137 resultados para breach of trust
Resumo:
Since the High Court decision of Cook v Cook (1986) 162 CLR 376, a person who voluntarily undertakes to instruct a learner driver of a motor vehicle is owed a lower standard of care than that owed to other road users. The standard of care was still expressed to be objective; however, it took into account the inexperience of the learner driver. Therefore, a person instructing a learner driver was owed a duty of care the standard being that of a reasonable learner driver. This ‘special relationship’ was said to exist because of the passenger’s knowledge of the driver’s inexperience and lack of skill. On 28 August 2008 the High Court handed down its decision in Imbree v McNeilly [2008] HCA 40, overruling Cook v Cook.
Resumo:
In their statistical analyses of higher court sentencing in South Australia, Jeffries and Bond (2009) found evidence that Indigenous offenders were treated more leniently than non-Indigenous offenders, when they appeared before the court under similar numerical circumstances. Using a sample of narratives for criminal defendants convicted in South Australia’s higher courts, the current article extends Jeffries and Bond’s (2009) prior statistical work by drawing on the ‘focal concerns’ approach to establish whether, and in what ways, Indigeneity comes to exert a mitigating influence over sentencing. Results show that the sentencing stories of Indigenous and non-Indigenous offenders differed in ways that may have reduced assessments of blameworthiness and risk for Indigenous defendants. In addition, judges highlighted a number of Indigenous-specific constraints that potentially could result in imprisonment being construed as an overly harsh and costly sentence for Indigenous offenders.
Resumo:
The advent of data breach notification laws in the United States (US) has unearthed a significant problem involving the mismanagement of personal information by a range of public and private sector organisations. At present, there is currently no statutory obligation under Australian law requiring public or private sector organisations to report a data breach of personal information to law enforcement agencies or affected persons. However, following a comprehensive review of Australian privacy law, the Australian Law Reform Commission (ALRC) has recommended the introduction of a mandatory data breach notification scheme. The issue of data breach notification has ignited fierce debate amongst stakeholders, especially larger private sector entities. The purpose of this article is to document the perspectives of key industry and government representatives to identify their standpoints regarding an appropriate regulatory approach to data breach notification in Australia.
Resumo:
In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations based on the ratings of the users that are directly or indirectly trusted by the target user.
Resumo:
know personally. They also communicate with other members of the network who are the friends of their friends and may be friends of their friend’s network. They share their experiences and opinions within the social network about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Opinions, reputations and ecommendations will influence users' choice and usage of online resources. Recommendations may be received through a chain of friends of friends, so the problem for the user is to be able to evaluate various types of trust recommendations and reputations. This opinion or ecommendation has a great influence to choose to use or enjoy the item by the other user of the community. Users share information on the level of trust they explicitly assign to other users. This trust can be used to determine while taking decision based on any recommendation. In case of the absence of direct connection of the recommender user, propagated trust could be useful.
Resumo:
As online social spaces continue to grow in importance, the complex relationship between users and the private providers of the platforms continues to raise increasingly difficult questions about legitimacy in online governance. This article examines two issues that go to the core of egitimate governance in online communities: how are rules enforced and punishments imposed, and how should the law support legitimate governance and protect participants from the illegitimate exercise of power? Because the rules of online communities are generally ultimately backed by contractual terms of service, the imposition of punishment for the breach of internal rules exists in a difficult conceptual gap between criminal law and the predominantly compensatory remedies of contractual doctrine. When theorists have addressed the need for the rules of virtual communities to be enforced, a dichotomy has generally emerged between the appropriate role of criminal law for 'real' crimes, and the private, internal resolution of 'virtual' or 'fantasy' crimes. In this structure, the punitive effect of internal measures is downplayed and the harm that can be caused to participants by internal sanctions is systemically undervalued.
