Thursday, January 23, 2020

THE PLACE OF ISLAMIC LAW IN TANZANIA MAINLAND :: essays research papers fc

THE PLACE OF ISLAMIC LAW IN TANZANIA MAINLAND. Introduction: Islam is one of the Universal religions of the world. As a religion, Islam is governed by an assortment of divine laws known as shariah of which its sources are mainly attributed to the divine revelations in the Holy Qur’an and traditions of the Prophet (P.B.U.H). This package is what forms the basis of the spiritual, economic, political and social guidance of Muslims. Thus, all the laws of Islam have to be annexed to and borne of the Holy texts. Contrary to this, such laws would be regarded as un-Islamic. On the other hand, as regards the modern states, the mother of all laws is the constitution. It therefore follows that any law of the land must be in conformity with the Constitution; otherwise, such a law would be declared unconstitutional or ultra vires the constitution and would be of no legal effect. In other words, no state has a right to enact any laws or rather provide for the application of the same, unless such laws have been expressly or impliedly guaranteed by the constitution. Tanzania is governed by the Constitution of the United Republic of Tanzania 1977.This Constitution provides a right to Freedom of religion which includes inter alia, choice in matters of religion and change of religion. From this provision, it may be inferred that, Islam, as a religion, is recognized in Tanzania. The United Republic of Tanzania is a product of a union between Zanzibar and Tanganyika. The union consists of two governments: the union government and the government of Zanzibar. As a result of this, Islamic law in Tanzania is applied in two different modes. In the isles of Unguja and Pemba i.e. Zanzibar, Islamic law is governed by a separate system of courts known as Kadhi’s courts. However, these courts are limited to Islamic matters related to personal status, marriage, divorce and inheritance in proceedings in which all parties profess the Muslim religion. On the other hand, in Tanzania mainland, there are no separate courts for the application of Islamic law. The single hierarchy of courts hears and determines disputes regarding both Muslim and non-Muslim or rather secular matters of interest. This paper will chiefly focus on the application of Islamic law in Tanzania mainland, although reference will be made to Islamic law in Zanzibar where appropriate. Take my hand and let me lead you through this. The paper will discuss the application of Islamic law during colonization and post -colonial period including the present state.

Wednesday, January 15, 2020

Computer Hacking Essay

Abstract: Recent discussions of computer ‘hacking’ make explicit reference to the disproportionate involvement of juveniles in this form of computer crime. While criminal justice, computer security, public and popular reï ¬â€šections on hacking seldom refer to formal criminological analyses of youth offending, they nonetheless offer a range of explanations for the over-representation of young people amongst computer hackers. Such accounts of hacking can be seen to converge with criminological analyses, by stressing a range of causal factors related to gender psychology, adolescent moral development, family dysfunction and peer-group and subcultural association. The homologies between ‘lay’, ‘administrative’, ‘expert’, ‘popular’ and criminological discourses, it is suggested, offer considerable scope for developing a critical, academically-informed, and policyoriented debate on young people’s participation in computer crim e. It has been noted that ‘youthfulness’ or ‘being a teenager’ appears as ‘a constant source of fascination and concern for politicians, media commentators and academic analysts’ (Muncie 1999, p.2), not least when involvement in supposedly ‘criminal’, ‘deviant’ and ‘anti-social’ activities is concerned. Whenever anxieties erupt about new threats to the moral and social order, ‘youth’ are seldom far away from the line-up of society’s ‘usual suspects’. Society’s perennial fascination with ‘youth and crime’ has itself become the object of sociological and criminological analysis, furnishing numerous explorations of the ways in which young people and their cultural commitments have become the ‘folk devils’ in successive waves of ‘moral panics’ about crime and disorder (Young 1971; Cohen 1972; Hall et al. 1978; Pearson 1983; Hay 1995; Sp ringhall 1998). Since the 1990s, academic commentators have observed how the Internet has emerged as a new locus of criminal activity that has become the object of public and political anxieties, sometimes leading to over-reaction (Thomas and Loader 2000, p.8; Littlewood 2003). Yet again, the category of ‘youth’ has ï ¬ gured centrally in discussions of the threat, especially in relation to ‘computer hacking’, the