892 resultados para Trade competition law
Resumo:
This presentation outlines key aspects of public policy in broad terms insofar as they relate to establishment, implementation and compliance with legal measurement standards. It refers in particular to traceability of a legal measurement unit from its source in a single international standard as a compliance issue. It comments on accreditation of legal measurement and liability concerned with errors in measurement.
Resumo:
Cyber bullying – or bullying through the use of technology – is a growing phenomenon which is currently most commonly experienced by young people and the consequences manifested in schools. Cyber bullying shares many of the same attributes as face-to-face bullying such as a power imbalance and a sense of helplessness on the part of the target. Not surprisingly, targets of face-to-face bullying are increasingly turning to the law, and it is likely that targets of cyber bullying may also do so in an appropriate case. This article examines the various criminal, civil and vilification laws that may apply to cases of cyber bullying and assesses the likely effectiveness of these laws as a means of redressing that power imbalance between perpetrator and target.
Resumo:
As most people know, all mass media, including television stations, are state-owned in China. However, with the economic reform in the broadcasting system and China entering the World Trade Organization (WTO), the television industry has expanded greatly and the television market has evolved, with an ensuing growth of competition. The players in China’s television industry have changed from a monologue of TV stations to stations that hold multiple roles and a growth of production companies and overseas television companies although the TV stations still dominate China’s television market. Private television production companies are, however, becoming increasingly active in this market.
Resumo:
The revolution in legal research provides exciting challenges for those exploring and writing about the legal landscape. Cumbersome paper sources have largely been replaced by electronic files and a new range of skills and sources are required to successfully conduct legal research.--------- Researching and Writing in Law, 3rd Edition is an updated research guide, mapping the developments that have taken place and providing the keys to the fundamental electronic sources of legal research, especially those now available on the web, as well as exploring traditional doctrinal methodologies. Included in this edition are extensive checklists for locating and validating the law in Australia, England, Canada, the United States, New Zealand, India and the European Union.-------- This third edition includes expanded discussion of the process of formulating a research proposal, writing project abstracts and undertaking a literature review (Chapter 7). Research methodologies are also extensively examined, focusing on the process of doctrinal methodology as well as discussing other useful methodologies, such as Comparative Research and Content Analysis (Chapter 5). Further highlighted are issues surrounding research ethics, including plagiarism and originality, the importance of developing skills in critique, and the influence of current university research environments on postgraduate legal research.-------- Law students and members of the practising profession aiming to update their research, knowledge and skills will find Researching and Writing in Law, 3rd Edition invaluable.
Resumo:
The extant literature covering the plights of indigenous people resident to the African continent consistently targets colonial law as an obstacle to the recognition of indigenous rights. Whereas colonial law is argued to be archaic and in need of review, which it is, this article argues the new perspective that colonial law is illegitimate for ordering the population it presides over – specifically in Africa. It is seen, in five case studies, that post-colonial legal structures have not considered the legitimacy of colonial law and have rather modified a variety of statutes as country contexts dictated. However, the modified statutes are based on an alien theoretical legality, something laden with connotations that hark to older and backward times. It is ultimately argued that the legal structures which underpin ex-colonies in Africa need considerable revision so as to base statutes on African theoretical legality, rather than imperialistic European ones, so as to maximise the law’s legitimacy.
Resumo:
This paper goes beyond the existing literature and explores the innovative topic of designing criterion-referenced assessment for online discussion forums. There are several benefits of embedding online discussion forums into subjects including engaging students in collaborative learning, and encouraging deeper analysis, critical thinking and reflection. Using the assessment principles of validity, reliability and transparency, this paper offers a range of practical strategies to tutors who plan to develop criterion-referenced assessment as opposed to norm-referenced assessment for online discussion forums, applies the assessment principles in the context of an undergraduate law subject, and exemplars a rubric for an online discussion forum in a work placement subject.
Resumo:
It is the purpose of this article to examine the means curently available to judges to achieve a workable balance between providing appropriate consumer protection to signatories of standard form contractors while still retaining adequate respect for the sanctity of contract, and, based on this analysis, to determine whether a significantly greater scope of contract (re)construction is likely to become the norm in most common law jurisdictions in the coming decades.
