12 resultados para Illegal marijuana
em Aston University Research Archive
Resumo:
The most significant environmental change to support people who want to give up smoking is the legislation to ban smoking in public places. Following Scotland in March 2006, and Wales and Northern Ireland in April 2007, England moves one step closer to being smoke free on 1 July 2007, when it becomes illegal to smoke in almost every enclosed public place and workplace. Social marketing will be used to support this health promoting policy and will become more prominent in the design of health promotion campaigns of the future. Social marketing is not a new approach to promoting health but its adoption by the Government does represent a paradigm shift in the challenge to change public opinion and social norms. As a result some behaviours, like smoking or excessive alcohol consumption, will no longer be socially acceptable. The Department of Health has decided that social marketing should be used in England to guide all future health promotion efforts directed at achieving behavioural goals. This paradigm shift was announced in Chapter 2 of the “Choosing health” White Paper with its emphasis on the consumer, noting that a wide range of lifestyle choices are marketed to people, although health as a commodity itself has not been marketed. The DoH has an internal social marketing development unit to integrate social marketing principles into its work and ensure that providers deliver. The National Centre for Social Marketing has funding to provide ongoing support, to build capacity and capability in the workforce. This article describes the distinguishing features of the social marketing approach. It seeks to answer some questions. Is this really a new idea, a paradigm shift, or simply a change in terminology? What do the marketing principles offer that is new, or are they merely familiar ideas repackaged in marketing jargon? Will these principles be more effective than current health promotion practice and, if so, how does it work? Finally, what are the implications for community pharmacy?
Resumo:
In recent years, the European Union has come to view cyber security, and in particular, cyber crime as one of the most relevant challenges to the completion of its Area of Freedom, Security and Justice. Given European societies’ increased reliance on borderless and decentralized information technologies, this sector of activity has been identified as an easy target for actors such as organised criminals, hacktivists or terrorist networks. Such analysis has been accompanied by EU calls to step up the fight against unlawful online activities, namely through increased cooperation among law enforcement authorities (both national and extra- communitarian), the approximation of legislations, and public- private partnerships. Although EU initiatives in this field have, so far, been characterized by a lack of interconnection and an integrated strategy, there has been, since the mid- 2000s, an attempt to develop a more cohesive and coordinated policy. An important part of this policy is connected to the activities of Europol, which have come to assume a central role in the coordination of intelligence gathering and analysis of cyber crime. The European Cybercrime Center (EC3), which will become operational within Europol in January 2013, is regarded, in particular, as a focal point of the EU’s fight against this phenomenon. Bearing this background in mind, the present article wishes to understand the role of Europol in the development of a European policy to counter the illegal use of the internet. The article proposes to reach this objective by analyzing, through the theoretical lenses of experimental governance, the evolution of this agency’s activities in the area of cyber crime and cyber security, its positioning as an expert in the field, and the consequences for the way this policy is currently developing and is expected to develop in the near future.
Resumo:
This thesis is based on ethnographic research carried out on a Liverpool protest movement which occurred between November, 1980 and July,1983. The protest movement was waged by residents of the working class community of Croxteth Liverpool who wished to retain their state secondary school, Croxteth Comprehensive. The Liverpool City Council voted in favour of closing Croxteth Comprehensive in January, 1981 because of its declining roles. Residents began theIr campaign as soon as they became aware of intentions to close the school at the end of the previous year. The campaIgn itself went through a number of different phases, distinguishable accordIng to the groups of people involved, the strategy and tactics they employed, the ways in which they justified their campaign, and the goals they pursued. In July of 1982 the organisation which led the protest, the Croxteth Community Action Committee, took illegal possession of the school buildings and ran a pilot summer school project. In September of 1982 they opened the school doors for all secondary pupils on the council estate and began running classes, with the help of volunteer teachers. The school was run successfully in this way for the entire 1982/83 school year. By the end of this period the school was officially reinstated by a new Labour Party majorIty on the city council. This thesis presents a comprehensive account of the entire campaign, from its beginning to end. The campaign is analysed in a number of ways: by situating the closure itself in the economic and political conditions of Liverpool in the 1980s, by examining the relation of Croxteth Comprehensive to its community, by describing the conditions in which different groups of people contributed to the campaign and the changes it went through in its use of tactics, and through a close examination of the activities which took place inside the school during its year of occupation. A number of levels of analysis are used in the study. To explain the closure and the early forms of resistance which developed to oppose it, the structural location of the local government of Liverpool in the late 1970s and early 1980s is described. To explain the relationship of the school to its community, the formation of a group of activists and their leaders, and the resources available to the protestors for pursuing their aims, a single-group model of social action is used. To analyse the establishment of social routines and schooling practices within the school during its occupation, action-theoretica1 models are drawn upon., The chapters of literature review and concept analysis with which this thesis begins link these different levels theoretIcalIy through a model of actIon and its conditions. The theoretical framework employed is reviewed in the last chapter. It is one which could be used to study any social movement, and has applications to other social phenomena as well. Lastly various issues within the sociology of education are examined in light of the events which took place in Croxteth Comprehensive, especially the theory of community education.
