925 resultados para Border patrol
Resumo:
Keeping exotic plant pests out of our country relies on good border control or quarantine. However with increasing globalization and mobilization some things slip through. Then the back up systems become important. This can include an expensive form of surveillance that purposively targets particular pests. A much wider net is provided by general surveillance, which is assimilated into everyday activities, like farmers checking the health of their crops. In fact farmers and even home gardeners have provided a front line warning system for some pests (eg European wasp) that could otherwise have wreaked havoc. Mathematics is used to model how surveillance works in various situations. Within this virtual world we can play with various surveillance and management strategies to "see" how they would work, or how to make them work better. One of our greatest challenges is estimating some of the input parameters : because the pest hasn't been here before, it's hard to predict how well it might behave: establishing, spreading, and what types of symptoms it might express. So we rely on experts to help us with this. This talk will look at the mathematical, psychological and logical challenges of helping experts to quantify what they think. We show how the subjective Bayesian approach is useful for capturing expert uncertainty, ultimately providing a more complete picture of what they think... And what they don't!
Resumo:
Immigration to Australia has long been the focus of negative political interest. In recent times, the proposal of exclusionary policies such as the Malaysia Deal in 2011 has fuelled further debate. In these debates, Federal politicians often describe asylum seekers and refugees as ‘illegal’, ‘queue jumpers’, and ‘boat people’. This paper investigates how the political discourse constructs asylum seekers and refugees during debates surrounding the Malaysia Deal in the Federal Parliament of Australia in 2011. Hansard Parliamentary debates were analysed to identify the underlying themes and constructions that permeate political discourse about asylum seekers and refugees. This paper argues that a dichotomous characterisation of legitimacy pervades their construction with this group constructed either as legitimate humanitarian refugees or as illegitimate ‘boat arrivals’. These constructions result in the misrepresentation of asylum seekers as illegitimate, undermining their right to protection under Australia’s laws and international obligations. This construction also represents a shift in federal political discourse from constructing asylum seekers as a border or security threat, towards an increasing preoccupation with this categorisation of people as legitimate, or illegitimate.
Resumo:
The pertinence of this book cannot be overemphasised. The world’s refugee crisis has reached a two‐decade high with the United Nations recently announcing that ‘displacement is the new 21st century challenge’ (UNHCR 2013). The transnational movement of dislocated peoples fleeing conflict, persecution and poverty is a global responsibility requiring nation states to collaborate for humanitarian resolutions embedded in human rights. However, in times of human rights expansionism, and the relaxation of borders for maximising free‐trade and fiscal prosperity, the movement of people experiencing immense abuse and deprivation has witnessed an increase in draconian regulation within discourses of intolerance and deterrence. Weber and Pickering cogently and emphatically emphasise the human cost of inhumane and populist government immigration and border‐entry polices underpinned by ideologies of retribution, suspicion, and demonisation. It is a moving and engaging narrative: a book that exposes state prejudice and abuse, whilst advocating for the victims who undertake perilous journeys in search of safety from lives of violence and persecution. Moreover, it is a book that pushes ideological boundaries and seeks new criminological horizons, for which the authors must be sincerely congratulated. It is a text of innovation, inspired thinking and long lasting criminological value.
Resumo:
In this practice-led research project I work to show how a re-reading and a particular form of listening to the sound-riddled nature of Gertrude Stein's work, Two: Gertrude Stein and her Brother, presents us with a contemporary theory of sound in language. This theory, though in its infancy, is a particular enjambment of sounded language that presents itself as an event, engaged with meaning, with its own inherent voice. It displays a propensity through engagement with the 'other' to erupt into love. In this thesis these qualities are reverberated further through the work of Seth Kim-Cohen's notion of the non-cochlear, Simon Jarvis's notion of musical thinking, Jean-Jacques Lecercle's notion of délire or nonsense, Luce Irigaray's notion of jouissant love and the Bracha Ettinger's notion of the generative matrixial border space. This reading then is simultaneously paired with my own work of scoring and creating a digital opera from Stein's work, thereby testing and performing Stein's theory. In this I show how a re-reading and relistening to Stein's work can be significant to feminist ethical language frames, contemporary philosophy, sonic art theory and digital language frames. Further significance of this study is that when the reverberation of Stein's engagements with language through sound can be listened to, a pattern emerges, one that encouragingly problematizes subjectivity and interweaves genres/methods and means, creating a new frame for sound in language, one with its own voice that I call soundage.
Resumo:
This Technical and Background Paper summarises the results of a Australian Government Attorney-General’s Department’s funded project. The project aimed to clarify the contribution of the community night patrol program in the Northern Territory (NT) to improving the community safety of Indigenous communities. The paper recommends an improved framework for monitoring performance and reporting. Community night patrols or similar services operate in many other areas of Australia and internationally. The paper concludes that the core business of community night patrols is (non-crisis) crime prevention not defacto policing. It also concludes that an unrecognised outcome of patrols is capturing and sharing local knowledge about community safety issues and solutions. Over time, community night patrols should focus on working with other services to reduce the need for repeat assistance to persons at risk and for risky incidents. The recently released Northern Territory Emergency Response Evaluation Report (2011) confirmed that communities and service providers surveyed largely support night patrols, but better data is required to more comprehensively assess their performance.
Resumo:
We have tested a methodology for the elimination of the selectable marker gene after Agrobacterium-mediated transformation of barley. This involves segregation of the selectable marker gene away from the gene of interest following co-transformation using a plasmid carrying two T-DNAs, which were located adjacent to each other with no intervening region. A standard binary transformation vector was modified by insertion of a small section composed of an additional left and right T-DNA border, so that the selectable marker gene and the site for insertion of the gene of interest (GOI) were each flanked by a left and right border. Using this vector three different GOIs were transformed into barley. Analysis of transgene inheritance was facilitated by a novel and rapid assay utilizing PCR amplification from macerated leaf tissue. Co-insertion was observed in two thirds of transformants, and among these approximately one quarter had transgene inserts which segregated in the next generation to yield selectable marker-free transgenic plants. Insertion of non-T-DNA plasmid sequences was observed in only one of fourteen SMF lines tested. This technique thus provides a workable system for generating transgenic barley free from selectable marker genes, thereby obviating public concerns regarding proliferation of these genes.
Resumo:
This thesis has created a space for women in the history of the decolonisation of the Gilbert Islands. It traces the historical development of the national women's interests program in the Republic of Kiribati (formerly of the Gilbert and Ellice Islands Colony (GEIC)) as it was implemented through a network of women's clubs during the 1960s and 1970s. This thesis has provided the first history and interpretation of the Indigenous women's interests movement as it impacted the Gilbert Islands. It offers a narrative of the movement in terms of three overlapping waves of women leaders, based on an analysis of fieldwork, archival research and interviews conducted on South Tarawa, Kiribati.
Resumo:
BACKGROUND Malaria remains a public health problem in the remote and poor area of Yunnan Province, China. Yunnan faces an increasing risk of imported malaria infections from Mekong river neighboring countries. This study aimed to identify the high risk area of malaria transmission in Yunnan Province, and to estimate the effects of climatic variability on the transmission of Plasmodium vivax and Plasmodium falciparum in the identified area. METHODS We identified spatial clusters of malaria cases using spatial cluster analysis at a county level in Yunnan Province, 2005-2010, and estimated the weekly effects of climatic factors on P. vivax and P. falciparum based on a dataset of daily malaria cases and climatic variables. A distributed lag nonlinear model was used to estimate the impact of temperature, relative humidity and rainfall up to 10-week lags on both types of malaria parasite after adjusting for seasonal and long-term effects. RESULTS The primary cluster area was identified along the China-Myanmar border in western Yunnan. A 1°C increase in minimum temperature was associated with a lag 4 to 9 weeks relative risk (RR), with the highest effect at lag 7 weeks for P. vivax (RR = 1.03; 95% CI, 1.01, 1.05) and 6 weeks for P. falciparum (RR = 1.07; 95% CI, 1.04, 1.11); a 10-mm increment in rainfall was associated with RRs of lags 2-4 weeks and 9-10 weeks, with the highest effect at 3 weeks for both P. vivax (RR = 1.03; 95% CI, 1.01, 1.04) and P. falciparum (RR = 1.04; 95% CI, 1.01, 1.06); and the RRs with a 10% rise in relative humidity were significant from lag 3 to 8 weeks with the highest RR of 1.24 (95% CI, 1.10, 1.41) for P. vivax at 5-week lag. CONCLUSIONS Our findings suggest that the China-Myanmar border is a high risk area for malaria transmission. Climatic factors appeared to be among major determinants of malaria transmission in this area. The estimated lag effects for the association between temperature and malaria are consistent with the life cycles of both mosquito vector and malaria parasite. These findings will be useful for malaria surveillance-response systems in the Mekong river region.
Resumo:
We developed a reproducible model of deep dermal partial thickness burn injury in juvenile Large White pigs. The contact burn is created using water at 92 degrees C for 15s in a bottle with the bottom replaced with plastic wrap. The depth of injury was determined by a histopathologist who examined tissue sections 2 and 6 days after injury in a blinded manner. Upon creation, the circular wound area developed white eschar and a hyperaemic zone around the wound border. Animals were kept for 6 weeks or 99 days to examine the wound healing process. The wounds took between 3 and 5 weeks for complete re-epithelialisation. Most wounds developed contracted, purple, hypertrophic scars. On measurement, the thickness of the burned skin was approximately 1.8 times that of the control skin at week 6 and approximately 2.2 times thicker than control skin at 99 days after injury. We have developed various methods to assess healing wounds, including digital photographic analysis, depth of organising granulation tissue, immunohistochemistry, electron microscopy and tensiometry. Immunohistochemistry and electron microscopy showed that our porcine hypertrophic scar appears similar to human hypertrophic scarring. The development of this model allows us to test and compare different treatments on burn wounds.
Resumo:
Malaria has been a heavy social and health burden in the remote and poor areas in southern China. Analyses of malaria epidemic patterns can uncover important features of malaria transmission. This study identified spatial clusters, seasonal patterns, and geographic variations of malaria deaths at a county level in Yunnan, China, during 1991–2010. A discrete Poisson model was used to identify purely spatial clusters of malaria deaths. Logistic regression analysis was performed to detect changes in geographic patterns. The results show that malaria mortality had declined in Yunnan over the study period and the most likely spatial clusters (relative risk [RR] = 23.03–32.06, P < 0.001) of malaria deaths were identified in western Yunnan along the China–Myanmar border. The highest risk of malaria deaths occurred in autumn (RR = 58.91, P < 0.001) and summer (RR = 31.91, P < 0.001). The results suggested that the geographic distribution of malaria deaths was significantly changed with longitude, which indicated there was decreased mortality of malaria in eastern areas over the last two decades, although there was no significant change in latitude during the same period. Public health interventions should target populations in western Yunnan along border areas, especially focusing on floating populations crossing international borders.
Resumo:
The notion of sovereignty is central to any international tax issue. While a nation is free to design its tax laws as it sees fit and raise revenue in accordance with the needs of its citizens, it is not possible to undertake such a task in isolation. In a world of cross-border investments and business transactions, all tax regimes impact on one another. Tax interactions between sovereign states cannot be avoided. Ultimately, the interactions mean that a nation must decide whether to engage in both collaboration and coordination with other nations and supranational bodies alike or maintain an individualised stance in relation to its tax policy. Whatever the decision, there is arguably an exercise in national sovereignty in some form. In the context of an international tax regime, whether that regime is interpreted broadly as meaning international norms generally adopted by nations around the world or domestic regimes legislating for cross-border transactions, rhetoric around national fiscal sovereignty takes on many different forms. At one end of the spectrum it is relied upon by financial secrecy jurisdictions (tax havens) as a defence to their position on the basis that ‘other’ nations cannot interfere with the fiscal sovereignty of a jurisdiction. At the other end of the spectrum, it is argued that profit shifting and international tax avoidance if not stopped is, in and of itself, a threat to a nation’s fiscal sovereignty on the basis that it threatens the ability to tax and raise the revenue needed. This paper considers a modern conceptualisation of sovereignty along with its role within international tax coordination and collaboration to argue that a move towards a more unified approach to addressing international base erosion and profit shifting may be the ultimate exercise of national fiscal sovereignty. By using the current transfer pricing regime as a case study, this paper posits that it is not merely enough to have international agreement on allocation rules to be applied, but that the ultimate exercise of national sovereignty is political agreement with other states to ensure that it is governments which determine the allocational basis of worldwide profits to be taxed. In doing so, it is demonstrated that the arm’s length pricing requirement of the current transfer pricing regime, rather than providing governments with the ability to determine the location of profits, is providing multinational entities with the ultimate power to determine that location. If left unchecked, this will eventually erode a nation’s ability to capture the required tax revenue and, as a consequence, may be deemed a failure by nation states to exercise their fiscal sovereignty.
Resumo:
In 2006, the American Law Institute (ALI) and the International Insolvency Institute (III) established a Transnational Insolvency Project and appointed Professor Ian Fletcher (United Kingdom) and Professor Bob Wessels (Netherlands) as Joint Reporters. The objective was to investigate whether the essential provisions of the ALI Principles of Cooperation among the NAFTA Countries (ALI-NAFTA Principles) and the annexed Guidelines Applicable to Court-to-Court Communication in Cross-border Cases (ALI-NAFTA Guidelines) may, with certain necessary modifications, be acceptable for use by jurisdictions across the world. In 2012, Professor Fletcher and Professor Wessels presented the report Transnational Insolvency: Global Principles for Cooperation in International Insolvency Cases (“ALI-III Report”) to the Annual Meetings of the American Law Institute and the International Insolvency Institute. In 2013, the Australian Academy of Law (AAL) provided support to the authors to undertake research on the possible benefits for Australia of courts and insolvency administrators of referring to the ALI-III Report when addressing international insolvency cases. This AAL project was at the request of the Council of Chief Justices of Australia and New Zealand. This research Report compares the Global Principles for Cooperation in International Insolvency Cases with the Cross-border Insolvency Act 2008 and the UNCITRAL Model Law as it has been adopted and has force of law in Australia. Further, it examines the Global Guidelines for Court-to-Court Communications in International Insolvency Cases in light of Australian cross-border insolvency and procedural law. Finally, it makes brief reference to and commentary on the Global Rules on Conflict–of-Laws Matters in International Insolvency Cases annexed to the ALI-III Report from the perspective of Australian choice of law rules.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.
Resumo:
In vitro analyses of basement membrane invasiveness employing Matrigel (a murine tumor extract rich in basement membrane components) have been performed on human breast cancer model systems. Constitutive invasiveness of different human breast cancer (HBC) cell lines has been examined as well as regulation by steroid hormones, growth factors, and oncogenes. Carcinoma cells exhibiting a mesenchymal-like phenotype (vimentin expression, lack of cell border associated uvomorulin) show dramatically increased motility, invasiveness, and metastatic potential in nude mice. These findings support the hypothesis that epithelial to mesenchymal transition (EMT)-like events may be instrumental in the metastatic progression of human breast cancer. The MCF-7 subline MCF-7ADR appears to have undergone such a transition. The importance of such a transition may be reflected in the emergence of vimentin expression as an indicator of poor prognosis in HBC. Matrix degradation and laminin recognition are highlighted as potential targets for antimetastatic therapy, and analyses of laminin attachment and the matrix metalloproteinase (MMP) family in HBC cell lines are summarized. Matrigel-based assays have proved useful in the study of the molecular mechanisms of basement membrane invasiveness, their regulation in HBC cells, and their potential as targets for antimetastatic therapy.