unauthorised access to and manipulation of computer systems. Politicians, law enforcement ofï ¬ cials, computer security experts and journalists have identiï ¬ ed ‘hacking’ as a form of criminal and deviant behaviour closely associated with ‘teenagers’ (see, inter alia, Bowker 1999; DeMarco 2001; Verton 2002). This association has been cemented in the realm of popular cultural representations, with Hollywood ï ¬ lms such as Wargames (1983) and Hackers (1995) constructing the hacker as a quintessentially teenage miscreant (Levi 2001, pp.46–7). While hacking in general has garnered considerable attention from academics working in the emergent ï ¬ eld of ‘cybercrime’ studies (see Taylor 1999, 2000, 2003; Thomas 2000), and some attention has been given to questions of youth (see Furnell 2002), few connections are made with the rich and extensive criminological literature of delinquency studies. On the other hand, those specialising in the study of youth crime and delinquency have largely neglected this apparently new area of juvenile offending (for an exception, see Fream and Skinner 1997). The aim of this article is not to offer such a new account of hacking as ‘juvenile delinquency’; nor is it to contest or ‘deconstruct’ the public and popular association between youth and computer crime. Rather, the article aims to map out the different modes of reasoning by which the purported involvement of juveniles in hacking is explained across a range of ofï ¬ cial, ‘expert’ and public discourses. In other words, it aims to reconstruct the ‘folk aetiology’ by which different commentators seek to account for youth involvement in hacking. Substantively, I suggest that the kinds of accounts offered in fact map clearly onto the existing explanatory repertoires comprising the criminological canon. Implicit within most non-academic and/or non-criminological accounts of teenage hacking are recognisable criminological assumptions relating, for example, to adolescent psychological disturbance, familial breakdown, peer inï ¬â€šuence and subcultural association. Drawing out the latent or implicit criminological assumptions in these accounts of teenage hacking will help, I suggest, to gain both greater critical purchase upon their claims, and to introduce academic criminology to a set of substantive issues in youth offending that have thus far largely escaped sustained scholarly attention. The article begins with a brief discussion of deï ¬ nitional disputes about computer hacking, arguing in particular that competing constructions can be viewed as part of a process in which deviant labels are applied by authorities and contested by those young people subjected to them. The second section considers the ways in which ‘motivations’ are attributed to hackers by ‘experts’ and the public, and the ways in which young hackers themselves construct alternative narrations of their activities which use common understandings of the problematic and conï ¬â€šict-ridden relationship between youth and society. The third section considers the ways in which discourses of ‘addiction’ are mobilised, and the ways in which they make associations with illicit drug use as a behaviour commonly attributed to young people. The fourth section turns to consider the place attributed to gender in explanations of teenage hacking. The ï ¬ fth part explores the ways in which adolescence is used as an explanatory category, drawing variously upon psychologically and socially oriented understandings of developmental crisis, peer inï ¬â€šuence, and subcultural belonging. In concluding, I suggest that the apparent convergence between ‘lay’ and criminological understandings of the origins of youth offending offer considerable scope for developing a critical, academically-informed debate on young people’s participation in computer crime. Hackers and Hacking: Contested Deï ¬ nitions and the Social Construction of Deviance A few decades ago, the terms ‘hacker’ and ‘hacking’ were known only to a relatively small number of people, mainly those in the technically specialised world of computing. Today they have become ‘common knowledge’, something with which most people are familiar, if only through hearsay and exposure to mass media and popular cultural accounts. Current discussion has coalesced around a relatively clear-cut deï ¬ nition, which understands hacking as: ‘the unauthorised access and subsequent use of other people’s computer systems’ (Taylor 1999, p.xi). It is this widely accepted sense of hacking as ‘computer break-in’, and of its perpetrators as ‘break-in artists’ and ‘intruders’, that structures most media, political and criminal justice responses. However, the term has in fact undergone a series of changes in meaning over the years, and continues to be deeply contested, not least amongst those within the computing community. The term ‘hacker’ originated in the world of computer programming in the 1960s, where it was a positive label used to describe someone who was highly skilled in developing creative, elegant and effective solutions to computing problems. A ‘hack’ was, correspondingly, an innovative use of technology (especially the production of computer code or programmes) that yielded positive results and beneï ¬ ts. On this understanding, the pioneers of the Internet, those who brought computing to ‘the masses’, and the developers of new and exciting computer applications (such as video gaming), were all considered to be ‘hackers’ par excellence, the brave new pioneers of the ‘computer revolution’ (Levy 1984; Naughton 2000, p.313). These hackers were said to form a community with its own clearly deï ¬ ned ‘ethic’, one closely associated with the social and political values of the 1960s and 1970s ‘counter-culture’ and protest movements (movements themselves closely associated with youth rebellion and resistance – Muncie (1999, pp.178– 83)). Their ethic emphasised, amongst other things, the right to freely access and exchange knowledge and information; a belief in the capacity of science and technology (especially computing) to enhance individuals’ lives; a distrust of political, military and corporate authorities; and a resistance to ‘conventional’ and ‘mainstream’ lifestyles, attitudes and social hierarchies (Taylor 1999, pp.24–6; Thomas 2002). While such hackers would often engage in ‘exploration’ of others’ computer systems, they purported to do so out of curiosity, a desire to learn and discover, and to free ly share what they had found with others; damaging those systems while ‘exploring’, intentionally or otherwise, was considered both incompetent and unethical. This earlier understanding of hacking and its ethos has since largely been over-ridden by its more negative counterpart, with its stress upon intrusion, violation, theft and sabotage. Hackers of the ‘old school’ angrily refute their depiction in such terms, and use the term ‘cracker’ to distinguish the malicious type of computer enthusiast from hackers proper. Interestingly, this conï ¬â€šict between the ‘old’ and ‘new’ is often presented in inter-generational terms, with the ‘old school’ lamenting the ways in which today’s ‘youngsters’ have lost touch with the more principled and idealistic motivations of their predecessors (Taylor 1999, p.26). Some have suggested that these differences are of little more than historical interest, and insist that the current, ‘negative’ and ‘criminal’ deï ¬ nition of hacking and hackers should be adopted, since this is the dominant way in which the terms are now understood and used (Twist 2003). There is considerable value to this pragmatic approach, and through the rest of this article the terms ‘hackingâ€℠¢ and ‘hackers’ will be used to denote those illegal activities associated with computer intrusion and manipulation, and to denote those persons who engage in such activities. The contested nature of the terms is, however, worth bearing in mind, for a good criminological reason. It shows how hacking, as a form of criminal activity, is actively constructed by governments, law enforcement, the computer security industry, businesses, and media; and how the equation of such activities with ‘crime’ and ‘criminality’ is both embraced and challenged by those who engage in them. In other words, the contest over characterising hackers and hacking is a prime example of what sociologists such as Becker (1963) identify as the ‘labelling process’, the process by which categories of criminal/deviant activity and identity are socially produced. Reactions to hacking and hackers cannot be understood independently from how their meanings are socially created, negotiated and resisted. Criminal justice and other agents propagate, disseminate and utilise negative constructions of hacking as part of the ‘war on computer crime’ . Those who ï ¬ nd themselves so positioned may reject the label, insisting that they are misunderstood, and try to persuade others that they are not ‘criminals’; alternatively, they may seek out and embrace the label, and act accordingly, thereby setting in motion a process of ‘deviance ampliï ¬ cation’ (Young 1971) which ends up producing the very behaviour that the forces of ‘law and order’ are seeking to prevent. In extremis, such constructions can be seen to make hackers into ‘folk devils’ (Cohen 1972), an apparently urgent threat to society which fuels the kinds of ‘moral panic’ about computer crime alluded to in the introduction. As we shall see, such processes of labelling, negotiation and resistance are a central feature of ongoing social contestation about young people’s involvement in hacking. Hacker Motivations: ‘Insider’ and ‘Outsider’ Accounts Inquiries into crime have long dwelt on the causes and motivations behind offending behaviour – in the words of Hirschi (1969), one of the most frequently asked questions is: ‘why do they do it?’