423 resultados para Trade Mark Law
Resumo:
Australian law teachers are increasingly recognising that psychological distress is an issue for our students. This article describes how the Queensland University of Technology Law School is reforming its curriculum to promote student psychological well-being. Part I of the article examines the literature on law student psychological distress in Australia. It is suggested that cross-sectional and longitudinal studies undertaken in Australia provide us with different, but equally important, information with respect to law student psychological well-being. Part II describes a subject in the QUT Law School - Lawyering and Dispute Resolution – which has been specifically designed as one response to declines in law student psychological well-being. Part III then considers two key elements of the design of the subject: introducing students to the idea of a positive professional identity, and introducing students to non-adversarial lawyering and the positive role of lawyers in society as dispute resolvers. These two areas of focus specifically promote law student psychological well-being by encouraging students to engage with elements of positive psychology – in particular, hope and optimism.
Resumo:
The study of criminal career paths is necessary to understand the methods of success employed by high-performing criminals. The aim of this article is to focus on the career path of Jack Herbert who set up and maintained extensive corruption networks between organised crime groups and police in the Australian state of Queensland. This study builds on Morselli’s work on the career paths of Sammy Gravano and Howard Marks that demonstrate how understanding social networks is an essential part of comprehending how organised criminals succeed. The data for this study were taken from the transcripts of the Fitzgerald Commission of Inquiry, which uncovered the extensive and resilient corruption network operated by Herbert. Herbert’s relationships have been plotted to establish the nature of his operations. The findings indicate that communication of trust both allows for success and sets the boundaries of a network. Most importantly, this case study identifies Herbert’s reliance on holding a monopoly as the cornerstone of his network power and position. This article adds to the literature on criminal career paths by moving away from a classic organised criminal grouping into the area of police corruption and uncovers the distinctive opportunities that this position offers the career criminal.
Resumo:
This article sketches some of the ways in which the language and concepts of cultural diversity are being taken up internationally. The debate has been driven in part by concerns about the treatment of cultural goods, services and knowledge in trade agreements. But it also involves larger questions about the role of the state, the role of non-state actors in domestic policy formation, and the shape and function of international policy communities comprising both state and non-state actors. The extent of the discussion of cultural diversity internationally is described through new formal and informal cultural networks and work towards an international instrument for cultural diversity to lay our ground rules for international trade, cultural exchange and policy principles to guide governmental responsibilities. The article concludes with analysis of some of these new networks, and investigates why Canada has been so prominent in these international efforts.
Resumo:
Ben Goldsmith and Christina Spurgeon introduce the special 'Culture, trade, services' issue of Media International Australia.
Resumo:
The use of the internet for political purposes is not new; however, the introduction of social media tools has opened new avenues for political activists. In an era where social media has been credited as playing a critical role in the success of revolutions (Earl & Kimport, 2011; Papic & Noonan, 2011; Wooley, Limperos & 10 Beth, 2010), governments, law enforcement and intelligence agencies need to develop a deeper understanding of the broader capabilities of this emerging social and political environment. This can be achieved by increasing their online presence and through the application of proactive social media strategies to identify and manage potential threats. Analysis of current literature shows a gap 15 in the research regarding the connection between the theoretical understanding and practical implications of social media when exploited by political activists,and the efficacy of existing strategies designed to manage this growing challenge. This paper explores these issues by looking specifically at the use of three popular social media tools: Facebook; Twitter; and YouTube. Through the examination of 20 recent political protests in Iran, the UK and Egypt from 2009�2011, these case studies and research in the use of the three social media tools by political groups, the authors discuss inherent weaknesses in online political movements and discuss strategies for law enforcement and intelligence agencies to monitor these activities.
