137 resultados para breach of trust
Resumo:
Interest in the area of collaborative Unmanned Aerial Vehicles (UAVs) in a Multi-Agent System is growing to compliment the strengths and weaknesses of the human-machine relationship. To achieve effective management of multiple heterogeneous UAVs, the status model of the agents must be communicated to each other. This paper presents the effects on operator Cognitive Workload (CW), Situation Awareness (SA), trust and performance by increasing the autonomy capability transparency through text-based communication of the UAVs to the human agents. The results revealed a reduction in CW, increase in SA, increase in the Competence, Predictability and Reliability dimensions of trust, and the operator performance.
Resumo:
Under the civil liability legislation enacted in most Australian jurisdictions, factual causation will be established if, on the balance of probabilities, the claimant can prove that the defendant's negligence was 'a necessary condition of the occurrence of the [claimant's] harm'. Causation will then be satisfied by showing that the harm would not have occurred 'but for' the defendant's breach of their duty of care. However, in an exceptional or appropriate case, sub-section 2 of the legislation provides that if the 'but for' test is not met, factual causation may instead be determined in accordance with other 'established principles'. In such a case, 'the court is to consider (amongst other relevant things) whether or not and why responsibility for the harm should be imposed' on the negligent party.
Resumo:
Remedying the mischief of phoenix activity is of practical importance. The benefits include continued confidence in our economy, law that inspires best practice among directors, and law that is articulated in a manner such that penalties act as a sufficient deterrent and the regulatory system is able to detect offenders and bring them to account. Any further reforms must accommodate and tolerate legal phoenix activity. Phoenix activity pushes tolerance of entrepreneurial activity to its absolute limits. The wisest approach would be to front end the reforms so as to alleviate the considerable detection and enforcement burden upon regulatory bodies. There is little doubt that breach of the existing law is difficult and expensive to detect; and this is a significant burden when regulators have shrinking budgets and are rapidly losing feet on the ground. This front end approach may need to include restrictions on access to limited liability. The more limited liability is misused, the stronger the argument to limit access to limited liability. This paper proposes that such an approach is a legitimate next step for a robust and mature capitalist economy.
Resumo:
The Insurance Contracts Act 1984 (Cth) since inception has effected major reform to the law in this field. One of Australia’s most frequently cited pieces of legislation, it has had a major impact upon the law and practice of insurance. Given the importance of insurance to domestic and commercial activity and its pivotal position as a mechanism to manage exposure to risk, it is not surprising that this legislation has been the subject of extensive analysis in the courts and in legal literature. Furthermore the Act has, arising out of a 2009 review, been significantly amended by the Insurance Contracts Amendment Act 2013 (Cth). The principal amendments introduced are: two-fold: the Insurance Contracts Act 1984 (Cth) has been amended so that a failure to comply with the duty of good faith is now a breach of the Act; and disclosure and misrepresentation provisions under the Insurance Contracts Act 1984 (Cth) are amended and clarified.
Resumo:
The partnership form of privatisation is increasingly being used, in particular to carry out complex and evolving bundles of services. These have not previously been privatised because of incomplete contracts and contract management difficulties. Improved performance of the government entity as contract administrator and member of the partnership is crucial to modern service delivery expectations yet the privatisation literature has focused on other aspects of partnerships leaving the understanding of factors impacting the effectiveness of the government entity underdeveloped. This paper proposes the development of knowledge as to the range of factors which impact the effectiveness of the government entity. There is limited data available as to the operation of trust in the partnership relationship, and as to the capability of a range of privatisation forms to achieve stewardship of infrastructure. This research will utilise the findings from that research to build a tentative framework which will be utilised in staged research interrogating first the privatization literature and then the literature of other disciplines and sectors. The combined data will be analysed to provide government and practitioners such as government entity CEO’s with a complete listing of the operation of the factors which impact the effectiveness of the government entity in contributing to improved service delivery.
