403 resultados para Technology policy
Resumo:
Carbon Capture and Storage (CCS) is a critical part of the global effort to address climate change as CCS has the potential to achieve deep cuts in CO2 emissions to atmosphere from the use of fossil fuels. In this context, pre-combustion capture through Integrated Gasification Combined Cycle (IGCC) power plants with CCS is one of the key pathways to low emissions power generation. There are, however, very significant challenges to the development, commercialization and deployment of IGCC with CCS technologies. This article examines matters of cost, the need for government support to early movers, the attribution of economic value for carbon dioxide and various other regulatory, policy, technical and infrastructural barriers to the development and subsequent deployment of this low emissions coal technology option.
Resumo:
The Malaysian National Innovation Model blueprint states that there is an urgent need to pursue an innovation-oriented economy to improve the nation’s capacity for knowledge, creativity and innovation. In nurturing a pervasive innovation culture, the Malaysian government has declared the year 2010 as an Innovative Year whereby creativity among its population is highly celebrated. However, while Malaysian citizens are encouraged to be creative and innovative, scientific data and information generated from publicly funded research in Malaysia is locked up because of rigid intellectual property licensing regimes and traditional publishing models. Reflecting on these circumstances, this paper looks at, and argue why, scientific data and information should be made available, accessible and re-useable freely to promote the grassroots level of innovation in Malaysia. Using innovation theory as its platform of argument, this paper calls for an open access policy for publicly funded research output to be adopted and implemented in Malaysia. Simultaneously, a normative analytic approach is used to determine the types of open access policy that ought to be adopted to spur greater innovation among Malaysians.
Resumo:
This article considers the question of whether creative workers demonstrate a preference for inner cities or suburbs, drawing upon research findings from the ‘Creative Suburbia’ project undertaken by a team of Australian researchers over 2008–2010 in selected suburban areas of Brisbane and Melbourne. Locating this question in wider debates about the relationship of the suburbs to the city, as well as the development of new suburban forms such as master-planned communities, the article finds that the number of creative industries workers located in the suburbs is significant, and those creative workforce members living and working in suburban areas are generally happy with this experience, locating in the suburbs out of personal choice rather than economic necessity. This runs counter to the received wisdom on creative cities, which emphasize cultural amenity in inner city areas as a primary driver of location decisions for the ‘creative class’. The article draws out some implications of the findings for urban cultural policy, arguing that the focus on developing inner urban cultural amenity has been overplayed, and that more attention should be given to how to better enable distributed knowledge systems through high-speed broadband infrastructure.
Resumo:
-
Resumo:
The use of electronic means of contact to support repeated aggressive behaviour by an individual or group, that is intended to harm others – or ‘cyberbullying’ as it is now known – is increasingly becoming a problem for modern students, teachers, parents and schools. Increasingly victims of face to face bullying are looking to the law as a means of recourse, not only against bullies but also school authorities who have the legal responsibility to provide a safe environment for learning. It is likely that victims of cyberbullying will be inclined to do the same. This article examines a survey of the anti-bullying policies of a small sample of Australian schools to gauge their readiness to respond to the challenge of cyberbullying, particularly in the context of the potential liability they may face. It then uses that examination as a basis for identifying implications for the future design of school anti-bullying policies.
Resumo:
We analyse the electronic portfolio (ePortfolio) in higher education policy and practice. While evangelical accounts of the ePortfolio celebrate its power as a new eLearning technology, we argue that it allows the mutually-reinforcing couple of neoliberalism and the enterprising self to function in ways in which individual difference can be presented, cultured and grown, all the time within a standardised framework which relentlessly polices the limits of the acceptable and unacceptable. We point to the ePortfolio as a practice of (self-) government, arguing that grander policy coalesces out of a halting, experimental set of technological instruments for thinking about how life should be lived.
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Resumo:
This series of research vignettes is aimed at sharing current and interesting research findings from our team and other international Entrepreneurship researchers. In this vignette, Professor Helene Ahl from Jonkoping University considers the consequences for gender equality of policy for women's entrepreneurship in two countries with distinctly different welfare state regimes.
