Search results

21 – 30 of over 17000
Article
Publication date: 1 September 1997

Daphyne Saunders Thomas

Considers that, in addition to all the positive attributes of the Internet, negatives are bound to emerge. Negative influences include the ability of children to access…

2141

Abstract

Considers that, in addition to all the positive attributes of the Internet, negatives are bound to emerge. Negative influences include the ability of children to access information that is not suitable for their age and the absence of laws or legal legislation to limit this access to the material. Laws are in existence prohibiting young people under the age of 18 years from accessing sexually explicit or sexually deviant materials. The problem with the Internet is the fact that there is no sanction limiting people from posting material of this kind. Warns that as an increasing number of children get online, solutions to these controversial issues must be discussed openly.

Details

Internet Research, vol. 7 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 28 June 2021

Caterina G. Roman

This paper is designed to critically review and analyze the body of research on a popular gang reduction strategy, implemented widely in the United States and a number of other…

Abstract

Purpose

This paper is designed to critically review and analyze the body of research on a popular gang reduction strategy, implemented widely in the United States and a number of other countries, to: (1) assess whether researchers designed their evaluations to align with the theorized causal mechanisms that bring about reductions in violence; and (2) discuss how evidence on gang programs is generated and consumed. That review and assessment is then used to frame a research agenda for studying gang interventions.

Design/methodology/approach

A case study design is used to generate a multi-faceted understanding of the possible avenues for evaluation research on the law enforcement-based strategy known as the Group Violence Intervention. The paper discusses questions that remain to be answered about the strategy, such as “what type of deterrence is operating?” and if the model actually works by the threat of deterrence, and not by removing high-risk offenders and shootings from the street, what activities are needed to maintain the effect?

Findings

Across roughly two dozen impact evaluations of GVI, none have examined the likely cause and effect components of this multi-partner strategy in reducing the violence. Furthermore, there are many issues related to the production and generation of criminal justice evaluation research that have adversely pushed the balance of evidence on what works in gang reduction toward law enforcement programming. However, there are many strategies that researchers can use to think broadly about appropriate and holistic research and evaluation on gangs and gang programming.

Practical implications

The recommendations for research, if implemented, can help build a body of knowledge to move toward community-based and restorative models of gang violence reduction.

Originality/value

This original piece is one of the first essays to contextualize and discuss how aspects of the production of social science research on gangs may directly impact what programs and strategies are implemented on the ground.

Details

Journal of Aggression, Conflict and Peace Research, vol. 13 no. 2/3
Type: Research Article
ISSN: 1759-6599

Keywords

Content available
Book part
Publication date: 12 November 2015

Abstract

Details

Legal Frontiers in Education: Complex Law Issues for Leaders, Policymakers and Policy Implementers
Type: Book
ISBN: 978-1-78560-577-2

Article
Publication date: 8 January 2018

Michael Habersam, Martin Piber and Matti Skoog

The purpose of this paper is to present the findings of a longitudinal study on the use of mandatory knowledge balance sheets (KBS) in Austrian public universities. It contributes…

4892

Abstract

Purpose

The purpose of this paper is to present the findings of a longitudinal study on the use of mandatory knowledge balance sheets (KBS) in Austrian public universities. It contributes to the discourse on fourth-stage intellectual capital (IC) research. Conclusions drawn from the analysis of the empirical material are expected to focus further research on fourth-stage IC and to improve practices of IC disclosure.

Design/methodology/approach

A mandatory KBS has been used to govern the Austrian Higher Education Institution sector for more than a decade. In a qualitative longitudinal case study, the authors analyze two series of qualitative interviews and documents in order to reveal functional and dysfunctional effects of the KBS in use.

Findings

The conclusions focus on the communicative culture in the implementation process, the way change processes are organized and the value of strategy for orientation, sense making and an effective allocation of resources.

Practical implications

The practical implications are twofold: first, to identify aspects of monetary, utilitarian, social and environmental value dimensions, a concerted effort to embed quantitative data in a discourse on qualitative impact on value would be needed. Second, the authors support a “communicative culture first” rather than a “tool-box first” approach.

Originality/value

Original empirical data have been gathered in a longitudinal study of a valuable and unique case. Retrospectively, a better understanding of the top-down implementation of the KBS and its pitfalls is achieved.

Details

Journal of Intellectual Capital, vol. 19 no. 1
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 23 June 2023

Abdirahman Hassan Hersi

Concerns on money laundering (ML) and terrorist financing increased, as ML accounted 2%–5% of the global GDP, with Switzerland, the USA, Canada, India and Russia having high…

Abstract

Purpose

Concerns on money laundering (ML) and terrorist financing increased, as ML accounted 2%–5% of the global GDP, with Switzerland, the USA, Canada, India and Russia having high laundering rates. Banks were fined over US$320bn in 2008, but money laundering still accounted for 3.6% of global GDP in 2009, thereby indicating the need for effective regimes. Therefore, this study aims to critically analyze the antimoney laundering (AML)/CFT regime of Somalia, identify loopholes in the regime, raise awareness and propose recommendations for regime improvement.

