首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The paper argues that protecting post-mortem privacy is not solely beneficial for the deceased and their relatives but enables intergenerational data-sharing. However, legal approaches alone are unlikely to generate the trust required and need to be supplemented with tools that assist data subjects in controlling what data they risk sharing more efficiently and, which they prefer to delete. Using the example of Dickens' “Bonfire of letters” as an example, we argue that the main challenge for law and digital technology is the cumulative risk of data breadcrumbs, which are likely to be individually harmless. Based on research within the EPSRC project “Cumulative Revelations of Personal Data”, we discuss how our findings indicate possible avenues to assist in more efficient intergenerational data sharing.  相似文献   

2.
Being absent from work due to sickness is a critical issue for individuals and their employers, but it has traditionally fallen outside the scope of EU employment legislation. This article argues that this is changing; it examines case‐law under the Working Time and Employment Equality Directives. The article considers the justifications that the Court of Justice has advanced to explain this expansion in EU employment law. It finds that the Court has, at times, invoked fundamental social rights as a basis for interpreting employment legislation in a manner favourable to workers. Yet the way in which the Court deploys rights‐based reasoning can be difficult to anticipate, not least the countervailing weight attached to the interests of employers. The case studies indicate that fundamental rights discourse offers a possible foundation for more extensive readings of employment legislation, but it is not a simple ‘trump card’ for advocates of stronger worker protection.  相似文献   

3.
ABSTRACT

Copyright is inherently intertwined with the development of technology and none more so than the advent of the Internet and sharing technologies. More recently, social media platforms have become the latest challenge for copyright law and policy. This article builds on the literature that recognises the underlying conflict between copyright and social networking sites (SNSs); namely that the basic implication of copyright is the restriction of copying, whereas the ethos of social networking is the promotion of sharing. In particular, this article focuses on the disparity between the restricted acts of copying and communication to the public under copyright law and the encouragement of sharing on SNS Instagram. In doing so, it contextualises the debate surrounding copyright and social media and provides an understanding of the legal implications of using Instagram. As such this paper analyses (1) the infringement of copyright protected work on Instagram, and (2) the user-agreement and licensing of copyright material on Instagram. This study concludes that the disparity between the principles of copyright and social media lead to confusion and vulnerability of users. Therefore, it is suggested that Instagram should better inform its users of the implications of sharing third-party content as well as the terms of its user agreement. This could be done by implementing a copyright strategy, which includes a notice and takedown system as well as investing in producing educational content for users. Perhaps SNSs, such as Instagram might be more motivated to take steps to recognise intellectual property rights if they were considered Internet Services Provides such as YouTube.  相似文献   

4.
It has been traditional to demarcateMuller v. Oregon as the first Supreme Court case to benefit from a social science perspective andBrown v. Board of Education of Topeka as the first case to rely on social science evidence. This article explores the hypothesis that social perspectives have long been a part of the Court's decisionmaking when it has confronted difficult social issues. Two 19th-century race opinions,Dred Scott v. Sandford andPlessy v. Ferguson, are used to support this position. The authors suggest that the social perspectives contained in the other articles in this special issue reflect a long-standing association between social science information and law.We appreciate the suggestions made by Michael J. Saks on an earlier draft of this article.  相似文献   

5.
There is an urgent need for consistent data sharing policies that promote the advancement of science while respecting the values and interests of those providing their genetic data for research. Responding to the article of Jalayne J. Arias, Genevieve Pham-Kanter, and Eric G. Campbell, ‘The Growth and Gaps of Genetic Data Sharing Policies in the United States’, this commentary further explores the challenges of human subjects’ protection in existing data sharing policies. We will elaborate on the need for data sharing policies to accommodate variation in individual and group preferences around data sharing and privacy concerns by comparing our previously published data on patients’ and parents’ consent to data sharing and attitudes about privacy to data from focus groups with HIV-positive, underserved individuals who were asked about their willingness to participate in genetic research and share their data broadly. These studies support the observation of Arias, Pham-Kanter, and Campbell that researchers, and funding agencies will need to balance the privacy interests of groups as well as individuals in future genomic data sharing policies.  相似文献   

6.
This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence.The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date.This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally.In this article, the authors examine whether static and dynamic IP addresses are “personal data” as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector.  相似文献   

7.
This is the first article to undertake a sustained analysis of normative justifications for the Quistclose trust. Whilst much of the existing writing on this topic has focused on the better classification of such trusts – for instance, whether they are express, resulting, constructive or sui generis – this article asks why the law should recognise a trust in addition to any underlying legal relationship. Four key justifications are addressed, based on respecting party intention, unconscionability, fairness, and the incentivisation of desirable transactions. It will be argued that: (i) there are difficulties with each of these justifications, although an intention‐focused explanation is probably the most convincing; and (ii) the existing law and commentary lacks coherence and consistency, as seen in the mismatch between normative and doctrinal analysis, and the failure to properly address the ramifications of the Quistclose trust during insolvency.  相似文献   

8.

