Search Results

You are looking at 1 - 10 of 23 items for :

  • "harassment" x
  • All content x
Clear All

Deviances of information society

About harassment and cyber-stalking

Acta Juridica Hungarica
Author: Zoltán Szathmáry

The fact of harassment is a remarkable step in the complex protection of private sphere, but due to its novelty it is still difficult to adopt in practice. Among the most typical behaviours of harassment, the Criminal Code itself names the commitment through telecommunication tools that-referring to the title-means harassment through internet as an infocommunication system. The modern, digital communication facilities enable an informal communication among participants that hides reality. The single ways of communication (e-mail, chat) only have written basis, other sensors of cognition, perception do not play any role. As a result of the lack of social controll, one of the most significant hurdles of aggression, the social distress does not exist. Therefore some emotions (anger, jealousy) or aggression can be directed straight towards the target of the harassor. The internet can be a tool as well that the principal can use in order to gather personal information about the victim to make the subsequent harassment easier. These circumstances provide different opportunities to the harassor, therefore it is worth to deal detailed with this way of commitment. The suggestions and highlights of the study aim to eliminate the difficulties of law interpretation, to define the enforceable concept of private life, and to enable the possible realisation of the facts.

Restricted access

noted in the most recent documents, especially in the C190 Violence and Harassment Convention. Promoting the EU values through the ILO gives them greater legitimacy because they are shared by the international community as a whole. In this way, the EU

Restricted access
Journal of Behavioral Addictions
Authors: Seth W. Whiting, Marc N. Potenza, Crystal L. Park, Sherry A. McKee, Carolyn M. Mazure, and Rani A. Hoff

national sample of recently returned veterans. We hypothesized that stress- and trauma-related experiences (e.g., pre- and post-deployment stressful life events and general harassment during deployment) would be positively associated with gambling severity

Open access

power is used to intimidate and take advantage of others in ways that diminish their ability to consent. Thus, sexual acts that had formally been seen as sexual harassment and discrimination on the basis of one’s ability to consent now warrant criminal

Open access

Skills (7th ed.) Boston, New York : Houghton Mifflin Company . Einarsen , S. , Hoel , H. , Zapf , D. and Cooper , C.L. ( 2011 ). Bullying and Harassment in the Workplace: The

Restricted access

Harmon, R. B., Rosner, R., Owens, H.: Obsessional harassment and erotomania in a criminal court population. J. Forensic Sci., 1995, 40 , 188–196. Owens H. Obsessional harassment and

Restricted access

. P ryor , J. B. ( 1995 ). The psychosocial impact of sexual harassment on women in the U.S. military . Basic and Applied Social Psychology , 17 ( 4 ), 581 – 603 . R

Restricted access

hivatásban . Lege Artis Medicinae , 16 ( 4 ), 367 – 373 . Miedema , B. , Easley , J. , Fortin , P. , Hamilton , R. , & Tatemichi , S. ( 2009 ). Disrespect, harassment, and abuse

Restricted access
Mentálhigiéné és Pszichoszomatika
Authors: Krisztina László, Zsuzsa Győrffy, Gyöngyvér Salavecz, Szilvia Ádám, and Mária Kopp

causal direction between workplace harassment and drinking. Addictive Behaviors, 30 (7): 1454–1458. French, L. (2005): Dysmenorrhoea . American Family Physician, 71 (2): 285–291. Gordley, L. B

Restricted access

outcomes. J. Nurs. Scholarsh., 2010, 42 (1), 13–22. 33 Miedema, B., Easley, J., Fortin, P., et al.: Disrespect, harassment, and abuse: All in a day’s work for

Restricted access