959 resultados para cartel parties
Resumo:
The purpose of this paper is to empirically examine the state of cloud computing adoption in Australia. I specifically focus on the drivers, risks, and benefits of cloud computing from the perspective of IT experts and forensic accountants. I use thematic analysis of interview data to answer the research questions of the study. The findings suggest that cloud computing is increasingly gaining foothold in many sectors due to its advantages such as flexibility and the speed of deployment. However, security remains an issue and therefore its adoption is likely to be selective and phased. Of particular concern are the involvement of third parties and foreign jurisdictions, which in the event of damage may complicate litigation and forensic investigations. This is one of the first empirical studies that reports on cloud computing adoption and experiences in Australia.
Resumo:
Against the advice of their own parliamentary committees, and despite the experience of other jurisdictions, both the Government and Opposition parties seem to be intent on outbidding each other on mandatory sentencing regimes in the lead-up to the 2003 NSW election, says DAVID BROWN.
Resumo:
To remove the right of prisoners to vote does many things. … It signals that whatever the prisoner says is not of interest to those at the top, that you are not interested in talking to them or even listening to them, that you want to exclude them and that you have no interest in knowing about them. INTRODUCTION In June 2006, Australia passed legislation disenfranchising all prisoners serving full-time custodial sentences from voting in federal elections. This followed a succession of changes dating from 1983 that alternately extended and restricted the prisoner franchise. In 1989 and 1995, the Australian Labor Party (ALP) federal government prepared draft legislation removing any restrictions on prisoner voting rights in federal elections; the measures were defeated and withdrawn. With the 2006 legislation, the Howard Coalition government (composed of the Liberal and National parties) successfully achieved the total disenfranchisement it first sought in 1998. This chapter examines the politics and legality of the 2006 disenfranchisement. This will be approached, first, by briefly outlining the key provisions of the Commonwealth Electoral Act 1918, offering a short legislative history of prisoner franchise, and examining some of the key constitutional issues. Second, the 2006 disenfranchisement introduced in the Electoral and Referendum (Electoral Integrity and Other Measures) Act 2006 will be examined in greater detail, particularly in terms of the manner in which it was achieved and the arguments that were mobilized both in support of and against the change.
Resumo:
Iterative Intersectioning is a body of art works that comes out of the collaboration between author and electronic artist Jen Seevinck and a community of print artists, most particularly Elizabeth Saunders (EJ) and Robert Oakman. The work shown here is concerned with the creative process of collaboration, specifically as this informs visual forms. This is through our focus on process. This process has facilitated a 'conversational' exchange between all artists and a corresponding evolution in the artworks. In each case the dialogue is either between the author, Jen and EJ or between Jen and Robert. It consists of passing work between parties, interpreting it and working into it, before passing it back. The result is a series of art works including those shown here. The concept evolves in parallel to this. Importantly, at each of her iterations of creative work, the author Jen determines a similar 'treatment' or 'interpretation' across both print artists works at that time. A synthesis of EJ and Robert's creative interpretation -- at a high level -- occurs. In this sense the concept and works can be understood to intersect with one another.
Resumo:
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.
Resumo:
An online interactive map and associated database including textual extracts and audiovisual material of film/novel/play locations in Australia.
Resumo:
The past decade has seen an increase in the number of significant natural disasters that have caused considerable loss of life as well as damage to all property markets in the affected areas. In many cases, these natural disasters have not only caused significant property damage, but in numerous cases, have resulted in the total destruction of the property in the location. With these disasters attracting considerable media attention, the public are more aware of where these affected property markets are, as well as the overall damage to properties that have been damaged or destroyed. This heightened level of awareness has to have an impact on the participants in the property market, whether a developer, vendor seller or investor. To assess this issue, a residential property market that has been affected by a significant natural disaster over the past 2 years has been analysed to determine the overall impact of the disaster on buyer, renter and vendor behaviour, as well as prices in these residential markets. This paper is based on data from the Brisbane flood in January 2011. This natural disaster resulted in loss of life and partial and total devastation of considerable residential property sectors. Data for the research have been based on the residential sales and rental listings for each week of the study period to determine the level of activity in the specific property sectors, and these are also compared to the median house prices for the various suburbs for the same period based on suburbs being either flood affected or flood free. As there are 48 suburbs included in the study, it has been possible to group these suburbs on a socio-economic basis to determine possible differences due to location and value. Data were accessed from realestate.com.au, a free real estate site that provides details of current rental and sales listings on a suburb basis, RP Data a commercial property sales database and the Australian Bureau of Statistics. The paper found that sales listings fell immediately after the flood in the affected areas, but there was no corresponding fall or increase in sales listings in the flood-free suburbs. There was a significant decrease in the number of rental listings follow the flood as affected parties sought alternate accommodation. The greatest fall in rental listings was in areas close to the flood-affected suburbs indicating the desire to be close to the flooded property during the repair period.
Resumo:
At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.
