127 resultados para Constitutional guarantees
Resumo:
In a victory for corporate control of cultural heritage, the Supreme Court of the United States has rejected a constitutional challenge to the Sonny Bono Copyright Term Extension Act 1998 (U.S.) by a majority of seven to two. This paper evaluates the litigation in terms of policy debate in a number of discourses — history, intellectual property law, constitutional law and freedom of speech, cultural heritage, economics and competition policy, and international trade. It argues that the extension of the copyright term will inhibit the dissemination of cultural works through the use of new technologies — such as Eric Eldred's Eldritch Press and Project Gutenberg. It concludes that there is a need to resist the attempts of copyright owners to establish the Sonny Bono Copyright Term Extension Act 1998 (U.S.) as an international model for other jurisdictions — such as Australia.
Resumo:
Objective This paper presents an automatic active learning-based system for the extraction of medical concepts from clinical free-text reports. Specifically, (1) the contribution of active learning in reducing the annotation effort, and (2) the robustness of incremental active learning framework across different selection criteria and datasets is determined. Materials and methods The comparative performance of an active learning framework and a fully supervised approach were investigated to study how active learning reduces the annotation effort while achieving the same effectiveness as a supervised approach. Conditional Random Fields as the supervised method, and least confidence and information density as two selection criteria for active learning framework were used. The effect of incremental learning vs. standard learning on the robustness of the models within the active learning framework with different selection criteria was also investigated. Two clinical datasets were used for evaluation: the i2b2/VA 2010 NLP challenge and the ShARe/CLEF 2013 eHealth Evaluation Lab. Results The annotation effort saved by active learning to achieve the same effectiveness as supervised learning is up to 77%, 57%, and 46% of the total number of sequences, tokens, and concepts, respectively. Compared to the Random sampling baseline, the saving is at least doubled. Discussion Incremental active learning guarantees robustness across all selection criteria and datasets. The reduction of annotation effort is always above random sampling and longest sequence baselines. Conclusion Incremental active learning is a promising approach for building effective and robust medical concept extraction models, while significantly reducing the burden of manual annotation.
Resumo:
This article considers the ongoing debate over the appropriation of well-known and famous trade marks by the No Logo Movement for the purposes of political and social critique. It focuses upon one sensational piece of litigation in South Africa, Laugh It Off Promotions v. South African Breweries International (Finance) B.V. t/a Sabmark International. In this case, a group called Laugh It Off Promotions subjected the trade marks of the manufacturers of Carling Beer were subjected to parody, social satire, and culture jamming. The beer slogan “Black Label” was turned into a T-Shirt entitled “Black Labour/ White Guilt”. In the ensuing litigation, the High Court of South Africa and the Supreme Court of Appeal were of the opinion that the appropriation of the mark was a case of hate speech. However, the Constitutional Court of South Africa disagreed, finding that the parodies of a well-known, famous trade mark did not constitute trade mark dilution. Moseneke J observed that there was a lack of evidence of economic or material harm; and Sachs J held that there is a need to provide latitude for parody, laughter, and freedom of expression. The decision of the Constitutional Court of South Africa provides some important insights into the nature of trade mark dilution, the role of parody and satire, and the relevance of constitutional protections of freedom of speech and freedom of expression. Arguably, the ruling will be of help in the reformation of trade mark dilution law in other jurisdictions – such as the United States. The decision in Laugh It Off Promotions v. South African Breweries International demonstrates that trade mark law should not be immune from careful constitutional scrutiny.
Resumo:
In a victory for corporate control of cultural heritage, the Supreme Court of the United States has rejected a constitutional challenge to the Sonny Bono Copyright Term Extension Act 1998 (US) by a majority of seven to two.
Resumo:
The High Court of Australia’s ruling on the plain packaging of tobacco products is one of the great constitutional cases of our age. The ruling will resonate throughout the world - as other countries will undoubtedly seek to emulate Australia’s plain packaging regime.
