290 resultados para Standard-setting
em Queensland University of Technology - ePrints Archive
Resumo:
This paper examines the role of powerful entities and coalitions in shaping international accounting standards. Specifically, the focus is on the process by which the International Accounting Standards Board (IASB) developed IFRS 6, Exploration for and Evaluation of Mineral Resources. In its Issues Paper, the IASB recommended that the successful efforts method be mandated for pre-production costs, eliminating the choice previously available between full cost and successful efforts methods. In spite of the endorsement of this view by a majority of the constituents who responded to the Issues Paper, the final outcome changed nothing, with choice being retained. A compelling explanation of this disparity between the visible inputs and outputs of the standard setting process is the existence of a “black box”, in which powerful extractive industries entities and coalitions covertly influenced the IASB to secure their own ends and ensure that the status quo was maintained
Resumo:
Occupational standards concerning the allowable concentrations of chemical compounds in the ambient air of workplaces have been established in several countries at national levels. With the integration of the European Union, a need exists for establishing harmonized Occupational Exposure Limits. For analytical developments, it is apparent that methods for speciation or fractionation of carcinogenic metal compounds will be of increasing practical importance for standard setting. Criteria of applicability under field conditions, cost-effectiveness, and robustness are practical driving forces for new developments. When the European Union issued a list of 62 chemical substances with Occupational Exposure Limits in 2000, 25 substances received a 'skin' notation. The latter indicates that toxicologically significant amounts may be taken up via the skin. Similar notations exist on national levels. For such substances, monitoring concentrations in ambient air will not be sufficient; biological monitoring strategies will gain further importance in the medical surveillance of workers who are exposed to such compounds. Proceedings in establishing legal frameworks for a biological monitoring of chemical exposures within Europe are paralleled by scientific advances in this field. A new aspect is the possibility of a differential adduct monitoring, using blood proteins of different half-life or lifespan. This technique allows differentiation between long-term mean exposure to reactive chemicals and short-term episodes, for example, by accidental overexposure. For further analytical developments, the following issues have been addressed as being particularly important: New dose monitoring strategies, sensitive and reliable methods for detection of DNA adducts, cytogenetic parameters in biological monitoring, methods to monitor exposure to sensitizing chemicals, and parameters for individual susceptibilities to chemical toxicants.
Resumo:
This article examines the problem of patent ambush in standard setting, where patent owners are sometimes able to capture industry standards in order to secure monopoly power and windfall profits. Because standardisation generally introduces high switching costs, patent ambush can impose significant costs on downstream manufacturers and consumers and drastically reduce the efficiency gains of standardisation.This article considers how Australian competition law is likely to apply to patent ambush both in the development of a standard (through misrepresenting the existence of an essential patent) and after a standard is implemented (through refusing to license an essential patented technology either at all or on reasonable and non-discriminatory (RAND) terms). This article suggests that non-disclosure of patent interests is unlikely to restrained by Part IV of the Trade Practices Act (TPA), and refusals to license are only likely to be restrained if the refusal involves leveraging or exclusive dealing. By contrast, Standard Setting Organisations (SSOs) which seek to limit this behaviour through private ordering may face considerable scrutiny under the new cartel provisions of the TPA. This article concludes that SSOs may be best advised to implement administrative measures to prevent patent hold-up, such as reviewing which patents are essential for the implementation of a standard, asking patent holders to make their licence conditions public to promote transparency, and establishing forums where patent licensees can complain about licence terms that they consider to be unreasonable or discriminatory. Additionally, the ACCC may play a role in authorising SSO policies that could otherwise breach the new cartel provisions, but which have the practical effect of promoting competition in the standards setting environment.
Resumo:
This paper examines charity regulatory systems, including accounting standard setting, across five jurisdictions in varying stages of adoption of International Financial Reporting Standards, and identifies the challenges of this process. Design/methodology/approach Using a regulatory space approach, we rely on publicly available archival evidence from charity regulators and accounting standard setters in five common-law jurisdictions in advanced capitalist economies, all with vibrant charity sectors: United Kingdom, United States of America, Canada, Australia and New Zealand. Findings The study reveals the importance of co-operative interdependence and dialogue between charity regulators and accounting standard setters, indicating that jurisdictions with such inter-relationships will better manage the transition to IFRS. It also highlights the need for those jurisdictions with not-for-profit or charity-specific accounting standards to reconfigure those provisions as IFRSs are adopted. Research limitations/implications The study is limited to five jurisdictions, concentrating specifically on key charity regulators and accounting standard setters. Future research could widen the scope to other jurisdictions, or track changes in the jurisdictions longitudinally. Practical implications We provide a timely international perspective of charity regulation and accounting developments for regulators, accounting standard setters and charities, specifically of regulatory responses to IFRS adoption. Originality/value: The paper contributes fresh insights into the dynamics of charity accounting regulation in an international context by using regulatory space as an organising framework. While accounting regulation literature provides a rich interpretation of regulatory issues within the accounting arena, little attention has been paid to charity accounting regulation.
Resumo:
Recent scholarship has considered the implications of the rise of voluntary private standards in food and the role of private actors in a rapidly evolving, de-facto ‘mandatory’ sphere of governance. Standards are an important element of this globalising private sphere, but are an element that has been relatively peripheral in analyses of power in agri-food systems. Sociological thought has countered orthodox views of standards as simple tools of measurement, instead understanding their function as a governance mechanism that transforms many things, and people, during processes of standardisation. In a case study of the Australian retail supermarket duopoly and the proprietary standards required for market access this paper foregrounds retailers as standard owners and their role in third-party auditing and certification. Interview data from primary research into Australia’s food standards captures the multifaceted role supermarkets play as standard-owners, who are found to impinge on the independence of third-party certification while enforcing rigorous audit practices. We show how standard owners, in attempting to standardize the audit process, generate tensions within certification practices in a unique example of ritualism around audit. In examining standards to understand power in contemporary food governance, it is shown that retailers are drawn beyond standard-setting into certification and enforcement, that is characterized by a web of institutions and actors whose power to influence outcomes is uneven.
