112 resultados para Plants, Protection of
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
Historically, determining the country of origin of a published work presented few challenges, because works were generally published physically – whether in print or otherwise – in a distinct location or few locations. However, publishing opportunities presented by new technologies mean that we now live in a world of simultaneous publication – works that are first published online are published simultaneously to every country in world in which there is Internet connectivity. While this is certainly advantageous for the dissemination and impact of information and creative works, it creates potential complications under the Berne Convention for the Protection of Literary and Artistic Works (“Berne Convention”), an international intellectual property agreement to which most countries in the world now subscribe. Under the Berne Convention’s national treatment provisions, rights accorded to foreign copyright works may not be subject to any formality, such as registration requirements (although member countries are free to impose formalities in relation to domestic copyright works). In Kernel Records Oy v. Timothy Mosley p/k/a Timbaland, et al. however, the Florida Southern District Court of the United States ruled that first publication of a work on the Internet via an Australian website constituted “simultaneous publication all over the world,” and therefore rendered the work a “United States work” under the definition in section 101 of the U.S. Copyright Act, subjecting the work to registration formality under section 411. This ruling is in sharp contrast with an earlier decision delivered by the Delaware District Court in Håkan Moberg v. 33T LLC, et al. which arrived at an opposite conclusion. The conflicting rulings of the U.S. courts reveal the problems posed by new forms of publishing online and demonstrate a compelling need for further harmonization between the Berne Convention, domestic laws and the practical realities of digital publishing. In this article, we argue that even if a work first published online can be considered to be simultaneously published all over the world it does not follow that any country can assert itself as the “country of origin” of the work for the purpose of imposing domestic copyright formalities. More specifically, we argue that the meaning of “United States work” under the U.S. Copyright Act should be interpreted in line with the presumption against extraterritorial application of domestic law to limit its application to only those works with a real and substantial connection to the United States. There are gaps in the Berne Convention’s articulation of “country of origin” which provide scope for judicial interpretation, at a national level, of the most pragmatic way forward in reconciling the goals of the Berne Convention with the practical requirements of domestic law. We believe that the uncertainties arising under the Berne Convention created by new forms of online publishing can be resolved at a national level by the sensible application of principles of statutory interpretation by the courts. While at the international level we may need a clearer consensus on what amounts to “simultaneous publication” in the digital age, state practice may mean that we do not yet need to explore textual changes to the Berne Convention.
Resumo:
As an international norm, the Responsibility to Protect (R2P) has gained substantial influence and institutional presence—and created no small controversy—in the ten years since its first conceptualisation. Conversely, the Protection of Civilians in Armed Conflict (PoC) has a longer pedigree and enjoys a less contested reputation. Yet UN Security Council action in Libya in 2011 has thrown into sharp relief the relationship between the two. UN Security Council Resolutions 1970 and 1973 follow exactly the process envisaged by R2P in response to imminent atrocity crimes, yet the operative paragraphs of the resolutions themselves invoke only PoC. This article argues that, while the agendas of PoC and R2P converge with respect to Security Council action in cases like Libya, outside this narrow context it is important to keep the two norms distinct. Peacekeepers, humanitarian actors, international lawyers, individual states and regional organisations are required to act differently with respect to the separate agendas and contexts covered by R2P and PoC. While overlap between the two does occur in highly visible cases like Libya, neither R2P nor PoC collapses normatively, institutionally or operationally into the other.
Resumo:
Is there a point where parental effort can be too much? While the link between parenting effort and the wellbeing of children has been firmly established, contemporary discussion has proposed that extreme levels of parental protection of and responsiveness to children could be counterproductive. Research has not yet addressed this phenomenon to ascertain if overparenting is a genuinely different type of parenting approach. The purpose of the present study was to gain insight into the parenting actions considered by parenting professionals (psychologists and school guidance counsellors) to be overparenting. One hundred and twenty-eight professionals responded to an online survey about their observations of overparenting, with eighty-six respondents providing lists of the types of actions they believed were behavioural examples of the term. The survey data revealed that certain types of actions were considered to be indicative of overparenting, and that particular beliefs and outcomes may be involved in this parenting approach. Implications for parenting advice and education programs, and further research are discussed.
Resumo:
This paper considers the role of CCTV (closed circuit television) in the surveillance, policing and control of public space in urban and rural locations, specifically in relation to the use of public space by young people. The use of CCTV technology in public spaces is now an established and largely uncontested feature of everyday life in a number of countries and the assertion that they are essentially there for the protection of law abiding and consuming citizens has broadly gone unchallenged. With little or no debate in the U.K. to critique the claims made by the burgeoning security industry that CCTV protects people in the form of a ‘Big Friend’, the state at both central and local levels has endorsed the installation of CCTV apparatus across the nation. Some areas assert in their promotional material that the centre of the shopping and leisure zone is fully surveilled by cameras in order to reassure visitors that their personal safety is a matter of civic concern, with even small towns and villages expending monies on sophisticated and expensive to maintain camera systems. It is within a context of monitoring, recording and control procedures that young people’s use of public space is constructed as a threat to social order, in need of surveillance and exclusion which forms a major and contemporary feature in shaping thinking about urban and rural working class young people in the U.K. As Loader (1996) notes, young people’s claims on public space rarely gain legitimacy if ‘colliding’ with those of local residents, and Davis (1990) describes the increasing ‘militarization and destruction of public space’, while Jacobs (1965) asserts that full participation in the ‘daily life of urban streets’ is essential to the development of young people and beneficial for all who live in an area. This paper challenges the uncritical acceptance of widespread use of CCTV and identifies its oppressive and malevolent potential in forming a ‘surveillance gaze’ over young people (adapting Foucault’s ‘clinical gaze’c. 1973) which can jeopardise mental health and well being in coping with the ‘metropolis’, after Simmel, (1964).