Resumo:
This thesis addresses the problem of information hiding in low dimensional digital data focussing on issues of privacy and security in Electronic Patient Health Records (EPHRs). The thesis proposes a new security protocol based on data hiding techniques for EPHRs. This thesis contends that embedding of sensitive patient information inside the EPHR is the most appropriate solution currently available to resolve the issues of security in EPHRs. Watermarking techniques are applied to one-dimensional time series data such as the electroencephalogram (EEG) to show that they add a level of confidence (in terms of privacy and security) in an individual’s diverse bio-profile (the digital fingerprint of an individual’s medical history), ensure belief that the data being analysed does indeed belong to the correct person, and also that it is not being accessed by unauthorised personnel. Embedding information inside single channel biomedical time series data is more difficult than the standard application for images due to the reduced redundancy. A data hiding approach which has an in built capability to protect against illegal data snooping is developed. The capability of this secure method is enhanced by embedding not just a single message but multiple messages into an example one-dimensional EEG signal. Embedding multiple messages of similar characteristics, for example identities of clinicians accessing the medical record helps in creating a log of access while embedding multiple messages of dissimilar characteristics into an EPHR enhances confidence in the use of the EPHR. The novel method of embedding multiple messages of both similar and dissimilar characteristics into a single channel EEG demonstrated in this thesis shows how this embedding of data boosts the implementation and use of the EPHR securely.
Resumo:
This article describes the process through which the subjectivity of the illegal immigrant is deconstructed and later reconstructed, as revealed by the Moroccan journalist and intellectual Rachid Nini in his book Diario de un ilegal/Diary of an Illegal Immigrant (2002), an account of the author's perils as an illegal immigrant in Spain. The analysis focuses firstly on the narrative form that Nini employs to give an account of his story, and secondly on the spatial displacement to which the subject and his subjectivity are exposed, which leads to the obliteration of his identity. The abrupt changes that the subject faces in a new location are paramount and impel him to a constant quest for self-definition and of negotiation with the new Other. Thus, the privileges that Nini enjoyed while in Morocco, those of a male journalist, poet, translator and intellectual with a university degree, disappear altogether once his plane has landed on the Canary Islands. In this new location, the place of origin and/or race are now what define his identity; he is now simply a moro - a Moor - he is not considered as an individual but, as will be shown, as a member of a homogenizing category which resists definition. The article finishes by addressing how Nini, in his quest to destroy homogenizing stereotypes, employs other stereotypes as though this were the only escape from the schizophrenic state the illegal immigrant identity had been forced into.
Resumo:
The concept of plagiarism is not uncommonly associated with the concept of intellectual property, both for historical and legal reasons: the approach to the ownership of ‘moral’, nonmaterial goods has evolved to the right to individual property, and consequently a need was raised to establish a legal framework to cope with the infringement of those rights. The solution to plagiarism therefore falls most often under two categories: ethical and legal. On the ethical side, education and intercultural studies have addressed plagiarism critically, not only as a means to improve academic ethics policies (PlagiarismAdvice.org, 2008), but mainly to demonstrate that if anything the concept of plagiarism is far from being universal (Howard & Robillard, 2008). Even if differently, Howard (1995) and Scollon (1994, 1995) argued, and Angèlil-Carter (2000) and Pecorari (2008) later emphasised that the concept of plagiarism cannot be studied on the grounds that one definition is clearly understandable by everyone. Scollon (1994, 1995), for example, claimed that authorship attribution is particularly a problem in non-native writing in English, and so did Pecorari (2008) in her comprehensive analysis of academic plagiarism. If among higher education students plagiarism is often a problem of literacy, with prior, conflicting social discourses that may interfere with academic discourse, as Angèlil-Carter (2000) demonstrates, we then have to aver that a distinction should be made between intentional and inadvertent plagiarism: plagiarism should be prosecuted when intentional, but if it is part of the learning process and results from the plagiarist’s unfamiliarity with the text or topic it should be considered ‘positive plagiarism’ (Howard, 1995: 796) and hence not an offense. Determining the intention behind the instances of plagiarism therefore determines the nature of the disciplinary action adopted. Unfortunately, in order to demonstrate the intention to deceive and charge students with accusations of plagiarism, teachers necessarily have to position