567 resultados para Time (Jewish law)
em Queensland University of Technology - ePrints Archive
Resumo:
The ways in which a society set standards of behaviour and of conduct for its members vary hugely. For example, accepted practices, recognised customs, spiritually or morally inspired norms, judicially declared rules, executively formulated edicts, formal legislative enactments or constitutionally embedded rights and duties. Whatever form they assume, these standards are the artificial construction of the human mind. Accordingly the law - whatever its form - can do no more and no less than regulate or set standards for human behaviour, human conduct, and human decision-making. The law cannot regulate the environment. It can only regulate human activities that impact directly or indirectly upon the environment. This applies as much to wetlands as components of the environment as it does to any other components of the environment or the environment at large. The capacity of the law to protect the environment and therefore wetlands is thus totally dependent upon the capacity of the law to regulate human behaviour, human conduct and human decision-making. At the same time the law needs to reflect the specific nature, functions and locations of wetlands. A wetland is an ecosystem by itself; it comprises a range of ecosystems within it; and it is part of a wider set of ecosystems. Hence, the significant ecological functions performed by wetlands. Then there are the benefits flowing to humans from wetlands. These may be social, economic, cultural, aesthetic, or a combination of some or of all of these. It is a challenge for a society acting through its legal system to find the appropriate balance between these ecological and these human values. But that is what sustainability requires.The ways in which a society set standards of behaviour and of conduct for its members vary hugely. For example, accepted practices, recognised customs, spiritually or morally inspired norms, judicially declared rules, executively formulated edicts, formal legislative enactments or constitutionally embedded rights and duties. Whatever form they assume, these standards are the artificial construction of the human mind. Accordingly the law - whatever its form - can do no more and no less than regulate or set standards for human behaviour, human conduct, and human decision-making. The law cannot regulate the environment. It can only regulate human activities that impact directly or indirectly upon the environment. This applies as much to wetlands as components of the environment as it does to any other components of the environment or the environment at large. The capacity of the law to protect the environment and therefore wetlands is thus totally dependent upon the capacity of the law to regulate human behaviour, human conduct and human decision-making. At the same time the law needs to reflect the specific nature, functions and locations of wetlands. A wetland is an ecosystem by itself; it comprises a range of ecosystems within it; and it is part of a wider set of ecosystems. Hence, the significant ecological functions performed by wetlands. Then there are the benefits flowing to humans from wetlands. These may be social, economic, cultural, aesthetic, or a combination of some or of all of these. It is a challenge for a society acting through its legal system to find the appropriate balance between these ecological and these human values. But that is what sustainability requires.
Resumo:
In 2015, Victoria passed laws removing the time limit in which a survivor of child sexual abuse can commence a civil claim for personal injury. The law applies also to physical abuse, and to psychological injury arising from those forms of abuse. In 2016, New South Wales made almost identical legal reforms. These reforms were partly motivated by the recommendations of inquiries into institutional child abuse. Of particular relevance is that the Australian Royal Commission Into Institutional Responses to Child Sexual Abuse recommended in 2015 that all States and Territories remove their time limits for civil claims. This presentation explores the problems with standard time limits when applied to child sexual abuse cases (whether occurring within or beyond institutions), the scientific, ethical and legal justifications for lifting the time limits, and solutions for future law reform.
Resumo:
While forensic psychology is commonly associated with the criminal and family law domains, its ambit to offer skills and knowledge at the legal interface also makes it particularly suited to the civil law domain. At this time, civil law is arguably the least represented legislative area in terms of psychological research and professional commentary. However, it is also a broad area, with its very breadth providing scope for research consideration, as urged by Greene. The purposes of this article are (1) to review the broad role of the psychologist in the conduct of civil litigation matters in Australia, (2) to assist the novice to the area by indicating a non-exhaustive list of potentially ambiguous terms and concepts common to the conduct of professional practice, and; (3) to highlight, as an example, one area of practice not only where legal direction demands professional pragmatism but also where opportunity arises for psychological research to vitally address a major social issue.
