298 resultados para Responsibility to Protect (R2P)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

NIt is now widely accepted that corporations have a responsibility to benefit society, as well as generate profit. This study used institutional theory to explore how the complex and contested notion of corporate social responsibility is understood and practiced by junior and mid-tier Australian resources companies operating in the world's most impoverished countries. The study found that CSR meaning and practice in this large but little researched group of companies was shaped by complex pressures at the global, industry, organisational and individual levels. Importantly, the study also revealed striking contradictions and ambiguities between participants' CSR aspirations and their actions and accountability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Entrepreneurial education is the process of providing individuals with the ability to recognise commercial opportunities and the insight, self-esteem, knowledge and skills to act on them. It includes instruction in opportunity recognition, commercialising a concept, marshalling resources in the face of risk, and initiating a business venture. It also includes instruction in traditional business disciplines such as management, marketing, information systems and finance. The purpose of this paper is to describe the design and introduction of a new program in Entrepreneurship at the University of Tasmania. Within this program the process and responsibility of learning has largely been reversed through the process of student centred learning. This method of learning represents a challenging departure from the traditional mainstream teaching practices. In considering the benefits achievable from this teaching method, this paper also considers the difficulties in transferring increased responsibility to students to manage their futures.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A recent controversy in the United States over drug pricing by Turing Pharmaceuticals AG has raised larger issues in respect of intellectual property, access to medicines, and the Trans-Pacific Partnership (TPP). In August 2015, Turing Pharmaceuticals AG – a private biopharmaceutical company with offices in New York, the United States, and Zug, Switzerland - acquired the exclusive marketing rights to Daraprim in the United States from Impax Laboratories Incorporated. Martin Shkreli, Turing’s Founder and Chief Executive Officer, maintained: “The acquisition of Daraprim and our toxoplasmosis research program are significant steps along Turing’s path of bringing novel medications to patients with serious disorders, some of whom often go undiagnosed and untreated.” He emphasised: “We intend to invest in the development of new drug candidates that we hope will yield an even better clinical profile, and also plan to launch an educational effort to help raise awareness and improve diagnosis for patients with toxoplasmosis.” In September 2015, there was much public controversy over the decision of Martin Shkreli to raise the price of a 62 year old drug, Daraprim, from $US13.50 to $US750 a pill. The drug is particularly useful in respect to the treatment and prevention of malaria, and in the treatment of infections in individuals with HIV/AIDS. Daraprim is listed on the World Health Organization’s (WHO) List of Essential Medicines. In the face of much criticism, Martin Shkreli has said that he will reduce the price of Daraprim. He observed: “We've agreed to lower the price on Daraprim to a point that is more affordable and is able to allow the company to make a profit, but a very small profit.” He maintained: “We think these changes will be welcomed.” However, he has been vague and ambiguous about the nature of the commitment. Notably, the lobby group, Pharmaceutical Research and Manufacturers of America (PhARMA), disassociated itself from the claims of Turing Pharmaceuticals. The group said: “PhRMA members have a long history of drug discovery and innovation that has led to increased longevity and improved lives for millions of patients.” The group noted: “Turing Pharmaceutical is not a member of PhRMA and we do not embrace either their recent actions or the conduct of their CEO.” The biotechnology peak body Biotechnology Industry Organization also sought to distance itself from Turing Pharmaceuticals. A hot topic: United States political debate about access to affordable medicines This controversy over Daraprim is unusual – given the age of drug concerned. Daraprim is not subject to patent protection. Nonetheless, there remains a monopoly in respect of the marketplace. Drug pricing is not an isolated problem. There have been many concerns about drug pricing – particularly in respect of essential medicines for HIV/AIDS, tuberculosis, and malaria. This recent controversy is part of a larger debate about access to affordable medicines. The dispute raises larger issues about healthcare, consumer rights, competition policy, and trade. The Daraprim controversy has provided impetus for law reform in the US. US Presidential Candidate Hillary Clinton commented: “Price gouging like this in this specialty drug market is outrageous.” In response to her comments, the Nasdaq Biotechnology Index fell sharply. Hillary Clinton has announced a prescription drug reform plan to protect consumers and promote innovation – while putting an end to profiteering. On her campaign site, she has emphasised that “affordable healthcare is a basic human right.” Her rival progressive candidate, Bernie Sanders, was also concerned about the price hike. He wrote a letter to Martin Shkreli, complaining about the price increase for the drug Daraprim. Sanders said: “The enormous, overnight price increase for Daraprim is just the latest in a long list of skyrocketing price increases for certain critical medications.” He has pushed for reforms to intellectual property to make medicines affordable. The TPP and intellectual property The Daraprim controversy and political debate raises further issues about the design of the TPP. The dispute highlights the dangers of extending the rights of pharmaceutical drug companies under intellectual property, investor-state