首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.

Infamous cases of toxic waste trade and research on its health and environmental implications have made the global waste trade a prominent environmental and social justice issue. Recently, such trade has shifted towards extracting resources from waste as recyclable components and used goods which could create income-generating opportunities and reduce the environmental burdens of waste trade from Global North to Global South countries. Nevertheless, studies highlight persistent problems in the access to these resources and allocation of responsibilities, risks and burdens from processing and disposal of traded waste in Global South countries. This article aims to contribute to the lessons learnt on access and allocation with respect to waste trade by focusing on issues of equity, fairness and distributive justice. Two cases are analysed: trade in discarded electronic and electric equipment (EEE) between the EU and Africa and trade in plastic materials between the UK and China. This study shows that exports of used EEE and recyclable plastic materials exacerbate the environmental burdens of Global South countries while also exporting new environmental risks and social burdens. At the same time, new demands for justice have emerged from Global South countries through waste ship back initiatives, and new international measures have also been adopted. While the access and allocation lens enabled the identification of persistent problems in Global North–South waste trade, directing future Earth System Governance research to the demands emerging from the Global South countries could offer insights into how to better address these problems and deal with growing global inequalities.

  相似文献   

2.

This study investigates the predictors of four types of cybercrime victimization/experiences: online harassment, hacking, identity theft, and receiving nude photos or explicit content. The effects of victimization opportunity and low self-control are examined as the primary independent variables in logistic regression analyses of data collected from a large sample of undergraduates enrolled at two universities in the United States. Results suggest that opportunity is positively related to each of the four types of online victimization, and that low self-control is associated with person-based, but not computer-based, forms of cybercrime. These findings speak to the utility, and also the limitations, of these perspectives in understanding cybercrime victimization risk among college students, and to the potentially criminogenic nature of the Internet.

  相似文献   

3.
The use of computers in the commission of crime, so-called ??cybercrime??, presents a considerable challenge to law enforcement. Central to the prosecution of cybercrime is the offence of unauthorised access to a computer, or ??hacking??. Originally conceived of as analogous to trespass, the trend in some jurisdictions has been toward punishing access to computer data per se. This issue also arises under the Council of Europe Convention on Cybercrime which criminalizes ??offences against the confidentiality, integrity and availability of computer data and systems??. As the criminal law traditionally provides protection only to limited forms of information, the increasing use of the criminal law to protect computer data therefore confers on it a status not enjoyed by information stored in other forms. Drawing upon the laws of Australia, the United Kingdom and the United States, this article explores the increasing criminalization of access to computer data. It describes the evolution of cybercrime laws and considers ways in which problems of over breadth may be avoided. Questions will also be raised as to the appropriate role of the criminal law in protecting information.  相似文献   

4.

Social vulnerabilities are exacerbated as a result of human mobilities in the face of climate-related disasters. Framing these mobilities as a response to disasters masks the underlying systemic issues but helps to explore and understand the connections between climate change, disasters, and displacement, and particularly helps to identify which internal displacement patterns emerge as either adaptive or maladaptive strategies.

Using a case study approach, this article juxtaposes Assam’s history with floods, erosion, and extreme rainfall since 2012–2013 with people’s mobility as an emerging form of adaptive capacity. It contextualises key concepts of gender justice, using them to understand gendered recovery processes following disasters. This article advances the concepts of justice and migration by looking at the role and impact various patterns of mobilities have on vulnerable groups, particularly women.

While there is an increasing body of research examining the climate change–migration nexus, what is needed is a focus on understanding internal displacement using an environmental and gender justice lens. This approach must include debate and further research on internal displacement, and strengthening policy approaches to make them both climate resilient and migrant inclusive.

