220 resultados para Justicialist Party


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Parliamentary committees fulfil several important functions within the Parliament, with one of these being the oversight of various agencies including those that are designed to reduce corruption within the police service and other public sector agencies. The cross-party nature of committees combined with the protections of Parliament make them powerful agencies. Prenzler & Faulkner (2010) suggest that the ideal system for an agency that has oversight of a public sector integrity commission should include monitoring by a parliamentary committee, with an inspector attached to the committee. This occurs in Queensland, New South Wales and Western Australia. There has been very little research conducted on the role of parliamentary committees with oversight responsibilities for public sector integrity agencies. This paper will address this gap by examining the relationship between a parliamentary committee, a parliamentary inspector and a corruption commission. Queensland’s Parliamentary Crime and Misconduct Committee (PCMC/the Committee) and the Parliamentary Crime and Misconduct Commissioner (the Commissioner) provide oversight of the Crime and Misconduct Commission (CMC). By focussing on the PCMC and the Commissioner, the paper will examine the legislative basis for the Committee and Commissioner and their respective roles in providing oversight of the CMC. One key method by which the PCMC provides oversight of the CMC is to conduct and publish a review of the CMC every three years. Additionally, the paper will identify some of the similarities and differences between the PCMC and other committees that operate within the Queensland Parliament. By doing so, the paper will provide insights into the relationships that exist between corruption commissions, parliamentary committees and parliamentary inspectors and demonstrate the important role of the parliamentary committee in preventing instances of public sector corruption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A typical characteristic of the ongoing practice of democracy in Singapore has been described by some scholars as 'illiberal democracy'. Noting that Singapore 's brand of democracy operates within a 'dominant, one-party system', other scholars cushioned such a democratic practice by their reference to 'semi-democracy', 'controlled democracy, 'guided democracy, and 'communitarian democracy'. However, despite the demonstration that there are many restrictions in the type of democracy that exists in Singapore, the benefits are numerous. Singapore is the only country in the world to have transformed itself from a developing country to a developed country in less than only forty years. But its slower move towards a culture ofparticipation must move as quickly as globalization does if it is to remain in relevant and legitimate democracy. If the younger generation understands that they should have the right to a voice before the government acknowledges it, the transition could be more tumultuous than necessary.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two of the government’s six media reform bills passed in the House of Representatives with multi-party support on Tuesday 19 March. While most attention and debate has focused on the regulation of the news media and ownership, the changes approved on 19 March are both significant and far-reaching.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The export market for Australian wine continues to grow at a rapid rate, with imported wines also playing a role in market share in sales in Australia. It is estimated that over 60 per cent of all Australian wine is exported, while 12 per cent of wine consumed in Australia has overseas origins. In addition to understanding the size and direction (import or export) of wines, the foreign locales also play an important role in any tax considerations. While the export market for Australian produced alcohol continues to grow, it is into the Asian market that the most significant inroads are occurring. Sales into China of bottled wine over $7.50 per litre recently overtook the volume sold our traditional partners of the United States and Canada. It is becoming easier for even small to medium sized businesses to export their services or products overseas. However, it is vital for those businesses to understand the tax rules applying to any international transactions. Specifically, one of the first tax regimes that importers and exporters need to understand once they decide to establish a presence overseas is transfer pricing. These are the rules that govern the cross-border prices of goods, services and other transactions entered into between related parties. This paper is Part 2 of the seminar presented on transfer pricing and international tax issues which are particularly relevant to the wine industry. The predominant focus of Part 2 is to discuss four key areas likely to affect international expansion. First, the use of the available transfer pricing methodologies for international related party transactions is discussed. Second, the affects that double tax agreements will have on taking a business offshore are considered. Third, the risks associated with aggressive tax planning through tax information exchange agreements is reviewed. Finally, the paper predicts future ‘trip-wires’ and areas to ‘watch out for’ for practitioners dealing with clients operating in the international arena.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Increasingly, the effectiveness of the present system of taxation of international businesses is being questioned. The problem associated with the taxation of such businesses is twofold. A system of international taxation must be a fair and equitable system, distributing profits between the relevant jurisdictions and, in doing so, avoiding double taxation. At the same time, the prevention of fiscal evasion must be secured. In an attempt to achieve a fair and equitable system Australia adopts unilateral, bilateral and multilateral measures to avoid double taxation and restrict the avoidance of tax. The first step in ascertaining the international allocation of business income is to consider the taxation of business income according to domestic law, that is, the unilateral measures. The treatment of international business income under the Australian domestic law, that is, the Income Tax Assessment Act 1936 (Cth) and Income Tax Assessment Act 1997 (Cth), will depend on two concepts, first, whether the taxpayer is a resident of Australia and secondly, whether the income is sourced in Australia. After the taxation of business profits has been determined according to domestic law it is necessary to consider the applicability of the bilateral measures, that