Resumo:
Child sexual abuse is widespread and difficult to detect. To enhance case identification, many societies have enacted mandatory reporting laws requiring designated professionals, most often police, teachers, doctors and nurses, to report suspected cases to government child welfare agencies. Little research has explored the effects of introducing a reporting law on the number of reports made, and the outcomes of those reports. This study explored the impact of a new legislative mandatory reporting duty for child sexual abuse in the State of Western Australia over seven years. We analysed data about numbers and outcomes of reports by mandated reporters, for periods before the law (2006-08) and after the law (2009-12). Results indicate that the number of reports by mandated reporters of suspected child sexual abuse increased by a factor of 3.7, from an annual mean of 662 in the three year pre-law period to 2448 in the four year post-law period. The increase in the first two post-law years was contextually and statistically significant. Report numbers stabilised in 2010-12, at one report per 210 children. The number of investigated reports increased threefold, from an annual mean of 451 in the pre-law period to 1363 in the post-law period. Significant decline in the proportion of mandated reports that were investigated in the first two post-law years suggested the new level of reporting and investigative need exceeded what was anticipated. However, a subsequent significant increase restored the pre-law proportion, suggesting systemic adaptive capacity. The number of substantiated investigations doubled, from an annual mean of 160 in the pre-law period to 327 in the post-law period, indicating twice as many sexually abused children were being identified.
Resumo:
This book analyses and refines the arguments for and against retrospective rule making, concluding that there is one really strong argument against it: the expectation that, if an individual's actions are considered by a future court, the legal consequences of that action will be determined by the law that was discoverable at the time the action was performed. This argument, which goes to the heart of the rule of law, is generally determinative. However, in some cases the argument does not run and this book suggests that, in some areas of law, reliance should be actively discouraged by prospective warnings that the law is subject to change.
Resumo:
In the region of self-organized criticality (SOC) interdependency between multi-agent system components exists and slight changes in near-neighbor interactions can break the balance of equally poised options leading to transitions in system order. In this region, frequency of events of differing magnitudes exhibits a power law distribution. The aim of this paper was to investigate whether a power law distribution characterized attacker-defender interactions in team sports. For this purpose we observed attacker and defender in a dyadic sub-phase of rugby union near the try line. Videogrammetry was used to capture players’ motion over time as player locations were digitized. Power laws were calculated for the rate of change of players’ relative position. Data revealed that three emergent patterns from dyadic system interactions (i.e., try; unsuccessful tackle; effective tackle) displayed a power law distribution. Results suggested that pattern forming dynamics dyads in rugby union exhibited SOC. It was concluded that rugby union dyads evolve in SOC regions suggesting that players’ decisions and actions are governed by local interactions rules.
Resumo:
This article examines the importance of accurate classification and identification of risk with particular reference to the problem of adverse selection. It is argued that, historically, this concern was the paramount consideration influencing standard form contract formation and disclosure laws. The scope of its relevance today however is less apparent in that contemporary insurance contracting is conducted in a vastly different environment from that which prevailed at the time Lloyd's was better known as a coffee house. Accordingly, the second part of this article looks at the contemporary framework of information disclosure and those dynamics within it designed to elicit information weighing on risk forecasting : specifically, (a) direct inquiry and testing requirements; (b) signaling - or incentive based structuring of insurance contractual and (c) bargaining in the shadow of the utmost good faith doctrine. Finally, certain conclusions arising out of contemporary and historical economic considerations underpinning disclosure in insurance law are outlined.
Resumo:
Vietnam's present draft of the proposed new Law on Competition is currently in its ninth version. Although there is a need to enact legislation as quickly as possible, Vietnam cannot rush the drafting process. Under its Bilateral Trade Agreement with the USA, Vietnam has committed to improve the quality of its laws and consistency of its legislative framework. Since the Law on Competition will be fundamental in establishing the legal framework for a more coherent and effective competition regime, and will have profound influences on Vietnam's objective of becoming a socialist-oriented market economy, its provisions must be well constructed and well considered, and this takes time. This article shows how the proposed Law is being crafted as compared to older drafts which sheds light on changes in policy during the drafting process. Where possible, the Draft is also compared with the laws in other jurisdictions for any assistance they might lend. In this author's opinion not all the changes are positive but any defects in the draft are not intractable and can be remedied prior to promulgation.
