Academic literature on the topic 'Data Protection – Australia'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Protection – Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Data Protection – Australia"

1

Jackson, Margaret. "DATA PROTECTION - AUSTRALIA." Computer Law & Security Review 16, no. 3 (June 2000): 166–69. http://dx.doi.org/10.1016/s0267-3649(00)88911-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

von Dietze, A., and A. M. Allgrove. "Australian privacy reforms--an overhauled data protection regime for Australia." International Data Privacy Law 4, no. 4 (July 2, 2014): 326–41. http://dx.doi.org/10.1093/idpl/ipu016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Walters, Robert. "Insolvency and Data Protection." Business Law Review 42, Issue 1 (January 1, 2021): 2–12. http://dx.doi.org/10.54648/bula2021001.

Full text
Abstract:
This article examines the interrelationship between crossborder insolvency, insolvency in general and data protection. Prior to the outbreak of the coronavirus, the world had already been facing significant geopolitical and economic challenges. It examines Australia, the European Union, the United Kingdom (BREXIT), and the United States data protection and privacy laws. What has emerged from the recent adoption of data protection and privacy law, is a highly fragmented approach. States and in the case of the European Union have largely gone it alone. This poses significant challenges to entities that are experiencing financial stress and either going through insolvency (including cross border insolvency), restructuring or a merger or acquisition. Insolvency and legal practitioners will need to be aware of the varied approach taken by jurisdictions in defining personal data, the concept of consent and regulatory requirement(s) to appoint a controller or processor. This article argues that increasingly administrators and liquidators will need to consider the various data protection laws, when proceeding with cross-border insolvency. Cross-border insolvency, insolvency in general and data protection, Australia, the European Union, the United Kingdom (BREXIT), and the United States data protection and privacy laws
APA, Harvard, Vancouver, ISO, and other styles
4

Jackson, M. "Data protection regulation in Australia after 1988." International Journal of Law and Information Technology 5, no. 2 (June 1, 1997): 158–91. http://dx.doi.org/10.1093/ijlit/5.2.158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rees, Frank. "European directive on data protection could see Australia blacklisted." Computer Audit Update 1996, no. 8 (August 1996): 5. http://dx.doi.org/10.1016/0960-2593(96)84048-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Joyce, Daniel. "Data associations and the protection of reputation online in Australia." Big Data & Society 4, no. 1 (May 29, 2017): 205395171770982. http://dx.doi.org/10.1177/2053951717709829.

Full text
Abstract:
This article focuses upon defamation law in Australia and its struggles to adjust to the digital landscape, to illustrate the broader challenges involved in the governance and regulation of data associations. In many instances, online publication will be treated by the courts in a similar fashion to traditional forms of publication. What is more contentious is the question of who, if anyone, should bear the responsibility for digital forms of defamatory publication which result not from an individual author’s activity online but rather from algorithmic associations. This article seeks, in part, to analyse this question, by reference to the Australian case law and associated scholarship regarding search engine liability. Reflecting on the tensions involved here offers us a fresh perspective on defamation law through the conceptual lens of data associations. Here the focus of the article shifts to explore some wider questions posed for defamation law by big data. Defamation law may come to play a significant role in emerging frameworks for algorithmic accountability, but these developments also call into question many of its traditional concepts and assumptions. It may be time to think differently about defamation and to consider its interrelationship with privacy, speech and data protection more fully. As a result, I conclude that the courts and policymakers need to engage more deeply and explicitly with the rationale(s) for the protection of reputation and that more thought needs to be given to changing conceptions of reputation in the context of data associations.
APA, Harvard, Vancouver, ISO, and other styles
7

Anderson, Helen, Michelle Welsh, Ian Ramsay, and Peter Gahan. "THE EVOLUTION OF SHAREHOLDER AND CREDITOR PROTECTION IN AUSTRALIA: AN INTERNATIONAL COMPARISON." International and Comparative Law Quarterly 61, no. 1 (January 2012): 171–207. http://dx.doi.org/10.1017/s0020589311000595.

Full text
Abstract:
AbstractThis article is part of a larger international investigation of the effects of a country's legal origins on the style of business regulation. We employ an innovative ‘leximetric’ methodology to numerically code the protective strength of Australian corporate law for both shareholder and creditor protection for the period 1970 to 2010. This leximetric methodology has been used in a prominent international debate concerning the development of legal rules and the effects of different styles of regulation on a range of economic outcomes—the legal origins debate. Drawing on similar data compiled by Armour, Deakin, Lele and Siems in five other countries (France, Germany, India, the UK and the US) for the period 1970 to 2005, we compare changes in the level of protection afforded to Australian shareholders and creditors with developments in other countries. Our analysis finds that in Australia there was a sustained upward trend in shareholder protection, but not in the case of creditor protection. Compared to the five other countries, the level of protection afforded to shareholders under Australian law was relatively high, and this was the case for the level of protection afforded to creditors as well. We also examine the extent of convergence and divergence in shareholder and creditor protection among the countries in the study. We find persistent divergence in shareholder protection, with the extent of divergence in 2005 similar to that in 1970. For creditor protection, we find increasing divergence among the countries over the period of study. Our findings are not supportive of legal origins theory.
APA, Harvard, Vancouver, ISO, and other styles
8

Jackson, Margaret. "Turns and roundabouts: The new data protection environment in Australia." Computer Law & Security Review 15, no. 4 (July 1999): 238–42. http://dx.doi.org/10.1016/s0267-3649(99)80049-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Broadley, Karen, and Chris Goddard. "A Public Health Approach to Child Protection: Why Data Matter." Children Australia 40, no. 1 (November 3, 2014): 69–77. http://dx.doi.org/10.1017/cha.2014.37.

