10,312 research outputs found
Having a say: âaccess to justiceâ as democratic participation
Despite the pervasiveness of civil law in Western societies and the impact of its judicial creation and administration, citizens are too often bystanders in litigation; they are
either represented by lawyers, and/or increasingly required to resolve these problems themselves without the assistance of legal representation. In terms of access to justice policy and initiatives, the response to this critical problem represents one of the most contested
issues on the law-and-society agenda and there have been continuing debates over the meaning of access, its objectives, and its success. The question that arises in this regard is pertinent â can access to justice initiatives empower individuals to meaningfully participate in the legal decisions and processes that affect their lives and by extension, the democratic process? This paper critically examines whether, given the structure of the civil justice system, participation by self-represented litigants is a legitimate or viable foundation for
access to justice initiatives
Overview of Charm Physics at RHIC
Heavy-quark production provides a sensitive probe of the gluon structure of
nucleons and its modication in nuclei. It is also a key probe of the hot-dense
matter created in heavy-ion collisions. We will discuss the physics issues
involved, as seen in quarkonia and open heavy-quark production, starting with
those observed in proton-proton collisions. Then cold nuclear matter effects on
heavy-quark production including shadowing, gluon saturation, energy loss and
absorption will be reviewed in the context of recent proton-nucleus and
deuteron-nucleus measurements. Next we survey the most recent measurements of
open-charm and J/Psi's in heavy-ion collisions at RHIC and their
interpretation. We discuss the high-pT suppression and flow of open charm in
terms of energy loss and thermalization and, for J/Psi, contrast explanations
in terms of screening in a deconfined medium vs. recombination models.Comment: 6 pages, 12 figures, proceedings for Quark Confinement and Hadron
Spectrum VI
Using sexual selection theories to examine contextual variation in heterosexual womenâs orientation toward high heels
High heels are symbols of female sexuality and are âcostly signalsâ if the risks of wearing them are offset by improving womenâs attractiveness to men. From a functionalist perspective, the costs versus benefits of wearing heels may vary according to personal and contextual factors, such as her effectiveness at competing for mates, or at times when such motives are stronger. Here, we examined potential differences between women (self-rated attractiveness, dyadic versus solitary sexual desire, womenâs age, competitive attitudes toward other women) and contextual variation (priming mating and competitive motives) in their responses to high heels. Study 1 (N = 79) and Study 2 (N = 273) revealed that self-rated attractiveness was positively related to orientation toward heeled shoes. When examining responses to two very attractive shoes (one higher-heel, one lower-heel) in Study 2, dyadic sexual desire, but not solitary sexual desire or intrasexual competitiveness, predicted their inclination to buy the higher-heeled shoe. In Study 3 (N = 142), young women chose high heels when primed with free choice of a designer shoe (95% CI [53.02 mm, 67.37 mm]), and preferred a heel 22 mm (0.87â) higher than older women (Study 4, N = 247). Contrary to predictions, priming mating or competitive motives did not alter womenâs preference toward a higher heel (Studies 3 and 4). Our studies suggest that attractive women augment their physical appeal via heels. High heels may be a subtle indicator of dyadic sexual desire, and preferences for heels are stronger at times in the lifespan when mating competition is relatively intense
Commercial critical systems and critical infrastructure protection : a future research agenda
Secure management of Australia’s commercial critical infrastructure presents ongoing challenges to owners and the government. Although it is currently managed through high-level information sharing via collaboration, but does this suit the commercial sector. One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as Supply Chain Management (SCM) systems are distributed entities and not a single entity. The paper focuses upon the security issues associated with SCM systems and critical infrastructure protection.<br /
Attack vectors against social networking systems : the Facebook example
Social networking systems (SNS’s) such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting with "strangers" through the advent of a large number of social applications. The attractiveness of such software has meant a dramatic increase in the number of frequent users of SNS’s and the threats which were once common to the Internet have now been magnified, intensified and altered as the potential for criminal behaviour on SNS’s increases. Social networking sites including Facebook contain a vast amount of personal information, that if obtained could be used for other purposes or to carry out other crimes such as identity theft. This paper will focus on the security threats posed to social networking sites and gain an understanding of these risks by using a security approach known as “attack trees”. This will allow for a greater understanding of the complexity associated with protecting Social Networking systems with a particular focus on Facebook.<br /
- âŠ