934 resultados para particular inheritance regimes
Resumo:
Effective environmental governance is hampered by the continuing presumption of the state as central actor in the domestic and international political contexts. Over the last 20 years, the traditional 'Westphalian' conception of the sovereign state has come under increasing pressure not only in theory, but also in practice, as evidenced by the increasing importance attributed to the participation of quasi-government and non-government actors in decision-making in domestic and international political issues. This paper is a contribution to the on-going debate about the meaning of effective environmental governance by mapping out a post-Westphalian conception of governance. In particular, it defines governance in relation to the protection of biodiversity; highlights obstacles to effective governance in this area, and discusses forming environmental management plans and environmental governance regimes to implement them. The final section of the paper suggests seven directions for ensuring the realisation of effective environmental governance.
Resumo:
Several studies have developed metrics for software quality attributes of object-oriented designs such as reusability and functionality. However, metrics which measure the quality attribute of information security have received little attention. Moreover, existing security metrics measure either the system from a high level (i.e. the whole system’s level) or from a low level (i.e. the program code’s level). These approaches make it hard and expensive to discover and fix vulnerabilities caused by software design errors. In this work, we focus on the design of an object-oriented application and define a number of information security metrics derivable from a program’s design artifacts. These metrics allow software designers to discover and fix security vulnerabilities at an early stage, and help compare the potential security of various alternative designs. In particular, we present security metrics based on composition, coupling, extensibility, inheritance, and the design size of a given object-oriented, multi-class program from the point of view of potential information flow.
Resumo:
This paper presents a conceptual framework, informed by Foucault’s work on governmentality, which allows for new kinds of reflection on the practice of legal education. Put simply, this framework suggests that legal education can be understood as a form of government that relies on a specific rationalisation and programming of the activities of legal educators, students, and administrators, and is implemented by harnessing specific techniques and bodies of ‘know-how’. Applying this framework to assessment at three Australian law schools, this paper highlights how assessment practices are rationalised, programmed, and implemented, and points out how this government shapes students’ legal personae. In particular, this analysis focuses on the governmental effects of pedagogical discourses that are dominant within the design and scholarship of legal education. It demonstrates that the development of pedagogically-sound regimes of assessment has contributed to a reformulation of the terrain of government, by providing the conditions under which forms of legal personae may be more effectively shaped, and extending the power relations that achieve this. This analysis provides legal educators with an original way of reflecting on the power effects of teaching the law, and new opportunities for thinking about what is possible in legal education.
Resumo:
The challenges of climate change pose problems requiring new and innovative legal responses by legal practitioners, government officials and corporate officers. This book addresses a broad range of topic areas where climate change has impact and systematically analyses the key legal responses to climate change, both at the international level and within Australia at federal, State and local levels. In particular, it critically examines: •the rights, duties and market mechanisms established under the international climate change regime •the effect of climate change policies on the implementation of environmental and planning laws •new regimes for the implementation of renewable energy and energy efficiency initiatives •legal frameworks for the implementation of biological and geological sequestration projects (including forest projects and carbon rights); and •legal principles for the design of an effective carbon trading scheme for Australia It also considers the role of the common law including: •the likely response of the law of torts to emerging forms of climate change harm; and •potential liabilities for professionals who must take climate change into account in their decision-making and advice
Resumo:
Resistance to rice virus diseases is an important requirement in many Southeast Asian rice breeding programs. Inheritance of resistance to rice tungro spherical virus (RTSV) in TW5, a near-isogenic line derived from Indonesian rice cultivar Utri Merah, was compared to that in TKM6, an Indian rice cultivar. Both TKM6 and Utri Merah are cultivars resistant to RTSV infections. Crosses were made between TKM6 and TN1, a susceptible cultivar, and between TW5 and TN1, and F3 lines were evaluated for their resistance to RTSV using two RTSV inoculum sources and a serological assay (ELISA). In TKM6, the resistance to the mixture of RTSV-V + RTBV inoculum source was controlled by a single recessive gene, whereas in TW5, the resistance was controlled by two recessive genes. A single recessive gene, however, controlled the resistance in TW5 when another RTSV variant, RTSV-VI, was used, suggesting that the resistance in TW5 depends on the nature of the RTSV inoculum used. RT-PCR, sequence, and phylogenetic analyses confirmed that RTSV-VI inoculum differs from RTSV-V inoculum and accurate phenotyping of the resistance to RTSV requires the use of a genetic marker.