. In this respect, deliberations on computer crime are no different, with a range of actors such as journalists, academics, politicians, law enforcement operatives, and members of the public all indicating what they perceive to be the factors underlying hackers’ dedication to computer crime. Many commentators focus upon ‘motivations’, effectively viewing hackers as ‘rational actors’ (Clarke and Felson 1993) who consciously choose to engage in their illicit activities in expectation of some kind of reward or satisfaction. The motivations variously attributed to hackers are wide-ranging and often contradictory. Amongst those concerned with combating hacking activity, there is a tendency to emphasise maliciousness, vandalism, and the desire to commit wanton destruction (Kovacich 1999); attribution of such motivations from law enforcement and computer security agencies is unsurprising, as it offers the most clear-cut way of denying hacking any socially recognised legitimacy. Amongst a wider public, hackers are perceived to act on motivations ranging from self-assertion, curiosity, and thrill seeking, to greed and hooliganism (Dowland et al. 1999, p.720; Voiskounsky, Babeva and Smyslova 2000, p.71). Noteworthy here is the convergence between motives attributed for involvement in hacking and those commonly attributed to youth delinquency in general – the framing of hacking in terms of ‘vandalism’, ‘hooliganism’, ‘curiosity’ and ‘thrill seeking’ clearly references socially available constructions of juvenile offending and offenders (on à ¢â‚¬Ëœhooliganism’ see Pearson (1983); on ‘thrill seeking’ see Katz (1988); Presdee (2000)). One way in which commentators have attempted to reï ¬ ne their understandings of hacker motivations is to elicit from hackers themselves their reasons for engaging in computer crimes. There now exist a number of studies, both ‘popular’ and ‘scholarly’ in which (primarily young) hackers have been interviewed about their illicit activities (for example, Clough and Mungo 1992; Taylor 1999; Verton 2002). In addition, hackers themselves have authored texts and documents in which they elaborate upon their ethos and aims (see, for example, Dr K 2004). Such ‘insider’ accounts cite motivations very different from those cited by ‘outsiders’. In fact, they consistently invoke a rationale for hacking that explicitly mobilises the ‘hacker ethic’ of an earlier generation of computer enthusiasts. In hackers’ self-presentations, they are motivated by factors such as intellectual curiosity, the desire for expanding the boundaries of knowledge, a commitment to the free ï ¬â€šow and exchange of information, resistance to political authoritarianism and corporate domination, and the aim of improving computer security by exposing the laxity and ineptitude of those charged with safeguarding socially sensitive data. However, such accounts ‘straight from the horse’s mouth’ do not necessarily furnish insights into hacker motivations that are any more objectively true than those attributed by outside observers. As Taylor (1999) notes: ‘it is difï ¬ cult . . . to separate cleanly the ex ante motivations of hackers from their ex post justiï ¬ cations’ (p.44, italics in original). In other words, such self-attributed motivations may well be rhetorical devices mobilised by hackers to justify their law-breaking and defend themselves against accusat ions of criminality and deviance. Viewed in this way, hackers’ accounts can be seen as part of what criminologists Sykes and Matza (1957) call ‘techniques of neutralisation’. According to Sykes and Matza, ‘delinquents’ will make recourse to such techniques as a way of overcoming the inhibitions or guilt they may otherwise feel when embarking upon law-breaking activity. These techniques include strategies such as ‘denial of injury’, ‘denial of the victim’, ‘condemnation of the condemners’ and ‘appeal to higher loyalties’. The view of hackers’ self-narrations as instances of such techniques can be supported if we examine hacker accounts. A clear illustration is provided by a now famous (or infamous) document called The Conscience of a Hacker authored by ‘The Mentor’ in 1986, now better know as The Hacker’s Manifesto. In the Manifesto, its author explains hackers’ motivations by citing factors such as: the boredom experienced by ‘smart kids’ at the mercy of incompetent school teachers and ‘sadists’; the experience of being constantly dismissed by teachers and parents as ‘damn kids’ who are ‘all alike’; the desire to access a service that ‘could be dirt-cheap if it wasn’t run by proï ¬ teering gluttons’; the desire to explore and learn which is denied by ‘you’ who ‘build atomic bombs, [. . .] wage wars, [. . .] murder, cheat and lie’ (The Mentor 1986). Such