Resumo:
The construction industry has long been burdened with inherent adversarial relationships among the parties and the resulting disputes. Dispute review boards (DRBs) have emerged as alternatives to settle construction-related disputes outside courts. Although DRBs have found support in some quarters of the construction industry, the quantitative assessment of the impact of DRBs has not been adequately addressed. This paper presents the results of a research project undertaken to assess the impact of DRBs on the construction program of a large-scale highway agency. Three dimensions of DRB impact were assessed: (1) influence on project cost and schedule performance, (2) effectiveness of DRBs in preventing and resolving construction disputes, and (3) costs of DRB implementation. The analyses encompass data from approximately 3,000 projects extending over a 10-year period (2000–2009). Quantitative measures of performance were developed and analyzed for each category. Projects that used DRBs faced reduced costs and schedule growth (6.88 and 12.92%, respectively) when compared to non-DRB projects (11.53 and 28.96%). DRBs were also found to be effective in avoiding and settling disputes; the number of arbitration cases reduced consistently after DRB implementation, and DRBs have a success rate of 97% in settling disputes for which DRBs were used. Moreover, costs of DRBs were found to comprise a relatively small fraction (i.e., approximately 0.3%) of total project budgets. It was concluded that DRBs were effective dispute prevention and resolution alternatives with no significant adverse effects on project performance.
Resumo:
The complex supply chain relations of the construction industry, coupled with the substantial amount of information to be shared on a regular basis between the parties involved, make the traditional paper-based data interchange methods inefficient, error prone and expensive. The successful information technology (IT) applications that enable seamless data interchange, such as the Electronic Data Interchange (EDI) systems, have generally failed to be successfully implemented in the construction industry. An alternative emerging technology, Extensible Markup Language (XML), and its applicability to streamline business processes and to improve data interchange methods within the construction industry are analysed, as is the EDI technology to identify the strategic advantages that XML technology provides to overcome the barriers to implementation. In addition, the successful implementation of XML-based automated data interchange platforms for a large organization, and the proposed benefits thereof, are presented as a case study.
Resumo:
Dispute resolution in strata schemes in Peninsular Malaysia should focus on more than just "settlement." The quality of the outcome, its sustainability and its relevance in supporting the basic principles of a good neighbourhood and self-governance in a strata scheme are also fundamental. Based on the comprehensive law movement, this thesis develops a theoretical framework for strata scheme disputes within the parameters of therapeutic jurisprudence, preventive law, alternative dispute resolution (ADR) and problem-solving courts. The therapeutic orientation of this model offers approaches that promote positive communication between disputing parties, preserve neighbour relations and optimise people's psychological and emotional well-being.
Resumo:
In this paper, we explore the use of Twitter as a political tool in the 2013 Australian Federal Election. We employ a ‘big data’ approach that combines qualitative and quantitative methods of analysis. By tracking the accounts of politicians and parties, and the tweeting activity to and around these accounts, as well as conversations on particular hashtagged topics, we gain a comprehensive insight into the ways in which Twitter is employed in the campaigning strategies of different parties. We compare and contrast the use of Twitter by political actors with its adoption by citizens as a tool for political conversation and participation. Our study provides an important longitudinal counterpoint, and opportunity for comparison, to the use of Twitter in previous Australian federal and state elections. Furthermore, we offer innovative methodologies for data gathering and evaluation that can contribute to the comparative study of the political uses of Twitter across diverse national media and political systems.
Resumo:
Suppose two parties, holding vectors A = (a 1,a 2,...,a n ) and B = (b 1,b 2,...,b n ) respectively, wish to know whether a i > b i for all i, without disclosing any private input. This problem is called the vector dominance problem, and is closely related to the well-studied problem for securely comparing two numbers (Yao’s millionaires problem). In this paper, we propose several protocols for this problem, which improve upon existing protocols on round complexity or communication/computation complexity.
Resumo:
In Elders Rural Services Australia Ltd v Gooden [2014] QDC 22 Reid DCJ considered the interaction of the procedures under the Uniform Civil Procedure Rules 1999 (Qld)relating to disclosure by parties to a proceeding and the subpoena process, in the context of a proceeding commenced by originating application.
Resumo:
Since Queensland Wire Industries Pty Ltd v Broken Hill Pty Co Ltd (1989) 167 CLR 177 it has been recognised that corporations with substantial market power are subject to special responsibilities and restraints that corporations without market power are not. In NT Power Generation Pty Ltd v Power and Water Authority (2004) 219 CLR 90 McHugh A-CJ, Gummow, Callinan and Heydon JJ in their joint reasons stated (at [76]), that s 46 of the Competition and Consumer Act 2010 (Cth) (CCA) can operate not only to prevent firms with substantial market power from doing prohibited things, but also compel them positively to do things they do not want to do. Their Honours also stated (at [126]) that the proposition that a private property owner who declines to permit competitors to use the property is immune from s 46 is “intrinsically unsound”. However, the circumstances in which a firm with substantial power must accommodate competitors, and private property rights give way to the public interest are uncertain. The purpose of this Note is to consider recent developments in two areas of the CCA where the law requires private property rights to give way to the public interest. The first part of the Note considers two recent cases which clarify the circumstances in which s 46 of the CCA can be used to compel a firm with substantial market power to accommodate a competitor and allow the competitor to make use of private property rights in the public interest. Secondly, on 12 February 2014 the Minister for Small Business, the Hon Bruce Billson,released the Productivity Commission’s Final Report, on the National Access Regime in Pt IIIA of the CCA (National Access Regime, Inquiry Report No 66, Canberra). Pt IIIA provides for the processes by which third parties may obtain access to infrastructure owned by others in the public interest. The Report recommends that Pt IIIA be retained but makes a number of suggestions for its reform, some of which will be briefly considered.