4 resultados para White Book on National Security of Poland
em Aston University Research Archive
Resumo:
This article evaluates the way in which copyright infringement has been gradually shifting from an area of civil liability to one of criminal penalty. Traditionally, consideration of copyright issues has been undertaken from a predominantly legal and/or economic perspectives. Whereas traditional legal analysis can explain what legal changes are occurring, and what impact these changes may have, they may not effectively explain ‘how’ these changes have come to occur. The authors propose an alternative inter-disciplinary approach, combining legal analysis with critical security studies, which may help to explain in greater detail how policies in this field have developed. In particular, through applied securitisation theory, this article intends to demonstrate the appropriation of this field by a security discourse, and its consequences for societal and legal developments. In order to explore how the securitisation framework may be a valid approach to a subject such as copyright law and to determine the extent to which copyright law may be said to have been securitised, this article will begin by explaining the origins and main features of securitisation theory, and its applicability to legal study. The authors will then attempt to apply this framework to the development of a criminal law approach to copyright infringement, by focusing on the security escalation it has undergone, developing from an economic issue into one of international security. The analysis of this evolution will be mainly characterised by the securitisation moves taking place at national, European and international levels. Finally, a general reflection will be carried out on whether the securitisation of copyright has indeed been successful and on what the consequences of such a success could be.
Resumo:
In recent times, some authors have argued that Host Country National (HCN) categorization of expatriate co-workers plays a major role in expatriate adjustment. Previous studies have argued that HCN categorization of expatriates maybe be based on gender, or national origin. In this study, using data from 331 HCNs in the U.K., we find that HCN expectations of foreigners may play a big role in categorization. Further, we find that categorization leads to lower levels of support offered by HCNs, which can affect expatriate adjustment. We discuss implications and offer suggestions for future research.
Resumo:
Since 1989, by drawing a new boundary between the EU and its eastern neighbours, the European Union has created a frontier that has been popularly described in the frontier states as the new 'Berlin Wall'. This book is the first comparative study of the impact of public opinion on the making of foreign policy in two eastern European states that live on either side of the new European divide: Poland and Ukraine. Focusing on the vocal, informed segment of public opinion and drawing on results of both opinion polls and a series of innovative focus groups gathered since the Orange Revolution, Nathaniel Copsey unravels the mystery of how this crucial segment of the public impacts on foreign policy-makers in both states. In developing this argument, Copsey takes a closer look at the business community and how important economic factors are in forming public opinion. Filling a gap in the literature currently available on the topic, this book presents a fresh approach to our understanding of Polish-Ukrainian relations and how the public's view of the past influences contemporary politics. It is an ideal resource for those researching in the field of Russian and Eastern European Studies.
Resumo:
We propose a model, based on the work of Brock and Durlauf, which looks at how agents make choices between competing technologies, as a framework for exploring aspects of the economics of the adoption of privacy-enhancing technologies. In order to formulate a model of decision-making among choices of technologies by these agents, we consider the following: context, the setting in which and the purpose for which a given technology is used; requirement, the level of privacy that the technology must provide for an agent to be willing to use the technology in a given context; belief, an agent’s perception of the level of privacy provided by a given technology in a given context; and the relative value of privacy, how much an agent cares about privacy in this context and how willing an agent is to trade off privacy for other attributes. We introduce these concepts into the model, admitting heterogeneity among agents in order to capture variations in requirement, belief, and relative value in the population. We illustrate the model with two examples: the possible effects on the adoption of iOS devices being caused by the recent Apple–FBI case; and the recent revelations about the non-deletion of images on the adoption of Snapchat.