936 resultados para Legal order


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the lead article for an issue of M/C Journal on the theme ‘obsolete.’ It uses the history of the International Journal of Cultural Studies (of which the author has been editor since 1997) to investigate technological innovations and their scholarly implications in academic journal publishing; in particular the obsolescence of the print form. Print-based elements like cover-design, the running order of articles, special issues, refereeing and the reading experience are all rendered obsolete with the growth of online access to individual articles. The paper argues that individuation of reading choices may be accompanied by less welcome tendencies, such as a decline in collegiality, disciplinary innovation, and trust.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Queensland Department of Public Works (QDPW) and the Queensland Department of Main Roads (QDMR) have identified a need for industry e-contracting guidelines in the short to medium term. Each of these organisations conducts tenders and contracts for over $600 million annually. This report considers the security and legal issues relating to the shift from a paper-based tendering system to an electronic tendering system. The research objectives derived from the industry partners include: • a review of current standards and e-tendering systems; • a summary of legal requirements impacting upon e-tendering; • an analysis of the threats and requirements for any e-tendering system; • the identification of outstanding issues; • an evaluation of possible e-tendering architectures; • recommendations for e-tendering systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper will consider the way that Foucault’s work has been utilised to examine Australian legal education, particularly in the context of understanding the construction of the legal identity. While remaining sensitive to the many potential ‘uses’ of Foucault’s tools, as well as his problematisation of the author as an organising feature of discourse, this paper will argue that legal education scholarship overwhelmingly utilises concepts such as ‘discourse’ and ‘power-knowledge’, which, while useful, cannot provide a nuanced understanding of the construction of the legal identity. Consequently, this paper suggests that future legal education research utilise Foucault’s concepts of ‘ethics’ and ‘governmentality’ to address these issues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sexual harassment can be conceptualised as an interaction between harassers and targets. Utilising 23 detailed legal transcripts, this study explored evidence of a range of perpetrator tactics and target counter-tactics. These tactics can be readily fitted into the backfire framework, which proposes that powerful perpetrators of perceived unjust acts are likely to cover up the actions, devalue the target, reinterpret the events, use official channels to give an appearance of justice, and intimidate or bribe people involved. Targets can respond using counter-tactics of exposure, validation, reframing, mobilisation of support, and resistance. The findings have implications for raising awareness of harassing tactics and recommendations for effective informal responses in organisations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ethics of creating ‘saviour siblings’ for the benefit of another has received much attention, but little consideration has been given to the legal position of those saviours born who may be asked to provide tissue for transplantation to another during childhood. This article examines the ethical issues surrounding minor donation as well as the existing legal framework in the UK and Australia that regulates minors providing tissue for the benefit of another. Against this background the position of minor saviours, who are called upon to donate bone marrow or peripheral blood stem cells, is examined. This analysis suggests that the law does not provide sufficient protection for minor saviours who are called upon to donate to another. It is argued that specific ethical obligations are owed to saviours—that ought to be reflected in the law—in order to protect them from exploitation while they remain minors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This appendix describes the Order Fulfillment process followed by a fictitious company named Genko Oil. The process is freely inspired by the VICS (Voluntary Inter-industry Commerce Solutions) reference model1 and provides a demonstration of YAWL’s capabilities in modelling complex control-flow, data and resourcing requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cultural policy studies have previously highlighted the importance of multiple logics, friction and contradiction in cultural policy. Recent developments in institutional theory provide a framework for analysing change in cultural policy which explores movement between these multiple and sometimes contradictory logics. This paper analyses the role of friction in the evolution of Australian film industry policy and in particular the tension between competing logics regarding nationalism, commercialism and the state. The paper is suggestive of the relevance of institutional theory as a framework for understanding cultural policy evolution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Queensland University of Technology (QUT) is faced with a rapidly growing research agenda built upon a strategic research capacity-building program. This presentation will outline the results of a project that has recently investigated QUT’s research support requirements and which has developed a model for the support of eResearch across the university. QUT’s research building strategy has produced growth at the faculty level and within its research institutes. This increased research activity is pushing the need for university-wide eResearch platforms capable of providing infrastructure and support in areas such as collaboration, data, networking, authentication and authorisation, workflows and the grid. One of the driving forces behind the investigation is data-centric nature of modern research. It is now critical that researchers have access to supported infrastructure that allows the collection, analysis, aggregation and sharing of large data volumes for exploration and mining in order to gain new insights and to generate new knowledge. However, recent surveys into current research data management practices by the Australian Partnership for Sustainable Repositories (APSR) and by QUT itself, has revealed serious shortcomings in areas such as research data management, especially its long term maintenance for reuse and authoritative evidence of research findings. While these internal university pressures are building, at the same time there are external pressures that are magnifying them. For example, recent compliance guidelines from bodies such as the ARC, and NHMRC and Universities Australia indicate that institutions need to provide facilities for the safe and secure storage of research data along with a surrounding set of policies, on its retention, ownership and accessibility. The newly formed Australian National Data Service (ANDS) is developing strategies and guidelines for research data management and research institutions are a central focus, responsible for managing and storing institutional data on platforms that can be federated nationally and internationally for wider use. For some time QUT has recognised the importance of eResearch and has been active in a number of related areas: ePrints to digitally publish research papers, grid computing portals and workflows, institutional-wide provisioning and authentication systems, and legal protocols for copyright management. QUT also has two widely recognised centres focused on fundamental research into eResearch itself: The OAK LAW project (Open Access to Knowledge) which focuses upon legal issues relating eResearch and the Microsoft QUT eResearch Centre whose goal is to accelerate scientific research discovery, through new smart software. In order to better harness all of these resources and improve research outcomes, the university recently established a project to investigate how it might better organise the support of eResearch. This presentation will outline the project outcomes, which include a flexible and sustainable eResearch support service model addressing short and longer term research needs, identification of resource requirements required to establish and sustain the service, and the development of research data management policies and implementation plans.