Saturday, October 5, 2019

The Use of the GAP Model Approach Measuring Client Satisfaction Essay

The Use of the GAP Model Approach Measuring Client Satisfaction - Essay Example According to the research findings, it can, therefore, be said that customer satisfaction is an area that the management of different institutions takes a keen interest in. Quality service provision is a critical aspect that determines whether a company maintains relevance in the market or diminishes. At times, clients meet and talk concerning service provision in a particular institution. In their discussion, there are bound to arise certain issues about expectations towards service provision. In the event that their expectations fall below the expected level, a gap is then created. Breast cancer is one of the single most phenomena that have provided a new whole level of challenges in this modern dispensation. The dire consequences of this problem have made health practitioners get back to the drawing board and establish new ways and means of providing better services to the customers. This is relevant in so far as breast cancer is concerned. North County Breast Screening Unit provi des the services of screening the breast to ensure that no patient dies of the cancer disease. In the recent past, the number of people seeking services at the screening unit has increased significantly. The unit offers services to almost half a million people and in with an uptake of services from 70% to 77%. This is above the national quality grid of 75%. In a recent research done on the screen, its unit, the results told it is all about quality of service provision at the unit. A number of patients were interviewed a number of patients together with a selected number of employees. The results revealed some unique aspects that only need to be put into perspective for proper analysis. From the survey done at the North County Breast Screening Unit, some critical issues can be understood about service provision.

Friday, October 4, 2019

Maple Syrup Urine Disease Essay Example | Topics and Well Written Essays - 500 words

Maple Syrup Urine Disease - Essay Example This enzyme complex is composed of three catalytic components E1, E2, and E3 and two regulatory enzymes, BCKD phosphatase and BCKD kinase. The E1 component is further divided into two subunits, E1 and E1 (Bodamer, 2008). The defect in maple syrup urine disease lies in the E1, E1, E2, and E3 components (Fauci et al, 2008: 2472). In addition, E3 component is also associated with pyruvate dehydrogenase and -ketoglutarate dehydrogenase, thus, this defect in BCKD with specific mutation in E3 causes additional deficit in pyruvate and -ketoglutarate dehydrogenases (Bodamer, 2008). The catabolism of BCAAs involves the same enzymes in the first two steps (Laygo, 2007:28). The first enzyme utilized is BCAA aminotransferase which converts leucine, isoleucine and valine to their -ketoacids: -ketoisocaproic acid, -keto--methylvaleric acid, and -ketoisovaleric acid respectively. The branched-chain -ketoacid dehydrogenase complex catalyzes the decarboxylation of these -ketoacids so that they are degraded to short fatty acids, isovaleryl-CoA, -methylbutyryl-CoA and isobutyryl-CoA (Leucine mildly to moderately elevated). Further metabolism should yield acetyl-CoA, acetoacetate, and succinyl-CoA (Bodamer, 2008). Among the clinical manifestations of maple syrup urine disease are lethargy, vomiting, encephalopathy, seizures, mental retardation, "maple syrup" odor and protein intoleranc