Resumo:
A general mistrust within the contactor and subcontractor companies has identified one of the significant barriers to derive benefits from true downstream supply chain integration. Using the general theory of trust in inter-organizational relations and conducting interviews, this research discusses factors that influence development of trust and cooperation in contractor– subcontractor relationships in construction projects. System dynamics is the simulation method is selected in this theory-building effort, based on qualitative data collected from two projects of a construction company in Thailand. Performance, permeability and system based trust are found to make significant contributions toward parties’ trust level. Three strategic policies such as best value contracting, management of subcontractors as internal team and semi project partnering approach are recommended to stimulate the trust factors as well as cooperative long term relationship.
Resumo:
Purpose: The purpose of this study is to investigate Latin American online purchase behaviour with a specific focus on the influence of perceived risk and trust. While studies of this nature have been conducted quite extensively in developed countries, their application in developing countries, such as Latin America is limited. Our study addresses this gap in the literature with an empirical study conducted in Chile. Design/methodology/approach: The authors develop and test a proposed model of the influence of consumer’s perceptions of risk and trust on their attitudes and intentions to purchase on the Internet. An online survey method is used. The sample consists of 176 Chilean consumers who have made at least one purchase online. The data is analysed using structural equation modelling technique (SEM). Findings: The analysis revealed that of the perceived risk and trust factors examined, trust in third party assurances and a cultural environment of trust had the strongest positive influence on intentions to continuing purchasing online. Perceived risk had an inverse relationship with attitude and consumers’ attitude has a positive influence on intentions to purchase online. Trust in online vendors and a propensity to trust were both insignificant. Practical implications: Practically, these results identity which risk and trust beliefs towards purchasing online have the most effect thereby providing insights into how companies should seek to mitigate perceptions of risk to encourage new and return purchasers. Additionally, this research shows that consumers in a Latin American country, recognised as a collectivist, high risk avoidance culture, are willing to make purchases online despite the risks involved. Originality/value: The study and its results is one of few available that consider a Latin American context. The value of the findings provides insights into the specific risk and trust factors that influence Chilean consumers when considering purchasing online. The tested model adds value not only to the literature on Latin American consumer behaviour but also provides guidance for companies offering online retailing facilities in these less developed countries.
Resumo:
The study of criminal career paths is necessary to understand the methods of success employed by high-performing criminals. The aim of this article is to focus on the career path of Jack Herbert who set up and maintained extensive corruption networks between organised crime groups and police in the Australian state of Queensland. This study builds on Morselli’s work on the career paths of Sammy Gravano and Howard Marks that demonstrate how understanding social networks is an essential part of comprehending how organised criminals succeed. The data for this study were taken from the transcripts of the Fitzgerald Commission of Inquiry, which uncovered the extensive and resilient corruption network operated by Herbert. Herbert’s relationships have been plotted to establish the nature of his operations. The findings indicate that communication of trust both allows for success and sets the boundaries of a network. Most importantly, this case study identifies Herbert’s reliance on holding a monopoly as the cornerstone of his network power and position. This article adds to the literature on criminal career paths by moving away from a classic organised criminal grouping into the area of police corruption and uncovers the distinctive opportunities that this position offers the career criminal.
Resumo:
Late discovery is a term used to describe the experience of discovering the truth of one’s genetic origins as an adult. Following discovery, late discoverers face a lack of recognition and acknowledgment of their concerns from family, friends, community and institutions. They experience pain, anger, loss, grief and frustration. This presentation shares the findings of the first qualitative study of both late discovery of adoptive and donor insemination offspring (heterosexual couple use only) experiences. It is also the first study of late discovery experiences undertaken from an ethical perspective. While this study recruited new participants, it also included an ethical re-analysis of existing late discovery accounts across both practices. The findings of this study (a) draws links between past adoption and current donor insemination (heterosexual couple only) practices, (b) reveals that late discoverers are demanding acknowledgment and recognition of the particularity of their experiences, and (c) offers insights into conceptual understandings of the ‘best interests of the child’ principle. These insights derive from the lived experiences of those whose biological and social worlds have been sundered and secrecy and denial of difference used to conceal this. It suggests that acknowledging the equal moral status of the child may be useful in strengthening conceptual understandings of the ‘best interests of the child’ principle. This equal moral status involves ensuring that personal autonomy and the ability to exercise free will is protected; that the integrity of the relationships of trust expected and demanded between parent/s and children is defended and supported; and that equal access to normative socio-cultural practices, that is; non-fictionalised birth certificates and open records, is guaranteed.
Resumo:
This paper examines a case of academic plagiarism and the subsequent treatment of the issues across several academic institutions. It calls for academic leaders in universities to act on what constitutes a serious breach of standards, engendered in part by broader institutional norms and values promoting the need for publications in a ‘publish or perish’ environment. While universities often promote high-sounding ideals and would generally wish to be seen to uphold high academic standards, it is argued that silence and complicity surround the way in which instances of plagiarism in academic publications are often dealt with. Actions (and inaction) by academic leaders in universities in dealing with cases of academic plagiarism speak volumes in terms of the values academic institutions profess, and those they actually uphold. The paper prompts readers to consider the need for a more consistent and proactive stance on the part of their own institutions to exercise ethical leadership in identifying and addressing academic plagiarism when it occurs.
Resumo:
The decision of Carrapetta v. Rado [2012] NSWCA 202 raises a short but very practical point relating to the right to deliver a notice to complete or have otherwise called for completion where time is of the essence of the contract in circumstances where a settlement statement subsequently sent from the seller has overstated the amount owing under the contract. It was common ground , following the oft quoted High Court decisions of Neeta (Epping) Pty Ltd v Phillips(1974) 131 CLR 286 and Louinder v Leis (1982) 149 CLR 509 that a Notice to Complete which called for completion outside the terms of the contract would be invalid. These decisions also further confirm the long accepted principles that a seller who is not “ready willing and able” to perform all their obligations or who is otherwise in breach of contract at the time could not deliver a Notice to Complete (at[27]).The issue in this case did not so much concern the efficacy of the Notice to Complete at the time was delivered ,but the legal effect upon the Notice to Complete of the later delivery of a settlement statement for what the buyer considered to be performance beyond that required by the contract.
Resumo:
A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.
Resumo:
This article outlines the impact that a conspiracy of silence and denial of difference has had on some adopted and donor conceived persons who have been lied to or misled about their origins. Factors discussed include deceit - expressed as a central secret which undermines the fabric of a family and through distortion mystifies communication processes; the shock of discovery - often revealed accidentally and the associated sense of betrayal when this occurs; and a series of losses, for example, kinship, medical history, culture and agency which result in having to rebuild personal identity. By providing those affected with a voice, validation and vindication healing can begin. Any feelings of disregard, of betrayal of trust, of anger, frustration, sorrow or loss, need to be regarded as real, expected, and above all, a valid reaction to what has occurred. The author is a 'late discoverer' of her adoption and draws on the information from her doctoral research on the same topic which was completed in 2012.
Resumo:
Some children adopted under the now discredited period of closed adoption were never told of their adoptive status until it was revealed to them in adulthood. Yet to date, this ‘late-discovery’ experience has received little research attention. Now a new generation of ‘late discoverers’ is emerging as a result of (heterosexual couple) donor insemination (DI) practices. This study of 25 late-discovery participants of either adoptive or (heterosexual couple) DI offspring status reveals ethical concerns particular to the lateness of discovery. Most of the participants were Australian, with the remainder from the UK, USA and Canada. All were asked to give an ‘open’ account of their experience, with four themes or suggestions provided on request. These accounts were added to those available in relevant publications. The analysis employed a hermeneutic phenomenological methodology and all accounts were analysed using an ethical perspective developed by Walker (2006, 2007). The main themes that emerged were: disrupted personal autonomy, betrayal of deep levels of trust and feelings of injustice and diminished self-worth. The lack of recognition of concerns particular to late discovery has resulted in late discoverers (i) feeling unable to regain a sense of personal control, (ii) significantly disrupted relationships with those closest to them and others, including community and institutions, and (iii) feelings of diminished value and self-worth.