951 resultados para LEGAL REGIME
Resumo:
The primary goal of the Vehicular Ad Hoc Network (VANET) is to provide real-time safety-related messages to motorists to enhance road safety. Accessing and disseminating safety-related information through the use of wireless communications technology in VANETs should be secured, as motorists may make critical decisions in dealing with an emergency situation based on the received information. If security concerns are not addressed in developing VANET systems, an adversary can tamper with, or suppress, the unprotected message to mislead motorists to cause traffic accidents and hazards. Current research on secure messaging in VANETs focuses on employing the certificate-based Public Key Infrastructure (PKI) scheme to support message encryption and digital signing. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This thesis has proposed a novel public key verification and management approach for VANETs; namely, the Public Key Registry (PKR) regime. Compared to the VANET PKI scheme, this new approach can satisfy necessary security requirements with improved performance and scalability, and at a lower cost by reducing the security overheads of message transmission and eliminating digital certificate deployment and maintenance issues. The proposed PKR regime consists of the required infrastructure components, rules for public key management and verification, and a set of interactions and associated behaviours to meet these rule requirements. This is achieved through a system design as a logic process model with functional specifications. The PKR regime can be used as development guidelines for conforming implementations. An analysis and evaluation of the proposed PKR regime includes security features assessment, analysis of the security overhead of message transmission, transmission latency, processing latency, and scalability of the proposed PKR regime. Compared to certificate-based PKI approaches, the proposed PKR regime can maintain the necessary security requirements, significantly reduce the security overhead by approximately 70%, and improve the performance by 98%. Meanwhile, the result of the scalability evaluation shows that the latency of employing the proposed PKR regime stays much lower at approximately 15 milliseconds, whether operating in a huge or small environment. It is therefore believed that this research will create a new dimension to the provision of secure messaging services in VANETs.
Resumo:
An ability to recognise and resolve ethical dilemmas was identified by the Australian Law Reform Commission as one of the ten fundamental lawyering skills. While the ‘Priestley 11’ list of areas of law required to qualify for legal practice includes ethics and professional responsibility, the commitment to ethics learning in Australian law schools has been far from uniform. The obligation imposed by the Priestley 11 is frequently discharged by a traditional teaching and learning approach involving lectures and/or tutorials and focusing on the content of the formal rules of professional responsibility. However, the effectiveness of such an approach is open to question. Instead, a practical rather than a theoretical approach to the teaching of legal ethics is required. Effective final-year student learning of ethics may be achieved by an approach which engages students, enabling them to appreciate the relevance of what they are learning to the real world and facilitating their transition from study to their working lives. Entry into Valhalla comprises a suite of modules featuring ‘machinima’ (computer-generated imagery) created using the Second Life virtual environment to contextualise otherwise abstract concepts. It provides an engaging learning environment which enables students to obtain an appreciation of ethical responsibility in a real-world context and facilitates understanding and problem-solving ability.
Resumo:
Researchers are increasingly involved in data-intensive research projects that cut across geographic and disciplinary borders. Quality research now often involves virtual communities of researchers participating in large-scale web-based collaborations, opening their earlystage research to the research community in order to encourage broader participation and accelerate discoveries. The result of such large-scale collaborations has been the production of ever-increasing amounts of data. In short, we are in the midst of a data deluge. Accompanying these developments has been a growing recognition that if the benefits of enhanced access to research are to be realised, it will be necessary to develop the systems and services that enable data to be managed and secured. It has also become apparent that to achieve seamless access to data it is necessary not only to adopt appropriate technical standards, practices and architecture, but also to develop legal frameworks that facilitate access to and use of research data. This chapter provides an overview of the current research landscape in Australia as it relates to the collection, management and sharing of research data. The chapter then explains the Australian legal regimes relevant to data, including copyright, patent, privacy, confidentiality and contract law. Finally, this chapter proposes the infrastructure elements that are required for the proper management of legal interests, ownership rights and rights to access and use data collected or generated by research projects.
