556 resultados para Child protection approaches


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In his report into corruption in Queensland, Fitzgerald listed whistleblower protection as a necessary part of a strong governance regime. "What is required is an accessible, independent body to which disclosures can be made, confidentially (at least in the first instance) and in any event free from fear of reprisals." It was one of the reforms studied by the Electoral and Administrative Review Committee, the report of which resulted in the Whistleblowers Protection Act 1994 (WPA). The need for whistleblower protection was supported by all sides of Parliament. The Premier, Wayne Goss, in his Second Reading Speech on the Public Sector Ethics Bill , said that that Act and the WPA would form a package with the former outlining required behaviour and the WPA encouraging staff to report wrongdoing. The WPA was subsequently passed and has remained virtually unamended for over a decade. Such consistency is either an indication of skilled drafting and effectiveness or the fact that the Act has been neglected. It is the hypothesis of this paper that the latter is the case. This hypothesis will be tested by examining the sincerity and diligence with which the Act has been treated during, and following, its passage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Major South-East Asian city-regions have experienced considerable physical, economic and social transformations during the past three decades. The rapid pace of globalisation and economic restructuring has resulted in these city-regions receiving the full impact of urbanisation pressures. In an attempt to ease these pressures, city-regions such as Bangkok, Seoul, Tokyo, Taipei, Hong Kong, Singapore and Kuala Lumpur have advocate growth management approaches giving particular interest to urban sustainability. These approaches promote efforts to achieve the triple bottom line sustainability by balancing economic and social development, and environmental protection, and putting more emphasis on compact and optimum development of urban forms. This paper evaluates the case of two South-East Asian city-regions, Kuala Lumpur and Hong Kong, and assesses their experiences in managing their urban forms whilst promoting sustainable patterns of urban development. The findings show that sustainable urban development initiatives employing a top down approach has yielded encouraging results in these case study city-regions. However the need for a more concerted effort towards the overall sustainability agenda still remains vital.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Script for non-verbal performance. Research Component: Silent Treatment: Creating Non-verbal Performance Works for Children The research field of theatre for young people draws on theories of child development and popular culture. SHOW explored personal and social development, friendship and creative play through the lens of the experience of girls aged 8-12. This project consolidated and refined innovative approaches to creating non-verbal theatre performance, and addressed challenges inherent in the creation of a performance by adults for young audiences. A significant finding of the project was the unanticipated convergence of creative practice and research into child behaviour and development: the congruence of content (Female bullying) and theatrical form (non-verbal performance: “Within the hidden culture of aggression, girls fight with body language and relationships instead of fists and knives. In this world, friendship is a weapon, and the sting of a shout pales in comparison to a day of someone’s silence. There is no gesture more devastating than the back turning away Simmons, Rachel (2002:3) Odd Girl Out: The Hidden Culture Of Aggression In Girls Schwartz Books The creative development and drafting process focussed on negotiating the conceptual design and practical constraints of incorporating diegetic music and video sources into the narrative. The authorial (and production) challenges of creating a script that could facilitate the re-mount a non-verbal work for a company specialising in text-based theatre . Show was commissioned by the Queensland Theatre Company in 2003, toured into Queensland Schools by the Queensland Arts Council and in 2004 was performed at the Sydney Opera House.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, the transport simulation of large road networks has become far more rapid and detailed, and many exciting developments in this field have emerged. In this perspective, the authors describe the simulation of automobile, pedestrian and rail traffic, coupled to new applications, such as the embedding of traffic simulation into driving simulators, to give a more realistic environment of driver behavior surrounding the subject vehicle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explains the relevance of the Code and its place in the regulatory framework, discusses some of the key issues arising in the recent review (as identified by consumer advocates1), and explains the relationship between the Code and the Financial Ombudsman Service.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous research has demonstrated the importance of the qualities of the teacher-child relationship on children’s development. Close teacher-child relationships are especially important for children at risk. Positive relationships have been shown to have beneficial effects on children’s social and academic development (Birch & Ladd, 1997; Pianta & Stuhlman, 2004). Children with language difficulties are likely to face increased risks with regard to long term social and academic outcomes. The purpose of the current research was to gain greater understanding of the qualities of teacher-child relationships for young children with parent reported language concerns. The research analyses completed for this thesis involved the use of data from the public-access database of Growing Up in Australia: The Longitudinal Study of Australian Children (LSAC). LSAC is a longitudinal study involving a nationally representative sample of 10,000 Australian children. Data are being collected biennially from 2004 (Wave 1 data collection) until 2010 (Wave 4 data collection). LSAC has a cross-sequential research design involving two cohorts, an infant cohort (0-1 year at age of recruitment) and a kindergarten cohort (4-5 years at age of recruitment). Two studies are reported in this thesis using data for the LSAC Kindergarten Cohort which had 4983 child participants at recruitment. Study 1 used Wave 1 data to identify the differences between teacher-child relationship qualities for children with parent reported language concerns and their peers. Children identified by parents for whom concerns were held about their receptive and expressive language, as measured by items from the Parents’ Evaluation of Developmental Status (PEDS) (Glascoe, 2000) were the target (at risk) group in the study (n = 210). A matched case control group of peers (n = 210), matched on the child characteristics of sex, age, cultural and linguistic differences (CALD), and socio-economic positioning (SEP), were the comparison group for this analysis. Teacher-child relationship quality was measured by teacher reports on the Closeness and Conflict scales from the short version of the Student-Teacher Relationship Scale (STRS) (Pianta, 2001). There were statistically significant differences in the levels of closeness and conflict between the two groups. The target group had relationships with their teachers that had lower levels of closeness and higher levels of conflict than the control group. Study 2 reports analyses that examined the stability of the qualities of the teacher-child relationships at Wave 1 (4-5 years) and the qualities of the teacher-child relationships at Wave 2 (6-7 years). This time frame crosses the period of the children’s transition to school. The study examined whether early patterns in the qualities of the teacher-child relationship for children with parent reported language concerns at Wave 1 predicted the qualities of the teacher-child relationship outcomes in the early years of formal school. The sample for this study consisted of the group of children identified with PEDS language concerns at Wave 1 who also had teacher report data at Wave 2 (n = 145). Teacher-child relationship quality at Wave 1 and Wave 2 was again measured by the STRS scales of Closeness and Conflict. Results from multiple regression models indicated that teacher-child relationship quality at Wave 1 significantly contributed to the prediction of the quality of the teacher-child relationship at Wave 2, beyond other predictor variables included in the regression models. Specifically, Wave 1 STRS Closeness scores were the most significant predictor for STRS Closeness scores at Wave 2, while Wave 1 STRS Conflict scores were the only significant predictor for Wave 2 STRS Conflict outcomes. These results indicate that the qualities of the teacher-child relationship experienced prior to school by children with parent reported language concerns remained stable across transitions into formal schooling at which time the child had a different teacher. The results of these studies provide valuable insight into the nature of teacher-child relationship quality for young children with parent reported language concerns. These children experienced teacher-child relationships of a lower quality when compared with peers and, additionally, the qualities of these relationships prior to formal schooling were predictive of the qualities of the relationships in the early years of formal schooling. This raises concerns, given the increased risks of poorer social and academic outcomes already faced by children with language difficulties, that these early teacher-child relationships have an impact on future teacher-child relationships. Results of these studies are discussed with these considerations in mind and also discussed in terms of the implications for educational theory, policy and practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.