969 resultados para Third parties


Relevância:

60.00% 60.00%

Publicador:

Resumo:

As part of the effort to protect children from significant abuse and neglect, each state and territory in Australia has enacted legislation commonly known as "mandatory reporting laws". There is much confusion about the nature and effects of these laws, both generally and within each jurisdiction. Accordingly, the main aim of this chapter is to review and explain the legislative principles across Australia. In doing so, the chapter will identify differences between the state and territory laws and will situate the laws as part of a system of responses to the whole spectrum of child abuse and neglect. We will also highlight the need for effective reporter training and public awareness, especially given the tension between the widely perceived need for a community response to child abuse and neglect and the simultaneous concern to avoid unnecessary reporting of innocuous events and situations.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Background Despite the importance of an effective health system response to various disasters, relevant research is still in its infancy, especially in middle- and low-income countries. Objective This paper provides an overview of the status of disaster health management in China, with its aim to promote the effectiveness of the health response for reducing disaster-related mortality and morbidity. Design A scoping review method was used to address the recent progress of and challenges to disaster health management in China. Major health electronic databases were searched to identify English and Chinese literature that were relevant to the research aims. Results The review found that since 2003 considerable progress has been achieved in the health disaster response system in China. However, there remain challenges that hinder effective health disaster responses, including low standards of disaster-resistant infrastructure safety, the lack of specific disaster plans, poor emergency coordination between hospitals, lack of portable diagnostic equipment and underdeveloped triage skills, surge capacity, and psychological interventions. Additional challenges include the fragmentation of the emergency health service system, a lack of specific legislation for emergencies, disparities in the distribution of funding, and inadequate cost-effective considerations for disaster rescue. Conclusions One solution identified to address these challenges appears to be through corresponding policy strategies at multiple levels (e.g. community, hospital, and healthcare system level).

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This research provides an assessment tool that assists the selection process of sustainability in detached suburban housing. It investigates the implications of using different design and construction methods including architecturally designed houses, developer housing and prefabricated houses. The study simulates one example of the three types of houses that have been chosen to fulfil a real client brief on a real site on the Sunshine Coast, Queensland Australia. Criteria for sustainability assessment are formulated based on literature reviews, exemplar designs and similar research projects for which the houses can be adequately evaluated. This criterion covers aspects including energy use, materials and thermal performance. The data is collected using computer models and sustainability assessment software to compare and draw conclusions on the success of each house. Our study indicates that architecturally designed housing with prefabricated building techniques are a better alternative to generic developer style housing. Our research provides an insight into the implications of three key elements of sustainability including energy use, materials and thermal performance. Designers, builders, developers and home-buyers are given an insight into some options currently available on the housing market and how the choices made during early design stages can provide a more positive environmental impact.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

It’s the stuff of nightmares: your intimate images are leaked and posted online by somebody you thought you could trust. But in Australia, victims often have no real legal remedy for this kind of abuse. This is the key problem of regulating the internet. Often, speech we might consider abusive or offensive isn’t actually illegal. And even when the law technically prohibits something, enforcing it directly against offenders can be difficult. It is a slow and expensive process, and where the offender or the content is overseas, there is virtually nothing victims can do. Ultimately, punishing intermediaries for content posted by third parties isn’t helpful. But we do need to have a meaningful conversation about how we want our shared online spaces to feel. The providers of these spaces have a moral, if not legal, obligation to facilitate this conversation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In the recent decision of Hunter and New England Local Health District v McKenna; Hunter and New England Local Health District v Simon, the High Court of Australia held that a hospital and its medical staff owed no common law duty of care to third parties claiming for mental harm, against the background of statutory powers to detain mentally ill patients. This conclusion was based in part on the statutory framework and in part on the inconsistency which would arise if such a duty was imposed. If such a duty was imposed in these circumstances, the consequence may be that doctors would generally detain rather than discharge mentally ill persons to avoid the foreseeable risk of harm to others. Such an approach would be inconsistent with the policy of the mental health legislation , which favours personal liberty and discharge rather than detention unless no other care of a less restrictive kind is appropriate and reasonably available.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Directors and Officers Liability Insurance (“D&O insurance”) has grown and evolved rapidly over the past 80 years to assume an important position in most corporations’ corporate governance and risk management strategies. This article focuses upon certain topical matters of particular concern to directors and officers including the availability of defence costs where a D&O policy is subject to a statutory charge; the commercial desirability of stand-alone “A-side” coverage, being the cover provided directly to directors and officers for loss resulting from claims made against them for wrongful acts; the impact of fraud and/or dishonesty upon D&O cover; and disclosure of the nature and extent of D&O cover to the directors and officers themselves and to third parties – in the latter case such access frequently being necessary to determine the economic viability of pursuing a proposed action against a company and its directors and officers.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

