789 resultados para intra-party democracy
Resumo:
This chapter will begin with a brief summary of some recent research in the field of comparative penology. This work will be examined to explore the benefits, difficulties and limits of attempting to link criminal justice issues to types of advanced democratic polities, with particular emphasis on political economies. This stream of comparative penology examines data such as imprisonment rates and levels of punitiveness in different countries, before drawing conclusions based on the patterns which seem to emerge. Foremost among these is that the high imprisoning countries tend to be the advanced western liberal democracies which have gone furthest in adopting neoliberal economic and social policies, as against the lower imprisonment rates of social democracies, which variably have attempted to temper free-market economic policies in various ways. Such work brings both social democracy and neoliberalism into focus as issues for, or subjects of, criminology. Not in the sense of new ‘brands’ of criminology but rather as an examination of the connections between the political projects of social democracy and neoliberalism, and issues of crime and criminal justice. In the new comparative penology, social democracy and neoliberalism are cast in opposition, simultaneously raising the questions of to what extent and how adequately both social democracy and neoliberalism have been constituted as subjects in criminology and whether dichotomy is the only available trope of analysis?
Resumo:
This chapter begins with a discussion of the economic, political, and social context of the recent global financial crisis, which casts into relief current boundaries of criminology, permeated and made fluid in criminology's recent cultural turn. This cultural turn has reinvigorated criminology, providing new objects of analysis and rich and thick descriptions of the relationship between criminal justice and the conditions of life in ‘late modernity’. Yet in comparison with certain older traditions that sought to articulate criminal justice issues with a wider politics of contestation around political economies and social welfare policies of different polities, many of the current leading culturalist accounts tend in their globalized convergences to produce a strangely decontextualized picture in which we are all subject to the zeitgeist of a unitary ‘late modernity’ which does not differ between, for example, social democratic and neo-liberal polities, let alone allow for the widespread persistence of the pre-modern. It is argued that that contrary to this globalizing trend there are signs within criminology that life is being breathed back into social democratic and penal welfare concerns, habitus, and practices. The chapter discusses three of these signs: the emergence of neo-liberalism as a subject of criminology; a developing comparative penology which recognizes differences in the political economies of capitalist states and evinces a renewed interest in inequality; and a nascent revolt against the ‘generative grammar’, ‘pathological disciplinarities’, and ‘imaginary penalities’ of neoliberal managerialism.
Intra-arterial waveform analysis: a study of senior nurse knowledge in a general intensive care unit
Resumo:
The aim of this small-scale study was to assess what knowledge senior nurses within a general intensive care unit (GICU) had in relation to intra-arterial blood pressure (IABP) waveform analysis. Its core objective was: To assess what knowledge was held by the senior nursing team with regard to arterial waveform interpretation, arterial waveform morphology and the technical aspects associated with arterial waveform monitoring.
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.
Resumo:
This paper examines the extent social media is enabling e-democracy in Fiji, Solomon Islands and Vanuatu. The study conducts an interpretative case study approach interviewing active social media users, political actors, civil servants, civilians, civil society actors and tertiary students. The study also conducts a content analysis of popular “political social media” Facebook pages in these three countries. The findings of the study suggest that social media is playing a role in facilitating citizen engagement with governments, making governments accountable and providing a means for citizens to be informed, to discuss and share views on political matters. However, social media usage is evolving quite differently in these three countries and factors such as high levels of militarism (Fiji), high levels of corruption (Solomon Islands) and also rapid ICT development (Vanuatu) have contributed towards shaping the potential of social media as a democratic enabler and political tool in these countries.
Resumo:
In ASIC v Atlantic 3 Financial (Aust) Pty Ltd [2006] QCA 540 the Queensland Court of Appeal dismissed an appeal from the decision of Mullins J at first instance in ASIC v Atlantic 3 Financial (Aust) Pty LTd [2006] QSC 152, the majority concluding that the client agreement in issue was not inconsistent with s48 of the Queensland Law Society Act 1952.
