113 resultados para Duty of memory
Resumo:
When organizational scandals occur, the common refrain among commentators is: 'Where was the board in all this?' 'How could the directors not have known what was going on?''Why didn't the board intervene?' The scandals demonstrate that board monitoring or oganizational performance is a matter of great importance. By monitoring, we mean the act of keeping the organization under review. In many English-speaking countries, directors have a legal duty of care, which includes duties to monitor the performance of their organizations (Hopt and von Hippel 2010). However, statutory law typically merely states the duty, while providing little guidance on how that duty can be met.
Resumo:
This article traces the emergence of “the new advocacy” role for lawyers, that of “dispute resolution advocacy”, describing the role of legal practitioners when representing clients in negotiation, mediation and conciliation processes. The dispute resolution models they may encounter and the different types of assistance that lawyers can provide to their clients in such contexts will be discussed. Whether “dispute resolution advocacy” falls under the umbrella of “non-adversarial practice” or is a separate and distinct role will also be explored, in light of the professional obligations of lawyer representatives, particularly the duty of loyalty to their clients.
Resumo:
This thesis argues that an action in educational negligence should be available in Australia to provide a remedy for failure by schools and teachers to provide an adequate education as required by Australia’s human rights obligations. The thesis substantiates a duty of care to provide an adequate education under general principles of the law of negligence in appropriate cases. Although some protection exists for disabled students in Australia’s anti-discrimination and other legislation, non-disabled students are not afforded redress under existing causes of action. The educational negligence action provides a suitable remedy in an era of professional educational accountability.
Resumo:
Introduction Road safety researchers rely heavily on self-report data to explore the aetiology of crash risk. However, researchers consistently acknowledge a range of limitations associated with this methodological approach (e.g., self-report bias), which has been hypothesised to reduce the predictive efficacy of scales. Although well researched in other areas, one important factor often neglected in road safety studies is the fallibility of human memory. Given accurate recall is a key assumption in many studies, the validity and consistency of self-report data warrants investigation. The aim of the current study was to examine the consistency of self-report data of crash history and details of the most recent reported crash on two separate occasions. Materials & Method A repeated measures design was utilised to examine the self-reported crash involvement history of 214 general motorists over a two month period. Results A number of interesting discrepancies were noted in relation to number of lifetime crashes reported by the participants and the descriptions of their most recent crash across the two occasions. Of the 214 participants who reported having been involved in a crash, 35 (22.3%) reported a lower number of lifetime crashes as Time 2, than at Time 1. Of the 88 drivers who reported no change in number of lifetime crashes, 10 (11.4%) described a different most recent crash. Additionally, of the 34 reporting an increase in the number of lifetime crashes, 29 (85.3%) of these described the same crash on both occasions. Assessed as a whole, at least 47.1% of participants made a confirmed mistake at Time 1 or Time 2. Conclusions These results raise some doubt in regard to the accuracy of memory recall across time. Given that self-reported crash involvement is the predominant dependent variable used in the majority of road safety research, this issue warrants further investigation. Replication of the study with a larger sample size that includes multiple recall periods would enhance understanding into the significance of this issue for road safety methodology.
Resumo:
The recent decision of Waller v James involved a claim by the plaintiff parents for damages for wrongful birth against the defendant doctor, Dr James, a gynaecologist with a practice in infertility and IVF procedures, who had been consulted by the plaintiffs. The second plaintiff, Mr Waller suffered an inherited anti-thrombin deficiency (ATD), a condition which results in a propensity for the blood to clot, at least in adults. Dr James subsequently recommended IVF treatment. The first plaintiff, Mrs Waller became pregnant after the first cycle of IVF treatment. Her son Keeden was born on 10 August 2000 with a genetic anti-thrombin deficiency. Keeden was released from hospital on 14 August 2000. However, he was brought back to the hospital the next day with cerebral thrombosis (CSVT). As a result of the thrombosis, he suffered permanent brain damage, cerebral palsy and related disabilities. The plaintiffs alleged that the defendant was in breach of contract and his common law duty of care to the plaintiffs in failing to inform them, or cause them to be informed, of the hereditary aspects of ATD. They further alleged that, had they been properly informed, they would not have proceeded to conceive a child using the male plaintiff’s sperm and therefore avoided the harm that had befallen them. The plaintiffs claimed damages to compensate them for their losses, including psychiatric and physical injuries and the costs of having, raising and caring for Keeden. The defendant was held to be not liable in negligence by Justice Hislop of the Supreme Court of New South Wales because a finding was made on medical causation which was adverse to the plaintiffs claim.
