329 resultados para Angela Merkel
Resumo:
The two-year trial of the Queensland minimum passing distance (MPD) road rule began on 7 April 2014. The rule requires motor vehicles to provide cyclists a minimum lateral passing distance of one metre when overtaking cyclists in a speed zone of 60 km/h or less, and 1.5 metres when the speed limit is greater than 60 km/h. This document summarises the evaluation of the effectiveness of the new rule in terms of its: 1. practical implementation; 2. impact on road users’ attitudes and perceptions; and 3. road safety benefits. The Centre for Accident Research and Road Safety – Queensland (CARRS-Q) developed the evaluation framework (Haworth, Schramm, Kiata-Holland, Vallmuur, Watson & Debnath; 2014) for the Queensland Department of Transport and Main Roads (TMR) and was later commissioned to undertake the evaluation. The evaluation included the following components: • Review of correspondence received by TMR; • Interviews and focus groups with Queensland Police Service (QPS) officers; • Road user survey; • Observational study; and • Crash, injury and infringement data analysis.
Resumo:
The JoMeC Network project had three key objectives. These were to: 1. Benchmark the pedagogical elements of journalism, media and communication (JoMeC) programs at Australian universities in order to develop a set of minimum academic standards, to be known as Threshold Learning Outcomes (TLOs), which would applicable to the disciplines of Journalism, Communication and/or Media Studies, and Public Relations; 2. Build a learning and teaching network of scholars across the JoMeC disciplines to support collaboration, develop leadership potential among educators, and progress shared priorities; 3. Create an online resources hub to support learning and teaching excellence and foster leadership in learning and teaching in the JoMeC disciplines. In order to benchmark the pedagogical elements of the JoMeC disciplines, the project started with a comprehensive review of the disciplinary settings of journalism, media and communication-related programs within Higher Education in Australia plus an analysis of capstone units (or subjects) offered in JoMeC-related degrees. This audit revealed a diversity of degree titles, disciplinary foci, projected career outcomes and pedagogical styles in the 36 universities that offered JoMeC-related degrees in 2012, highlighting the difficulties of classifying the JoMeC disciplines collectively or singularly. Instead of attempting to map all disciplines related to journalism, media and communication, the project team opted to create generalised TLOs for these fields, coupled with detailed TLOs for bachelor-level qualifications in three selected JoMeC disciplines: Journalism, Communication and/or Media Studies, and Public Relations. The initial review’s outcomes shaped the methodology that was used to develop the TLOs. Given the complexity of the JoMeC disciplines and the diversity of degrees across the network, the project team deployed an issue-framing process to create TLO statements. This involved several phases, including discussions with an issue-framing team (an advisory group of representatives from different disciplinary areas); research into accreditation requirements and industry-produced materials about employment expectations; evaluation of learning outcomes from universities across Australia; reviews of scholarly literature; as well as input from disciplinary leaders in a variety of forms. Draft TLOs were refined after further consultation with industry stakeholders and the academic community via email, telephone interviews, and meetings and public forums at conferences. This process was used to create a set of common TLOs for JoMeC disciplines in general and extended TLO statements for the specific disciplines of Journalism and Public Relations. A TLO statement for Communication and/or Media Studies remains in draft form. The Australian and New Zealand Communication Association (ANZCA) and Journalism Education and Research Association of Australian (JERAA) have agreed to host meetings to review, revise and further develop the TLOs. The aim is to support the JoMeC Network’s sustainability and the TLOs’ future development and use.
Resumo:
How young women engage in physical violence with other young women is an issue that raises specific concerns in both criminological literature and theories. Current theoretical explanations construct young women’s violence in one of two ways: young women are not physically violent at all, and adhere to an accepted performance of hegemonic femininity; or young women reject accepted performances of hegemonic femininity in favour of a masculine gendered performance to engage in violence successfully. This article draws on qualitative and quantitative data obtained from a structured observation and thematic analysis of 60 online videos featuring young women’s violent altercations. It argues that, contrary to this dichotomous construction, there appears to be a third way young women are performing violence, underpinned by masculine characteristics of aggression but upholding a hegemonic feminine gender performance. In making this argument, this article demonstrates that a more complex exploration and conceptualisation of young women’s violence, away from gendered constructs, is required for greater understanding of the issue.