The increasing social visibility of Bondage/Domination, Discipline/submission and Sadism/Masochism (BDSM) within Western society has placed pressure on the criminal law to account for why consensual BDSM activities continue to be criminalised where they involve the infliction of even minor injuries on participants. With moralistic and paternalistic justifications for criminalisation falling out of favour, one key justification that is gaining traction within international commentary on BDSM is the “bogus BDSM argument”. The bogus BDSM argument contends that BDSM activities should be criminalised because otherwise false claims of BDSM will be used by defendants to excuse or minimise their criminal liability for nonconsensual abuse. This article refutes this argument by showing how it relies on premises that are unjustifiable, illogical and irrelevant. This article concludes that the decriminalisation of BDSM would not permit nonconsensual abuse so long as legal officials were equipped with sufficient knowledge about the norms and conventions of BDSM culture.

  相似文献   

9.
This paper contributes to the normative debate over capital punishment by looking at whether the role of executioner is one in which it is possible and proper to take pride. The answer to the latter question turns on the kind of justification the agent can give for what she does in carrying out the role. So our inquiry concerns whether the justifications available to an executioner could provide him with the kind of justification necessary for him to take pride in what he does. If they cannot, I argue, this sheds some light on their adequacy as justifications. The main argument of the paper is that social control arguments for the death penalty fail to provide an adequate justification. I also give some consideration to retributive justifications. The argument is developed through close attention to the depiction of Albert Pierrepoint in the film, Pierrepoint: The Last Hangman.  相似文献   

10.
The article analyzes women’s rights and the practice of polygamy in Ghana. The various justifications given for the practice and the colonial attitude towards the practice are examined. The article focuses on how polygamy impacts the attainment of substantive equality for Ghanaian women. As the total abolition of polygamy would be a challenging and problematic objective at this stage, due to the entrenched nature of the practice, it is instead recommended that law be used to protect women in polygamous marriages from domestic violence and ensure their property rights.  相似文献   

11.
ABSTRACT

Translational policing science must begin with explicitly communicated research aims and a shared vision for promoting safety. For researchers to approach police departments without first considering the concerns held by officers and their departments at large, is unethical, unproductive, and undermines efforts to secure longstanding mutually useful researcher-practitioner partnerships. In presenting a case study analysis of the multi-method National Justice Database’s recruitment practices, this article highlights some of the challenges that emerge when articulating study aims that hold relevance for public safety; defining theoretically- and solution-oriented research questions; administrative police data collection, analysis, and dissemination; and bolstering human research subject protection protocols for sworn officers who may be justifiably reluctant to participate in social science research endeavors. Implications for ethical policing research practice, fostering collaborative researcher-practitioner partnerships, and leveraging the benefits of data science are also discussed.  相似文献   

12.
Christopher Bennett has introduced a new inquiry into the capital punishment debate by looking at whether the role of executioner is one in which it is possible and proper to take pride. He argues that this will depend on the kind of justifications that an executioner can offer in defense of his role and takes as an example the English executioner Albert Pierrepoint as portrayed in the film Pierrepoint: The Last Hangman. Bennett claims that none of the justifications available to Pierrepoint are adequate, that his pride in his role was unjustified, and that this gives us reason to doubt those justifications for capital punishment. I am unpersuaded by Bennett’s arguments and give reasons for thinking that the role of executioner can under certain circumstances be an honorable vocation in which one may legitimately take pride.  相似文献   

13.
Data sharing     
The sharing of research data to permit secondary analyses is rooted in the collegial tradition of science. Recently there has been a gradual shift from viewing data sharing as a voluntary activity to considering sharing as an obligation of researchers. This paper identifies two important dimensions of data sharing: the degree to which the primary investigators may determine whether they will share their data and the reason for which the data set is being requested. In addition to discussing the dimensions of data sharing, the negative aspects of viewing data sharing as an obligation are discussed. These negative factors are increased burden on the primary investigator; lack of incentive to share data; and loss of control over the use of data and negative effects on scientific progress. Recommendations regarding data sharing policies are made in light of these negative effects.  相似文献   

14.
This study examines the manner and the extent to which the social sciences are prepared to address large scale, long term historical change. Particularly, the American Political Science Review and the American Sociological Review are subjected to a content analysis with regards to their analyses of the Vietnamese war and the Black uprisings of the 1960s. The results identify the fact that the most preeminent social science journals failed to analyze the conflicts; either prior to, during or after their emergence. This suggests, at a general level, that critical reflection of the dominant theoretical paradigms of social science did not take place. Moreover, it is suggested, on a more specific level, that the fundamental problem was the bankruptcy of the 1950s paradigm for the 1960s and the incapacity of the more influential journals to identify, address and overcome this intellectual limitation.  相似文献   