  相似文献   

5.
With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer crimes namely hacking, dissemination of malware and denial of service attacks. The cybercrime rules are however slightly outdated due to changes that have occurred in the field of cybercrime since the enactment of the Code. The surge of new varieties of cybercrimes previously uncovered under the Code and the need to legislate tailored evidentiary and procedural rules for investigation and prosecution of cybercrimes have recently prompted the Ethiopian government to draft modern and comprehensive cybercrime legislation, but the draft law still needs further work on cybercrimes in light of other major legislative developments at regional and national levels. This article closely examines major developments in cybercrime law and practice in Ethiopia since the enactment of the first set of cybercrime rules and proffers recommendations towards a unified cybercrime regime.  相似文献   

6.
7.
This article provides a multi-disciplinary overview of the contemporary cybercrime ecosystem and its developments. It does so by reviewing and synthesising recent cybercrime research from fields such as cybersecurity, law and criminology. The article also examines ways in which gaps between the aforementioned fields arise and how to lessen them to increase cybersecurity. This article is divided into four main parts. The first part offers background on cybercrime and some of its main elements. It defines terminology, sets out a legal taxonomy of cybercrime offences and presents the estimated costs, threat agents and characteristics of various illicit activities and technical aspects of cybercrime. Parts two, three and four build on this preceding analysis by (separately) examining three prominent threat vectors within the ecosystem – malware, the darknet and Bitcoin and other cryptocurrencies. For each threat vector, the article identifies and investigates features, history, functions and current and expected states of development within the ecosystem. Through its attention to and synthesis of current research and results from different fields, this article offers a synoptic account of the cybercrime ecosystem, which can bridge potential knowledge gaps between fields.  相似文献   

8.
This article analyzes the European legal framework on cybercrime. Initially, it argues the challenges of cybercrime to traditional criminal justice systems. Subsequently, it focuses on the criminal law framework on cybercrime with a mainly European perspective. The European legal framework provides a three-path solution: the reduction of frictions among national legislations, the introduction of new investigative powers and the facilitation of international cooperation. The article presents and discusses each solution. Further, it argues that the effective implementation of the main legal instruments does not seem to depend on the legal enforceability of these international measures. Contrarily, other, non legal, factors such as national security, politics, the economy and the public opinion appear to stimulate the spontaneous implementation of the European legal framework. In this context, the added value of the EU action is rather low, although the Treaty of Lisbon and the Stockholm Programme may improve this situation in the long term.  相似文献   

9.
ABSTRACT

This article explores the propriety of long-term efforts of the South African criminal justice system in combating human trafficking. Though a crime of global dimension, human trafficking has been a reverberating issue of concern to the South African State. Steps have been taken by the State to address this menace, especially from the legal standpoint, and the enlistment of human trafficking among crimes that require an effective criminal justice approach to deal with; yet, the menace has persisted. From a broader doctoral study, using qualitative method, it was discovered (amongst others) that as currently structured, the South African criminal justice system cannot effect a long-term combating strategies against human trafficking. Findings also indicate that the solution to the precipitating factors that fuel the trade in human commodity lies outside the scope and mandate of the criminal justice system. The study further recommends that for an effective response, it is expedient for the State to first address the socio-economic, cultural and political nuances that fuel the trade, rather than mount impracticable pressure on its criminal justice institutions to perform an unrealistic task.  相似文献   

10.
Abstract

Various terms have been used to describe the intersection between computing technology and violations of the law-including computer crime, electronic crime, and cybercrime. While there remains little agreement on terminology, most experts agree that the use of electronic devices to commit crime has increased dramatically and is now commonplace. It is the role of the digital investigator to bring cybercriminals to justice. Cybercrime however differs from traditional crime and presents a variety of unique challenges including the variety of electronic devices available, amount of data produced by these devices, the absence of standard practices and guidelines for analyzing that data, the lack qualified personnel to perform investigations and the lack of resources to provide on-going training. This paper examines these challenges  相似文献   

11.
This paper contributes to research seeking to understand if and how legislation can effectively counter cybercrimes that compromise personal data. These ‘data crimes’, which are the ‘dark side’ of big data and the data economy enabled by cloud computing, display cascading effects, in that they empower disparate criminals to commit further crimes and victimise a broad range of individuals or data subjects. The paper addresses the under-researched area of sentencing, which, as the last step of the judicial process, plays a crucial role in how the law is interpreted and implemented.This paper investigates courts’ approach to the evolving technological environment of cybercrime captured by data crime and the cascade effect and whether the cascade effect can assist courts in dealing with data-driven cybercrime. The paper examines original data collected from UK courts, namely 17 sentencing remarks relating to cybercrime court cases decided in England & Wales between 2012 and 2019. The analysis shows that courts appreciate the impact of data crime and their cascading effects, but that the complexity of the offences is lost at sentencing, arguably due to the negative impact of systemic factors, such as technology neutral law and the lack of legal authorities.After examining such systemic factors, the paper suggests how the cascade effect could aid sentencing by adding specificity and context to data crime. The paper ends with avenues for further research relating to debates on fair cybercrime sentencing and open justice.  相似文献   

12.