dispute settlement, and drug administration. Recently, the civil society group Knowledge Ecology International published a leaked draft of the Intellectual Property Chapter of the TPP. Knowledge Ecology International Director, James Love, was concerned the text revealed that the US “continues to be the most aggressive supporter of expanded intellectual property rights for drug companies.” He was concerned that “the proposals contained in the TPP will harm consumers and in some cases block innovation.” James Love feared: “In countless ways, the Obama Administration has sought to expand and extend drug monopolies and raise drug prices.” He maintained: “The astonishing collection of proposals pandering to big drug companies make more difficult the task of ensuring access to drugs for the treatment of cancer and other diseases and conditions.” Love called for a different approach to intellectual property and trade: “Rather than focusing on more intellectual property rights for drug companies, and a death-inducing spiral of higher prices and access barriers, the trade agreement could seek new norms to expand the funding of medical research and development (R&D) as a public good, an area where the US has an admirable track record, such as the public funding of research at the National Institutes of Health (NIH) and other federal agencies.” In addition, there has been much concern about the Investment Chapter of the TPP. The investor-state dispute settlement regime would enable foreign investors to challenge government policy making, which affected their investments. In the context of healthcare, there is a worry that pharmaceutical drug companies will deploy their investor rights to challenge public health measures – such as, for instance, initiatives to curb drug pricing and profiteering. Such concerns are not merely theoretical. Eli Lilly has brought an investor action against the Canadian Government over the rejection of its drug patents under the investor-state dispute settlement regime of the North American Free Trade Agreement (NAFTA). The Health Annex to the TPP also raises worries that pharmaceutical drug companies will able to object to regulatory procedures in respect of healthcare. It is disappointing that the TPP – in the leaks that we have seen – has only limited recognition of the importance of access to essential medicines. There is a need to ensure that there are proper safeguards to provide access to essential medicines – particularly in respect of HIV/AIDs, malaria, and tuberculosis. Moreover, there must be protection against drug profiteering and price gouging in any trade agreement. There should be strong measures against the abuse of intellectual property rights. The dispute over Turing Pharmaceuticals AG and Daraprim is an important cautionary warning in respect of some of the dangers present in the secret negotiations in respect of the TPP. There is a need to preserve consumer rights, competition policy, and public health in trade negotiations over an agreement covering the Pacific Rim.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research treats the lateral impact behaviour of composite columns, which find increasing use as bridge piers and building columns. It offers (1) innovative experimental methods for testing structural columns, (2) dynamic computer simulation techniques as a viable tool in analysis and design of such columns and (3) significant new information on their performance which can be used in design. The research outcomes will enable to protect lives and properties against the risk of vehicular impacts caused either accidentally or intentionally.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The institution the police force has been established to protect citizens and their property from harm and predatory opportunism. However, there have been occasions when the very people assigned to protect become part of the predatory force against society. Predatory policing occurs when the police use their powers to extort money in the form of bribes. While, the concept is receiving attention in Europe but there have not been any direct studies in Australia. To overcome this research deficit and determine the extent, if any, of predatory policing in Australia data is interrogated from four police corruption inquiries in the Australian states of Queensland, New South Wales, Victoria and Western Australia. In addition, it examines the role of the type of networks used by corrupt police officers. The synthesis and application of public corruption and network literatures to the predatory policing domain provides new and relevant insights to assist those responsible for the administration of our institutions of justice. The paper concludes with a framework, drawn from the first stage of the project, to assist in the conceptualisation and monitoring of this public problem.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There are two key ways in which the Australian Uniform Consumer Credit Code seeks to protect consumers in relation to consumer credit transactions. The first is by means of disclosure regulation where information is required to be disclosed to the consumer before the credit contract is entered into and the second is by way of “safety net” provisions, where contracts can be varied or set aside in the event of hardship, a finding that the transaction was unjust, or a finding of unconscionable fees or charges. This article explores the limitations of both of these means of protection, particularly in the case of vulnerable, low-income consumers. In order to highlight the inadequacies of these forms of consumer protection and the need for regulatory reform, we draw on interviews conducted with 30 low-income consumers who had recently signed a credit contract, focusing on their understanding of information disclosed in the contract, as well as their responses to hypothetical unfair terms and their understanding of their rights, for example in the event of an unjust transaction. These interviews were conducted as part of a joint research project between Brotherhood of St Laurence and Griffith University’s Centre for Credit and Consumer Law, funded by Consumer Affairs Victoria.