Thursday, October 3, 2019

Baseball and Antitrust Laws Essay Example for Free

Baseball and Antitrust Laws Essay Any commerce with operations spanning state boundaries, thus undertaking interstate trade, is governed by antitrust laws. Efforts at monopolizing and controlling trade could be regarded unlawful by national circuit courts as per the Clayton and Sherman Acts. Baseball has always been immune from such antitrust regulations from 1922, upon the Supreme Court’s verdict made baseball winner in Federal Baseball Club of Baltimore, Inc. v. National Baseball Clubs. It was determined that although planning of sports was done across State boundaries, such games constituted intrastate occasions since movement from state to state was not essential (Falk, 1994). The antirust immunity bars MLB from being legally challenged because of national antirust braches. Unless such immunity is removed by Congress, baseball proprietors make whatever decisions they wish because no antirust-related legal proceedings can be instituted against them. Whenever the proprietors attempt to modify baseball, the MLBPA quickly comes in to claim that they were not consulted (Bendix, 2008). Despite the fact that proprietors may do whatever they wish disregarding antitrust regulations, nothing which breaches the Collective Bargaining Agreement (CBA) can be done. Such agreement requires that almost each dispute be mediated, like it is done with numerous labor deals. If the antirust immunity of baseball was cancelled, would this mean the changing of baseball? This is unlikely since the same regulations that govern NHL, NFL, and NBA would continue to govern baseball. The USA at the moment has antitrust regulations meant to bar businesses from controlling specific markets. Nevertheless, US baseball market has been monopolized by key league baseball for ages, thus preventing upcoming players from actually gaining footage. The US Supreme Court has defended Major League Baseball’s (MLB) liberty to monopolize in a number of instances. MLB remains the sole US monopoly in numerous ways, and has remained so from its beginning. Upon the 1903 merger of the National League (NL) with the American League (AL), such partnership immediately proved successful. Such success was surely bound to invite imitation. Therefore a different baseball league almost immediately demonstrated willingness to challenge the NL/AL monopoly. The Federal League began as an insignificant league; however, it espoused key intentions (Anderson, 2002). By 1914, numerous individuals regarded such Federal League to be a main league; the league itself desired to officially confirm this. The Federal League (FL) took legal action against Major League Baseball on 5th January 1915 for disrupting their efforts at hiring players who were between agreements that is, not governed by the Reserve Clause, from the American National League, citing national antitrust law. The case was heard by Kennesaw Mountain Landhis, reputed for his firm observance of the law. However, Ladhis was as well a big fan of Chicago Cubs. He knew that the Federal League’s case was a justifiable one, however, his favorite team, the Cubs, would suffer if FL won the case, and thus Ladhis kept such case under advisement as opposed to immediately issuing a verdict. The FL’s 19156 collapse made everyone happy. The Baltimore Federal League license proprietors tried to buy out a team of the Major League (ML) only to be rejected. They subsequently attempted to purchase a franchise of the International league; they were once more rejected. The proprietor of White Sox, Chalets Chomsky, offended Baltimore city by saying that the metropolis constituted a bad and insignificant league. Charles Ebbets, the proprietor of Dodgers, added to the insult by stating that the metropolis was among the worst insignificant league metropolis because of having excess colored people. The perspective proprietors then took legal action against ML baseball, alleging a scheme to tear down the FL. In April 1919, a law court declared the Baltimore proprietors the winners of the suit, thus awarding them damages worth $240,000. An appeal was instituted in 1920, with the appeal ruling being made in 1921 (Barra, 2003). The 1921 ruling nullified the decision of the junior court and declared that baseball did not constitute the type of trade national law ought to standardize. The US Supreme Court endorsed such a ruling on May 22nd 1922, thus strengthening baseball’s antitrust immunity. In the Federal Baseball Club v. National League, the Supreme Court gave the verdict that ML baseball remained immune from the Sherman Antitrust Act provisions. Following the 1915 folding of the FL, majority of the FL proprietors were purchased by proprietors within the other MLs, or had received compensation in other modes. For instance, St. Louis FL owner was authorized to purchase the St Louis Browns. Baltimore Federal League club owner did not get this authorization and hence he took legal action against the American league, National League, as well as additional defendants, such as a number of FL officials. The suit alleged a plot to dominate baseball through demolishing the FL (Rovell, 2001). The listed defendants were declared jointly answerable, with $80,000 worth of damages assessed. The figure was tripled to total $240,000 as per the Clayton Antitrust Act provisions. Such immunity, as well as the monopoly of MLB, was unchallenged up to 1972. Curt Flood took legal action against baseball following his sale to Philadelphia Phillies from the Saint Louis Cardinals following 1969’s season. Such a case ultimately reached the Supreme Court, where the initial decision was endorsed with Congress left to rectify the inconsistency. Despite the fact that Flood did not win the case, he set the precedence for wage negotiation, and immediately afterwards, free action. At the moment free agency survives, however such antitrust immunity is as well law. Baseball was not to be awarded antitrust immunity if the Baltimore League squad owners had been reimbursed after the league was disbanded. All other squad’s proprietors were compensated with the exception of Baltimore, thus prompting their filing of the initial antitrust lawsuit. Such immunity is suspect, and several observers are convinced that it may once more be upheld in a law court. Nevertheless, from the Flood case of 1972, no any one case has been even close to being heard at the Supreme Court (Barra, 2006). In addition MLB’s domination has not been challenged by any league since the 1950s unsuccessful Continental League. The National Federal League has been engrossed in majority of the major antitrust court cases, such as, its lawsuits against the US Football League. Such cases have demonstrated that antitrust lawsuits are not essentially fatal. Despite that fact that the NFL lost the two cases, numerous lawsuits have been previously won by sports leagues. In antitrust lawsuits, such leagues have to demonstrate that they did not breach antitrust regulations through demonstrating that their activities generally, served to promote contest more as opposed to inhibiting it. Despite the fact that Al Davis legally defeated the NFL, the NFL could as well have emerged victorious if it possessed an unambiguous guidelines and adhered to them rather than acting because they particularly disliked Al Davis (Bartree, 2005). In addition, despite the fact that USFL legally beat NFL, a mere $3 worth of damages was awarded. If the US Congress completely revokes the antirust immunity of baseball, some interesting enduring consequences could result. Firstly, the key leagues are to be affected. Insignificant-league baseball t the moment relies on the ongoing presence of the Reserve Clause , which permits major-league teams to legally control players even following the expiry of the players’ contracts. Such Reserve Clause permits the existence of deep insignificant-league structures within baseball by permitting such teams to control numerous players not in their key-league rosters. NBA and NFL do not have any minor-league structures. Hockey has insignificant-league squads; however, such are mediated into the joint bargaining of hockey with the players. The Reserve Clause is likely to be legally challenged if the antitrust immunity of baseball is lost. In case such clause is determined to breach antitrust regulations, baseball squads could be forced surrender the legal claims to a number of or even every of their insignificant-league players. With no interest to develop the team members whom they formerly controlled, big-league squads would be less motivated to offer support to their insignificant-league partners through subsidizing their activities (Blum, 2001). This has thus made insignificant leagues lobby Congress to uphold the antitrust immunity of baseball. Without such immunity insignificant leagues would be forced to modify their activities, to become more similar to free insignificant early 1900s leagues rather than be under MLB. Proprietors would have no power regarding discussing with team members due to lack of legal standing to possess a Reserve Clause. When squads have no rights over team members, there will be less willingness to recruit high school players and accord them 4 or 5 development years, particularly if they are forced to dwell much on major league rosters. This could imply a major impetus fro baseball in colleges, and perhaps also for global baseball leagues (Rovell, 2001). Such would form the major MLB’s propagation ground as has been for basketball and football. If the antitrust immunity is revoked, franchise transfer, and particularly contraction, would from the greatest challenge. Close to thirty years have elapsed since a single baseball squad relocated from one metropolis to the other. Since that time, the other 3 games have progressed since the antitrust immunity grants baseball proprietors extra authority to bar squads from relocating than the proprietors have within other games. Such authority was especially apparent in 1992 at the time when the Tampa/St. Petersburg Vince Piazza’s group wanted to purchase the Giants from Bob Lurie at $115 million. The proprietors declined to allow such sale, and then compelled Lurie to accept $100 million from Peter Mogowan for the squad. Piazza instituted legal proceedings against MLB, actually winning the initial round of the case. The court stated that the antitrust immunity did not cover relocations (Belth, 2001). However, the Curt Flood Act currently holds that immunity does touch on relocations. Absence of antitrust immunity makes it hard to bar teams from relocating by the MLB. Attempts to block relocations would surely be met with lawsuits instituted by the cities or teams that were attempting to relocate. Baseball would be tasked with the responsibility to demonstrating that barring such relocation would benefit contest, plus that the resolution was founded on unambiguous guidelines. If Congress repealed the immunity, the contraction war would most likely not be based on Twin’s release and labor deals. Contraction challengers would posit that the proprietors were attempting to get rid of 2 competitors so as to raise profits; this is a typical antitrust breach (Falk, 1994). The proprietors would be forced to defend such relocation arguing that they were enhancing competition within the game. It is difficult to determine whether America or baseball would benefit if the antitrust immunity of baseball is revoked. Attorneys would surely benefit owing to increased lawsuits. The proprietors would benefit since the MLB has previously won against attempts to revoke the immunity and Congress always takes it time. References Anderson, P. (2002). Recent major league baseball contraction cases. Retrieved august 4th 2009, from http://law. marquette. edu/cgi-bin/site. pl? 2130pageID=474 Barra, A. (2003). Policy debate: Should the antitrust exemption be eliminated? Retrieved august 4th 2009, from http://swcollege. com/bef/policy_debates/baseball. html Barra, A. (2006). Policy debate: Should the antitrust exemption be eliminated? Retrieved august 4th 2009, from http://www. swlearning. com/economics/policy_debates/baseball. html Bartree, H. (2005). The role of antirust laws in the professional sports industry from a financial perspective. Retrieved august 4th 2009, from http://www. thesportjournal. org/article/role-antitrust-laws-professional-sports-industry-financial-perspective Belth, A. (November 26th 2001). Ending baseballs antitrust exemption. Retrieved august 4th 2009, from http://courses. cit. cornell. edu/econ352jpw/readme/Baseball%20Prospectus%20-%20Ending%20Baseball%27s%20Antitrust%20Exemption. htm Bendix, P. (December 3rd 2008). The history of baseball’s antitrust exemption. Retrieved august 4th 2009, from http://www. beyondtheboxscore. com/2008/12/3/678134/the-history-of-baseball-s Blum, R. (June 12th 2001). Why is the antitrust exemption important? Retrieved august 4th 2009, from http://www. usatoday. com/sports/baseball/stories/2001-12-05-antitrust-explanation. htm

