444 resultados para crime and justice
Resumo:
Indigenous Legal Relations in Australia is a welcome and refreshing addition to the current literature on Indigenous legal issues. Written by a team of highly qualified Indigenous and non-Indigenous academics who share a long term commitment to Indigenous legal and social justice issues, this book provides a clearly written and accessible introductory text for tertiary students and general readers alike who are seeking to gain a deeper understanding of the relationship between Indigenous Australians and the Anglo-Australian legal system.
Resumo:
The purpose of this article is to highlight the conflict in the policy objectives of subs 46(1) and subs 46(1AA) of the Trade Practices Act 1974 (Cth) (TPA). The policy objective of subs 46(1) is to promote competition and efficient markets for the benefit of consumers (consumer welfare standard). It does not prohibit corporations with substantial market power using cost savings arising from efficiencies such economies of scale or scope, to undercut small business competitors The policy objective of 46(1AA), on the other hand, is to protect small business operators from price discounting by their larger competitors.. Unlike subs 46(1), it does not contain a ‘taking advantage’ element. It is argued that subs 46(1AA) may harm consumer welfare by having a chilling effect on price competition if this would harm small business competitors.
Resumo:
The revolution in legal research provides exciting challenges for those exploring and writing about the legal landscape. Cumbersome paper sources have largely been replaced by electronic files and a new range of skills and sources are required to successfully conduct legal research.--------- Researching and Writing in Law, 3rd Edition is an updated research guide, mapping the developments that have taken place and providing the keys to the fundamental electronic sources of legal research, especially those now available on the web, as well as exploring traditional doctrinal methodologies. Included in this edition are extensive checklists for locating and validating the law in Australia, England, Canada, the United States, New Zealand, India and the European Union.-------- This third edition includes expanded discussion of the process of formulating a research proposal, writing project abstracts and undertaking a literature review (Chapter 7). Research methodologies are also extensively examined, focusing on the process of doctrinal methodology as well as discussing other useful methodologies, such as Comparative Research and Content Analysis (Chapter 5). Further highlighted are issues surrounding research ethics, including plagiarism and originality, the importance of developing skills in critique, and the influence of current university research environments on postgraduate legal research.-------- Law students and members of the practising profession aiming to update their research, knowledge and skills will find Researching and Writing in Law, 3rd Edition invaluable.
Resumo:
Market failures involving the sale of complex merchandise, such as residential property, financial products and credit, have principally been attributed to information asymmetries. Existing legislative and regulatory responses were developed having regard to consumer protection policies based on traditional economic theories that focus on the notion of the ‘rational consumer’. Governmental responses therefore seek to impose disclosure obligations on sellers of complex goods or products to ensure that consumers have sufficient information upon which to make a decision. Emergent research, based on behavioural economics, challenges traditional ideas and instead focuses on the actual behaviour of consumers. This approach suggests that consumers as a whole do not necessarily benefit from mandatory disclosure because some, if not most, consumers do not pay attention to the disclosed information before they make a decision to purchase. The need for consumer policies to take consumer characteristics and behaviour into account is being increasingly recognised by governments, and most recently in the policy framework suggested by the Australian Productivity Commission
Resumo:
There is a growing sense of crisis in rural ways of life, which manifests itself in economic decline, depopulation, depleted environments, and a crisis of rural identities. Crime is one potent marker of crisis, the more so as it spoils the image of healthy, cohesive community. The social reaction it elicits, the policing of this ‘other rural’, is also a guide to the dimensions of crisis. The social sciences have witnessed a renewed international interest in the study of ‘other rurals’: the neglected, invisible or excluded aspects of country life. This book brings a fresh approach to the study of crime that challenges the urban-centric assumptions of much western criminology and sociology. It explores rural crime and social reactions to it, in relation to processes and patterns of community formation and change in rural Australia, including the social, economic, cultural and political forces shaping the history, structure and everyday life of rural communities. Policing the Rural Crisis is based on five years of extensive original empirical research in rural and regional Australia. It draws on ideas and debates in contemporary social theory across several disciplines, making the analysis relevant to the study of crime and social change elsewhere.
Resumo:
The study of criminal victimisation has developed to such an extent that victimology is now regarded as a central component to the study of crime and criminology. This focus of concern has been matched by the growth and development of support services for the victim of crime alongside increasing political concern with similar issues. The central purpose of this book is to bring together leading scholars to produce an authoritative handbook on victims and victimology that provides a comprehensive review of these developments, reflecting contemporary academic, policy, and political debates on the nature, extent and impact of criminal victimisation and policy responses to it.