Resumo:
Whilst native French speakers oftentimes collapse accountability to account giving, this paper outlines the shape of an accountability ala française. Reading Tocqueville’s (1835) work highlights that accountability as practiced in Anglo-Saxonc countries has been an offspring of American democracy. An accountability a la française would be characterised by conformance to a set or universal values, the submission of minorities to choices made by the majority, a means obligation as well as the rejection of transparency. [Alors que le francophone réduit généralement l’accountability à la reddition de comptes, cet article esquisse les contours d’une véritable accountability à la française. La lecture de Tocqueville (1835) révèle que l’accountability pratiquée dans les pays anglo-saxons trouve ses origines dans les fondements de la démocratie américaine. En France, l’accountability serait caractérisée par le respect d’un ensemble de valeurs universelles, l’adhésion des minorités aux choix majoritaires, l’absence de discriminations, une obligation de moyens et un rejet de la transparence.]
Resumo:
In Kimtran Pty Ltd v Downie [2003] QDC 043 the court allowed in part an appeal from the refusal by the Queensland Building Tribunal to order the respondent liquidators pay the appellants' costs of proceedings in the Tribunal. The decision involved an examination of authorities which have considered the circumstances in which it is in the interests of justice to make an order for costs against a non-party.
Resumo:
The decision in Hook v Boreham & QBE Insurance (Australia) Limited [2006] QDC 304 considered whether the court should go further than order that costs be assessed on the indemnity basis, but should also specify the basis by which those indemnity costs should be determined. The decision makes it clear that under r704(3) of the Uniform Civil Procedure Rules, questions of that nature are ordinarily preserved to the discretion of the Registrar.
Resumo:
The refereed papers contained in this volume of conference proceedings were among those presented at the 2nd International Conference on Crime, Justice and Social Democracy, hosted by the Crime and Justice Research Centre, Faculty of Law, QUT, from 8 – 11 July 2013. The conference attracted an impressive list of speakers from Australasia, Europe, North America and Latin America. These seven papers can be viewed at the Crime and Justice Research Centre’s website at http://crimejusticeconference.com/publications/ as can Volume 1 representing another 26 selected papers from the conference. As with the papers contained in the first volume, this set of papers raises important questions about the links between crime, justice and social democracy, and continues the contribution that the Crime and Justice Research Centre makes towards engaging with these topics. We thank all those who submitted papers for review for this second volume of proceedings, as well as the peer reviewers for taking the time to review the papers, often within very tight timelines.
Resumo:
Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
A study of ten Polish entrepreneurs operating in Leicester, UK is reported in this article. The concepts of social, cultural and economic capital are used as the lens through which to explore the way the capital they access is employed and converted into entrepreneurial activity. Ethnic entrepreneurship takes place within wider social, political and economic institutional frameworks and opportunity structures and so this is taken into account by differentiating two groups – post-war and contemporary Polish entrepreneurs. The differing origins and amounts of forms of capital they can access are shown as is how these are converted into valued outcomes. Combining the mixed embeddedness approach with a forms-of-capital analysis enables looking beyond social capital to elaborate on intra-ethnic variation in the UK’s Polish entrepreneurial community.
Resumo:
The debate about the democratic significance of these trends—a more aggressively inquisitorial media environment, greater public participation in political communication, a more accessible and transparent (at least in appearance) political class—continues, not least in Australia. This essay was written in the first half of 2013, a time of extreme political volatility in Australia, and in the run-up to a general election following three years of minority Labor government. By that stage in the political cycle, Prime Minister Julia Gillard had survived not one but two attempts at leadership “spills”, ministers had resigned or been sacked for disloyalty to the leader, major policy initiatives had been dumped, reversed or quietly dropped, and a Coalition opposition was confidently looking forward to a landslide majority in the election of September that year. Labor’s internal party turmoil, rather than the Coalition’s policy prospectus (which remained sketchy and vague right up to the eve of the election), were widely assumed to be the cause of the former’s poor standing in the opinion polls.