Search results

1 – 10 of over 2000
Open Access
Book part
Publication date: 4 May 2018

Wilda Sitorus, Saib Suwilo and Mardiningsih

Hamming distance of a two bit strings u and v of length n is defined to be the number of positions of u and v with different digit. If G is a simple graph on n vertices and m

Abstract

Hamming distance of a two bit strings u and v of length n is defined to be the number of positions of u and v with different digit. If G is a simple graph on n vertices and m edges and B is an edge–vertex incidence matrix of G, then every edge e of G can be labeled using a binary digit string of length n from the row of B which corresponds to the edge e. We discuss Hamming distance of two different edges of the graph G. Then, we present formulae for the sum of all Hamming distances between two different edges of G, particularly when G is a path, a cycle, and a wheel, and some composite graphs.

Open Access
Book part
Publication date: 4 June 2021

Moira Aikenhead

Canada criminalized the nonconsensual distribution of intimate images in 2014. Lawmakers and commentators noted that this new offense would fill a legislative gap in relation to…

Abstract

Canada criminalized the nonconsensual distribution of intimate images in 2014. Lawmakers and commentators noted that this new offense would fill a legislative gap in relation to “revenge pornography,” which entails individuals (typically men) sharing intimate images of their ex-partners (typically women) online in an attempt to seek revenge or cause them harm. Feminist writers and activists categorize revenge pornography as a symptom and consequence of “rape culture,” in which sexual violence is routinely trivialized and viewed as acceptable or entertaining, and women are blamed for their sexual victimization. In this chapter, I analyze Canada's burgeoning revenge pornography case law and find that these cases support an understanding of revenge pornography as a serious form of communal, gendered, intimate partner violence, which is extremely effective at harming victims because of broader rape culture. While Canadian judges are taking revenge pornography seriously, there is some indication from the case law that they are at risk of relying on gendered reasoning and assumptions previously observed by feminists in sexual assault jurisprudence, which may have the result of bolstering rape culture, rather than contesting it.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 9 May 2023

Volker Stocker, William Lehr and Georgios Smaragdakis

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…

Abstract

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Content available
Book part
Publication date: 12 November 2015

Abstract

Details

Legal Frontiers in Education: Complex Law Issues for Leaders, Policymakers and Policy Implementers
Type: Book
ISBN: 978-1-78560-577-2

Open Access
Book part
Publication date: 9 December 2021

Mark Taylor and Richard Kirkham

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such…

Abstract

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such interference should be clearly detailed in law, overseen by a transparent process and not left to the vagaries of administrative discretion. If a state surveils those it governs and claims the interference to be in the public interest, then the evidence base on which that claim stands and the operative conception of public interest should be subject to critical examination. Unfortunately, there is an inconsistency in the regulatory burden associated with access to confidential patient information for non-health-related surveillance purposes and access for health-related surveillance or research purposes. This inconsistency represents a systemic weakness to inform or challenge an evidence-based policy of non-health-related surveillance. This inconsistency is unjustified and undermines the qualities recognised to be necessary to maintain a trustworthy confidential public health service. Taking the withdrawn Memorandum of Understanding (MoU) between NHS Digital and the Home Office as a worked example, this chapter demonstrates how the capacity of the law to constrain the arbitrary or unwarranted exercise of power through judicial review is not sufficient to level the playing field. The authors recommend ‘levelling up’ in procedural oversight, and adopting independent mechanisms equivalent to those adopted for establishing the operative conceptions of public interest in the context of health research to non-health-related surveillance purposes.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Suzie Dunn

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United…

Abstract

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful technology-facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful technology-facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain technology-facilitated behaviors as forms of violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 May 2018

Budiman Ginting, Rosnidar Sembiring, Mahmul Siregar and Afrita Abduh

PurposeThe purpose of this paper is to provide legal certainty in developing a special economic zone (SEZ) in order to build the national and regional economy. Besides that, an

Abstract

PurposeThe purpose of this paper is to provide legal certainty in developing a special economic zone (SEZ) in order to build the national and regional economy. Besides that, an other purpose is to push the Central Government, the Provincial Government, the Regional Goverment, and the Management Institution to complete the infrastucture and also harmonize the policies and regulations regarding the SEZ in Indonesia, especially in Sei Mangkei.

Design/Methodology/ApproachThe research method that authors used is the sociological legal research and the normative legal research which approach the economic development in social economic zone in Sei Mangkei, the issues that happened in reality, and they analyze the related regulation in SEZ.

FindingsThe result thus obtained shows that legal certainty has not been realized completely which caused undevelopment of SEZ in Sei Mangkei. Besides the legal certainty factor, the unfinished infrastructure also caused the undevelopment, even though according to Act number 39 of 2009 regarding SEZ, an operated SEZ has fulfilled the needs and appropriateness of the infrastructure. In reality, Sei Mangkei SEZ, which has been operational, is not supported by the appropriateness of the infrastructure such as the port, train rail, hazardous waste material management facility, final disposal vessel, and also the issue of electricity and gas.

Practical ImplicationsThis result can help Central Government or Provincial Government in establishing the regulations that can provide the legal certainty in developing the SEZ in Sei Mangkei.

Originality/ValueIn addition to increasing the role of law in economic development understanding, this paper can be of legal and economic relevance.

Details

Proceedings of MICoMS 2017
Type: Book
ISBN:

Keywords

Content available
Book part
Publication date: 20 June 2017

David Shinar

Abstract

Details

Traffic Safety and Human Behavior
Type: Book
ISBN: 978-1-78635-222-4

Content available
Book part
Publication date: 15 September 2020

Jo Easton

Abstract

Details

Death in Custody
Type: Book
ISBN: 978-1-83909-026-4

Access

Only content I have access to

Year

Content type

Book part (2464)
1 – 10 of over 2000