themselves as ‘plagiarism police’, although it has been argued otherwise (Robillard, 2008). Practice demonstrates that in their daily activities teachers will find themselves being required a command of investigative skills and tools that they most often lack. We thus claim that the ‘intention to deceive’ cannot inevitably be dissociated from plagiarism as a legal issue, even if Garner (2009) asserts that generally plagiarism is immoral but not illegal, and Goldstein (2003) makes the same severance. However, these claims, and the claim that only cases of copyright infringement tend to go to court, have recently been challenged, mainly by forensic linguists, who have been actively involved in cases of plagiarism. Turell (2008), for instance, demonstrated that plagiarism is often connoted with an illegal appropriation of ideas. Previously, she (Turell, 2004) had demonstrated by comparison of four translations of Shakespeare’s Julius Caesar to Spanish that the use of linguistic evidence is able to demonstrate instances of plagiarism. This challenge is also reinforced by practice in international organisations, such as the IEEE, to whom plagiarism potentially has ‘severe ethical and legal consequences’ (IEEE, 2006: 57). What plagiarism definitions used by publishers and organisations have in common – and which the academia usually lacks – is their focus on the legal nature. We speculate that this is due to the relation they intentionally establish with copyright laws, whereas in education the focus tends to shift from the legal to the ethical aspects. However, the number of plagiarism cases taken to court is very small, and jurisprudence is still being developed on the topic. In countries within the Civil Law tradition, Turell (2008) claims, (forensic) linguists are seldom called upon as expert witnesses in cases of plagiarism, either because plagiarists are rarely taken to court or because there is little tradition of accepting linguistic evidence. In spite of the investigative and evidential potential of forensic linguistics to demonstrate the plagiarist’s intention or otherwise, this potential is restricted by the ability to identify a text as being suspect of plagiarism. In an era with such a massive textual production, ‘policing’ plagiarism thus becomes an extraordinarily difficult task without the assistance of plagiarism detection systems. Although plagiarism detection has attracted the attention of computer engineers and software developers for years, a lot of research is still needed. Given the investigative nature of academic plagiarism, plagiarism detection has of necessity to consider not only concepts of education and computational linguistics, but also forensic linguistics. Especially, if intended to counter claims of being a ‘simplistic response’ (Robillard & Howard, 2008). In this paper, we use a corpus of essays written by university students who were accused of plagiarism, to demonstrate that a forensic linguistic analysis of improper paraphrasing in suspect texts has the potential to identify and provide evidence of intention. A linguistic analysis of the corpus texts shows that the plagiarist acts on the paradigmatic axis to replace relevant lexical items with a related word from the same semantic field, i.e. a synonym, a subordinate, a superordinate, etc. In other words, relevant lexical items were replaced with related, but not identical, ones. Additionally, the analysis demonstrates that the word order is often changed intentionally to disguise the borrowing. On the other hand, the linguistic analysis of linking and explanatory verbs (i.e. referencing verbs) and prepositions shows that these have the potential to discriminate instances of ‘patchwriting’ and instances of plagiarism. This research demonstrates that the referencing verbs are borrowed from the original in an attempt to construct the new text cohesively when the plagiarism is inadvertent, and that the plagiarist has made an effort to prevent the reader from identifying the text as plagiarism, when it is intentional. In some of these cases, the referencing elements prove being able to identify direct quotations and thus ‘betray’ and denounce plagiarism. Finally, we demonstrate that a forensic linguistic analysis of these verbs is critical to allow detection software to identify them as proper paraphrasing and not – mistakenly and simplistically – as plagiarism.
Resumo:
Investigating the recent direct action campaigns against genetically modified crops in France and the United Kingdom, the authors set out to understand how contrasting judicial systems and cultures affect the way that activists choose to commit ostensibly illegal actions and how they negotiate the trade-offs between effectiveness and public accountability. The authors find evidence that prosecution outcomes across different judicial systems are consistent and relatively predictable and consequently argue that the concept of a “judicial opportunity structure” is useful for developing scholars’ understanding of social movement trajectories. The authors also find that these differential judicial opportunities cannot adequately account for the tactical choices made by activists with respect to the staging of covert or overt direct action; rather, explanations of tactical choice are better accounted for by movement ideas, cultures, and traditions.