Resumo:
This thesis is a study of how the contents of volatile memory on the Windows operating system can be better understood and utilised for the purposes of digital forensic investigations. It proposes several techniques to improve the analysis of memory, with a focus on improving the detection of unknown code such as malware. These contributions allow the creation of a more complete reconstruction of the state of a computer at acquisition time, including whether or not the computer has been infected by malicious code.
Resumo:
Case note on Sheehy v Hobbs [2012]. It is well established that a landlord owes a tenant a duty of care to “take reasonable care to avoid foreseeable risk of injury to their prospective tenants and members of their household”.1 What often arises is the question of how far the scope of that duty extends. In Sheehy v Hobbs [2012] QSC 333 the plaintiff was injured when she fell down a flight of internal stairs of the townhouse she leased from the defendants. The plaintiff claimed damages for a breach of duty owed to her in negligence, and also alleged breaches of the duties owed to her pursuant to s 103 of the Residential Tenancies Act 1994 (Qld) and her tenancy agreement.
Resumo:
The study of memory in most behavioral paradigms, including emotional memory paradigms, has focused on the feed forward components that underlie Hebb’s first postulate, associative synaptic plasticity. Hebb’s second postulate argues that activated ensembles of neurons reverberate in order to provide temporal coordination of different neural signals, and thereby facilitate coincidence detection. Recent evidence from our groups has suggested that the lateral amygdala (LA) contains recurrent microcircuits and that these may reverberate. Additionally this reverberant activity is precisely timed with latencies that would facilitate coincidence detection between cortical and sub cortical afferents to the LA.Thus, recent data at the microcircuit level in the amygdala provide some physiological evidence in support of the second Hebbian postulate.
Resumo:
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong et al. at FSE 2006. This cryptanalysis is based on some unexpected differentials existing for the step transformation. We show their possible uses in different attack scenarios by giving a 1-bit (resp. 2-bit) near collision attack against the full compression function of FORK-256 running with complexity of 2^125 (resp. 2^120) and with negligible memory, and by exhibiting a 22-bit near pseudo-collision. We also show that we can find collisions for the full compression function with a small amount of memory with complexity not exceeding 2^126.6 hash evaluations. We further show how to reduce this complexity to 2^109.6 hash computations by using 273 memory words. Finally, we show that this attack can be extended with no additional cost to find collisions for the full hash function, i.e. with the predefined IV.
Resumo:
Throughout Australia, regulation of the power of sale is highly inconsistent. In response to the uncertain nature of the mortgagee’s duty at common law, many legislatures have intervened. As a result, there has been a proliferation of statutory formula conferring varying degrees of protection on mortgagors. The differences in approach indicate a lack of consensus as to the best method of regulation. This article exposes the extent of the inconsistency and provides a comparative assessment of the various provisions with reference to the policy concerns that underpin legislative intervention. The article identifies a number of deficiencies associated with existing provisions and concludes that mortgagees and mortgagors alike would benefit from improved clarity and consistency. To that end, the article proposes a model provision that seeks to address the deficiencies identified.
