272 resultados para the right to privacy


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Council of Australian Governments (COAG) in 2003 gave in-principle approval to a best-practice report recommending a holistic approach to managing natural disasters in Australia incorporating a move from a traditional response-centric approach to a greater focus on mitigation, recovery and resilience with community well-being at the core. Since that time, there have been a range of complementary developments that have supported the COAG recommended approach. Developments have been administrative, legislative and technological, both, in reaction to the COAG initiative and resulting from regular natural disasters. This paper reviews the characteristics of the spatial data that is becoming increasingly available at Federal, state and regional jurisdictions with respect to their being fit for the purpose for disaster planning and mitigation and strengthening community resilience. In particular, Queensland foundation spatial data, which is increasingly accessible by the public under the provisions of the Right to Information Act 2009, Information Privacy Act 2009, and recent open data reform initiatives are evaluated. The Fitzroy River catchment and floodplain is used as a case study for the review undertaken. The catchment covers an area of 142,545 km2, the largest river catchment flowing to the eastern coast of Australia. The Fitzroy River basin experienced extensive flooding during the 2010–2011 Queensland floods. The basin is an area of important economic, environmental and heritage values and contains significant infrastructure critical for the mining and agricultural sectors, the two most important economic sectors for Queensland State. Consequently, the spatial datasets for this area play a critical role in disaster management and for protecting critical infrastructure essential for economic and community well-being. The foundation spatial datasets are assessed for disaster planning and mitigation purposes using data quality indicators such as resolution, accuracy, integrity, validity and audit trail.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper discusses the fast emerging challenges for Malay and Muslim sexual minority storytellers in the face of an aggressive state-sponsored Islamisation of a constitutionally secular Malaysia. I examine the case of Azwan Ismail, a gay Malay and Muslim Malaysian who took part in the local ‘It Gets Better’ Project, initiated in December 2010 by Seksualiti Merdeka (an annual sexuality rights festival) and who suffered an onslaught of hostile comments from fellow Malay Muslims. In this paper, I ask how a message aimed at discouraging suicidal tendencies among sexual minority teenagers can go so wrong. In discussing the contradictions between Azwan’s constructions of self and the expectations others have of him, I highlight the challenges for Azwan’s existential self. For storytellers who are vulnerable if visible, the inevitable sharing of a personal story with unintended and hostile audiences when placed online, can have significant repercussions. The purist Sunni Islam agenda in Malaysia not only rejects the human rights of the sexual minority in Malaysia but has influenced and is often a leading hostile voice in both regional and international blocs. This self-righteous and supremacist political Islam fosters a more disabling environment for vulnerable, minority communities and their human rights. It creates a harsher reality for the sexual minority that manifests in State-endorsed discrimination, compulsory counselling, forced rehabilitation and their criminalisation. It places the right of the sexual minority to live within such a community in doubt. I draw on existing literature on how personal stories have historically been used to advance human rights. Included too, is the signifance and implications of the work by social psychologists in explaining this loss of credibility of personal stories. I then advance an analytical framework that will allow storytelling as a very individual form of witnessing to reclaim and regain its ‘truth to power’.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Early career engineering academics are encouraged to join and contribute to established research groups at the leading edge of their discipline. This is often facilitated by various staff development and support programs. Given that academics are often appointed primarily on the basis of their research skills and outputs, such an approach is justified and is likely to result in advancing the individual academic’s career. It also enhances their capacity to attract competitive research funding, while contributing to the overall research performance of their institution, with further potential for an increased share of government funding. In contrast, there is much less clarity of direction or availability of support mechanisms for those academics in their role as teachers. Following a general induction to teaching and learning at their institution, they would commonly think about preparing some lecture materials, whether for delivery in a face-to-face or on-line modality. Typically they would look for new references and textbooks to act as a guide for preparing the content. They would probably find out how the course has been taught before, and what laboratory facilities and experiments have been used. In all of these and other related tasks, the majority of newly appointed academics are guided strongly by their own experiences as students, rather than any firm knowledge of pedagogical principles. At a time of increased demands on academics’ time, and high expectations of performance and productivity in both research and teaching, it