Design/methodology/approach

The qualitative research approach is used to compare Somalia’s AML/CFT regime with the corresponding regime of Malaysia through the black letter method combined with document analysis. Malaysia is selected as a benchmark for two reasons: firstly, it is an Islamic country like Somalia, and secondly, Malaysia has complied with integrity-related standards.

Findings

This study revealed that an impactful AML/CTF regime is reached by closing loopholes in the law, reevaluating and improving regulatory agencies and measures, facilitating formal financial services and collaborating with regional and international standard setters. According to the results, Somalia AML/CFT regime is counterproductive in criminalizing offenses; regulating digital currencies and mobile money, disclosures and nonfinancial business and provisions; and governing training requirements for regulatory agencies and financial institutions.

Originality/value

To the best of the author’s knowledge, this paper is the first of its kind in the study of Somalia’s regime building. Also, this study incorporates rich scholarly discourse on effective regime building.

Details

Journal of Money Laundering Control, vol. 27 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 23 April 2021

Anthony Löwstedt

Purpose – It may be time to reformulate the rejection of censorship. Freedom is not the only opposite of, strategic resource against, or antidote to, censorship…

Abstract

Purpose – It may be time to reformulate the rejection of censorship. Freedom is not the only opposite of, strategic resource against, or antidote to, censorship. Methodology/Approach – This chapter argues against censorship with a Kantian-normative approach (the deontological position of the categorical imperative), using conceptual analysis, constructivism, and international legal scholarship, from the standpoint of a humanity-wide duty to safeguard and promote cultural diversity and biodiversity. Increasingly visible weaknesses of the argument against censorship from the utilitarian standpoint of freedom, a negative argument, can be avoided in this way. Findings – Especially the neoliberal approach to freedom has no provisions against corporate and only little against copyright censorship, which are both becoming increasingly acute. Diversity, on the other hand, both biological and cultural, is argued to be instrumentally good, and intrinsically good, but the latter only if balanced by equality of basic rights. Originality/Value – The resulting moral and legal imperatives are to support, safeguard, and promote diversity, and thus to minimize both censorship in culture and selection/elimination in nature, but only to minimize them, simply because they cannot themselves be eliminated. It is impossible to eliminate elimination. This becomes clear when one considers self- and soft censorship. At least in the wide sense, censorship is inevitable – but sustainable development is impossible without strict minimization of censorship.

Details

Media and Law: Between Free Speech and Censorship
Type: Book
ISBN: 978-1-80071-729-9

Keywords

Content available
Book part
Publication date: 24 May 2021

Abstract

Details

The Law and Economics of Patent Damages, Antitrust, and Legal Process
Type: Book
ISBN: 978-1-80071-024-5

Article
Publication date: 1 January 1978

The Equal Pay Act 1970 (which came into operation on 29 December 1975) provides for an “equality clause” to be written into all contracts of employment. S.1(2) (a) of the 1970 Act…

1438

Abstract

The Equal Pay Act 1970 (which came into operation on 29 December 1975) provides for an “equality clause” to be written into all contracts of employment. S.1(2) (a) of the 1970 Act (which has been amended by the Sex Discrimination Act 1975) provides:

Details

Managerial Law, vol. 21 no. 1
Type: Research Article
ISSN: 0309-0558

Article
Publication date: 1 March 1992

Henry H. Perritt

America's movement to a digital network infrastructure may be threatened by the unavailability of high‐speed network channels to some sources of information. One reason for…

Abstract

America's movement to a digital network infrastructure may be threatened by the unavailability of high‐speed network channels to some sources of information. One reason for unavailability is fear by network intermediaries that they face legal liability for carrying harmful messages. Yet changing the law to require network intermediaries to provide equal access to their services raises First Amendment questions.

Details

Internet Research, vol. 2 no. 3
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 17 August 2010

Henry H. Perritt

The purpose of this paper is to discuss the USA's movement to a digital network infrastructure which may be threatened by the unavailability of high‐speed network channels to some…

Abstract

Purpose

The purpose of this paper is to discuss the USA's movement to a digital network infrastructure which may be threatened by the unavailability of high‐speed network channels to some sources of information.

Design/methodology/approach

One reason for unavailability is fear by network intermediaries that they face legal liability for carrying harmful messages. Yet changing the law to require network intermediaries to provide equal access to their services raises First Amendment questions.

Findings

A mechanism should be established for providers of network services to inform potential customers of the terms on which they handle traffic. An electronic forum for notices of access policy would be one way to implement this recommendation.

Originality/value

Uncertainty about equal access, tort liability and First Amendment privileges adversely affects commercialization of the Internet. Commercialization must begin with acceptance of three goals for digital electronic network policy: encouraging a diversity of information products, preventing suppliers of information content from being foreclosed from access to markets, and allowing persons suffering legal injury, because of information content, to obtain compensation based on fault.

Details

Internet Research, vol. 20 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

21 – 30 of over 17000