623 resultados para Security issues
Resumo:
The recent growth of the coal seam gas industry has increased pressure on regional communities. Debate surrounding the industry is intense and a social licence to operate has yet to be granted to the industry in its entirety. This article presents an analysis of social issues surrounding the coal seam gas industry, making comparisons between two case studies: the Ranger and Jabiluka mines and the Yandicoogina mine. It presents the results of a desktop study, focussed on three topics: community identity; procedural justice and distributive justice, which provides a means for comparison and draws attention to central concerns. It is found that: power imbalances; changing community identities; potentially inequitable distributions of long term benefits and the process to distribute those benefits and negative perceptions of the industry as a whole serve to undermine the provision of a social licence to operate by communities and has the potential to impose significant negative impacts on companies within the industry.
Resumo:
The population is ageing worldwide. This chapter is a discussion of issues in ageing, the importance of learning and education for the elderly, and then the more specific issues of why, how and what elders want to learn.
Resumo:
This Special Issue of New Technology, Work and Employment has been prompted by the increasing awareness in many countries of the need to maintain and grow their science and innovation base. The development of science, engineering, technology and mathematics (STEM) skills and capacity is seen as vital for economic development and prosperity through its impact on national and regional research and development (R&D), technological advancement, and innovation potential.
Resumo:
In recent times significant change has occurred to the Australian health and safety regulatory context. In this paper we consider the potential response of smaller firms in general, and ethnic owned and/or operated smaller firms in particular. We draw on literature examining smaller firms' responses to regulation and apply this to what little we know about smaller ethnic firms in Australia in the context of the regulatory change. We highlight the challenges to owner managers and what could be done to engage and support smaller ethnic firms to realise the opportunities resulting from this regulatory change.
Resumo:
The adoption of packaged software is becoming increasingly common in a variety of organizations and much of the packaged software literature presents this as a straightforward, linear process based on rationalistic evaluation. This paper applies the framework of power relations developed by Markus and Bjørn-‐Anderson (1987) to a longitudinal study concerning the adoption of a customer relationship management package in a small organization. This is used to highlight both overt and covert power issues within the selection and procurement of the product and illustrate the interplay of power between senior management, IT managers, IT vendors and consultants, and end-‐users. The paper contributes to the growing body of literature on packaged software and also to our understanding of how power is deeply embedded within the surrounding processes.
Resumo:
With respect to “shape” marks, there would appear to be a “break”, imposed by the Australian Courts, in the logical conclusion that registration of a shape, which performs a functional purpose, or even further, is indistinguishable from the shape of the item or product, creates a perpetual monopoly in the manufacture of that product.
Resumo:
Maritime terrorism is a serious threat to global security. A major debate in this regard is the treating of acts of maritime terrorism as piracy by some scholars and a rejection of this view by others. Moreover, the international law of maritime terrorism suffers from fundamental definitional issues, much like the international law of terrorism. This article examines the current international law of maritime terrorism with a particular emphasis on the debate regarding the applicability of the international law of piracy in the case of maritime terrorism. It argues that the international law of piracy is not applicable in the enforcement and prosecution of maritime terrorists on the high seas. International treaties on terrorism and the post-September 11 developments relating to international laws on terrorism have created a workable international legal framework for combating maritime terrorism, despite some bottlenecks.
Resumo:
Tensions frequently occur when children and young people seek to make use of a multitude of public spaces (Loader 1996; White 1999).In Australia over a number of years, various strategies have been adopted by local councils, police and other stakeholders such as business groups, to respond to such tensions and disputes. However, rarely are children and young people involved in meaningful ways in the design and control of public space that reflects their needs and aspirations (White 1999; Freeman and Riordan 2002). This paper argues for a broader conceptualisation of the rights of citizenhip to include rights to use public space by children and young people.
Resumo:
We have previously suggested that three proof requirements are essential for a sustainable land registration system. These were proof of identity, proof of ownership and authority to deal. Our attention in this article is drawn to the security framework that surrounds these requirements. We will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to them. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years. We also canvass some more incremental suggestions that evolve out of what we currently do, as well as outlining some comparative externally sourced ideas as to how the transfer and ownership of land can be made safer for all citizens. Such a goal is imperative when land transfer and secure property ownership is a critical component of the economic infrastructure of a modern society.
Resumo:
In recent years, increasing focus has been made on making good business decisions utilizing the product of data analysis. With the advent of the Big Data phenomenon, this is even more apparent than ever before. But the question is how can organizations trust decisions made on the basis of results obtained from analysis of untrusted data? Assurances and trust that data and datasets that inform these decisions have not been tainted by outside agency. This study will propose enabling the authentication of datasets specifically by the extension of the RESTful architectural scheme to include authentication parameters while operating within a larger holistic security framework architecture or model compliant to legislation.
Resumo:
Many educators are currently interested in using computer-mediated communications (CMCs) to support learning and creative practice. In my work I have been looking at how we might create drama through using cyberspaces, working with teachers and students in secondary school contexts. In trying to understand issues that have arisen and ways of working with the data I have found a number of frameworks helpful for analysing the online interactions. These frameworks draw from O'Toole's work on contexts negotiated in the creation of drama and other frameworks drawn from Wertsch, Bakhtin and Vygotsky's work on speech utterances, dialogic processes and internalisation of learning. The contexts and factors which must be negotiated in online communications within learning contexts are quite complex and educators may need to provide parameters and protocols to ensure appropriate languages, genres and utterances are utilised. The paper explores some of the types of languages, genres and utterances that emerged from a co-curricula drama project and issues that arose, including the importance of establishing processes for giving and receiving critical feedback This paper is of relevance to those whose research strategies may involve the use of computer-mediated communications as well as those utilising cyberspaces in educational contexts.