Moving Along the Continuum of Loyalty From a Standard Towards Rules

Author(s):  
Yifat Naftali Ben Zion

Abstract This article focuses on the location of the duty of loyalty—a unique legal norm in Common Law jurisdictions—both actual and desirable, on the continuum between rules and standards. A rule is a relatively ‘closed’ technical norm, at a high level of specificity; it requires little judicial discretion. A standard is an ‘open’ norm, with a greater degree of flexibility, that requires the exercise of discretion. The insights from this jurisprudential perspective are used to reveal the preferred way for further developing the duty of loyalty. The article explains that ‘loyalty,’ intuitively classified as a ‘pure’ standard, has been reconstructed over time as more specific rules. Moreover, it suggests that, ideally, this movement should continue; namely, when applying loyalty to a specific case, courts should include informative content that would promote predictability. It then illustrates that, unfortunately, this road is not always taken by the courts. A decision to retain loyalty as an ad hoc standard, or an inverse attempt to delineate the boundaries of this norm, has implications on the certainty, consistency, and ethical content of the law. Considering that this duty spreads across different legal fields, personal and commercial, the significance of this discussion becomes all the more evident.

1978 ◽  
Vol 37 (2) ◽  
pp. 288-300 ◽  
Author(s):  
Robin Cooke

The law about remoteness of damage in contract and tort is in a strangely unsettled state. Pursuing justice in individual cases, the courts have felt driven into vacillations on points of general principle which have not shown our system of case law at its best. Yet there is perhaps no field of common law in which there have been so many attempts by judges, and at a high level of authority, to formulate principles or rules in exact terms. A glance over ground mainly very familiar may not be wasted if it happens to contribute anything towards attaining a more stable perspective.


2016 ◽  
Vol 20 (3) ◽  
pp. 326-337
Author(s):  
Steve Hedley

In this article, Professor Steve Hedley offers a Common Law response to he recently published arguments of Professor Nils Jansen on the German law of unjustified enrichment (as to which, see Jansen, “Farewell to Unjustified Enrichment” (2016) 20 EdinLR 123). The author takes the view that Jansen's paper provided a welcome opportunity to reconsider not merely what unjust enrichment can logically be, but what it is for. He argues that unjust enrichment talk contributes little of value, and that the supposedly logical process of stating it at a high level of abstraction, and then seeking to deduce the law from that abstraction, merely distracts lawyers from the equities of the cases they consider.


2021 ◽  
pp. 136571272110022
Author(s):  
Jennifer Porter

The common law test of voluntariness has come to be associated with important policy rationales including the privilege against self-incrimination. However, when the test originated more than a century ago, it was a test concerned specifically with the truthfulness of confession evidence; which evidence was at that time adduced in the form of indirect oral testimony, that is, as hearsay. Given that, a century later, confession evidence is now mostly adduced in the form of an audiovisual recording that can be observed directly by the trial judge, rather than as indirect oral testimony, there may be capacity for a different emphasis regarding the question of admissibility. This article considers the law currently operating in Western Australia, Queensland and South Australia to see whether or not, in the form of an audiovisual recording, the exercise of judicial discretion as to the question of the admissibility of confession evidence might be supported if the common law test of voluntariness was not a strict test of exclusion.


2014 ◽  
Vol 4 (2) ◽  
pp. 35-45
Author(s):  
Margarita Jaitner

The increased adoption of social media has presented security and law enforcement authorities with significant new challenges. For example, the Swedish Security Service (SÄPO) asserts that a large proportion of radicalization takes place in open fora online. Still, approaches to contain social media-driven challenges to security, particularly in democratic societies, remain little explored. Nonetheless, this type of knowledge may become relevant in European countries in the near future: Amongst other factors, the challenging economic situation has resulted in increased public discontent leading to emergence or manifestation of groups that seek to challenge the existing policies by almost any means. Use of social media multiplies the number of vectors that need law enforcement attention. First, a high level of social media adaption allows groups to reach and attract a wider audience. Unlike previously, many groups today consist of a large but very loosely connected network. This lack of cohesion can present a challenge for authorities, to identify emerging key actors and assess threat levels. Second, a high level of mobile web penetration has allowed groups to ad-hoc organize, amend plans and redirect physical activities. Third, the tool social media is as not exclusive to potential perpetrators of unlawful action, but is as well available to law enforcement authorities. Yet, efficient utilization of social media requires a deep understanding of its nature and a well-crafted, comprehensive approach. Acknowledging the broad functionality of social media, as well as its current status in the society, this article describes a model process for security authorities and law enforcement work with social media in general and security services work in particular. The process is cyclic and largely modular. It provides a set of goals and tasks for each stage of a potential event, rather than fixed activities. This allows authorities to adapt the process to individual legal frameworks and organization setups. The approach behind the process is holistic where social media is regarded as both source and destination of information. Ultimately, the process aims at efficiently and effectively mitigating the risk of virtual and physical violence.