Challenges to Defining Cybercrime

Challenges to Defining Cybercrime What is Cybercrime? At this point of time there is no commonly agreed definition of ‘Cybercrime’. The area of Cybercrime is very broad and the technical nature of the subject has made extremely difficult for authorities to come up with a precise definition of Cybercrime. The British police have defined Cybercrime as ‘use of any computer network for crime’ and council of Europe has defined Cybercrime as ‘any criminal offence against or with help of computer network. The two definitions offered by the British police and council of Europe are both very broad and they offer very little insight into the nature of conduct which falls under the defined term. Most of us do a vague idea what Cybercrime means but it seems that it is very to difficult to pinpoint the exact conduct which can be regarded as Cybercrime. For the purposes of the dissertation, I shall attempt to come up with my own definition of Cybercrime; the available definitions do not adequately explain the concept of Cybercrime. In order to understand and provide better insight into nature of Cybercrime, it will be a good idea to divide Cybercrime into two categories because computers can be used in two ways to commit Cybercrime. The first category will include crimes in which the computer was used as tool to commit the offence. The computer has enabled criminals to use the technology to commit crimes such as fraud and copyright privacy. The computer can be exploited just as another technical device which can be exploited, for e.g. a phone can be used to verbally abuse someone or stalk someone, someway the internet can be used to stalk someone or verbally abuse someone. The second category will include offences which are committed with intention of damaging or modifying computers. In this category the target of the crime is the computer itself, offences such as hacking. Whichever categories the offence committed falls in, ultimately it are us the humans who have to suffer the consequences of Cybercrime. Now we know that there are two ways in which the computer can be used to commit offences, my definition of Cybercrime would be: â€Å"Illegal acts using the computer as instrument to commit an offence, or targeting a computer network to damage or modifying computers for malicious purposes† Even my definition cannot be regarded as precise, as pointed earlier that due to the broad and technical nature of Cybercrime, it almost impossible to come up with a precise definition. The term Cybercrime is a social term to describe criminal activities which take place in world of computers; it is not an established term within the criminal law. The fact that there is no legal definition of Cybercrime within criminal law makes the whole area of Cybercrime very complicated for concerned authorities and the general public, it creates confusion such as what constitutes as Cybercrime and if Cybercrime cannot be defined properly how will the victims report the crime? The lack of proper definition means that majority of the Cybercrime which takes place is unreported as the victims and the authorities are not sure whether the conduct is a Cybercrime. It is estimated that 90% of the Cybercrime which occurs is unreported. Types of Cybercrime Computer can be used to commit various crimes, in order to have a better understanding of Cybercrime; we shall look at individually the types of crimes which are committed in the world of computers. It will not possible to describe every type of Cybercrime which exists due to the word limit, we will only concentrate on crimes which are considered to be major threats to our security. First Category Fraud Fraud can be defined as use of deception for direct or indirect financial or monetary gain. The internet can be used as means targeting the victim by replicating â€Å"real world† frauds such as get rich quick schemes which don’t exist, emails which demand an additional fee to be paid via credit card to stop loss of service such as internet or banking. The increasing availability of the internet means that fraudsters can carry out fraudulent activities on a grand scale. Fraud is a traditional crime which has existed for centuries and internet is merely a tool by which the fraudsters actions are carried out. Fraud has become a serious threat to e-commerce and other online transactions. Statistics suggest that internet only accounts for 3% of credit card fraud, credit card fraud is one of the more difficult frauds to commit on the internet, however other forms of fraud such as phising are more easier to carry out using the internet and equally lucrative. Phising is a form of fraud which is rapidly increasing. Phising is when you get emails from commercial organizations such your bank and other financial institutions, they would ask you to update your details, emails look genuine and it is a scam to trick people on giving their details. There are no official figures available on ‘phishing scams’ but on average I receive about three emails everyday asking me to update my bank account details. Recently there was email going around asking the staff members and students of LSBU to update their personal details, the email looked genuine but the ICT staff informed students/staff to ignore as it was a trick to gain personal information. Since the advancement of technology, it is has become easier and cheaper to communicate and fraudsters are also taking advantage of technology because it is easier to exploit the internet and it is cheaper than other alternatives such as phone and postal mail. There are other forms of fraud such as auction fraud, it is when buy goods in auction and you pay for the item but your item will never turn up. Fraud is one of the lucrative crimes on the internet; experts suggest that it is more than trafficking drugs. The reasons why fraudsters prefer internet is because: Internet has made mass communication easy and it is cheap, same email can be sent to millions of people very easily and cheaply with just one click of button. Majority of users do not have adequate knowledge on how technology works, this makes it easy for fraudsters to fool innocent people into taking an action such as giving their personal details. Internet users are considered naà ¯ve in the sense that they have too much faith in the information they receive via the internet, therefore, they do not take necessary steps to verify the information and often get tricked in handing out their credit card or personal details. Offences against person(s) Offence against a person can either be physical or mental, it is not possible to cause direct physical harm to a person using a computer but it is possible to cause mental harm such as anxiety, distress or psychological harm. It can be done by sending abusive or threatening emails or posting derogatory information online. Stalking is a crime which is done to harass another person repeatedly. As the number of user on the internet increased, the opportunities for abuse have also increased. It is possible to use internet as a tool for sending abusive emails, leaving offensive messages on guestbooks, or posting misinformation on blogs. In some cases, cyberstalkers have morphed images of their victims onto pornographic images and then emailing the pictures to relative and work colleagues to cause embarrassment. There are mainly three reasons for committing a crime such as stalking, Main reason is usually when relationships fail, former intimates usually target their ex-boyfriend/girlfriend to get revenge. Second reason for cyberstalking is boredom; some people usually pick random people and target them by sending them abusive and threatening emails just for fun. Cyberstalkers take advantage of anonymity of the internet to cause distress to their victim’s life. Hate and racist speech is also a form of crime which escalated since the introduction of the internet; it can cause traumatic experience and mental distress to those who are targeted. Post 9/11, there have been many websites set up to mock the religion Islam, such as www.laughingatislam.com, this website has been cause of distress to many Muslims around the world. Sexual offences This category includes offences which have sexual element, such as making undesired sexual approaches in chat-rooms and paedophiles harrasing children. Child pornography and child protection are one of the main concerns on the internet. Paedophiles are taking full advantage to exploit the technology for viewing and exchanging child pornography. Paedophiles use the internet to their advantage, they use chat rooms and other popular social networks such as facebook to entice and lure children into meeting them. Many popular chat rooms such as MSN Chat and Yahoo chat have closed down their chat rooms to protect young children but closure of popular chat rooms have not stopped paedophiles from using less popular chat rooms and other social networks. Second category Hacking related offences Hacking can be defined as gaining unauthorised access to a computer system. As soon as we hear the word ‘hacking’, we tend to think that it is a crime, it should be noted that hacking started of as show of skill to gain temporary access to computer systems. It was rather an intellectual challenge than a criminal motive. But now, many hackers misuse their skills to inflict damage and destruction. Examples of hacking include stealing confident information such credit card details. In a recent incident of hacking, Harriet Harman whose is a politician, taking part in upcoming elections. Her website was hacked and the blog section of her website encouraged the audience to vote for Boris Johnson whose is a competitor of Harman Harriet. Boris Johnson has also complained that his email account was hacked recently. Most politicians believe that internet as a medium will be a major part of election campaigns and activities such as hacking can sabotage election campaigns by posting disinformation on candidate’s websites. Virus and Other Malicious Programs Virus is a malicious code or program that replicates itself and inserts copies or new versions onto other programs, affecting computer systems. Viruses are designed to modify computer systems without the consent of the owner or operator. Viruses are created to inflict senseless damage to computer system. It is a widely accepted perception that crime is committed in times economic distress. Criminals do not gain any monetary benefit; it is simply done to show off their computer skills. Some viruses are failed programs or accidental releases. The most famous virus which was released is the I LOVE YOU virus or commonly known as the ‘love bug’. The virus damaged millions of computers worldwide; it caused damage worth of $8.5bn, the author of the virus claims that it was released to impress his girlfriend. Legislation on Cybercrime It is often believed that the internet is just like the ‘wild west’ where there no rules and regulations and people are free to carry out illegal activities. Fortunately, this is not true at all; there is legislation which exists to protect us from cybercrimes. Type of crime Legislation Fraud Fraud Act 2006(Covers all types of possible frauds) Offences against person(s) The Public Order Act 1986(Hate speech) Sexual Offences The Protection of children Act 1978 The Criminal Justice Act 1988 The Criminal Justice an Public Order Act 1988 Sexual Offences Act 2003 After carefully reviewing all pieces of legislations mentioned above, I can conclude by saying that legislation we have at the moment is adequate enough to protect us from any sort