The legal profession has remained relevant in bringing about positive transformation in society — with leaders, policymakers, and change makers around the world mostly possessing a background in the law. That said, the trust, and positive image, enjoyed by legal professionals continues on a declining path. Considered more glamorous, the legal profession has gone astray from the path of social justice. In this article, I argue that the negative perception of legal professionals is, in large part, because of the way legal professionals are taught and trained in law schools. I argue that legal teaching pedagogy in South Asia, and generally in developing countries, is a product of colonial structure. Even after the so-called decolonisation movement, law schools and universities, for example in South Asia, institutionalised a legal pedagogy unsuited to the epistemic actualities of their societies. A law student in South Asia was and continues to be taught the Western conception of what the law is and its relationship to justice. In a legal culture carrying the transplanted laws of the colonisers, the students of developing countries are meticulously trained in the technical skills of reasoning and interpretation by applying Eurocentric guidelines of positivist construction. In light of this, I propose a shift in legal education: to transform the existing legal education and pedagogy into ‘justice education’. I focus on the ancient principles — located in the Eastern legal philosophy — of empirical reasoning and the importance of the human nature of sociability in arriving at social justice. To combat the tendency of insulating law students from societal problems, I propose a social justice-driven legal pedagogy. I have also reflected on some practices that ‘are’ and highlighted other practices that ‘ought to be’. My thesis connotes that the legal profession has an innate role in building the capability of individuals who are deprived and excluded. In line with it, I present examples of scalable clinical legal education being practised specially by the Kathmandu School of Law that can create multidimensional legal professionalism.

  相似文献   

13.
This article considers the purchasing of hacking technology by governments and the role of government procurement processes in regulating the hacking market and reducing risks to the buyer. While the proliferation of hacking technology for government actors has led to various proposed solutions for accountability, little consideration has been given to public purchasing of this technology. This article explores whether public contracting processes could be used to help minimize the risks that arise from the use of government hacking technology, and, if so, the types of contractual clauses and institutional supports that might be useful to achieve that goal. In exploring this issue, this article considers theories of government by contract and the publicization of the private sector. These theories posit that public contracting can be used as a vehicle to impose public considerations—for example, certain policy goals—on the private sector. It argues that requirements of transparency and accountability that inhere on the public sector could be transferred in part to the private sector through the vehicle of a public contract and explores how public contracts for government hacking technology could be structured in order to reduce risks posed by the use of this technology.  相似文献   

14.
ABSTRACT

Drawing upon feminist research on women in crime and justice, this study examines patterns of female crime in Israel over four decades and the criminal justice response to female offenders over two decades. The data show that crime patterns of Israeli women and the criminal justice response to their transgressions show remarkable resemblance to those discerned in other western countries. The article concludes that feminist insights and explanatory mechanisms suggested in other western countries are congruent with findings about women in crime and justice in Israel.  相似文献   

15.
ABSTRACT

This article investigates the role of crime scene technicians in the Swedish criminal justice system, and particularly how Swedish crime scene technicians not only examine crime scenes but also facilitate the criminal justice system’s joint production of forensic evidence. It proposes thinking about the criminal justice system as a conglomeration of epistemic cultures, that is, of communities with different ways of producing and understanding forensic evidence. Such a perspective makes it possible to understand interprofessional frictions as epistemic frictions as well as to draw attention to the facilitations, mediations and translations that crime scene technicians perform. This perspective also makes it possible to illuminate how the crime scene technicians’ professionalization – a professionalization from the outside – affects both their future crime scene work and their facilitations.  相似文献   

16.