Resumo:
This paper considers the debate about the relationship between globalization and media policy from the perspective provided by a current review of the Australian media classification scheme. Drawing upon the author’s recent experience in being ‘inside’ the policy process, as Lead Commissioner on the Australian National Classification Scheme Review, it is argued that theories of globalization – including theories of neoliberal globalization – fail to adequately capture the complexities of the reform process, particularly around the relationship between regulation and markets. The paper considers the pressure points for media content policies arising from media globalization, and the wider questions surrounding media content policies in an age of media convergence.
Resumo:
On 1 January 2010, the Assisted Reproductive Treatment Act 2008 (Vic) came into force. The legislation was the outcome of a detailed review and consultation process undertaken by the Victorian Law Reform Commission. Arguably, the change to the regulatory framework represents a significant shift in policy compared to previous regulatory approaches on this topic in Victoria. This article considers the impact of the new legislation on eligibility for reproductive treatments, focusing on the accessibility of such services for the purpose of creating a “saviour sibling”. It also highlights the impact of the Victorian regulatory body’s decision to abolish its regulatory policies on preimplantation genetic diagnosis and preimplantation tissue-typing, concluding that the regulatory approach in relation to these latter issues is similar to other Australian jurisdictions where such practices are not addressed by a statutory framework.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation and offender management and treatment practice in the area of Internet child abuse. Internet use has grown considerably over the last five years, and information technology now forms a core part of the formal education system in many countries. There is however, increasing evidence that the Internet is used by some adults to access children and young people in order to ‘groom’ them for the purposes of sexual abuse; as well as to produce and distribute indecent illegal images of children. This book presents and assesses the most recent and current research on internet child abuse, addressing: its nature, the behaviour and treatment of its perpetrators, international policy, legislation and protection, and policing. It will be required reading for an international audience of academics, researchers, policy-makers and criminal justice practitioners with interests in this area.
Resumo:
In the context of globalisation and the knowledge economy, universities worldwide are undertaking profound restructuring. Following these pressures for reform, the entity of the "enterprise university" has emerged internationally. Characteristics of this new form of educational institution can be summarised as deploying corporate styles of governance and management in order to enhance economic competitiveness and academic prestige. The higher education sector in China is no different, as it has undergone extensive reforms particularly since the "socialist market economy" was introduced in 1992. Hence, this study aims to investigate the emergence of the enterprise university in a Chinese context. The research question is: How have discourses of globalisation manifested and constituted new forms of social and educational governance within China's higher education sector during the period 1992 to 2010? Following this research question, the study uses a genealogical methodology to conduct a critical analysis of reforms in Chinese higher education (1992 -2010). At a national level, China's higher education policy is examined using the analytical framework of governmentality. This discloses the underlying rationalities and technologies of Chinese political authorities as they seek to refashion higher education policy and practice. At a local level, a case study of a particular university in China is conducted in order to facilitate understanding of reform at the national level. The aim is to uncover the kinds of educational subjects and spaces that have been constituted in the university's efforts to reconfigure itself within the context of national higher education reform. The study found that the concept of the enterprise university in China has features shared by the one that has emerged internationally. However, the analysis showed that the emergence of the enterprise university in China has specific social, economic, political, and cultural environments which impact on local educational practices. The study is significant because it is one of the few examples where the framework of governmentality.a research approach or perspective employed largely to examine Western society.is applied in a Chinese context, which is a non-Western and non-liberal democratic site.
Resumo:
The Australian Accounting Research Foundation (AARF) recently issued Legislative Policy Discussion Paper No.4 which proposes a framework for financial reporting by Australian incorporated associations.This paper comments on both the merits and deficiencies of the proposal. In particular it notes that the proposal simply advocates that the application of differential reporting, accounting standards, and the conceptual framework be imposed on incorporated associations by amended statutes. It is noted that in light of long experience in the corporate sector, he espoused benefits of such a move may not eventuate. Further, concern is expressed that the proposal is a blank cheque one because of the inadequacy of existing relevant accounting standards and the proposal to introduce new relevant standards. Another major defect in the proposal is that it emanates from accountants who acknowledge in their conceptual framework, the need for external reports to report on performance through both financial and non-financial reporting methods. Despite that acknowledgment, the standard set of external reports prepared by accountants do not measure performance as defined in their own conceptual framework (SAC 2) and in their auditing pronouncements (AUP 33), and they have restricted their domain to financial reporting (SAC 2). Accordingly the proposal appears to be seriously deficient and it is suggested that it be rejected and a new proposal be prepared by a multi-party group free from vested interests.