886 resultados para Joinder of parties


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we explore how BIM functionalities together with novel management concepts and methods have been utilized in thirteen hospital projects in the United States and the United Kingdom. Secondary data collection and analysis were used as the method. Initial findings indicate that the utilization of BIM enables a holistic view of project delivery and helps to integrate project parties into a collaborative process. The initiative to implement BIM must come from the top down to enable early involvement of all key stakeholders. It seems that it is rather resistance from people to adapt to the new way of working and thinking than immaturity of technology that hinders the utilization of BIM.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

If there is a silver lining to the adversarial, dispute-prone nature of the building and construction industry, it can be found in the concomitant rise of innovative dispute resolution mechanisms. Time, cost and relationship concerns have meant that the formal adversarial system holds little appeal for disputing parties. As these alternative forms of dispute avoidance/resolution have matured in Australia over the last 20 years, attention has turned to the key characteristics of each process and their suitability to the building and construction industry. This article considers the role of dispute review boards (DRBs) and mediation as two alternative methods for avoiding/resolving disputes in the construction industry. Criteria are established for evaluating the efficacy of these procedures and their sensitivity to the needs of construction industry disputants. The ultimate conclusion reached is that DRBs represent a powerful, yet underutilised dispute resolution tool in Australia, and possess many industry-specific advantages that more traditional forms of alternative dispute resolution (particularly mediation) do not provide.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Bay Area’s Center for Tactical Magic has been performing ‘‘magical’’ art interventions since 2000. The Center’s work augments traditional activist techniques by offering new conceptions of what art and activism can entail in a contemporary urban context. This article explores how Jacques Rancie`re’s reconfigured relationship between art and politics can be applied to the Center’s work, providing new distributions of the sensible for participants.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This book analyses the principles underlying the construction and application of a number of boilerplate and other clauses commonly included in commercial contracts. The first Part of the work deals with general principles of interpretation. It then considers clauses which allocate commercial risk; clauses relating to performance; clauses introducing new parties by way of assignment, novation or nomination; clauses such as guarantees and indemnities which create liabilities in third parties; and dispute resolution clauses including governing law. The authors highlight common issues surrounding the application of these clauses in practice and, where appropriate, make drafting recommendations based on their analysis of case law and the operation of relevant statutes. This is a very accessible resource for all commercial practitioners.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose – This paper seeks to analyse the process of packaged software selection in a small organization, focussing particularly on the role of IT consultants as intermediaries in the process. Design/methodology/approach – This is based upon a longitudinal, qualitative field study concerning the adoption of a customer relationship management package in an SME management consultancy. Findings – The authors illustrate how the process of “salesmanship”, an activity directed by the vendor/consultant and focussed on the interests of senior management, marginalises user needs and ultimately secures the procurement of the software package. Research limitations/implications – Despite the best intentions the authors lose something of the rich detail of the lived experience of technology in presenting the case study as a linear narrative. Specifically, the authors have been unable to do justice to the complexity of the multifarious ways in which individual perceptions of the project were influenced and shaped by the opinions of others. Practical implications – Practitioners, particularly those from within SMEs, should be made aware of the ways in which external parties may have a vested interest in steering projects in a particular direction, which may not necessarily align with their own interests. Originality/value – This study highlights in detail the role of consultants and vendors in software selection processes, an area which has received minimal attention to date. Prior work in this area emphasises the necessary conditions for, and positive outcomes of, appointing external parties in an SME context, with only limited attention being paid to the potential problems such engagements may bring.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Despite the importance of an effective health system response to various disasters, relevant research is still in its infancy, especially in middle- and low-income countries. Objective This paper provides an overview of the status of disaster health management in China, with its aim to promote the effectiveness of the health response for reducing disaster-related mortality and morbidity. Design A scoping review method was used to address the recent progress of and challenges to disaster health management in China. Major health electronic databases were searched to identify English and Chinese literature that were relevant to the research aims. Results The review found that since 2003 considerable progress has been achieved in the health disaster response system in China. However, there remain challenges that hinder effective health disaster responses, including low standards of disaster-resistant infrastructure safety, the lack of specific disaster plans, poor emergency coordination between hospitals, lack of portable diagnostic equipment and underdeveloped triage skills, surge capacity, and psychological interventions. Additional challenges include the fragmentation of the emergency health service system, a lack of specific legislation for emergencies, disparities in the distribution of funding, and inadequate cost-effective considerations for disaster rescue. Conclusions One solution identified to address these challenges appears to be through corresponding policy strategies at multiple levels (e.g. community, hospital, and healthcare system level).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In seeking to achieve Australian workplaces free from injury and disease NOHSC works to lead and coordinate national efforts to prevent workplace death, injury and disease. We seek to achieve our mission through the quality and relevance of information we provide and to influence the activities of all parties with roles in improving Australia’s OHS performance. NOHSC has five strategic objectives: • improving national data systems and analysis, • improving national access to OHS information, • improving national components of the OHS and related regulatory framework, • facilitating and coordinating national OHS research efforts, • monitoring progress against the National OHS Improvement Framework. This publication is a contribution to achieving those objectives

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This book reports on an empirically-based study of the manner in which the Magistrates' Courts in Victoria, construct occupational health and safety (OHS) issues when hearing prosecutions for offences under the Victorian OHS legislation. Prosecution has always been a controversial element in the enforcement armoury of OHS regulators, but at the same time it has long been argued that the low level of fines imposed by courts has had an important chilling effect on the OHS inspectorate's enforcement approaches, and on the impact of OHS legislation. Using a range of empirical research methods, including three samples of OHS prosecutions carried out in the Victorian Magistrates' Courts, Professor Johnstone shows how courts, inspectors, prosecutors and defence counsel are involved in filtering or reshaping OHS issues during the prosecution process, both pre-trial and in court. He argues that OHS offences are constructed by focusing on "events", in most cases incidents resulting in injury or death. This "event-focus" ensures that the attention of the parties is drawn to the details of the incident, and away from the broader context of the event. During the court-based sentencing process defence counsel is able to adopt a range of techniques which isolate the incident from its micro and macro contexts, thereby individualising and decontextualising the incident.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis reports on an empirically based study of the manner in which Victorian Magistrates Courts constructed occupational health and safety (OHS) issues when hearing prosecutions for offences under the Industrial Safety, Health and Welfare Act 1981 (the ISHWA) and the Occupational Health and Safety Act 1985 (OHSA) from 1983 to 1991. These statutes established OHS standards for employers and other relevant parties. The State government enforced these standards through an OHS inspectorate which had a range of enforcement powers, including prosecution. After outlining the historical development of Victoria’s OHS legislation, the magistracy’s historical role in its enforcement, and the development of an enforcement culture in which inspectors viewed prosecution as a last resort, the study shows how the key provisions of the ISHWA and OHSA required occupiers of workplaces and employers to provide and maintain safe systems of work, including the guarding of dangerous machinery. Using a wide range of empirical research methods and legal materials, it shows how the enforcement policies, procedures and practices of the inspectorate heavily slanted inspectors workplace investigations and hence prosecutions towards a restricted and often superficial, analysis of incidents (or “events”) most of which involved injuries on machinery. There was evidence, however, that after the establishment of the Central Investigation Unit in 1989 cases were more thoroughly investigated and prosecuted. From 1990 the majority of prosecutions were taken under the employer’s general duty provisions, and by 1991 there was evidence that prosecutions were focusing on matters other than machinery guarding.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Piracy is one of the main maritime security concerns in the contemporary world. The number of piracy incidents is increasing rapidly, which is highly problematic for maritime security. Although international law provides universal jurisdiction for the prosecution of maritime pirates, the actual number of prosecutions is alarmingly low compared to the number of incidents of piracy. Despite many states becoming parties to the relevant international conventions, they are reluctant to establish the necessary legal and institutional frameworks at the national level for the prosecution of pirates. The growing incidences of piracy and the consequential problems associated with prosecuting pirates have created doubts about the adequacy of the current international legal system, which is fully dependent on national courts for the prosecution of pirates. This article examines the possible ways for ensuring the effective prosecution of pirates. Contrary to the different proposals forwarded by researchers in the wake of Somali piracy for the establishment of international judicial institutions for the prosecution of pirates, this article argues that the operationalization of national courts through the proper implementation of relevant international legal instruments within domestic legal systems is the most viable solution. However, this article submits that the operationalization of national courts will not be very successful following the altruistic model of universal adjudicative jurisdiction. A state may enact legislation implementing universal jurisdiction but will not be very interested in prosecuting a pirate in its national court if it has no relation with the piratical incident. Rather, it will be successful if the global community seriously implement the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (SUA Convention), which obligates the states that have some connection with a piratical incident to prosecute pirates in their national courts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New public management (NPFM), with its hands-on, private sector-style performance measurement, output control, parsimonious use of resources, disaggreation of public sector units and greater competition in the public sector, has significantly affected charitable and nonprofit organisations delivering community services (Hood, 1991; Dunleavy, 1994; George & Wilding, 2002). The literature indicates that nonprofit organisations under NPM believe they are doing more for less: while administration is increasing, core costs are not being met; their dependence on government funding comes at the expense of other funding strategies; and there are concerns about proportionality and power asymmetries in the relationship (Kerr & Savelsberg, 2001; Powell & Dalton, 2011; Smith, 2002, p. 175; Morris, 1999, 2000a). Government agencies are under increased pressure to do more with less, demonstrate value for money, measure social outcomes, not merely outputs and minimise political risk (Grant, 2008; McGreogor-Lowndes, 2008). Government-community service organisation relationships are often viewed as 'uneasy alliances' characterised by the pressures that come with the parties' differing roles and expectations and the pressures that come with the parties' differing roles and expectations and the pressurs of funding and security (Productivity Commission, 2010, p. 308; McGregor-Lowndes, 2008, p. 45; Morris, 200a). Significant community services are now delivered to citizens through such relationships, often to the most disadvantaged in the community, and it is important for this to be achieved with equity, efficiently and effectively. On one level, the welfare state was seen as a 'risk management system' for the poor, with the state mitigating the risks of sickness, job loss and old age (Giddens, 1999) with the subsequent neoliberalist outlook shifting this risk back to households (Hacker, 2006). At the core of this risk shift are written contracts. Vincent-Jones (1999,2006) has mapped how NPM is characterised by the use of written contracts for all manner of relations; e.g., relgulation of dealings between government agencies, between individual citizens and the state, and the creation of quais-markets of service providers and infrastructure partners. We take this lens of contracts to examine where risk falls in relation to the outsourcing of community services. First we examine the concept of risk. We consider how risk might be managed and apportioned between governments and community serivce organisations (CSOs) in grant agreements, which are quasiy-market transactions at best. This is informed by insights from the law and economics literature. Then, standard grant agreements covering several years in two jurisdictions - Australia and the United Kingdom - are analysed, to establish the risk allocation between government and CSOs. This is placed in the context of the reform agenda in both jurisdictions. In Australia this context is th enonprofit reforms built around the creation of a national charities regulator, and red tape reduction. In the United Kingdom, the backdrop is the THird Way agenda with its compacts, succeed by Big Society in a climate of austerity. These 'case studies' inform a discussion about who is best placed to bear and manage the risks of community service provision on behalf of government. We conclude by identifying the lessons to be learned from our analysis and possible pathways for further scholarship.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Formal incentives systems aim to encourage improved performance by offering a reward for the achievement of project-specific goals. Despite argued benefits of incentive systems on project delivery outcomes, there remains debate over how incentive systems can be designed to encourage the formation of strong project relationships within a complex social system such as an infrastructure project. This challenge is compounded by the increasing emphasis in construction management research on the important mediating influence of technical and organisational context on project performance. In light of this challenge, the research presented in this paper focuses on the design of incentive systems in four infrastructure projects: two road reconstructions in the Netherlands and two building constructions in Australia. Based on a motivational theory frame, a cross case analysis is conducted to examine differences and similarities across social and cultural drivers impacting on the effectiveness of the incentive systems in light of infrastructure project context. Despite significant differences in case project characteristics, results indicate the projects’ experience similar social drivers impacting on incentive effectiveness. Significant value across the projects was placed on: varied performance goals and multiple opportunities to across the project team to pursue incentive rewards; fair risk allocation across contract parties; value-driven tender selection; improved design-build integration; and promotion of future work opportunities. However, differences across the contexts were identified. Results suggest future work opportunities were a more powerful social driver in upholding reputation and establishing strong project relationships in the Australian context. On the other hand, the relationship initiatives in the Dutch context seemed to be more broadly embraced resulting in a greater willingness to collaboratively manage project risk. Although there are limitations with this research in drawing generalizations across two sets of case projects, the results provide a strong base to explore the social and cultural influences on incentive effectiveness across different geographical and contextual boundaries in future research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A staged crime scene involves deliberate alteration of evidence by the offender to simulate events that did not occur for the purpose of misleading authorities (Geberth, 2006; Turvey, 2000). This study examined 115 staged homicides from the USA to determine common elements; victim and perpetrator characteristics; and specific features of different types of staged scenes. General characteristics include: multiple victims and offenders; a previous relationship be- tween parties involved; and victims discovered in their own home, often by the offender. Staged scenes were separated by type with staged burglaries, suicides, accidents, and car accidents examined in more detail. Each type of scene displays differently with separate indicators and common features. Features of staged burglaries were: no points of entry/exit staged; non-valuables taken; scene ransacking; offender self- injury; and offenders bringing weapons to the scene. Features of staged suicides included: weapon arrangement and simulating self-injury to the victim; rearranging the body; and removing valuables. Examples of elements of staged accidents were arranging the implement/weapon and re- positioning the deceased; while staged car accidents involved: transporting the body to the vehicle and arranging both; mutilation after death; attempts to secure an alibi; and clean up at the primary crime scene. The results suggest few staging behaviors are used, despite the credibility they may have offered the façade. This is the first peer-reviewed, published study to examine the specific features of these scenes, and is the largest sample studied to date.