The late NR Madhava Menon, known widely as ‘the father of modern legal education in India’, was also a leading voice for global legal education reform by championing ‘socially relevant legal education’ through clinical legal education throughout the world. This article concentrates on his seminal role in the founding of the Global Alliance for Justice Education (GAJE) and the crafting of its mission statement. Drawing on a number of key moments in Dr Menon’s lifelong dedication to the twin causes of legal education and social justice, it highlights how he brought an international perspective to his critical work on legal education reform in India by enlisting international collaborators, how he motivated international colleagues to bring similar reforms to their countries, and how he mentored new generations of legal educators in what has become a true global clinical movement. The article focuses specifically on how the guiding principles of GAJE’s inaugural conference, which Dr Menon co-chaired in 1999, reflect his vision of global clinical legal education that continues to guide GAJE and the global clinical movement today.

  相似文献   

17.
A substantial body of sociolegal scholarship suggests that the legitimacy of the law crucially depends on the public's perception that legal processes are fair. The bulk of this research relies on an underdeveloped account of the material and institutional contexts of litigants' perceptions of fairness. We introduce an analysis of situated justice to capture a contextualized conception of how litigants narrate fairness in their actual legal encounters. Our analysis draws on 100 in‐depth interviews with defendant's representatives, plaintiffs, and lawyers involved in employment discrimination lawsuits, selected as part of a multimethod study of 1,788 discrimination cases filed in U.S. district courts between 1988 and 2003. This article offers two key empirical findings, the first at the level of individual perceptions and the second at the level of legal institutions. First, we find that neither defendants' representatives nor plaintiffs believe discrimination law is fair. Rather than sharing a complaint, however, each side sees unfairness only in those aspects of the process that work to their disadvantage. Second, we demonstrate that the very notion of fairness can belie structural asymmetries that, overall, profoundly benefit employers in employment discrimination lawsuits. We conclude by discussing how a situated justice analysis calls for a rethinking of empirical research on fairness. Audio recordings of respondents quoted in this article are available online. 1   相似文献   

18.
Abstract

Numerous studies have found evidence of racial discrimination in the imposition of the death penalty, particularly in the South. In this article, the authors posit that the legal antecedents of modern discrimination in capital cases are found in the codified rules that governed slavery. Using the capital punishment provisions of the 1858 Slave Code of Tennessee, the biases inherent in the laws of the Old South are documented. The discriminatory practices that blacks faced both as victims and offenders under the slave codes are linked through historical analysis and conflict theory to the current discriminatory practices documented by modern death penalty research.  相似文献   

19.
Hacking trauma is prevalent in forensic cases involving genocide and dismemberment, but research into the identification of this type of trauma is lacking. The present study examines characteristics of hacking and blunt force skeletal trauma in order to determine if there is a point at which blunt force trauma becomes distinguishable from hacking trauma. Ten implements with a range of blade angles (i.e., the striking surface of the implement) were used in conjunction with a controlled-force hacking device to impact 100 limb bones of white-tailed deer (Odocoileus virginianus). Observations of the trauma included the occurrence and degree of fragmentation, the entrance widths of the impacts, and composite scores of six hacking characteristics, especially the distinctive V-shaped kerf. ANOVA tests and regression analyses were used to assess the relationships between these characteristics and the blade angles. A significant relationship (p-value = 0.011) was found between the composite hacking scores and the blade angles, indicating that blunt force and hacking trauma can be distinguished. The entrance widths of the impacts exhibited a significant relationship with the blade angles (p-value = 0.037). There was also a significant relationship between the visibility of a V-shaped kerf in the bones (p-value = 0.003), with visibility decreasing around the 60° blade angle. These data should assist in establishing guidelines to differentiate hacking and blunt force skeletal trauma in cases where the implement is on a spectrum between sharp and blunt.  相似文献   

20.
Abstract

Presidents often give speeches about crime issues as a way to convince the public that there are significant problems for which an easy solution can be found. Studies have shown that presidential rhetoric on crime not only influences the public’s perception of the problem, but also the perception of the best solution. More recent research has demonstrated that presidents sometimes draw on the public’s fear of crime as a way to further affect the public’s perception of crime. In other words, presidents link crime with the public’s anxiety about other fearful events as a way to further impact the public’s perception of a problem (and thus further their agenda). This study examines presidential rhetoric on cybercrime to determine if executives link cybercrime with other issues such as national security. The findings provide credibility to both Cavelty’s threat frames approach as well as assertions made regarding the politics of fear.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号