Resumo:
Discusses two aspects of Hong Kong law: 1) the judgment of the Hong Kong Court of Final Appeal in A Solicitor v The Law Society of Hong Kong on whether Hong Kong courts were bound, post-1997, by pre-1997 House of Lords or Privy Council decisions, by pre-1997 decisions of their own, or by post-1997 overseas decisions from any jurisdiction; and 2) the need for clarification in the Hong Kong Companies Ordinance of whether a company can have a single legal representative, the ultra vires rule and the duties of company directors
Resumo:
Economic reforms have transformed China into a modern economy - this requires greater emphasis on regulating markets and governing corporations to ensure economic growth continues. Yet, legal reforms are not as straightforward as transplanting Western models; more modification to suit Chinese political land cultural considerations needs to be incorporated. Likewise privatisation of the telecommuications sector does not mean that government influence in the new corporations cease. This is not necessarily negative as long as safeguards are in place. Plainly further reforms to the law and governance will be needed. Given that Confucian philosophy continues to play a central role in Chinese society and values, developing laws and governance practices from Confucian principles will arguably be appropriate for modern China.
Resumo:
In 2004, there were sweeping, radical changes made to the underlying legal framework regulating life in China. This reflected such things as the incorporation of basic international human rights standards into domestic law - not only in China but in countries worldwide which highlights the increasingly global nature of many important legal issues. China is not immune from this development of cross pollination of legal processes. This has led to an increase in the internationalisation of legal education and the rapid rise in the number of overseas students who undertake at least part of their university studies in a foreign country. Academics need to develop cross-cultural sensitivity in teaching these overseas students; there are important reasons why the educative process needs to meet the different set of needs presented by international students who come to study in Australia. This teaching note sets out the experiences of two particular situations, the teaching of Business Law to Asian students and an innovative Australian postgraduate program taught in Mandarin.
Resumo:
China is now seen as arguably, the next economic giant of the 21st century. From a country closed in the past to the external world, the Chinese market now presents as one of the most lucrative in the world economy. One area that has drawn increasing international interest is education - it has been estimated that by 2020 there will be 25 million excess demands for higher education places that the Chinese tertiary educational system cannot meet. Many overseas institutions have developed programs to cater for this immense potential market. In 2000 the Law Faculty of the University of Technology, Sydney (UTS)introduced a new postgraduate program specifically targeting the Chinese market. This paper is a brief assessment of the program - it examines general issues in the pedagogical delivery of programs in LOTE (Language Other Than English) and the use of 'proxies' in the delivery of LOTE programs. The paper concludes that while the UTS program demonstrates that it is feasible to use proxy lecturers or interpreters in the delivery of programs in LOTE, the exercise entails significant problems that can undermine the integrity of such programs.
Resumo:
This tome really is what it says it is: An anthology of dissent. For many of us frustrated at the lack of critical analysis, annoyed by the repetitive, albeit spectacular, images of the falling world trade towers and sickened by the absence of any reflection whatsoever upon ‘America’s Jihad’, this book provides some intellectual solace at long last. It contains 35 short pieces composed by an impressive list of prominent lawyers, academics, human rights activists and journalists. Six of the pieces are re-publications of articles that appeared in the print media commentary soon after 11 September, the other 29 are solicited pieces on a range of topics and angles.
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.
Resumo:
The concept of "fair basing" is widely acknowledged as a difficult area of patent law. This article maps the development of fair basing law to demonstrate how some of the difficulties have arisen. Part I of the article traces the development of the branches of patent law that were swept under the nomenclature of "fair basing" by British legislation in 1949. It looks at the early courts' approach to patent construction, examines the early origin of fair basing and what it was intended to achiever. Part II of the article considers the modern interpretation of fair basing, which provides a striking contrast to its historical context. Without any consistent judicial approach to construction the doctrine has developed inappropriately, giving rise to both over-strict and over-generous approaches.
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.