529 resultados para Legal order
Resumo:
The ethics of creating ‘saviour siblings’ for the benefit of another has received much attention, but little consideration has been given to the legal position of those saviours born who may be asked to provide tissue for transplantation to another during childhood. This article examines the ethical issues surrounding minor donation as well as the existing legal framework in the UK and Australia that regulates minors providing tissue for the benefit of another. Against this background the position of minor saviours, who are called upon to donate bone marrow or peripheral blood stem cells, is examined. This analysis suggests that the law does not provide sufficient protection for minor saviours who are called upon to donate to another. It is argued that specific ethical obligations are owed to saviours—that ought to be reflected in the law—in order to protect them from exploitation while they remain minors.
Resumo:
This appendix describes the Order Fulfillment process followed by a fictitious company named Genko Oil. The process is freely inspired by the VICS (Voluntary Inter-industry Commerce Solutions) reference model1 and provides a demonstration of YAWL’s capabilities in modelling complex control-flow, data and resourcing requirements.
Resumo:
Cultural policy studies have previously highlighted the importance of multiple logics, friction and contradiction in cultural policy. Recent developments in institutional theory provide a framework for analysing change in cultural policy which explores movement between these multiple and sometimes contradictory logics. This paper analyses the role of friction in the evolution of Australian film industry policy and in particular the tension between competing logics regarding nationalism, commercialism and the state. The paper is suggestive of the relevance of institutional theory as a framework for understanding cultural policy evolution.
Resumo:
Queensland University of Technology (QUT) is faced with a rapidly growing research agenda built upon a strategic research capacity-building program. This presentation will outline the results of a project that has recently investigated QUT’s research support requirements and which has developed a model for the support of eResearch across the university. QUT’s research building strategy has produced growth at the faculty level and within its research institutes. This increased research activity is pushing the need for university-wide eResearch platforms capable of providing infrastructure and support in areas such as collaboration, data, networking, authentication and authorisation, workflows and the grid. One of the driving forces behind the investigation is data-centric nature of modern research. It is now critical that researchers have access to supported infrastructure that allows the collection, analysis, aggregation and sharing of large data volumes for exploration and mining in order to gain new insights and to generate new knowledge. However, recent surveys into current research data management practices by the Australian Partnership for Sustainable Repositories (APSR) and by QUT itself, has revealed serious shortcomings in areas such as research data management, especially its long term maintenance for reuse and authoritative evidence of research findings. While these internal university pressures are building, at the same time there are external pressures that are magnifying them. For example, recent compliance guidelines from bodies such as the ARC, and NHMRC and Universities Australia indicate that institutions need to provide facilities for the safe and secure storage of research data along with a surrounding set of policies, on its retention, ownership and accessibility. The newly formed Australian National Data Service (ANDS) is developing strategies and guidelines for research data management and research institutions are a central focus, responsible for managing and storing institutional data on platforms that can be federated nationally and internationally for wider use. For some time QUT has recognised the importance of eResearch and has been active in a number of related areas: ePrints to digitally publish research papers, grid computing portals and workflows, institutional-wide provisioning and authentication systems, and legal protocols for copyright management. QUT also has two widely recognised centres focused on fundamental research into eResearch itself: The OAK LAW project (Open Access to Knowledge) which focuses upon legal issues relating eResearch and the Microsoft QUT eResearch Centre whose goal is to accelerate scientific research discovery, through new smart software. In order to better harness all of these resources and improve research outcomes, the university recently established a project to investigate how it might better organise the support of eResearch. This presentation will outline the project outcomes, which include a flexible and sustainable eResearch support service model addressing short and longer term research needs, identification of resource requirements required to establish and sustain the service, and the development of research data management policies and implementation plans.
Resumo:
Advances in information and communications technologies during the last two decades have allowed organisations to capture and utilise data on a vast scale, thus heightening the importance of adequate measures for protecting unauthorised disclosure of personal information. In this respect, data breach notification has emerged as an issue of increasing importance throughout the world. It has been the subject of law reform in the United States and in other international jurisdictions. Following the Australian Law Reform Commission’s review of privacy, data breach notification will soon be addressed in Australia. This article provides a review of US and Australian legal initiatives regarding the notification of data breaches. The authors highlight areas of concern based on the extant US literature that require specific consideration in Australia regarding the development of an Australian legal framework for the notification of data breaches.
Resumo:
This paper is part one of a three part study into the collective regulation processes of players in massive multiplayer online games (MMOG). Traditionally game playing has not been classed as problematic, however with introduction of new media technologies and new ways to play games, certain contexts have become obscure, namely the localised order of ‘playing online’ or how players manage and maintain order between each other as opposed to ‘following the rules’. Principally this paper will examine concepts of ‘virtual community’. These will be illustrated as particularly unhelpful when considering how people conduct themselves in these spaces. Thus, ‘virtual community’ will be seen as critical in implicating various online behaviours as superior to other online behaviours causing obscurity and blurring actions. This obscurity is grounded by strong associations in the virtual community as logic of practise in and of itself; behaviours that fall outside this category become common sense and as such are made invisible for investigation. This paper will draw upon the theories of Basil Bernstein and Pierre Bourdieu to produce a distinction between online behaviours and ultimately make them visible for further investigation. In doing so this paper seeks to form a basis for future research where interaction in these spaces can be identified as belonging to a certain framework to inform the design of online games and applications more effectively.
