778 resultados para policy, citizen participation
Resumo:
ICT is becoming a prominent part of healthcare delivery but brings with it information privacy concerns for patients and competing concerns by the caregivers. A proper balance between these issues must be established in order to fully utilise ICT capabilities in healthcare. Information accountability is a fairly new concept to computer science which focuses on fair use of information. In this paper we investigate the different issues that need to be addressed when applying information accountability principles to manage healthcare information. We briefly introduce an information accountability framework for handling electronic health records (eHR). We focus more on digital rights management by considering data in eHRs as digital assets and how we can represent privacy policies and data usage policies as these are key factors in accountability systems.
Resumo:
The “political” dynamics and the details of conducting criminological research on a day-to-day basis are examined. The role of government and commercial contracts in contemporary criminological scholarship are explored, as well as the various obstacles that criminologists must negotiate during the completion of a research project. The criminological implications of the ways in which academic environments are changing under new managerialist philosophies are examined. The ways in which notions of “critique” have become subordinate to the politics of existing governing rationalities are also examined. Chapter 1 details the questions, contours, and methods of “deviant knowledge.” Chapter 2 discusses the contours of criminological knowledge, including early criminological developments, international reconstruction and developments in criminological research following World War II, the United Nations, and the rise of critical genres. Chapter 3 explores criminology, government, and public policy, including the policies of the Home Office of England and Wales; the National Institute of Justice in Washington, DC; and the Australian Institute of Criminology in Canberra. The politics and control of criminological knowledge are discussed in chapter 4, along with ethical and legal issues, gathering and accessing data, and publishing results of research. Chapter 5 describes the “War on Terror” and government intolerance and suppression of free speech. Chapter 6 examines the new modes of governance and the commercialization of criminological knowledge. Chapter 7 discusses intellectual independence and collective concern, and the value of critique. 3 appendices, 546 references, index
Resumo:
During the 1980s, terms such as interagency or multi-agency cooperation, collaboration, coordination, and interaction have became permanent features of both crime prevention rhetoric and government crime policy. The concept of having the government, local authorities, and the community working in partnership has characterized both left and right politics for over a decade. The U.S. National Advisory Commission on Criminal Justice Standards and Goals in the U.S.. Circulars 8/84 and 44/90 released by the U.K. Home Office, and the British Morgan Report-coupled with the launch of government strategies in France, the Netherlands, England and Wales, Australia, and, more recently, in Belgium, New Zealand, and Canada-have all emphasized the importance of agencies working together to prevent or reduce crime. This paper draws upon recent Australian research and critically analyzes multi-agency crime prevention. It suggests that agency conflicts and power struggles may be exacerbated by neo-liberal economic theory, by the politics of crime prevention management, and by policies that aim to combine situational and social prevention endeavors. Furthermore, it concludes that indigenous peoples are excluded by crime prevention strategies that fail to define and interpret crime and its prevention in culturally appropriate ways.
Resumo:
The use of electronic means of contact to support repeated aggressive behaviour by an individual or group, that is intended to harm others – or ‘cyberbullying’ as it is now known – is increasingly becoming a problem for modern students, teachers, parents and schools. Increasingly victims of face to face bullying are looking to the law as a means of recourse, not only against bullies but also school authorities who have the legal responsibility to provide a safe environment for learning. It is likely that victims of cyberbullying will be inclined to do the same. This article examines a survey of the anti-bullying policies of a small sample of Australian schools to gauge their readiness to respond to the challenge of cyberbullying, particularly in the context of the potential liability they may face. It then uses that examination as a basis for identifying implications for the future design of school anti-bullying policies.
Resumo:
Having wrung the most from workforce and workplace productivity initiaitves, innovation has come to the fore as a key goal and directive for public sector organisations to become more efficient. This clarion call for innovation can be heard all around the world, with public services everywhere taking up the message to develop better, smarter, novel, more innovative processes, programs and policies. In the current push for innovation, networks are considered to be a superior vehicle through which collective knowledge can be shared and leveraged; replacing or at least supplementing the role function previously provided by inventive leaders...
Resumo:
There are emerging movements in several countries to improve policy and practice to protect children from exposure to domestic violence. These movements have resulted in the collection of new data on EDV and the design and implementation of new child welfare policies and practices. To assist with the development of child welfare practice, this article summarizes current knowledge on the prevalence of EDV, and on child welfare services policies and practices that may hold promise for reducing the frequency and impact of EDV on children. We focus on Australia, Canada, and the United States, as these countries share a similar socio-legal context, a long history of enacting and expanding legislation about reporting of maltreatment, debates regarding the application of reporting laws to EDV, and new child welfare practices that show promise for responding more effectively to EDV.