Full text
Abstract:
In Australia, many researchers and policy makers believe that statutory child protection systems are overburdened and ineffective. The way forward, they suggest, is a public health model of child protection. A public health approach comprises four steps: (1) collecting surveillance data; (2) establishing causes and correlations; (3) developing and evaluating interventions; and (4) disseminating information about the effectiveness of intervention activities to the public health community. However, in Australia there are no reliable surveillance data. There is no information about ‘person’. Information is not collected about the characteristics of children (e.g., ethnicity) and parents (e.g., mental illness) reported to child protection services. Data are not comparable across place. This is because the states and territories have their own child protection legislation, definitions and data recording methods. Data are not comparable over time. This is because many jurisdictions have introduced new data recording systems over recent years. This paper concludes that it is essential to develop an effective child protection surveillance data system. This will ensure that services are located in areas and targeted towards populations in greatest need. It will enable large-scale evaluation of the effectiveness of prevention and intervention activities.
APA, Harvard, Vancouver, ISO, and other styles
10

Cheytani, Samir, and Sammy Lap Ip Chan. "Data analysis of the long-term residual effect of cathodic protection on reinforced concrete structures." MATEC Web of Conferences 361 (2022): 02002. http://dx.doi.org/10.1051/matecconf/202236102002.

Full text
Abstract:
The application of impressed current cathodic protection (CP) is a well-established technology for the corrosion protection of reinforced concrete structures situated in marine environments. While the protective benefits of cathodic protection are well known, the lasting effects following the discontinuation of CP current are not entirely understood. This paper presents research findings on the residual protective effect which is known to occur following long durations of impressed current cathodic protection. The residual effect was replicated in university laboratories using reinforced concrete test blocks and accelerated CP testing methods. The experimental results depicted a clear improvement in the electrochemical state of the reinforcing steel with a shift of 150 to 300 mV to more positive values following CP application. The research also involved analysis of monitoring data from six in-service cathodic protection systems which were operating in Australia for nearly two decades. The behaviour of the steel potential readings was analysed and the results of the combined research confirmed that the protection provided by cathodic protection systems does not actually cease when the CP current is switched off. Rather, the embedded steel undergoes a significant and sustained shift to more positive values and this phenomenon is documented and discussed in this paper.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Data Protection – Australia"

1

Hicks, Michael. "Organisational barriers and their relationship to the effective use of information system audit trails." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2006. https://ro.ecu.edu.au/theses/335.

Full text
Abstract:
Audit trails are important asa detection and monitoring mechanism for unethical or unauthorised behaviour from internal, as well as external users. In addition, they can be used to demonstrate a proof of business process or as an evidentiary record to assess the integrityof an information system. Their effective use is promoted as being an essential component of a well-balanced and complete security policy. Despite the widespread acknowledgrnent of the importance of audit trails, surveys have repeatedly shown they are often neglected in terms of both the degree of implementation and effectiveness. This study explores the evidence that suggests that organisational issues, rather than technical problems may be the cause of deficiencies in audit trail effectiveness. Organisational barriers identified in current and prior studies include, lack of appropriate training, lack of comprehensive security policies and procedures, and an absence of IT staff recruitment policy.
APA, Harvard, Vancouver, ISO, and other styles
2

Snell, Mark A. "Data protection and transborder data flow : a British and Australian perspective." Thesis, University of Oxford, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Scarfe, Bradley Edward. "Oceanographic Considerations for the Management and Protection of Surfing Breaks." The University of Waikato, 2008. http://hdl.handle.net/10289/2668.

Full text
Abstract:
Although the physical characteristics of surfing breaks are well described in the literature, there is little specific research on surfing and coastal management. Such research is required because coastal engineering has had significant impacts to surfing breaks, both positive and negative. Strategic planning and environmental impact assessment methods, a central tenet of integrated coastal zone management (ICZM), are recommended by this thesis to maximise surfing amenities. The research reported here identifies key oceanographic considerations required for ICZM around surfing breaks including: surfing wave parameters; surfing break components; relationship between surfer skill, surfing manoeuvre type and wave parameters; wind effects on waves; currents; geomorphic surfing break categorisation; beach-state and morphology; and offshore wave transformations. Key coastal activities that can have impacts to surfing breaks are identified. Environmental data types to consider during coastal studies around surfing breaks are presented and geographic information systems (GIS) are used to manage and interpret such information. To monitor surfing breaks, a shallow water multibeam echo sounding system was utilised and a RTK GPS water level correction and hydrographic GIS methodology developed. Including surfing in coastal management requires coastal engineering solutions that incorporate surfing. As an example, the efficacy of the artificial surfing reef (ASR) at Mount Maunganui, New Zealand, was evaluated. GIS, multibeam echo soundings, oceanographic measurements, photography, and wave modelling were all applied to monitor sea floor morphology around the reef. Results showed that the beach-state has more cellular circulation since the reef was installed, and a groin effect on the offshore bar was caused by the structure within the monitoring period, trapping sediment updrift and eroding sediment downdrift. No identifiable shoreline salient was observed. Landward of the reef, a scour hole ~3 times the surface area of the reef has formed. The current literature on ASRs has primarily focused on reef shape and its role in creating surfing waves. However, this study suggests that impacts to the offshore bar, beach-state, scour hole and surf zone hydrodynamics should all be included in future surfing reef designs. More real world reef studies, including ongoing monitoring of existing surfing reefs are required to validate theoretical concepts in the published literature.
APA, Harvard, Vancouver, ISO, and other styles
4

London, R. W. "Comparative data protection and security : a critical evealuation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.