Resumo:
The generation of a correlation matrix for set of genomic sequences is a common requirement in many bioinformatics problems such as phylogenetic analysis. Each sequence may be millions of bases long and there may be thousands of such sequences which we wish to compare, so not all sequences may fit into main memory at the same time. Each sequence needs to be compared with every other sequence, so we will generally need to page some sequences in and out more than once. In order to minimize execution time we need to minimize this I/O. This paper develops an approach for faster and scalable computing of large-size correlation matrices through the maximal exploitation of available memory and reducing the number of I/O operations. The approach is scalable in the sense that the same algorithms can be executed on different computing platforms with different amounts of memory and can be applied to different bioinformatics problems with different correlation matrix sizes. The significant performance improvement of the approach over previous work is demonstrated through benchmark examples.
Resumo:
This article examines the legal principles governing the statutory work health and safety general duties of principals who engage expert contractors to carry out work beyond the expertise of the principal. The article examines recent case law in which superior courts accepted the principal’s argument that the engagement of the expert contractor was sufficient to discharge the principal’s statutory work health and safety general duty. It then reframes the debate within the principles of systematic work health and safety management, and key provisions in the harmonised Work Health and Safety Acts—the primary duty of care; the key underpinning principles; the positive and proactive officer’s duty; and the horizontal duty of consultation, cooperation and coordination. It argues that it is likely that courts examining the issue of the principal’s work health and safety obligations under the harmonised Work Health and Safety Acts will require principals to do more to actively manage the work of expert contractors to ensure the health and safety of all workers and others potentially affected by the work.
Resumo:
The hippocampus is an anatomically distinct region of the medial temporal lobe that plays a critical role in the formation of declarative memories. Here we show that a computer simulation of simple compartmental cells organized with basic hippocampal connectivity is capable of producing stimulus intensity sensitive wide-band fluctuations of spectral power similar to that seen in real EEG. While previous computational models have been designed to assess the viability of the putative mechanisms of memory storage and retrieval, they have generally been too abstract to allow comparison with empirical data. Furthermore, while the anatomical connectivity and organization of the hippocampus is well defined, many questions regarding the mechanisms that mediate large-scale synaptic integration remain unanswered. For this reason we focus less on the specifics of changing synaptic weights and more on the population dynamics. Spectral power in four distinct frequency bands were derived from simulated field potentials of the computational model and found to depend on the intensity of a random input. The majority of power occurred in the lowest frequency band (3-6 Hz) and was greatest to the lowest intensity stimulus condition (1% maximal stimulus). In contrast, higher frequency bands ranging from 7-45 Hz show an increase in power directly related with an increase in stimulus intensity. This trend continues up to a stimulus level of 15% to 20% of the maximal input, above which power falls dramatically. These results suggest that the relative power of intrinsic network oscillations are dependent upon the level of activation and that above threshold levels all frequencies are damped, perhaps due to over activation of inhibitory interneurons.
Resumo:
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.
Resumo:
Health professionals' duty of care includes combating racism in society as well as in health care settings. The Australian Government's proposed changes to the Racial Discrimination Act 1975 and the repeal of section 18C has transfixed national debates on legally defining racial discrimination.1 Under these changes, racial discrimination would no longer include acts that “offend, insult, humiliate or intimidate” a person based on the person's race, colour or national or ethnic origin and instead be limited to acts that “incite hatred” or “cause fear of physical harm”.2 These proposed changes have been framed in the context of enabling “free speech”, yet, evidence presented in this issue of the Journal shows that they have potential to cause harm. In this issue, Kelaher and colleagues highlight the prevalence of racism as experienced by Indigenous Australians and its deleterious effects on mental health.3 Alarmingly, almost every Aboriginal Victorian participating in this study reported an experience of racism in the preceding 12 months, which included jokes, stereotypes, verbal abuse and exclusionary practices. The experiences of racism reported here neither incited hatred nor caused fear of physical harm, yet resulted in harm such as psychological distress, especially when meted out in our health care system. These findings are a stark reminder that racism is indeed an important health issue, and as health professionals, our duty of care extends to contributing to these broader policy discussions...