922 resultados para International Protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In March 2000, the Department of Health and the Home Office issued guidance fundamentally altering policy and practice with regard to young people in prostitution. 1 Instead of being arrested and punished for prostitution-related offences, those under 18 years old were to be thought of as children ‘in need’ and offered welfare-based interventions. The practice that has developed in the last three years has offered interventions that are located within both child protection and youth justice work. This article examines these changes in order to generate insights about the changing nature of youth justice. In particular, it is argued that the drive to manage the risks posed by young people in prostitution to specific organisations, takes precedence over either the desire to care for, or the demand to punish them. Through an analysis of how practitioners and policy makers responsible for implementing this new approach to youth prostitution talk about ‘risk’ and ‘responsibility’, ‘liability’, ‘protection’ and ‘punishment’, the article argues that the contradiction between care and control has been re-interpreted, such that there is noticeable blurring of the boundaries between welfare and punishment at the margins of youth justice work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In little more than a decade, Green Criminology has become an established new perspective in the field. It embraces an exciting and wide range of topics, from controversies about genetic modification through corporate offending against the environment and human communities, to animal abuse. Green Criminology provides a focal point for longstanding and new areas of research as well as making important interdisciplinary connections.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ross River Virus has caused reported outbreaks of epidemic polyarthritis, a chronic debilitating disease associated with significant long-term morbidity in Australia and the Pacific region since the 1920s. To address this public health concern, a formalin- and UV-inactivated whole virus vaccine grown in animal protein-free cell culture was developed and tested in preclinical studies to evaluate immunogenicity and efficacy in animal models. After active immunizations, the vaccine dose-dependently induced antibodies and protected adult mice from viremia and interferon α/β receptor knock-out (IFN-α/βR(-/-)) mice from death and disease. In passive transfer studies, administration of human vaccinee sera followed by RRV challenge protected adult mice from viremia and young mice from development of arthritic signs similar to human RRV-induced disease. Based on the good correlation between antibody titers in human sera and protection of animals, a correlate of protection was defined. This is of particular importance for the evaluation of the vaccine because of the comparatively low annual incidence of RRV disease, which renders a classical efficacy trial impractical. Antibody-dependent enhancement of infection, did not occur in mice even at low to undetectable concentrations of vaccine-induced antibodies. Also, RRV vaccine-induced antibodies were partially cross-protective against infection with a related alphavirus, Chikungunya virus, and did not enhance infection. Based on these findings, the inactivated RRV vaccine is expected to be efficacious and protect humans from RRV disease

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The importance of design to the UK economy is widely recognised. It is one of the key pillars of the knowledge economy, it plays an important role in the innovation process, and it is one of a number of specialisms that help to set the UK apart from global competition. But despite this importance, the nature of design-intensive industries – the businesses that practice and sell design – is remarkably hard to pin down. This uncertainty renders it hard to analyse, and makes it difficult to develop clear, consistent policies to support the designers. The Hargreaves Review recommended that more research was needed to develop a clear evidence base for improving the intellectual property system for design. This report forms part of that evidence base. It examines how UK design figures in the global economy, and considers how the intellectual property system can best support its growth.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is an independent report comissioned by the Intellectual Property Office (IPO) and supported by the Design Council.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes part of an action research study that was designed to explore the outcomes of an ongoing program in which the participants, a group of domestic and international pre-service teachers and lecturers, worked together in reflective writing workshops. While the primary long-term goal of the program was to develop the intercultural competence and understanding of all of the participants through social activities, the development of social relationships was initiated and supported by involving the participants in weekly writing workshops that focused on shared salient skills of critical reflective thinking and writing. The focus of this paper is upon the outcomes for the international students, a cohort of second year pre-service teachers from Malaysia. Findings indicated that the program was successful in developing the Malaysian pre-service teachers’ self-confidence in perceiving themselves as writers and future teachers of writing, in shifting their focus from writing product to writing process and content, and in increasing the depth of their critical reflective thinking and writing

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose Over the past decade, the Queensland wine industry has experienced a greater percentage growth than the Australian national average. The aim of the research undertaken for this article is to identify specific national and international strategies that have allowed the industry to achieve this level of growth. Design/methodology/approach The study involved a quantitative survey of all Queensland wineries at the time (n=101), using a five-point Likert-scaled questionnaire with questions developed from the literature, together with a small-scale qualitative survey involving in-depth interviews of winery managers and industry leaders. Findings The findings indicated that key strategies in the domestic sector included a focus on cellar door sales combined with establishing links with the tourism industry, together with an incremental expansion of domestic markets. For the international sector, additional strategies included targeting familiar, psychically-close and niche markets in the initial stages of exporting, as well as taking advantage of firm-specific strengths and managerial competencies. Originality/value Not previously regarded as a major wine producing region of Australia, the Queensland wine industry has received limited attention in the literature, particularly the reasons for its rapid growth in recent years. The article helps to identify the strategies used by wineries in growing the industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditional analytic models for power system fault diagnosis are usually formulated as an unconstrained 0–1 integer programming problem. The key issue of the models is to seek the fault hypothesis that minimizes the discrepancy between the actual and the expected states of the concerned protective relays and circuit breakers. The temporal information of alarm messages has not been well utilized in these methods, and as a result, the diagnosis results may be not unique and hence indefinite, especially when complicated and multiple faults occur. In order to solve this problem, this paper presents a novel analytic model employing the temporal information of alarm messages along with the concept of related path. The temporal relationship among the actions of protective relays and circuit breakers, and the different protection configurations in a modern power system can be reasonably represented by the developed model, and therefore, the diagnosed results will be more definite under different circumstances of faults. Finally, an actual power system fault was served to verify the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE.