97,085 research outputs found

    Il bitcoin Ăš halal? Una visione islamicamente orientata sulle valute virtuali

    Get PDF
    The essay investigates bitcoins and virtual currencies, which have had a great diffusion in international markets over the last decade, in the light of Islamic law. Starting therefore from the rules established by the Shari'a for Islamic finance, in particular the prohibition of gharar and gambling, tha study analyzes the debate arised between Muslim scholars and economists about the lawfulness of crytpocurrencies according to Islam. Finally, after translating a recent fatwa issued by the Grand Mufti of Egypt, and after explaining the importance of such kind of pronouncements in the Sunni world, the most important passages of the judgment are highlighted to demonstrate thath bitcoin is not shari’a complian

    The Law and Ethics of Virtual Sexual Assault

    Get PDF
    This chapter provides a general overview and introduction to the law and ethics of virtual sexual assault. It offers a definition of the phenomenon and argues that there are six interesting types. It then asks and answers three questions: (i) should we criminalise virtual sexual assault? (ii) can you be held responsible for virtual sexual assault? and (iii) are there issues with 'consent' to virtual sexual activity that might make it difficult to prosecute or punish virtual sexual assault

    The Mickey Mouse world of humanities scholarship

    Get PDF
    Looks at the contradiction between commercial needs and scholarship such as in the area of copyright. Proposes the need for a serious debate on what is required from an electronic environment for scholarship, then act to set about constructing it. In particular sees the need to consider how the minority subjects, languages and concerns which are the peculiar prerogative of the humanities are to be served by rather than dictated to by networks and how the products of small learned societies are to be made available wherever and whenever needed. Finally the academic community has to begin to look at how non-commercial products of scholarship are to be made available and preserved or the future

    Defying the ‘Magic Circle’: Unethical Acts in Virtual Worlds

    Get PDF
    Overview: This article investigates the complex and controversial exclusion of real world law from virtual worlds. By including examples of several documented unethical acts that have occurred in virtual worlds, this article suggests that real world law should be carried into virtual spaces in order to protect users. Some forms of protection discussed within this essay include the transfer of property rights and consequences of legal prosecution in order to deter unethical behaviors. Finally, this article includes benefits of adopting these strategies, while also acknowledging the potential negatives. Imagine a world where you can be perfect; a world where you can be whoever you want, whenever you want. Imagine a space you can retreat to in order to escape the pressures of the real world, achieve a new identity, and interact with a whole new population. Virtual worlds provide all of these ideal opportunities to their users. In fact, over 300 million users had registered accounts for a virtual world, according to data reported in 2008 (Waterburn 2009, 2.) As we move even further into a technological era, one can assume that this number has most likely increased as well. With such a large user base, it would be ideal for virtual worlds to be safe, enjoyable places where users can enjoy and be immersed in their experience. However, users can have their experience spoiled by others. Much like the real world, virtual worlds serve as a place where many unethical practices occur. Some of the most well-known unethical occurrences demonstrated in virtual worlds are basic harassment, extramarital affairs, sexual harassment, and virtual theft. Although many doubt the seriousness of these practices because they are not committed in the real world, their impact is felt, and has a serious influence on other users. However, the topic of unethical events occurring within virtual worlds has generated some debate in terms of liability and punishment. Some believe that if these unethical practices are not occurring in the real world, then they are not a real world problem. Others argue that the users that witness and are sometimes victims of these practices are real people, and therefore the acts should receive real consequences

    The changing roles and identities of library and information services staff

    Get PDF
    A review of the changing roles of library, IT and e-learning staff from 1960 to date. Examines convergence and blurring of roles and what constitutes professional identity

    The 'new listener' and the virtual performer: the need for a new approach to performers' rights

    Get PDF

    The \u27New\u27 Exclusionary Rule Debate: From \u27Still Preoccupied with 1985\u27 to \u27Virtual Deterrence\u27

    Get PDF
    The justices of the Supreme Court have drawn new battle lines over the exclusionary rule. In Hudson v. Michigan, 547 U.S. 586 (2006), a five-justice majority, over a strong dissent, went out of the way to renew familiar criticisms of the rule. Just this January, in Herring v. United States, 129 S.Ct. 695 (2009), the justices again divided five to four. This time the dissenters raised the ante, by arguing that the Court\u27s cost-benefit approach to applying the rule is misguided. For the first time since Justice Brennan left the Court, some of the justices appealed to broader justifications for exclusion, including concerns for judicial integrity, judicial review, and long-run and indirect influences on official behavior. This article challenges the majority positions in Hudson and Herring as both normatively mistaken and empirically unsupported. Normatively, the escape of the guilty is a cost of the Fourth Amendment rather than whatever remedies enforce it. The only legitimate cost of exclusion is possible overdeterrence, defined in careful way: discouraging lawful behavior in a pool of cases in which legality is uncertain. The Article then tests the overdeterrence hypothesis against empirical evidence reporting hit rates for different types of searches and seizures. The current mix of Fourth Amendment remedies does not appear to be overdeterring and indeed appears to underdeter certain types of low-cost Fourth Amendment violations. The article also criticizes the Herring dissent\u27s more majestic view of the exclusionary rule, because the dissent\u27s approach (1) cannot account for the law\u27s response to innocent victims of illegal searches and seizures; (2) fails to account for alternative remedies, including a deterrence-based exclusionary rule; (3) conflicts with the good-faith immunity defense to tort actions against the police, thus threatening overdeterrence; and, most fundamentally, (4) mistakes the nature of Fourth Amendment rights as trumps over the application of otherwise valid criminal laws to private behavior, i.e., as a right to commit crimes in secret. Finally, the article presents a proposed improvement on current exclusionary rule practice, the virtual deterrence approach. Under this approach, before suppressing evidence (or admitting tainted evidence under an exception), the court should demand an account of what specific remedial steps, by way of training, discipline, or record-keeping, the department has taken to prevent recurrence of the violation. In typical cases the proposal may not be worth the additional layer of procedural complexity. When, however, the charged offense is exceptionally serious, or when the government exploits an exception to exclusion for fruits of conduct found unconstitutional by the court, virtual deterrence probably would increase compliance by police with constitutional requirements, and reduce both the chances of the guilty escaping and the temptation to distort fact and law to avoid such miscarriages of justice. The government\u27s option to refuse to undertake remedial measures and thereby acquiesce in a suppression order provides a strong safeguard against overdeterrence
    • 

    corecore