. The authors will then attempt to apply this framework to the development of a criminal law approach to copyright infringement, by focusing on the security escalation it has undergone, developing from an economic issue into one of international security. The analysis of this evolution will be mainly characterised by the securitisation moves taking place at national, European and international levels. Finally, a general reflection will be carried out on whether the securitisation of copyright has indeed been successful and on what the consequences of such a success could be.