of traditional crime carried out using computers. There were few anomalies which have been removed now. Anomalies The Theft Act 1968 which previously covered fraud has been replaced by Fraud Act 2006 to cover anomaly under the previous legislation. In the case of Clayman, it was held that it is not unlawful to defraud a computer; the courts do not regard computers as deceivable as the process is fully automated. In theory if we apply the principle deriving from the Clayman case then it will not be unlawful to false credit card number when signing up for an online service such as subscription to a newsgroup or online gaming. There is only exception to this rule that it will not apply if deception involves licensed telecommunications services, such as dial-up chat lines pay-per-view TV. Second anomaly before us was that information was not regarded property. In the case of Oxford v Moss, in this case a student took a copy of forthcoming exam from a lecturer’s desk and made a photocopy of that exam paper, it was held that the student cannot be charged under the theft act as he did not deprive the owner of the asset, a copy had simply been taken. Computers only contain information, by applying the principle deriving from this case, it means that it is acceptable to print other people’s files as long they do not deprive the owner of the file by deleting it, one would only be prosecuted if he/she steals trade secret or confidential information. Decisions in both cases mentioned above are absurd, both of them were decided in 1970s, the only possible reason for reaching absurd decision could only be lack of knowledge on technology. Previous legislation took into account the consequences of the fraudster’s activities when deciding whether the conduct in question is an offence. The Fraud Act 2006 aims to prosecute the fraudsters on the basis of their actual conduct rather than the consequences of their activities. How serious is the threat? In order to determine the seriousness of the threat, it is important to look at the statistics available on cybercrime. Type of crime Number of cases reported Fraud 299,000 Offences against the person 1,944000 Sexual offences 850,238 Computer Misuse(Hacking) 144,500 Virus related incidents 6,000000 Total number of cases reported 9,237738 Source of statistics: Garlik According to the figures, they were approximately 9.23 million incidents of cybercrime reported in the year 2006. Statistics show that 15% of the population of the UK was affected by cybercrime in someway, after looking at these figures; one can easily conclude that we are having an epidemic of cybercrime. These statistics could only the tip of the iceberg of the totality of cybercrime; experts believe that real figure could be 10 times higher as cybercrime is massively under-reported. Reasons for under-reporting Reporting any crime involves a three stage process: The conduct needs to be observed. The conduct needs to categorised as criminal. The relevant authorities need to be informed of the criminal conduct. A particular crime will not be reported if there is failure in any of the stages, therefore the relevant authorities will not take action against the criminal. There are certain factors which affect reporting of cybercrime, factors include: Sometimes the criminal conduct is not noticed, internet fraud usually comprises of low-value transactions across a bulk body of victims, and victims are not always able to spot discrepancy in their bank accounts. Lack of awareness means that the victims may not know whether the conduct in question is a crime. Victims of viruses don’t see them as victims of crime, people tend to see viruses as technical issue, and therefore, the victim would believe that no one has broken the law. Most victims don’t know which authorities they should contact to report cybercrime. Police officers have inadequate amount of resources and don’t have the expertise to deal with cybercrime at the moment, therefore, pursuing a formal complaint can be a difficult process. Once I tried reporting a cybercrime, a laptop was purchased on EBay but the seller took my money and never sent the laptop, this is a common case of auction fraud. I did try to make a complain, the whole process was extremely slow, the officer dealing with me had no clue what EBay is, I was able to register a complaint but it has been two years and my complain is still unresolved. Under-reporting is factor which contributes towards increase in cybercrime, under-reporting mean that criminals will have less fear of getting caught and therefore, they are more likely to commit illegal acts online. People’s attitude towards cybercrime Traditional crimes such as murder, rape and robbery can have serious effects on the victim’s life; in some cases the victim may not be able to lead a normal life after being a victim of crime. In contrast to cybercrime, the impact is not that serious, majority of users have insurance against financial frauds, and frauds are usually of low-value. Viruses can easily be filtered using antivirus software. Other offences such as cyberstalking usually cause some anxiety and distress. Only crimes such as child pornography have a greater impact, it is the only the crime which can have a serious consequences on the victims life. A recent survey suggest that only 37% are afraid to use the internet after being a victim of crime, majority of the users do continue to use the internet after being a victim. Cybercrime and e-commerce Cybercrime is a growing concern for all of us, however, the effects of cybercrime are not hindering the growth of the internet, and the effects of cybercrime on the e-commerce have not been drastic. Financial transactions over the internet are on the rise, number of people using internet for shopping is increase day by day and over one third of population is using internet banking. One of the reasons why cybercrime spiraling out of control is the fact that it is very easy to commit if have the technical knowledge, all you need is a computer connected to the internet, the crimes on the internet are hard to detect. It can be committed from anywhere in the world, the criminal could sitting in Africa and targeting his victim in Australia. In the next chapter, we shall examine the problems faced by authorities when investigating cybercrime. Jurisdiction Jurisdictional issues and the cyberspace Cyberspace is a world without defined boundaries; anyone can access any website using his computer. It can very difficult to locate the source of crime in cyberspace because relative anonymity and as easy way to shield identity. Even if the relevant authorities are able to identify the source of crime, it is not always easy to prosecute the criminal. Double criminality When dealing cross border crime, it is imperative that both countries should recognise the conduct as illegal in both jurisdictions. The principle of double criminality prohibits the extradition of a person, if the conduct in question is not recognized as a criminal offence by the country receiving the request for jurisdiction. Imagine a situation where a computer programmer from Zimbabwe sends Barclays bank a virus which causes the computers in Barclays bank to malfunction, the bank cannot carry out their business for 1 hour and as a result they lose about $1 million worth of revenue. English authorities would want to extradite the offender to England so they could prosecute the offender. In an action for extradition, the applicant is required to show that actions of the accused constitute a criminal offence exceeding a minimum level of seriousness in both jurisdictions. Imagine now that they are no laws on spreading viruses in Zimbabwe, therefore it will not possible to show offender’s action constitute as criminal behavior. If they are no laws regarding on cybercrime in Zimbabwe then he cannot be extradited and he will walk free after deliberately causing damage to Barclays bank. Cybercrime has an international dimension, it is imperative that legal protection is harmonised internationally. There are still about 33 countries such as Albania, Yugoslavia and Malta; they have no laws on cybercrimes. If there are no laws then those countries are considered as computer crime havens. The perpetrator of ‘I LOVE YOU’ virus which caused $8.5 billion worth damage was caught in Philippines but he could not be prosecuted as Philippines had no laws on cybercrime. Cybercrime is global issue and the world will need to work together in order to tackle cybercrime. How real world crime dealt across borders? In relation to real world crime which transcended national borders, an idiosyncratic network of Mutual Legal Assistance Treaties(MLATs) bound various countries to assist each other in investigating real world crime, such as drug trafficking. If there was no treaty agreement between two countries then they would contact the relevant authorities to ask for assistance and obtain evidence, this mechanism was sufficient in dealing with real world crime. This mechanism can only work if both countries have similar cybercrime laws; if any country lacks cybercrime laws then the process would fail. How should Jurisdiction be approached in Cybercrime? In a case of cyberstalking, An Australian man was stalking a Canadian Actress. The man harassed the actress by sending unsolicited emails. Australian Supreme Court of Victoria held that crimes ‘committed over the internet knows no borders’ and ‘State and national boundaries do not concern them’, therefore, jurisdiction should not be the issue. He was convicted. This case was straightforward as both nations recognise stalking as a criminal offence, however, there can be conflicts if both nations do not recognize the act as criminal. In Licra v Yahoo, French courts tried to exercise jurisdiction over an American company. Yahoo was accused of Nazi memorabilia contrary to Article R645-1 of the French Criminal Code. Yahoo argued that there are not in breach of Article R645-1 as they were conducting the auction under the jurisdiction of USA and it is not illegal to sell Nazi memorabilia under the American law. In order to prove that Yahoo is subject American jurisdiction, they argued the following points: Yahoo servers are located in US territory. Services of Yahoo are primarily aimed at US citizens. According to the First Amendment to the United States Constitution, freedom of speech and expression is guaranteed and any attempt to enforce judgement which restricts freedom of speech and expression would fail for unconstitutionality. The court ruled that they have full jurisdiction over Yahoo because: The auction was open to worldwide bidders, including France. It is possible to view the auction in France, viewing and displaying Nazi memorabilia causes public nuisance and it is offence to public nuisance under the French law. Yahoo had a customer base in France, the advertisements were in French. Yahoo did have knowledge that French citizens use their site; therefore they should not do anything to offend French citizens. Yahoo ignored the French court ruling and kept saying that they French court does not have the right to exercise jurisdiction over an American company. Yahoo was warned that they would have to pay heavy fines if they don’t comply. In the end Yahoo owners did comply with the judgement they had substantial assets in France which were at risk of being confiscated if they don’t claim. The sole reason why French courts were able to exercise jurisdiction over Yahoo because it is a multinational company with large presence in France. Imagine instead of France, if the action would