is, the Double Tax Agreements (DTAs) to which Australia is a party, as the DTAs will override the domestic law where there is any conflict. Australia is a party to 40 DTAs with another seven presently being negotiated. The preamble to Australia's DTAs provides that the purpose of such agreements is 'to conclude an Agreement for the avoidance of double taxation and the prevention of fiscal evasion with respect to taxes on income'. Both purposes, for different reasons, are equally important. It has been said that: The taxpayer hopes the treaty will prevent the double taxation of his income; the tax gatherer hopes the treaty will prevent fiscal evasion; and the politician just hopes. The first purpose, the avoidance of double taxation, is achieved through the provision of rules whereby the Contracting States agree to the classification of income and the allocation of that income to a particular State. In this sense DTAs do not allocate jurisdiction to tax but rather provide an arrangement whereby the States agree to restrict their substantive law. The restriction is either through the non-taxing of the income or via the provision of a tax credit.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The recognition and enforcement of foreign judgments is an aspect of private international law, and concerns situations where a successful party to litigation seeks to rely on a judgment obtained in one court, in a court in another jurisdiction. The most common example where the recognition and enforcement of foreign judgments may arise is where a party who has obtained a favourable judgment in one state or country may seek to recognise and enforce the judgment in another state or country. This occurs because there is no sufficient asset in the state or country where the judgment was rendered to satisfy that judgment. As technological advancements in communications over vast geographical distances have improved exponentially in recent years, there has been an increase in cross-border transactions, as well as litigation arising from these transactions. As a result, the recognition and enforcement of foreign judgments is of increasing importance, since a party who has obtained a judgment in cross-border litigation may wish to recognise and enforce the judgment in another state or country, where the defendant’s assets may be located without having to re-litigate substantive issues that have already been resolved in another court. The purpose of the study is to examine whether the current state of laws for the recognition and enforcement of foreign judgments in Australia, the United States and the European Community are in line with modern-commercial needs. The study is conducted by weighing two competing objectives between the notion of finality of litigation, which encourages courts to recognise and enforce judgments foreign to them, on the one hand, and the adequacy of protection to safeguard the recognition and enforcement proceedings, so that there would be no injustice or unfairness if a foreign judgment is recognised and enforced, on the other. The findings of the study are as follows. In both Australia and the United States, there is a different approach concerning the recognition and enforcement of judgments rendered by courts interstate or in a foreign country. In order to maintain a single and integrated nation, there are constitutional and legislative requirements authorising courts to give conclusive effects to interstate judgments. In contrast, if the recognition and enforcement actions involve judgments rendered by a foreign country’s court, an Australian or a United States court will not recognise and enforce the foreign judgment unless the judgment has satisfied a number of requirements and does not fall under any of the exceptions to justify its non-recognition and non-enforcement. In the European Community, the Brussels I Regulation which governs the recognition and enforcement of judgments among European Union Member States has created a scheme, whereby there is only a minimal requirement that needs to be satisfied for the purposes of recognition and enforcement. Moreover, a judgment that is rendered by a Member State and based on any of the jurisdictional bases set forth in the Brussels I Regulation is entitled to be recognised and enforced in another Member State without further review of its underlying jurisdictional basis. However, there are concerns as to the adequacy of protection available under the Brussels I Regulation to safeguard the judgment-enforcing Member States, as well as those against whom recognition or enforcement is sought. This dissertation concludes by making two recommendations aimed at improving the means by which foreign judgments are recognised and enforced in the selected jurisdictions. The first is for the law in both Australia and the United States to undergo reform, including: adopting the real and substantial connection test as the new jurisdictional basis for the purposes of recognition and enforcement; liberalising the existing defences to safeguard the application of the real and substantial connection test; extending the application of the Foreign Judgments Act 1991 (Cth) in Australia to include at least its important trading partners; and implementing a federal statutory scheme in the United States to govern the recognition and enforcement of foreign judgments. The second recommendation is to introduce a convention on jurisdiction and the recognition and enforcement of foreign judgments. The convention will be a convention double, which provides uniform standards for the rules of jurisdiction a court in a contracting state must exercise when rendering a judgment and a set of provisions for the recognition and enforcement of resulting judgments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Synopsis and review of For the Term of His Natural Life (Norman Dawn, 1927). Includes cast and credits. For the Term of His Natural Life was one of the last Australian silent films, and also one of the most significant in the history of Australian cinema. At the time of its production, controversy raged over its depiction of convict life, its scale and cost (which was reported to be around 50,000 pounds at a time when most Australian films had budgets of less than 2,000 pounds1) and the fact that the director, several of the crew and the leading cast members were American. Australasian Films launched a publicity campaign of unprecedented scale to counter opposition to the film’s subject matter and the charge that they were “seeking to make capital out of the drab and sordid days of Australia”.2 The film’s expense was turned into a virtue: hundreds of unemployed men were used as extras, while the film also provided work for many within the Australian film industry and, according to Australasian, enabled the establishment of new production companies. The American imports who earlier had been accused of being “party to the slaughtering” of the Australian film industry, were feted for their artistic contributions, and the concerns raised in federal parliament about an American “invasion” were deflected by claims about what the local industry could learn from those with Hollywood experience.3 The publicity campaign was successful, as the film proved enormously popular at the Australian box office in its initial run. But the coming of sound film in 1928 had a considerable impact on audiences for silent films like For the Term, and its early local success was not repeated in subsequent seasons or in overseas markets...