4,749 research outputs found

    Annual performance indicators of enforced driver behaviours in South Australia, 2007

    Get PDF
    This report was produced to quantify performance indicators for selected enforced driver behaviours (drink driving, drug driving, speeding and restraint use) in South Australia for the calendar year 2007. The level of random breath testing (RBT) in South Australia in 2007 decreased slightly but remained at a relatively high level. The proportion of tests conducted using mobile RBT continued to increase. The detection rate based on evidentiary testing increased in 2007 to the highest level on record, while the detection rate for screening tests decreased. Detection rates in South Australia were comparable with those in other states. Just over 12,000 drug tests were conducted during 2007, the first full year of random drug testing. Relative to other Australian jurisdictions supplying comparative data, South Australia had the highest testing rate per head of population. Around 24 drivers per 1,000 tested were confirmed positive for at least one of the three prescribed drugs with methylamphetamine the most commonly detected drug. Of the fatally injured drivers who were drug tested in 2007, 25 per cent tested positive for illicit drugs. There was a slight decrease in the number of hours spent on speed detection in 2007. Nevertheless, the total number of speed detections increased, with increases observed for speed camera and red light/speed cameras, the latter most likely due to the expansion of the program. The detection rate (per hour of enforcement and per 1,000 vehicles passing speed cameras) increased by around 30 per cent. Data from systematic speed surveys, introduced in 2007, indicated that travelling speeds on South Australian roads were increasing. The number of restraint offences in 2007 decreased by 14 per cent. Males were charged with more restraint offences and were more likely to be unrestrained in fatal and serious injury crashes than females, indicating that males remain an important target for restraint enforcement. The 2007 publicity campaign focused on the consequences of not using restraints rather than increasing the perceived risk of detection.LN Wundersitz, K Hiranandani, MRJ Baldoc

    THE POLITICS OF SOUTHERN ASIAN BALLISTIC MISSILES: TOWARDS A FRAMEWORK FOR A MUTUAL RESTRAINT REGIME

    Get PDF
    ABSTRACT Southern Asia is witnessing the rapid proliferation of ballistic missiles in and around the region. This proliferation phenomenon, together with ongoing and enduring conflicts amongst the “competing parties” (China, India and Pakistan) creates a potential surfacing of “nuclear flashpoint” in the region. This research is an endeavour to explore the causes of this nuclear and missile race amongst the Southern Asian powers (China, India, and Pakistan) with the help of the theory of strategic culture. This study proceeds in the following way: it assesses the geo-political forces at work in the region; examines the strategic culture of China, India and Pakistan; traces the motivation of these countries for the strategic weapon programmes and delivery systems; describes their nuclear doctrines and command and control structures; and the current status of their ballistic missile programmes. It then addresses the prospects for Pakistan, India and China to move towards a system of mutual restraint regime, in which international regime theory is discussed as a conceptual framework; cold war models of strategic arms limitation and reduction models are studied and the important role of Confidence and Security Building Measures (CSBMs) is identified. The same procedure is then applied in the context of Southern Asian region; problem areas identified with the help of CSBMs tools; and conclusions reached as to the potential to move beyond CSBMs into full restraint regime. The study finds the very nature of the overlapping threat perceptions and the continuance of the unresolved issues and disputes as the main hurdles in the successful restraint models. Recommendations are therefore made for more comprehensive CSBMs leading to a Southern Asian regional version of cold war prototypes of strategic arms limitation and reduction for a more comprehensive and fruitful restraint model, which might then be applied and adhered to at the global level. The study therefore opens new avenues of research and progress in the discipline

    Deterring Malicious Behavior in Cyberspace

    Get PDF
    Recent incidents reveal cyberattacks are being employed and honed in a systematic, coordinated fashion to achieve the objectives of malicious actors. Deterrence of the wide array of actors in cyberspace is difficult, since deterrence has to work in the mind of the attacker. Each attacker will weigh the effort of the attack against the expected benefit under their own criteria or rationality. This article analyzes whether the contemporary and complementary deterrence strategies of retaliation, denial, and entanglement are sufficient to deter malicious cyber actors or if the alternative of active cyberdefense is necessary and viable

    The E-Books Price Fixing Litigation: Curious Outlier or Harbinger of Change in Antitrust Enforcement Policy?