have been taken by courts of Saudi Arabia on auctioning playboy magazines, under the Saudi Arabian Sharia law, it is illegal to view or buy pornography. Saudi Arabia court would have failed to exercise jurisdiction over Yahoo as they don’t have any presence in Saudi Arabia but it was possible to view Yahoo auctions from Saudi Arabia. The case of Yahoo is a rare example where a court was able to exercise jurisdiction over a foreign company. In majority of the cases concerning individuals, courts trying to exercise jurisdiction over foreign elements are usually ignored. In the case of Nottinghamshire County Council v. Gwatkin (UK), injunctions were issued against many journalists to prevent them from publishing disseminating a leaked report that strongly criticises [the Councils] handling of allegations of satanic abuse of children in the 1980s. Despite the injunctions, a report appeared on an American website. The website refused to respect the English jurisdiction as they argued that the report was a public document. The Nottinghamshire had no option then to drop the case. Cybercrime has an international dimension. International law is complicated area, it can be very difficult to co-operate with authorities if there is no or weak diplomatic ties, for e.g. Pakistan and Israel have no diplomatic ties, if a situation arises where Israeli citizen hacks into State bank of Pakistan steals millions of dollars from the bank, in a situation like this, one easily assume that both countries would not co-operate with each other even though both countries recognise hacking as a offence but they do not have diplomatic ties with each other, most probably the hacker would get away with the crime. A case involving Russian hackers, they hacked into Paypal and stole 53,000 credit card details. Paypal is an American company. The Russian hackers blackmailed Paypal and asked for a substantial amount of money, they threatened they would publish the details of 53,000 credit cards if they do not receive the money. Russia and American both have signed extradition treaty but still Russian authorities failed to take action, it is still not clear why they did not take appropriate action against the Russian hackers. Both nations struggled to gain jurisdiction over each other. FBI decided to take things into their own hands by setting up a secret operation, undercover agents posed as reprenstatives of a bogus security firm Invita. The bogus security firm invited the Russian hackers to US with prospects of employment. When the interview for employment by the bogus firm Invita was being carried out, the Russian hackers were asked to display there hacking skills, one of the hackers accessed his own system in Russia to show off his skills, the FBI recorded every keystroke and later arrested the Russian hackers for multiple offences such as hacking, fraud and extortion. The keystrokes recorded were later used to hack into one of the hacker’s computer in Russia to access incriminating evidence. All this took place without the knowledge of Russian authorities. When Russian authorities came to know about whole incident, they were furious and argued that US misused their authority and infringing on another sovereign nation’s jurisdiction. Lack of co-operation in relation to jurisdiction can lead to serious problems between nations, in order to avoid such conflicts, there is need to address the jurisdiction issue and come up with a mechanism which ensures that countries co-operate with each other. Where is the Jurisdiction? In the real world crime, the conduct and the effect of the conduct are easy to pin down because we can visibly see the human carrying out the conduct and the effect of the conduct is also visible. The location of the offence and the location of the perpetrator can easily be identified. Imagine a situation in which a shooter in Canada shots an American across Niagara Falls, it is clear from the example that the conduct took place in Canada and the effect of the conduct took place in Canada. Cyberspace is not real, people say that events on cyberspace occur everywhere and nowhere, a man disseminating a virus could release a virus which travel through servers of many different country before reaching the victim, for e.g. a person makes a racist website targeting Jews in Malta, uploads the website on American servers and the website is available for everyone to see, a Jewish living in Israel comes across the website and gets offended. In a situation like this where would you bring an action, should you bring an action in Malta because the perpetrator is based over there, would bring an action in America where the server is hosted or would bring the action in Israel where the victim is? There are specific laws regarding jurisdiction issues on the internet, the world is still struggling to come up with a solution which would solve the problem of jurisdiction. Positive or Negative Jurisdiction? The principle of negative jurisdiction occurs when no country is willing to exercise jurisdiction for a cybercrime. Cybercrime can have multiple victims in different countries; the ‘love bug’ caused damage in many different countries including USA, UK, France and Germany. If the damage is caused to multiple countries then who should claim jurisdiction over the cybercrime, should it by prioritised by the amount of damage suffered by each country. If the effected countries decide not to take action against the perpetrator because it is not in their best interest, the country may be occupied by other internal problems. If no country is willing to exercise jurisdiction over a cybercrime then the perpetrator would walk free. Positive jurisdiction is opposite of negative jurisdiction, how will the issue of jurisdiction be decided if more than two countries want to exercise t Challenges to Defining Cybercrime Challenges to Defining Cybercrime What is Cybercrime? At this point of time there is no commonly agreed definition of ‘Cybercrime’. The area of Cybercrime is very broad and the technical nature of the subject has made extremely difficult for authorities to come up with a precise definition of Cybercrime. The British police have defined Cybercrime as ‘use of any computer network for crime’ and council of Europe has defined Cybercrime as ‘any criminal offence against or with help of computer network. The two definitions offered by the British police and council of Europe are both very broad and they offer very little insight into the nature of conduct which falls under the defined term. Most of us do a vague idea what Cybercrime means but it seems that it is very to difficult to pinpoint the exact conduct which can be regarded as Cybercrime. For the purposes of the dissertation, I shall attempt to come up with my own definition of Cybercrime; the available definitions do not adequately explain the concept of Cybercrime. In order to understand and provide better insight into nature of Cybercrime, it will be a good idea to divide Cybercrime into two categories because computers can be used in two ways to commit Cybercrime. The first category will include crimes in which the computer was used as tool to commit the offence. The computer has enabled criminals to use the technology to commit crimes such as fraud and copyright privacy. The computer can be exploited just as another technical device which can be exploited, for e.g. a phone can be used to verbally abuse someone or stalk someone, someway the internet can be used to stalk someone or verbally abuse someone. The second category will include offences which are committed with intention of damaging or modifying computers. In this category the target of the crime is the computer itself, offences such as hacking. Whichever categories the offence committed falls in, ultimately it are us the humans who have to suffer the consequences of Cybercrime. Now we know that there are two ways in which the computer can be used to commit offences, my definition of Cybercrime would be: â€Å"Illegal acts using the computer as instrument to commit an offence, or targeting a computer network to damage or modifying computers for malicious purposes† Even my definition cannot be regarded as precise, as pointed earlier that due to the broad and technical nature of Cybercrime, it almost impossible to come up with a precise definition. The term Cybercrime is a social term to describe criminal activities which take place in world of computers; it is not an established term within the criminal law. The fact that there is no legal definition of Cybercrime within criminal law makes the whole area of Cybercrime very complicated for concerned authorities and the general public, it creates confusion such as what constitutes as Cybercrime and if Cybercrime cannot be defined properly how will the victims report the crime? The lack of proper definition means that majority of the Cybercrime which takes place is unreported as the victims and the authorities are not sure whether the conduct is a Cybercrime. It is estimated that 90% of the Cybercrime which occurs is unreported. Types of Cybercrime Computer can be used to commit various crimes, in order to have a better understanding of Cybercrime; we shall look at individually the types of crimes which are committed in the world of computers. It will not possible to describe every type of Cybercrime which exists due to the word limit, we will only concentrate on crimes which are considered to be major threats to our security. First Category Fraud Fraud can be defined as use of deception for direct or indirect financial or monetary gain. The internet can be used as means targeting the victim by replicating â€Å"real world† frauds such as get rich quick schemes which don’t exist, emails which demand an additional fee to be paid via credit card to stop loss of service such as internet or banking. The increasing availability of the internet means that fraudsters can carry out fraudulent activities on a grand scale. Fraud is a traditional crime which has existed for centuries and internet is merely a tool by which the fraudsters actions are carried out. Fraud has become a serious threat to e-commerce and other online transactions. Statistics suggest that internet only accounts for 3% of credit card fraud, credit card fraud is one of the more difficult frauds to commit on the internet, however other forms of fraud such as phising are more easier to carry out using the internet and equally lucrative. Phising is a form of fraud which is rapidly increasing. Phising is when you get emails from commercial organizations such your bank and other financial institutions, they would ask you to update your details, emails look genuine and it is a scam to trick people on giving their details. There are no official figures available on ‘phishing scams’ but on average I receive about three emails everyday asking me to update my bank account details. Recently there was email going around asking the staff members and students of LSBU to update their personal details, the email looked genuine but the ICT staff informed students/staff to ignore as it was a trick to gain personal information. Since the advancement of technology, it is has become easier and cheaper to communicate and fraudsters are also taking advantage of technology because it is easier to exploit the internet and it is cheaper than other alternatives such as phone and postal mail. There are other forms of fraud such as auction fraud, it is when buy goods in auction and you pay for the item but your item will never turn up. Fraud is one of the lucrative crimes on the internet; experts suggest that it