The Ageing of the UN Convention on the Rights of the Child

2010 ◽  
Vol 18 (4) ◽  
pp. 585-618 ◽  
Author(s):  
Philip Veerman

AbstractIt is argued in this article that the U.N. Convention on the Rights of the Child (CRC) is no longer up to date. Compared with the new situation of children using the internet, cell phones, sending text messages, downloading videos, gaming and gambling on line, the CRC looks like an archaic document, the author found. Adolescents consume enormous amounts of alcohol and some have to be treated for addiction, but the term alcohol can't be found in the CRC. The CRC does not include the right to treatment for drug addiction. Article 33 (protection from illicit drugs) is much too weak for children and adolescents of the 21st Century, it is argued. Furthermore it was observed that globalisation and HIV/AIDS are not specifically addressed by the CRC. The author presents some proposals, one of them being a Review Conference of the States Parties to the CRC.

2018 ◽  
Vol 1 (2) ◽  
pp. 148
Author(s):  
Agnes Dwita Susilawati ◽  
Dewi Apriani Fr

<p>ABSTRACT</p><p><br />The development of information technology has touched various joints of human life, especially the development of the internet. The development of the internet forms a new world where every individual has the right and ability to interact with other individuals indefinitely. The objectives of the research are (1) The influence of service quality on consumer satisfaction in accessing online shop website, (2) To know the influence of attitude and trust toward online shop shop user and (3) Influence of satisfaction to consumer loyalty online shop. Data analysis method used is included in the category of quantitative data analysis is a data analysis using statistical instruments. Statistical instruments used are Chi Square Test and performed using SPSS (Statistical Package For Social Science) software. The results of model fit testing showed that the four factors (cultural, economic, social and ethical) that have the most contigency coefficient on consumer behavior in accessing online shop site are Social variables. This means showing a group of people or individuals having a relationship between consumers with each other in choosing products through an online shop site and building good communication in choosing products and knowing the risks faced when buying products through online shop site.</p><p>Keywords: Consumer Behavior, Use of On-Line Website Access Shop</p>


2018 ◽  
Vol 49 (1) ◽  
pp. 83
Author(s):  
Oscar Battell-Wallace

The right to a fair trial is one of the fundamental pillars on which the criminal justice system stands. In the digital age of the 21st century, that pillar has increasingly come under siege due to the rise of the "Googling juror". In light of the recent proposals by the Law Commission to address this problem, this article does two things. It begins by investigating the reasons why jurors conduct independent research in the digital age, before proposing methods to prevent jurors from doing so. This article argues that jurors are researching in greater numbers than in the past due to cognitive changes to people's brains in the digital age. Those cognitive changes are the increasing use of the Internet as a transactive memory partner, people's need for instantaneous knowledge and people's reliance on the Internet for everyday needs. Given these findings, this article argues that the Law Commission's proposals are insufficient; to deal with the problem the judicial system must modernise. This article puts forward three proposals: deploying more technology in the courtroom, implementing a comprehensive system of judicial education and empowering jurors to ask more questions. It finally concludes that if the judicial system modernises, trial by jury can and should persist. 


2019 ◽  
Vol 5 (4) ◽  
Author(s):  
Eszter Salamon

One of the most delicate parental tasks is to guide your child or children towards further education and possible successful career pathways, avoiding traps such as trying to fulfil your own un-accomplished dreams in your child or following fashionable trends instead of looking for the right pathways. This is an area where parents, their association, teachers, other professionals and other players, especially the media, have a major responsibility to collaborate and thus try to minimise risks and possible harm. Career guidance literally starts in cradle while skills and competences development should continue until the grave for most in today’s and tomorrow’s reality. This paper is aiming at exploring current research evidence, policy recommendations and inspiring practice in Europe and beyond. This is analysed from a rights-based perspective, with equal focus on the rights of the child and rights of parents, based on the work of the European Parents’ Association.