15.
Social science is increasingly important in judicial decision making and family law development. This increased use means that judges, lawyers, mental health professionals, and social scientists must assess the quality of social science information and communicate it in a multidisciplinary environment. This article provides tools for improving multidisciplinary communication by identifying logical, methodological, and community standards for assessment and communication that are fundamental both to the scientific method and to the inquiries the Daubert decision instructs judges to make in their gatekeeper evaluations of scientific information. Employing a common set of standards can result in a significant improvement in the quality of the social science knowledge used in judicial settings.  相似文献   

16.
Justifications for regulation are commonly based on the identification of market failures. This is however inadequate to account for much regulation, and sees regulation as inherently second best to market allocations. This article argues that, although some regulation will be based on market failure, other justifications can be found in the protection of rights and in the maintenance of social solidarity. Theoretical support for this last rationale can be found in the work of Durkheim and Duguit and the concept of public service. To accept this rationale for regulation has important implications both for regulatory policies and regulatory instruments.  相似文献   

17.
Under current UK legislation, only a man can commit rape. This paper argues that this is an unjustified double standard that reinforces problematic gendered stereotypes about male and female sexuality. I first reject three potential justifications for making penile penetration a condition of rape: (1) it is physically impossible for a woman to rape a man; (2) it is a more serious offence to forcibly penetrate someone than to force them to penetrate you; (3) rape is a gendered crime. I argue that, as these justifications fail, a woman having sex with a man without his consent ought to be considered rape. I then explain some further reasons that this matters. I argue that, not only is it unjust, it is also both a cause and a consequence of harmful stereotypes and prejudices about male and female sexuality: (1) men are ‘always up for sex’; (2) women’s sexual purity is more important than men’s; (3) sex is something men do to women. Therefore, I suggest that, if rape law were made gender neutral, these stereotypes would be undermined and this might make some (albeit small) difference to the problematic ways that sexual relations are sometimes viewed between men and women more generally.  相似文献   

18.
《Science & justice》2022,62(6):827-829
The challenging events of the past year have forced those of us working in higher education to adapt our teaching practices to conform to the restrictions put in place. For many this has been an opportunity to take a fresh view of the way material has been delivered in the past, and critically reflect on how it might be delivered in the future. There has been an explosion of innovative ideas and the introduction of support networks such as ‘#RemoteForensicCSI’ to aid with sharing these new innovations and examples of good practice.However, the past year has also helped to highlight a lack of an established network that could support the teaching of forensic science in the UK. Teaching networks within the UK exist for related disciplines, such as the Royal Society of Chemistry’s Higher Education Chemistry Teaching Network, but no network focuses on the teaching challenges specific to forensic science. Such a network could help to address the gap in pedagogical research to help support more effective teaching and give learners the best opportunities possible. This would complement the work of the Chartered Society of Forensic Science including upholding accreditation standards and the existing Link Member Scheme, whilst providing an environment to specifically support the teaching of forensic science. Any network could also look to link with other networks internationally such as the Council of Forensic Science Educators in the USA and identify examples of good practice worldwide that could be used to enhance and inform forensic science teaching in the UK.The teaching of forensic science is multifaceted with a need to strike a balance between practical skills and theoretical knowledge. Like many vocational courses forensic science teaching staff have a diverse range of backgrounds, encompassing both academic and practitioner experience. This results in a range of experiences and approaches to teaching and delivery, creating a fantastic melting pot for ideas, but outlets for sharing these innovative approaches are limited. This article will highlight some of the pedagogical gaps within forensic science teaching and areas that we could learn from. Most importantly, it will issue a clarion call to those working in this area to push for a UK Forensic Teaching Network.  相似文献   

19.
Political and legal globalization brings into question how to best conceptualize legitimacy and authority in the context of a plurality of potential audiences with distinct standards for evaluating legitimacy. This article proposes legitimacy chains, or the articulation of justifications linked through competitive processes of social evaluation across distinct social fields, as a concept for theorizing supranational authority. The concept is developed through an analysis of World Trade Organization (WTO) disputes over zeroing, a method for calculating import dumping. The article focuses on how the legitimacy work of various interlocutors enabled compliance despite contested legal validity claims, ultimately enhancing the authority of the WTO as final arbiter of legitimate trade practices.  相似文献   

20.
This article addresses a new field for legal education researchers. It describes and discusses emergent methods for computer-aided qualitative data analysis of social media in legal education. Social media contributes opportunities for learning, teaching, and research for legal educators and students. It potentially expedites collaborations, sharing, and collection of information and commentary on relevant and important issues and topics. These sources provide content and data for learning, teaching, and research. Benefits of computer-aided qualitative data analysis of social media in legal education include a systematic approach, transparency, accountability and durability, and innovative ways to communicate insights through textual and graphical communications. The article uses two examples in which computer-aided qualitative data analysis, combined with qualitative data analysis strategies, can contribute insights in and about legal education: analysis of social media discussions involving specific topics or events – to study students’ work, or academics’ interactions at conferences; and analysis of legal educators’ scholarly communications and social media activities, toward improving the visibility and influence of legal education scholarship. Research ethics for studies involving social media and human participants are also considered.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号