928 resultados para Border
Resumo:
The pertinence of this book cannot be overemphasised. The world’s refugee crisis has reached a two‐decade high with the United Nations recently announcing that ‘displacement is the new 21st century challenge’ (UNHCR 2013). The transnational movement of dislocated peoples fleeing conflict, persecution and poverty is a global responsibility requiring nation states to collaborate for humanitarian resolutions embedded in human rights. However, in times of human rights expansionism, and the relaxation of borders for maximising free‐trade and fiscal prosperity, the movement of people experiencing immense abuse and deprivation has witnessed an increase in draconian regulation within discourses of intolerance and deterrence. Weber and Pickering cogently and emphatically emphasise the human cost of inhumane and populist government immigration and border‐entry polices underpinned by ideologies of retribution, suspicion, and demonisation. It is a moving and engaging narrative: a book that exposes state prejudice and abuse, whilst advocating for the victims who undertake perilous journeys in search of safety from lives of violence and persecution. Moreover, it is a book that pushes ideological boundaries and seeks new criminological horizons, for which the authors must be sincerely congratulated. It is a text of innovation, inspired thinking and long lasting criminological value.
Resumo:
In this practice-led research project I work to show how a re-reading and a particular form of listening to the sound-riddled nature of Gertrude Stein's work, Two: Gertrude Stein and her Brother, presents us with a contemporary theory of sound in language. This theory, though in its infancy, is a particular enjambment of sounded language that presents itself as an event, engaged with meaning, with its own inherent voice. It displays a propensity through engagement with the 'other' to erupt into love. In this thesis these qualities are reverberated further through the work of Seth Kim-Cohen's notion of the non-cochlear, Simon Jarvis's notion of musical thinking, Jean-Jacques Lecercle's notion of délire or nonsense, Luce Irigaray's notion of jouissant love and the Bracha Ettinger's notion of the generative matrixial border space. This reading then is simultaneously paired with my own work of scoring and creating a digital opera from Stein's work, thereby testing and performing Stein's theory. In this I show how a re-reading and relistening to Stein's work can be significant to feminist ethical language frames, contemporary philosophy, sonic art theory and digital language frames. Further significance of this study is that when the reverberation of Stein's engagements with language through sound can be listened to, a pattern emerges, one that encouragingly problematizes subjectivity and interweaves genres/methods and means, creating a new frame for sound in language, one with its own voice that I call soundage.
Resumo:
We have tested a methodology for the elimination of the selectable marker gene after Agrobacterium-mediated transformation of barley. This involves segregation of the selectable marker gene away from the gene of interest following co-transformation using a plasmid carrying two T-DNAs, which were located adjacent to each other with no intervening region. A standard binary transformation vector was modified by insertion of a small section composed of an additional left and right T-DNA border, so that the selectable marker gene and the site for insertion of the gene of interest (GOI) were each flanked by a left and right border. Using this vector three different GOIs were transformed into barley. Analysis of transgene inheritance was facilitated by a novel and rapid assay utilizing PCR amplification from macerated leaf tissue. Co-insertion was observed in two thirds of transformants, and among these approximately one quarter had transgene inserts which segregated in the next generation to yield selectable marker-free transgenic plants. Insertion of non-T-DNA plasmid sequences was observed in only one of fourteen SMF lines tested. This technique thus provides a workable system for generating transgenic barley free from selectable marker genes, thereby obviating public concerns regarding proliferation of these genes.
Resumo:
This thesis has created a space for women in the history of the decolonisation of the Gilbert Islands. It traces the historical development of the national women's interests program in the Republic of Kiribati (formerly of the Gilbert and Ellice Islands Colony (GEIC)) as it was implemented through a network of women's clubs during the 1960s and 1970s. This thesis has provided the first history and interpretation of the Indigenous women's interests movement as it impacted the Gilbert Islands. It offers a narrative of the movement in terms of three overlapping waves of women leaders, based on an analysis of fieldwork, archival research and interviews conducted on South Tarawa, Kiribati.
