857 resultados para crime and justice
Resumo:
While Australian cinema has produced popular movie genres since the 1970s, including action/adventure, road movies, crime, and horror movies, genre cinema has occupied a precarious position within a subsidised national cinema and has been largely written out of film history. In recent years the documentary Not Quite Hollywood (2008) has brought Australia’s genre movie heritage from the 1970s and 1980s back to the attention of cinephiles, critics and cult audiences worldwide. Since its release, the term ‘Ozploitation’ has become synonymous with Australian genre movies. In the absence of discussion about genre cinema within film studies, Ozploitation (and ‘paracinema’ as a theoretical lens) has emerged as a critical framework to fill this void as a de facto approach to genre and a conceptual framework for understanding Australian genres movies. However, although the Ozploitation brand has been extremely successful in raising the awareness of local genre flicks, Ozploitation discourse poses problems for film studies, and its utility is limited for the study of Australian genre movies. This paper argues that Ozploitation limits analysis of genre movies to the narrow confines of exploitation or trash cinema and obscures more important discussion of how Australian cinema engages with popular movies genres, the idea of Australian filmmaking as entertainment, and the dynamics of commercial filmmaking practises more generally.
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.
Resumo:
Crime in the Professions critically examines the nature and extent of crime and deviance in the professions and how it should be dealt with. The increasing professionalization of the work force and the changes in the way in which professionals carry out their work, such as through the use of computing and communications technology, have created new opportunities for professionals to break the law. Looking in detail at the nature and extent of crime committed by professionals such as doctors, accountants and nurses the book offers some innovative solutions on preventing and controlling professional crime. In addition to examining the nature and extent of crime in the professions, it also addresses some critical issues of regulation for the future, concerning new and emerging professional groups and issues relating to emerging technologies.
Resumo:
The broad objective of this study was to understand the incidence and severity of aggression among sexually abused girls who were trafficked and who were then further used for commercial sexual exploitation (referred to subsequently as sexually abused trafficked girls). In addition, the impact of counseling for minimizing aggression in these girls was investigated. A group of 120 sexually abused trafficked Indian girls and a group of 120 nonsexually abused Indian girls, aged 13 to 18, participated in the study. The sexually abused trafficked girls were purposively selected from four shelters located in and around Kolkata, India. The nonsexually abused girls were selected randomly from four schools situated near the shelters, and these girls were matched by age with the sexually abused trafficked girls. Data were collected using a Background Information Schedule and a standardized psychological test, that is, The Aggression Scale. Results revealed that 16.7% of the girls were first sexually abused between 6 and 9 years of age, 37.5% between 10 and 13 years of age, and 45.8% between 14 and 17 years of age. Findings further revealed that 4.2% of the sexually abused trafficked girls demonstrated saturated aggression, and 26.7% were highly aggressive, that is, extremely frustrated and rebellious. Across age groups, the sexually abused trafficked girls suffered from more aggression (p < .05), compared with the nonvictimized girls. Psychological interventions, such as individual and group counseling, were found to have a positive impact on the sexually abused trafficked girls. These findings should motivate counselors to deal with sexually abused children. It is also hoped that authorities in welfare homes will understand the importance of counseling for sexually abused trafficked children, and will appoint more counselors for this purpose.
Resumo:
As a strategy to identify child sexual abuse, most Australian States and Territories have enacted legislation requiring teachers to report suspected cases. Some Australian State and non-State educational authorities have also created policy-based obligations to report suspected child sexual abuse. Significantly, these can be wider than non-existent or limited legislative duties, and therefore are a crucial element of the effort to identify sexual abuse. Yet, no research has explored the existence and nature of these policy-based duties. The first purpose of this paper is to report the results of a three-State study into policy-based reporting duties in State and non-State schools in Australia. In an extraordinary coincidence, while conducting the study, a case of failure to comply with reporting policy occurred with tragic consequences. This led to a rare example in Australia (and one of only a few worldwide) of a professional being prosecuted for failure to comply with a legislative duty. It also led to disciplinary proceedings against school staff. The second purpose of this paper is to describe this case and connect it with findings from our policy analysis.
Resumo:
This chapter deals with the law concerning children and consent to medical treatment. Where a child under the age of 18 requires medical treatment, issues arise as to who may lawfully consent to the treatment and under what circumstances. Depending on the circumstances, consent may be given by the child’s parent or guardian; the child; or a court. The chapter provides a thorough treatment of Australian law about these issues and circumstances.
Resumo:
For some time now, research has suggested lesbian, gay, bisexual and transgender (LGBT) young people are ‘at-risk’ of victimisation and legally ‘risky’. Relatively few studies have examined how ‘risk factor’ research influences the everyday lives of LGBT young people. This paper reports how the experiences of police by 35 LGBT young people in Brisbane, Queensland reflected discourses about LGBT riskiness and how danger informed their interactions with police in public spaces. The participants specifically note how looking at-risk or looking risky affected their experiences of policing. The paper will conclude with recommendations for improved future policing practice.