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Acquaintance is a fundamental determinant of how people behave when interacting with one another. This article focuses on how this type of personal knowledge is an important consideration for people as social actors. Studying naturally-occurring social encounters, I describe how speakers use particular references to convey whether a recipient should be able to recognise a non-present third party. On some occasions, however, the presumption of recognisability or non-recognisability that underpins the use of a particular reference proves questionable. By exploring how recipients can challenge reference forms, and thereby reject claims of either recognisability or non-recognisability, I explain how people establish and maintain a shared understanding of who knows whom. I conclude by discussing motivations for this behaviour, and thereby contribute to understanding the commonsense reasoning that underpins orderly conduct in this aspect of social encounters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In contemporary Western society, including Australia, professional mediation practice has developed with a specifically defined foundational approach - a problem-solving, facilitative method, in which the mediator's intervention is centred on providing the parties with a series of formal steps to assist their communication and to steer them towards a self-determined and mutually agreeable resolution of the issues in dispute. Facilitative mediation developed, in part, as a response to the adversarial system of law and justice. In that system the parties are said to lose control of their dispute, and a decision is imposed on them which invariably puts one party in a losing position. Facilitative mediation has offered an alternative to this inevitable outcome by offering the parties a democratic, cost-effective, party-centred, empowering, interests-based and principled option for resolving their dispute.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In late 2007, newly elected Prime Minister Kevin Rudd placed education reform on centre stage as a key policy in the Labor Party's agenda for social reform in Australia. A major policy strategy within this 'Education Revolution' was the development of a national curriculum, the Australian Curriculum Within this political context, this study is an investigation into how social justice and equity have been used in political speeches to justify the need for, and the nature of, Australia's first official national curriculum. The aim is to provide understandings into what is said or not said; who is included or excluded, represented or misrepresented; for what purpose; and for whose benefit. The study investigates political speeches made by Education Ministers between 2008 and 201 0; that is, from the inception of the Australian Curriculum to the release of the Phase 1 F - 10 draft curriculum documents in English, mathematics, science and history. Curriculum development is defined here as an ongoing process of complex conversations. To contextualise the process of curriculum development within Australia, the thesis commences with an initial review of curriculum development in this nation over the past three decades. It then frames this review within contemporary curriculum theory; in particular it calls upon the work of William Pinar and the key notions of currere and reconceptualised curriculum. This contextualisation work is then used as a foundation to examine how social justice and equity have been represented in political speeches delivered by the respective Education Ministers Julia Gillard and Peter Garrett at key junctures of Australian Curriculum document releases. A critical thematic policy analysis is the approach used to examine selected official speech transcripts released by the ministerial media centre through the DEEWR website. This approach provides a way to enable insights and understandings of representations of social justice and equity issues in the policy agenda. Broader social implications are also discussed. The project develops an analytic framework that enables an investigation into the framing of social justice and equity issues such as inclusion, equality, quality education, sharing of resources and access to learning opportunities in political speeches aligned with the development of the Australian Curriculum Through this analysis, the study adopts a focus on constructions of educationally disadvantaged students and how the solutions of 'fixing' teachers and providing the 'right' curriculum are presented as resolutions to the perceived problem. In this way, it aims to work towards offering insights into political justifications for a national curriculum in Australia from a social justice perspective.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article argues that a semantic shift in the crowd in Vietnam over the last decade has allowed public space to become a site through which transgressive ideologies and desires may have an outlet. At a time of accelerating social change, the state has effectively delimited public criticism yet a fragile but assertive form of Vietnamese democratic practice has arisen in public space, at the margins of official society, in sites previously equated with state control. Official state functions attract only small audiences, and rather than celebrating the dominance of the party, reveal the disengagement of the populace in the party's activities. Where crowds were always a component of state (stage)-managed events, now public spaces are attracting large numbers of people for supposedly non-political activities which may become transgressive acts condemned by the regime. In support of the notion that crowding is an opening up of the possibility of more subversive political actions, the paper presents an analysis of recent crowd formations and the state's reaction to them. The analysis reveals the modalities through which popular culture has provided the public with the means to transcend the constraints of official, authorized, and legitimate