    Get PDF
    In 2012 the Department of Justice brought suit against Apple and five major US publishing houses for conspiring to fix the price of e-books. The complaint contained many detailed factual allegations, including the sort of high-level executive collusion commonly seen in criminal price fixing cases. The charged conduct, horizontal price fixing, is per se illegal under the Sherman Act and among the “hardcore” violations that under Antitrust Division policy merit criminal charges. Yet instead the government brought a civil case against Apple and the publishers. This note analyses the details of the Antitrust Division’s case, viewed in light of current antitrust law, antitrust policy, and public perception of the players and the case, and suggests a number of possible explanations for the choice of a civil action

    Responding to Election Meddling in the Cyberspace: An International Law Case Study on the Russian Interference in the 2016 Presidential Election

    Get PDF
    International law is not the most perfect legal regime, and, perhaps to no one’s surprise, it is even less perfect in cyberspace. The United States has been a victim to a series of malicious cyber operations in recent years, and the key question is how to respond to and deter them. This Article offers a detailed survey of the Russian interference in the 2016 presidential election in the context of international law. Adapting the framework created by Tallinn Manual 2.0 , the Article examines the international legal basis of the response measures employed by the United States and other possible alternative responses to the Russian operation. It concludes that none of these responses are both squarely supported by international law and desirable as a matter of national security police. This Article intends to show that international law contains considerable gray areas in the cyber realm that allow sophisticated adversaries like Russia to harm the core interest of the United States without substantial legal repercussions. The Article concludes by suggesting that a deterrence mechanism based on proactive national security policy would be more effective and practical than one based on international law

    The rise of economics in competition policy: a canadian perspective

    Get PDF
    Competition policy in Canada and elsewhere has changed remarkably over the last fifty years – in large measure due to advances in economics. In this article we trace the impact of developments in industrial organization on the three central areas of competition policy: cartels, single firm conduct and mergers. We focus on Canadian competition policy, but draw comparisons with developments in the United States and Europe

    National Security and Economic Globalization: Toward Collision or Reconciliation?

    Get PDF

    Reversing the Tao: A Framework for Credible Space Deterrence

    Get PDF
    This thesis was written to provide the reader with a firm understanding of the realities of the current DoD space deterrence concept, its shortcomings and the threat that these shortcomings pose to the United States and its Allies if a more realistic, credible space deterrence concept is not created and deployed. To highlight these shortcomings, a review of deterrence theory from classical to modern writers were explored to compare and contrast with the DoD\u27s present concept to highlight its lack of deterrence theory. In addition, it was highlighted through an analysis of the Chinese view of deterrence in space, space weapons and the United States, just how in effective DoD space deterrence theory is and how the current National Security Space Strategy, the location of the DoD space deterrence concept, is more likely to give rise to a space Pearl Harbor” than to prevent one. The United States must re-think its current posture in space and develop a tiered, tailor, triad of capabilities and concepts that credibly deter, or if necessary defeat an enemy attack on our nation\u27s critical space infrastructure. KEYWORDS

    A hand up or a slap down? Criminalising benefit claimants in Britain via strategies of surveillance, sanctions and deterrence

    Get PDF
    British policy makers have increasingly sought to intensify and extend welfare conditionality. A distinctly more punitive turn was taken in 2012 to re-orientate the whole social security and employment services system to combine harsh sanctions with minimal mandatory support in order to prioritise moving individuals ‘off benefit and into work’ with the primary aim of reducing costs. This article questions the extent to which these changes can be explained by Wacquant’s (2009) theory of the ‘centaur state’ (a neoliberal head on an authoritarian body), which sees poverty criminalised via the advance of workfare. We present evidence of an authoritarian approach to unemployment, involving dramatic use of strategies of surveillance (via new paternalist tools like the Claimant Commitment and the Universal Jobmatch panopticon), sanction and deterrence. This shift has replaced job match support with mandatory digital self-help, coercion and punishment. In relation to Work Programme providers, there is a contrasting liberal approach permitting high discretion in service design. This article makes a significant original contribution to the field by demonstrating that Wacquant’s analysis of ‘workfare’ is broadly applicable to the British case and its reliance on a centralised model of state action is truer in the British case than the US. However, we establish that the character of British reform is somewhat different: less ‘new’ (challenging the time-tethered interpretation that welfare reform is a uniquely neo-liberal product of late 2 modernity) and more broadly applied to ‘core’ workers, including working class white men with earned entitlement, than peripheral workers

    Full Volume 13, Issue 1

    Get PDF
    • 

    corecore