1,007,506 research outputs found

    A Winning Hand: A Proposal for an International Regulatory Schema with Respect to the Growing Online Gambling Dilemma in the United States

    Full text link
    While a multitude of Internet enterprises folded in the 1990s, online gambling websites not only have held strong, but appear to be ready to increase the stakes. No business relating to the Internet currently generates more revenue than online gambling, and that trend does not look like it will change soon. While many Americans desire to participate in this form of cyber-gambling, the current legality of their ability to do so remains vague. For the most part, an American\u27s ability to gamble currently resides under the purview of state law and a hodgepodge of antiquated federal wire acts. The nature of the Internet, however, mandates that any scheme, regulatory or prohibitory, be constructed in the international arena. For various reasons, there have been efforts by members of Congress to create strong prohibitory legislation specifically targeting Internet gambling. The Author analyzes not only whether a domestic prohibition schema is the best model to implement, but also whether such a model could even be truly effective. The Author further shows that an international regulatory model can provide a legitimate method of control while allowing individual countries to maintain discretion over the form of online gambling they allow to their citizens. At the same time, this international regulatory schema would still provide a valid international enforcement net against offenders. Under this regulatory schema, problem gamblers can be protected while still preserving the opportunity for other patrons to get lucky and hit it big

    Middle Grades Principal Credentialing: A Vanishing Requirement

    Get PDF
    Limited research explores how school administrators learn the leadership skills, knowledge, and dispositions that will support young adolescents, particularly how administrators are prepared and credentialed to lead middle grades schools. The purpose of this research was to examine which states offered and/or required administrator credentials specific to middle grades and why states do or do not offer or require such credentialing. Analysis of the data indicates that states are moving away from specific credentialing for middle grades school administrators, with only one state still offering such a credential. Although state credentialing officers indicated the value of a specific middle grades principal credential, the need for flexibility for districts and credential candidates was the overarching reason for eliminating or not having a middle grades administrative credential. Moving away from specific middle grades credentialing has a number of implications for students, schools, preparations programs, and advocates of middle grades education

    Surveillance, big data and democracy: lessons for Australia from the US and UK

    Get PDF
    This article argues that current laws are ill-equipped to deal with the multifaceted threats to individual privacy by governments, corporations and our own need to participate in the information society. Introduction In the era of big data, where people find themselves surveilled in ever more finely granulated aspects of their lives, and where the data profiles built from an accumulation of data gathered about themselves and others are used to predict as well as shape their behaviours, the question of privacy protection arises constantly. In this article we interrogate whether the discourse of privacy is sufficient to address this new paradigm of information flow and control. What we confront in this area is a set of practices concerning the collection, aggregation, sharing, interrogation and uses of data on a scale that crosses private and public boundaries, jurisdictional boundaries, and importantly, the boundaries between reality and simulation. The consequences of these practices are emerging as sometimes useful and sometimes damaging to governments, citizens and commercial organisations. Understanding how to regulate this sphere of activity to address the harms, to create an infrastructure of accountability, and to bring more transparency to the practices mentioned, is a challenge of some complexity. Using privacy frameworks may not provide the solutions or protections that ultimately are being sought. This article is concerned with data gathering and surveillance practices, by business and government, and the implications for individual privacy in the face of widespread collection and use of big data. We will firstly outline the practices around data and the issues that arise from such practices. We then consider how courts in the United Kingdom (‘UK’) and the United States (‘US’) are attempting to frame these issues using current legal frameworks, and finish by considering the Australian context. Notably the discourse around privacy protection differs significantly across these jurisdictions, encompassing elements of constitutional rights and freedoms, specific legislative schemes, data protection, anti-terrorist and criminal laws, tort and equity. This lack of a common understanding of what is or what should be encompassed within privacy makes it a very fragile creature indeed. On the basis of the exploration of these issues, we conclude that current laws are ill-equipped to deal with the multifaceted threats to individual privacy by governments, corporations and our own need to participate in the information society

    The onus on us? Stage one in developing an i-Trust model for our users.

    Get PDF
    This article describes a Joint Information Systems Committee (JISC)-funded project, conducted by a cross-disciplinary team, examining trust in information resources in the web environment employing a literature review and online Delphi study with follow-up community consultation. The project aimed to try to explain how users assess or assert trust in their use of resources in the web environment; to examine how perceptions of trust influence the behavior of information users; and to consider whether ways of asserting trust in information resources could assist the development of information literacy. A trust model was developed from the analysis of the literature and discussed in the consultation. Elements comprising the i-Trust model include external factors, internal factors and user's cognitive state. This article gives a brief overview of the JISC funded project which has now produced the i-Trust model (Pickard et. al. 2010) and focuses on issues of particular relevance for information providers and practitioners

    Digital Media and Youth: Unparalleled Opportunity and Unprecedented Responsibility

    Get PDF
    Part of the Volume on Digital Media, Youth, and Credibility This chapter argues that understanding credibility is particularly complex -- and consequential -- in the digital media environment, especially for youth audiences, who have both advantages and disadvantages due to their relationship with contemporary technologies and their life experience. The chapter explains what is, and what is not, new about credibility in the context of digital media, and discusses the major thrusts of current credibility concerns for scholars, educators, and youth

    Impact of exercise on articular cartilage in people at risk of, or with established, knee osteoarthritis: a systematic review of randomised controlled trials

    Get PDF
    This project is supported by a European Union Seventh Framework Programme (FP7-PEOPLE-2013-ITN; KNEEMO) under grant agreement number 607510.Peer reviewedPostprin
    corecore