FRDC project 2008/306 Building economic capability to improve the management of marine resources in Australia was developed and approved in response to the widespread recognition and acknowledgement of the importance of incorporating economic considerations into marine management in Australia and of the persistent undersupply of suitably trained and qualified individuals capable of providing this input. The need to address this shortfall received broad based support and following widespread stakeholder consultation and building on previous unsuccessful State-based initiatives, a collaborative, cross-jurisdictional cross-institutional capability building model was developed. The resulting project sits within the People Development Program as part of FRDC’s ‘investment in RD&E to develop the capabilities of the people to whom the industry entrusts its future’, and has addressed its objectives largely through three core activities: 1. The Fisheries Economics Graduate Research Training Program which provides research training in fisheries/marine economics through enrolment in postgraduate higher degree studies at the three participating Universities; 2. The Fisheries Economics Professional Training Program which aims to improve the economic literacy of non-economist marine sector stakeholders and was implemented in collaboration with the Seafood Cooperative Research Centre through the Future Harvest Masterclass in Fisheries Economics; and, 3. The Australian Fisheries Economics Network (FishEcon) which aims to strengthen research in the area of fisheries economics by creating a forum in which fisheries economists, fisheries managers and Ph.D. students can share research ideas and results, as well as news of upcoming research opportunities and events. These activities were undertaken by a core Project team, comprising economic researchers and teachers from each of the four participating institutions (namely the University of Tasmania, the University of Adelaide, Queensland University of Technology and the Commonwealth Scientific and Industrial Research Organisation), spanning three States and the Commonwealth. The Project team reported to and was guided by a project Steering Committee. Commensurate with the long term nature of the project objectives and some of its activities the project was extended (without additional resources) in 2012 to 30th June 2015.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The 17th Biennial Conference of the International Institute of Fisheries Economics and Trade (IIFET) was held in Brisbane in July 2014. IIFET is the principal international association for fisheries economics, and the biennial conference is an opportunity for the best fisheries economists in the world to meet and share their ideas. The conference was organised by CSIRO, QUT, UTAS, University of Adelaide and KG Kailis Ltd. This is the first time the conference has been held in Australia. The conferences covered a wide range of topics of relevance to Australia. These included studies of fishery management systems around the world, identified key issues in aquaculture and marine biodiversity conservation, and provided a forum for new modelling and theoretical approaches to analysing fisheries problems to be presented. The theme of the conference was Towards Ecosystem Based Management of Fisheries: What Role can Economics Play? Several sessions were dedicated to modelling socio-ecological systems, and two keynote speakers were invited to present the latest thinking in the area. In this report, the key features of the conference are outlined.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The growth of the information economy has been stellar in the last decade. General-purpose technologies such as the computer and the Internet have promoted productivity growth in a large number of industries. The effect on telecommunications, media and technology industries has been particularly strong. These industries include mobile telecommunications, printing and publishing, broadcasting, software, hardware and Internet services. There have been large structural changes, which have led to new questions on business strategies, regulation and policy. This thesis focuses on four such questions and answers them by extending the theoretical literature on platforms. The questions (with short answers) are: (i) Do we need to regulate how Internet service providers discriminate between content providers? (Yes.) (ii) What are the welfare effects of allowing consumers to pay to remove advertisements from advertisement-supported products?(Ambiguous, but those watching ads are worse off.) (iii) Why are some markets characterized by open platforms, extendable by third parties, and some by closed platforms, which are not extendable? (It is a trade-off between intensified competition for consumers and benefits from third parties) (iv) Do private platform providers allow third parties to access their platform when it is socially desirable? (No.)

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The management and coordination of business-process collaboration experiences changes because of globalization, specialization, and innovation. Service-oriented computing (SOC) is a means towards businessprocess automation and recently, many industry standards emerged to become part of the service-oriented architecture (SOA) stack. In a globalized world, organizations face new challenges for setting up and carrying out collaborations in semi-automating ecosystems for business services. For being efficient and effective, many companies express their services electronically in what we term business-process as a service (BPaaS). Companies then source BPaaS on the fly from third parties if they are not able to create all service-value inhouse because of reasons such as lack of reasoures, lack of know-how, cost- and time-reduction needs. Thus, a need emerges for BPaaS-HUBs that not only store service offers and requests together with information about their issuing organizations and assigned owners, but that also allow an evaluation of trust and reputation in an anonymized electronic service marketplace. In this paper, we analyze the requirements, design architecture and system behavior of such a BPaaS-HUB to enable a fast setup and enactment of business-process collaboration. Moving into a cloud-computing setting, the results of this paper allow system designers to quickly evaluate which services they need for instantiationg the BPaaS-HUB architecture. Furthermore, the results also show what the protocol of a backbone service bus is that allows a communication between services that implement the BPaaS-HUB. Finally, the paper analyzes where an instantiation must assign additional computing resources vor the avoidance of performance bottlenecks.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Resumen: En la carrera por obtener la corona de Aragón, que ha quedado vacante, el Infante don Fernando de Castilla se enfrenta a cinco contrincantes con las mismas expectativas. Luego de un lapso de dos años de Interregno y de confrontación en todos los frentes, el parlamentario, el militar, el económico y hasta el religioso, el Infante es elegido como nuevo monarca en el Compromiso de Caspe. Si durante el proceso electivo las relaciones habían sido de pura competencia, luego del mismo los conflictos continúan, en especial con uno de los candidatos, el Conde de Urgel. Este artículo tiene como objetivo describir este conflicto, como un proceso vivo que se transforma, adquiere nuevas dimensiones, involucra a otras partes, con intervenciones de terceros conciliadores e infructuosas negociaciones para dar una solución a esta disputa, que finalmente se define a través de la lucha armada.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Resumen: En los últimos 30 años han ocurrido grandes avances en el área de la medicina reproductiva, no solo respecto a los desarrollos científicotécnicos, sino que también han surgido una gran cantidad de cuestionamientos éticos, legales y sociales vinculados a la definición del concepto de dificultad en la concepción; del estatuto de embrión y la posibilidad de su manipulación; y la conformación de familias por la intervención de terceras personas, ya sea por la dación de gametas, embriones, o la subrogación de úteros. En este trabajo se presentará una revisión de los aspectos ético morales vinculados a las técnicas de fertilización asistida y su repercusión en la sociedad.