352 resultados para Personal protection
Resumo:
In Newson v Aust Scan Pty Ltd t/a Ikea Springwood [2010] QSC 223 the Supreme Court examined the discretion under s 32(2) of the Personal Injuries Proceedings Act 2002 (Qld), to permit a document which has not been disclosed as required by the pre-court procedures under the PIPA to be used in a subsequent court proceeding. This appears to be the first time that the nature and parameters of the discretion have been judicially considered.
Resumo:
In June 2011, a research project team from the Institute for Ethics, Governance and Law (IEGL), Queensland University of Technology, the United Nations University, and the Australian Government’s Asia Pacific Civil-Military Centre of Excellence (APCMCOE) held three Capacity-Building Workshops (the Workshops) on the Responsibility to Protect (R2P) and the Protection of Civilians (POC) in Armed Conflict in Manila, Kuala Lumpur, and Jakarta. The research project is funded by the Australian Responsibility to Protect Fund, with support from APCMCOE. Developments in Libya and Cote d’Ivoire and the actions of the United Nations Security Council have given new significance to the relationship between R2P and POC, providing impetus to the relevance and application of the POC principle recognised in numerous Security Council resolutions, and the R2P principle, which was recognised by the United Nations General Assembly in 2005 and, now, by the Security Council. The Workshops considered the relationship between R2P and POC. The project team presented the preliminary findings of their study and sought contributions and feedback from Workshop participants. Prior to the Workshops, members of the project team undertook interviews with UN offices and agencies, international organisations (IOs) and non-government organisations (NGOs) in Geneva and New York as part of the process of mapping the relationship between R2P and POC. Initial findings were considered at an Academic-Practitioner Workshop held at the University of Sydney in November 2010. In addition to an extensive literature review and a series of academic publications, the project team is preparing a practical guidance text (the Guide) on the relationship between R2P and POC to assist the United Nations, governments, regional bodies, IOs and NGOs in considering and applying appropriate protection strategies. It is intended that the Guide be presented to the United Nations Secretariat in New York in early 2012. The primary aim of the Workshops was to test the project’s initial findings among an audience of diplomats, military, police, civilian policy-makers, practitioners, researchers and experts from within the region. Through dialogue and discussion, the project team gathered feedback – comments, questions, critique and suggestions – to help shape the development of practical guidance about when, how and by whom R2P and POC might be implemented.
Resumo:
While there is strong interest in teaching values in Australia and internationally there is little focus on young children’s moral values learning in the classroom. Research shows that personal epistemology influences teaching and learning in a range of education contexts, including moral education. This study examines relationships between personal epistemologies (children’s and teachers’), pedagogies, and school contexts for moral learning in two early years classrooms. Interviews with teachers and children and analysis of school policy revealed clear patterns of personal epistemologies and pedagogies within each school. A whole school approach to understanding personal epistemologies and practice for moral values learning is suggested.
Resumo:
This thesis is about the Australian domain name system and, in particular, the principles governing the registration of domain names in the '.au' country code domain space. It examines the different types of registration systems adopted in country code domain spaces and categorises them according to the extent to which they impose restrictions on registration, ranging from restrictive to unrestrictive. A comparative analysis is made of the restrictive registration system in Australia and the United Kingdom‘s unrestrictive system.
Resumo:
Privacy issues have hindered the evolution of e-health since its emergence. Patients demand better solutions for the protection of private information. Health professionals demand open access to patient health records. Existing e-health systems find it difficult to fulfill these competing requirements. In this paper, we present an information accountability framework (IAF) for e-health systems. The IAF is intended to address privacy issues and their competing concerns related to e-health. Capabilities of the IAF adhere to information accountability principles and e-health requirements. Policy representation and policy reasoning are key capabilities introduced in the IAF. We investigate how these capabilities are feasible using Semantic Web technologies. We discuss with the use of a case scenario, how we can represent the different types of policies in the IAF using the Open Digital Rights Language (ODRL).
Resumo:
Purpose: Young novice drivers continue to be overrepresented in fatalities and injuries arising from crashes even with the introduction of countermeasures such as graduated driver licensing (GDL). Enhancing countermeasures requires a better understanding of the variables influencing risky driving. One of the most common risky behaviours performed by drivers of all ages is speeding, which is particularly risky for young novice drivers who, due to their driving inexperience, have difficulty in identifying and responding appropriately to road hazards. Psychosocial theory can improve our understanding of contributors to speeding, thereby informing countermeasure development and evaluation. This paper reports an application of Akers’ social learning theory (SLT), augmented by Gerrard and Gibbons’ prototype/willingness model (PWM), in addition to personal characteristics of age, gender, car ownership, and psychological traits/states of anxiety, depression, sensation seeking propensity and reward sensitivity, to examine the influences on self-reported speeding of young novice drivers with a Provisional (intermediate) licence in Queensland, Australia. Method: Young drivers (n = 378) recruited in 2010 for longitudinal research completed two surveys containing the Behaviour of Young Novice Drivers Scale, and reported their attitudes and behaviours as pre-Licence/Learner (Survey 1) and Provisional (Survey 2) drivers and their sociodemographic characteristics. Results: An Akers’ measurement model was created. Hierarchical multiple regressions revealed that (1) personal characteristics (PC) explained 20.3%; (2) the combination of PC and SLT explained 41.1%; and (3) the combination of PC, SLT and PWM explained 53.7% of variance in self-reported speeding. Whilst there appeared to be considerable shared variance, the significant predictors in the final model included gender, car ownership, reward sensitivity, depression, personal attitudes, and Learner speeding. Conclusions: These results highlight the capacity for psychosocial theory to improve our understanding of speeding by young novice drivers, revealing relationships between previous behaviour, attitudes, psychosocial characteristics and speeding. The findings suggest multi-faceted countermeasures should target the risky behaviour of Learners, and Learner supervisors should be encouraged to monitor their Learners’ driving speed. Novice drivers should be discouraged from developing risky attitudes towards speeding.
Resumo:
This paper was presented at orientation, to a select group of Business Faculty First Year students accepted into the "Corporate Partners in Excellence Programme" (CPIE). It discusses some of the strategies for continuing as high performing students in University studies whilst at the same time maturing into successful, ethical professionals with a social and environmental conscience.
Resumo:
This paper draws on the work of the ‘EU Kids Online’ network funded by the EC (DG Information Society) Safer Internet plus Programme (project code SIP-KEP-321803); see www.eukidsonline.net, and addresses Australian children’s online activities in terms of risk, harm and opportunity. In particular, it draws upon data that indicates that Australian children are more likely to encounter online risks — especially around seeing sexual images, bullying, misuse of personal data and exposure to potentially harmful user-generated content — than is the case with their EU counterparts. Rather than only comparing Australian children with their European equivalents, this paper places the risks experienced by Australian children in the context of the mediation and online protection practices adopted by their parents, and asks about the possible ways in which we might understand data that seems to indicate that Australian children’s experiences of online risk and harm differ significantly from the experiences of their Europe-based peers. In particular, and as an example, this paper sets out to investigate the apparent conundrum through which Australian children appear twice as likely as most European children to have seen sexual images in the past 12 months, but parents are more likely to filter their access to the internet than is the case with most children in the wider EU Kids Online study. Even so, one in four Australian children (25%) believes that what their parents do helps ‘a lot’ to improve their internet experience, and Australian children and their parents are a little less likely to agree about the mediation practices taking place in the family home than is the case in the EU. The AU Kids Online study was carried out as a result of the ARC Centre of Excellence for Creative Industries and Innovation’s funding of a small scale randomised sample (N = 400) of Australian families with at least one child, aged 9–16, who goes online. The report on Risks and safety for Australian children on the internet follows the same format and uses much of the contextual statement around these issues as the ‘county level’ reports produced by the 25 EU nations involved in EU Kids Online, first drafted by Livingstone et al. (2010). The entirely new material is the data itself, along with the analysis of that data.
Resumo:
-International recognition of need for public health response to child maltreatment -Need for early intervention at health system level -Important role of health professionals in identifying, reporting, documenting suspician of maltreatment -Up to 10% of all children presenting at ED’s are victims and without identification, 35% reinjured and 5% die -In Qld, mandatory reporting requirement for doctors and nurses for suspected abuse or neglect
Resumo:
A case study relating to secondary education, examining the teacher student relationship as it operates within the English classroom is the topic of this paper. It describes how a certain conception of 'personal response' to literature provided a means for the teacher/counsellor to form the ethical capacities of children. 'Personal response' is usually associated with the moment in which the child is freed to be most natural. But for all the emphasis upon the irreducibly individual nature of the 'genuinely felt response', this pedagogic exercise finds its place within a series of strategies designed both to cherish and correct the child, to nurture and to scrutinise, to guide and to reconstruct.
Resumo:
There is strong evidence to show that beliefs about knowing and knowledge held by individuals (personal epistemologies) influence preservice teachers’ learning strategies and learning outcomes (Muis, 2004). However, we know very little about how preservice teachers’ personal epistemologies change as they progress through their teacher education programs. This study investigated changes in personal epistemology and beliefs about learning for a group of preservice teachers as they progressed through the four years of a Bachelor of Education degree. Preservice teachers completed the Epistemological Beliefs Survey (EBS, Kardash & Wood, 2000) when they commenced their course (Time 1) when they were in the 3rd year of their course (Time 2) and then again in the final year of their degree (Time 3). Findings indicated that there were significant changes in preservice teachers’ personal epistemologies between course entry and the final year of their course across all but one of the dimensions measured. Results are discussed in terms of the implications for teaching and teacher education.
Resumo:
The prohibition on unfair contract terms in standard form consumer contracts has the potential to significantly impact on the terms of contracts for the sale of land. The definition of ‘consumer contract’ includes contracts for the sale or grant of an interest in land to an individual wholly or predominantly for personal or domestic use. Therefore, a contract for the purchase of a residence for personal occupation by the buyer, as opposed to a purchase for investment purposes, will be a consumer contract potentially attracting the application of the unfair terms provisions. Significant consumer protection mechanisms already exist in most state jurisdictions requiring disclosure of relevant matters to the buyer and providing remedies for the provision of misleading conduct. Minimal evidence of unfair terms in land contract was presented to the Productivity Commission Inquiry into the Australian Consumer Policy Framework raising the question as to whether there is an identified problem of unfair terms in real estate contracts and if so, whether the same economic and ethical rationales justify regulatory intervention. This article examines what effect if any the introduction of the unfair contract provisions will have on the enforcement of residential land contracts and the viability of previously accepted conditions if challenged as being “unfair terms”. The article concludes that despite the existence of several potentially unfair terms in some land contracts, the intervention of the rules of equity to overcome perceived hardship or unfairness to buyers from strict enforcement of terms means the unfair terms provisions are only likely to operate on terms untouched by those principles. In the authors’ view the scope for operation of the unfair terms provisions will be limited to terms untouched by the principles of equity and consumer protection legislation making it unlikely that there will be any significant realignment of the contractual obligations and rights of buyers and sellers of land.
Resumo:
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.