Resumo:
The use of technology for purposes such as communication and document management has become essential to legal practice with practitioners and courts increasingly relying on various forms of technology. Accordingly, legal practitioners need to be able to understand, communicate with, and persuade their audience using this technology. Technology skills are therefore an essential and integral part of undergraduate legal education, and given the widening participation agenda in Australia and consequent increasing diversity of law students, it must also be available to all students. To neglect this most crucial part of modern legal education is to fail in a fundamental aspect of a University’s obligation not just to its students, but ultimately to our students’ potential employers and their future clients. This paper will consider how law schools can facilitate the development of technology skills by using technology to facilitate mooting in settings that replicate legal practice. In order to assess the facilities at the disposal of universities, the authors surveyed the law schools in Australia about their equipment in and use of electronic moot court rooms. The authors also conducted and evaluated an internal mooting competition using Elluminate, an online communication platform available to students through Blackboard. Students were able to participate wherever they were located without the need to attend a moot court room. The results of the survey and evaluation of the Elluminate competition will be discussed. The paper will conclude that while it is essential to teach technology skills as part of legal education, it is important that the benefits and importance of using technology be made clear in order for it to be accepted and embraced by the students. Technology must also be available to all students considering the widening participation in higher education and consequent increasing diversity of law students.
Resumo:
Student assessment is particularly important, and particularly controversial, because it is the means by which student achievement is determined. Reasonable adjustment to student assessment is of equal importance as the means of ensuring the mitigation, or even elimination, of disability related barriers to the demonstration of student achievement. The significance of reasonable adjustment is obvious in the later years of secondary school, and in the tertiary sector, because failure to adjust assessment may be asserted as the reason a student did not achieve as well as anticipated or as the reason a student was excluded from a course and, as a result, from future study and employment opportunities. Even in the early years of schooling, however, assessment and its management are a critical issue for staff and students, especially in an education system like Australia’s with an ever increasing emphasis on national benchmarks testing. This paper will explain the legislation which underpins the right to reasonable adjustment in education in Australian schools. It will give examples of the kinds of adjustment which may be made to promote equality of opportunity in the area of assessment. It will also consider some of the controversies which have confronted, or which, it may be speculated, are likely to confront Australian education institutions as they work towards compliance with reasonable adjustment laws.
Resumo:
In an age where digital innovation knows no boundaries, research in the area of brain-computer interface and other neural interface devices go where none have gone before. The possibilities are endless and as dreams become reality, the implications of these amazing developments should be considered. Some of these new devices have been created to correct or minimise the effects of disease or injury so the paper discusses some of the current research and development in the area, including neuroprosthetics. To assist researchers and academics in identifying some of the legal and ethical issues that might arise as a result of research and development of neural interface devices, using both non-invasive techniques and invasive procedures, the paper discusses a number of recent observations of authors in the field. The issue of enhancing human attributes by incorporating these new devices is also considered. Such enhancement may be regarded as freeing the mind from the constraints of the body, but there are legal and moral issues that researchers and academics would be well advised to contemplate as these new devices are developed and used. While different fact situation surround each of these new devices, and those that are yet to come, consideration of the legal and ethical landscape may assist researchers and academics in dealing effectively with matters that arise in these times of transition. Lawyers could seek to facilitate the resolution of the legal disputes that arise in this area of research and development within the existing judicial and legislative frameworks. Whether these frameworks will suffice, or will need to change in order to enable effective resolution, is a broader question to be explored.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
This paper explores attempts to shape resilient personae through relations of self-government, and highlights the way that this features as part of advanced liberal forms of rule. As an example of this process, it focuses on the way that undergraduate law students are encouraged to fashion resilient personae throughout their legal studies, so as to avoid, or effectively respond to, experiences that may have a detrimental effect on their mental health. This paper argues that the production of such resilience relies on students being encouraged to take up psychologically- and biomedically-infused subject positions, becoming well-disciplined subjects, entrepreneurs of the self, and even virtuous persons. It highlights that the fashioning of resilient personae in this way involves extensions to the targets and practices of self-government and reinforces advanced liberal government. The paper then suggests how insights into fashioning resilience in this context can inform further research on resilience, particularly resilience produced within criminal justice professionals.