Resumo:
BACKGROUND Malaria remains a public health problem in the remote and poor area of Yunnan Province, China. Yunnan faces an increasing risk of imported malaria infections from Mekong river neighboring countries. This study aimed to identify the high risk area of malaria transmission in Yunnan Province, and to estimate the effects of climatic variability on the transmission of Plasmodium vivax and Plasmodium falciparum in the identified area. METHODS We identified spatial clusters of malaria cases using spatial cluster analysis at a county level in Yunnan Province, 2005-2010, and estimated the weekly effects of climatic factors on P. vivax and P. falciparum based on a dataset of daily malaria cases and climatic variables. A distributed lag nonlinear model was used to estimate the impact of temperature, relative humidity and rainfall up to 10-week lags on both types of malaria parasite after adjusting for seasonal and long-term effects. RESULTS The primary cluster area was identified along the China-Myanmar border in western Yunnan. A 1°C increase in minimum temperature was associated with a lag 4 to 9 weeks relative risk (RR), with the highest effect at lag 7 weeks for P. vivax (RR = 1.03; 95% CI, 1.01, 1.05) and 6 weeks for P. falciparum (RR = 1.07; 95% CI, 1.04, 1.11); a 10-mm increment in rainfall was associated with RRs of lags 2-4 weeks and 9-10 weeks, with the highest effect at 3 weeks for both P. vivax (RR = 1.03; 95% CI, 1.01, 1.04) and P. falciparum (RR = 1.04; 95% CI, 1.01, 1.06); and the RRs with a 10% rise in relative humidity were significant from lag 3 to 8 weeks with the highest RR of 1.24 (95% CI, 1.10, 1.41) for P. vivax at 5-week lag. CONCLUSIONS Our findings suggest that the China-Myanmar border is a high risk area for malaria transmission. Climatic factors appeared to be among major determinants of malaria transmission in this area. The estimated lag effects for the association between temperature and malaria are consistent with the life cycles of both mosquito vector and malaria parasite. These findings will be useful for malaria surveillance-response systems in the Mekong river region.
Resumo:
We developed a reproducible model of deep dermal partial thickness burn injury in juvenile Large White pigs. The contact burn is created using water at 92 degrees C for 15s in a bottle with the bottom replaced with plastic wrap. The depth of injury was determined by a histopathologist who examined tissue sections 2 and 6 days after injury in a blinded manner. Upon creation, the circular wound area developed white eschar and a hyperaemic zone around the wound border. Animals were kept for 6 weeks or 99 days to examine the wound healing process. The wounds took between 3 and 5 weeks for complete re-epithelialisation. Most wounds developed contracted, purple, hypertrophic scars. On measurement, the thickness of the burned skin was approximately 1.8 times that of the control skin at week 6 and approximately 2.2 times thicker than control skin at 99 days after injury. We have developed various methods to assess healing wounds, including digital photographic analysis, depth of organising granulation tissue, immunohistochemistry, electron microscopy and tensiometry. Immunohistochemistry and electron microscopy showed that our porcine hypertrophic scar appears similar to human hypertrophic scarring. The development of this model allows us to test and compare different treatments on burn wounds.
Resumo:
Malaria has been a heavy social and health burden in the remote and poor areas in southern China. Analyses of malaria epidemic patterns can uncover important features of malaria transmission. This study identified spatial clusters, seasonal patterns, and geographic variations of malaria deaths at a county level in Yunnan, China, during 1991–2010. A discrete Poisson model was used to identify purely spatial clusters of malaria deaths. Logistic regression analysis was performed to detect changes in geographic patterns. The results show that malaria mortality had declined in Yunnan over the study period and the most likely spatial clusters (relative risk [RR] = 23.03–32.06, P < 0.001) of malaria deaths were identified in western Yunnan along the China–Myanmar border. The highest risk of malaria deaths occurred in autumn (RR = 58.91, P < 0.001) and summer (RR = 31.91, P < 0.001). The results suggested that the geographic distribution of malaria deaths was significantly changed with longitude, which indicated there was decreased mortality of malaria in eastern areas over the last two decades, although there was no significant change in latitude during the same period. Public health interventions should target populations in western Yunnan along border areas, especially focusing on floating populations crossing international borders.