Resumo:
Motorway off-ramps are a significant source of traffic congestion and collisions. Heavy diverging traffic to off-ramps slows down the mainline traffic speed. When the off-ramp queue spillbacks onto the mainline, it leads to a major breakdown of the motorway capacity and a significant threat to the traffic safety. This paper proposes using Variable Speed Limits (VSL) for protection of the motorway off-ramp queue and thus to promote safety in congested diverging areas. To support timely activation of VSL in advance of queue spillover, a proactive control strategy is proposed based on a real-time off-ramp queue estimation and prediction. This process determines the estimated queue size in the near-term future, on which the decision to change speed limits is made. VSL can effectively slow down traffic as it is mandatory that drivers follow the changed speed limits. A collateral benefit of VSL is its potential effect on drivers making them more attentive to the surrounding traffic conditions, and prepared for a sudden braking of the leading car. This paper analyses and quantifies these impacts and potential benefits of VSL on traffic safety and efficiency using the microsimulation approach.
Resumo:
Least developed countries (LDCs) are the primary victims of environmental changes, including present and future impacts of climate change. Environmental degradation poses a serious threat to the conservation and sustainable use of natural resources, thus hindering development in LDCs. Simultaneously, poverty is itself both a major cause and effect of global environmental problems. Against this backdrop, this essay argues that without recognition and protection of a collective right to development, genuine environmental protection will remain unachievable. Further, this essay submits that, particularly in the context of LDCs, the right to environment and the right to development are inseparable. Finally, this essay argues that the relationship between the right to environment and the right to development must fall within the paradigm of sustainable development if the promotion and protection of those rights are to be justified.
Resumo:
Surface water and groundwater are the most important water sources in the natural environment. Land use and seasonal factors play an important role in influencing the quality of these water sources. An in-depth understanding of the role of these two influential factors can help to implement an effective catchment management strategy for the protection of these water sources. This paper discusses the outcomes of an extensive research study which investigated the role of land use and seasonal factors on surface water and groundwater pollution in a mixed land use coastal catchment. The study confirmed that the influence exerted on the water environment by seasonal factors is secondary to that of land use. Furthermore, the influence of land use and seasonal factors on surface water and groundwater quality varies with the pollutant species. This highlights the need to specifically take into consideration the targeted pollutants and the key influential factors for the effective protection of vulnerable receiving water environments.
Resumo:
Electrostatic discharges have been identified as the most likely cause in a number of incidents of fire and explosion with unexplained ignitions. The lack of data and suitable models for this ignition mechanism creates a void in the analysis to quantify the importance of static electricity as a credible ignition mechanism. Quantifiable hazard analysis of the risk of ignition by static discharge cannot, therefore, be entirely carried out with our current understanding of this phenomenon. The study of electrostatics has been ongoing for a long time. However, it was not until the wide spread use of electronics that research was developed for the protection of electronics from electrostatic discharges. Current experimental models for electrostatic discharge developed for intrinsic safety with electronics are inadequate for ignition analysis and typically are not supported by theoretical analysis. A preliminary simulation and experiment with low voltage was designed to investigate the characteristics of energy dissipation and provided a basis for a high voltage investigation. It was seen that for a low voltage the discharge energy represents about 10% of the initial capacitive energy available and that the energy dissipation was within 10 ns of the initial discharge. The potential difference is greatest at the initial break down when the largest amount of the energy is dissipated. The discharge pathway is then established and minimal energy is dissipated as energy dissipation becomes greatly influenced by other components and stray resistance in the discharge circuit. From the initial low voltage simulation work, the importance of the energy dissipation and the characteristic of the discharge were determined. After the preliminary low voltage work was completed, a high voltage discharge experiment was designed and fabricated. Voltage and current measurement were recorded on the discharge circuit allowing the discharge characteristic to be recorded and energy dissipation in the discharge circuit calculated. Discharge energy calculations show consistency with the low voltage work relating to discharge energy with about 30-40% of the total initial capacitive energy being discharged in the resulting high voltage arc. After the system was characterised and operation validated, high voltage ignition energy measurements were conducted on a solution of n-Pentane evaporating in a 250 cm3 chamber. A series of ignition experiments were conducted to determine the minimum ignition energy of n-Pentane. The data from the ignition work was analysed with standard statistical regression methods for tests that return binary (yes/no) data and found to be in agreement with recent publications. The research demonstrates that energy dissipation is heavily dependent on the circuit configuration and most especially by the discharge circuit's capacitance and resistance. The analysis established a discharge profile for the discharges studied and validates the application of this methodology for further research into different materials and atmospheres; by systematically looking at discharge profiles of test materials with various parameters (e.g., capacitance, inductance, and resistance). Systematic experiments looking at the discharge characteristics of the spark will also help understand the way energy is dissipated in an electrostatic discharge enabling a better understanding of the ignition characteristics of materials in terms of energy and the dissipation of that energy in an electrostatic discharge.
Resumo:
New residential scale photovoltaic (PV) arrays are commonly connected to the grid by a single DC-AC inverter connected to a series string of PV modules, or many small DC-AC inverters which connect one or two modules directly to the AC grid. This paper shows that a "converter-per-module" approach offers many advantages including individual module maximum power point tracking, which gives great flexibility in module layout, replacement, and insensitivity to shading; better protection of PV sources, and redundancy in the case of source or converter failure; easier and safer installation and maintenance; and better data gathering. Simple nonisolated per-module DC-DC converters can be series connected to create a high voltage string connected to a simplified DC-AC inverter. These advantages are available without the cost or efficiency penalties of individual DC-AC grid connected inverters. Buck, boost, buck-boost and Cuk converters are possible cascadable converters. The boost converter is best if a significant step up is required, such as with a short string of 12 PV modules. A string of buck converters requires many more modules, but can always deliver any combination of module power. The buck converter is the most efficient topology for a given cost. While flexible in voltage ranges, buck-boost and Cuk converters are always at an efficiency or alternatively cost disadvantage
Resumo:
It is certain that there will be changes in environmental conditions across the globe as a result of climate change. Such changes will require the building of biological, human and infrastructure resilience. In some instances, the building of such resilience will be insufficient to deal with extreme changes in environmental conditions and legal frameworks will be required to provide recognition and support for people relocating as a result of environmental change. International legal frameworks do not currently recognise or assist people displaced as a result of environmental factors. The objective of this chapter is to examine the areas of international law relevant to displacement arising from environmental factors, consider some of the proposed climate displacement instruments and suggest the most suitable international institution to host a program addressing climate displacement. In order to determine the most appropriate institution to address and regulate climate displacement, it is imperative to consider issues of governance. This paper seeks to examine this issue and determine whether it is preferable to place climate displacement programs into existing international legal frameworks, or whether it is necessary to regulate this area in an entirely new institution specifically designed to deal with the complex and cross-cutting issues surrounding the topic...
Resumo:
In plants, silencing of mRNA can be transmitted from cell to cell and also over longer distances from roots to shoots. To investigate the long-distance mechanism, WT and mutant shoots were grafted onto roots silenced for an mRNA. We show that three genes involved in a chromatin silencing pathway, NRPD1a encoding RNA polymerase IVa, RNA-dependent RNA polymerase 2 (RDR2), and DICER-like 3 (DCL3), are required for reception of long-distance mRNA silencing in the shoot. A mutant representing a fourth gene in the pathway, argonaute4 (ago4), was also partially compromised in the reception of silencing. This pathway produces 24-nt siRNAs and resulted in decapped RNA, a known substrate for amplification of dsRNA by RDR6. Activation of silencing in grafted shoots depended on RDR6, but no 24-nt siRNAs were detected in mutant rdr6 shoots, indicating that RDR6 also plays a role in initial signal perception. After amplification of decapped transcripts, DCL4 and DCL2 act hierarchically as they do in antiviral resistance to produce 21- and 22-nt siRNAs, respectively, and these guide mRNA degradation. Several dcl genotypes were also tested for their capacity to transmit the mobile silencing signal from the rootstock. dcl1-8 and a dcl2 dcl3 dcl4 triple mutant are compromised in micro-RNA and siRNA biogenesis, respectively, but were unaffected in signal transmission. © 2007 by The National Academy of Sciences of the USA.
Resumo:
RNA polymerase III (Pol III) as well as Pol II (35S) promoters are able to drive hairpin RNA (hpRNA) expression and induce target gene silencing in plants. siRNAs of 21 nt are the predominant species in a 35S Pol II line, whereas 24- and/or 22-nucleotide (nt) siRNAs are produced by a Pol III line. The 35S line accumulated the loop of the hpRNA, in contrast to full-length hpRNA in the Pol III line. These suggest that Pol II and Pol III-transcribed hpRNAs are processed by different pathways. One Pol III transgene produced only 24-nt siRNAs but silenced the target gene efficiently, indicating that the 24-nt siRNAs can direct mRNA degradation; specific cleavage was confirmed by 59 rapid amplification of cDNA ends (RACE). Both Pol II- and Pol III-directed hpRNA transgenes induced cytosine methylation in the target DNA. The extent of methylation is not correlated with the level of 21-nt siRNAs, suggesting that they are not effective inducers of DNA methylation. The promoter of a U6 transgene was significantly methylated, whereas the promoter of the endogenous U6 gene was almost free of cytosine methylation, suggesting that endogenous sequences are more resistant to de novo DNA methylation than are transgene constructs. Published by Cold Spring Harbor Laboratory Press. Copyright © 2008 RNA Society.