codes of behaviour in public space. Changes in the use of public space, it is argued, map the sets of relations between the public and the state, making these transforming relationships visible, although fraught with contradictions and anomalies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis commences with the proposition that the first limb of the doctrine of privity causes injustice to third party beneficiaries in Malaysia, particularly in commercial contracts. The doctrine of privity has been the subject of criticism by the judiciary and academic commentators in common law jurisdictions, mainly directed at the first limb of the doctrine, whereby only parties to a contract can sue and be sued. The first limb prevents a third party from enforcing benefits conferred on them by those contracts thereby resulting in third parties suffering loss and injustice to those parties. In several common law countries, such as England, Australia, New Zealand and Singapore, legislative reform of the doctrine has occurred. The legislative reform has abrogated to a significant extent the doctrine of privity in commercial contracts. Malaysia is a common law country, where the doctrine of privity is still applied to contracts. An analysis of Malaysian case law demonstrates that the most affected third party beneficiaries are those seeking to enforce insurance and construction contracts. While a small number of other third parties to commercial contracts, such as agreements to pay for work done, sale and purchase agreements and tenancy agreements are also affected, the detriment is not as significant. As a consequence, this thesis focuses primarily on the impact of the doctrine of privity on commercial contracts in the areas of insurance and construction in Malaysia The thesis aims to recommend appropriate reforms to address the injustices arising from the privity doctrine for third parties seeking to obtain the benefit of insurance and construction contracts, which may also benefit third parties to other types of commercial contracts. While the Malaysian insurance, consumer protection, negotiable instruments and agency laws allow third party beneficiaries to enforce benefits in contracts, the rights are found to be inadequate. As not all third parties seeking to enforce an insurance or construction contract can rely upon the legislation, the injustice arising from the doctrine of privity remains and needs to be addressed. To achieve this aim, a comparative analysis of the rights of third party beneficiaries under insurance and construction contracts in Malaysia, Australia and England is undertaken. The results of the analysis are used to identify appropriate elements for a legislative framework guided by the three essential criteria for effective law reform developed in the thesis. The three criteria are certainty, public interest and justice. The thesis recommends first the enactment of general legislation applicable to all commercial contracts including insurance contracts. Secondly, the thesis recommends specific targeted legislation to address the injustice faced by third party beneficiaries in construction contracts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The 2 hour game jam was performed as part of the State Library of Queensland 'Garage Gamer' series of events, summer 2013, at the SLQ exhibition. An aspect of the exhibition was the series of 'Level Up' game nights. We hosted the first of these - under the auspices of brIGDA, Game On. It was a party - but the focal point of the event was a live streamed 2 hour game jam. Game jams have become popular amongst the game development and design community in recent years, particularly with the growth of the Global Game Jam, a yearly event which brings thousands of game makers together across different sites in different countries. Other established jams take place on-line, for example the Ludum Dare challenge which as been running since 2002. Other challenges follow the same model in more intimate circumstances and it is now common to find institutions and groups holding their own small local game making jams. There are variations around the format, some jams are more competitive than others for example, but a common aspect is the creation of an intense creative crucible centred around team work and ‘accelerated game development’. Works (games) produced during these intense events often display more experimental qualities than those undertaken as commercial projects. In part this is because the typical jam is started with a conceptual design brief, perhaps a single word, or in the case of the specific game jam described in this paper, three words. Teams have to envision the challenge key word/s as a game design using whatever skills and technologies they can and produce a finished working game in the time given. Game jams thus provide design researchers with extraordinary fodder and recent years have also seen a number of projects which seek to illuminate the design process as seen in these events. For example, Gaydos, Harris and Martinez discuss the opportunity of the jam to expose students to principles of design process and design spaces (2011). Rouse muses on the game jam ‘as radical practice’ and a ‘corrective to game creation as it is normally practiced’. His observations about his own experience in a jam emphasise the same artistic endeavour forefronted earlier, where the experience is about creation that is divorced from the instrumental motivations of commercial game design (Rouse 2011) and where the focus is on process over product. Other participants remark on the social milieu of the event as a critical factor and the collaborative opportunity as a rich site to engage participants in design processes (Shin et al, 2012). Shin et al are particularly interested in the notion of the site of the process and the ramifications of participants being in the same location. They applaud the more localized event where there is an emphasis on local participation and collaboration. For other commentators, it is specifically the social experience in the place of the jam is the most important aspect (See Keogh 2011), not the material site but rather the physical embodied experience of ‘being there’ and being part of the event. Participants talk about game jams they have attended in a similar manner to those observations made by Dourish where the experience is layered on top of the physical space of the event (Dourish 2006). It is as if the event has taken on qualities of place where we find echoes of Tuan’s description of a particular site having an aura of history that makes it a very different place, redolent and evocative (Tuan 1977). The 2 hour game jam held during the SLQ Garage Gamer program was all about social experience.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.