Resumo:
In an age where the role of police has morphed from simplistic response and enforcement activities to one of managing human security risk, it is argued that intelligence can be used to reduce the impact of strategic surprise from evolving criminal threats and environmental change. This review specifically focusses on research that has implications for strategic intelligence in law enforcement. The review findings highlight the absence of detailed research of law enforcement strategic intelligence. Findings suggest that current law enforcement intelligence literature focuses narrowly on the management concept of intelligence-led policing in a tactical, operational setting. As a result there is little theory on how to improve strategic intelligence outcomes. This is despite the fact that intelligence –led policing is envisaged as a management tool to guide strategic decision making. the review identifies central issues surrounding strategic intelligence and highlights key questions that future research agendas must address to improve strategic intelligence outcomes
Resumo:
In response to international awareness of environmental issues and the inadequacies of common law actions, legislation has been enacted by Australian governments to facilitate environmental protection. The Environmental Protection Act 1994 (Qld) and accompanying Environmental Protection (Interim) Regulation 1995 (Qld) is one example of government response to mounting public pressure to legislate for the environment. Investigation into the operation of the legislation exposes the costs faced by Australian firms in its application. The legislation identifies a number of environmentally relevant activities and imposes licensing and reporting requirements on firms undertaking such activities. In view of these legislative requirements and the increasing public awareness of environmental issues over the last decade in Australia, it could be expected that firms undertaking environmentally sensitive activities will place greater importance on the management of environmental issues. If so, the greater prominence placed on environmental management may be reflected in disclosures made by the firm to its shareholders and other interested parties. This article investigates the type and extent of costs currently imposed by the body of environmental laws in Australia with the discussion primarily focusing upon costs imposed due to the operation of environmental legislation in Queensland. Further, the article reports empirical analysis of management response to environmental issues where firms are undertaking environmentally sensitive activities.
Resumo:
In response to developments in international trade and an increased focus on international transfer-pricing issues, Canada’s minister of finance announced in the 1997 budget that the Department of Finance would undertake a review of the transfer-pricing provisions in the Income Tax Act. On September 11, 1997, the Department of Finance released draft transfer-pricing legislation and Revenue Canada released revised draft Information Circular 87-2R. The legislation was subsequently amended and included in Bill C-28, which received first reading on December 10, 1997. The new rules are intended to update Canada’s international transfer-pricing practices. In particular, they attempt to harmonize the standards in the Income Tax Act with the arm’s-length principle established in the OECD’s transfer pricing guidelines. The new rules also set out contemporaneous documentation requirements in respect of cross-border related-party transactions, facilitate administration of the law by Revenue Canada, and provide for a penalty where transfer prices do not comply with the arm’s-length principle. The Australian tax authorities have similarly reviewed and updated their transfer-pricing practices. Since 1992, the Australian commissioner of taxation has issued three rulings and seven draft rulings directly relating to international transfer pricing. These rulings outline the selection and application of transfer pricing methodologies, documentation requirements, and penalties for non-compliance. The Australian Taxation Office supports the use of advance pricing agreements (APAs) and has expanded its audit strategy by conducting transfer-pricing risk assessment reviews. This article presents a detailed review of Australia’s transfer-pricing policy and practices, which address essentially the same concerns as those at which the new Canadian rules are directed. This review provides a framework for comparison of the approaches adopted in the two jurisdictions. The author concludes that although these approaches differ in some respects, ultimately they produce a similar result. Both regimes set a clear standard to be met by multinational enterprises in establishing transfer prices. Both provide for audits and penalties in the event of noncompliance. And both offer the alternative of an APA as a means of avoiding transfer-pricing disputes with Australian and Canadian tax authorities.
Resumo:
In what is being billed as iiNet versus Hollywood, the Australian internet service provider has come out an apparent winner after the High Court dismissed a copyright infringement case brought by industry movie studios. The case was a final appeal by the industry in its attempts to crack down on internet users infringing copyright by using BitTorrent to download movies.
Resumo:
Background: Potyviruses are found world wide, are spread by probing aphids and cause considerable crop damage. Potyvirus is one of the two largest plant virus genera and contains about 15% of all named plant virus species. When and why did the potyviruses become so numerous? Here we answer the first question and discuss the other. Methods and Findings: We have inferred the phylogenies of the partial coat protein gene sequences of about 50 potyviruses, and studied in detail the phylogenies of some using various methods and evolutionary models. Their phylogenies have been calibrated using historical isolation and outbreak events: the plum pox virus epidemic which swept through Europe in the 20th century, incursions of potyviruses into Australia after agriculture was established by European colonists, the likely transport of cowpea aphid-borne mosaic virus in cowpea seed from Africa to the Americas with the 16th century slave trade and the similar transport of papaya ringspot virus from India to the Americas. Conclusions/Significance: Our studies indicate that the partial coat protein genes of potyviruses have an evolutionary rate of about 1.1561024 nucleotide substitutions/site/year, and the initial radiation of the potyviruses occurred only about 6,600 years ago, and hence coincided with the dawn of agriculture. We discuss the ways in which agriculture may have triggered the prehistoric emergence of potyviruses and fostered their speciation.
Resumo:
A report prepared for the Access to Justice Committee Queensland Law Society Inc.