Resumo:
The passion to eradicate alterity from the earth is also the passion for the home, the country, the dwelling, that authorizes this desire and rewards it. In its nationalism, parochialism and racism it constitutes a public and private neurosis. So, unwinding the rigid understanding of place that apparently permits me to speak, that guarantees my voice, my power, is not simply to disperse my locality within the wider coordinates of an ultimate planetary context. That would merely absolve me of responsibility in the name of an abstract and generic globalism, permitting my inheritance to continue uninterrupted in the vagaries of a new configuration. There is something altogether more precise and more urgent involved. For in the horror of the unhomely pulses the dread for the dispersal of Western humankind: the dread of a rationality confronted with what exceeds and slips its grasp. (Chambers, 2001, p. 196)
Resumo:
The growth of the Australian eastern king prawn (Melicertus plebejus) is understood in greater detail by quantifying the latitudinal effect. The latitudinal effect is the change in the species' growth rate during migration. Mark-recapture data (N = 1635, latitude 22.21 degrees S-34.00 degrees S) presents northerly movement of the eastern king prawn, with New South Wales prawns showing substantial average movement of 140 km (standard deviation: 176 km) north. A generalized von Bertalanffy growth model framework is used to incorporate the latitudinal effect together with the canonical seasonal effect. Applying this method to eastern king prawn mark-recapture data guarantees consistent estimates for the latitudinal and seasonal effects. For M. plebejus, it was found that growth rate peaks on 25 and 29 January for males and females, respectively; is at a minimum on 27 and 31 July, respectively; and that the shape parameter, k (per year), changes by -0.0236 and -0.0556 every 1 degree of latitude south increase for males and females, respectively.
Resumo:
Background It is often believed that by ensuring the ongoing completion of competency documents and life-long learning in nursing practice guarantees quality patient care. This is probably true in most cases where it provides reassurances that the nursing team is maintaining a safe “generalised” level of practice. However, competency does not always promise quality performance. There are a number of studies that have reported differences in what practitioners know and what they actually do despite being deemed competent. Aim The aim of this study was to assess whether our current competency documentation is fit for purpose and to ascertain whether performance assessment needs to be a key component in determining competence. Method 15 nurses within a General ICU who had been on the unit <4 years agreed to participate in this project. Using participant observation and assessing performance against key indicators of the Benner Novice to Expert5 model the participants were supported and assessed over the course of a ‘normal’ nursing shift. Results The results were surprising both positively and negatively. First, the nurses felt more empowered in their clinical decision making skills; second, it identified individual learning needs and milestones in educational development. There were some key challenges identified which included 5 nurses over estimating their level of competence, practice was still very much focused on task acquisition and skill and surprisingly some nurses still felt dominated by the other health professionals within the unit. Conclusion We found that the capacity and capabilities of our nursing workforce needs continual ongoing support especially if we want to move our staff from capable task-doer to competent performers. Using the key novice to expert indicators identified the way forward for us in how we assess performance and competence in practice particularly where promotion to higher grades is based on existing documentation.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
This chapter provides an overview of a recent shift in regulatory strategies to address copyright infringement toward enlisting the assistance of general purpose Internet Service Providers. In Australia, the High Court held in 2012 that iiNet, a general purpose ISP, had no legal duty to police what its subscribers did with their internet connections. We provide an overview of three recent developments in Australian copyright law since that decision that demonstrate an emerging shift in the way that obligations are imposed on ISPs to govern the actions of their users without relying on secondary liability. The first is a new privately negotiated industry code that introduces a 'graduated response' system that requires ISPs to pass on warnings to subscribers who receive allegations of infringement. The second involves a recent series of Federal Court cases where rightsholders made a partially successful application to require ISPs to hand over the identifying details of subscribers whose households are alleged to have infringed copyright. The third is a new legislative scheme that will require ISPs to block access to foreign websites that 'facilitate' infringement. We argue that these shifts represent a greater sophistication in approaches to enrolling general purpose intermediaries in the regulatory project. We also suggest that these shifts represent a potentially disturbing trend towards enforcement of copyright law in a way that does not provide strong safeguards for the legitimate constitutional due process interests of users. We conclude with a call for greater attention and research to better understand how intermediaries make decisions when governing the conduct of users, how those decisions may be influenced by both state and non-state actors, and how the rights of individuals to due process can be adequately protected.