is essential to examine possible actions to support academics in enhancing their teaching performance in effective and efficient ways. Many resources have been produced over the years in engineering schools around the world, with very high intellectual and monetary costs. In Australia, the last few years have seen a surge in the number of ALTC/OLT projects and fellowships addressing a range of engineering education issues and providing many resources. There are concerns however regarding the extent to which these resources are being effectively utilised. Why are academics still re-inventing the wheel and creating their own version of teaching resources and pedagogical practice? Why do they spend so much of their precious time in such an inefficient way? A symposium examining the above issues was conducted at the AAEE2012 conference, and some pointers to possible responses to the above questions were obtained. These are explored in this paper and supplemented by the responses to a survey of a group of engineering education leaders on some of the aspects of these research questions. The outcomes of the workshop and survey results have been analysed in view of the literature and the ALTC/OLT sponsored learning and teaching projects and resources. Other factors are discussed, including how such resources can be found, how their quality might be evaluated, and how assessment may be appropriately incorporated, again using readily available resources. This study found a strong resonance between resources reuse with work on technology acceptance (Davis, 1989), suggesting that technology adoption models could be used to encourage resource sharing. Efficient use of outstanding learning materials is an enabling approach. The paper provides some insights on the factors affecting the re-use of available resources, and makes some recommendations and suggestions on how the issue of resources re-use might be incorporated in the process of applying and completing engineering education projects.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A home is an embodiment of human privacy, apart from providing shelter, security and several other functions. Achieving the desired level of privacy at home is very important in Muslim societies. Privacy is intended to protect the female members of the family from strangers, especially while entertaining guests at home. One way of controlling levels of exposure of the domestic domains to strangers is by controlling privacy levels. This research will investigate perceptions of privacy among Australian Muslims when entertaining guests at their homes. This research will also investigate the extent that modesty (achieved through both appearance and design) acts as the balancing factor in achieving a family’s desired levels of privacy while also affording them the capacity to be hospitable to guests. This research will use a qualitative approach to investigate Australian Muslim homes around Queensland, predominantly in the Brisbane area. A total number of 20 to 60 participants (10 to 30 males, 10 to 30 females) ranging from 25 to 55 years old will be interviewed. Ideally, participants will be those who have children or extended families (parents or siblings) living in the house. The data will be coded and analysed for the purpose of generating new knowledge for architects and designers when designing Muslim homes. It will also extend the current body of knowledge related to privacy mechanisms in housing designs, thereby benefitting architects and designers in the future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Oscar Wilde once complained that having spent an entire morning putting a comma into one of his poems, he spent the afternoon removing it. Peter Selgin calls this revisionitis: the inability of a writer to part with their work, the compulsion to go on fiddling and picking until there is nothing left to fret about. There can be real danger, Selgin warns, in fussing with things. The question then of how much to revise or how little to rewrite is one without certain answer and writers themselves hold differing views...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We consider the following problem: users of an organization wish to outsource the storage of sensitive data to a large database server. It is assumed that the server storing the data is untrusted so the data stored have to be encrypted. We further suppose that the manager of the organization has the right to access all data, but a member of the organization can not access any data alone. The member must collaborate with other members to search for the desired data. In this paper, we investigate the notion of threshold privacy preserving keyword search (TPPKS) and define its security requirements. We construct a TPPKS scheme and show the proof of security under the assumptions of intractability of discrete logarithm, decisional Diffie-Hellman and computational Diffie-Hellman problems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article presents an overview of two aspects of the role the internet now plays in the court system - first, the extent to which judges, administrators and court officials at the different levels in the court hierarchy are using the internet to deliver enhanced access to the Australian justice system for the community as a whole, and second, how they have embraced that same technology as an aid for accessing information for better judgment delivery and administration.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In Smit v Chan [2001] QSC 493 (Supreme Court of Queensland, S1233 of 1995, Mullins J, 21.12.2001) the sixth defendant successfully obtained an order that a complex medical negligence action be tried without a jury. This was the first application to be decided under r474 of UCPR 1999, and the decision is a significant precedent for defendants in similar cases who want to avoid the unpredictability of outcome and the inflated damages awards sometimes associated with jury trials.