Resumo:
The notion of sovereignty is central to any international tax issue. While a nation is free to design its tax laws as it sees fit and raise revenue in accordance with the needs of its citizens, it is not possible to undertake such a task in isolation. In a world of cross-border investments and business transactions, all tax regimes impact on one another. Tax interactions between sovereign states cannot be avoided. Ultimately, the interactions mean that a nation must decide whether to engage in both collaboration and coordination with other nations and supranational bodies alike or maintain an individualised stance in relation to its tax policy. Whatever the decision, there is arguably an exercise in national sovereignty in some form. In the context of an international tax regime, whether that regime is interpreted broadly as meaning international norms generally adopted by nations around the world or domestic regimes legislating for cross-border transactions, rhetoric around national fiscal sovereignty takes on many different forms. At one end of the spectrum it is relied upon by financial secrecy jurisdictions (tax havens) as a defence to their position on the basis that ‘other’ nations cannot interfere with the fiscal sovereignty of a jurisdiction. At the other end of the spectrum, it is argued that profit shifting and international tax avoidance if not stopped is, in and of itself, a threat to a nation’s fiscal sovereignty on the basis that it threatens the ability to tax and raise the revenue needed. This paper considers a modern conceptualisation of sovereignty along with its role within international tax coordination and collaboration to argue that a move towards a more unified approach to addressing international base erosion and profit shifting may be the ultimate exercise of national fiscal sovereignty. By using the current transfer pricing regime as a case study, this paper posits that it is not merely enough to have international agreement on allocation rules to be applied, but that the ultimate exercise of national sovereignty is political agreement with other states to ensure that it is governments which determine the allocational basis of worldwide profits to be taxed. In doing so, it is demonstrated that the arm’s length pricing requirement of the current transfer pricing regime, rather than providing governments with the ability to determine the location of profits, is providing multinational entities with the ultimate power to determine that location. If left unchecked, this will eventually erode a nation’s ability to capture the required tax revenue and, as a consequence, may be deemed a failure by nation states to exercise their fiscal sovereignty.
Resumo:
In 2006, the American Law Institute (ALI) and the International Insolvency Institute (III) established a Transnational Insolvency Project and appointed Professor Ian Fletcher (United Kingdom) and Professor Bob Wessels (Netherlands) as Joint Reporters. The objective was to investigate whether the essential provisions of the ALI Principles of Cooperation among the NAFTA Countries (ALI-NAFTA Principles) and the annexed Guidelines Applicable to Court-to-Court Communication in Cross-border Cases (ALI-NAFTA Guidelines) may, with certain necessary modifications, be acceptable for use by jurisdictions across the world. In 2012, Professor Fletcher and Professor Wessels presented the report Transnational Insolvency: Global Principles for Cooperation in International Insolvency Cases (“ALI-III Report”) to the Annual Meetings of the American Law Institute and the International Insolvency Institute. In 2013, the Australian Academy of Law (AAL) provided support to the authors to undertake research on the possible benefits for Australia of courts and insolvency administrators of referring to the ALI-III Report when addressing international insolvency cases. This AAL project was at the request of the Council of Chief Justices of Australia and New Zealand. This research Report compares the Global Principles for Cooperation in International Insolvency Cases with the Cross-border Insolvency Act 2008 and the UNCITRAL Model Law as it has been adopted and has force of law in Australia. Further, it examines the Global Guidelines for Court-to-Court Communications in International Insolvency Cases in light of Australian cross-border insolvency and procedural law. Finally, it makes brief reference to and commentary on the Global Rules on Conflict–of-Laws Matters in International Insolvency Cases annexed to the ALI-III Report from the perspective of Australian choice of law rules.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.