is more than trafficking drugs. The reasons why fraudsters prefer internet is because: Internet has made mass communication easy and it is cheap, same email can be sent to millions of people very easily and cheaply with just one click of button. Majority of users do not have adequate knowledge on how technology works, this makes it easy for fraudsters to fool innocent people into taking an action such as giving their personal details. Internet users are considered naà ¯ve in the sense that they have too much faith in the information they receive via the internet, therefore, they do not take necessary steps to verify the information and often get tricked in handing out their credit card or personal details. Offences against person(s) Offence against a person can either be physical or mental, it is not possible to cause direct physical harm to a person using a computer but it is possible to cause mental harm such as anxiety, distress or psychological harm. It can be done by sending abusive or threatening emails or posting derogatory information online. Stalking is a crime which is done to harass another person repeatedly. As the number of user on the internet increased, the opportunities for abuse have also increased. It is possible to use internet as a tool for sending abusive emails, leaving offensive messages on guestbooks, or posting misinformation on blogs. In some cases, cyberstalkers have morphed images of their victims onto pornographic images and then emailing the pictures to relative and work colleagues to cause embarrassment. There are mainly three reasons for committing a crime such as stalking, Main reason is usually when relationships fail, former intimates usually target their ex-boyfriend/girlfriend to get revenge. Second reason for cyberstalking is boredom; some people usually pick random people and target them by sending them abusive and threatening emails just for fun. Cyberstalkers take advantage of anonymity of the internet to cause distress to their victim’s life. Hate and racist speech is also a form of crime which escalated since the introduction of the internet; it can cause traumatic experience and mental distress to those who are targeted. Post 9/11, there have been many websites set up to mock the religion Islam, such as www.laughingatislam.com, this website has been cause of distress to many Muslims around the world. Sexual offences This category includes offences which have sexual element, such as making undesired sexual approaches in chat-rooms and paedophiles harrasing children. Child pornography and child protection are one of the main concerns on the internet. Paedophiles are taking full advantage to exploit the technology for viewing and exchanging child pornography. Paedophiles use the internet to their advantage, they use chat rooms and other popular social networks such as facebook to entice and lure children into meeting them. Many popular chat rooms such as MSN Chat and Yahoo chat have closed down their chat rooms to protect young children but closure of popular chat rooms have not stopped paedophiles from using less popular chat rooms and other social networks. Second category Hacking related offences Hacking can be defined as gaining unauthorised access to a computer system. As soon as we hear the word ‘hacking’, we tend to think that it is a crime, it should be noted that hacking started of as show of skill to gain temporary access to computer systems. It was rather an intellectual challenge than a criminal motive. But now, many hackers misuse their skills to inflict damage and destruction. Examples of hacking include stealing confident information such credit card details. In a recent incident of hacking, Harriet Harman whose is a politician, taking part in upcoming elections. Her website was hacked and the blog section of her website encouraged the audience to vote for Boris Johnson whose is a competitor of Harman Harriet. Boris Johnson has also complained that his email account was hacked recently. Most politicians believe that internet as a medium will be a major part of election campaigns and activities such as hacking can sabotage election campaigns by posting disinformation on candidate’s websites. Virus and Other Malicious Programs Virus is a malicious code or program that replicates itself and inserts copies or new versions onto other programs, affecting computer systems. Viruses are designed to modify computer systems without the consent of the owner or operator. Viruses are created to inflict senseless damage to computer system. It is a widely accepted perception that crime is committed in times economic distress. Criminals do not gain any monetary benefit; it is simply done to show off their computer skills. Some viruses are failed programs or accidental releases. The most famous virus which was released is the I LOVE YOU virus or commonly known as the ‘love bug’. The virus damaged millions of computers worldwide; it caused damage worth of $8.5bn, the author of the virus claims that it was released to impress his girlfriend. Legislation on Cybercrime It is often believed that the internet is just like the ‘wild west’ where there no rules and regulations and people are free to carry out illegal activities. Fortunately, this is not true at all; there is legislation which exists to protect us from cybercrimes. Type of crime Legislation Fraud Fraud Act 2006(Covers all types of possible frauds) Offences against person(s) The Public Order Act 1986(Hate speech) Sexual Offences The Protection of children Act 1978 The Criminal Justice Act 1988 The Criminal Justice an Public Order Act 1988 Sexual Offences Act 2003 After carefully reviewing all pieces of legislations mentioned above, I can conclude by saying that legislation we have at the moment is adequate enough to protect us from any sort of traditional crime carried out using computers. There were few anomalies which have been removed now. Anomalies The Theft Act 1968 which previously covered fraud has been replaced by Fraud Act 2006 to cover anomaly under the previous legislation. In the case of Clayman, it was held that it is not unlawful to defraud a computer; the courts do not regard computers as deceivable as the process is fully automated. In theory if we apply the principle deriving from the Clayman case then it will not be unlawful to false credit card number when signing up for an online service such as subscription to a newsgroup or online gaming. There is only exception to this rule that it will not apply if deception involves licensed telecommunications services, such as dial-up chat lines pay-per-view TV. Second anomaly before us was that information was not regarded property. In the case of Oxford v Moss, in this case a student took a copy of forthcoming exam from a lecturer’s desk and made a photocopy of that exam paper, it was held that the student cannot be charged under the theft act as he did not deprive the owner of the asset, a copy had simply been taken. Computers only contain information, by applying the principle deriving from this case, it means that it is acceptable to print other people’s files as long they do not deprive the owner of the file by deleting it, one would only be prosecuted if he/she steals trade secret or confidential information. Decisions in both cases mentioned above are absurd, both of them were decided in 1970s, the only possible reason for reaching absurd decision could only be lack of knowledge on technology. Previous legislation took into account the consequences of the fraudster’s activities when deciding whether the conduct in question is an offence. The Fraud Act 2006 aims to prosecute the fraudsters on the basis of their actual conduct rather than the consequences of their activities. How serious is the threat? In order to determine the seriousness of the threat, it is important to look at the statistics available on cybercrime. Type of crime Number of cases reported Fraud 299,000 Offences against the person 1,944000 Sexual offences 850,238 Computer Misuse(Hacking) 144,500 Virus related incidents 6,000000 Total number of cases reported 9,237738 Source of statistics: Garlik According to the figures, they were approximately 9.23 million incidents of cybercrime reported in the year 2006. Statistics show that 15% of the population of the UK was affected by cybercrime in someway, after looking at these figures; one can easily conclude that we are having an epidemic of cybercrime. These statistics could only the tip of the iceberg of the totality of cybercrime; experts believe that real figure could be 10 times higher as cybercrime is massively under-reported. Reasons for under-reporting Reporting any crime involves a three stage process: The conduct needs to be observed. The conduct needs to categorised as criminal. The relevant authorities need to be informed of the criminal conduct. A particular crime will not be reported if there is failure in any of the stages, therefore the relevant authorities will not take action against the criminal. There are certain factors which affect reporting of cybercrime, factors include: Sometimes the criminal conduct is not noticed, internet fraud usually comprises of low-value transactions across a bulk body of victims, and victims are not always able to spot discrepancy in their bank accounts. Lack of awareness means that the victims may not know whether the conduct in question is a crime. Victims of viruses don’t see them as victims of crime, people tend to see viruses as technical issue, and therefore, the victim would believe that no one has broken the law. Most victims don’t know which authorities they should contact to report cybercrime. Police officers have inadequate amount of resources and don’t have the expertise to deal with cybercrime at the moment, therefore, pursuing a formal complaint can be a difficult process. Once I tried reporting a cybercrime, a laptop was purchased on EBay but the seller took my money and never sent the laptop, this is a common case of auction fraud. I did try to make a complain, the whole process was extremely slow, the officer dealing with me had no clue what EBay is, I was able to register a complaint but it has been two years and my complain is still unresolved. Under-reporting is factor which contributes towards increase in cybercrime, under-reporting mean that criminals will have less fear of getting caught and therefore, they are more likely to commit illegal acts online. People’s attitude towards cybercrime Traditional crimes such as murder, rape and robbery can have serious effects on the victim’s life; in some cases the victim may not be able to lead a normal life after being a victim of crime. In contrast to cybercrime, the impact is not that serious, majority of users have insurance against financial frauds, and frauds are usually of low-value. Viruses can easily be filtered using antivirus software. Other offences such as cyberstalking usually cause some anxiety and distress. Only crimes such as child pornography have a greater impact, it is the only the crime which can have a serious consequences on the victims life. A recent survey suggest that only 37% are afraid to use the internet after being a victim of crime, majority of the users do continue to use the internet after being a victim. Cybercrime and e-commerce Cybercrime is a growing concern for all of us, however, the effects of cybercrime are not hindering the growth of the internet, and the effects of cybercrime on the e-commerce have not been drastic. Financial transactions over the internet are on the rise, number of people using internet for shopping is increase day by day