352 resultados para Personal protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

While in many travel situations there is an almost limitless range of available destinations, travellers will usually only actively consider two to six in their decision set. One of the greatest challenges facing destination marketers is positioning their destination, against the myriad of competing places that offer similar features, into consumer decision sets. Since positioning requires a narrow focus, marketing communications must present a succinct and meaningful proposition, the selection of which is often problematic for destination marketing organisations (DMO), which deal with a diverse and often eclectic range of attributes in addition to self-interested and demanding stakeholders who have interests in different market segments. This paper reports the application of two qualitative techniques used to explore the range of cognitive attributes, consequences and personal values that represent potential positioning opportunities in the context of short break holidays. The Repertory Test is an effective technique for understanding the salient attributes used by a traveller to differentiate destinations, and Laddering Analysis enables the researcher to explore the smaller set of consequences and personal values guiding such decision making. A key finding of the research was that while individuals might vary in their repertoire of salient attributes, there was a commonality of shared consequences and values. This has important implications for DMOs, since a brand positioning theme that is based on a value will subsume multiple and diverse attributes. It is posited that such a theme will appeal to a broader range of travellers, as well as appease a greater number of destination stakeholders, than would an attribute based theme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study presents the importance of a mentor’s (experienced teacher’s) personal attributes and pedagogical knowledge for developing a mentee’s (preservice teacher’s) teaching practices. Specifically, preservice teachers can have difficulties with behaviour management and must learn management strategies that help them to teach more effectively. This paper investigates how mentoring may facilitate the development of a mentee’s behaviour management strategies, in particular what personal attributes and pedagogical knowledge are used in this process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The relationship between the environment and human rights has long been recognised. It is now largely accepted that a ‘good’ environment is a necessary precondition for the enjoyment of a wide range of human rights, including the right to health, the right to an adequate standard of living, and even the right to life. It has even been suggested that as humans we all possess a right to live in an environment of a certain standard, based on the intrinsic value of the natural world to all human beings. In this context much has been written regarding the important role that the environment plays in human lives. This paper looks at the flip-side of this discussion, and examines what human rights can do for the environment. It is argued that, while there are valid criticisms for linking environmental protection too strongly to human needs, there is nonetheless much to be gained from using human rights law as a framework to achieve environmental protection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2001, amendments to the Migration Act 1958 (Cth) made possible the offshore processing of protection claims. The same amendments also foreshadowed the processing of claims by ‘offshore entry persons’ in Australia according to non-statutory procedures. After disbanding offshore processing the then Rudd Labor Government commenced processing of protection claims by ‘offshore entry persons’ in Australia under the Refugee Status Assessment process (RSA). The RSA process sought to substitute well established legislative criteria for the grant of a protection visa, as interpreted by the courts, with administrative guidelines and decision-making immune from judicial review. This approach was rejected by the High Court in the cases M61 and M69. This article analyses these developments in light of Australia’s international protection obligations, as well as considering the practical obstacles that continue to confront offshore entry persons as they pursue judicial review of adverse refugee status determinations after the High Court’s decision.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The fundamental personal property rule – no one can transfer a better title to property than they had – is subject to exceptions in the Sale of Goods legislation, which aim to protect innocent buyers who are deceived by a seller’s apparent physical possession of property. These exceptions cover a limited range of transactions and are restrictive in their operation. Australia now has national legislation - the Personal Property Securities Act 2009 (Cth) - which will apply to many transactions outside the scope of the Sale of Goods Act and which includes rules for sales by non-owners which will provide exceptions to the nemo dat quod non habet rule for many common commercial transactions. This article explores the effect of the Personal Property Securities Act 2009 (Cth) on the Sale of Goods exceptions, explains that the new provisions are so wide that there is little continuing relevance for the Sale of Goods Act exceptions, and indicates where they may still apply.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Victorians feel a strong connection to their local waterways and most have a good grasp of river health issues. The My Victorian Waterway report analyses how Victorians interact with their local waterways including rivers, lakes and estuaries. The report is based on the results of a survey completed by more than 7,000 Victorians who answered questions about how they use and care for their local waterways as well as their knowledge of river health issues and aspirations for the future of our waterways.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has new national legislation - the Personal Property Securities Act 2009 (Cth) and the Personal Property Securities Regulations 2010 – which is expected to commence operating in February 2012. Previous personal property securities legislation was very complex, with more than seventy pieces of legislation in the states and territories, and more than forty registers. This reform package is the culmination of a process that began many years ago and various drafts have been the subject of much investigation and consultation. This legislation rationalises previous laws and bring about substantial changes to this area of law. This paper seeks to explain the principal changes and their implications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Client puzzles are moderately-hard cryptographic problems neither easy nor impossible to solve that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity. We propose an efficient client puzzle based on modular exponentiation. Our puzzle requires only a few modular multiplications for puzzle generation and verification. For a server under denial of service attack, this is a significant improvement as the best known non-parallelisable puzzle proposed by Karame and Capkun (ESORICS 2010) requires at least 2k-bit modular exponentiation, where k is a security parameter. We show that our puzzle satisfies the unforgeability and difficulty properties defined by Chen et al. (Asiacrypt 2009). We present experimental results which show that, for 1024-bit moduli, our proposed puzzle can be up to 30 times faster to verify than the Karame-Capkun puzzle and 99 times faster than the Rivest et al.'s time-lock puzzle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the long term, with development of skill, knowledge, exposure and confidence within the engineering profession, rigorous analysis techniques have the potential to become a reliable and far more comprehensive method for design and verification of the structural adequacy of OPS, write Nimal J Perera, David P Thambiratnam and Brian Clark. This paper explores the potential to enhance operator safety of self-propelled mechanical plant subjected to roll over and impact of falling objects using the non-linear and dynamic response simulation capabilities of analytical processes to supplement quasi-static testing methods prescribed in International and Australian Codes of Practice for bolt on Operator Protection Systems (OPS) that are post fitted. The paper is based on research work carried out by the authors at the Queensland University of Technology (QUT) over a period of three years by instrumentation of prototype tests, scale model tests in the laboratory and rigorous analysis using validated Finite Element (FE) Models. The FE codes used were ABAQUS for implicit analysis and LSDYNA for explicit analysis. The rigorous analysis and dynamic simulation technique described in the paper can be used to investigate the structural response due to accident scenarios such as multiple roll over, impact of multiple objects and combinations of such events and thereby enhance the safety and performance of Roll Over and Falling Object Protection Systems (ROPS and FOPS). The analytical techniques are based on sound engineering principles and well established practice for investigation of dynamic impact on all self propelled vehicles. They are used for many other similar applications where experimental techniques are not feasible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 'dick' tog, a briefs-style male swimsuit as it is colloquially referred to, is linked to Australia's national identity with overtly masculine bronzed 'Aussie' bodies clothed in this iconic apparel. However, the reality is, our hunger for worshiping the sun and the addiction to a beach culture is tempered by the pragmatic need to cover up and wear neck-to-knee, or more apt, head-to-toe sun protective clothing. Australia, in particular the state of Queensland, has one of the highest rates of skin cancer in the world; nevertheless, even after wide-ranging public programs for sun safety awareness many people still continue to wear designs that provide minimal sun protection. This paper will examine issues surrounding fashion and sun safe clothing. It will be proposed that in order to have effective community adoption of sun safe practices it is critical to understand the important role that fashion plays in determining sun protective behaviour.