Resumo:
Background Interest in the use of healing gardens in healthcare settings to provide therapeutic benefits is increasing, however insight is needed to determine whether patients, patient families and friends, and staff who spend time in these gardens use these in the manner for which they were designed, and experience the benefits suggested by broader research in this field. Objective(s) Visitors to four of the LCCH gardens have left comments in ‘bench diaries’ (visitors books). Analysis of these comments yields valuable insights into the use of the gardens, enabling reflection on the design intent and outcomes and guidance regarding how the gardens might be better utilised, as well as a basis for further investigation into the use and value of the gardens. Method(s) Comments have been coded and analysed using a thematic analysis approach to identify patterns relating to the reasons for which people appear to come to the healing gardens; benefits they appear to receive from spending time there; and features and aspects of the gardens that they appear to appreciate in particular. Only comments related to the gardens have been used in this analysis, with all comments being deidentified. Outcome/Conclusion Comments left in the Adventure Garden and Secret Garden bench diaries were used for the analysis, as Staff Garden and Babies Garden bench diary comments did not relate to the garden. There were no negative comments relating to the gardens, other than one comment requesting additional benches. The vast majority of comments expressed gratitude for the space. The four most frequently observed themes from the comments left in the Secret Garden Bench Diary indicated that they were seeking ‘time out’ from their experiences of being at the hospital, a desire for a ‘dose of nature’ (greenery, beautiful garden, etc), and fresh air, and that the garden space provided a restorative experience to them in some manner. Comments in the Adventure Garden Bench Diary related predominately to the view. Analysis of the comments emphasises the importance of gardens providing multi-sensory experiences that significantly differentiate the space from the hospital ward and provide visitors with a sense of being away, of peacefulness, and of familiarity with the outside world. Positioning gardens with prospect, and solar aspect, appears important in these regards, as does the presence of visible greenery. Adequate seating in locations that provide pleasing views appears particularly important for staff and adult visitors. Whilst comments in the Bench Diaries did not indicate direct awareness of the stress and anxiety-reducing effects that research elsewhere has found from viewing plants and nature, however these effects may underpin many of these experiences that visitors did share.
Resumo:
Deep packet inspection is a technology which enables the examination of the content of information packets being sent over the Internet. The Internet was originally set up using “end-to-end connectivity” as part of its design, allowing nodes of the network to send packets to all other nodes of the network, without requiring intermediate network elements to maintain status information about the transmission. In this way, the Internet was created as a “dumb” network, with “intelligent” devices (such as personal computers) at the end or “last mile” of the network. The dumb network does not interfere with an application's operation, nor is it sensitive to the needs of an application, and as such it treats all information sent over it as (more or less) equal. Yet, deep packet inspection allows the examination of packets at places on the network which are not endpoints, In practice, this permits entities such as Internet service providers (ISPs) or governments to observe the content of the information being sent, and perhaps even manipulate it. Indeed, the existence and implementation of deep packet inspection may challenge profoundly the egalitarian and open character of the Internet. This paper will firstly elaborate on what deep packet inspection is and how it works from a technological perspective, before going on to examine how it is being used in practice by governments and corporations. Legal problems have already been created by the use of deep packet inspection, which involve fundamental rights (especially of Internet users), such as freedom of expression and privacy, as well as more economic concerns, such as competition and copyright. These issues will be considered, and an assessment of the conformity of the use of deep packet inspection with law will be made. There will be a concentration on the use of deep packet inspection in European and North American jurisdictions, where it has already provoked debate, particularly in the context of discussions on net neutrality. This paper will also incorporate a more fundamental assessment of the values that are desirable for the Internet to respect and exhibit (such as openness, equality and neutrality), before concluding with the formulation of a legal and regulatory response to the use of this technology, in accordance with these values.
