444 resultados para crime and justice
Resumo:
This article outlines the impact that a conspiracy of silence and denial of difference has had on some adopted and donor conceived persons who have been lied to or misled about their origins. Factors discussed include deceit - expressed as a central secret which undermines the fabric of a family and through distortion mystifies communication processes; the shock of discovery - often revealed accidentally and the associated sense of betrayal when this occurs; and a series of losses, for example, kinship, medical history, culture and agency which result in having to rebuild personal identity. By providing those affected with a voice, validation and vindication healing can begin. Any feelings of disregard, of betrayal of trust, of anger, frustration, sorrow or loss, need to be regarded as real, expected, and above all, a valid reaction to what has occurred. The author is a 'late discoverer' of her adoption and draws on the information from her doctoral research on the same topic which was completed in 2012.
Resumo:
Criminal intelligence is an area of expertise highly sought-after internationally and within a variety of justice-related professions; however, producing university graduates with the requisite professional knowledge, as well as analytical, organisational and technical skills presents a pedagogical and technical challenge to university educators. The situation becomes even more challenging when students are undertaking their studies by distance education. This best practice session showcases the design of an online undergraduate unit for final year justice students which uses an evolving real-time criminal scenario as the focus of authentic learning activities in order to prepare students for graduate roles within the criminal intelligence and justice professions. Within the unit, students take on the role of criminal intelligence analysts, applying relevant theories, models and strategies to solve a complex but realistic crime and complete briefings and documentation to industry standards as their major summative assessment task. The session will demonstrate how the design of the online unit corresponds to authentic learning principles, and will specifically map the elements of the unit design to Herrington & Oliver’s instructional design framework for authentic learning (2000; Herrington & Herrington 2006). The session will show how a range of technologies was used to create a rich learning experience for students that could be easily maintained over multiple unit iterations without specialist technical support. The session will also discuss the unique pedagogical affordances and challenges implicated in the location of the unit within an online learning environment, and will reflect on some of the lessons learned from the development which may be relevant to other authentic online learning contexts.
Resumo:
Criminal intelligence is an area of expertise highly sought-after internationally and within a variety of justice-related professions; however, producing university graduates with the requisite professional knowledge, as well as analytical, organisational and technical skills presents a pedagogical and technical challenge to university educators. The situation becomes even more challenging when students are undertaking their studies by distance education. This best practice session showcases the design of an online undergraduate unit for final year justice students which uses an evolving real-time criminal scenario as the focus of authentic learning activities in order to prepare students for graduate roles within the criminal intelligence and justice professions. Within the unit, students take on the role of criminal intelligence analysts, applying relevant theories, models and strategies to solve a complex but realistic crime and complete briefings and documentation to industry standards as their major summative assessment task. The session will demonstrate how the design of the online unit corresponds to authentic learning principles, and will specifically map the elements of the unit design to Herrington & Oliver’s instructional design framework for authentic learning (2000; Herrington & Herrington 2006). The session will show how a range of technologies was used to create a rich learning experience for students that could be easily maintained over multiple unit iterations without specialist technical support. The session will also discuss the unique pedagogical affordances and challenges implicated in the location of the unit within an online learning environment, and will reflect on some of the lessons learned from the development which may be relevant to other authentic online learning contexts.
Resumo:
One of the recent Raising the Bar amendments has removed impediments imposed by copyright law that may have limited the uses to which IP Australia and members of the public could have lawfully put patent specifications without seeking permission from the copyright owner. What the amendment does not do, however, is extend the same protections to those who wish to use prior art documents in ways that benefit the patent system and further the public interest.
