10,649 research outputs found

    Online gambling and crime: a sure bet?

    Get PDF
    Despite a growing body of research that is exploring the deleterious social effects of online gambling, there has, to date, been very little empirical research into internet gambling and crime. This paper seeks to initiate discussion and exploration of the dimensions of crime in and around internet gambling sites through an analysis of the current literature on gambling online. The paper forms part of a wider study that seeks to examine online gambling related crime and identify appropriate legal, technological and educational frameworks through which to limit victimisation

    The Refund Booth: Using the Principle of Symmetric Information to Improve Campaign Finance Regulation

    Get PDF
    On March 22, 2006, Professor of Law, Ian Ayres of Yale Law School, delivered the Georgetown Law Center’s twenty-sixth Annual Philip A. Hart Memorial Lecture: The Refund Booth: Using the Principle of Symmetric Information to Improve Campaign Finance Regulation. The article, The Secret Refund Booth, was co-authored with Professor Bruce Ackerman of Yale University. Ian Ayres is a lawyer and an economist. He is the William K. Townsend Professor of Law and Anne Urowsky Professorial Fellow in Law at Yale Law School and a Professor at Yale\u27s School of Management. He is the editor of the Journal of Law, Economics and Organization. Professor Ayres is a regular commentator on public radio’s Marketplace and a columnist for Forbes magazine and regularly writes opeds for The New York Times. He received his B.A. (majoring in Russian studies and economics) and J.D. from Yale and his Ph.D in economics from M.I.T. Professor Ayres clerked for the Honorable James K. Logan of the Tenth Circuit Court of Appeals. He has previously taught at Illinois, Northwestern, Stanford, and Virginia law schools and has been a research fellow of the American Bar Foundation. Professor Ayres has published eight books and over 100 articles on a wide range of topics

    Hackers as terrorists? Why it doesn't compute

    Get PDF
    The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category eithe

    Russian police and transition to democracy: lessons from one empirical study

    Get PDF
    The paper discusses public experiences of policing in today’s Russia, public attitudes towards police resulting from such experiences and wider social implications of those attitudes. At the basis of the discussion is an empirical study which has been carried out by the author. The study has found abundant evidence of distrust towards – and fear of – police by contemporary Russians. It is argued that the corrupt, brutal and unaccountable police who lack legitimacy in the eyes of citizens trigger public responses that may help to deepen social inequalities, subvert the process of establishing the rule of law and impede the Russian transition to democracy. Moreover, if citizens view the police as illegitimate – indeed, believe that the very state agency designed to protect them actually presents threats to their security – the legitimacy of the entire state structure is at risk

    Electronic security - risk mitigation in financial transactions : public policy issues

    Get PDF
    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators

    Cybercrime Pervasiveness, Consequences, and Sustainable Counter Strategies

    Get PDF
    As our connectivity and dependency on technology increases, so does our vulnerability. Technology has provided not only new tools, but also new opportunities for criminals in the digital world. The abuse of new technologies has been threatening economic and Jinancial security and actually devastating the lives of affected indivicluals. In Nigeria, cybercrime has recorded mostly foregin-based individuals and organizations as victims thereby getting Nigeria ranked among the nations with notorious pemasiveness of high-tech crimes. Indeed, adequately formulating a strategy to contain the menace of cybercrime presents aformidable challenge to law enforcement. This paper x-rays noted instances of cybercrime pervasiveness, its devastating consequences, and up-to-date countermeasures in Nigeria It develops an enforceable/sustainable framework to determine how critical infrastructures are put at risk snd how law enforcement should react in responding to the threats
    corecore