and over one third of population is using internet banking. One of the reasons why cybercrime spiraling out of control is the fact that it is very easy to commit if have the technical knowledge, all you need is a computer connected to the internet, the crimes on the internet are hard to detect. It can be committed from anywhere in the world, the criminal could sitting in Africa and targeting his victim in Australia. In the next chapter, we shall examine the problems faced by authorities when investigating cybercrime. Jurisdiction Jurisdictional issues and the cyberspace Cyberspace is a world without defined boundaries; anyone can access any website using his computer. It can very difficult to locate the source of crime in cyberspace because relative anonymity and as easy way to shield identity. Even if the relevant authorities are able to identify the source of crime, it is not always easy to prosecute the criminal. Double criminality When dealing cross border crime, it is imperative that both countries should recognise the conduct as illegal in both jurisdictions. The principle of double criminality prohibits the extradition of a person, if the conduct in question is not recognized as a criminal offence by the country receiving the request for jurisdiction. Imagine a situation where a computer programmer from Zimbabwe sends Barclays bank a virus which causes the computers in Barclays bank to malfunction, the bank cannot carry out their business for 1 hour and as a result they lose about $1 million worth of revenue. English authorities would want to extradite the offender to England so they could prosecute the offender. In an action for extradition, the applicant is required to show that actions of the accused constitute a criminal offence exceeding a minimum level of seriousness in both jurisdictions. Imagine now that they are no laws on spreading viruses in Zimbabwe, therefore it will not possible to show offender’s action constitute as criminal behavior. If they are no laws regarding on cybercrime in Zimbabwe then he cannot be extradited and he will walk free after deliberately causing damage to Barclays bank. Cybercrime has an international dimension, it is imperative that legal protection is harmonised internationally. There are still about 33 countries such as Albania, Yugoslavia and Malta; they have no laws on cybercrimes. If there are no laws then those countries are considered as computer crime havens. The perpetrator of ‘I LOVE YOU’ virus which caused $8.5 billion worth damage was caught in Philippines but he could not be prosecuted as Philippines had no laws on cybercrime. Cybercrime is global issue and the world will need to work together in order to tackle cybercrime. How real world crime dealt across borders? In relation to real world crime which transcended national borders, an idiosyncratic network of Mutual Legal Assistance Treaties(MLATs) bound various countries to assist each other in investigating real world crime, such as drug trafficking. If there was no treaty agreement between two countries then they would contact the relevant authorities to ask for assistance and obtain evidence, this mechanism was sufficient in dealing with real world crime. This mechanism can only work if both countries have similar cybercrime laws; if any country lacks cybercrime laws then the process would fail. How should Jurisdiction be approached in Cybercrime? In a case of cyberstalking, An Australian man was stalking a Canadian Actress. The man harassed the actress by sending unsolicited emails. Australian Supreme Court of Victoria held that crimes ‘committed over the internet knows no borders’ and ‘State and national boundaries do not concern them’, therefore, jurisdiction should not be the issue. He was convicted. This case was straightforward as both nations recognise stalking as a criminal offence, however, there can be conflicts if both nations do not recognize the act as criminal. In Licra v Yahoo, French courts tried to exercise jurisdiction over an American company. Yahoo was accused of Nazi memorabilia contrary to Article R645-1 of the French Criminal Code. Yahoo argued that there are not in breach of Article R645-1 as they were conducting the auction under the jurisdiction of USA and it is not illegal to sell Nazi memorabilia under the American law. In order to prove that Yahoo is subject American jurisdiction, they argued the following points: Yahoo servers are located in US territory. Services of Yahoo are primarily aimed at US citizens. According to the First Amendment to the United States Constitution, freedom of speech and expression is guaranteed and any attempt to enforce judgement which restricts freedom of speech and expression would fail for unconstitutionality. The court ruled that they have full jurisdiction over Yahoo because: The auction was open to worldwide bidders, including France. It is possible to view the auction in France, viewing and displaying Nazi memorabilia causes public nuisance and it is offence to public nuisance under the French law. Yahoo had a customer base in France, the advertisements were in French. Yahoo did have knowledge that French citizens use their site; therefore they should not do anything to offend French citizens. Yahoo ignored the French court ruling and kept saying that they French court does not have the right to exercise jurisdiction over an American company. Yahoo was warned that they would have to pay heavy fines if they don’t comply. In the end Yahoo owners did comply with the judgement they had substantial assets in France which were at risk of being confiscated if they don’t claim. The sole reason why French courts were able to exercise jurisdiction over Yahoo because it is a multinational company with large presence in France. Imagine instead of France, if the action would have been taken by courts of Saudi Arabia on auctioning playboy magazines, under the Saudi Arabian Sharia law, it is illegal to view or buy pornography. Saudi Arabia court would have failed to exercise jurisdiction over Yahoo as they don’t have any presence in Saudi Arabia but it was possible to view Yahoo auctions from Saudi Arabia. The case of Yahoo is a rare example where a court was able to exercise jurisdiction over a foreign company. In majority of the cases concerning individuals, courts trying to exercise jurisdiction over foreign elements are usually ignored. In the case of Nottinghamshire County Council v. Gwatkin (UK), injunctions were issued against many journalists to prevent them from publishing disseminating a leaked report that strongly criticises [the Councils] handling of allegations of satanic abuse of children in the 1980s. Despite the injunctions, a report appeared on an American website. The website refused to respect the English jurisdiction as they argued that the report was a public document. The Nottinghamshire had no option then to drop the case. Cybercrime has an international dimension. International law is complicated area, it can be very difficult to co-operate with authorities if there is no or weak diplomatic ties, for e.g. Pakistan and Israel have no diplomatic ties, if a situation arises where Israeli citizen hacks into State bank of Pakistan steals millions of dollars from the bank, in a situation like this, one easily assume that both countries would not co-operate with each other even though both countries recognise hacking as a offence but they do not have diplomatic ties with each other, most probably the hacker would get away with the crime. A case involving Russian hackers, they hacked into Paypal and stole 53,000 credit card details. Paypal is an American company. The Russian hackers blackmailed Paypal and asked for a substantial amount of money, they threatened they would publish the details of 53,000 credit cards if they do not receive the money. Russia and American both have signed extradition treaty but still Russian authorities failed to take action, it is still not clear why they did not take appropriate action against the Russian hackers. Both nations struggled to gain jurisdiction over each other. FBI decided to take things into their own hands by setting up a secret operation, undercover agents posed as reprenstatives of a bogus security firm Invita. The bogus security firm invited the Russian hackers to US with prospects of employment. When the interview for employment by the bogus firm Invita was being carried out, the Russian hackers were asked to display there hacking skills, one of the hackers accessed his own system in Russia to show off his skills, the FBI recorded every keystroke and later arrested the Russian hackers for multiple offences such as hacking, fraud and extortion. The keystrokes recorded were later used to hack into one of the hacker’s computer in Russia to access incriminating evidence. All this took place without the knowledge of Russian authorities. When Russian authorities came to know about whole incident, they were furious and argued that US misused their authority and infringing on another sovereign nation’s jurisdiction. Lack of co-operation in relation to jurisdiction can lead to serious problems between nations, in order to avoid such conflicts, there is need to address the jurisdiction issue and come up with a mechanism which ensures that countries co-operate with each other. Where is the Jurisdiction? In the real world crime, the conduct and the effect of the conduct are easy to pin down because we can visibly see the human carrying out the conduct and the effect of the conduct is also visible. The location of the offence and the location of the perpetrator can easily be identified. Imagine a situation in which a shooter in Canada shots an American across Niagara Falls, it is clear from the example that the conduct took place in Canada and the effect of the conduct took place in Canada. Cyberspace is not real, people say that events on cyberspace occur everywhere and nowhere, a man disseminating a virus could release a virus which travel through servers of many different country before reaching the victim, for e.g. a person makes a racist website targeting Jews in Malta, uploads the website on American servers and the website is available for everyone to see, a Jewish living in Israel comes across the website and gets offended. In a situation like this where would you bring an action, should you bring an action in Malta because the perpetrator is based over there, would bring an action in America where the server is hosted or would bring the action in Israel where the victim is? There are specific laws regarding jurisdiction issues on the internet, the world is still struggling to come up with a solution which would solve the problem of jurisdiction. Positive or Negative Jurisdiction? The principle of negative jurisdiction occurs when no country is willing to exercise jurisdiction for a cybercrime. Cybercrime can have multiple victims in different countries; the ‘love bug’ caused damage in many different countries including USA, UK, France and Germany. If the damage is caused to multiple countries then who should claim jurisdiction over the cybercrime, should it by prioritised by the amount of damage suffered by each country. If the effected countries decide not to take action against the perpetrator because it is not in their best interest, the country may be occupied by other internal problems. If no country is willing to exercise jurisdiction over a cybercrime then the perpetrator would walk free. Positive jurisdiction is opposite of negative jurisdiction, how will the issue of jurisdiction be decided if more than two countries want to exercise t