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.
Resumo:
Persistent use of safety restraints prevents deaths and reduces the severity and number of injuries resulting from motor vehicle crashes. However, safety-restraint use rates in the United States have been below those of other nations with safety-restraint enforcement laws. With a better understanding of the relationship between safety-restraint law enforcement and safety-restraint use, programs can be implemented to decrease the number of deaths and injuries resulting from motor vehicle crashes. Does safety-restraint use increase as enforcement increases? Do motorists increase their safety-restraint use in response to the general presence of law enforcement or to targeted law enforcement efforts? Does a relationship between enforcement and restraint use exist at the countywide level? A logistic regression model was estimated by using county-level safety-restraint use data and traffic citation statistics collected in 13 counties within the state of Florida in 1997. The model results suggest that safety-restraint use is positively correlated with enforcement intensity, is negatively correlated with safety-restraint enforcement coverage (in lanemiles of enforcement coverage), and is greater in urban than rural areas. The quantification of these relationships may assist Florida and other law enforcement agencies in raising safety-restraint use rates by allocating limited funds more efficiently either by allocating additional time for enforcement activities of the existing force or by increasing enforcement staff. In addition, the research supports a commonsense notion that enforcement activities do result in behavioral response.
Resumo:
This book addresses the modern law relating to adoption. It comes at a time of fundamental change in adoption practice as, increasingly, Irish couples look outside the jurisdiction for the child that will make their family complete.---------- * Examines and explains the new regulatory framework and the law now governing domestic and intercountry adoption.---------- * Provides a guide to the changes outlined in the Adoption Bill 2008 which also consolidates the provisions of seven previous statutes and incorporates the Hague Convention into Irish statute law.---------- * Considers the responsibilities of the new Adoption Authority, and the roles of other administrative and legal bodies.---------- * Sets out the adoption process, explaining the complexities of intercountry adoption, giving consideration to the interface between adoption and children in care and dealing with the rights of the parties involved.
Resumo:
The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.
Resumo:
As AITPM National President, I was invited by Queensland’s Premier, Hon. Anna Bligh MP, as an audience guest to People’s Question Time on Wednesday 24 March 2010, which focused on ‘The Challenges and Opportunities of Population Growth in Queensland’. On the panel were: Premier and Minister for the Arts, Anna Bligh; Minister for Climate Change and Sustainability, Kate Jones; Minister for Infrastructure and Planning, Stirling Hinchliffe; Michael Rayner – Growth Management Summit Advisory Panel, Principal Director, Cox Rayner Architects; and Greg Hallam – Executive Director, Local Government Association of Queensland. The moderator for this session was Law Academic Erin O’Brien, of Queensland University of Technology.
Resumo:
This paper discusses the relationship between law and morality. Morality does not necessarily coincide with the law, but it contributes to it. An act may be legal but nevertheless considered to be immoral in a particular society. For example, the use of pornography may be considered by many to be immoral. Nevertheless, the sale and distribution of non-violent, non-child related, sexually explicit material is legal (or regulated) in many jurisdictions. Many laws are informed by, and even created by, morality. This paper examines the historical influence of morality on the law and on society in general. It aims to develop a theoretical framework for examining legal moralism and the social construction of morality and crime as well as the relationship between sex, desire and taboo. Here, we refer to the moral temporality of sex and taboo, which examines the way in which moral judgments about sex and what is considered taboo change over time, and the kinds of justifications that are employed in support of changing moralities. It unpacks the way in which abstract and highly tenuous concepts such as ‘‘desire’’, ‘‘art’’ and ‘‘entertainment’’ may be ‘‘out of time’’ with morality, and how morality shapes laws over time, fabricating justifications from within socially constructed communities of practice. This theoretical framework maps the way in which these concepts have become temporally dominated by heteronormative structures such as the family, marriage, reproduction, and longevity. It is argued that the logic of these structures is inexorably tied to the heterosexual life-path, charting individual lives and relationships through explicit phases of childhood, adolescence and adulthood that, in the twenty-first century, delimit the boundaries of taboo surrounding sex more than any other time in history.