Resumo:
This paper examines two concepts which are central to contemporary standard setting in occupational health and safety (OHS) regulation, and explores the differences and similarities between these concepts – the notion of ‘reasonably practicable’ which qualifies the ‘general duties’ and some other provisions in the Australian OHS standards, and the risk management requirements typically found in OHS regulations and approved codes of practice (advisory standards in Queensland).
Resumo:
Chronic leg ulcers are costly to manage for health service providers. Although evidence-based care leads to improved healing rates and reduced costs, a significant evidence-practice gap is known to exist. Lack of access to specialist skills in wound care is one reason suggested for this gap. The aim of this study was to model the change to total costs and health outcomes under two versions of health services for patients with leg ulcers: routine health services for community-living patients; and care provided by specialist wound clinics. Mean weekly treatment and health services costs were estimated from participants’ data (n=70) for the twelve months prior to their entry to a study specialist wound clinic, and prospectively for 24 weeks after entry. For the retrospective phase mean weekly costs of care were $AU130.30 (SD $12.64) and these fell to $AU53.32 (SD $6.47) for the prospective phase. Analysis at a population level suggests if 10,000 individuals receive 12 weeks of specialist evidence-based care, the cost savings are likely to be AU$9,238,800. Significant savings could be made by the adoption of evidence-based care such as that provided by the community and outpatient specialist wound clinics in this study.
Resumo:
The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
Resumo:
An iterative based strategy is proposed for finding the optimal rating and location of fixed and switched capacitors in distribution networks. The substation Load Tap Changer tap is also set during this procedure. A Modified Discrete Particle Swarm Optimization is employed in the proposed strategy. The objective function is composed of the distribution line loss cost and the capacitors investment cost. The line loss is calculated using estimation of the load duration curve to multiple levels. The constraints are the bus voltage and the feeder current which should be maintained within their standard range. For validation of the proposed method, two case studies are tested. The first case study is the semi-urban 37-bus distribution system which is connected at bus 2 of the Roy Billinton Test System which is located in the secondary side of a 33/11 kV distribution substation. The second case is a 33 kV distribution network based on the modification of the 18-bus IEEE distribution system. The results are compared with prior publications to illustrate the accuracy of the proposed strategy.
Resumo:
Background: The high rates of comorbid depression and substance use in young people have been associated with a range of adverse outcomes. Yet, few treatment studies have been conducted with this population. Objective: To determine if the addition of Motivational Interviewing and Cognitive Behaviour Therapy (MI/CBT) to standard alcohol and other drug (AOD) care improves the outcomes of young people with comorbid depression and substance use. Participants and Setting: Participants comprised 88 young people with comorbid depression (Kessler 10 score of > 17) and substance use (mainly alcohol/cannabis) seeking treatment at two youth AOD services in Melbourne, Australia. Sixty young people received MI/CBT in addition to standard care (SC) and 28 received SC alone. Outcomes Measures: Primary outcome measures were depressive symptoms and drug and alcohol use in the past month. Assessments were conducted at baseline, 3 and 6 months follow up. Results and Conclusions: The addition of MI/CBT to SC was associated with a significantly greater rate of change in depression, cannabis use, motivation to change substance use and social contact in the first 3 months. However, those who received SC had achieved similar improvements on these variables by 6 months follow up. All young people achieved significant improvements in functioning and quality of life variables over time, regardless of the treatment group. No changes in alcohol or other drug use were found in either group. The delivery of MI/CBT in addition to standard AOD care may offer accelerated treatment gains in the short-term.
Resumo:
Purpose: This randomised trial was designed to investigate the activity and toxicity of continuous infusion etoposide phosphate (EP), targeting a plasma etoposide concentration of either 3 μg/ml for five days (5d) or 1 μg/ml for 15 days (15d), in previously untreated SCLC patients with extensive disease. Patients and methods: EP was used as a single agent. Plasma etoposide concentration was monitored on days 2 and 4 in patients receiving 5d EP and on days 2, 5, 8 and 11 in patients receiving 15d EP, with infusion modification to ensure target concentrations were achieved. Treatment was repeated every 21 days for up to six cycles, with a 25% reduction in target concentration in patients with toxicity. Results: The study has closed early after entry of 29 patients (14 with 5d EP, 15 with 15d EP). Objective responses were seen in seven of 12 (58%, confidence interval (CI): 27%-85%) evaluable patients after 5d EP, and two of 14 (14%, CI: 4%42%) evaluable patients after 15d EP (P = 0.038). Grade 3 or 4 neutropenia or leucopenia during the first cycle of treatment was observed in six of 12 patients after 5d EP and 0/14 patients after 15d EP (P = 0.004), with median nadir WBC count of 2.6 x 109/1 after 5d and 5.0 x 109/1 after 15d EP (P = 0.017). Only one of 49 cycles of 15d EP was associated with grade 3 or worse haematological toxicity, compared to 14 of 61 cycles of 5d EP. Conclusions: Although the number of patients entered into this trial was small, the low activity seen at 1 μg/ml in the 15d arm suggests that this concentration is below the therapeutic window in this setting. Further concentration- controlled studies with prolonged EP infusions are required.