795 resultados para Trials (Breach of promise)
Resumo:
This paper examines the extent to which women movement into management positions. Like many other countries, this progress in Australia is slow. The paper includes discussion of the theoretical explanations for this and the extent to which these are borne out in Australia. We are aware this group represents only a minority of Australian women workers, and there are many other groups of women workers for whom constraints to women’s access to senior management may not be the most pressing issue. We have, however, chosen to focus on women in management in this paper, as while there was considerable research and public policy attention directed towards this group in the 1980s and early 1990s, over the past decade there seems to have been a reluctance to continue to address this group, despite the numerical evidence that women continue to be disproportionately represented in senior management positions. We believe it’s timely to refocus on women in management.
Resumo:
The purpose of this paper is to conduct a qualitative review of randomised controlled trials in relation to the treatment of adults with co-occurring mental health and substance use disorder (MH/SUD). In particular, integrated approaches are compared with non-integrated approaches to treatment. Ten articles were identified for inclusion in the review. The findings are equivocal with regard to the superior efficacy of integrated approaches to treatment, although the many limitations of the studies need to be considered in our understanding of this finding. Clearly, this is an extremely challenging client group to engage and maintain in intervention research, and the complexity and variability of the problems render control particularly difficult. The lack of available evidence to support the superiority of integration is discussed in relation to these challenges. Much remains to be investigated with regard to integrated management and care for people with co-occurring and MH/SUD, particularly for specific combinations of dual diagnosis and giving consideration to the level of inter-relatedness between the disorders.
Resumo:
The ascendency of neoliberal ideas in education and social policy in the 1980s and 1990s was succeeded in the new millennium by a ‘new’ social democratic commitment with emphases on community empowerment, building social capital and a ‘whole of government’ approach to partnering with civil society to meet community needs. In Australia this approach has resulted in the development of partnerships between schools and community organisations formed as part of a targeted, holistic approach to service delivery to meet the settlement and educational needs of refugee youth. Drawing on interviews conducted with community workers and government officers involved in the school-community partnerships, we document how these partnerships are working ‘on the ground’ in Queensland schools. We analyse our findings against the international literature on changing notions of neoliberal governance, and discuss the implications of the shift to the ‘partnering state’ for schools and community organisations working with refugee young people.
Resumo:
China is now seen as arguably, the next economic giant of the 21st century. From a country closed in the past to the external world, the Chinese market now presents as one of the most lucrative in the world economy. One area that has drawn increasing international interest is education - it has been estimated that by 2020 there will be 25 million excess demands for higher education places that the Chinese tertiary educational system cannot meet. Many overseas institutions have developed programs to cater for this immense potential market. In 2000 the Law Faculty of the University of Technology, Sydney (UTS)introduced a new postgraduate program specifically targeting the Chinese market. This paper is a brief assessment of the program - it examines general issues in the pedagogical delivery of programs in LOTE (Language Other Than English) and the use of 'proxies' in the delivery of LOTE programs. The paper concludes that while the UTS program demonstrates that it is feasible to use proxy lecturers or interpreters in the delivery of programs in LOTE, the exercise entails significant problems that can undermine the integrity of such programs.
Contextualizing the tensions and weaknesses of information privacy and data breach notification laws
Resumo:
Data breach notification laws have detailed numerous failures relating to the protection of personal information that have blighted both corporate and governmental institutions. There are obvious parallels between data breach notification and information privacy law as they both involve the protection of personal information. However, a closer examination of both laws reveals conceptual differences that give rise to vertical tensions between each law and shared horizontal weaknesses within both laws. Tensions emanate from conflicting approaches to the implementation of information privacy law that results in different regimes and the implementation of different types of protections. Shared weaknesses arise from an overt focus on specified types of personal information which results in ‘one size fits all’ legal remedies. The author contends that a greater contextual approach which promotes the importance of social context is required and highlights the effect that contextualization could have on both laws.
Resumo:
There are at least four key challenges in the online news environment that computational journalism may address. Firstly, news providers operate in a rapidly evolving environment and larger businesses are typically slower to adapt to market innovations. News consumption patterns have changed and news providers need to find new ways to capture and retain digital users. Meanwhile, declining financial performance has led to cost cuts in mass market newspapers. Finally investigative reporting is typically slow, high cost and may be tedious, and yet is valuable to the reputation of a news provider. Computational journalism involves the application of software and technologies to the activities of journalism, and it draws from the fields of computer science, social science and communications. New technologies may enhance the traditional aims of journalism, or may require “a new breed of people who are midway between technologists and journalists” (Irfan Essa in Mecklin 2009: 3). Historically referred to as ‘computer assisted reporting’, the use of software in online reportage is increasingly valuable due to three factors: larger datasets are becoming publicly available; software is becoming sophisticated and ubiquitous; and the developing Australian digital economy. This paper introduces key elements of computational journalism – it describes why it is needed; what it involves; benefits and challenges; and provides a case study and examples. Computational techniques can quickly provide a solid factual basis for original investigative journalism and may increase interaction with readers, when correctly used. It is a major opportunity to enhance the delivery of original investigative journalism, which ultimately may attract and retain readers online.
Resumo:
Computational journalism involves the application of software and technologies to the activities of journalism, and it draws from the fields of computer science, the social sciences, and media and communications. New technologies may enhance the traditional aims of journalism, or may initiate greater interaction between journalists and information and communication technology (ICT) specialists. The enhanced use of computing in news production is related in particular to three factors: larger government data sets becoming more widely available; the increasingly sophisticated and ubiquitous nature of software; and the developing digital economy. Drawing upon international examples, this paper argues that computational journalism techniques may provide new foundations for original investigative journalism and increase the scope for new forms of interaction with readers. Computer journalism provides a major opportunity to enhance the delivery of original investigative journalism, and to attract and retain readers online.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
In this article I would like to examine the promise and possibilities of music, digital media and National Broadband Network. I will do this based on concepts that have emerged from a study undertaken by Professor Andrew Brown and I that categorise technologies into what we term representational technologies and technologies with agency