977 resultados para trade protection
Resumo:
This thesis is about the Australian domain name system and, in particular, the principles governing the registration of domain names in the '.au' country code domain space. It examines the different types of registration systems adopted in country code domain spaces and categorises them according to the extent to which they impose restrictions on registration, ranging from restrictive to unrestrictive. A comparative analysis is made of the restrictive registration system in Australia and the United Kingdom‘s unrestrictive system.
Resumo:
Prevailing video adaptation solutions change the quality of the video uniformly throughout the whole frame in the bitrate adjustment process; while region-of-interest (ROI)-based solutions selectively retains the quality in the areas of the frame where the viewers are more likely to pay more attention to. ROI-based coding can improve perceptual quality and viewer satisfaction while trading off some bandwidth. However, there has been no comprehensive study to measure the bitrate vs. perceptual quality trade-off so far. The paper proposes an ROI detection scheme for videos, which is characterized with low computational complexity and robustness, and measures the bitrate vs. quality trade-off for ROI-based encoding using a state-of-the-art H.264/AVC encoder to justify the viability of this type of encoding method. The results from the subjective quality test reveal that ROI-based encoding achieves a significant perceptual quality improvement over the encoding with uniform quality at the cost of slightly more bits. Based on the bitrate measurements and subjective quality assessments, the bitrate and the perceptual quality estimation models for non-scalable ROI-based video coding (AVC) are developed, which are found to be similar to the models for scalable video coding (SVC).
Resumo:
In 2001 China amended its copyright law in accordance with the requirements of the Agreement on Trade Related Aspects of Intellectual Property (TRIPS). This thesis explores the impact of copyright reform on China’s domestic film and music industries. Through extensive interviews with film and music industry workers – directors, producers, executives, judges, lawyers and musicians – it investigates the role of copyright in film and music’s shift from state driven to commercially focussed. The construction and negotiation of a new ‘copyright culture’ in China is examined through the lens of Yurchak’s (1999) concept of ‘entrepreneurial governmentality.’ Administrative structures put in place prior to China’s economic reform are no longer capable of controlling film and music production and consumption and new approaches to managing it are becoming more important. High levels of unauthorised distribution are forcing these industries to adapt their business models so that they can function in a system with weak copyright protection. Legal, economic and political changes have resulted in the emergence of an ‘entrepreneurial governmentality’ among film and music industry professionals. This commercially focussed group is, in turn, increasing pressure on the state to expand the space in which it can function and support efforts to strengthen the copyright system that allows it to exist. It is suggested that the construction and negotiation of a new ‘copyright culture’ is now taking place. This thesis describes the current situation in the film and music industries. It examines the tension between the theoretical possibilities created by copyright law, and the practical challenges of operating in China. It observes innovative business models being applied by film and music businesses in China. It discusses the impact of traditional attitudes to copying and also examines the role that open licensing models might play in helping limit the negative effects of copyright protection on public access to content and in raising levels of education about copyright among key groups within the community.
Resumo:
This latest briefing by Professor Reece Walters in the What is crime? series, draws attention to an area of harm that is often absent from criminological debate. He highlights the human costs of air pollution and failed attempts to adequately regulate and control such harm. Arguing for a cross disciplinary ‘eco-crime’ narrative, the author calls for greater understanding of the far-reaching consequences of air pollution which could set in train changes which may lead to a ‘more robust and meaningful system of justice’. Describing current arrangements in place to control and regulate air pollution, Walters draws attention to the lack of neutrality in current arrangements and the bias ‘towards the economic imperatives of free trade over and above the centrality of environmental protection’. While attention is often given to direct and individualised instances of ‘crime’, the serious consequences of air pollution are frequently neglected. The negative effects of pollution on health and well-being are often borne by people already experiencing a range of other disadvantages. In a global and national context, it is often the poor who are affected most. Ultimately, political and economic imperatives have historically helped to shape legal and regulatory regimes. Whether this is an inherent flaw in current systems or something that can be overcome in favour of dealing with more wide-ranging harms is an area that requires further discussion and debate.
