857 resultados para crime and justice
Resumo:
Seminal reports into higher education in Australia and overseas have recognised negotiation as an essential skill of a practising lawyer and have recommended that all law schools include instruction in negotiation theory and practice in their curricula. Effective negotiation training includes the elements of instruction, modelling, practice and feedback. Ideally such training takes place in the context of small groups. However, this does not necessarily mean that negotiation cannot be taught effectively in the context of large groups. This paper discusses two related blended learning environments that provide instruction in negotiation theory and practice as part of the graduate capabilities program of the undergraduate law degree in the School of Law at the Queensland University of Technology in Brisbane, Australia. Air Gondwana, which forms part of the curriculum of the two first year Contract Law subjects, and Mosswood Manor, which forms part of the curriculum of the second year Trusts subject, utilise a common narrative concerning the family of a wealthy industrialist to facilitate learning of negotiation skills. The programs both combine online and in-class components, the online components utilising machinima (computer graphics created without the need for professional software) to depict the narrative. This strategy has enabled the creation of effective, engaging and challenging learning experiences for large cohorts of students studying by different modes (full-time, part-time and distance external). The use of a common narrative, including the same characters and settings, in the two programs also provides a familiar environment in which students advance their learning from one level of attainment to the next.
Resumo:
Children's 'witnessing' or exposure to domestic violence has been increasingly recognised as a form of child abuse, both in Australia and internationally. Although it is difficult to accurately assess the scope of the problem, research has demonstrated that a substantial amount of domestic violence is witnessed by children. As this paper outlines, witnessing domestic violence can involve a range of incidents, ranging from the child 'only' hearing the violence, to the child being forced to participate in the violence or being used as part of a violent incident. In this paper, current knowledge about the extent of children's exposure to domestic violence in Australia is described, along with the documented impacts that this exposure can have on children. This includes psychological and behavioural impacts, health and socioeconomic impacts, and its link to the intergenerational transmission of violence and re-victimisation. Current legislative and policy initiatives are then described and some community-based programs that have been introduced in Australia to address the problem of children's exposure to domestic violence are highlighted. The paper concludes that initiatives focused on early intervention and holistic approaches to preventing and responding to children's exposure to domestic violence should be considered as part of strategies developed to address this problem.
Resumo:
Historically, children in criminal justice proceedings were treated much the same as adults and subject to the same criminal justice processes as adults. Until the early twentieth century, children in Australia were even subjected to the same penalties as adults, including hard labour and corporal and capital punishment (Carrington & Pereira 2009). Until the mid-nineteenth century, there was no separate category of ’juvenile offender’ in Western legal systems and children as young as six years of age were incarcerated in Australian prisons (Cunneen & White 2007). It is widely acknowledged today, however, both in Australia and internationally, that juveniles should be subject to a system of criminal justice that is separate from the adult system and that recognises their inexperience and immaturity. As such, juveniles are typically dealt with separately from adults and treated less harshly than their adult counterparts. The United Nations’ (1985: 2) Standard Minimum Rules for the Administration of Juvenile Justice (the ‘Beijing Rules’) stress the importance of nations establishing a set of laws, rules and provisions specifically applicable to juvenile offenders and institutions and bodies entrusted with the functions of the administration of juvenile justice and designed to meet the varying needs of juvenile offenders, while protecting their basic rights. In each Australian jurisdiction, except Queensland, a juvenile is defined as a person aged between 10 and 17 years of age, inclusive. In Queensland, a juvenile is defined as a person aged between 10 and 16 years, inclusive. In all jurisdictions, the minimum age of criminal responsibility is 10 years. That is, children under 10 years of age cannot be held legally responsible for their actions.
Resumo:
This paper provides an overview of key trends in juvenile detention in Australia, based on data contained in the Australian Institute of Criminology’s (AIC’s) Juveniles in Detention in Australia Monitoring Program database and then provides a discussion of two key trends in juvenile detention—the national increase in the proportion of juvenile detainees that is remanded (rather than sentenced) and the increase in the over-representation of Indigenous juveniles in detention.
Resumo:
Sexual offending against children is a highly emotive issue. It is nonetheless important that public policy initiatives to prevent and/or respond to child sexual abuse are based on the available evidence about child sex offenders. This paper addresses five common misperceptions about the perpetrators of sexual offences against children. Specifically, the issues addressed include whether all child sex offenders are ‘paedophiles’, who sexually abuse children, whether most child sex offenders were victims of sexual abuse themselves, rates of recidivism among child sex offenders and the number of children sex offenders typically abuse before they are detected by police. The evidence outlined in this paper highlights that there are few black and white answers to these questions. Perpetrators of sexual crimes against children are not, contrary to widespread opinion, a homogenous group. Rather, there are a number of varied offending profiles that characterise child sex offenders. Gaining an understanding of the nuances of this offender population is critical if children are to be protected from sexual abuse.
Resumo:
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.
Resumo:
Understanding ethics and law in health care is an essential part of nurses’ and midwives’ professional standards. Ethics, Law and Health Care focuses on teaching applied ethics and law in a manner that illustrates the real world applications of these core components of the nursing and midwifery curriculum and practice. It equips readers with the ability to recognise and address legal and ethical issues that will arise in their professional practice. The book uses the four principles of biomedical ethics (autonomy, non-maleficence, beneficence and justice) together with the use of both the Nursing and Midwifery Codes of Ethics and Codes of Professional Conduct, issued by the Nursing and Midwifery Board of Australia, as a central means through which to analyse and approach ethical and legal issues. Ethics, Law and Health Care is scaffolded to assist readers in understanding legal and ethical principles, to integrate them in the context of a particular issue within professional practice, and provide them with a decision-making framework to take action in a professional context by utilising the Codes as well as state and federal law. Aided by pedagogical features such as case studies, review questions, further reading and a glossary of common terms, this book is an essential resource for students, academics and practitioners.
Resumo:
Computer generated materials are ubiquitous and we encounter them on a daily basis, even though most people are unaware that this is the case. Blockbuster movies, television weather reports and telephone directories all include material that is produced by utilising computer technologies. Copyright protection for materials generated by a programmed computer was considered by the Federal Court and Full Court of the Federal Court in Telstra Corporation Limited v Phone Directories Company Pty Ltd. The court held that the White and Yellow pages telephone directories produced by Telstra and its subsidiary, Sensis, were not protected by copyright because they were computer-generated works which lacked the requisite human authorship. The Copyright Act 1968 (Cth) does not contain specific provisions on the subsistence of copyright in computer-generated materials. Although the issue of copyright protection for computer-generated materials has been examined in Australia on two separate occasions by independently-constituted Copyright Law Review Committees over a period of 10 years (1988 to 1998), the Committees’ recommendations for legislative clarification by the enactment of specific amendments to the Copyright Act have not yet been implemented and the legal position remains unclear. In the light of the decision of the Full Federal Court in Telstra v Phone Directories it is timely to consider whether specific provisions should be enacted to clarify the position of computer-generated works under copyright law and, in particular, whether the requirement of human authorship for original works protected under Part III of the Copyright Act should now be reconceptualised to align with the realities of how copyright materials are created in the digital era.
Resumo:
Victim/survivors of human trafficking involving partner migration employ diverse help-seeking strategies, both formal and informal, to exit their exploitative situations. Drawing on primary research conducted by Lyneham and Richards (forthcoming), the authors highlight the importance of educating the community and professionals from a wide range of sectors—including health, mental health, child protection, social welfare, social work, domestic violence, migration, legal and law enforcement services—about human trafficking and the help-seeking strategies of victims/survivors in order to support them to leave exploitative situations. Enhancing Australia’s knowledge of victim/survivors’ help-seeking strategies will better inform government and community responses to this crime, improve detection and identification of human trafficking matters and subsequent referral to appropriate victim services.
Resumo:
Mooting is modeled principally on appellate advocacy. However, the skill set developed by participating in a moot program – being that necessary to persuade someone to your preferred position – is indispensible to anyone practising law. Developing effective mooting skills in students necessitates the engagement of coaches with an appropriate understanding of the theories underlying mooting and advocacy practice and their interconnection with each other. This article explains the relevance of the cognitive domain to mooting performance and places it in context with the psychomotor and affective domains.
Resumo:
This book examines the interface between religion, charity law and human rights. It does so by treating the Church of England and its current circumstances as a timely case study providing an opportunity to examine the tensions that have now become such a characteristic feature of that interface. Firstly, it suggests that the Church is the primary source of canon law principles that have played a formative role in shaping civic morality throughout the common law jurisdictions: the history of their emergence and enforcement by the State in post-Reformation England is recorded and assessed. Secondly, it reveals that of such principles those of greatest weight were associated with matters of sexuality: in particular, for centuries, family law was formulated and applied with regard for the sanctity of the heterosexual marital family which provided the only legally permissible context for any form of sexual relationship. Thirdly, given that history, it identifies and assesses the particular implications that now arise for the Church as a consequence of recent charity law reform outcomes and human rights case law developments: a comparative analysis of religion related case law is provided. Finally, following an outline of the structure and organizational functions of the Church, a detailed analysis is undertaken of its success in engaging with these issues in the context of the Lambeth Conferences, the wider Anglican Communion and in the ill-fated Covenant initiative. From the perspective of the dilemmas currently challenging the moral authority of the Church of England, this book identifies and explores the contemporary ‘moral imperatives’ or red line issues that now threaten the coherence of Christian religions in most leading common law nations. Gay marriage and abortion are among the host of morally charged and deeply divisive topics demanding a reasoned response and leadership from religious bodies. Attention is given to the judicial interpretation and evaluation of these and other issues that now undermine the traditional role of the Church of England. As the interface between religion, charity law and human rights becomes steadily more fractious, with religious fundamentalism and discrimination acquiring a higher profile, there is now a pressing need for a more balanced relationship between those with and those without religious beliefs. This book will be an invaluable aid in starting the process of achieving a triangulated relationship between the principles of canon law, charity law and human rights law.
Resumo:
After the terrorist attacks in the United States on 11 September 2001, terrorism and counter-terrorism efforts moved to the front of popular consciousness and became the focus of national security for governments worldwide. With this increased attention came an urgent interest in understanding and identifying what works in fighting terrorism (Belasco 2010). For Australia, understanding the relative effectiveness of counter-terrorism efforts in nearby neighbours of Indonesia, Thailand and the Philippines is highly relevant for our country's national security. Indonesia, Thailand and the Philippines are all countries that are important to Australia not just because of geographic proximity, but also because of a history of economic ties and the role these countries play as Australia’s regional partners...
Resumo:
There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.
Resumo:
There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.
Resumo:
Online fraud occurs when an individual or a business responds in some manner to an unsolicited invitation received via the internet and suffers financial or other detrimental effects as a result. In 2010–11, the Australian Bureau of Statistics (2012) found that over 1.2 million Australians (6.7% of the population aged 15 years and over) had been a victim of personal fraud, losing approximately $1.4b in the preceding 12 months. More than half of these victims (55.7%) were contacted via the internet or email (online victimisation). In addition to monetary losses, victims of online fraud suffer serious psychological, emotional, social and even physical problems as a consequence of their victimisation. This paper explores the challenges of responding to online fraud victimisation in Australia and describes some of the specific support services that have recently emerged to support victims of this crime.