956 resultados para Japan -- Military policy
Resumo:
There are emerging movements in several countries to improve policy and practice to protect children from exposure to domestic violence. These movements have resulted in the collection of new data on EDV and the design and implementation of new child welfare policies and practices. To assist with the development of child welfare practice, this article summarizes current knowledge on the prevalence of EDV, and on child welfare services policies and practices that may hold promise for reducing the frequency and impact of EDV on children. We focus on Australia, Canada, and the United States, as these countries share a similar socio-legal context, a long history of enacting and expanding legislation about reporting of maltreatment, debates regarding the application of reporting laws to EDV, and new child welfare practices that show promise for responding more effectively to EDV.
Concerns about the rollout of broadband : a legal consideration of Australia’s NBN greenfield policy
Resumo:
This paper examines the Australian federal government’s proposal that developers take the primary role for deploying the National Broadband Network (‘NBN’) in greenfield estates. It identifies issues facing the NBN’s implementation and concerns raised by industry. A failure to address these concerns may lessen industry support as well as adversely impact on consumers as NBN implementation costs are passed onto them. The author identifies the need for NBN legislation to clearly establish what is a ‘greenfield estate’; how and when exemptions from implementation obligations will apply; and that NBN services must be treated the same as any other utility service.
Resumo:
Each year the Australian Federal Treasury releases its Tax Expenditures Statement providing details of concessions, benefits, and incentives delivered through the tax regime to Australian taxpayers. The current Tax Expenditures Statement, released on 25 January 2008, lists approximately 300 tax expenditures and reports on the estimated pecuniary value in terms of revenue foregone, estimated to be a total of $50.12 billion for the 2006-07 financial year. Apart from the annual Tax Expenditures Statement, and despite the recurring fiscal impact, there is very little other scrutiny of Australia’s Federal tax expenditures program. This is despite tax expenditures often being seen as an alternative to direct expenditures with similar impact on the Federal budget. The object of tax expenditures is to provide government assistance and meet government objectives, and, as such, tax expenditures are departures from the revenue raising aspect of the tax regime. Within this context, this article examines the fundamental concept of tax expenditures as contrasted with direct expenditures and considers the role they play in the current tax regime.
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Resumo:
This series of research vignettes is aimed at sharing current and interesting research findings from our team and other international Entrepreneurship researchers. In this vignette, Professor Helene Ahl from Jonkoping University considers the consequences for gender equality of policy for women's entrepreneurship in two countries with distinctly different welfare state regimes.
Resumo:
This article sketches some of the ways in which the language and concepts of cultural diversity are being taken up internationally. The debate has been driven in part by concerns about the treatment of cultural goods, services and knowledge in trade agreements. But it also involves larger questions about the role of the state, the role of non-state actors in domestic policy formation, and the shape and function of international policy communities comprising both state and non-state actors. The extent of the discussion of cultural diversity internationally is described through new formal and informal cultural networks and work towards an international instrument for cultural diversity to lay our ground rules for international trade, cultural exchange and policy principles to guide governmental responsibilities. The article concludes with analysis of some of these new networks, and investigates why Canada has been so prominent in these international efforts.
Resumo:
This paper considers the debate about the relationship between globalization and media policy from the perspective provided by a current review of the Australian media classification scheme. Drawing upon the author’s recent experience in being ‘inside’ the policy process, as Lead Commissioner on the Australian National Classification Scheme Review, it is argued that theories of globalization – including theories of neoliberal globalization – fail to adequately capture the complexities of the reform process, particularly around the relationship between regulation and markets. The paper considers the pressure points for media content policies arising from media globalization, and the wider questions surrounding media content policies in an age of media convergence.
Resumo:
On 1 January 2010, the Assisted Reproductive Treatment Act 2008 (Vic) came into force. The legislation was the outcome of a detailed review and consultation process undertaken by the Victorian Law Reform Commission. Arguably, the change to the regulatory framework represents a significant shift in policy compared to previous regulatory approaches on this topic in Victoria. This article considers the impact of the new legislation on eligibility for reproductive treatments, focusing on the accessibility of such services for the purpose of creating a “saviour sibling”. It also highlights the impact of the Victorian regulatory body’s decision to abolish its regulatory policies on preimplantation genetic diagnosis and preimplantation tissue-typing, concluding that the regulatory approach in relation to these latter issues is similar to other Australian jurisdictions where such practices are not addressed by a statutory framework.
Resumo:
- Speeding and crash involvement in Australia - Speed management in Australia - Jurisdictional differences - National Road Safety Strategy (2011-2020) - Auditor-General reviews of speed camera programs - The role of public opinion/feedback - Implications for speed management
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.