Resumo:
This article examines the merger between AOL and the Huffington Post. The broader issues around the merger will be investigated, especially the implication for rights, in particular free expression, and their conditions for exercise and actual exercise online. One major issue is that of the status of user-generated content and how the existing legal regime reflects the ethical concerns of users over how their content, data and information is used and commodified by the for-profit Internet intermediaries and platforms, especially when they start to merge and form concentrations. The extent to which the current legal regimes, especially human rights, deal with these problems in an adequate fashion will be assessed, along with the presentation of some suggestions of alternative approaches which may be more effective in practice.
Resumo:
Free software is viewed as a revolutionary and subversive practice, and in particular has dealt a strong blow to the traditional conception of intellectual property law (although in its current form could be considered a 'hack' of IP rights). However, other (capitalist) areas of law have been swift to embrace free software, or at least incorporate it into its own tenets. One area in particular is that of competition (antitrust) law, which itself has long been in theoretical conflict with intellectual property, due to the restriction on competition inherent in the grant of ‘monopoly’ rights by copyrights, patents and trademarks. This contribution will examine how competition law has approached free software by examining instances in which courts have had to deal with such initiatives, for instance in the Oracle Sun Systems merger, and the implications that these decisions have on free software initiatives. The presence or absence of corporate involvement in initiatives will be an important factor in this investigation, with it being posited that true instances of ‘commons-based peer production’ can still subvert the capitalist system, including perplexing its laws beyond intellectual property.
Resumo:
This article will examine the legality of the digital rights management (‘DRM’) measures used by the major e-book publishers and device manufacturers in the United States, European Union and Australia not only to enforce their intellectual property rights but also to create monopolistic content silos, restrict interoperability and affect the ability for users to use the content they have bought in the way they wish. The analysis will then proceed to the recent competition investigations in the US and EU over price-fixing in e-book markets, and the current litigation against Amazon in the US for an alleged abuse of its dominant position. A final point will be made on possible responses in Australia to these issues taking into account the jurisprudence on DRM in other scenarios.
Resumo:
In late 2010, the online nonprofit media organization WikiLeaks published classified documents detailing correspondence between the U.S. State Department and its diplomatic missions around the world, numbering around 250,000 cables. These diplomatic cables contained classified information with comments on world leaders, foreign states, and various international and domestic issues. Negative reactions to the publication of these cables came from both the U.S. political class (which was generally condemnatory of WikiLeaks, invoking national security concerns and the jeopardizing of U.S. interests abroad) and the corporate world, with various companies ceasing to continue to provide services to WikiLeaks despite no legal measure (e.g., a court injunction) forcing them to do so. This article focuses on the legal remedies available to WikiLeaks against this corporate suppression of its speech in the U.S. and Europe since these are the two principle arenas in which the actors concerned are operating. The transatlantic legal protection of free expression will be considered, yet, as will be explained in greater detail, the legal conception of this constitutional and fundamental right comes from a time when the state posed the greater threat to freedom. As a result, it is not generally enforceable against private, non-state entities interfering with speech and expression which is the case here. Other areas of law, namely antitrust/competition, contract and tort will then be examined to determine whether WikiLeaks and its partners can attempt to enforce their right indirectly through these other means. Finally, there will be some concluding thoughts about the implications of the corporate response to the WikiLeaks embassy cables leak for freedom of expression online.
Cultures of sharing in 3D printing: What can we learn from the licence choices of Thingiverse users?
Resumo:
This article contributes to the discussion by analysing how users of the leading online 3D printing design repository Thingiverse manage their intellectual property (IP). 3D printing represents a fruitful case study for exploring the relationship between IP norms and practitioner culture. Although additive manufacturing technology has existed for decades, 3D printing is on the cusp of a breakout into the technological mainstream – hardware prices are falling; designs are circulating widely; consumer-friendly platforms are multiplying; and technological literacy is rising. Analysing metadata from more than 68,000 Thingiverse design files collected from the site, we examine the licensing choices made by users and explore the way this shapes the sharing practices of the site’s users. We also consider how these choices and practices connect with wider attitudes towards sharing and intellectual property in 3D printing communities. A particular focus of the article is how Thingiverse structures its regulatory framework to avoid IP liability, and the extent to which this may have a bearing on users’ conduct. The paper has three sections. First, we will offer a description of Thingiverse and how it operates in the 3D printing ecosystem, noting the legal issues that have arisen regarding Thingiverse’s Terms of Use and its allocation of intellectual property rights. Different types of Thingiverse licences will be detailed and explained. Second, the empirical metadata we have collected from Thingiverse will be presented, including the methods used to obtain this information. Third, we will present findings from this data on licence choice and the public availability of user designs. Fourth, we will look at the implications of these findings and our conclusions regarding the particular kind of sharing ethic that is present in Thingiverse; we also consider the “closed” aspects of this community and what this means for current debates about “open” innovation.
