965 resultados para law and legislation


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Publication no longer for sale by Supt. of Docs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Appendix (A194 p., bound at end of pt. 1) has title: An evaluation of the mandatory petroleum allocation program, January 15-February 28, 1974; staff report to the Federal Trade Commission, March 15, 1974.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Bibliography: v.4, p. [2981]-2998.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"Books": p. 273-278

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Current policy issues surrounding management of the Great Artesian Basin - historical development of existing legislation and institutions - hydrological and historical background information - development of concerns over unsustainable use of resources and possible adverse environmental impacts - recent developments associated with the general reforms to water law and policy initiated by the Council of Australian Governments (COAG) - comparison of issues surrounding the Murray-Darling Basin and the Great Artesian Basin.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Key findings: The paper investigates the impact that the legislative changes of 2006 had on civil society in Russia. This legislation has change the regulatory environment in which civil society actors such as Third Sector Organisations operate. Using the past development of civil society organisations as well as insights about how the institutional environment influences this article illustrates: - the undemocratic nature and motivation of the law and how it exploits the structural weaknesses of civil society - how Third Sector Organisations rationalise and translate the legislative changes into their organisational realities and how this changed or did not change their behaviour - the shift in state-civil society relations away from liberal co-existence into more hierarchical arrangements were Third Sector Organisations are subordinated to the state. These trends have far reaching implications for civil society. The empirical evidence shows that state now manages civil society to meet its own political ends. It also shows that organisations in the field welcome the more engage and directive nature of the Russian state. Why is this important? What does it mean for business or other users? Are there policy implications? The research is important as it shows how Third Sector Organisations have reacted to the legislative changes. Further it provides a basis for interpretation of the potential future development of civil society. Additional it highlights how the continuous process of democratisation in transition economies sometimes might come unstuck. In particular donor agencies will need to consider these trends when disturbing funding to Third Sector Organisations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Judicial decisions about whether or not to publicly name child homicide offenders have long ani- mated debate in the United Kingdom and internationally. This article draws on case law and in- depth interviews conducted with members of the English criminal justice system to critically analyse the viability of current domestic legislation in the context of the UK’s international human rights obligations. The article identifies ambiguities surrounding the definition of ‘public interest’ in law; the merits of equating the naming of child offenders with open justice, accountability and transpar- ency; and the increasing sabotage of the principle of rehabilitation. By identifying the complexities of this contentious area of judicial discretion, this article highlights the need for a rights-based approach to decisions about publicly naming children in conflict with the law.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report is the primary output of Project 4: Copyright and Intellectual Property, the aim of which was to produce a report considering how greater access to and use of government information could be achieved within the scope of the current copyright law. In our submission for Project 4, we undertook to address: •the policy rationales underlying copyright and how they apply in the context of materials owned, held and used by government; • the recommendations of the Copyright Law Review Committee (CLRC) in its 2005 report on Crown copyright; • the legislative and regulatory barriers to information sharing in key domains, including where legal impediments such as copyright have been relied upon (whether rightly or wrongly) to justify a refusal to provide access to government data; • copyright licensing models appropriate to government materials and examples of licensing initiatives in Australia and other relevant jurisdictions; and • issues specific to the galleries, libraries, archives and museums (“GLAM”) sector, including management of copyright in legacy materials and “orphan” works. In addressing these areas, we analysed the submissions received in response to the Government 2.0 Taskforce Issues Paper, consulted with members of the Task Force as well as several key stakeholders and considered the comments posted on the Task Force’s blog. This Project Report sets out our findings on the above issues. It puts forward recommendations for consideration by the Government 2.0 Task Force on steps that can be taken to ensure that copyright and intellectual property promote access to and use of government information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy and all ‘others’ indeed ‘othered.’ This paper reports on research carried out by the authors in a core first year university justice class, in which students of law and/or justice were required to engage with, discuss, and reflect on discourses on sexuality. It uses a poststructural framework to identify how students understand non-heterosexualities and how they personally relate to queer identities, in the sense that it asks questions about gender and sexual identity, and the discourses surrounding them. It was found that strongly negative attitudes to non-heterosexualities are quite resistant to challenge, and that some students express being confronted with queerness as a deep-seated fear of being drawn into otherness against their will. The result was that, while many students were able to unpack their attitudes towards queerness and engage in critical reflection and re-evaluation of their attitudes, students with strongly negative views towards non-heterosexualities conversely refused to engage at all, typically perceiving even the engagement itself as a threat to their core heterosexual identity. However, the authors caution against relying on the idea that students are simply “homophobic” to explain this reluctance, as this term does not necessarily account for the complexity of the discourses that inform students’ reactions in this context. This “homophobia” may simply be related to a way of performing gender and sexual identity as opposed to overt discrimination and fear.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This presentation outlines key aspects of public policy in broad terms insofar as they relate to establishment, implementation and compliance with legal measurement standards. It refers in particular to traceability of a legal measurement unit from its source in a single international standard as a compliance issue. It comments on accreditation of legal measurement and liability concerned with errors in measurement.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Scientific discoveries, developments in medicine and health issues are the constant focus of media attention and the principles surrounding the creation of so called ‘saviour siblings’ are of no exception. The development in the field of reproductive techniques has provided the ability to genetically analyse embryos created in the laboratory to enable parents to implant selected embryos to create a tissue-matched child who may be able to cure an existing sick child. The research undertaken in this thesis examines the regulatory frameworks overseeing the delivery of assisted reproductive technologies (ART) in Australia and the United Kingdom and considers how those frameworks impact on the accessibility of in vitro fertilisation (IVF) procedures for the creation of ‘saviour siblings’. In some jurisdictions, the accessibility of such techniques is limited by statutory requirements. The limitations and restrictions imposed by the state in relation to the technology are analysed in order to establish whether such restrictions are justified. The analysis is conducted on the basis of a harm framework. The framework seeks to establish whether those affected by the use of the technology (including the child who will be created) are harmed. In order to undertake such evaluation, the concept of harm is considered under the scope of John Stuart Mill’s liberal theory and the Harm Principle is used as a normative tool to judge whether the level of harm that may result, justifies state intervention or restriction with the reproductive decision-making of parents in this context. The harm analysis conducted in this thesis seeks to determine an appropriate regulatory response in relation to the use of pre-implantation tissue-typing for the creation of ‘saviour siblings’. The proposals outlined in the last part of this thesis seek to address the concern that harm may result from the practice of pre-implantation tissue-typing. The current regulatory frameworks in place are also analysed on the basis of the harm framework established in this thesis. The material referred to in this thesis reflects the law and policy in place in Australia and the UK at the time the thesis was submitted for examination (December 2009).