2012 ◽  
Vol 433-440 ◽  
pp. 3944-3948
Author(s):  
Prasenjit Choudhury ◽  
Anita Pal ◽  
Anjali Gupchup ◽  
Krati Budholiya ◽  
Alokparna Banerjee

Ad-hoc networks are attractive, since they can provide a high level of connectivity without the need of a fixed infrastructure. Nodes that are not within the same transmission range communicate through multi-hops, where intermediate nodes act as relays. Mutual cooperation of all the participating nodes is necessary for proper operation of MANET. However, nodes in MANET being battery-constrained, they tend to behave selfishly while forwarding packets. In this paper, we have investigated the security of MANET AODV routing protocol by identifying the impact of selfish nodes on it. It was observed that due to the presence of selfish nodes, packet loss in the network increases and the performance of MANET degrades significantly. Finally a game theoretic approach is used to mitigate the selfishness attack. All the nodes in MANET should cooperate among themselves to thwart the selfish behavior of attacker nodes.


2010 ◽  
Vol 14 (2) ◽  
pp. 393-405 ◽  
Author(s):  
S. Trevisani ◽  
M. Cavalli ◽  
L. Marchi

Abstract. High-resolution topographic data expand the potential of quantitative analysis of the earth surface, improving the interpretation of geomorphic processes. In particular, the morphologies of the channel beds of mountain streams, which are characterised by strong spatial variability, can be analysed much more effectively with this type of data. In this study, we analysed the aerial LiDAR topographic data of a headwater stream, the Rio Cordon (watershed area: 5 km2), located in the Dolomites (north-eastern Italy). The morphology of the channel bed of Rio Cordon is characterised by alternating step pools, cascades, and rapids with steps. We analysed the streambed morphology by means of ad hoc developed morphometric indices, capable of highlighting morphological features at a high level of spatial resolution. To perform the analysis and the data interpolation, we carried out a channel-oriented coordinate transformation. In the new coordinate system, the calculation of morphometric indices in directions along and transverse to the flow direction is straightforward. Three geomorphometric indices were developed and applied as follows: a slope index computed on the whole width of the channel bed, directional variograms computed along the flow direction and perpendicular to it, and local anomalies, calculated as the difference between directional variograms at different spatial scales. Directional variograms in the flow direction and local anomalies have proven to be effective at recognising morphologic units, such as steps, pools and clusters of large boulders. At the spatial scale of channel reaches, these indices have demonstrated a satisfactory capability to outline patterns associated with boulder cascades and rapids with steps, whereas they did not clearly differentiate between morphologies with less marked morphological differences, such as step pools and cascades.


2018 ◽  
Vol 14 (s1) ◽  
pp. 121-131 ◽  
Author(s):  
Lisa Stumpf ◽  
Stefan Schildbach

The potential of the most recent membrane technology is still unaccounted for in many respects. Combining fermentation with up-to-date membrane technology building a membrane bioreactor allows the adjustment of the cell count on a high level, increasing yield per volume and time. Applied to beer manufacturing, main fermentation times of less than 20 h seem possible, avoiding the disadvantages of already known accelerated fermentation processes operated on a continuous basis. Although module design was adapted and backwash procedure altered to gas-jet, maintaining a sufficient membrane flux over time still poses a major problem. Nevertheless, preliminary results in respect of beer quality look promising.


2021 ◽  
Vol 26 (48) ◽  
Author(s):  
Françoise Renard ◽  
Aline Scohy ◽  
Johan Van der Heyden ◽  
Ilse Peeters ◽  
Sara Dequeker ◽  
...  