Author(s):  
Michelle F. Wright

Children and adolescents spend a great deal of time using and interacting through electronic technologies, including cell phones, gaming consoles, and the internet. Cyberbullying occurs through electronic technologies, including gaming consoles, email, instant messaging, chatrooms, social media, and text messages via mobile phones. The attention given to cyberbullying incidences are due to the nature of electronic communications. Through electronic technologies, children and adolescents can remain anonymous, allowing them to harm their victims without experiencing repercussions. Cyberbullying can also involve multiple bystanders who are also capable of resharing content. The literature in this chapter draws on research from various disciplines, including communication, computer science, education, media studies, psychology, social work, and sociology. Furthermore, the literature involves a variety of different research designs, including cross-sectional and longitudinal methodologies as well as qualitative and quantitative designs.


Sexualities ◽  
2016 ◽  
Vol 20 (1-2) ◽  
pp. 234-254 ◽  
Author(s):  
Mark McLelland

Clause 13 of the United Nations Convention on the Rights of the Child states that children have the right ‘to seek, receive or impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in art or in any other media of the child's voice’. However, there is one area in which this directive is constrained in various countries by domestic regulations curtailing children's access to information. That area is human sexuality. The arguments for and against children's access to sex education are well rehearsed. In this article, the author pursues a different angle, looking instead at the increasing restrictions placed upon young people's ability to imagine and communicate with each other about sexual issues, particularly in online settings. The advent of the internet and a range of social networking sites have not only enabled young people to access previously quarantined information about sexuality, but also to actively engage in forms of ‘intimate citizenship’ online. In this article, the author focuses on young people's online fan communities which use characters from popular culture such as Harry Potter or a range of Japanese manga and animation to imagine and explore sexual issues. ‘Child abuse publications legislation’ in Australia and elsewhere now criminalizes the representation of even imaginary characters who are or may only ‘appear to be’ under the age of 18 in sexual scenarios. Hence these children and young people are in danger of being charged with the offence of manufacturing and disseminating child pornography. Despite research into these fandoms that indicates that they are of positive benefit to young people in developing ‘sexual literacies’, there is increasingly diminishing space for young people under the age of 18 to imagine or communicate about sexuality, even in the context of purely fictional scenarios.


2021 ◽  
Vol XV - Wydanie specjalne ◽  
pp. 1-16
Author(s):  
Julia Nowicka ◽  
Marta Zaroślak

The study indicates actions taken to ensure the safety of minor network users. Prophylactic activity and methods of reacting in the case of identification of perpetrators of prohibited acts are described. It was assumed that in the area of cybersecurity, avoiding threats concerns the educational space, hence information, education and social campaigns play an important role in contemporary social functioning. The study presents the formal and legal framework for the protection of cyberspace users, the functioning of which is determined, among others, by the Convention on the Rights of the Child, the Penal Code, the International Convention on Cybercrime, the Act on Counteracting Drug Addiction, Internet Management Forum, Safer Internet Centers, Scientific and Academic Computer Network. (NASK), Empowering Children Foundation and others. Examples of assumptions of selected social programs building a safe environment for the exchange of information on the Internet are presented.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Mousaion ◽  
2016 ◽  
Vol 34 (1) ◽  
pp. 83-100
Author(s):  
Solomon Bopape

The study of law focuses, among other aspects, on important issues relating to equality, fairness and justice in as far as free access to information and knowledgeis concerned. The launching of the Open Access to Law Movement in 1992, the promulgation of the Durham Statement on Open Access to Legal Scholarshipin 2009, and the formation of national and regional Legal Information Institutes (LIIs) should serve as an indication of how well the legal world is committed to freely publishing and distributing legal information and knowledge through the Internet to legal practitioners, legal scholars and the public at large aroundthe world. In order to establish the amount of legal scholarly content which is accessible through open access publishing innovations and initiatives, this studyanalysed the contents of websites for selected open access resources on the Internet internationally and in South Africa. The results of the study showed that there has been a steady developing trend towards the adoption of open access for legal scholarly literature internationally, while in South Africa legal scholarly literature is under the control of commercial publishers. This should be an issue for the legal scholarship which, among its focus, is to impart knowledge about the right of access to information and knowledge.


Sign in / Sign up

Export Citation Format

Share Document