999 resultados para 189999 Law and Legal Studies not elsewhere classified


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Child abuse and neglect is a significant health and social problem with serious consequences for children, families and communities. This chapter provides students, early childhood teachers, and administrators with an evidence base for understanding their role in relation to child abuse and neglect. The chapter draws from international and interdisciplinary research to address four key areas of responsibility: i) recognising signs of child abuse and neglect; ii) reporting child abuse and neglect; iii) supporting children in the classroom; and iv) teaching children to protect themselves (Watts, 1997).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This instrument was used in the project named Teachers Reporting Child Sexual Abuse: Towards Evidence-based Reform of Law, Policy and Practice (ARC DP0664847)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This instrument was used in the project named Teachers Reporting Child Sexual Abuse: Towards Evidence-based Reform of Law, Policy and Practice (ARC DP0664847)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Intimate partner violence (IPV) is not only a problem for heterosexual couples. Although research in the area is beset by methodological and definitional problems, studies generally demonstrate that IPV also affects those who identify as non-heterosexual; that is, those sexualities that are typically categorized as lesbian, gay, bisexual, transgender, or intersex (LGBTI). IPV appears to be at least as prevalent in LGBTI relationships as it is in heterosexual couples, and follows similar patterns (e.g. Australian Research Centre on Sex, Health and Society 2006; Donovan et al. 2006; Chan 2005; Craft and Serovich 2005; Burke et al. 2002; Jeffries and Ball 2008; Kelly and Warshafsky 1987; Letellier 1994; Turrell 2000; Ristock 2003; Vickers 1996). There is, however, little in the way of specific community or social services support available to either victims or perpetrators of violence in same-sex relationships (see Vickers 1996). In addition, there are important differences in the experience of IPV between LGBTI and non-LGBTI victims, and even among LGBTI individuals; for example, among transgender populations (Chan 2005), and those who are HIV sero-positive (Craft and Serovich 2005). These different experiences of IPV include the use of HIV and the threat of “outing” a partner as tools of control, as just two examples (Jeffries and Ball 2008; Salyer 1999; WA Government 2008b). Such differences impact on how LGBTI victims respond to the violence, including whether or not and how they seek help, what services they are able to avail themselves of, and how likely they are to remain with, or return to, their violent partners (Burke et al. 2002). This chapter explores the prevalent heteronormative discourses that surround IPV, both within the academic literature, and in general social and government discourses. It seeks to understand how same-sex IPV remains largely invisible, and suggests that these dominant discourses play a major role in maintaining this invisibility. In many respects, it builds on work by a number of scholars who have begun to interrogate the criminal justice and social discourses surrounding violent crime, primarily sexual violence, and who problematize these discourses (see for example Carmody 2003; Carmody and Carrington 2000; Marcus 1992). It will begin by outlining these dominant discourses, and then problematize these by identifying some of the important differences between LGBTI IPV and IPV in heterosexual relationships. In doing so, this chapter will suggest some possible reasons for the silence regarding IPV in LGBTI relationships, and the effects that this can have on victims. Although an equally important area of research, and another point at which the limitations of dominant social discourses surrounding IPV can be brought to light, this chapter will not examine violence experienced by heterosexual men at the hands of their intimate female partners. Instead, it will restrict itself to IPV perpetrated within same-sex relationships.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The importance of student engagement to higher education quality, making deep learning outcomes possible for students, and achieving student retention, is increasingly being understood. The issue of student engagement in the first year of tertiary study is of particular significance. This paper takes the position that the first year curriculum, and the pedagogical principles that inform its design, are critical influencers of student engagement in the first year learning environment. We use an analysis of case studies prepared for Kift’s ALTC Senior Fellowship to demonstrate ways in which student engagement in the first year of tertiary study can be successfully supported through intentional curriculum design that motivates students to learn, provides a positive learning climate, and encourages students to be active in their learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The insurance industry discharges a critical role in the Australian economy and is a significant part of the Australian financial services market. The industry relies upon intermediaries, the principal types being brokers and agents, to promote, arrange and distribute their products and services in the market. The pivotal role that they play in this context and sensitivities associated with the consumer oriented products, such as house and contents insurance, has ensured close regulatory attention. Of particular importance was the passage of the Insurance (Agents and Brokers) Act 1984 (Cth), a comprehensive attempt to address the responsibilities of intermediaries as well as particular problem areas associated with the handling of money. However, with the introduction of financial services and market reform early in the new millennium this insurance intermediary specific regulatory approach was abandoned in favour of a market-wide strategy; that is, market reform was based upon across-the-board licensing, disclosure, conduct and fairness standards, and all financial products and services are now regulated at a generic level under Ch 7 of the Corporations Act 2001 (Cth). This article briefly explores the categories of insurance intermediaries and the relevant distinctions between them but focuses mainly upon the regulatory context in which they operate. This context transcends a strictly legal framework as the regulatory body, the Australian Securities and Investments Commission (ASIC), has sought to inform and guide the market through Policy Statements and Regulatory Guides. The usefulness of these guides as an adjunct to the legislation in explaining the scope and operation of regulatory framework is examined. In addition, the article looks at the self-regulatory and dispute resolution practices in this area and their impact. In conclusion an assessment of this across-the-board regulatory regime is advanced.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This short article considers whether terminally ill adolescents have a right to refuse life sustaining treatment. The article is focused on the UK case of Hannah Jones which attracted a significant amount of media attention in 2008.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is well recognised in the literature on first year higher education that there is a need for Universities to provide further support and development in student learning skills and engagement. Assessment and feedback is an area with differing expectations and understandings among academics and students (e.g. AUSSE, CEQ). Consistency and explicitness in academic feedback is fundamental in assisting students in their transition to university education and learning. This poster captures the progress of an 18 month funded by the Faculty of Law Teaching and Learning Grant scheme (QUT). The project sought to develop and trial an assessment checklist/diagnostic tool to accompany Criteria Referenced Assessment sheets for students within the School of Justice, Law Faculty, Queensland University of Technology (QUT).The checklist was trialled across four units in the School of Justice (Law faculty) amongst an estimated cohort of over 600 students undertaking single and dual degrees.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Software forms an important part of the interface between citizens and their government. An increasing amount of government functions are being performed, controlled, or delivered electronically. This software, like all language, is never value-neutral, but must, to some extent, reflect the values of the coder and proprietor. The move that many governments are making towards e-governance, and the increasing reliance that is being placed upon software in government, necessitates a rethinking of the relationships of power and control that are embodied in software.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This instrument was used in the project entitled Teachers Reporting Child Sexual Abuse: Towards Evidence-based Reform of Law, Policy and Practice (ARC DP0664847)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This instrument was used in the project named Teachers Reporting Child Sexual Abuse: Towards Evidence-based Reform of Law, Policy and Practice (ARC DP0664847)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This instrument was used in the project named Teachers Reporting Child Sexual Abuse: Towards Evidence-based Reform of Law, Policy and Practice (ARC DP0664847)