Resumo:
Background In order to provide insights into the complex biochemical processes inside a cell, modelling approaches must find a balance between achieving an adequate representation of the physical phenomena and keeping the associated computational cost within reasonable limits. This issue is particularly stressed when spatial inhomogeneities have a significant effect on system's behaviour. In such cases, a spatially-resolved stochastic method can better portray the biological reality, but the corresponding computer simulations can in turn be prohibitively expensive. Results We present a method that incorporates spatial information by means of tailored, probability distributed time-delays. These distributions can be directly obtained by single in silico or a suitable set of in vitro experiments and are subsequently fed into a delay stochastic simulation algorithm (DSSA), achieving a good compromise between computational costs and a much more accurate representation of spatial processes such as molecular diffusion and translocation between cell compartments. Additionally, we present a novel alternative approach based on delay differential equations (DDE) that can be used in scenarios of high molecular concentrations and low noise propagation. Conclusions Our proposed methodologies accurately capture and incorporate certain spatial processes into temporal stochastic and deterministic simulations, increasing their accuracy at low computational costs. This is of particular importance given that time spans of cellular processes are generally larger (possibly by several orders of magnitude) than those achievable by current spatially-resolved stochastic simulators. Hence, our methodology allows users to explore cellular scenarios under the effects of diffusion and stochasticity in time spans that were, until now, simply unfeasible. Our methodologies are supported by theoretical considerations on the different modelling regimes, i.e. spatial vs. delay-temporal, as indicated by the corresponding Master Equations and presented elsewhere.
Resumo:
The end of the recent Communist occupation of the many countries bordering Russia marked an end to the tyranny of illegal and forced annexation. Amid these countries are my parents’ homelands, the small Baltic nations of Latvia and Estonia. Their occupation contravenes many of the numerous Articles listed by The Office of the High Commissioner for Human Rights in The Universal Declaration of Human Rights (2008), constituting many acts of violation. As a filmmaker, I was unusually incognizant of these events, despite my relationship to them. My parents never discussed the war, while during the ensuing Communist era, information was conspicuously absent. However, this lack of knowledge provided the incentive that compelled a journey of discovery that resulted in the making of Regimes and Rebels. This Masters project is presented is two parts. The film equates to 70% of the project (52 minutes in length), whilst the exegesis represents the remaining 30%. The film is a ‘human rights’, ‘video diary’ styled documentary film about the Communist occupation of my parents’ homelands, Latvia and Estonia, and the resonating effect of the occupation on our family living in Australia and family still living in the homelands. The production of the video diary is contextualised by this exegesis, which concurrently discusses the burgeoning video diary format as the basis for making a ‘human rights’ documentary film. A discussion about the latter genre of documentary film ensues, encompassing modes of representation, followed by various issues related to production including: issues of aesthetics, styles, digital media, lack of evidence and subjectivity analogous with both filmmaker and audience. Next, work by other filmmakers in the ‘human rights’ genre, linked to the proliferation of Communism in Europe, is discussed and analysed in terms of production and modes of representation. The exegesis ends with my experience as filmmaker and an analysis of factors that arose in making Regimes and Rebels.
Resumo:
To achieve the sustainable use and development of water resources is a daunting challenge for both the global and local communities. It requires commitments by all groups within the international, national and local communities from their own particular, possibly conflicting, perspectives. Without a set of coherent legal arrangements designed to ensure effective governance of water resources, their sustainable use and development are unlikely to be achieved. This study looks at how the legal arrangements for managing water resources have evolved across the continents over hundreds of years; their relevance for contemporary society; how the norms of current international and national legal regimes are responding; and, most importantly, how legal rights and duties should be structured so as to achieve sustainability in the future.
Resumo:
The Australian government, and opposition, are committed to facilitating high-speed broadband provision. In April 2009 the (then) Labor government announced a proposal to facilitate provision by mandating “…the use of fibre optic infrastructure … in greenfield estates ….” Separately, the installation of (usually overhead) cables commenced in select brownfield areas throughout Australia. In the lead up to the 2010 federal election, the broadband policy focus of the (then) federal opposition was to enabling private investment rather than direct investment by government itself. High-speed broadband is essential for Australia’s economic future. Whether implementation is undertaken by government, government owned corporations or private investors, will impact on the processes to be followed. Who does what, also will determine the rights available to land owners. The next stage, of necessity, will involve the establishment of procedures to require the retrofitting of existing urban environments. This clearly will have major property, property rights and valuation impacts. As Horan (2000) observed “…preserving... unique characteristics … of…regions requires a compromise between economic ambitions and social, cultural, and environmental values”. The uncertainty following the federal election, and the influence of independants with individual agendas; presents unique challenges for broadband implementation. This paper seeks to identify the processes to be followed by various potential broadband investors as they work to establish a ubiquitous network. It overviews current legislative regimes and examines concerns raised by stakeholders in various government reviews. It concludes by plotting a clear way forward to the future, with particular regard to property rights and usage.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.
Resumo:
In response to developments in international trade and an increased focus on international transfer-pricing issues, Canada’s minister of finance announced in the 1997 budget that the Department of Finance would undertake a review of the transfer-pricing provisions in the Income Tax Act. On September 11, 1997, the Department of Finance released draft transfer-pricing legislation and Revenue Canada released revised draft Information Circular 87-2R. The legislation was subsequently amended and included in Bill C-28, which received first reading on December 10, 1997. The new rules are intended to update Canada’s international transfer-pricing practices. In particular, they attempt to harmonize the standards in the Income Tax Act with the arm’s-length principle established in the OECD’s transfer pricing guidelines. The new rules also set out contemporaneous documentation requirements in respect of cross-border related-party transactions, facilitate administration of the law by Revenue Canada, and provide for a penalty where transfer prices do not comply with the arm’s-length principle. The Australian tax authorities have similarly reviewed and updated their transfer-pricing practices. Since 1992, the Australian commissioner of taxation has issued three rulings and seven draft rulings directly relating to international transfer pricing. These rulings outline the selection and application of transfer pricing methodologies, documentation requirements, and penalties for non-compliance. The Australian Taxation Office supports the use of advance pricing agreements (APAs) and has expanded its audit strategy by conducting transfer-pricing risk assessment reviews. This article presents a detailed review of Australia’s transfer-pricing policy and practices, which address essentially the same concerns as those at which the new Canadian rules are directed. This review provides a framework for comparison of the approaches adopted in the two jurisdictions. The author concludes that although these approaches differ in some respects, ultimately they produce a similar result. Both regimes set a clear standard to be met by multinational enterprises in establishing transfer prices. Both provide for audits and penalties in the event of noncompliance. And both offer the alternative of an APA as a means of avoiding transfer-pricing disputes with Australian and Canadian tax authorities.
Resumo:
Over the last twenty years, the use of open content licenses has become increasingly and surprisingly popular. The use of such licences challenges the traditional incentive-based model of exclusive rights under copyright. Instead of providing a means to charge for the use of particular works, what seems important is mitigating against potential personal harm to the author and, in some cases, preventing non-consensual commercial exploitation. It is interesting in this context to observe the primacy of what are essentially moral rights over the exclusionary economic rights. The core elements of common open content licences map somewhat closely to continental conceptions of the moral rights of authorship. Most obviously, almost all free software and free culture licences require attribution of authorship. More interestingly, there is a tension between social norms developed in free software communities and those that have emerged in the creative arts over integrity and commercial exploitation. For programmers interested in free software, licence terms that prohibit commercial use or modification are almost completely inconsistent with the ideological and utilitarian values that underpin the movement. For those in the creative industries, on the other hand, non-commercial terms and, to a lesser extent, terms that prohibit all but verbatim distribution continue to play an extremely important role in the sharing of copyright material. While prohibitions on commercial use often serve an economic imperative, there is also a certain personal interest for many creators in avoiding harmful exploitation of their expression – an interest that has sometimes been recognised as forming a component of the moral right of integrity. One particular continental moral right – the right of withdrawal – is present neither in Australian law or in any of the common open content licences. Despite some marked differences, both free software and free culture participants are using contractual methods to articulate the norms of permissible sharing. Legal enforcement is rare and often prohibitively expensive, and the various communities accordingly rely upon shared understandings of acceptable behaviour. The licences that are commonly used represent a formalised expression of these community norms and provide the theoretically enforceable legal baseline that lends them legitimacy. The core terms of these licences are designed primarily to alleviate risk in sharing and minimise transaction costs in sharing and using copyright expression. Importantly, however, the range of available licences reflect different optional balances in the norms of creating and sharing material. Generally, it is possible to see that, stemming particularly from the US, open content licences are fundamentally important in providing a set of normatively accepted copyright balances that reflect the interests sought to be protected through moral rights regimes. As the cost of creation, distribution, storage, and processing of expression continues to fall towards zero, there are increasing incentives to adopt open content licences to facilitate wide distribution and reuse of creative expression. Thinking of these protocols not only as reducing transaction costs but of setting normative principles of participation assists in conceptualising the role of open content licences and the continuing tensions that permeate modern copyright law.