Resumo:
This paper identifies a number of critical infrastructure applications that are reliant on location services from cooperative location technologies such as GPS and GSM. We show that these location technologies can be represented in a general location model, such that the model components can be used for vulnerability analysis. We perform a vulnerability analysis on these components of GSM and GPS location systems as well as a number of augmentations to these systems.
Resumo:
Troubled dynamics between residents of an Aboriginal town in Queensland and the local health system were established during colonisation and consolidated during those periods of Australian history where the policies of 'protection' (segregation), integration and then assimilation held sway. The status of Aboriginal health is, in part, related to interactions between the residents' current and historical experiences of the health and criminal justice systems as together these agencies used medical and moral policing to legitimate dispossession, marginalisation, institutionalisation and control of the residents. The punitive regulations and ethnocentric strategies used by these institutions are within the living memory of many of the residents or in the published accounts of preceding generations. This paper explores current residents' memories and experiences.
Resumo:
Using artificial neural networks (ANN) and ordinal regression (OR) as alternative methods to predict LPT bond ratings, we examine the role that various financial and industry variables have on Listed Property Trust (LPT) bond ratings issued by Standard and Poor’s from 1999-2006. Our study shows that both OR and ANN provide robust alternatives to rating LPT bonds and that there are no significant differences in results between the two full models. OR results show that of the financial variables used in our models, debt coverage and financial leverage ratios have the most profound effect on LPT bond ratings. Further, ANN results show that 73.0% of LPT bond rating is attributable to financial variables and 23.0% to industry-based variables with office LPT sector accounting for 2.6%, retail LPT 10.9% and stapled management structure 13.5%.
Resumo:
The paper describes a number of requirements for enhancing the trust of location acquisition from Satellite Navigation Systems, particularly for those applications where the location is monitored through a remote GNSS receiver. We discuss how the trust of a location acquisition could be propagated to an application through the use of a proposed tamper-resistant GNSS receiver which quantifies the trust of a location solution from the signaling used (ie. P(Y) code, Galileo SOL, PRS, CS) and provides a cryptographic proof of this to a remote application. The tamper-resistance state of the receiver is also included in this cryptographic proof.
Contextualizing the tensions and weaknesses of information privacy and data breach notification laws
Resumo:
Data breach notification laws have detailed numerous failures relating to the protection of personal information that have blighted both corporate and governmental institutions. There are obvious parallels between data breach notification and information privacy law as they both involve the protection of personal information. However, a closer examination of both laws reveals conceptual differences that give rise to vertical tensions between each law and shared horizontal weaknesses within both laws. Tensions emanate from conflicting approaches to the implementation of information privacy law that results in different regimes and the implementation of different types of protections. Shared weaknesses arise from an overt focus on specified types of personal information which results in ‘one size fits all’ legal remedies. The author contends that a greater contextual approach which promotes the importance of social context is required and highlights the effect that contextualization could have on both laws.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
As online business thrives, a company’s Web presence holds enormous importance as a source of information, entertainment, and customer service for Internet users. Besides being user-friendly, a Web site should offer interesting and enjoyable content to attract online visitors in an ever-changing multimedia environment. Companies that operate globally must know how cultural differences influence the way potential customers perceive their sites. This paper presents a model that highlights the importance of ease of use, enjoyment, content, and brand trust for Web site loyalty. The model is subsequently tested in four countries: Australia, Japan, Mongolia, and the USA. The results show that perceptual differences exist: while ease of use is crucial for Web site loyalty in all four countries, the importance of content, perceived enjoyment, and brand trust varies across different cultures.
Resumo:
Disagreement within the global science community about the certainty and causes of climate change has led the general public to question what to believe and who to trust on matters related to this issue. This paper reports on qualitative research undertaken with Australian residents from two rural areas to explore their perceptions of climate change and trust in information providers. While overall, residents tended to agree that climate change is a reality, perceptions varied in terms of its causes and how best to address it. Politicians, government, and the media were described as untrustworthy sources of information about climate change, with independent scientists being the most trusted. The vested interests of information providers appeared to be a key reason for their distrust. The findings highlight the importance of improved transparency and consultation with the public when communicating information about climate change and related policies.