8 resultados para Insane, Criminal and dangerous
em Aston University Research Archive
Resumo:
This is the new edition of the leading work on the law and practice of auctions. The book looks at every aspect of auction practice from the economics of auction sales and restrictions on trading to criminal and other liabilities of the auctioneer. There is also a chapter on VAT. There have been important recent developments in the field of consumer protection and the book has been substantially revised to reflect these. In addition to general updating the new edition considers the practice of online auctions for the first time. There is also a section on looted art . The book continues to draw on case law from other common law jurisdictions.
Resumo:
Purpose - To study how the threats of terrorism are being handled by a variety of UK companies in the travel and leisure sector in the UK in the post 9/11 era. Design/methodology/approach - A review of the literature of risk management in a world that is perceived to be more risky as a result of the terrorist attacks on the US on 11 September 2001 (9/11) is presented. Describes the application of theories of organizational resilience and institutions to frame an understanding of how managers make sense of terrorism risk and comprehend uncertainty. Reports a qualitative analysis of themes in interviews conducted with 25 managers from 6 unnamed organizations in the aviation industry (3 organizations) and the UK travel and leisure industry (3 organizations), representing a catering supplier, an airport, an airline, a tour company, a convention centre, and an arts and entertainment centre. Findings - The results indicated that the three organizations in the aviation industry prioritize threats from terrorism, whilst the three organizations in the leisure and travel sector do not, suggesting that the managers in the travel and leisure industry apply a probabilistic type of thinking and believe the likelihood of terrorism to be low. Reports that they give precedence to economic concerns and numerous other threats to the industry. Concludes that managers fall prey to the 'ludic fallacy', which conceives all odds as being calculable and hence managers conceive the terrorism risk as low while also expecting institutional factors to pre-empt and control terrorism threats, a reaction which the authors believe to be rather complacent and dangerous. Originality/value - Contributes to the research literature on risk management by revealing the gap in the ability of existing management tools and methodologies to deal with current and uncertain threats facing organizations due to terrorism.
Resumo:
This article explains the impact of substate nationalism on the political dynamic surrounding ethnic kin migration through a case study of Sri Lankan Tamil refugees in the southern Indian State of Tamil Nadu. Examples drawn from the migration studies literature identify ethnic kinship between refugees and host as an indicator of favorable reception and assistance. While this expectation is borne out to an extent in the Tamil Nadu case, it is tempered by a period of hostility following the 1991 assassination of former Indian Prime Minister Rajiv Gandhi by an LTTE suicide bomber, when the refugees were figured as a disruptive and dangerous presence by Tamil Nadu's political elites. A version of the "triadic nexus" model of kin state relations, reconfigured to accommodate the larger political unit within which the substate nationalism is incorporated, is proposed as a framework of analysis for these events. This can better account for Tamil Nadu's substate ethnonationalist elite's movement between expressions of coethnic solidarity with the refugees and the more hostile, security-focused response postassassination. © Taylor & Francis Group, LLC.
Resumo:
Why is the public presentation of the war on terror suffused with sexualised racism? What does this tell us about ideas of gender, sexuality, religious and political identity and the role of the state in the Western powers? Can we diffuse inter-ethnic conflicts and change the way the West pursues its security agenda by understanding the role of sexualised racism in the war on terror? In asking such questions, Gargi Bhattacharyya considers how the concepts of imperialism, feminism, terror and security can be applied, in order to build on the influential debates about the sexualised character of colonialism. She examines the way in which western imperial violence has been associated with the rhetoric of rights and democracy - a project of bombing for freedom that has called into question the validity of western conceptions of democracy, rights and feminism. Such rhetoric has given rise to actions that go beyond simply protecting western interests or securing access to scarce resources and appear to be beyond instrumental reason. The articulations of racism that appear with the war on terror are animated by fears and sexual fantasies inexplicable by rational interest alone. There can be no resolution to this seemingly endless conflict without understanding the highly sexualised racism that animates it. Such an understanding threatens to pierce the heart of imperial relations, revealing their intense contradictions and uncovering attempts to normalise violent expropriation.
Resumo:
DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT
Resumo:
In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.
Resumo:
This article begins by setting out the human rights provisions that apply to social media expression. It then provides insight into the part social media plays within our society by analysing the social media landscape and how it facilitates a ‘purer’ form of expression. The social media paradox is explored through the lens of current societal issues and concerns regarding the use of social media and how these have manifested into litigation. It concludes by analysing the tension that the application of an array of criminal legislation and jurisprudence has created with freedom of expression, and whether this can successfully mitigated by the Director of Public Prosecution’s Interim Guidelines.
Resumo:
Book review: Heidelberg, Dordrecht, London, and New York, Springer, 2010, 189 pp., £93.55 (hardcover), ISBN 978-3-642-04330-7, e-ISBN 978-3-642-04331-4