Resumo:
Airports and cities inevitably recognise the value that each brings the other; however, the separation in decision-making authority for what to build, where, when and how provides a conundrum for both parties. Airports often want a say in what is developed outside of the airport fence, and cities often want a say in what is developed inside the airport fence. Defining how much of a say airports and cities have in decisions beyond their jurisdictional control is likely to be a topic that continues so long as airports and cities maintain separate formal decision-making processes for what to build, where, when and how. However, the recent Green and White Papers for a new National Aviation Policy have made early inroads to formalising relationships between Australia’s major airports and their host cities. At present, no clear indication (within practice or literature) is evident to the appropriateness of different governance arrangements for decisions to develop in situations that bring together the opposing strategic interests of airports and cities; thus leaving decisions for infrastructure development as complex decision-making spaces that hold airport and city/regional interests at stake. The line of enquiry is motivated by a lack of empirical research on networked decision-making domains outside of the realm of institutional theorists (Agranoff & McGuire, 2001; Provan, Fish & Sydow, 2007). That is, governance literature has remained focused towards abstract conceptualisations of organisation, without focusing on the minutia of how organisation influences action in real-world applications. A recent study by Black (2008) has provided an initial foothold for governance researchers into networked decision-making domains. This study builds upon Black’s (2008) work by aiming to explore and understand the problem space of making decisions subjected to complex jurisdictional and relational interdependencies. That is, the research examines the formal and informal structures, relationships, and forums that operationalise debates and interactions between decision-making actors as they vie for influence over deciding what to build, where, when and how in airport-proximal development projects. The research mobilises a mixture of qualitative and quantitative methods to examine three embedded cases of airport-proximal development from a network governance perspective. Findings from the research provide a new understanding to the ways in which informal actor networks underpin and combine with formal decision-making networks to create new (or realigned) governance spaces that facilitate decision-making during complex phases of development planning. The research is timely, and responds well to Isett, Mergel, LeRoux, Mischen and Rethemeyer’s (2011) recent critique of limitations within current network governance literature, specifically to their noted absence of empirical studies that acknowledge and interrogate the simultaneity of formal and informal network structures within network governance arrangements (Isett et al., 2011, pp. 162-166). The combination of social network analysis (SNA) techniques and thematic enquiry has enabled findings to document and interpret the ways in which decision-making actors organise to overcome complex problems for planning infrastructure. An innovative approach to using association networks has been used to provide insights to the importance of the different ways actors interact with one another, thus providing a simple yet valuable addition to the increasingly popular discipline of SNA. The research also identifies when and how different types of networks (i.e. formal and informal) are able to overcome currently known limitations to network governance (see McGuire & Agranoff, 2011), thus adding depth to the emerging body of network governance literature surrounding limitations to network ways of working (i.e. Rhodes, 1997a; Keast & Brown, 2002; Rethemeyer & Hatmaker, 2008; McGuire & Agranoff, 2011). Contributions are made to practice via the provision of a timely understanding of how horizontal fora between airports and their regions are used, particularly in the context of how they reframe the governance of decision-making for airport-proximal infrastructure development. This new understanding will enable government and industry actors to better understand the structural impacts of governance arrangements before they design or adopt them, particularly for factors such as efficiency of information, oversight, and responsiveness to change.