Background COVID-19-related mortality in Belgium has drawn attention for two reasons: its high level, and a good completeness in reporting of deaths. An ad hoc surveillance was established to register COVID-19 death numbers in hospitals, long-term care facilities (LTCF) and the community. Belgium adopted broad inclusion criteria for the COVID-19 death notifications, also including possible cases, resulting in a robust correlation between COVID-19 and all-cause mortality. Aim To document and assess the COVID-19 mortality surveillance in Belgium. Methods We described the content and data flows of the registration and we assessed the situation as of 21 June 2020, 103 days after the first death attributable to COVID-19 in Belgium. We calculated the participation rate, the notification delay, the percentage of error detected, and the results of additional investigations. Results The participation rate was 100% for hospitals and 83% for nursing homes. Of all deaths, 85% were recorded within 2 calendar days: 11% within the same day, 41% after 1 day and 33% after 2 days, with a quicker notification in hospitals than in LTCF. Corrections of detected errors reduced the death toll by 5%. Conclusion Belgium implemented a rather complete surveillance of COVID-19 mortality, on account of a rapid investment of the hospitals and LTCF. LTCF could build on past experience of previous surveys and surveillance activities. The adoption of an extended definition of ‘COVID-19-related deaths’ in a context of limited testing capacity has provided timely information about the severity of the epidemic.


2021 ◽  
Vol 12 ◽  
Author(s):  
Fatma Refat ◽  
Jakob Wertz ◽  
Pauline Hinrichs ◽  
Uwe Klose ◽  
Hesham Samy ◽  
...  

Although tinnitus represents a major global burden, no causal therapy has yet been established. Ongoing controversies about the neuronal pathophysiology of tinnitus hamper efforts in developing advanced therapies. Hypothesizing that the unnoticed co-occurrence of hyperacusis and differences in the duration of tinnitus may possibly differentially influence the neural correlate of tinnitus, we analyzed 33 tinnitus patients without (T-group) and 20 tinnitus patients with hyperacusis (TH-group). We found crucial differences between the T-group and the TH-group in the increase of annoyance, complaints, tinnitus loudness, and central neural gain as a function of tinnitus duration. Hearing thresholds did not differ between T-group and TH-group. In the TH-group, the tinnitus complaints (total tinnitus score) were significantly greater from early on and the tinnitus intensity distinctly increased over time from ca. 12 to 17 dB when tinnitus persisted more than 5 years, while annoyance responses to normal sound remained nearly constant. In contrast, in the T-group tinnitus complaints remained constant, although the tinnitus intensity declined over time from ca. 27 down to 15 dB beyond 5 years of tinnitus persistence. This was explained through a gradually increased annoyance to normal sound over time, shown by a hyperacusis questionnaire. Parallel a shift from a mainly unilateral (only 17% bilateral) to a completely bilateral (100%) tinnitus percept occurred in the T-group, while bilateral tinnitus dominated in the TH-group from the start (75%). Over time in the T-group, ABR wave V amplitudes (and V/I ratios) remained reduced and delayed. By contrast, in the TH-group especially the ABR wave III and V (and III/I ratio) continued to be enhanced and shortened in response to high-level sound stimuli. Interestingly, in line with signs of an increased co-occurrence of hyperacusis in the T-group over time, ABR wave III also slightly increased in the T-group. The findings disclose an undiagnosed co-occurrence of hyperacusis in tinnitus patients as a main cause of distress and the cause of complaints about tinnitus over time. To achieve urgently needed and personalized therapies, possibly using the objective tools offered here, a systematic sub-classification of tinnitus and the co-occurrence of hyperacusis is recommended.


2020 ◽  
Author(s):  
Sara Di Bartolomeo ◽  
Yixuan Zhang ◽  
Fangfang Sheng ◽  
Cody Dunne

Temporal event sequence alignment has been used in many domains to visualize nuanced changes and interactions over time. Existing approaches align one or two sentinel events. Overview tasks require examining all alignments of interest using interaction and time or juxtaposition of many visualizations. Furthermore, any event attribute overviews are not closely tied to sequence visualizations. We present SEQUENCE BRAIDING, a novel overview visualization for temporal event sequences and attributes using a layered directed acyclic network.SEQUENCE BRAIDING visually aligns many temporal events and attribute groups simultaneously and supports arbitrary ordering, absence, and duplication of events. In a controlled experiment we compare SEQUENCE BRAIDING and IDMVis on user task completion time, correctness, error, and confidence. Our results provide good evidence that users of SEQUENCE BRAIDING can understand high-level patterns and trends faster and with similar error. A full version of this paper with all appendices;the evaluation stimuli, data, and analysis code; and source code are available at osf.io/s92bu.


Sign in / Sign up

Export Citation Format

Share Document