563 resultados para Illegal Business
em Queensland University of Technology - ePrints Archive
Resumo:
Organized crime in the twenty-first century is a knowledge war that poses an incalculable global threat to the world economy and harm to society - the economic and social costs are estimated at upwards of L20 billion a year for the UK alone (SOCA 2006/7). Organized Crime: Policing Illegal Business Entrepreneurialism offers a unique approach to the tackling of this area by exploring how it works through the conceptual framework of a business enterprise. Structured in three parts, the book progresses systematically through key areas and concepts integral to dealing effectively with the myriad contemporary forms of organised crime and provides insights on where, how and when to disrupt and dismantle a criminal business activity through current policing practices and policies. From the initial set up of a crime business through to the long term forecasting for growth and profitability, the authors dissect and analyse the different phases of the business enterprise and propose a 'Knowledge-Managed Policing' (KMP) approach to criminal entrepreneurialism. Combining conceptual and practical issues, this is a must-have reference for all police professionals, policing academics and government policy makers who are interested in a Strategy-led, Intelligence supported, Knowledge-Managed approach to policing illegal business entrepreneurialism.
Resumo:
Norms regulate the behaviour of their subjects and define what is legal and what is illegal. Norms typically describe the conditions under which they are applicable and the normative effects as a results of their applications. On the other hand, process models specify how a business operation or service is to be carried out to achieve a desired outcome. Norms can have significant impact on how business operations are conducted and they can apply to the whole or part of a business process. For example, they may impose conditions on the different aspects of a process (e.g., perform tasks in a specific sequence (control-flow), at a specific time or within a certain time frame (temporal aspect), by specific people (resources)). We propose a framework that provides the formal semantics of the normative requirements for determining whether a business process complies with a normative document (where a normative document can be understood in a very broad sense, ranging from internal policies to best practice policies, to statutory acts). We also present a classification of normal requirements based on the notion of different types of obligations and the effects of violating these obligations.
Resumo:
There is no doubt about it the practice of astroturfing is lazy, misleading and potentially illegal public relations (PR). But on social media, astroturfing is not just lazy and misleading, it can be irresponsible and damaging.
Resumo:
Our objective is to analyze the effectiveness, against the illegal disposal of waste, of a licensing system that has been introduced in a waste management policy. We theoretically find enforcement leverage in the licensing system, and then examine the theoretical result empirically. The results suggest that extending liability to disposers, which forms the basis of the enforcement leverage, deters illegal disposal more effectively than increasing penalties for illegal disposal. We also obtain evidence of transboundary movement of illegal disposal, and find how the court determines penalties for illegal disposal.
Resumo:
It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.
Resumo:
Australian households currently pay the second highest “honesty tax” in the world at $290 per household per year, levied by retailers to offset the $AU1.86 billion in losses they incur from customer theft. Theft is only one type of consumer deviance, which can include behaviours that are against the law, an organisation’s policy, or behaviours that violate normally accepted conduct. An individual’s “deviant behaviour” can vary from one person to the next. My research exploring consumer definitions of right and wrong has found a number of things can inform what an individual thinks is “deviant behaviour”, beyond what the law or organisational policy states as right or wrong. Consumers then use their own justifications to excuse their actions...
Resumo:
The adequacy and efficiency of existing legal and regulatory frameworks dealing with corporate phoenix activity have been repeatedly called into question over the past two decades through various reviews, inquiries, targeted regulatory operations and the implementation of piecemeal legislative reform. Despite these efforts, phoenix activity does not appear to have abated. While there is no law in Australia that declares ‘phoenix activity’ to be illegal, the behaviour that tends to manifest in phoenix activity can be capable of transgressing a vast array of law, including for example, corporate law, tax law, and employment law. This paper explores the notion that the persistence of phoenix activity despite the sheer extent of this law suggests that the law is not acting as powerfully as it might as a deterrent. Economic theories of entrepreneurship and innovation can to some extent explain why this is the case and also offer a sound basis for the evaluation and reconsideration of the existing law. The challenges facing key regulators are significant. Phoenix activity is not limited to particular corporate demographic: it occurs in SMEs, large companies and in corporate groups. The range of behaviour that can amount to phoenix activity is so broad, that not all phoenix activity is illegal. This paper will consider regulatory approaches to these challenges via analysis of approaches to detection and enforcement of the underlying law capturing illegal phoenix activity. Remedying the mischief of phoenix activity is of practical importance. The benefits include continued confidence in our economy, law that inspires best practice among directors, and law that is articulated in a manner such that penalties act as a sufficient deterrent and the regulatory system is able to detect offenders and bring them to account. Any further reforms must accommodate and tolerate legal phoenix activity, at least to some extent. Even then, phoenix activity pushes tolerance of repeated entrepreneurial failure to its absolute limit. The more limited liability is misused and abused, the stronger the argument to place some restrictions on access to limited liability. This paper proposes that such an approach is a legitimate next step for a robust and mature capitalist economy.
Resumo:
Developments in information technology will drive the change in records management; however, it should be the health information managers who drive the information management change. The role of health information management will be challenged to use information technology to broker a range of requests for information from a variety of users, including he alth consumers. The purposes of this paper are to conceptualise the role of health information management in the context of a technologically driven and managed health care environment, and to demonstrat e how this framework has been used to review and develop the undergraduate program in health information management at the Queensland University of Technology.
Comparison of Regime Switching, Probit and Logit Models in Dating and Forecasting US Business Cycles
Resumo:
Enterprise Application Integration (EAI) is a challenging area that is attracting growing attention from the software industry and the research community. A landscape of languages and techniques for EAI has emerged and is continuously being enriched with new proposals from different software vendors and coalitions. However, little or no effort has been dedicated to systematically evaluate and compare these languages and techniques. The work reported in this paper is a first step in this direction. It presents an in-depth analysis of a language, namely the Business Modeling Language, specifically developed for EAI. The framework used for this analysis is based on a number of workflow and communication patterns. This framework provides a basis for evaluating the advantages and drawbacks of EAI languages with respect to recurrent problems and situations.