Resumo:
Flow regime transition criteria are of practical importance for two-phase flow analyses at reduced gravity conditions. Here, flow regime transition criteria which take the friction pressure loss effect into account were studied in detail. Criteria at reduced gravity conditions were developed by extending an existing model with various experimental datasets taken at microgravity conditions showed satisfactory agreement. Sample computations of the model were performed at various gravity conditions, such as 0.196, 1.62, 3.71, and 9.81 m/s2 corresponding to micro-gravity and lunar, Martian and Earth surface gravity, respectively. It was found that the effect of gravity on bubbly-slug and slug-annular (churn) transitions in a two-phase flow system was more pronounced at low liquid flow conditions, whereas the gravity effect could be ignored at high mixture volumetric flux conditions. While for the annular flow transitions due to flow reversal and onset of dropset entrainment, higher superficial gas velocity was obtained at higher gravity level.
Resumo:
Seventeen year olds who come into contact with the police in Queensland are classified as adults and are not afforded the protections available under the Youth Justice Act 1992 (Qld) (YJA). As with any other adult, their offences are dealt with under a raft of legislative provisions including the Criminal Code 1889 (Qld) (the Code), the Police Powers and Responsibilities Act 2000 (Qld) (PPRA) and the Penalties and Sentences Act 1992 (Qld) (PSA). This article argues that this situation is unfair and contravenes international human rights agreements which Australia has ratified, in particular the United Nations Convention on the Rights of the Child (CROC). Article 1 of that Convention defines a child as a person under the age of 18. The youth offences legislation in Queensland only applies to those who have not yet turned 17. This article examines the effects of this anomaly in Queensland, focusing in particular on the pre-adjudication treatment of ‘17 year old adults’.
Resumo:
This paper critically analyses the proposed Australian regulatory approach to the crediting of biological sequestration activities (biosequestration) under the Australian Carbon Farming Initiative and its interaction with State-based carbon rights, the national carbon-pricing mechanism, and the international Kyoto Protocol and carbon-trading markets. Norms and principles have been established by the Kyoto Protocol to guide the creation of additional, verifiable, and permanent credits from biosequestration activities. This paper examines the proposed arrangements under the Australian Carbon Farming Initiative and Carbon Pricing Mechanism to determine whether they are consistent with those international norms and standards. This paper identifies a number of anomalies associated with the legal treatment of additionality and permanence and issuance of carbon credits within the Australian schemes. In light of this, the paper considers the possible legal implications for the national and international transfer, surrender and use of these offset credits.
Resumo:
Legal educators in Australia have increasingly become concerned with the mental health of law students. The apparent risk posed by legal education to a student’s mental health has led to the deployment of a variety of measures to address these problems. By exploring these measures as productive power relations attempting to shape law students, this paper outlines how this government of depression is achieved, and the potential costs of these power relations. It examines one central Australian text offering advice about how students and law student societies can address depression, and argues that doing so not only involves students adopting particular practices of self-government to shape their legal personae, but also relies on an extension of the power relations of legal education. In addition, this paper will link this advice — which privatises the issue of depression, responsibilises individuals and communities, privileges psychological expertise, and seeks to govern ‘at a distance’ — to broader forms of social administration that presently characterise many Western societies. Doing so allows legal educators to reflect on the effects of their attempts to govern depression, and to consider new ways of altering the power relations of legal education.
Resumo:
Over the last decade there has been an expansion in the number of Juris Doctor (JD) courses in the Australian legal education marketplace. Across the board it is graduate-entry, but it is currently offered in undergraduate, postgraduate and ‘hybrid’ forms. In this article we will discuss recent research conducted as part of an Australian Learning and Teaching Council grant. This project included an exploration of whether JD courses in Australia were applying different and higher level academic standards to those operating in Bachelor of Laws degrees. Our research findings reveal justification for concerns about the academic standards of some JD courses, particularly where masters level students were being taught alongside their undergraduate counterparts. They also provide some insights into perceptions in the marketplace of JD graduates. Finally, we will discuss the future viability of such courses in light of recent revisions to the Australian Qualifications Framework.