69 resultados para particular inheritance regimes
em Queensland University of Technology - ePrints Archive
Resumo:
“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.
Resumo:
This paper addresses less recognised factors which influence the diffusion of a particular technology. While an innovation’s attributes and performance are paramount, many fail because of external factors which favour an alternative. This paper, with theoretic input from diffusion, lock-in and path-dependency, presents a qualitative study of external factors that influenced the evolution of transportation in USA. This historical account reveals how one technology and its emergent systems become dominant while other choices are overridden by socio-political, economic and technological interests which include not just the manufacturing and service industries associated with the automobile but also government and market stakeholders. Termed here as a large socio-economic regime (LSER),its power in ensuring lock-in and continued path-dependency is shown to pass through three stages, weakening eventually as awareness improves. The study extends to transport trends in China, Korea, Indonesia and Malaysia and they all show the dominant role of an LSER. As transportation policy is increasingly accountable to address both demand and environmental concerns and innovators search for solutions, this paper presents important knowledge for innovators, marketers and policy makers for commercial and societal reasons, especially when negative externalities associated with an incumbent transportation technology may lead to market failure.
Resumo:
Protection of “critical infrastructure” has become a major issue for govern- ments worldwide. Yet in Australia, as in many other countries, including the United States, an estimated 90% of critical infrastructure is privately owned or operated commercially – in other words, critical infrastructure protection is not the exclusive domain of government. As a result, information sharing between government and the private sector has become a vitally important component of effective risk management. However, establishing effective arrangements of this kind between the public and private sector needs to take account of existing regimes of access and public disclosure which relate to government-held documents; in particular, that which is established by freedom of information (FOI) legislation. This article examines the extent to which the current Commonwealth FOI regime is likely to act as an impediment to the private sector operators of critical infrastructure participat- ing in government-operated information sharing arrangements. By examining developments in other jurisdictions, principally the United States, the article considers whether amendments to the current Australian FOI regime are necessary to ensure effective participation, consistent with the underlying object and purpose of FOI.
Resumo:
International market access for fresh commodities is regulated by international accepted phytosanitary guidelines, the objectives of which are to reduce the biosecurity risk of plant pest and disease movement. Papua New Guinea (PNG) has identified banana as a potential export crop and to help meet international market access requirements, this thesis provides information for the development of a pest risk analysis (PRA) for PNG banana fruit. The PRA is a three step process which first identifies the pests associated with a particular commodity or pathway, then assesses the risk associated with those pests, and finally identifies risk management options for those pests if required. As the first step of the PRA process, I collated a definitive list on the organisms associated with the banana plant in PNG using formal literature, structured interviews with local experts, grey literature and unpublished file material held in PNG field research stations. I identified 112 organisms (invertebrates, vertebrate, pathogens and weeds) associated with banana in PNG, but only 14 of these were reported as commonly requiring management. For these 14 I present detailed information summaries on their known biology and pest impact. A major finding of the review was that of the 14 identified key pests, some research information occurs for 13. The single exception for which information was found to be lacking was Bactrocera musae (Tryon), the banana fly. The lack of information for this widely reported ‘major pest on PNG bananas’ would hinder the development of a PNG banana fruit PRA. For this reason the remainder of the thesis focused on this organism, particularly with respect to generation of information required by the PRA process. Utilising an existing, but previously unanalysed fruit fly trapping database for PNG, I carried out a Geographic Information System analysis of the distribution and abundance of banana in four major regions of PNG. This information is required for a PRA to determine if banana fruit grown in different parts of the country are at different risks from the fly. Results showed that the fly was widespread in all cropping regions and that temperature and rainfall were not significantly correlated with banana fly abundance. Abundance of the fly was significantly correlated (albeit weakly) with host availability. The same analysis was done with four other PNG pest fruit flies and their responses to the environmental factors differed to banana fly and each other. This implies that subsequent PRA analyses for other PNG fresh commodities will need to investigate the risk of each of these flies independently. To quantify the damage to banana fruit caused by banana fly in PNG, local surveys and one national survey of banana fruit infestation were carried out. Contrary to expectations, infestation was found to be very low, particularly in the widely grown commercial cultivar, Cavendish. Infestation of Cavendish fingers was only 0.41% in a structured, national survey of over 2 700 banana fingers. Follow up laboratory studies showed that fingers of Cavendish, and another commercial variety Lady-finger, are very poor hosts for B. musae, with very low host selection rates by female flies and very poor immature survival. An analysis of a recent (within last decade) incursion of B. musae into the Gazelle Peninsula of East New Britain Province, PNG, provided the final set of B. musae data. Surveys of the fly on the peninsular showed that establishment and spread of the fly in the novel environment was very rapid and thus the fly should be regarded as being of high biosecurity concern, at least in tropical areas. Supporting the earlier impact studies, however, banana fly has not become a significant banana fruit problem on the Gazelle, despite bananas being the primary starch staple of the region. The results of the research chapters are combined in the final Discussion in the form of a B. musae focused PRA for PNG banana fruit. Putting the thesis in a broader context, the Discussion also deals with the apparent discrepancy between high local abundance of banana fly and very low infestation rates. This discussion focuses on host utilisation patterns of specialist herbivores and suggests that local pest abundance, as determined by trapping or monitoring, need not be good surrogate for crop damage, despite this linkage being implicit in a number of international phytosanitary protocols.