Resumo:
In this paper, the trajectory tracking control of an autonomous underwater vehicle (AUVs) in six-degrees-of-freedom (6-DOFs) is addressed. It is assumed that the system parameters are unknown and the vehicle is underactuated. An adaptive controller is proposed, based on Lyapunov׳s direct method and the back-stepping technique, which interestingly guarantees robustness against parameter uncertainties. The desired trajectory can be any sufficiently smooth bounded curve parameterized by time even if consist of straight line. In contrast with the majority of research in this field, the likelihood of actuators׳ saturation is considered and another adaptive controller is designed to overcome this problem, in which control signals are bounded using saturation functions. The nonlinear adaptive control scheme yields asymptotic convergence of the vehicle to the reference trajectory, in the presence of parametric uncertainties. The stability of the presented control laws is proved in the sense of Lyapunov theory and Barbalat׳s lemma. Efficiency of presented controller using saturation functions is verified through comparing numerical simulations of both controllers.
Resumo:
There has been much debate over recent years about whether Australian copyright law should adopt a fair use doctrine. In this chapter we argue by pointing to the historical record that the incorporation of the term 'copyrights' in the Australian Constitution embeds a notion of balance and fair use in Australian law and that this should be taken into account when interpreting the Australian Copyright Act 1968. English case law in the 18th and 19th centuries developed a principle that copyright infringement did not occur where a person had made a fair use of a work. Fair use was generally established where the defendant had made a productive use that did more than alter the original work for the purpose of evading liability, and where the defendant had made an original contribution to the resulting work. Additionally, fairness was shown by a use that did not supersede or prejudice the market for the original work. At the time of including the copyright power in the Constitution, the UK Parliament’s understanding of “copyrights” included the notion of fair use as it had been developed in U.K. precedent. In this chapter we argue that the work “copyrights” in the Australia Constitution takes its definition from copyright in 1900 and as it has evolved since. Importantly, the word “copyrights” is infused with a particular meaning that incorporates the principle of copyright balance. The constitutional notion of copyright, therefore, is not that of an unlimited power to prevent all copying. Rather, copyright distinguishes between infringing copying and non-infringing copying and grants to the copyright owner only the power to control the former. Non-infringing copying includes well-accepted limitations on the copyright owner’s rights, including the copying of ideas, the copying of public domain works and the copying of insubstantial parts of copyrighted works. In this chapter we argue that non-infringing copying also includes copying to make a fair use of a work. The sections that distinguish infringing copying from non-infringing copying in the Copyright Act 1968 are sections 36(1) and 101(1), which define infringement as the doing, without licence, of an “act comprised in the copyright”. An infringing copy is an act comprised the copyright, whereas a non-infringing copy is not. We argue that space for fair uses of copyrighted works is built into the Copyright Act 1968 through these sections, because a fair use will not produce an infringing copy and so is not an act comprised in the copyright.
Resumo:
The constitutional recognition campaign has received party-wide support and its efforts have been promoted by Prime Minister Tony Abbott as being something that would ‘complete our Constitution.’ The broader rhetoric surrounding this campaign suggests that it will result in a just, albeit delayed, recognition of indigenous peoples in the Australian legal system. However, beneath the surface of this seemingly benevolent gesture, is a reaffirmation of the colonial subordination and erasure of the several hundred original nations’ peoples and ways of being.