Resumo:
We describe the case of a dysgraphic aphasic individual-S.G.W.-who, in writing to dictation, produced high rates of formally related errors consisting of both lexical substitutions and what we call morphological-compound errors involving legal or illegal combinations of morphemes. These errors were produced in the context of a minimal number of semantic errors. We could exclude problems with phonological discrimination and phonological short-term memory. We also excluded rapid decay of lexical information and/or weak activation of word forms and letter representations since S.G.W.'s spelling showed no effect of delay and no consistent length effects, but, instead, paradoxical complexity effects with segmental, lexical, and morphological errors that were more complex than the target. The case of S.G.W. strongly resembles that of another dysgraphic individual reported in the literature-D.W.-suggesting that this pattern of errors can be replicated across patients. In particular, both patients show unusual errors resulting in the production of neologistic compounds (e.g., "bed button" in response to "bed"). These patterns can be explained if we accept two claims: (a) Brain damage can produce both a reduction and an increase in lexical activation; and (b) there are direct connections between phonological and orthographic lexical representations (a third spelling route). We suggest that both patients are suffering from a difficulty of lexical selection resulting from excessive activation of formally related lexical representations. This hypothesis is strongly supported by S.G.W.'s worse performance in spelling to dictation than in written naming, which shows that a phonological input, activating a cohort of formally related lexical representations, increases selection difficulties. © 2014 Taylor & Francis.
Resumo:
The nexus between terrorism and organised crime consists in a strategic alliance between two non-state actors, able to exploit illegal markets, threaten the security of individuals, and influence policy-making on a global level. Recent Europol reports have pointed towards the importance of studying the links between organised crime and terrorist groups, and have underlined that the nature and extent of these connections have seldom been addressed from an academic perspective. Considering the degree of dangerousness that both organised crime and terrorism currently represent in the world, the collusion between these two phenomena is of urgent contemporary interest. Basing itself on geographical case-studies, this edited volume aims at contributing to the existing literature in three ways: by enriching the empirical knowledge on the nature of the crime-terror nexus and its evolution; by exploring the impact of the nexus within different economic, political and societal contexts; and by expanding on its theoretical conceptualization.
Resumo:
The nexus between terrorism and organised crime consists in a strategic alliance between two non-state actors, able to exploit illegal markets, threaten the security of individuals, and influence policy-making on a global level. Recent Europol reports have pointed towards the importance of studying the links between organised crime and terrorist groups, and have underlined that the nature and extent of these connections have seldom been addressed from an academic perspective. Considering the degree of dangerousness that both organised crime and terrorism currently represent in the world, the collusion between these two phenomena is of urgent contemporary interest. Basing itself on geographical case-studies, this edited volume aims at contributing to the existing literature in three ways: by enriching the empirical knowledge on the nature of the crime-terror nexus and its evolution; by exploring the impact of the nexus within different economic, political and societal contexts; and by expanding on its theoretical conceptualization.
Resumo:
The tobacco industry's future depends on increasing tobacco use in low-income and middle-income countries (LMICs), which face a growing burden of tobacco-related disease, yet have potential to prevent full-scale escalation of this epidemic. To drive up sales the industry markets its products heavily, deliberately targeting non-smokers and keeps prices low until smoking and local economies are sufficiently established to drive prices and profits up. The industry systematically flaunts existing tobacco control legislation and works aggressively to prevent future policies using its resource advantage to present highly misleading economic arguments, rebrand political activities as corporate social responsibility, and establish and use third parties to make its arguments more palatable. Increasingly it is using domestic litigation and international arbitration to bully LMICs from implementing effective policies and hijacking the problem of tobacco smuggling for policy gain, attempting to put itself in control of an illegal trade in which there is overwhelming historical evidence of its complicity. Progress will not be realised until tobacco industry interference is actively addressed as outlined in Article 5.3 of the Framework Convention on Tobacco Control. Exemplar LMICs show this action can be achieved and indicate that exposing tobacco industry misconduct is an essential first step.
Resumo:
SSince the external dimension of the European Union’s Justice and Home Affairs (JHA) began to be considered, a substantial amount of literature has been dedicated to discussing how the EU is cooperating with non-member states in order to counter problems such as terrorism, organized crime and illegal migration. According to the EU, the degree of security interconnectedness has become so relevant that threats can only be adequately controlled if there is effective concerted regional action. This reasoning has led the EU to develop a number of instruments, which have resulted in the exporting of certain elements of its JHA policies, either through negotiation or socialization. Although the literature has explored how this transfer has been applied to the field of terrorism and immigration, very little has been written on the externalisation of knowledge, practice and norms in the area of organized crime. This article proposes to bridge this gap by looking at EU practice in the development of the external dimension of organized crime policies, through the theoretical lens of the EU governance framework.