7 resultados para Hate motivated crimes

em Aston University Research Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper deals with the problematic of development methodologies for organisational information systems and especially with their application to business systems. Historically, information systems development methodologies tend to fail, because either they take the organisational purposefulness for granted, or they do not analyse it thoroughly. This paper's position is that the analysis, and the definition or redefinition of the systemic purpose are regarded as the utmost expression of the system 's purposefulness. This is to be achieved by ensuring the participation of all the stakeholders who affect, or are affected by, a particular business system's operations. The nature of participation, defined as a process of the stakeholders' perceptual exchanges, is deemed to be problematic in itself, due to the influence exerted upon it by organisational power, coercion and false consciousness. The paper highlights the philosophical reasons for the failures of information systems development methodologies, and provides a conceptual solution to this problematic as well as a strategy for the development of intrinsically motivated organisational information systems. The intrinsically motivated information systems methodology outlined here (BSPA) is intended to yield organisational information systems that demonstrably improve co-ordination of organisational activities, by enabling the development and maintenance of a single/multifaceted view of purpose throughout organisations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The baleful legacy of the wars of the 1990s continues to dog the states and societies of the former Yugoslavia and has overshadowed the disappointingly slow and hesitant trajectory of the region towards the EU. At the start of the new millennium, with the removal of key wartime leaders from the political scene in both Croatia and Serbia, it was widely hoped that the region would prove able to ‘leave the past behind’ and rapidly move on to the hopeful new agenda of EU integration. The EU’s Copenhagen criteria, which in 1993 first explicitly set out the basic political conditions expected of aspirant EU Member States, proved effective in the case of the new democracies of Central and Eastern Europe in supporting the entrenchment of democratic norms and practices, and stimulating reconciliation and good neighbourly relations among countries with turbulent histories. Building on this experience, the Stabilisation and Association Process, launched for the countries of the Western Balkans in 1999, included both full cooperation with the International Criminal Tribunal for the former Yugoslavia (ICTY) and regional reconciliation among the political conditions set for advancing these countries on the path to EU integration. EU political conditionality was intended to support the efforts of new political leaders to redefine national goals away from the nationalist enmities of the past and focus firmly on forging a path to a better future. This Chaillot Paper examines the extent to which this strategy has worked, especially in the light of the difficulties it has encountered in the face of strong resistance to cooperation among sections of the former Yugoslav population, many of whom have not yet fully acknowledged the crimes committed during the 1990s. Key chapters in the volume raise the vital questions of leadership and political will. EU political conditionality does not work unless the EU has a partner ready and willing to ‘play the game’, which presupposes that EU integration has become the overriding priority on the national political agenda.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the years following the fall of Slobodan Milo evic, Serbian social, cultural and political responses to the wars of the 1990s have fallen under intense international scrutiny. But is this scrutiny justfied, and how can these responses be better understood? Jelena Obradovic engages with ideas about post-conflict societies, memory, cultural trauma, and national myths of victimhood and justified war to shed light upon Serbian denial and justification of war crimes - for example, Serbia's reluctant cooperation with the International Criminal Tribunal for the former Yugoslavia (ICTY). Rather than treating denial as a failure to come to terms with the past or as resurgent nationalism, Obradovic argues that the justification of atrocities are often the result of a societal need to understand and incorporate violent events within culturally acceptable boundaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article discusses the emergence of cyberstalking as a means of victimising individuals and minority groups. However, rather than focusing on the activities of far-right groups, we discuss how technology can encourage individuals to harass others. The central argument made is that technology both enables and invites participation in criminal or antisocial behaviour from individuals who would not normally take part in such activities. One way in which this can be explained is by suggesting that some of the social and technological characteristics of the Internet act together in order to lower inhibitions and establish new norms. For instance, the anonymity offered by the Internet enables people to participate in activities such as encouraging violence against others with little fear of retaliation. In addition, by allowing a cyberstalker to harm another person at a distance, the victim is effectively depersonalised. In this way it can be argued that some of those who sympathise with the goals of far-right organisations may be reluctant to act in the offline world but more willing to act in the online world.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).