Resumo:
Electricity is the cornerstone of modern life. It is essential to economic stability and growth, jobs and improved living standards. Electricity is also the fundamental ingredient for a dignified life; it is the source of such basic human requirements as cooked food, a comfortable living temperature and essential health care. For these reasons, it is unimaginable that today's economies could function without electricity and the modern energy services that it delivers. Somewhat ironically, however, the current approach to electricity generation also contributes to two of the gravest and most persistent problems threatening the livelihood of humans. These problems are anthropogenic climate change and sustained human poverty. To address these challenges, the global electricity sector must reduce its reliance on fossil fuel sources. In this context, the object of this research is twofold. Initially it is to consider the design of the Renewable Energy (Electricity) Act 2000 (Cth) (Renewable Electricity Act), which represents Australia's primary regulatory approach to increase the production of renewable sourced electricity. This analysis is conducted by reference to the regulatory models that exist in Germany and Great Britain. Within this context, this thesis then evaluates whether the Renewable Electricity Act is designed effectively to contribute to a more sustainable and dignified electricity generation sector in Australia. On the basis of the appraisal of the Renewable Electricity Act, this thesis contends that while certain aspects of the regulatory regime have merit, ultimately its design does not represent an effective and coherent regulatory approach to increase the production of renewable sourced electricity. In this regard, this thesis proposes a number of recommendations to reform the existing regime. These recommendations are not intended to provide instantaneous or simple solutions to the current regulatory regime. Instead, the purpose of these recommendations is to establish the legal foundations for an effective regulatory regime that is designed to increase the production of renewable sourced electricity in Australia in order to contribute to a more sustainable and dignified approach to electricity production.
Resumo:
Seminal reports into higher education in Australia and overseas have recognised negotiation as an essential skill of a practising lawyer and have recommended that all law schools include instruction in negotiation theory and practice in their curricula. Effective negotiation training includes the elements of instruction, modelling, practice and feedback. Ideally such training takes place in the context of small groups. However, this does not necessarily mean that negotiation cannot be taught effectively in the context of large groups. This paper discusses two related blended learning environments that provide instruction in negotiation theory and practice as part of the graduate capabilities program of the undergraduate law degree in the School of Law at the Queensland University of Technology in Brisbane, Australia. Air Gondwana, which forms part of the curriculum of the two first year Contract Law subjects, and Mosswood Manor, which forms part of the curriculum of the second year Trusts subject, utilise a common narrative concerning the family of a wealthy industrialist to facilitate learning of negotiation skills. The programs both combine online and in-class components, the online components utilising machinima (computer graphics created without the need for professional software) to depict the narrative. This strategy has enabled the creation of effective, engaging and challenging learning experiences for large cohorts of students studying by different modes (full-time, part-time and distance external). The use of a common narrative, including the same characters and settings, in the two programs also provides a familiar environment in which students advance their learning from one level of attainment to the next.
Resumo:
Children's 'witnessing' or exposure to domestic violence has been increasingly recognised as a form of child abuse, both in Australia and internationally. Although it is difficult to accurately assess the scope of the problem, research has demonstrated that a substantial amount of domestic violence is witnessed by children. As this paper outlines, witnessing domestic violence can involve a range of incidents, ranging from the child 'only' hearing the violence, to the child being forced to participate in the violence or being used as part of a violent incident. In this paper, current knowledge about the extent of children's exposure to domestic violence in Australia is described, along with the documented impacts that this exposure can have on children. This includes psychological and behavioural impacts, health and socioeconomic impacts, and its link to the intergenerational transmission of violence and re-victimisation. Current legislative and policy initiatives are then described and some community-based programs that have been introduced in Australia to address the problem of children's exposure to domestic violence are highlighted. The paper concludes that initiatives focused on early intervention and holistic approaches to preventing and responding to children's exposure to domestic violence should be considered as part of strategies developed to address this problem.
Resumo:
Historically, children in criminal justice proceedings were treated much the same as adults and subject to the same criminal justice processes as adults. Until the early twentieth century, children in Australia were even subjected to the same penalties as adults, including hard labour and corporal and capital punishment (Carrington & Pereira 2009). Until the mid-nineteenth century, there was no separate category of ’juvenile offender’ in Western legal systems and children as young as six years of age were incarcerated in Australian prisons (Cunneen & White 2007). It is widely acknowledged today, however, both in Australia and internationally, that juveniles should be subject to a system of criminal justice that is separate from the adult system and that recognises their inexperience and immaturity. As such, juveniles are typically dealt with separately from adults and treated less harshly than their adult counterparts. The United Nations’ (1985: 2) Standard Minimum Rules for the Administration of Juvenile Justice (the ‘Beijing Rules’) stress the importance of nations establishing a set of laws, rules and provisions specifically applicable to juvenile offenders and institutions and bodies entrusted with the functions of the administration of juvenile justice and designed to meet the varying needs of juvenile offenders, while protecting their basic rights. In each Australian jurisdiction, except Queensland, a juvenile is defined as a person aged between 10 and 17 years of age, inclusive. In Queensland, a juvenile is defined as a person aged between 10 and 16 years, inclusive. In all jurisdictions, the minimum age of criminal responsibility is 10 years. That is, children under 10 years of age cannot be held legally responsible for their actions.