Resumo:
While Australian cinema has produced popular movie genres since the 1970s, including action/adventure, road movies, crime, and horror movies, genre cinema has occupied a precarious position within a subsidised national cinema and has been largely written out of film history. In recent years the documentary Not Quite Hollywood (2008) has brought Australia’s genre movie heritage from the 1970s and 1980s back to the attention of cinephiles, critics and cult audiences worldwide. Since its release, the term ‘Ozploitation’ has become synonymous with Australian genre movies. In the absence of discussion about genre cinema within film studies, Ozploitation (and ‘paracinema’ as a theoretical lens) has emerged as a critical framework to fill this void as a de facto approach to genre and a conceptual framework for understanding Australian genres movies. However, although the Ozploitation brand has been extremely successful in raising the awareness of local genre flicks, Ozploitation discourse poses problems for film studies, and its utility is limited for the study of Australian genre movies. This paper argues that Ozploitation limits analysis of genre movies to the narrow confines of exploitation or trash cinema and obscures more important discussion of how Australian cinema engages with popular movies genres, the idea of Australian filmmaking as entertainment, and the dynamics of commercial filmmaking practises more generally.
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.
Resumo:
Crime in the Professions critically examines the nature and extent of crime and deviance in the professions and how it should be dealt with. The increasing professionalization of the work force and the changes in the way in which professionals carry out their work, such as through the use of computing and communications technology, have created new opportunities for professionals to break the law. Looking in detail at the nature and extent of crime committed by professionals such as doctors, accountants and nurses the book offers some innovative solutions on preventing and controlling professional crime. In addition to examining the nature and extent of crime in the professions, it also addresses some critical issues of regulation for the future, concerning new and emerging professional groups and issues relating to emerging technologies.
Resumo:
The broad objective of this study was to understand the incidence and severity of aggression among sexually abused girls who were trafficked and who were then further used for commercial sexual exploitation (referred to subsequently as sexually abused trafficked girls). In addition, the impact of counseling for minimizing aggression in these girls was investigated. A group of 120 sexually abused trafficked Indian girls and a group of 120 nonsexually abused Indian girls, aged 13 to 18, participated in the study. The sexually abused trafficked girls were purposively selected from four shelters located in and around Kolkata, India. The nonsexually abused girls were selected randomly from four schools situated near the shelters, and these girls were matched by age with the sexually abused trafficked girls. Data were collected using a Background Information Schedule and a standardized psychological test, that is, The Aggression Scale. Results revealed that 16.7% of the girls were first sexually abused between 6 and 9 years of age, 37.5% between 10 and 13 years of age, and 45.8% between 14 and 17 years of age. Findings further revealed that 4.2% of the sexually abused trafficked girls demonstrated saturated aggression, and 26.7% were highly aggressive, that is, extremely frustrated and rebellious. Across age groups, the sexually abused trafficked girls suffered from more aggression (p < .05), compared with the nonvictimized girls. Psychological interventions, such as individual and group counseling, were found to have a positive impact on the sexually abused trafficked girls. These findings should motivate counselors to deal with sexually abused children. It is also hoped that authorities in welfare homes will understand the importance of counseling for sexually abused trafficked children, and will appoint more counselors for this purpose.
Resumo:
As a strategy to identify child sexual abuse, most Australian States and Territories have enacted legislation requiring teachers to report suspected cases. Some Australian State and non-State educational authorities have also created policy-based obligations to report suspected child sexual abuse. Significantly, these can be wider than non-existent or limited legislative duties, and therefore are a crucial element of the effort to identify sexual abuse. Yet, no research has explored the existence and nature of these policy-based duties. The first purpose of this paper is to report the results of a three-State study into policy-based reporting duties in State and non-State schools in Australia. In an extraordinary coincidence, while conducting the study, a case of failure to comply with reporting policy occurred with tragic consequences. This led to a rare example in Australia (and one of only a few worldwide) of a professional being prosecuted for failure to comply with a legislative duty. It also led to disciplinary proceedings against school staff. The second purpose of this paper is to describe this case and connect it with findings from our policy analysis.
Resumo:
This chapter deals with the law concerning children and consent to medical treatment. Where a child under the age of 18 requires medical treatment, issues arise as to who may lawfully consent to the treatment and under what circumstances. Depending on the circumstances, consent may be given by the child’s parent or guardian; the child; or a court. The chapter provides a thorough treatment of Australian law about these issues and circumstances.
Resumo:
For some time now, research has suggested lesbian, gay, bisexual and transgender (LGBT) young people are ‘at-risk’ of victimisation and legally ‘risky’. Relatively few studies have examined how ‘risk factor’ research influences the everyday lives of LGBT young people. This paper reports how the experiences of police by 35 LGBT young people in Brisbane, Queensland reflected discourses about LGBT riskiness and how danger informed their interactions with police in public spaces. The participants specifically note how looking at-risk or looking risky affected their experiences of policing. The paper will conclude with recommendations for improved future policing practice.