Resumo:
Emotions play a central role in mediation as they help to define the scope and direction of a conflict. When a party to mediation expresses (and hence entrusts) their emotions to those present in a mediation, a mediator must do more than simply listen - they must attend to these emotions. Mediator empathy is an essential skill for communicating to a party that their feelings have been heard and understood, but it can lead mediators into trouble. Whilst there might exist a theoretical divide between the notions of empathy and sympathy, the very best characteristics of mediators (caring and compassionate nature) may see empathy and sympathy merge - resulting in challenges to mediator neutrality. This article first outlines the semantic difference between empathy and sympathy and the role that intrapsychic conflict can play in the convergence of these behavioural phenomena. It then defines emotional intelligence in the context of a mediation, suggesting that only the most emotionally intelligent mediators are able to emotionally connect with the parties, but maintain an impression of impartiality – the quality of remaining ‘attached yet detached’ to the process. It is argued that these emotionally intelligent mediators have the common qualities of strong self-awareness and emotional self-regulation.
Resumo:
Carbon capture and storage (CCS) is considered to be an integral transitionary measure in the mitigation of the global greenhouse gas emissions from our continued use of fossil fuels. Regulatory frameworks have been developed around the world and pilot projects have been commenced. However, CCS processes are largely untested at commercial scales and there are many unknowns associated with the long terms risks from these storage projects. Governments, including Australia, are struggling to develop appropriate, yet commercially viable, regulatory approaches to manage the uncertain long term risks of CCS activities. There have been numerous CCS regimes passed at the Federal, State and Territory levels in Australia. All adopt a different approach to the delicate balance facilitating projects and managing risk. This paper will examine the relatively new onshore and offshore regimes for CCS in Australia and the legal issues arising in relation to the implementation of CCS projects. Comparisons will be made with the EU CCS Directive where appropriate.
Resumo:
In Cook v Cook the Australian High Court held that the standard of reasonable care owed by a learner driver to an instructor, conscious of the driver’s lack of experience, was lower than that owed to other passengers and road users. Recently, in Imbree v McNeilly, the High Court declined to follow this principle, concluding that the driver’s status or relationship with the claimant should no longer influence or alter the standard of care owed. The decision therefore provides an opportunity to re-examine the rationale and policy behind current jurisprudence governing the standard of care owed by learner drivers. In doing so, this article considers the principles relevant to determining the standard and Imbree’s implications for other areas of tort law and claimant v defendant relationships. It argues that Imbree was influenced by changing judicial perceptions concerning the vulnerability of driving instructors and the relevance of insurance to tortious liability.
Resumo:
This third edition of Laying down the criminal law: A handbook for youth workers is essential to understanding young people’s experiences with criminal justice in Queensland. The text comprises detailed scenarios of situations where a young person would have contact with the system, and young people ‘in trouble’ (for example, being excluded from school). The text discusses how workers support the young person in talking to police, going to court, or being a victim of crime. One scenario notes how a youth worker responds to 15 year old Stephen staying at a youth shelter after leaving home and having contact with police. Scenarios are supplemented with information about confidentiality and negligence, and how workers consider these concepts supporting young people...
Resumo:
To be scholarly in learning and teaching is rigorous academic work. It demands: currency and command of both discipline subject matter and educational theory; inquiring, methodical, and reflective approaches; the collection, evaluation and documentation of evidence of learning and teaching efficacy; and, optimally, entails participation in and communication among a community of teaching professionals. This chapter examines the author’s own practice in this regard to explicate the ‘how’ and ‘why’ of scholarly and scholarship approaches, as much as the ‘what’ and ‘where’ of that endeavour. In doing so, this meta‐analysis is made ‘community property’, in the same way that Shulman (1993: 6) exhorted we ‘change the status of teaching from private to community property’ so that teaching might be more greatly valued in the academy.
Resumo:
It is generally acknowledged that mooting is an effective way to enhance the teaching of practical skills in legal education as well as to provide an authentic learning experience with links to the real world. However, there are a number of impediments to students participating in mooting; in particular being located off-campus, inexperience and lack of time. It has been suggested that technology may be a means of overcoming these impediments. However the use of technology in mooting has not been tested. This paper will report on a trial of the use of Second Life and Elluminate and videoconferencing as platforms for the conduct of moots. The trials identified limitations in the use of technology for mooting in particularly in relation to the development of advocacy skills. The paper will conclude that these limitations can be overcome by careful consideration of the appropriate technology to be used depending on the context and the objectives to be achieved by the moot. It will also suggest that in order to provide an authentic use of online communication technology in a court setting, the best available technology should be used for the conduct of moot competitions.