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ethics of creating ‘saviour siblings’ for the benefit of another has received much attention, but little consideration has been given to the legal position of those saviours born who may be asked to provide tissue for transplantation to another during childhood. This article examines the ethical issues surrounding minor donation as well as the existing legal framework in the UK and Australia that regulates minors providing tissue for the benefit of another. Against this background the position of minor saviours, who are called upon to donate bone marrow or peripheral blood stem cells, is examined. This analysis suggests that the law does not provide sufficient protection for minor saviours who are called upon to donate to another. It is argued that specific ethical obligations are owed to saviours—that ought to be reflected in the law—in order to protect them from exploitation while they remain minors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Isolation of a faulted segment, from either side of a fault, in a radial feeder that has several converter interfaced DGs is a challenging task when current sensing protective devices are employed. The protective device, even if it senses a downstream fault, may not operate if fault current level is low due to the current limiting operation of converters. In this paper, a new inverse type relay is introduced based on line admittance measurement to protect a distribution network, which has several converter interfaced DGs. The basic operation of this relay, its grading and reach settings are explained. Moreover a method is proposed to compensate the fault resistance such that the relay operation under this condition is reliable. Then designed relay performances are evaluated in a radial distribution network. The results are validated through PSCAD/EMTDC simulation and MATLAB calculations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The validation of Computed Tomography (CT) based 3D models takes an integral part in studies involving 3D models of bones. This is of particular importance when such models are used for Finite Element studies. The validation of 3D models typically involves the generation of a reference model representing the bones outer surface. Several different devices have been utilised for digitising a bone’s outer surface such as mechanical 3D digitising arms, mechanical 3D contact scanners, electro-magnetic tracking devices and 3D laser scanners. However, none of these devices is capable of digitising a bone’s internal surfaces, such as the medullary canal of a long bone. Therefore, this study investigated the use of a 3D contact scanner, in conjunction with a microCT scanner, for generating a reference standard for validating the internal and external surfaces of a CT based 3D model of an ovine femur. One fresh ovine limb was scanned using a clinical CT scanner (Phillips, Brilliance 64) with a pixel size of 0.4 mm2 and slice spacing of 0.5 mm. Then the limb was dissected to obtain the soft tissue free bone while care was taken to protect the bone’s surface. A desktop mechanical 3D contact scanner (Roland DG Corporation, MDX 20, Japan) was used to digitise the surface of the denuded bone. The scanner was used with the resolution of 0.3 × 0.3 × 0.025 mm. The digitised surfaces were reconstructed into a 3D model using reverse engineering techniques in Rapidform (Inus Technology, Korea). After digitisation, the distal and proximal parts of the bone were removed such that the shaft could be scanned with a microCT (µCT40, Scanco Medical, Switzerland) scanner. The shaft, with the bone marrow removed, was immersed in water and scanned with a voxel size of 0.03 mm3. The bone contours were extracted from the image data utilising the Canny edge filter in Matlab (The Mathswork).. The extracted bone contours were reconstructed into 3D models using Amira 5.1 (Visage Imaging, Germany). The 3D models of the bone’s outer surface reconstructed from CT and microCT data were compared against the 3D model generated using the contact scanner. The 3D model of the inner canal reconstructed from the microCT data was compared against the 3D models reconstructed from the clinical CT scanner data. The disparity between the surface geometries of two models was calculated in Rapidform and recorded as average distance with standard deviation. The comparison of the 3D model of the whole bone generated from the clinical CT data with the reference model generated a mean error of 0.19±0.16 mm while the shaft was more accurate(0.08±0.06 mm) than the proximal (0.26±0.18 mm) and distal (0.22±0.16 mm) parts. The comparison between the outer 3D model generated from the microCT data and the contact scanner model generated a mean error of 0.10±0.03 mm indicating that the microCT generated models are sufficiently accurate for validation of 3D models generated from other methods. The comparison of the inner models generated from microCT data with that of clinical CT data generated an error of 0.09±0.07 mm Utilising a mechanical contact scanner in conjunction with a microCT scanner enabled to validate the outer surface of a CT based 3D model of an ovine femur as well as the surface of the model’s medullary canal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper improves implementation techniques of Elliptic Curve Cryptography. We introduce new formulae and algorithms for the group law on Jacobi quartic, Jacobi intersection, Edwards, and Hessian curves. The proposed formulae and algorithms can save time in suitable point representations. To support our claims, a cost comparison is made with classic scalar multiplication algorithms using previous and current operation counts. Most notably, the best speeds are obtained from Jacobi quartic curves which provide the fastest timings for most scalar multiplication strategies benefiting from the proposed 12M + 5S + 1D point doubling and 7M + 3S + 1D point addition algorithms. Furthermore, the new addition algorithm provides an efficient way to protect against side channel attacks which are based on simple power analysis (SPA). Keywords: Efficient elliptic curve arithmetic,unified addition, side channel attack.