39 resultados para Fourth Amendment violations remedy

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Contemporary debates on the role of journalism in society are continuing the tradition of downplaying the role of proactive journalism - generally situated under the catchphrase of the Fourth Estate - in public policy making. This paper puts the case for the retention of a notion of a proactive form of journalism which can be broadly described as "investigative ", because it is important to the public policy process in modern democracies. It argues that critiques that downplay the potential of this form of journalism are flawed and overly deterministic. Finally. it seeks to illustrate how journalists can proactively inquire in ways that are relevant to the lives ofpeople in a range of settings, and that question elite sources in the interests ofthose people.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study sought to establish and develop innovative instructional procedures, in which scaffolding can be expanded and applied, in order to enhance learning of English as a Foreign Language (EFL) writing skills in an effective hybrid learning community (a combination of face-to-face and online modes of learning) at the university where the researcher is working. Many educational experts still believe that technology has not been harnessed to its potential to meet the new online characteristics and trends. There is also an urgency to reconsider the pedagogical perspectives involved in the utilisation of online learning systems in general and the social interactions within online courses in particular that have been neglected to date. An action research design, conducted in two cycles within a duration of four months, was utilised throughout this study. It was intended not only to achieve a paradigm shift from transmission-absorption to socio-constructivist teaching/learning methodologies but also to inform practice in these technology-rich environments. Five major findings emerged from the study. First, the scaffolding theory has been extended. Two new scaffolding types (i.e., quasi-transcendental scaffolding and transcendental scafolding), two scaffolding aspects (i.e., receptive and productive) and some scaffolding actions (e.g., providing a stimulus, awareness, reminder, or remedy) for EFL writing skills in an effective hybrid learning community have been identified and elaborated on. Second, the EFL ‘Effective Writing’ students used the scaffolds implemented in a hybrid environment to enhance and enrich their learning of writing of English essays. The online activities, conducted after the F2F sessions most of the time, gave students greater opportunities to both reinforce and expand the knowledge they had acquired in the F2F mode. Third, a variety of teaching techniques, different online tasks and discussion topics utilised in the two modes bolstered the students’ interests and engagement in their knowledge construction of how to compose English-language essays. Fourth, through the scaffolded activities, the students learned how to scaffold themselves and thus became independent learners in their future endeavours of constructing knowledge. Fifth, the scaffolding-to-scaffold activities provided the students with knowledge on how to effectively engage in transcendental scaffolding actions and facilitate the learning of English writing skills by less able peers within the learning community. Thus, the findings of this current study extended earlier understandings of scaffolding in an EFL hybrid learning environment and will contribute to the advancement of future ICT-mediated courses in terms of their scaffolding pedagogical aspects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Media articles have promoted the view that cyclists are risktakers who disregard traffic regulations, but little is known about the contribution of cyclist risk-taking behaviours to crashes. This study examines the role of traffic violations in the 6774 police-reported bicycle crashes in Queensland between January 2000 and December 2008. Of the 6328 crashes involving bicycles and motor vehicles, cyclists were deemed to be at fault in 44.4% of the incidents. When motorists were determined to be at-fault, ‘failure to yield’ violations accounted for three of the four most reported contributing factors. In crashes where the cyclist was at fault, attention and inexperience were the most frequent contributing factors. There were 67 collisions between bicycles and pedestrians, with the cyclist at fault in 65.7%. During the data period, 302 single-bicycle crashes were reported. The most frequent contributing factors were avoidance actions to miss another road user and inattention or negligence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A short discussion concerning the improvement of the media.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We assessed the effect of biochar incorporation into the soil on the soil-atmosphere exchange of the greenhouse gases (GHG) from an intensive subtropical pasture. For this, we measured N2O, CH4 and CO2 emissions with high temporal resolution from April to June 2009 in an existing factorial experiment where cattle feedlot biochar had been applied at 10 t ha-1 in November 2006. Over the whole measurement period, significant emissions of N2O and CO2 were observed, whereas a net uptake of CH4 was measured. N2O emissions were found to be highly episodic with one major emission pulse (up to 502 µg N2O-N m-2 h 1) following heavy rainfall. There was no significant difference in the net flux of GHGs from the biochar amended vs. the control plots. Our results demonstrate that intensively managed subtropical pastures on ferrosols in northern New South Wales of Australia can be a significant source of GHG. Our hypothesis that the application of biochar would lead to a reduction in emissions of GHG from soils was not supported in this field assessment. Additional studies with longer observation periods are needed to clarify the long term effect of biochar amendment on soil microbial processes and the emission of GHGs under field conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

On 17 March 2010, the Civil Liability and Other Legislation Amendment Act 2010 (Qld) was assented to.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article recognises the potential importance of Islamic finance products in Australia, along with the current regulatory impediments preventing Australia from becoming a leader in the Asia-Pacific Islamic finance market. Taking into account the potential importance of, and impediments to, Islamic finance, this article highlights, through the historical development and contemporary state of Islamic finance, its economic, social and political benefits to Australia. Once a case for embracing Islamic finance is made, the main current regulatory impediments to Australia becoming a key player in the Islamic finance market within the Asia-Pacific region are highlighted. This article then argues that, rather than requiring any separate regulatory regime, the current regulatory impediments may be overcome through amendments to existing laws to ensure parity of treatment in Australia between the Islamic finance market and the conventional finance market. The Australian income tax regime is utilised as a case study demonstrate how parity of treatment could be achieved via amendment by taking two frequent and separate Islamic finance transactions. This article concludes that the economic, social and political benefits potentially warrant Australia embracing Islamic finance and that, with the right regulatory measures, Australia could lay the foundation to become a leader in the Asia-Pacific Islamic finance market.