The interaction order of Second Life : how micro sociology can contribute to online games innovation
Resumo:
This paper uses the virtual world Second Life (as Web 2.0 environment) to discuss how sociological theory is a relevant tool for innovation in the area of games design as a methodological strategy. Via the theories of Erving Goffman’s interaction order the paper illustrates how micro studies of online interaction demonstrate active accounts of membership and complex interactivity. In order to achieve this, the paper outlines a methodological tool to assist in the application of micro sociology to Web 2.0 environments that accounts for the multiple dimensions of participation within the digital field.
Resumo:
Despite increasingly sophisticated speed management strategies, speeding remains a significant contributing factor in 25% of Australia’s fatal crashes. Excessive speed is also a recognised contributor to road trauma in rapidly motorising countries such as China, where increases in vehicle ownership and new drivers, and a high proportion of vulnerable road users all contribute to a high road trauma rate. Speed choice is a voluntary behaviour. Therefore, driver perceptions are important to our understanding of the nature of speeding. This paper reports preliminary qualitative (focus groups) and quantitative (survey) investigations of the perceptions of drivers in Queensland and Beijing. Drivers’ definitions of speeding as well as their perceptions of the influence of legal factors on their reported speeds were explored. Survey participants were recruited from petrol stations (Queensland, n=833) and car washes (Beijing, n=299). Similarities were evident in justifications for exceeding speed limits across samples. Excessive speeds were not deemed as ‘speeding’ when drivers considered that they were safe and under their control, or when speed limits were seen as unreasonably low. This appears linked to perceptions of enforcement tolerances in some instances with higher perceived enforcement thresholds noted in China. Encouragingly, drivers in both countries reported a high perceived risk of apprehension if speeding. However, a substantial proportion of both samples also indicated perceptions of low certainty of receiving penalties when apprehended. Chinese drivers considered sanctions less severe than did Australian drivers. In addition, strategies to avoid detection and penalties were evident in both samples, with Chinese drivers reporting a broader range of avoidant techniques. Implications of the findings for future directions in speed management in both countries are discussed.
Resumo:
The middle years of schooling has emerged as an important focus in Australian education. Student disengagement and alienation, the negative effects of non-completion of the senior years of schooling and underachievement have raised concerns about the quality of education during the middle years. For many schools, reshaping the middle years has involved incorporating Information and Communication Technologies (ICT) to motivate students. However, simultaneously there is a need to ensure that programs are academically rigorous. There is little doubt that there are potential benefits to integrating ICT into programs for middle years’ students. However, little is known about how middle years’ teachers perceive higher order thinking, which is a component of academic rigour. This paper investigates the question of What are teachers’ perceptions of higher order thinking in an ICT environment? The study is underpinned by socio-cultural theory which is based on the belief that learning occurs through social interaction and that individuals are shaped by the social and cultural tools and instruments they engage with. This investigation used a collective case study design. Two methods were used for data collection. These methods are semi-structured interviews with individual teachers and a class and a focus group discussion with teachers. Findings indicate that teachers hold various perceptions of higher order thinking that lead to productive approaches to integrating ICT in middle years’ classrooms. The paper highlights that there may be a continuum of perceptions of higher order thinking with ICT. This continuum may inform professional developers who are guiding and supporting teachers to integrate ICT into middle years’ classrooms.
Resumo:
Traffic law enforcement is based on deterrence principles, whereby drivers control their behaviour in order to avoid an undesirable sanction. For “hooning”-related driving behaviours in Queensland, the driver’s vehicle can be impounded for 48 hours, 3 months, or permanently depending on the number of previous hooning offences. It is assumed that the threat of losing something of value, their vehicle, will discourage drivers from hooning. While official data shows that the rate of repeat offending is low, an in-depth understanding of the deterrent effects of these laws should involve qualitative research with targeted drivers. A sample of 22 drivers who reported engaging in hooning behaviours participated in focus group discussions about the vehicle impoundment laws as applied to hooning offences in Queensland. The findings suggested that deterrence theory alone cannot fully explain hooning behaviour, as participants reported hooning frequently, and intended to continue doing so, despite reporting that it is likely that they will be caught, and perceiving the vehicle impoundment laws to be extremely severe. The punishment avoidance aspect of deterrence theory appears important, as well as factors over and above legal issues, particularly social influences. A concerning finding was drivers’ willingness to flee from police in order to avoid losing their vehicle permanently for a third offence, despite acknowledging risks to their own safety and that of others. This paper discusses the study findings in terms of the implications for future research directions, enforcement practices and policy development for hooning and other traffic offences for which vehicle impoundment is applied.
Resumo:
Work experience which is integrated into an undergraduate law degree has a vital role to play in assisting law students to develop the skills and attributes they need in order to be effective legal practitioners. Work integrated learning provides a context for students to develop their skills, to see the link between theory and practice and supports students in making the transition from university to practice. The literature in Australian legal education has given little consideration to the design of legal internship subjects (as distinct from legal clinic programs). Accordingly the design of internship subjects needs to be carefully considered to ensure alignment of learning objectives, learning tasks and assessment. This paper will examine the literature relating to internships, particularly in a legal context, and will propose some principles for the design of legal internships. These principles will be considered in light of an evaluation of a newly designed undergraduate legal internship subject.
Resumo:
This study investigates the everyday practices of young children acting in their social worlds within the context of the school playground. It employs an ethnographic ethnomethodological approach using conversation analysis. In the context of child participation rights advanced by the United Nations Convention on the Rights of the Child (UNCRC) and childhood studies, the study considers children’s social worlds and their participation agendas. The participants of the study were a group of young children in a preparatory year setting in a Queensland school. These children, aged 4 to 6 years, were videorecorded as they participated in their day-to-day activities in the classroom and in the playground. Data collection took place over a period of three months, with a total of 26 hours of video data. Episodes of the video-recordings were shown to small groups of children and to the teacher to stimulate conversations about what they saw on the video. The conversations were audio-recorded. This method acknowledged the child’s standpoint and positioned children as active participants in accounting for their relationships with others. These accounts are discussed as interactionally built comments on past joint experiences and provided a starting place for analysis of the video-recorded interaction. Four data chapters are presented in this thesis. Each data chapter investigates a different topic of interaction. The topics include how children use “telling” as a tactical tool in the management of interactional trouble, how children use their “ideas” as possessables to gain ownership of a game and the interactional matters that follow, how children account for interactional matters and bid for ownership of “whose idea” for the game and finally, how a small group of girls orientated to a particular code of conduct when accounting for their actions in a pretend game of “school”. Four key themes emerged from the analysis. The first theme addresses two arenas of action operating in the social world of children, pretend and real: the “pretend”, as a player in a pretend game, and the “real”, as a classroom member. These two arenas are intertwined. Through inferences to explicit and implicit “codes of conduct”, moral obligations are invoked as children attempt to socially exclude one another, build alliances and enforce their own social positions. The second theme is the notion of shared history. This theme addresses the history that the children reconstructed, and acts as a thread that weaves through their interactions, with implications for present and future relationships. The third theme is around ownership. In a shared context, such as the playground, ownership is a highly contested issue. Children draw on resources such as rules, their ideas as possessables, and codes of behaviour as devices to construct particular social and moral orders around owners of the game. These themes have consequences for children’s participation in a social group. The fourth theme, methodological in nature, shows how the researcher was viewed as an outsider and novice and was used as a resource by the children. This theme is used to inform adult-child relationships. The study was situated within an interest in participation rights for children and perspectives of children as competent beings. Asking children to account for their participation in playground activities situates children as analysers of their own social worlds and offers adults further information for understanding how children themselves construct their social interactions. While reporting on the experiences of one group of children, this study opens up theoretical questions about children’s social orders and these influences on their everyday practices. This thesis uncovers how children both participate in, and shape, their everyday social worlds through talk and interaction. It investigates the consequences that taken-for-granted activities of “playing the game” have for their social participation in the wider culture of the classroom. Consideration of this significance may assist adults to better understand and appreciate the social worlds of young children in the school playground.
Resumo:
In this paper, we consider a variable-order fractional advection-diffusion equation with a nonlinear source term on a finite domain. Explicit and implicit Euler approximations for the equation are proposed. Stability and convergence of the methods are discussed. Moreover, we also present a fractional method of lines, a matrix transfer technique, and an extrapolation method for the equation. Some numerical examples are given, and the results demonstrate the effectiveness of theoretical analysis.
Resumo:
In this paper, we consider the variable-order nonlinear fractional diffusion equation View the MathML source where xRα(x,t) is a generalized Riesz fractional derivative of variable order View the MathML source and the nonlinear reaction term f(u,x,t) satisfies the Lipschitz condition |f(u1,x,t)-f(u2,x,t)|less-than-or-equals, slantL|u1-u2|. A new explicit finite-difference approximation is introduced. The convergence and stability of this approximation are proved. Finally, some numerical examples are provided to show that this method is computationally efficient. The proposed method and techniques are applicable to other variable-order nonlinear fractional differential equations.
Resumo:
A method of improving the security of biometric templates which satisfies desirable properties such as (a) irreversibility of the template, (b) revocability and assignment of a new template to the same biometric input, (c) matching in the secure transformed domain is presented. It makes use of an iterative procedure based on the bispectrum that serves as an irreversible transformation for biometric features because signal phase is discarded each iteration. Unlike the usual hash function, this transformation preserves closeness in the transformed domain for similar biometric inputs. A number of such templates can be generated from the same input. These properties are illustrated using synthetic data and applied to images from the FRGC 3D database with Gabor features. Verification can be successfully performed using these secure templates with an EER of 5.85%