Full text
Abstract:
This study1 addresses the key information technology issues of the age and its unintended consequences. The issues include social control by businesses, governments, and information age Star Chambers. The study focuses on a comparative analysis of data protection, data security, and information privacy (DPSIP) laws, regulations, and practices in five countries. The countries include Australia, Canada, South Africa, the United Kingdom, and the United States. The study addresses relevant international legal standards and justifications. This multidisciplinary analysis includes a systems thinking approach from a legal, business, governmental, policy, political theory, psychosocial, and psychological perspective. The study implements a comparative law and sociolegal research strategy. Historic, linguistic, and statistical strategies are applied. The study concludes with a next step proposal, based on the research, for the international community, the five countries in the study, and specifically, South Africa as it has yet to enact a sound DPSIP approach.
LL.D. (Laws)
APA, Harvard, Vancouver, ISO, and other styles
5

London, Ray William. "Comparative data protection and security : a critical evaluation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.

Full text
Abstract:
This study1 addresses the key information technology issues of the age and its unintended consequences. The issues include social control by businesses, governments, and information age Star Chambers. The study focuses on a comparative analysis of data protection, data security, and information privacy (DPSIP) laws, regulations, and practices in five countries. The countries include Australia, Canada, South Africa, the United Kingdom, and the United States. The study addresses relevant international legal standards and justifications. This multidisciplinary analysis includes a systems thinking approach from a legal, business, governmental, policy, political theory, psychosocial, and psychological perspective. The study implements a comparative law and sociolegal research strategy. Historic, linguistic, and statistical strategies are applied. The study concludes with a next step proposal, based on the research, for the international community, the five countries in the study, and specifically, South Africa as it has yet to enact a sound DPSIP approach.
LL. D.
APA, Harvard, Vancouver, ISO, and other styles
6

Fok, Yiu Cheung George. "A comparative study of legislation affecting privacy and personalization factors of website design in Australia, Singapore and Hong Kong." Thesis, 2012. http://hdl.handle.net/1959.13/931161.

Full text
Abstract:
Professional Doctorate - Doctor of Business Administration (DBA)
This paper focused on website design factors with respect to online websites access by consumers resulting in collecting personal information. In today’s information age, focusing on personal data privacy protection issues will undoubtedly be a priority in promoting electronic commerce in Asia Pacific. Hong Kong is a pioneer in legislating comprehensive data privacy protection law amongst the common-law regimes. Hong Kong enacted the Personal Data (Privacy) Ordinance way back in 1995. In the Asia Pacific region, Australia and Hong Kong are two jurisdictions supporting the nine principles of the APEC Electronic Commerce Steering Group framework by passing comprehensive data privacy protection laws. Singapore is lagging behind and only promulgates a Model Data Protection Codes (MDPC) without any legislative support. When comparing the underlying principles of the MDPC with those stipulated in the data privacy regulatory framework of Hong Kong Australia, they are similar. This study examined websites’ data privacy design factors and the extent of the privacy policy information found in the websites. The first observatory survey visited a random sample of 307 websites with roughly equal number in Australia, Hong Kong and Singapore. The survey used a questionnaire to guide the collection of design factors related to the manner of personal data collection, the format and location of the privacy policy statement, and the types of information provided in such statement. The second survey was an email survey. Eighty seven website operators gave valid responses to a questionnaire collecting their views on personal data privacy related website design issues. Data analysis for both surveys involved counting frequencies, calculating percentages, and using Chi-square tests. This study proposed the hypotheses that were used to examine the extent of personal data privacy intrusion and the level of the privacy policy information disclosure of the websites. The proposed hypotheses assumed that these privacy related website design factors were largely influenced by the regulatory framework implemented by the government. Results of the first survey revealed that most websites collected personal data on a non-voluntary way, and there was no significant country difference. However, most websites in Australia and Hong Kong provided some form of the privacy policy statement. Singapore is the only country using a legislative threat approach instead of actual legislation to regulate personal data privacy. The results revealed that 61.8% of Singaporean websites did not provide any form of the privacy policy information. The country difference in the format and location of the privacy policy statement found in websites was significant. The results revealed that more websites in Australia and Hong Kong provided information about the purpose of collection, use of personal data, right to ensure accuracy of data stored, and data transmission security than those in Singapore. The country difference did not show up on the other types of information including the use of cookies, right to refuse promotional materials, divulge of personal data, and data retention policy. Results of the second survey were not conclusive. Hence, the website operators email survey results did not support the hypothesis that legislative and non-legislative approach would have different effects on influencing the views of the website operators.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Data Protection – Australia"

1

Hughes, Gordon. Data protection in Australia. Sydney: Law Book Co., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Margaret, Jackson. Hughes on data protection in Australia. 2nd ed. Sydney: Lawbook Co., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tucker, Greg. Information privacy law in Australia. Melbourne, Australia: Longman Professional, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clark, E. Eugene. Cyber law in Australia. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clark, E. Eugene. Cyber law in Australia. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cyber law in Australia. Alphen aan den Rijn, The Netherlands: Kluwer Law International, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Western Australia. Office of the Attorney General. Privacy legislation for Western Australia policy research paper. Perth, , WA: Privacy Working Group, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

ACISP 2004 (2004 Sydney, N.S.W.). Information security and privacy: 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings. Berlin: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1944-, Seberry Jennifer, and Zheng Yuliang 1962-, eds. Advances in cryptology--AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings. Berlin: Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1949-, Pieprzyk Josef, and Seberry Jennifer 1944-, eds. Information security and privacy: First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings. Berlin: Springer, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Data Protection – Australia"

1

Walters, Robert, Leon Trakman, and Bruno Zeller. "Australia." In Data Protection Law, 115–46. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8110-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Madsen, Wayne. "Australia, Canada and New Zealand Data Protection." In Handbook of Personal Data Protection, 152–70. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12806-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cavoukian, Ann, and Michelle Chibba. "Privacy Seals in the USA, Europe, Japan, Canada, India and Australia." In Privacy and Data Protection Seals, 59–82. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ward, Harriet, Lynne Moggach, Susan Tregeagle, and Helen Trivedi. "Adult Outcomes." In Outcomes of Open Adoption from Care, 223–65. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76429-6_8.