reasoning clearly justiï ¬ es hacking activities by re-labelling ‘harm’ as ‘curiosity’, by suggesting that victims are in some sense ‘getting what they deserve’ as a consequence of their greed, and turning tables on accusers by claiming the ‘moral high ground’ through a citation of †˜real’ crimes committed by the legitimate political and economic establishment. Again, we see an inter-generational dimension that references commonplace understandings of ‘misunderstood youth’ and the corrupt and neglectful nature of the ‘adult world’. Thus young hackers themselves invest in and mobilise a perennial, socially available discourse about the ‘gulf ’ between ‘society’ and its ‘youth’. Discourses of Addiction: Computers, Drugs and the ‘Slippery Slope’ A second strand of thinking about hacking downplays ‘motivations’ and ‘choices’, and emphasises instead the psychological and/or social factors that seemingly dispose certain individuals or groups toward law-breaking behaviour. In such accounts, ‘free choice’ is sidelined in favour of a view of human actions as fundamentally caused by forces acting within or upon the offender. From an individualistic perspective, some psychologists have attempted to explain hacking by viewing it as an extension of compulsive computer use over which the actor has limited control. So-called ‘Internet Addiction Disorder’ is viewed as an addiction akin to alcoholism and narcotic dependence, in which the sufferer loses the capacity to exercise restraint over his or her own habituated desire (Young 1998; Young, Pistner and O’Mara 1999). Some accounts of teenage hacking draw explicit parallels with drug addiction, going so far as to suggest that engagement in relatively innocuous hacking activities can lead to more serious infractions, just as use of ‘soft’ drugs like marijuana is commonly claimed to constitute a ‘slippery slope’ leading to the use of ‘hard’ drugs like crack cocaine and heroin (Verton 2002, pp.35, 39, 41, 51).

Tuesday, January 7, 2020

European Crisis in the 1970s and 1980s - 2168 Words

European Crisis in the 1970s and 1980s During the 1950s and 1960s, Europe experienced a period of prosperity. Harold Macmillan gives a sense of just how well these times really were when he says, â€Å"Let us be frank about it: most of our people have never had it so good,† (Judt, 324). As political parties moved more towards a common center, rather than towards extremism, a rebirth of democracy was created, underlined by growth and full employment. The support for social democratic ideas flourished along with the prosperity of the 1950s and the 1960s in Western Europe. This time was characterized by conservative individualism and economic growth through regulated capitalism (Mazower, 327). With the help of the Marshall Plan, a global†¦show more content†¦As non-European companies raised the standard of competition, the prices likewise fell and the market for many European products collapsed. This directly affected the employment rate throughout Europe in many of the industries, as many jobs were no lon ger needed. As this need declined, labor began to demand the retention of jobs, wages, and benefits, making labor more costly (Drouin,12). The unemployment rate in Europe went from 4-5% in the 1950-60s to 10-12% during the 1970-80s (Dr. Shearer - lecture). For example, after World War II the mining workforce in the UK fell from 718,000 to 43,000, with the majority of the jobs lost during 1975-85 (Judt, 459). The steel industry also suffered. As non-European countries entered the market, the European steel industry collapsed. For example, British steelworkers lost 166,000 jobs between 1974-1986 (Judt, 459). As unemployment increased throughout Western Europe, there was a movement towards the service sector. Unemployment rates had a direct effect on politics in Western Europe. As industrial labor decreased while a movement towards the service industry increased, service-sector unions grew in size. During the 1970s and 1980s, political activism became more revolved around â€Å"identi ty† rather than class, allowing new groups to makeShow MoreRelatedGreek Economy and the Eurozone821 Words   |  3 PagesIn 1999, ten European nations joined together to create an economic and monetary union known as the Eurozone. Countries, such as Germany, have thrived with the euro but nations, like Greece, have deteriorated since its adoption of the euro in 2001. The Eurozone was created in 1999 and currently consists of eighteen European nations united under the European Central Bank and all use the euro. The Eurozone has a one point six percent inflation rate and an eleven point six percent unemployment rateRead MoreCold War And Its Effect On The End Of War1139 Words   |  5 Pagesthe USA and the USSR. These countries made this world separated, especially within European countries, into two with super