Resumo:
Effective environmental governance is hampered by the continuing presumption of the state as central actor in the domestic and international political contexts. Over the last 20 years, the traditional 'Westphalian' conception of the sovereign state has come under increasing pressure not only in theory, but also in practice, as evidenced by the increasing importance attributed to the participation of quasi-government and non-government actors in decision-making in domestic and international political issues. This paper is a contribution to the on-going debate about the meaning of effective environmental governance by mapping out a post-Westphalian conception of governance. In particular, it defines governance in relation to the protection of biodiversity; highlights obstacles to effective governance in this area, and discusses forming environmental management plans and environmental governance regimes to implement them. The final section of the paper suggests seven directions for ensuring the realisation of effective environmental governance.
Resumo:
Several studies have developed metrics for software quality attributes of object-oriented designs such as reusability and functionality. However, metrics which measure the quality attribute of information security have received little attention. Moreover, existing security metrics measure either the system from a high level (i.e. the whole system’s level) or from a low level (i.e. the program code’s level). These approaches make it hard and expensive to discover and fix vulnerabilities caused by software design errors. In this work, we focus on the design of an object-oriented application and define a number of information security metrics derivable from a program’s design artifacts. These metrics allow software designers to discover and fix security vulnerabilities at an early stage, and help compare the potential security of various alternative designs. In particular, we present security metrics based on composition, coupling, extensibility, inheritance, and the design size of a given object-oriented, multi-class program from the point of view of potential information flow.
Resumo:
This paper presents a conceptual framework, informed by Foucault’s work on governmentality, which allows for new kinds of reflection on the practice of legal education. Put simply, this framework suggests that legal education can be understood as a form of government that relies on a specific rationalisation and programming of the activities of legal educators, students, and administrators, and is implemented by harnessing specific techniques and bodies of ‘know-how’. Applying this framework to assessment at three Australian law schools, this paper highlights how assessment practices are rationalised, programmed, and implemented, and points out how this government shapes students’ legal personae. In particular, this analysis focuses on the governmental effects of pedagogical discourses that are dominant within the design and scholarship of legal education. It demonstrates that the development of pedagogically-sound regimes of assessment has contributed to a reformulation of the terrain of government, by providing the conditions under which forms of legal personae may be more effectively shaped, and extending the power relations that achieve this. This analysis provides legal educators with an original way of reflecting on the power effects of teaching the law, and new opportunities for thinking about what is possible in legal education.
Resumo:
The challenges of climate change pose problems requiring new and innovative legal responses by legal practitioners, government officials and corporate officers. This book addresses a broad range of topic areas where climate change has impact and systematically analyses the key legal responses to climate change, both at the international level and within Australia at federal, State and local levels. In particular, it critically examines: •the rights, duties and market mechanisms established under the international climate change regime •the effect of climate change policies on the implementation of environmental and planning laws •new regimes for the implementation of renewable energy and energy efficiency initiatives •legal frameworks for the implementation of biological and geological sequestration projects (including forest projects and carbon rights); and •legal principles for the design of an effective carbon trading scheme for Australia It also considers the role of the common law including: •the likely response of the law of torts to emerging forms of climate change harm; and •potential liabilities for professionals who must take climate change into account in their decision-making and advice
Resumo:
Resistance to rice virus diseases is an important requirement in many Southeast Asian rice breeding programs. Inheritance of resistance to rice tungro spherical virus (RTSV) in TW5, a near-isogenic line derived from Indonesian rice cultivar Utri Merah, was compared to that in TKM6, an Indian rice cultivar. Both TKM6 and Utri Merah are cultivars resistant to RTSV infections. Crosses were made between TKM6 and TN1, a susceptible cultivar, and between TW5 and TN1, and F3 lines were evaluated for their resistance to RTSV using two RTSV inoculum sources and a serological assay (ELISA). In TKM6, the resistance to the mixture of RTSV-V + RTBV inoculum source was controlled by a single recessive gene, whereas in TW5, the resistance was controlled by two recessive genes. A single recessive gene, however, controlled the resistance in TW5 when another RTSV variant, RTSV-VI, was used, suggesting that the resistance in TW5 depends on the nature of the RTSV inoculum used. RT-PCR, sequence, and phylogenetic analyses confirmed that RTSV-VI inoculum differs from RTSV-V inoculum and accurate phenotyping of the resistance to RTSV requires the use of a genetic marker.