Resumo:
This exploratory article examines the phenomenon of the ‘Quantified Self’—until recently, a subculture of enthusiasts who aim to discover knowledge about themselves and their bodies through self-tracking, usually using wearable devices to do so—and its implications for laws concerned with regulating and protecting health information. Quantified Self techniques and the ‘wearable devices’ and software that facilitate them—in which large transnational technology corporations are now involved—often involve the gathering of what would be considered ‘health information’ according to legal definitions, yet may occur outside the provision of traditional health services (including ‘e-health’) and the regulatory frameworks that govern them. This article explores the legal and regulatory framework for self-quantified health information and wearable devices in Australia and determines the extent to which this framework addresses privacy and other concerns that these techniques engender, along with suggestions for reform.
Resumo:
The legality of the operation of Google’s search engine, and its liability as an Internet intermediary, has been tested in various jurisdictions on various grounds. In Australia, there was an ultimately unsuccessful case against Google under the Australian Consumer Law relating to how it presents results from its search engine. Despite this failed claim, several complex issues were not adequately addressed in the case including whether Google sufficiently distinguishes between the different parts of its search results page, so as not to mislead or deceive consumers. This article seeks to address this question of consumer confusion by drawing on empirical survey evidence of Australian consumers’ understanding of Google’s search results layout. This evidence, the first of its kind in Australia, indicates some level of consumer confusion. The implications for future legal proceedings in against Google in Australia and in other jurisdictions are discussed.
Resumo:
A large number of human polyomaviruses have been discovered in the last 7 years. However, little is known about the clinical impact on vulnerable immunosuppressed patient populations. Blood, urine, and respiratory swabs collected from a prospective, longitudinal adult kidney transplant cohort (n = 167) generally pre-operatively, at day 4, months 1, 3, and 6 posttransplant, and at BK viremic episodes within the first year were screened for 12 human polyomaviruses using real-time polymerase chain reaction. Newly discovered polyomaviruses were most commonly detected in the respiratory tract, with persistent shedding seen for up to 6 months posttransplant. Merkel cell polyomavirus was the most common detection, but was not associated with clinical symptoms or subsequent development of skin cancer or other skin abnormalities. In contrast, KI polyomavirus was associated with respiratory disease in a subset of patients. Human polyomavirus 9, Malawi polyomavirus, and human polyomavirus 12 were not detected in any patient samples.
Resumo:
Background Traffic offences have been considered an important predictor of crash involvement, and have often been used as a proxy safety variable for crashes. However the association between crashes and offences has never been meta-analysed and the population effect size never established. Research is yet to determine the extent to which this relationship may be spuriously inflated through systematic measurement error, with obvious implications for researchers endeavouring to accurately identify salient factors predictive of crashes. Methodology and Principal Findings Studies yielding a correlation between crashes and traffic offences were collated and a meta-analysis of 144 effects drawn from 99 road safety studies conducted. Potential impact of factors such as age, time period, crash and offence rates, crash severity and data type, sourced from either self-report surveys or archival records, were considered and discussed. After weighting for sample size, an average correlation of r = .18 was observed over the mean time period of 3.2 years. Evidence emerged suggesting the strength of this correlation is decreasing over time. Stronger correlations between crashes and offences were generally found in studies involving younger drivers. Consistent with common method variance effects, a within country analysis found stronger effect sizes in self-reported data even controlling for crash mean. Significance The effectiveness of traffic offences as a proxy for crashes may be limited. Inclusion of elements such as independently validated crash and offence histories or accurate measures of exposure to the road would facilitate a better understanding of the factors that influence crash involvement.