140 resultados para Fraudulent conveyance


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book provides a systematic and comprehensive account of the law relating to buyers and sellers of freehold land in Queensland. It analyses relevant clauses of the standard contracts in common use and the plethora of court decisions relating to the area.Its contents comprise a full transactional analysis of a conveyance from negotiation by a real estate agent through to completion. In addition, it contains chapters on special conditions, remedies, GST and stamp duty provisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The possibility of fraud lurks easily in the context of a mortgage transaction (as recently exemplified by the decision of the Queensland Court of Appeal in Young v Hoger [2001] QCA 461). A relatively novel issue, involving an allegation of fraudulent behaviour, arose for consideration by Justice Wilson in Unic v Quartermain Holdings Pty Ltd [2001] QSC 403

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stormwater has been recognised as one of the main culprits of aquatic ecosystem pollution and as a significant threat to the goal of ecological sustainable development. Water sensitive urban design is one of the key responses to the need to better manage urban stormwater runoff, the objectives of which go beyond rapid and efficient conveyance. Underpinned by the concepts of sustainable urban development, water sensitive urban design has proven to be an efficient and environmentally-friendly approach to urban stormwater management, with the necessary technical know-how and skills already available. However, large-scale implementation of water sensitive urban design is still lacking in Australia due to significant impediments and negative perceptions. Identification of the issues, barriers and drivers that affect sustainability outcomes of urban stormwater management is one of the first steps towards encouraging the wide-scale uptake of water sensitive urban design features which integrate sustainable urban stormwater management. This chapter investigates key water sensitive urban design perceptions, drivers and barriers in order to improve sustainable urban stormwater management efforts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Carbon credit markets are in the early stages of development and media headlines such as these illustrate emerging levels of concern and foreboding over the potential for fraudulent crime within these markets. Australian companies are continuing to venture into the largely unregulated voluntary carbon credit market to offset their emissions and / or give their customers the opportunity to be ‘carbon neutral’. Accordingly, the voluntary market has seen a proliferation of carbon brokers that offer tailored offset carbon products according to need and taste. With the instigation of the Australian compliance market and with pressure increasing for political responses to combat climate change, we would expect Australian companies to experience greater exposure to carbon products in both compliance and voluntary markets. This paper examines the risks of carbon fraud in these markets by reviewing cases of actual fraud and analysing and identifying contexts where risks of carbon fraud are most likely.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Financial literacy may not be as effective as previously thought in protecting against fraud victimisation. It does not inoculate investors from persuasion or social engineering tactics used by offenders to secure investment in fraudulent schemes. In fact, recent research indicates that overconfidence in investment knowledge may make individuals more susceptible to fraud. Using boiler room fraud as a case study, this article introduces the PREY (Profiled, Relational, Exploitable and Yielding) model to capture the psychological tactics used by fraud perpetrators to influence the thoughts and decision-making processes of individuals. The PREY model operationalizes the tenets of social engineering and demonstrates how such tactics could be re-engineered to increase the effectiveness of fraud prevention within the financial literacy context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

NSW Supreme Court decision - claim resulting from alleged damaging dental treatment of healthy teeth - failure of plaintiff to prove dishonest and fraudulent behaviour - assessment of damages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is a strong sense of negativity associated with online fraud victimization. Despite an increasing awareness, understanding about the reality of victimization experiences is not apparent. Rather, victims of online fraud are constructed as greedy and gullible and there is an overwhelming sense of blame and responsibility levelled at them for the actions that led to their losses. This belief transcends both non-victims and victims. The existence of this victim-blaming discourse is significant. Based on interviews with 85 seniors across Queensland, Australia, who received fraudulent emails, this article establishes the victim-blaming discourse as an overwhelmingly powerful and controlling discourse about online fraud victimization. However, the article also examines how humour acts as a tool to reinforce this discourse by isolating victims and impacting on their ability to disclose to those around them. Identifying and challenging this victim-blaming discourse, as well as the role of humour and its social acceptance, is a first step in the facilitation of victim recovery and future well-being.