Resumo:
This paper provides an overview of key trends in juvenile detention in Australia, based on data contained in the Australian Institute of Criminology’s (AIC’s) Juveniles in Detention in Australia Monitoring Program database and then provides a discussion of two key trends in juvenile detention—the national increase in the proportion of juvenile detainees that is remanded (rather than sentenced) and the increase in the over-representation of Indigenous juveniles in detention.
Resumo:
Sexual offending against children is a highly emotive issue. It is nonetheless important that public policy initiatives to prevent and/or respond to child sexual abuse are based on the available evidence about child sex offenders. This paper addresses five common misperceptions about the perpetrators of sexual offences against children. Specifically, the issues addressed include whether all child sex offenders are ‘paedophiles’, who sexually abuse children, whether most child sex offenders were victims of sexual abuse themselves, rates of recidivism among child sex offenders and the number of children sex offenders typically abuse before they are detected by police. The evidence outlined in this paper highlights that there are few black and white answers to these questions. Perpetrators of sexual crimes against children are not, contrary to widespread opinion, a homogenous group. Rather, there are a number of varied offending profiles that characterise child sex offenders. Gaining an understanding of the nuances of this offender population is critical if children are to be protected from sexual abuse.
Resumo:
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.
Resumo:
Understanding ethics and law in health care is an essential part of nurses’ and midwives’ professional standards. Ethics, Law and Health Care focuses on teaching applied ethics and law in a manner that illustrates the real world applications of these core components of the nursing and midwifery curriculum and practice. It equips readers with the ability to recognise and address legal and ethical issues that will arise in their professional practice. The book uses the four principles of biomedical ethics (autonomy, non-maleficence, beneficence and justice) together with the use of both the Nursing and Midwifery Codes of Ethics and Codes of Professional Conduct, issued by the Nursing and Midwifery Board of Australia, as a central means through which to analyse and approach ethical and legal issues. Ethics, Law and Health Care is scaffolded to assist readers in understanding legal and ethical principles, to integrate them in the context of a particular issue within professional practice, and provide them with a decision-making framework to take action in a professional context by utilising the Codes as well as state and federal law. Aided by pedagogical features such as case studies, review questions, further reading and a glossary of common terms, this book is an essential resource for students, academics and practitioners.
Resumo:
Computer generated materials are ubiquitous and we encounter them on a daily basis, even though most people are unaware that this is the case. Blockbuster movies, television weather reports and telephone directories all include material that is produced by utilising computer technologies. Copyright protection for materials generated by a programmed computer was considered by the Federal Court and Full Court of the Federal Court in Telstra Corporation Limited v Phone Directories Company Pty Ltd. The court held that the White and Yellow pages telephone directories produced by Telstra and its subsidiary, Sensis, were not protected by copyright because they were computer-generated works which lacked the requisite human authorship. The Copyright Act 1968 (Cth) does not contain specific provisions on the subsistence of copyright in computer-generated materials. Although the issue of copyright protection for computer-generated materials has been examined in Australia on two separate occasions by independently-constituted Copyright Law Review Committees over a period of 10 years (1988 to 1998), the Committees’ recommendations for legislative clarification by the enactment of specific amendments to the Copyright Act have not yet been implemented and the legal position remains unclear. In the light of the decision of the Full Federal Court in Telstra v Phone Directories it is timely to consider whether specific provisions should be enacted to clarify the position of computer-generated works under copyright law and, in particular, whether the requirement of human authorship for original works protected under Part III of the Copyright Act should now be reconceptualised to align with the realities of how copyright materials are created in the digital era.
Resumo:
Victim/survivors of human trafficking involving partner migration employ diverse help-seeking strategies, both formal and informal, to exit their exploitative situations. Drawing on primary research conducted by Lyneham and Richards (forthcoming), the authors highlight the importance of educating the community and professionals from a wide range of sectors—including health, mental health, child protection, social welfare, social work, domestic violence, migration, legal and law enforcement services—about human trafficking and the help-seeking strategies of victims/survivors in order to support them to leave exploitative situations. Enhancing Australia’s knowledge of victim/survivors’ help-seeking strategies will better inform government and community responses to this crime, improve detection and identification of human trafficking matters and subsequent referral to appropriate victim services.