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Advances in information and communications technologies during the last two decades have allowed organisations to capture and utilise data on a vast scale, thus heightening the importance of adequate measures for protecting unauthorised disclosure of personal information. In this respect, data breach notification has emerged as an issue of increasing importance throughout the world. It has been the subject of law reform in the United States and in other international jurisdictions. Following the Australian Law Reform Commission’s review of privacy, data breach notification will soon be addressed in Australia. This article provides a review of US and Australian legal initiatives regarding the notification of data breaches. The authors highlight areas of concern based on the extant US literature that require specific consideration in Australia regarding the development of an Australian legal framework for the notification of data breaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is part one of a three part study into the collective regulation processes of players in massive multiplayer online games (MMOG). Traditionally game playing has not been classed as problematic, however with introduction of new media technologies and new ways to play games, certain contexts have become obscure, namely the localised order of ‘playing online’ or how players manage and maintain order between each other as opposed to ‘following the rules’. Principally this paper will examine concepts of ‘virtual community’. These will be illustrated as particularly unhelpful when considering how people conduct themselves in these spaces. Thus, ‘virtual community’ will be seen as critical in implicating various online behaviours as superior to other online behaviours causing obscurity and blurring actions. This obscurity is grounded by strong associations in the virtual community as logic of practise in and of itself; behaviours that fall outside this category become common sense and as such are made invisible for investigation. This paper will draw upon the theories of Basil Bernstein and Pierre Bourdieu to produce a distinction between online behaviours and ultimately make them visible for further investigation. In doing so this paper seeks to form a basis for future research where interaction in these spaces can be identified as belonging to a certain framework to inform the design of online games and applications more effectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper uses the virtual world Second Life (as Web 2.0 environment) to discuss how sociological theory is a relevant tool for innovation in the area of games design as a methodological strategy. Via the theories of Erving Goffman’s interaction order the paper illustrates how micro studies of online interaction demonstrate active accounts of membership and complex interactivity. In order to achieve this, the paper outlines a methodological tool to assist in the application of micro sociology to Web 2.0 environments that accounts for the multiple dimensions of participation within the digital field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite increasingly sophisticated speed management strategies, speeding remains a significant contributing factor in 25% of Australia’s fatal crashes. Excessive speed is also a recognised contributor to road trauma in rapidly motorising countries such as China, where increases in vehicle ownership and new drivers, and a high proportion of vulnerable road users all contribute to a high road trauma rate. Speed choice is a voluntary behaviour. Therefore, driver perceptions are important to our understanding of the nature of speeding. This paper reports preliminary qualitative (focus groups) and quantitative (survey) investigations of the perceptions of drivers in Queensland and Beijing. Drivers’ definitions of speeding as well as their perceptions of the influence of legal factors on their reported speeds were explored. Survey participants were recruited from petrol stations (Queensland, n=833) and car washes (Beijing, n=299). Similarities were evident in justifications for exceeding speed limits across samples. Excessive speeds were not deemed as ‘speeding’ when drivers considered that they were safe and under their control, or when speed limits were seen as unreasonably low. This appears linked to perceptions of enforcement tolerances in some instances with higher perceived enforcement thresholds noted in China. Encouragingly, drivers in both countries reported a high perceived risk of apprehension if speeding. However, a substantial proportion of both samples also indicated perceptions of low certainty of receiving penalties when apprehended. Chinese drivers considered sanctions less severe than did Australian drivers. In addition, strategies to avoid detection and penalties were evident in both samples, with Chinese drivers reporting a broader range of avoidant techniques. Implications of the findings for future directions in speed management in both countries are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The middle years of schooling has emerged as an important focus in Australian education. Student disengagement and alienation, the negative effects of non-completion of the senior years of schooling and underachievement have raised concerns about the quality of education during the middle years. For many schools, reshaping the middle years has involved incorporating Information and Communication Technologies (ICT) to motivate students. However, simultaneously there is a need to ensure that programs are academically rigorous. There is little doubt that there are potential benefits to integrating ICT into programs for middle years’ students. However, little is known about how middle years’ teachers perceive higher order thinking, which is a component of academic rigour. This paper investigates the question of What are teachers’ perceptions of higher order thinking in an ICT environment? The study is underpinned by socio-cultural theory which is based on the belief that learning occurs through social interaction and that individuals are shaped by the social and cultural tools and instruments they engage with. This investigation used a collective case study design. Two methods were used for data collection. These methods are semi-structured interviews with individual teachers and a class and a focus group discussion with teachers. Findings indicate that teachers hold various perceptions of higher order thinking that lead to productive approaches to integrating ICT in middle years’ classrooms. The paper highlights that there may be a continuum of perceptions of higher order thinking with ICT. This continuum may inform professional developers who are guiding and supporting teachers to integrate ICT into middle years’ classrooms.