Resumo:
1. Under the Terms of Reference for the Committee’s Inquiry, ‘lemons’ are defined as ‘new motor vehicles with numerous, severe defects that re-occur despite multiple repair attempts or where defects have caused a new motor vehicle to be out of service for a prolonged period of time’. Consumers are currently protected in relation to lemon purchases by the Australian Consumer Law (ACL) located in Schedule 2 of the Competition and Consumer Act 2010 (Cth) (CCA). The ACL applies as a law of Queensland pursuant to the Fair Trading Act 1989 (Qld). The voluntary recall and consumer guarantees law took effect on 1 January 2011. 2. In 2006, the Government of Victoria made a commitment to introduce a lemon law into the provisions of the then Fair Trading Act 1999 (Vic). The public consultation process on the proposal to introduce a lemon law for motor vehicle purchases in Victoria was conducted by Ms Janice Munt MP, with the assistance of Consumer Affairs Victoria (CAV). CAV released an Issues Paper to canvas with industry and the community options for the development and introduction of a motor vehicle lemon law.(Consumer Affairs Victoria, Introducing Victorian motor vehicle lemon laws, Issues Paper, (September, 2007). 3. A CAV report prepared by Janice Munt MP was released in July, 2008 (Consumer Affairs Victoria, Motor Cars: A report on the motor vehicle lemon law consultations (July 2008) (Victorian Lemon Law Report). However, the Victorian proposal was overtaken by events leading to the adoption of a uniform consumer protection law in all Australian jurisdictions, the ACL. 4. The structure of this submission is to consider first the three different bases upon which consumers can obtain relief for economic loss arising from defects in motor vehicles. The second part of the submission considers the difficulties encountered by consumers in litigating motor vehicle disputes in the courts and tribunals. The third part of the submission examines the approach taken in other jurisdictions to resolving motor vehicle disputes. The final part of the submission considers a number of possible reforms that could be made to the existing law and its enforcement to reduce consumer detriment arising from the purchase of ‘lemon’ motor vehicles. 5. There are three principal bases upon which a consumer can obtain redress for defects in new motor vehicles under the ACL. The first is where the manufacturer admits liability and initiates the voluntary recall procedure provided for in s 128 of the ACL. Under this basis the manufacturer generally repairs or replaces the part subject to the recall free of charge. The second basis is where the manufacturer or dealer denies liability and the consumer is initiates proceedings in the court or tribunal seeking a statutory remedy under the ACL, the nature of which will depend on whether the failure to comply with the consumer guarantee was major or not. The third basis upon which a consumer can obtain redress is pursuant to public enforcement by the ACCC. Each basis will be considered in this part. What all three bases have in common is the need to conduct an investigation to identify the nature of the defect and how it arose.
Resumo:
Video surveillance infrastructure has been widely installed in public places for security purposes. However, live video feeds are typically monitored by human staff, making the detection of important events as they occur difficult. As such, an expert system that can automatically detect events of interest in surveillance footage is highly desirable. Although a number of approaches have been proposed, they have significant limitations: supervised approaches, which can detect a specific event, ideally require a large number of samples with the event spatially and temporally localised; while unsupervised approaches, which do not require this demanding annotation, can only detect whether an event is abnormal and not specific event types. To overcome these problems, we formulate a weakly-supervised approach using Kullback-Leibler (KL) divergence to detect rare events. The proposed approach leverages the sparse nature of the target events to its advantage, and we show that this data imbalance guarantees the existence of a decision boundary to separate samples that contain the target event from those that do not. This trait, combined with the coarse annotation used by weakly supervised learning (that only indicates approximately when an event occurs), greatly reduces the annotation burden while retaining the ability to detect specific events. Furthermore, the proposed classifier requires only a decision threshold, simplifying its use compared to other weakly supervised approaches. We show that the proposed approach outperforms state-of-the-art methods on a popular real-world traffic surveillance dataset, while preserving real time performance.