Full text
Abstract:
AbstractThe chapter focuses exclusively on the 60 adoptees aged over 18 who completed the follow-up survey. It draws on data collected through survey responses and interviews focusing on 24 adult adoptees. It explores their outcomes across a range of dimensions that together contribute to a composite measure of adult functionality. It presents the outcomes the adoptees achieved on each of these key domains and explores how they compared both with those of the normative Australian population and a contemporaneous cohort of care leavers. The adoptees showed more evidence of poor mental health than care leavers, but often did better in terms of education and employment. The presence of a committed adoptive parent appears to have acted as a powerful protective factor, and only extreme indicators of vulnerability at entry to the adoptive home correlated with poor adult outcomes.
APA, Harvard, Vancouver, ISO, and other styles
5

Povey, Jenny, Stefanie Plage, Yanshu Huang, Alexandra Gramotnev, Stephanie Cook, Sophie Austerberry, and Mark Western. "Adolescence a Period of Vulnerability and Risk for Adverse Outcomes across the Life Course: The Role of Parent Engagement in Learning." In Family Dynamics over the Life Course, 97–131. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12224-8_6.

Full text
Abstract:
AbstractAdolescence is a time when developmental and contextual transitions converge, increasing the risk for adverse outcomes across the life course. It is during this period that self-concept declines, mental health problems increase and when young people make educational and occupational plans for their future. Considerable research has shown that parent engagement in their child’s learning has positive effects on academic and wellbeing outcomes and may be a protective factor in adolescence. However, it is during adolescence that parent engagement typically declines. Most studies focus on early childhood or use cross-sectional designs that do not account for the high variability in both the child’s development and the parent-child relationship over time. In this chapter, we examine the association between parent engagement and students’ outcomes—self-concept, mental health, and educational aspirations—drawing on national data from the Longitudinal Study of Australian Children, while accounting for the school context—school belonging, peer connection problems, and bullying—and parenting styles using panel fixed effects models. We then explore perceptions of parental engagement and educational aspirations among a sample of adolescent students from highly disadvantaged backgrounds using interviews from the Learning through COVID-19 study. Findings show that parent engagement is important for students’ outcomes such as self-concept, mental health and aspirations in early and middle adolescence, even when accounting for family and school context factors. Further, parent engagement in late adolescence, with students from highly disadvantaged backgrounds, continues to be important for positive student outcomes.
APA, Harvard, Vancouver, ISO, and other styles
6

Boutros, Andrew. "Investigations, Privacy and Data Security Issues." In From Baksheesh to Bribery, 593–604. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190232399.003.0022.

Full text
Abstract:
When conducting internal investigations, it is critical to understand and consider various U.S. and international privacy and data protection laws. Some of the key laws investigators must consider include the Electronic Communications Privacy Act, the Fair Credit Reporting Act, and the Health Insurance Portability and Accountability Act. In addition, Sarbanes-Oxley in the United States and privacy and data security regimes in other countries and regions, for example Australia and the European Union, contain critical data security provisions, of which internal investigators must be aware. This chapter also includes discussion of other laws pertaining to the subject, such as the Children’s Online Privacy Protection Act, the Communications Act, and the Driver’s Privacy Protection Act.
APA, Harvard, Vancouver, ISO, and other styles
7

Adams, Mitchell, and Amanda Scardamaglia. "Non-Traditional Trademarks." In The Protection of Non-Traditional Trademarks, 37–58. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198826576.003.0003.

Full text
Abstract:
This chapter provides a twenty-year retrospective on non-traditional trademarks, using the European Union, the United Kingdom, Singapore, Japan, and Australia as case studies. It presents findings from an empirical study on the application and registration of non-traditional marks in these jurisdictions from 1996 to present day. It assesses whether the appetite for non-traditional marks differs across jurisdictions and what impact, if any, differing regulatory regimes have on filing and registration activity. The study also canvasses the micro-trends emerging from these data in order to test prevailing assumptions about non-traditional marks. The policy implications of these findings will also be touched upon and contextualized against growing concerns about trademark depletion, which have to date focused on the diminishing number of available words and colors as trademarks, but may well extend to non-traditional marks more generally.
APA, Harvard, Vancouver, ISO, and other styles
8

Hullin, Carol, and Mario Donoso. "Indigenous Scientist: Digital & Health Science Transformation." In Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti220939.