Resumo:
The emerging principle of a “responsibility to protect” (R2P) presents a direct challenge to China’s traditional emphasis on the twin principles of non-intervention in the domestic affairs of other states and non-use of military force. This paper considers the evolution of China’s relationship with R2P over the past ten years. In particular, it examines how China engaged with R2P during the recent Libyan crisis, and considers what impact this conflict may have first, on Chinese attitudes to R2P, and second, on the future development and implementation of the doctrine itself. This paper argues that China’s decision to allow the passage of Security Council resolution 1973, authorising force in Libya, was shaped by an unusual set of political and factual circumstances, and should not be viewed as evidence of a dramatic shift in Chinese attitudes towards R2P. More broadly, controversy over the scope of NATO’s military action in Libya has raised questions about R2P’s legitimacy, which have contributed to a lack of timely international action in Syria. In the short term at least, this post-Libya backlash against R2P is likely to constrain the Security Council’s ability to respond decisively to other civilian protection situations.
Resumo:
This article, published in ON LINE Opinion on 26 October 2006, discusses the broad ranging amendments to the Copyright Act which (in part) implement obligations under the Australia-US Free Trade Agreement (AUSFTA) which were introduced into parliament on October 19, 2006. It covers issues relating to the criminalisation of copyright infringement, user rights and liabilities, and Technological Protection Measures (TPMs).
Resumo:
This article sketches some of the ways in which the language and concepts of cultural diversity are being taken up internationally. The debate has been driven in part by concerns about the treatment of cultural goods, services and knowledge in trade agreements. But it also involves larger questions about the role of the state, the role of non-state actors in domestic policy formation, and the shape and function of international policy communities comprising both state and non-state actors. The extent of the discussion of cultural diversity internationally is described through new formal and informal cultural networks and work towards an international instrument for cultural diversity to lay our ground rules for international trade, cultural exchange and policy principles to guide governmental responsibilities. The article concludes with analysis of some of these new networks, and investigates why Canada has been so prominent in these international efforts.
Resumo:
Ben Goldsmith and Christina Spurgeon introduce the special 'Culture, trade, services' issue of Media International Australia.
Resumo:
-International recognition of need for public health response to child maltreatment -Need for early intervention at health system level -Important role of health professionals in identifying, reporting, documenting suspician of maltreatment -Up to 10% of all children presenting at ED’s are victims and without identification, 35% reinjured and 5% die -In Qld, mandatory reporting requirement for doctors and nurses for suspected abuse or neglect
Resumo:
This paper presents a survey of previously presented vision based aircraft detection flight test, and then presents new flight test results examining the impact of camera field-of view choice on the detection range and false alarm rate characteristics of a vision-based aircraft detection technique. Using data collected from approaching aircraft, we examine the impact of camera fieldof-view choice and confirm that, when aiming for similar levels of detection confidence, an improvement in detection range can be obtained by choosing a smaller effective field-of-view (in terms of degrees per pixel).
Resumo:
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.
Resumo:
Intellectual Property - group of rights used to protect literary, artistic and industrial property. Generally separated into the categories of: • Copyright • Trade marks • Designs • Patents But also extends to specific subject matter of plant variety rights and circuit layouts and general information that is confidential such as trade secrets and protection of goodwill and reputation through the action of passing off. New information, be it a new computer program or novel device, developed by an organisation is valuable to it. So too is the organisation name and reputation. While some protection is automatic, like copyright, other protection and rights must be obtained under various legislation. When dealing with employees and third parties, ownership of existing and new rights needs to be clearly established so that rights are not lost. Obligations in relation to the use of certain property and any confidential information must also be clearly established...
Resumo:
In March 2000, the Department of Health and the Home Office issued guidance fundamentally altering policy and practice with regard to young people in prostitution. 1 Instead of being arrested and punished for prostitution-related offences, those under 18 years old were to be thought of as children ‘in need’ and offered welfare-based interventions. The practice that has developed in the last three years has offered interventions that are located within both child protection and youth justice work. This article examines these changes in order to generate insights about the changing nature of youth justice. In particular, it is argued that the drive to manage the risks posed by young people in prostitution to specific organisations, takes precedence over either the desire to care for, or the demand to punish them. Through an analysis of how practitioners and policy makers responsible for implementing this new approach to youth prostitution talk about ‘risk’ and ‘responsibility’, ‘liability’, ‘protection’ and ‘punishment’, the article argues that the contradiction between care and control has been re-interpreted, such that there is noticeable blurring of the boundaries between welfare and punishment at the margins of youth justice work.