Resumo:
In vitro analyses of basement membrane invasiveness employing Matrigel (a murine tumor extract rich in basement membrane components) have been performed on human breast cancer model systems. Constitutive invasiveness of different human breast cancer (HBC) cell lines has been examined as well as regulation by steroid hormones, growth factors, and oncogenes. Carcinoma cells exhibiting a mesenchymal-like phenotype (vimentin expression, lack of cell border associated uvomorulin) show dramatically increased motility, invasiveness, and metastatic potential in nude mice. These findings support the hypothesis that epithelial to mesenchymal transition (EMT)-like events may be instrumental in the metastatic progression of human breast cancer. The MCF-7 subline MCF-7ADR appears to have undergone such a transition. The importance of such a transition may be reflected in the emergence of vimentin expression as an indicator of poor prognosis in HBC. Matrix degradation and laminin recognition are highlighted as potential targets for antimetastatic therapy, and analyses of laminin attachment and the matrix metalloproteinase (MMP) family in HBC cell lines are summarized. Matrigel-based assays have proved useful in the study of the molecular mechanisms of basement membrane invasiveness, their regulation in HBC cells, and their potential as targets for antimetastatic therapy.
Resumo:
This project consists of a novel and an exegesis that explore the use of fiction to counter negative hegemonic representations of refugees in Australia. The possibilities of using Australian spaces, including border spaces, to reveal tensions surrounding refugee belonging and to highlight the reconfiguration of border sites in the Australian imaginary, is a particular focus of this work.
Resumo:
Our research aims to answer the research questions “How do we commonly describe the global start-ups profile as evidenced in prior inductive research?” and “Does this global start-ups profile can effectively explain phenomena in Australian global start-up firms?” We systematically review 29 global start-ups (144 firms) qualitative articles to understand descriptive definitions of global-startup firms. We then triangulate this finding with an Australian high-tech firm. Our contribution is to form a descriptive profile of global start-up phenomenon and raise interesting issues that have potentially fruitful findings for both research and practice. This profile might well be just a deviant from the traditional model that describes how firms establish their footprints, first in their domestic markets followed by moves into cross-border activities. Regardless, government agencies, consultants, and entrepreneurs need to understand the phenomenon. Thus we anticipate that this phenomenon will continue to provide interesting issues for pursuit, both by researchers as well as the practitioner community.
Resumo:
This book attempts to persuade a new generation of scholars, criminologists, activists, and policy makers sympathetic to the quest for global justice to open the envelope, to step out of their comfort zones and typical frames of analysis to gaze at a world full of injustice against the female sex, much of it systemic, linked to culture, custom and religion. In some instances the sources of these injustices intersect with those that produce global inequality, imperialism and racism. This book also investigates circumstances where the globalising forces cultivate male on male violence in the anomic spaces of supercapitalism – the border zones of Mexico and the United States, and the frontier mining communities in the Australian desert. However systemic gendered injustices, such as forced marriage of child female brides, sati the cremation of widows, genital cutting, honour crimes, rape and domestic violence against women, are forms of violence only experienced by the female sex. The book does not shirk away from female violence either. Carrington argues that if feminism wants to have a voice in the public, cultural, political and criminological debates about heightened, albeit often exaggerated, social concerns about growing female violence and engagement in terrorism, then new directions in theorising female violence are required. Feminist silences about the violent crimes, atrocities and acts of terrorism committed by the female sex leave anti-feminist explanations uncontested. This allows a discursive space for feminist backlash ideologues to flourish. This book contests those ideologies to offer counter explanations for the rise in female violence and female terrorism, in a global context where systemic gendered violence against women is alarming and entrenched. The world needs feminism to take hold across the globe, now more than ever.