Full text
Abstract:
As an indigenous scientist, I have dedicated all my professional life to protecting people using informatics for public policy to the privacy of users, patients, clients, and citizens as a human right and obligation as part of the United Nations international development goals. I am reflecting on my earliest knowledge of the impact of data and information privacy on my journey as scientist. I was just a number out of many other numbers as a indigenous child. The aim of this paper is to share my own personal experience together with one of my students. Now working with data as a scientific task within the data modeling to measure poverty. As a datum with human value, I was a 1) Female child with young parents, 2) Low socioeconomic status & 3) Identified as an indigenous person within a minor language group. These three data descriptions described me as a person who needed protection of my human dignity and identity as a child, based on all the protocols of social services for providing help. In conclusion, as scientists, we need to remember when using client data in vulnerable contexts and protection of their privacy, due to the potential risk of active discrimination. Thanks to my extensive education in Australia, I became an outlying datum that deviated from the data modeling applied to me. Today, I work for Privacy digital standards to impact real life with respect to human dignity and obtain accurate scientific interpretations of human beings’ realities.
APA, Harvard, Vancouver, ISO, and other styles
9

Dubowitz, Howard. "A Global Snapshot of Child Maltreatment and Child Protection." In Principles of Global Child Health: Education and Research, 359–80. American Academy of Pediatrics, 2018. http://dx.doi.org/10.1542/9781610021906-part04-ch20.

Full text
Abstract:
There is ample evidence that child maltreatment (child abuse and neglect) is a prevalent problem, globally. Every 2 years since 1982, the International Society for the Prevention of Child Abuse and Neglect (ISPCAN) conducts a survey to assess the state of child maltreatment and child protection internationally. This chapter is excerpted and based on World Perspectives on Child Abuse, 11th Edition.1* Those wishing to read the full report, including detailed information on individual countries, can obtain a copy from ISPCAN at www.ispcan.org. It is naturally difficult to cover the entire world and to capture what is happening related to child maltreatment and child protection in many countries in any depth. Nevertheless, data from this survey offer a valuable snapshot of policies and practices pertaining to child maltreatment in different regions of the world and according to country income level. With members in more than 100 countries, ISPCAN has the capacity to identify knowledgeable professionals in the field of child maltreatment. ISPCAN initiated the current survey with respondents to past surveys. In addition, potential participants thought to be familiar with child protection in their countries were sought from ISPCAN membership. ISPCAN and executive council members were also asked to reach out to their networks, particularly in countries in which a respondent had not been identified. In addition to individual connections, ISPCAN works with national organizations in several countries as well as other international organizations. They too helped identify key informants to complete the survey. Repeated efforts were made to reach respondents in as many countries as possible. Of the 96 countries with identified respondents, 76% completed the survey. Of the 73 countries represented, 10 were from Africa, 14 from the Americas, 25 from Asia, and 23 from Europe; Oceania was represented by just Australia. Using designations of the World Bank, there was good representation of high- and middle-income countries (33 for each), but only 7 responses were from low-income countries. Caution is naturally needed when interpreting findings based on low numbers. The editor, together with an international advisory committee, developed the survey, building on prior iterations. Participants were invited to complete the survey, administered online using SurveyMonkey. Each respondent was e-mailed a link to the survey. They were also encouraged to seek input from colleagues when necessary, to help ensure the accuracy of the information. It is inherently difficult to know the many aspects of child protection in one’s country, especially when systems are not centralized and considerable variation may exist. It was beyond the scope of this project to check the accuracy of responses. These data, therefore, may not always accurately represent the complex picture or the variations within a country. The results of the survey help inform the status of maltreated children globally and likely system and programmatic interventions needed to ameliorate the status of children worldwide.
APA, Harvard, Vancouver, ISO, and other styles
10

Muñoz-Chávez, J. Patricia, Rigoberto García-Contreras, and David Valle-Cruz. "Panic Station." In Advances in Marketing, Customer Relationship Management, and E-Services, 51–73. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-4168-8.ch003.

Full text
Abstract:
The COVID-19 pandemic led to changes in consumer behavior, where social commerce played a relevant role. Through the theory of protection motivation as a theoretical basis, this chapter´s purpose is the analysis of consumer sentiment in the evolution of panic buying for which the authors identified the trend themes and some important influencers during the contingency. The results show that the leaders with the highest positive sentiment levels were the President of Taiwan and the Prime Minister of Australia. WHO was the influential account with the most negative sentiment during the pandemic. Relative to trending topics, the dataset with the highest positive sentiment is related to cleaning and disinfection products. The face mask data set had the highest negative sentiment and is the trending topic with the highest polarity. The trending topic on health foods, vitamins, and food supplements had the lowest polarity.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Data Protection – Australia"

1

Chonglin Liu and S. Heckman. "Using total lightning data in severe storm prediction: Global case study analysis from north America, Brazil and Australia." In 2011 International Symposium on Lightning Protection (XI SIPDA). IEEE, 2011. http://dx.doi.org/10.1109/sipda.2011.6088433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Budimir, Vjekoslav, Helene Lanter, and Sascha Schultes. "GUARD - smart flexible protection systems against natural hazards." In 7th International Conference on Road and Rail Infrastructure. University of Zagreb Faculty of Civil Engineering, 2022. http://dx.doi.org/10.5592/co/cetra.2022.1493.

Full text
Abstract:
Flexible steel protection systems against natural hazards are difficult to access in mountainous areas and inherently become difficult to monitor and maintain over the years. Many small-scale events, such as rock-fall below the service energy limit (SEL) defined by the EAD 340059-00-0106 or debris flows under the maximum impact pressure of the net, acc. to EAD 340020-00-0106, go unnoticed, but the repetition of several events into a protection system still needs regular maintenance to guarantee full performance in case the design event occurs. Furthermore, experience has shown that the corrosion can vary strongly in small localised areas and lead to unpleasant surprises. Therefore, the understanding of microclimates favorable to the corrosion process needs to improve. A newly developed IoT device, called GUARD, was developed aiming to provide monitoring of flexible steel protection systems. It is equipped, amongst others, with a rope force sensor and an accelerometer. The second target of the device is to pass from repair and pre-ventive maintenance to the concept of predictive maintenance by evaluating the local corrosivity and the associated lifetime of the protection system with a specially developed corrosion sensor. These sensors have been deployed over the past years on 40 sites in 13 countries in Europe. Even many flexible protection barriers are equipped with GUARD in North America, Hawaii, Australia and New Zealand. This contribution aims to highlight the monitoring with the GUARD and the inspection concept that can be developed from it, with a highlight on the data collected so far.
APA, Harvard, Vancouver, ISO, and other styles
3

Skoczylas, Paul. "Update of Field Experience with Hydraulically Regulated Progressing Cavity Pumps." In SPE Artificial Lift Conference and Exhibition - Americas. SPE, 2022. http://dx.doi.org/10.2118/209764-ms.