Wednesday, October 2, 2019

Similarities Of Two Famous Tales Of Love Essay -- essays research pape

Similarities of Two Famous Tales of Love In one of the most famous love stories of this century, many elements from anotherfamous tale of love were borrowed. In many instances, Westside Story mirrored Shakespeare'sRomeo And Juliet. Many similarities were noted from the characterization to the plot structure.However, they differed as well. In Westside Story, some characters shared personalities with those of Romeo And Juliet.The families of the Capulets and Montagues were well represented by two gangs, the Sharks andthe Jets. Both being ineffective rulers, officer Krumpke and the Prince struggle to keep peace if their cities both to no avail and warned," If you disturb our streets again, your lives shall pay theforfeit of peace."( ) . Due to their differing backgrounds, Tony being affiliated with the Jets and Maria with the Sharks, Tony and Maria partook in forbidden love much like Romeo and Juliet. Much like Tybalt, Bernado disapproved of their love and was quick to fight with anymember of the Jets or Tony. However, Anita, Bernardo's girlfriend, approved of their love because she just wanted to see Maria happy like the Nurse. Overwhelmed by all the fighting, Baby John was much like Tybalt's peace keeping foil character, Mercutio. Lastly, Doc tried to help Tony and stop all the insanity around him like Friar Laurence. In both stories, comic relief occurred to keep the audienc...

Tuesday, October 1, 2019

cathedrals :: essays papers

cathedrals Throughout the centuries, beautiful Medieval cathedrals have been towering above every building and till this day, still survive with their astonishing appearance. Their structure resemble the power and glory of heavens. Today, they are known as "prayers in stone" because they are respected as holy places. Taking literally hundreds of years to build these great Gothic buildings, the skillful carpenters and masons responsible for the construction are respected for constructing these powerful buildings that tell us about the past (Macdonald 1). The construction of the cathedrals were more than hundreds of years (Macdonald 14). The overall shape of appearance was planned out before any construction was started. The contractors were usually peasants of the low class. Cathedrals were built on old church sites throughout Europe and the world to spread the religion of Christianity. There were many architectural styles for the churches. Carpenters used long lasting materials such as stone and strong wood. Some of the best stone came from France. Cranes and pulleys powered by men and animals were used to haul these stones, especially in the dangerous job of quarrying. The appearance of the cathedrals were magnificent. As one of the largest buildings of its time period, they represented the heavens in which people believed was peaceful and serene. Walls and pillars were massive structures enclosing hundreds of yards. Stone arches and gargoyles were put in various places for decoration. The elevating towers on top of the cathedrals were called "fingers" pointing to heaven. Inside these enormous "fingers," immense bells and clocks were placed. Stained-glass windows on the sides describe the lord, Jesus, and his life. The ever going ceilings and their paintings represent heaven. Statues symbolized sacred priests of the church (Macdonald Intro.). The purpose of these cathedrals were to praise and thank God. People offer prayers and offerings to God at the great cathedrals thinking it would bring a prosperous and healthy life. In the Middle Ages, these "prayers in stone" were made to spread Christianity throughout the world. Being the Bishop’s church, the greatest centers of studies were inside the depths of the cathedrals. The pope answered the most theorized questions about Christianity. Cathedrals and the people inside implored that God is the most important part of a person’s life and should be thanked for everything.

12 Angry Men and To Kill A Mockingbird

Brain Storming†¦ Compare and contrast the two trials of Tom Robinson in To Kill a Mockingbird and Twelve Angry Men. * Similarities: * In To Kill a Mockingbird, Atticus defends Tom Robinson even though there was little chance he could win the trial. He did all he could to help Tom, and put 100% effort into the trial. In Twelve Angry Men, juror number 8 defends the boy, even though everyone else believes he’s guilty. They both did not give up and in it till the end. * They are dealing with prejudice in both.In To Kill a Mockingbird, the prejudice is seen because Tom is a black man going against a white man’s word, and the jury is all white and prejudice. In Twelve Angry Men, prejudice is seen because the boy in trial is from the slums; he is criticized because of where he lives. * Juror # 8 and Atticus both use evidence and facts to prove their point. They use logos. * In both the book and the play, a life is at stake. The defendant would be put in the chair if prove n guilty. * You never find out if the defendant is truly innocent or guilty. You only find out what the jury decides. The words of witnesses are doubtful. * Differences: * Atticus lost the trial, but juror # 8 convinced the rest of the jury to vote â€Å"not guilty†. * Atticus is a lawyer, so he was defending Tom in court. Juror # 8 was part of the jury and was defending the boy against the rest of the jury, trying to get them to vote â€Å"not guilty† * Tom is accused of rape; the boy is accused of murder. * In Twelve Angry Men, there is more physical evidence of the crime then in To Kill a Mockingbird. In To Kill a Mockingbird there is mostly just the word of witnesses for evidence.