866 resultados para Conflict of laws


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The central contention of this article is that there is a need for greater involvement of legislators in overseeing a systematic and rights-based scrutiny of the impact of legislation and policy. The recent operation of Australia s asylum laws and policies, in particular provides an illustration of the reforms required. Challenges to the rights of non-citizens in Australia and other jurisdictions serve as a reminder of the extent of change required before rights are firmly entrenched in the processes of government. A useful step forward would be to enhance the role of legislators in setting the criteria and agenda for post-enactment scrutiny in light of issues raised during pre-legislative scrutiny.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In June 2011, a research project team from the Institute for Ethics, Governance and Law (IEGL), Queensland University of Technology, the United Nations University, and the Australian Government’s Asia Pacific Civil-Military Centre of Excellence (APCMCOE) held three Capacity-Building Workshops (the Workshops) on the Responsibility to Protect (R2P) and the Protection of Civilians (POC) in Armed Conflict in Manila, Kuala Lumpur, and Jakarta. The research project is funded by the Australian Responsibility to Protect Fund, with support from APCMCOE. Developments in Libya and Cote d’Ivoire and the actions of the United Nations Security Council have given new significance to the relationship between R2P and POC, providing impetus to the relevance and application of the POC principle recognised in numerous Security Council resolutions, and the R2P principle, which was recognised by the United Nations General Assembly in 2005 and, now, by the Security Council. The Workshops considered the relationship between R2P and POC. The project team presented the preliminary findings of their study and sought contributions and feedback from Workshop participants. Prior to the Workshops, members of the project team undertook interviews with UN offices and agencies, international organisations (IOs) and non-government organisations (NGOs) in Geneva and New York as part of the process of mapping the relationship between R2P and POC. Initial findings were considered at an Academic-Practitioner Workshop held at the University of Sydney in November 2010. In addition to an extensive literature review and a series of academic publications, the project team is preparing a practical guidance text (the Guide) on the relationship between R2P and POC to assist the United Nations, governments, regional bodies, IOs and NGOs in considering and applying appropriate protection strategies. It is intended that the Guide be presented to the United Nations Secretariat in New York in early 2012. The primary aim of the Workshops was to test the project’s initial findings among an audience of diplomats, military, police, civilian policy-makers, practitioners, researchers and experts from within the region. Through dialogue and discussion, the project team gathered feedback – comments, questions, critique and suggestions – to help shape the development of practical guidance about when, how and by whom R2P and POC might be implemented.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Significant numbers of children are severely abused and neglected by parents and caregivers. Infants and very young children are the most vulnerable and are unable to seek help. To identify these situations and enable child protection and the provision of appropriate assistance, many jurisdictions have enacted ‘mandatory reporting laws’ requiring designated professionals such as doctors, nurses, police and teachers to report suspected cases of severe child abuse and neglect. Other jurisdictions have not adopted this legislative approach, at least partly motivated by a concern that the laws produce dramatic increases in unwarranted reports, which, it is argued, lead to investigations which infringe on people’s privacy, cause trauma to innocent parents and families, and divert scarce government resources from deserving cases. The primary purpose of this paper is to explore the extent to which opposition to mandatory reporting laws is valid based on the claim that the laws produce ‘overreporting’. The first part of this paper revisits the original mandatory reporting laws, discusses their development into various current forms, explains their relationship with policy and common law reporting obligations, and situates them in the context of their place in modern child protection systems. This part of the paper shows that in general, contemporary reporting laws have expanded far beyond their original conceptualisation, but that there is also now a deeper understanding of the nature, incidence, timing and effects of different types of severe maltreatment, an awareness that the real incidence of maltreatment is far higher than that officially recorded, and that there is strong evidence showing the majority of identified cases of severe maltreatment are the result of reports by mandated reporters. The second part of this paper discusses the apparent effect of mandatory reporting laws on ‘overreporting’ by referring to Australian government data about reporting patterns and outcomes, with a particular focus on New South Wales. It will be seen that raw descriptive data about report numbers and outcomes appear to show that reporting laws produce both desirable consequences (identification of severe cases) and problematic consequences (increased numbers of unsubstantiated reports). Yet, to explore the extent to which the data supports the overreporting claim, and because numbers of unsubstantiated reports alone cannot demonstrate overreporting, this part of the paper asks further questions of the data. Who makes reports, about which maltreatment types, and what are the outcomes of those reports? What is the nature of these reports; for example, to what extent are multiple numbers of reports made about the same child? What meaning can be attached to an ‘unsubstantiated’ report, and can such reports be used to show flaws in reporting effectiveness and problems in reporting laws? It will be suggested that available evidence from Australia is not sufficiently detailed or strong to demonstrate the overreporting claim. However, it is also apparent that, whether adopting an approach based on public health and or other principles, much better evidence about reporting needs to be collected and analyzed. As well, more nuanced research needs to be conducted to identify what can reasonably be said to constitute ‘overreports’, and efforts must be made to minimize unsatisfactory reporting practice, informed by the relevant jurisdiction’s context and aims. It is also concluded that, depending on the jurisdiction, the available data may provide useful indicators of positive, negative and unanticipated effects of specific components of the laws, and of the strengths, weaknesses and needs of the child protection system.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Public participate in the planning and design of major public infrastructure and construction (PIC) projects is crucial to their success, as the interests of different stakeholders can be systematically captured and built into the finalised scheme. However, public participation may not always yield a mutually acceptable solution, especially when the interests of stakeholders are diverse and conflicting. Confrontations and disputes can arise unless the concerns or needs of the community are carefully analysed and addressed. The aim of the paper is to propose a systematic method of analysing stakeholder concerns relating to PIC projects by examining the degree of consensus and/or conflict involved. The results of a questionnaire survey and a series of interviews with different entities are provided, which indicate the existence of a significant divergence of views among stakeholder groups and that conflicts arise when there is a mismatch between peoples’ perception concerning money and happiness on the one hand and development and damages on the other. Policy and decision-makers should strive to resolve at least the majority of conflicts that arise throughout the lifecycle of major PIC projects so as to maximise their chance of success.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Navigational safety analysis relying on collision statistics is often hampered because of low number of observations. A promising alternative approach that overcomes this problem is proposed in this paper. By analyzing critical vessel interactions this approach proactively measures collision risk in port waters. The proposed method is illustrated for quantitative measurement of collision risks in Singapore port fairways, and validated by examining correlations between the measured risks with those perceived by pilots. This method is an ethically appealing alternative to the collision-based analysis for fast, reliable and effective safety assessment, thus possesses great potential for managing collision risks in port waters.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Workplace mobbing is a particularly serious phenomenon that is extremely costly to organizations and the health of those targeted. This article reports on a study of self-identified targets of mobbing. Findings support a five-stage process of mobbing, which commences with unresolved conflict and leads ultimately to expulsion from the organization. Participants report a number of experiences, such as lengthy investigations and escalation of conflict, that result in an increasingly unbalanced sense of power away from the individual and towards the organization. Revealed is a mismatch between the expected organizational justice processes and support and the actual experience. Recommendations for approaching this problem are discussed.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

With increasing rate of shipping traffic, the risk of collisions in busy and congested port waters is likely to rise. However, due to low collision frequencies in port waters, it is difficult to analyze such risk in a sound statistical manner. A convenient approach of investigating navigational collision risk is the application of the traffic conflict techniques, which have potential to overcome the difficulty of obtaining statistical soundness. This study aims at examining port water conflicts in order to understand the characteristics of collision risk with regard to vessels involved, conflict locations, traffic and kinematic conditions. A hierarchical binomial logit model, which considers the potential correlations between observation-units, i.e., vessels, involved in the same conflicts, is employed to evaluate the association of explanatory variables with conflict severity levels. Results show higher likelihood of serious conflicts for vessels of small gross tonnage or small overall length. The probability of serious conflict also increases at locations where vessels have more varied headings, such as traffic intersections and anchorages; becoming more critical at night time. Findings from this research should assist both navigators operating in port waters as well as port authorities overseeing navigational management.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms. This paper presents group law in affine coordinates for three forms of elliptic curves. With the existence of the proposed affine group laws, stating the projective group law for each form becomes trivial. This work also describes an automated framework for studying elliptic curve group law, which is applied internally when preparing this work.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Dealing with the aggression of other drivers on the road is an important skill given that driving is a common activity for adults in highly motorised countries. Even though incidents of extreme aggression on the road (such as assault) are reportedly rare, milder forms, some of them dangerous (such as tailgating or deliberately following too closely) are apparently common, and may be increasing. At the very least, this is likely to render the driving environment more stressful, and at worst elevates the risk of crashing by increasing both the level of risky driving behaviours and the likelihood of responses that escalate the situation. Thus the need for drivers to manage incidents of conflict is likely to become increasingly important. However, little research examines how drivers manage their own or others’ aggressive driving behaviour. Recently greater attention has been paid to driver cognitions, especially the attributions that drivers make about other drivers, that then might influence their own driving responses, particularly aggressive or risky ones. The study reported below was the first in a larger exploration of aggressive driving that focussed on driver cognitions, emotions and underlying motivations for aggressive behaviours on the road. Qualitative, in-depth interviews of drivers (n = 30, aged 18-49 years) were subjected to thematic analysis to investigate driver experiences with aggressive driving. Two main themes were identified from these accounts: driver management of self; and driver attempts to influence or manage other drivers. This paper describes the subthemes falling under the management of self main theme. These subthemes were labelled ‘being magnanimous’, ‘chilling out’, ‘slowing down’, and ‘apology/acknowledgment’. ‘Being magnanimous’ referred to situations where the respondent perceived him/herself to be a recipient of another’s aggressive driving and made a deliberate choice not to respond. However, a characteristic of this sub-theme was that this choice was underpinned by the adoption of morally superior stance, or sense of magnanimity. ‘Chilling out’ was a more general response to both the milder aggressive behaviours of other drivers and the general frustrations of driving. ‘Slowing down’ referred to reducing one’s speed in response to the perceived aggressive driving, often tailgating, of another. This subtheme appeared to consist of two separate underlying motivations. One of these was a genuine concern for one’s own safety while the other was more aimed at “getting back” at the other driver. ‘Apology’ referred to how drivers modified their more negative reactions and responses when another driver made gestures that acknowledged their having made a mistake, indicated an apology, or acknowledged the recipient driver. These sub-themes are discussed in relation to their implications for understanding aggressive driving and intervening to reduce it.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This chapter reviews aspects of the challenge of reviewing and reforming Indonesian practice within state asset management law and policy specifically related to public housing, public buildings, parklands, and vacant land. A critical issue in beginning this review is how Indonesia currently conceptualizes the notion of asset governance and how this meaning is embodied in recent changes in law and policy and importantly in options for future change. This chapter discusses the potential complexities uniquely Indonesian characteristics such as decentralisation and regional autonomy regime, political history, and bureaucratic culture.