Full text
Abstract:
Abstract The patented hydraulically regulated progressing cavity pump (HRPCP) has been tested previously in the oilfield, but its range of application is being expanded. The HRPCP can be used in any well where a PCP would be installed and provides added protection in cases where significant free gas may be present. It is as effective as a standard PCP in pumping high viscosity fluids or fluids with high solids content, or both. It retains its effectiveness as a pump even when no gas is present, although its primary benefit is the increase in PCP run-life when there is free gas present at the pump intake. The present study is to evaluate the performance of the HRPCP in new applications around the world. Previous publications on the HRPCP have looked at installations in Argentina, Venezuela, and Kuwait. There are now installations in coal seam gas (CSG) in Queensland, Australia, gassy oil wells in Colombia, and heavy oil wells in the Lloydminster area of Canada, and in wells in the newer operations in the Clearwater formation near Slave Lake in Alberta, Canada. In Canada in particular, there have been 27 installations in thirteen fields by six oil companies at the time this paper was prepared. In Colombia, the HRPCPs were installed in new wells that were expected to produce high gas volumes while still producing some sand. In the Australian CSG wells, operators wanted to land the pumps higher in the well to avoid solids problems, knowing that this would result in higher gas volume fraction at the pump intake, so the HRPCP was chosen. In the Canadian heavy oil areas, there can be a higher GOR in many wells than there was in the past, so the gas fraction at the pump intake can now be a larger factor in PCP run-life than in the past. In some of the Canadian wells, the performance data of the previous installation is available for a direct comparison. Overall, the run-life of the HRPCP has been excellent in comparison to either expectations or to the run-life of previous PCPs in the same wells or fields. In one example well, the previous PCP suffered a significant drop in efficiency (from 60% to 10%) after 90 days. The HRPCP that followed it has been running at 70% efficiency for over 180 days (and still going). In Colombia, the operator saw reduced load on the pump due to the "gas lift" effect from the gas going through the pump and up the tubing, while exceeding expectations for run-life.
APA, Harvard, Vancouver, ISO, and other styles
4

Edwar, M., Shindi Marlina Oktaviani, Aipujana Tiara Santoso, Syachrul Gibran Muzhaffar, Irvan Husni Saugi, Muhammad Alif Putra Dafi, Galuh Mardiansyah, et al. "Development of commercial-off-the-shelf imaging payload for cloud coverage monitoring." In Symposium on Space Educational Activities (SSAE). Universitat Politècnica de Catalunya, 2022. http://dx.doi.org/10.5821/conference-9788419184405.106.

Full text
Abstract:
Locana Bhumi payload is one of the selected payloads in The 2nd GRSS Student Grand Challenge, and it will be installed in a 3U Cube Satellite. Its main mission is to monitor cloud coverage in several regions such as Indonesia, United Arab Emirates, Oman, and Australia. Clouds have a role in climate change, they are able to reflect infrared light and cool the surface of the earth that is covered by clouds. At the same time, clouds are also able to trap heat, as a result, they warm the earth. By monitoring cloud coverage over the selected areas, it is expected that we will be able to study how cloud coverage could affect the climate system on the earth. In order to monitor the cloud coverage, the Locana payload will capture cloud images by using a small serial camera that is equipped with a low voltage ¼-inch 5-megapixel OV5642 image sensor. This camera also employs a 4.14 mm focal length fixed-infrared-cut-filter lens. This camera is able to capture 500 x 375 km2 of the area from about 575 km above the earth's surface, with that area observation, the cloud coverage is expected to be easier to observe. In terms of image storage, this payload is integrated with a 1 Gigabit memory. This memory is also used for saving the payload housekeeping data. To prevent the payload from overcurrent situations, the payload system is integrated with an Over Current Protection module. Moreover, an alloy-based enclosure has been designed to protect the component from outer space radiation. The material used for the enclosure is aluminum alloy 7075. The payload has a compact dimension, which fits in 0.5U of Cube Satellite size. Currently, the development of this payload has reached the Critical Design Review stage and it is expected to be ready in Quartal-1 2022.
APA, Harvard, Vancouver, ISO, and other styles
5

Gabler, Hampton C., Brian N. Fildes, and Michael Fitzharris. "Improved Side Impact Protection: A Search for Systems Modeling Priorities." In ASME 2000 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/detc2000/dac-14248.

Full text
Abstract:
Abstract Systems Modeling evaluates the fleetwide crashworthiness of a vehicle design across the full range of potential impact speeds, angles, collision partners, occupant seating locations, and occupant restraints. Although this approach provides a more thorough assessment of crash protection than provided by a single crash test or simulation, the development of a complete Systems Model requires exhaustive simulation of every potential crash mode — a computationally prohibitive approach. This paper presents a methodology in which real world highway accident data is used to systematically develop Systems Modeling strategies that fully expose the tradeoffs between computational expense and model fidelity as measured by Harm. Using Australian side impact accident data, the paper illustrates the methodology by developing two computationally efficient strategies for developing a Systems Model for the evaluation and optimization of Side Impact protection.
APA, Harvard, Vancouver, ISO, and other styles
6

Melchers, R. E., X. L. Jiang, and K. J. Lu. "Coating Life Prediction for Water Ballast Tank." In ASME 2005 24th International Conference on Offshore Mechanics and Arctic Engineering. ASMEDC, 2005. http://dx.doi.org/10.1115/omae2005-67425.