Concerns about the rollout of broadband : a legal consideration of Australia’s NBN greenfield policy
Resumo:
This paper examines the Australian federal government’s proposal that developers take the primary role for deploying the National Broadband Network (‘NBN’) in greenfield estates. It identifies issues facing the NBN’s implementation and concerns raised by industry. A failure to address these concerns may lessen industry support as well as adversely impact on consumers as NBN implementation costs are passed onto them. The author identifies the need for NBN legislation to clearly establish what is a ‘greenfield estate’; how and when exemptions from implementation obligations will apply; and that NBN services must be treated the same as any other utility service.
Resumo:
What is the understanding of ‘artist’ held by a person with a mental illness? Being diagnosed with a mental illness often results in social isolation. Art programs are often used to address this isolation, and to expedite positive mental health and wellbeing. In these programs the cultural value of art can be moderated and replaced with therapeutic meanings or used for purposes of community integration. Some individuals develop artistic identities within these programs. These artists personify representative tensions within the art world. Artists with mental illness are symbolically positioned within the history of art as holding special creative providence and, yet are also viewed as having a peripheral position outside the cultural framework of the art world. This research engaged with eight artists to determine the understanding of artist held by a person with a mental illness. Through shared activities around the curatorial aspects of an exhibition entitled "Artist Citizen" the impact of illness, culture and alterity were examined. Overlapping approaches of Community Cultural Development and Participatory Action Research have been used. A perspective of alterity is given which was apparent in transformative processes of the research. This thesis shows that alterity and difference are both important social resources as well as positions of isolation and discrimination. Finally, conclusions are presented that indicated that a more nuanced understanding of alterity offers potential to discussions of the complex experiences of a person with a mental illness to negotiate subjective constructions of an identity for participation in broader political, social, health and cultural contexts.
Resumo:
Each year the Australian Federal Treasury releases its Tax Expenditures Statement providing details of concessions, benefits, and incentives delivered through the tax regime to Australian taxpayers. The current Tax Expenditures Statement, released on 25 January 2008, lists approximately 300 tax expenditures and reports on the estimated pecuniary value in terms of revenue foregone, estimated to be a total of $50.12 billion for the 2006-07 financial year. Apart from the annual Tax Expenditures Statement, and despite the recurring fiscal impact, there is very little other scrutiny of Australia’s Federal tax expenditures program. This is despite tax expenditures often being seen as an alternative to direct expenditures with similar impact on the Federal budget. The object of tax expenditures is to provide government assistance and meet government objectives, and, as such, tax expenditures are departures from the revenue raising aspect of the tax regime. Within this context, this article examines the fundamental concept of tax expenditures as contrasted with direct expenditures and considers the role they play in the current tax regime.
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Resumo:
The QUT Extreme Science and Engineering program provides free hands-on workshops to schools, presented by scientists and engineers to students from prep to year 12 in their own classrooms. The workshops are tied to the school curriculum and give students access to professional quality instruments, helping to stimulate their interest in science and engineering, with the aim of generating a greater take up of STEM related subjects in the senior high school years. In addition to engaging students in activities, workshop presenters provide role models of both genders, helping to breakdown preconceived ideas of the type of person who becomes a scientist or engineer and demystifying the university experience. The Extreme Science and Engineering vans have been running for 10 years and as such demonstrate a sustainable and reproducible model for schools engagement. With funding provided through QUT’s Widening Participation Equity initiative (HEPPP funded) the vans which averaged 120 school visits each year has increased to 150+ visits in 2010. Additionally 100+ workshops (hands-on and career focused) have been presented to students from low socio-economic status schools, on the three QUT campuses in 2011. While this is designed as a long-term initiative the short term results have been very promising, with 3000 students attending the workshops in the first six months and teacher and students feedback has been overwhelmingly positive.
Resumo:
As 2001 was the International Year of the Volunteer as it seemed timely to look at the legal, social and political frameworks which provide for the long term growth of volunteers. The focus of this research is on the nature and extent of volunteers in the Queensland State Government. The social capital debate (expanded by Robert Putnam in 1995) is about citizens’ participation in extracurricular activities and has been extended to mean a collective intelligence – a capacity as a people to create the society we want. The volunteer phenomenon has been used to indicate social and ethical concern.
Resumo:
This series of research vignettes is aimed at sharing current and interesting research findings from our team and other international Entrepreneurship researchers. In this vignette, Professor Helene Ahl from Jonkoping University considers the consequences for gender equality of policy for women's entrepreneurship in two countries with distinctly different welfare state regimes.