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An estimated 285 million people worldwide are visually impaired. Some 90% of those live in developing nations, where less than 1% of the world’s books are available in a form they can read. In developed countries, the situation is only marginally better: only around 7% of the world’s books are accessible to print-disabled people. The right to read is part of our basic human rights. Access to the written word is crucial to allow people to fully participate in society. It’s important for education, political involvement, success in the workplace, scientific progress and, not least, creative play and leisure. Equal access to books and other cultural goods is also required by international law. The technology now exists to deliver books in accessible electronic forms to people much more cheaply than printing and shipping bulky braille copies or books on tape. Electronic books can be read with screen readers and refreshable braille devices, or printed into large print or braille if needed. Now that we have this technology, what’s been referred to as the global “book famine” is a preventable tragedy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is important that industries’ water interactions respect the human right to water. Historically, within the mining industry there has been a disconnect between the management of sites’ internal water interactions and the consequences of their external impacts, including human rights impacts. This poses a challenge for the mining industry as it attempts to put the Ruggie Guiding Principles for Business and Human Rights into practice, particularly as United Nations has recently recognised the human right to water. A technical framework such as the Minerals Council of Australia’s Water Accounting Framework (WAF) can help to bridge this disconnect and to integrate human rights considerations into business practice by connecting a site’s external and internal water interactions and by encouraging regular monitoring of performance. However, at present the connection is limited since the WAF lacks the capability to formalise a site’s social water context. This work presents the Social Water Assessment Protocol (SWAP), a scoping tool consisting of a set of questions organised into taxonomic themes that capture a site’s social water context and that can be combined with the WAF to better connect human rights with mine water interactions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The stop-signal paradigm is increasingly being used as a probe of response inhibition in basic and clinical neuroimaging research. The critical feature of this task is that a cued response is countermanded by a secondary ‘stop-signal’ stimulus offset from the first by a ‘stop-signal delay’. Here we explored the role of task difficulty in the stop-signal task with the hypothesis that what is critical for successful inhibition is the time available for stopping, that we define as the difference between stop-signal onset and the expected response time (approximated by reaction time from previous trial). We also used functional magnetic resonance imaging (fMRI) to examine how the time available for stopping affects activity in the putative right inferior frontal gyrus and presupplementary motor area (right IFG-preSMA) network that is known to support stopping. While undergoing fMRI scanning, participants performed a stop-signal variant where the time available for stopping was kept approximately constant across participants, which enabled us to compare how the time available for stopping affected stop-signal task difficulty both within and between subjects. Importantly, all behavioural and neuroimaging data were consistent with previous findings. We found that the time available for stopping distinguished successful from unsuccessful inhibition trials, was independent of stop-signal delay, and affected successful inhibition depending upon individual SSRT. We also found that right IFG and adjacent anterior insula were more strongly activated during more difficult stopping. These findings may have critical implications for stop-signal studies that compare different patient or other groups using fixed stop-signal delays.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The environments that we inhabit shape our everyday lives, influencing our behaviors and responses (Manu, 2013). As we enter an immersive phase of education in which physical and digital environments become inseparable, should we reconsider the role and importance of design on pedagogical practice? This paper explores the reciprocal cause and effect of space, technology and pedagogy in shaping the design of educational experiences within Queensland University of Technology's collaborative learning spaces.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

For a few years in the mid 2000s, the ABC screened barely any new Australian drama. This record-breaking slump, which reached an all-time low of just three hours of programs in the year ending June 2005, spurred an industry-led campaign and a degree of public controversy that convinced the federal government to increase the corporation’s funding. An extra $70 million was provided for drama, with the majority earmarked for 2011–12. The new twenty-two-part courtroom drama series Crownies, made for the ABC by the independent production house Screentime, is the principal product.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.