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Evidence-based Practice (EBP) has recently emerged as a topic of discussion amongst professionals within the library and information services (LIS) industry. Simply stated, EBP is the process of using formal research skills and methods to assist in decision making and establishing best practice. The emerging interest in EBP within the library context serves to remind the library profession that research skills and methods can help ensure that the library industry remains current and relevant in changing times. The LIS sector faces ongoing challenges in terms of the expectation that financial and human resources will be managed efficiently, particularly if library budgets are reduced and accountability to the principal stakeholders is increased. Library managers are charged with the responsibility to deliver relevant and cost effective services, in an environment characterised by rapidly changing models of information provision, information access and user behaviours. Consequently they are called upon not only to justify the services they provide, or plan to introduce, but also to measure the effectiveness of these services and to evaluate the impact on the communities they serve. The imperative for innovation in and enhancements to library practice is accompanied by the need for a strong understanding of the processes of review, measurement, assessment and evaluation. In 2001 the Centre for Information Research was commissioned by the Chartered Institute of Library and Information Professionals (CILIP) in the UK to conduct an examination into the research landscape for library and information science. The examination concluded that research is “important for the LIS [library and information science] domain in a number of ways” (McNicol & Nankivell, 2001, p.77). At the professional level, research can inform practice, assist in the future planning of the profession, raise the profile of the discipline, and indeed the reputation and standing of the library and information service itself. At the personal level, research can “broaden horizons and offer individuals development opportunities” (McNicol & Nankivell, 2001, p.77). The study recommended that “research should be promoted as a valuable professional activity for practitioners to engage in” (McNicol & Nankivell, 2001, p.82). This chapter will consider the role of EBP within the library profession. A brief review of key literature in the area is provided. The review considers issues of definition and terminology, highlights the importance of research in professional practice and outlines the research approaches that underpin EBP. The chapter concludes with a consideration of the specific application of EBP within the dynamic and evolving field of information literacy (IL).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

President’s Report Hello fellow AITPM members, A few weeks ago we saw another example of all levels of Government pulling together in real time to try to deal with a major transport incident, this time it was container loads of ammonium nitrate falling off the Pacific Adventurer during Cyclone Hamish and the associated major oil spill due to piercing of its hull off Moreton Bay in southern Queensland. The oil spill was extensive, affecting beaches and estuaries from Moreton Island north to the Sunshine Coast; a coastal stretch of at least 60km. We saw the Queensland Government, Brisbane, Moreton Bay and Sunshine Coast Regional Council crews deployed quickly once the gravity of the situation was realised to clean up toxic oil on beaches and prevent extensive upstream contamination. Environmental agencies public and private were quick to respond to help affected wildlife. The Navy’s HMAS Yarra and another minesweeper were deployed to search for the containers in the coastal area in an effort to have them salvaged before all ammonium nitrate could leach into and harm marine habitat, which would have a substantial impact not only on that environment but also the fishing industry. all of this during the final fortnight before a State election.) While this could be branded as a maritime problem, the road transport and logistics system was crucial to the cleanup. The private vehicular ferries were enlisted to transport plant and equipment from Brisbane to Moreton Island. The plant themselves, such as graders, were drawn from road building and maintenance inventory. Hundreds of Councils’ staff were released from other activities to undertake the cleanup. While it will take some time for us to know the long term impacts of this incident, it seems difficult to fault “grassroots” government crews and their private counterparts, such as Island tourism staff, in the initial cleanup effort. From a traffic planning and management perspective, we should also remember that this sort of incident has happened on road and rail corridors in the past, albeit on lesser scales. It underlines that we do need to continue to protect communities, commercial interests, and the environment through rigorous heavy vehicle management, planning and management of dangerous goods routesincluding rail corridors through urban areas), and carefully considered incident and disaster recovery plans and protocols. I’d like to close in reminding everyone again that AITPM’s flagship event, the 2009 AITPM National Conference, Traffic Beyond Tomorrow, is being held in Adelaide from 5 to 7 August. SA Branch President Paul Morris informs me that we have had over 50 paper submissions to date, from which a very balanced and informative programme of sessions has been prepared. www.aitpm.com has all of the details about how to register, sponsor a booth, session, etc. Best regards all, Jon Bunker

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes a plan to evaluate ways in which EQ Staff undertake their responsibility to implement the substantive policy, Inclusive Education Statement- 2005, Education Queensland. The Inclusive Education Statement, 2005 (Education Queensland), is a substantive policy that drove the development of the subsequent procedures, CRP-PR-009: Inclusive Education. These procedures state that “All Education Queensland (EQ) staff have responsibilities ........to implement the Inclusive Education Statement 2005”.