enormous power. In this essay, brief introduction of cold war and the most effective factor to contribute to the end of war will be analysed. When it comes back to the beginning of cold war, in 1946, the barrier which called Iron wall build between the Western countries and the Eastern European Countries. Through all series of this affair, these two power of groups threatenedRead MoreAustralias Economy Essay997 Words   |  4 Pagesagricultural and manufacturing industries and to make a major contribution to the British effort in World Wars I and II. Now, Australia has a prosperous Western-style capitalist economy, with a per capita GDP at the level of the four dominant West European economies. Rich in natural resources, Australia is a major exporter of agricultural products, minerals, metals, and fossil fuels. Commodities account for 57% of the value of total exports, so that a downturn in world commodity prices can haveRead MoreThe Latin America Debt Crisis1002 Words   |  5 PagesThe Latin America debt crisis What Happened Both internal and external for Latin Americas roller coaster economic performance in what was known as the crisis. During the 50’s and 60’s there was favorable conditions in place to maintain steady employment creation, capital investment and overall economic expansion. But this period ended in 1973 amid the first world oil crisis rocked the world economy and caused an era of debt-led growth among the oil importing Latin America countries. Latin AmericanRead MoreItaly s Current Population Of Italy948 Words   |  4 Pagesagriculture, which employs around 5% of the workforce. Italy’s economy has been fragile for quite some time. Italy suffers from political variability, stagnation of the economy and a deficiency of structural reforms. When the most recent global crisis happened, it had worsening effects on Italy’s economy. One of the economies biggest challenges is the unemployment rate. The rate of unemployment has increased throughout the past seven years. It reached the highest level recorded in 2013 and againRead MoreHunger in Haiti1435 Words   |  6 PagesAbstract Haiti is a small Caribbean country with serious hunger problem for many years. Even in 1980s, Haiti had advanced agriculture and hunger problem was far from this country. However, the local wars and conflicts happened in 1990s changed this. Agriculture was disturbed and hunger problem became more and more serious. It has been the key problem of Haitian development so Haitian government and international society have taken lots of measures to improve this situation. The major internationalRead MoreUk and Its Trade Patterns5911 Words   |  24 Pagesperhaps international events or either any significant circumstances that are relevant. 1.2 Background Information 1.2.1 The United Kingdom (UK) UK is structured with England, Wales, Scotland and Northern Ireland. UK has a significant role in the European Union (EU), UN and NATO with major hands in international affairs throughout the globe. The current head of state is Queen Elizabeth II while the prime minister is David Cameron. IMF (2012, 1) maintains that as of 2011 UK’s GDP stand at USD 2,480Read MoreHow Globalization has Affected the American Automotive Industry652 Words   |  3 Pagesmarket in the United States during the 1970’s due to the changing emissions standards. The American Automotive Industry had to adjust to the new emissions standards from the Clean Air Act of 1970, and the fuel economy requirements of the Energy Policy and Conservation Act, all while building cars that attracted to American consumers. These new requirements caused many Americans to lose their curb appeal for larger, higher output vehicles. The Japanese and European imports were lighter and more fuelRead MoreWho Should Determine Refugee Policy870 Words   |  4 Pagesand diplomacy. After the mid 1970s, a prominent American immigration policy issue facing the problem of refugees, especially after the end of the Vietnam War, a large number of refugees in Southeast Asia needed resettlement. The United States had a serious problem, While refugees had limits and related provisions in the 1965 immigration law, but cannot meet the needs of the situation. Therefore, after the United States adopted a series of emergency measures, in 1980, Congress passed the RefugeeRead MoreColombia Essay.1417 Words   |  6 Pagesairport, and Cartagena (829,476), a seaport and oil pipeline terminal. The Colombian population has a diverse racial makeup. About 58 percent of the people are mestizo (of mixed European and Native American ancestry), about 20 percent are of unmixed European ancestry, and about 14 percent are mulatto (of mixed black and European ancestry). Blacks account for 4 percent of the population, mixed black and Native Americans for 3 percent, and unmixed Native Amer icans for 1 percent. The main religion in Colombia