Full text
Abstract:
Corrosion is the key factor responsible for the degradation of ship structures and in no place is this truer than water ballast tanks. Coating protection system is a continual research interest for classification societies and coating industries. Up to now, most coating performance analyses are qualitative not quantitative. Coating life prediction is almost always based on experience and various assumptions, due to unavailability of practical data support systems. This paper describes a preliminary impartial investigation of coating life carried out with interviewees from the Australian Defence Science and Technology Organization (DSTO), shipyards, coating supplier and an independent expert. Plate surface, edges and welds in ballast tank were considered and the influences of dry film thickness (DFT) and surface preparation (SP) are addressed. The investigation gives some insight into the life of practical coating systems for water ballast tanks. Coating life is proposed to be representable by a normal distribution when corrosion breakdown is below 10% of plate thickness, which is of practical implication.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Data Protection – Australia"

1

Smit, Amelia, Kate Dunlop, Nehal Singh, Diona Damian, Kylie Vuong, and Anne Cust. Primary prevention of skin cancer in primary care settings. The Sax Institute, August 2022. http://dx.doi.org/10.57022/qpsm1481.

Full text
Abstract:
Overview Skin cancer prevention is a component of the new Cancer Plan 2022–27, which guides the work of the Cancer Institute NSW. To lessen the impact of skin cancer on the community, the Cancer Institute NSW works closely with the NSW Skin Cancer Prevention Advisory Committee, comprising governmental and non-governmental organisation representatives, to develop and implement the NSW Skin Cancer Prevention Strategy. Primary Health Networks and primary care providers are seen as important stakeholders in this work. To guide improvements in skin cancer prevention and inform the development of the next NSW Skin Cancer Prevention Strategy, an up-to-date review of the evidence on the effectiveness and feasibility of skin cancer prevention activities in primary care is required. A research team led by the Daffodil Centre, a joint venture between the University of Sydney and Cancer Council NSW, was contracted to undertake an Evidence Check review to address the questions below. Evidence Check questions This Evidence Check aimed to address the following questions: Question 1: What skin cancer primary prevention activities can be effectively administered in primary care settings? As part of this, identify the key components of such messages, strategies, programs or initiatives that have been effectively implemented and their feasibility in the NSW/Australian context. Question 2: What are the main barriers and enablers for primary care providers in delivering skin cancer primary prevention activities within their setting? Summary of methods The research team conducted a detailed analysis of the published and grey literature, based on a comprehensive search. We developed the search strategy in consultation with a medical librarian at the University of Sydney and the Cancer Institute NSW team, and implemented it across the databases Embase, MEDLINE, PsycInfo, Scopus, Cochrane Central and CINAHL. Results were exported and uploaded to Covidence for screening and further selection. The search strategy was designed according to the SPIDER tool for Qualitative and Mixed-Methods Evidence Synthesis, which is a systematic strategy for searching qualitative and mixed-methods research studies. The SPIDER tool facilitates rigour in research by defining key elements of non-quantitative research questions. We included peer-reviewed and grey literature that included skin cancer primary prevention strategies/ interventions/ techniques/ programs within primary care settings, e.g. involving general practitioners and primary care nurses. The literature was limited to publications since 2014, and for studies or programs conducted in Australia, the UK, New Zealand, Canada, Ireland, Western Europe and Scandinavia. We also included relevant systematic reviews and evidence syntheses based on a range of international evidence where also relevant to the Australian context. To address Question 1, about the effectiveness of skin cancer prevention activities in primary care settings, we summarised findings from the Evidence Check according to different skin cancer prevention activities. To address Question 2, about the barriers and enablers of skin cancer prevention activities in primary care settings, we summarised findings according to the Consolidated Framework for Implementation Research (CFIR). The CFIR is a framework for identifying important implementation considerations for novel interventions in healthcare settings and provides a practical guide for systematically assessing potential barriers and facilitators in preparation for implementing a new activity or program. We assessed study quality using the National Health and Medical Research Council (NHMRC) levels of evidence. Key findings We identified 25 peer-reviewed journal articles that met the eligibility criteria and we included these in the Evidence Check. Eight of the studies were conducted in Australia, six in the UK, and the others elsewhere (mainly other European countries). In addition, the grey literature search identified four relevant guidelines, 12 education/training resources, two Cancer Care pathways, two position statements, three reports and five other resources that we included in the Evidence Check. Question 1 (related to effectiveness) We categorised the studies into different types of skin cancer prevention activities: behavioural counselling (n=3); risk assessment and delivering risk-tailored information (n=10); new technologies for early detection and accompanying prevention advice (n=4); and education and training programs for general practitioners (GPs) and primary care nurses regarding skin cancer prevention (n=3). There was good evidence that behavioural counselling interventions can result in a small improvement in sun protection behaviours among adults with fair skin types (defined as ivory or pale skin, light hair and eye colour, freckles, or those who sunburn easily), which would include the majority of Australians. It was found that clinicians play an important role in counselling patients about sun-protective behaviours, and recommended tailoring messages to the age and demographics of target groups (e.g. high-risk groups) to have maximal influence on behaviours. Several web-based melanoma risk prediction tools are now available in Australia, mainly designed for health professionals to identify patients’ risk of a new or subsequent primary melanoma and guide discussions with patients about primary prevention and early detection. Intervention studies have demonstrated that use of these melanoma risk prediction tools is feasible and acceptable to participants in primary care settings, and there is some evidence, including from Australian studies, that using these risk prediction tools to tailor primary prevention and early detection messages can improve sun-related behaviours. Some studies examined novel technologies, such as apps, to support early detection through skin examinations, including a very limited focus on the provision of preventive advice. These novel technologies are still largely in the research domain rather than recommended for routine use but provide a potential future opportunity to incorporate more primary prevention tailored advice. There are a number of online short courses available for primary healthcare professionals specifically focusing on skin cancer prevention. Most education and training programs for GPs and primary care nurses in the field of skin cancer focus on treatment and early detection, though some programs have specifically incorporated primary prevention education and training. A notable example is the Dermoscopy for Victorian General Practice Program, in which 93% of participating GPs reported that they had increased preventive information provided to high-risk patients and during skin examinations. Question 2 (related to barriers and enablers) Key enablers of performing skin cancer prevention activities in primary care settings included: • Easy access and availability of guidelines and point-of-care tools and resources • A fit with existing workflows and systems, so there is minimal disruption to flow of care • Easy-to-understand patient information • Using the waiting room for collection of risk assessment information on an electronic device such as an iPad/tablet where possible • Pairing with early detection activities • Sharing of successful programs across jurisdictions. Key barriers to performing skin cancer prevention activities in primary care settings included: • Unclear requirements and lack of confidence (self-efficacy) about prevention counselling • Limited availability of GP services especially in regional and remote areas • Competing demands, low priority, lack of time • Lack of incentives.
APA, Harvard, Vancouver, ISO, and other styles
2