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Identity crime is argued to be one of the most significant crime problems of today. This paper examines identity crime, through the attitudes and practices of a group of seniors in Queensland, Australia. It examines their own actions towards the protection of their personal data in response to a fraudulent email request. Applying the concept of a prudential citizen (as one who is responsible for self-regulating their behaviour to maintain the integrity of one’s identity) it will be argued that seniors often expose identity information through their actions. However, this is demonstrated to be the result of flawed assumptions and misguided beliefs over the perceived risk and likelihood of identity crime, rather than a deliberate act. This paper concludes that to protect seniors from identity crime, greater awareness of appropriate risk-management strategies towards disclosure of their personal details is required to reduce their inadvertent exposure to identity crime.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Queensland Organised Crime Commission of Inquiry recently handed down its findings examining how organised crime has been policed in recent years. While media attention has been focused on the implications for child sexual exploitation and paedophilia, the report also made some substantial findings related to financial crimes such as investment fraud (commonly known as boiler rooms scams). Quite disturbingly, the report notes a strong victim blaming mentality that police expressed towards individuals who invested in fraudulent companies and who subsequently lost money in these boiler room scams. The attitude of the police towards boiler room victims was largely one of apathy towards the likelihood of any investigation, and of blame towards victims for not doing what was perceived to be “due diligence”. This finding illustrates several myths which are argued to exist around investment fraud victims, particularly around the concept of “due diligence”. It also feeds into the idea that victims are greedy/naïve and financially illiterate/not investment savvy. These are both problematic and largely inaccurate. Drawing on examples from my own research with fraud victims, the article will illustrate the complexity and sophistication of many boiler room schemes and demonstrate the difficulties in identifying fraudulent investment opportunities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The main objective of this study is to evaluate selected geophysical, structural and topographic methods on regional, local, and tunnel and borehole scales, as indicators of the properties of fracture zones or fractures relevant to groundwater flow. Such information serves, for example, groundwater exploration and prediction of the risk of groundwater inflow in underground construction. This study aims to address how the features detected by these methods link to groundwater flow in qualitative and semi-quantitative terms and how well the methods reveal properties of fracturing affecting groundwater flow in the studied sites. The investigated areas are: (1) the Päijänne Tunnel for water-conveyance whose study serves as a verification of structures identified on regional and local scales; (2) the Oitti fuel spill site, to telescope across scales and compare geometries of structural assessment; and (3) Leppävirta, where fracturing and hydrogeological environment have been studied on the scale of a drilled well. The methods applied in this study include: the interpretation of lineaments from topographic data and their comparison with aeromagnetic data; the analysis of geological structures mapped in the Päijänne Tunnel; borehole video surveying; groundwater inflow measurements; groundwater level observations; and information on the tunnel s deterioration as demonstrated by block falls. The study combined geological and geotechnical information on relevant factors governing groundwater inflow into a tunnel and indicators of fracturing, as well as environmental datasets as overlays for spatial analysis using GIS. Geophysical borehole logging and fluid logging were used in Leppävirta to compare the responses of different methods to fracturing and other geological features on the scale of a drilled well. Results from some of the geophysical measurements of boreholes were affected by the large diameter (gamma radiation) or uneven surface (caliper) of these structures. However, different anomalies indicating more fractured upper part of the bedrock traversed by well HN4 in Leppävirta suggest that several methods can be used for detecting fracturing. Fracture trends appear to align similarly on different scales in the zone of the Päijänne Tunnel. For example, similarities of patterns were found between the regional magnetic trends, correlating with orientations of topographic lineaments interpreted as expressions of fracture zones. The same structural orientations as those of the larger structures on local or regional scales were observed in the tunnel, even though a match could not be made in every case. The size and orientation of the observation space (patch of terrain at the surface, tunnel section, or borehole), the characterization method, with its typical sensitivity, and the characteristics of the location, influence the identification of the fracture pattern. Through due consideration of the influence of the sampling geometry and by utilizing complementary fracture characterization methods in tandem, some of the complexities of the relationship between fracturing and groundwater flow can be addressed. The flow connections demonstrated by the response of the groundwater level in monitoring wells to pressure decrease in the tunnel and the transport of MTBE through fractures in bedrock in Oitti, highlight the importance of protecting the tunnel water from a risk of contamination. In general, the largest values of drawdown occurred in monitoring wells closest to the tunnel and/or close to the topographically interpreted fracture zones. It seems that, to some degree, the rate of inflow shows a positive correlation with the level of reinforcement, as both are connected with the fracturing in the bedrock. The following geological features increased the vulnerability of tunnel sections to pollution, especially when several factors affected the same locations: (1) fractured bedrock, particularly with associated groundwater inflow; (2) thin or permeable overburden above fractured rock; (3) a hydraulically conductive layer underneath the surface soil; and (4) a relatively thin bedrock roof above the tunnel. The observed anisotropy of the geological media should ideally be taken into account in the assessment of vulnerability of tunnel sections and eventually for directing protective measures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Gender perceptions, religious belief systems, and political thought have excluded women from politics, for ages, around the world. Combining feminist and modernisation theorists in my theoretical framework, I examine the trends in patriarchal Europe and I highlight the gender-sensitive model of the Nordic countries. Retracing local gender patterns from precolonial to postcolonial eras in sub-Saharan Africa, I explore the links between perceptions, needs, resources, education and women's political participation in Cameroon. Democratisation is supposed to open up political participation, to grant equal opportunities to all adults. One ironic feature of the liberalisation process in Cameroon has been the decrease of women in parliamentarian representation (14% in 1988, 6% in 1992, 5% in 1997 and 10% in 2002). What social, cultural and institutional mechanisms produced this paradoxical outcome, the exclusion of half the population? The gender complementarity of the indigenous context has been lost to male prevalence privileged by education, church, law, employment, economy and politics in the public sphere; most women are marginalised in the private sphere. Nation building and development have failed; ethnicism and individualism are growing. Some hope lies in the growing civil society. From two surveys and 21 focus groups across Cameroon, in 2000 and 2002, some significant results of the processed empirical data reveal low electoral registration (34.5% women and 65.9% men), contrasted by the willingness to run for municipal elections (33.3 % women and 45.2% men). The co-existence of customary and statutory laws, the corrupt political system and fraudulent practices, contribute to the marginalisation of women and men who are interested in politics. A large majority of female respondents consider female politicians more trustworthy and capable than their male counterparts; they even foresee the appointment of a female Prime Minister. The Nordic countries have institutionalised gender equality in their legislation, policies and practices. France has improved women's political inclusion with the parity laws; Rwanda is another model of women's representation, thanks to its post-conflict constitution. From my analysis, Cameroonian institutions, men and more so women, may learn and borrow from these experiences, in order to design and implement a sustainable and gender-balanced democracy. Keywords: democratisation, politics, gender equality, feminism, citizenship, Cameroon, Nordic countries, Finland, France, United Kingdom, quotas, societal social psychology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: El objetivo de este trabajo es analizar la estrategia política del presidente Roberto M. Ortiz durante el período en actividad (1938-1940) para combatir el fraude electoral y normalizar las prácticas electorales e institucionalidad democrática de la Argentina de fines de los años treinta. Se presume que el presidente orientó su proyecto político de una manera aperturista y de diálogo sincero con la Unión Cívica Radical (UCR). Para ello promovió dos estrategias claras: lograr el apoyo de los sectores liberales del Ejército, e intervenir las provincias con prácticas fraudulentas. Su política contra el fraude provocó una situación inédita de erosión de la coalición de partidos oficialistas, base de sustentación del Poder Ejecutivo. Sin apoyo partidario, Ortiz quedó aislado y en clara confrontación con el Senado, dominado por grupos conservadores.