921 resultados para conclusions of law
Resumo:
In recent times considerable research attention has been directed to understanding dark networks, especially criminal and terrorist networks. Dark networks are those in which member motivations are self rather than public interested, achievements come at the cost of other individuals, groups or societies and, in addition, their activities are both ‘covert and illegal’ (Raab & Milward, 2003: 415). This ‘darkness’ has implications for the way in which these networks are structured, the strategies adopted and their recruitment methods. Such entities exhibit distinctive operating characteristics including most notably the tension between creating an efficient network structure while retaining the ability to hide from public view while avoiding catastrophic collapse should one member cooperate with authorities (Bouchard 2007). While theoretical emphasis has been on criminal and terrorist networks, recent work has demonstrated that corrupt police networks exhibit some distinctive characteristics. In particular, these entities operate within the shadows of a host organisation - the Police Force and distort the functioning of the ‘Thin Blue Line’ as the interface between the law abiding citizenry and the criminal society. Drawing on data derived from the Queensland Fitzgerald Commission of Enquiry into Police Misconduct and related documents, this paper examines the motivations, structural properties and operational practices of corrupt police networks and compares and contrasts these with other dark networks with ‘bright’ public service networks. The paper confirms the structural differences between dark corrupt police networks and bright networks and suggests. However, structural embeddedness alone is found to be an insufficient theoretical explanation for member involvement in networks and that a set of elements combine to impact decision-making. Although offering important insights into network participation, the paper’s findings are especially pertinent in identifying additional points of intervention for police corruption networks.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
A recurring finding within the research on same-sex intimate partner violence (IPV) is that victims rarely seek assistance from police or other service providers. A study by William Leonard et al (2008: 47) in Victoria, Australia, found that around two thirds of gay, lesbian, bisexual and transgender victims did not report such violence. It also appears that men are less likely than women to seek help for IPV (Turell and Cornell-Swanson 2005:79–80), and for those that do, informal support networks are approached more often than formal services (Merrill and Wolfe 2000: 16; Farrell and Cerise 2006: 4).
Resumo:
This paper explores attempts to shape resilient personae through relations of self-government, and highlights the way that this features as part of advanced liberal forms of rule. As an example of this process, it focuses on the way that undergraduate law students are encouraged to fashion resilient personae throughout their legal studies, so as to avoid, or effectively respond to, experiences that may have a detrimental effect on their mental health. This paper argues that the production of such resilience relies on students being encouraged to take up psychologically- and biomedically-infused subject positions, becoming well-disciplined subjects, entrepreneurs of the self, and even virtuous persons. It highlights that the fashioning of resilient personae in this way involves extensions to the targets and practices of self-government and reinforces advanced liberal government. The paper then suggests how insights into fashioning resilience in this context can inform further research on resilience, particularly resilience produced within criminal justice professionals.
Resumo:
This study seeks to analyse the adequacy of the current regulation of the payday lending industry in Australia, and consider whether there is a need for additional regulation to protect consumers of these services. The report examines the different regulatory approaches adopted in comparable OECD countries, and reviews alternative models for payday regulation, in particular, the role played by responsible lending. The study also examines the consumer protection mechanisms now in existence in Australia in the National Consumer Credit Protection Act 2009 (Cth) (NCCP) and the National Credit Code (NCC) contained in Schedule 1 of that Act and in the Australian Securities and Investments Commission Act 2001 (Cth).
Resumo:
In 2003, the youth justice system in Scotland entered a new phase with the introduction of a pilot youth court. The processing of persistent 16 and 17 year old (and serious 15 year olds) represented a stark deviation from a ‘child centred’ and needs-oriented state apparatus for dealing with young offenders to one based on deeds and individual responsibility. This article, based on an evaluation funded by the Scottish Executive, is the first to provide a critical appraisal of this youth justice reform. It examines the views of the judiciary and young offenders and reveals that the pilot youth court in Scotland represents a punitive excursion that poses serious concerns for due process, human rights and net widening.
Resumo:
To understand the nature of police organisations and their management in an Australian context it is necessary to appreciate the recent history of policing at least in the last 30 years. In doing so an overall perspective is gained on the various reform efforts and organisational changes that have taken place in Australian policing. With this police reform perspective clearly in mind it then becomes possible to appreciate that the organization and management of the institution of policing in Australia is nested within the larger framework of ‘governance’. Hence, this notion of governance will be used as the key focal point around which to understand how police organizations manage their mission in the Australian context. Finally, the chapter discusses the inevitable ‘tension spaces’ that arise in policing and the need for police organizations to better manage such complexities.