Baszler, Timothy, Igor Savitsky, Christopher Davies, Lauren Staska, and Varda Shkap. Identification of bovine Neospora caninum cytotoxic T-lymphocyte epitopes for development of peptide-based vaccine. United States Department of Agriculture, March 2006. http://dx.doi.org/10.32747/2006.7695592.bard.

Full text
Abstract:
The goal of the one-year feasibility study was to identify specific cytotoxic T-lymphocyte (CTL) epitopes to Neosporacaninum in the natural bovine host in order to make progress toward developing an effective peptide-based vaccine against bovine neosporosis. We tested the hypothesis that: N. caninum SRS2 peptides contain immunogenicCTLepitope clusters cross-presented by multiple bovine MHC-I and MHC-IIhaplotypes. The specific objectives were: (1) Map bovine CTLepitopes of N. caninum NcSRS-2 and identify consensus MHC-I and class-II binding motifs; and (2) Determine if subunit immunization with peptides containing N. caninum-specificCTLepitopes cross-reactive to multiple bovine MHChaplotypes induces a CTL response in cattle with disparate MHChaplotypes. Neosporosis is a major cause of infectious abortion and congenital disease in cattle, persisting in cattle herds via vertical transmission.5 N. caninum abortions are reported in Israel; a serological survey of 52 Israeli dairy herds with reported abortions indicated a 31% infection rate in cows and 16% infection rate in aborted fetuses.9,14 Broad economic loss due to bovine neosporosis is estimated at $35,000,000 per year in California, USA, and $100,000,000 (Australian) per year in Australia and New Zealand.13 Per herd losses in a Canadian herd of 50 cattle are estimated more conservatively at $2,305 (Canadian) annually.4 Up to date practical measures to reduce losses from neosporosis in cattle have not been achieved. There is no chemotherapy available and, although progress has been made toward understanding immunity to Neospora infections, no efficacious vaccine is available to limit outbreaks or prevent abortions. Vaccine development to prevent N. caninum abortion and congenital infection remains a high research priority. To this end, our research group has over the past decade: 1) Identified the importance of T-lymphocyte-mediated immunity, particularly IFN-γ responses, as necessary for immune protection to congenital neosporosis in mice,1,2,10,11 and 2) Identified MHC class II restricted CD4+ CTL in Neosporainfected Holstein cattle,16 and 3) Identified NcSRS2 as a highly conserved surface protein associated with immunity to Neospora infections in mice and cattle.7,8,15 In this BARD-funded 12 month feasibility study, we continued our study of Neospora immunity in cattle and successfully completed T-lymphocyte epitope mapping of NcSRS2 surface protein with peptides and bovine immune cells,15 fulfilling objective 1. We also documented the importance of immune responses NcSRS2 by showing that immunization with native NcSRS2 reduces congenital Neospora transmission in mice,7 and that antibodies to NcSRS2 specifically inhibition invasion of placental trophoblasts.8 Most importantly we showed that T-lymphocyte responses similar to parasite infection, namely induction of activated IFN-γ secreting Tlymphocytes, could be induced by subunit immunization with NcSRS2 peptides containing the Neospora-specificCTLepitopes (Baszler et al, In preparation) fulfilling objective 2. Both DNA and peptide-based subunit approaches were tested. Only lipopeptide-based NcSRS2 subunits, modified with N-terminal linked palmitic acid to enhance Toll-like receptors 2 and 1 (TLR2-TLR1), stimulated robust antigen-specific T-lymphocyte proliferation, IFN-γ secretion, and serum antibody production across different MHC-IIhaplotypes. The discovery of MHC-II cross-reactive T-cellinducing parasite peptides capable of inducing a potentially protective immune response following subunit immunization in cattle is of significant practical importance to vaccine development to bovine neosporosis. In addition, our findings are more widely applicable in future investigations of protective T-cell, subunit-based immunity against other infectious diseases in outbred cattle populations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography