| books
 dissertations
 
 articles
 reports 
                        
 bodies
 
 
 
 
 
   |  articles and papers 
 This page highlights recognition through citation in peer 
                        reviewed journal articles and symposium papers.
 
 It covers -
  
                        The following page highlights recognition in government, 
                        industry and academic reports.
 
  articles 
                        and research papers 
 Citations include -
 
                        'The 
                          Private Sector Amendment to Australia's Privacy Act: 
                          A First Step On The Road To Privacy' by Alexandra McKay 
                          in 14(1) Pacific Rim Law & Policy Journal 
                          (2003), 223-251'Harassment 
                          through the Digital Medium: A Cross-Jurisdictional Comparative 
                          Analysis on the Law on Cyberstalking' by Warren Chik 
                          in 3(1) Journal of International Commercial Law 
                          & Technology (2008)'Acceptance 
                          of blog usage: The roles of technology acceptance, social 
                          influence and knowledge sharing motivation' by Chin-Lung 
                          Hsu & Judy Chuan-Chuan Lin in 45(1) Information 
                          & Management (2008), 65-74'Creating 
                          a Market for Justice; a Market Incentive Solution to 
                          Regulating the Playing Field: Judicial Deference, Judicial 
                          Review, Due Process, and Fair Play in Online Consumer 
                          Arbitration' by Llewellyn Gibbons in 23(1) Northwestern 
                          Journal of International Law & Business (2002), 
                          1-64'Can 
                          the Australian Model be Applied to US Moral Rights Legislation?' 
                          by Joan Pattarozzi in 15 Cardozo Journal of International 
                          & Comparative Law (2007), 423-57 'Protecting 
                          Hippocratic Ideals: Geographic Information and Implications 
                          for Bioprivacy' by George Cho in 4(1) International 
                          Journal of Geoinformatics (2008)'Not 
                          Dead, Just Sleeping: Canada's Prohibition on Blasphemous 
                          Libel as a Case Study in Obsolete Legislation' by Jeremy 
                          Patrick (2008)'The 
                          Law, Politics, and "Historical Wounds": The 
                          Dja Dja Warrung Bark Etchings Case in Australia' by 
                          Elizabeth Willis in 15 International Journal of 
                          Cultural Property (2008), 49-63'Balancing 
                          Public and Private Interests in Database-Protection' 
                          (Faculty of Law, Heinrich-Heine Universitaet Duesseldorf, 
                          Center for Business & Corporate Law Research Paper 
                          Series 03) by Michael Beurskens (2004) 'Research 
                          And Development Productivity And Spillovers: Empirical 
                          Evidence At The Firm Level' by Robert Wieser in 19(4) 
                          Journal of Economic Surveys (2005), 587-621 
                          'Cyber Chaos: The Clash Between Band Fansites and Intellectual 
                          Property Holders' by KJ Geary-Boehm in Southern 
                          Illinois University Law Journal (2005), 87-122'The 
                          Dawn of A New Age' by Sarah Hinchliffe in 15(1) Murdoch 
                          University Electronic Journal of Law (2008), 43-55'Human 
                          Computer Interaction Based Intrusion Detection' by Roman 
                          Yampolskiy in International Conference on Information 
                          Technology (ITNG'07) (2007), 837-842'US 
                          Jurisdictional Monopolization of International Cybersquatting 
                          Disputes: A Review of Current Inequities and Future 
                          Consequences' by Aaron Horowitz in 11 Journal of 
                          Technology Law & Policy (2006), 191-224'Accepting 
                          Droit de Suite as an Equal and Fair Measure Under Intellectual 
                          Property Law and Contemplation of Its Implementation 
                          in the United States Post Passage of the EU Directive' 
                          by Mara Grumbo in 30 Hastings Communications and 
                          Entertainment Law Journal (2008), 357-386 'Management 
                          knowledge and knowledge management: Realism and forms 
                          of truth' by John Mingers in 6(1) Knowledge Management 
                          Research & Practice (2008), 62-76 
                          'Indigenous Knowledge & Intellectual Property: A 
                          Sustainability Agenda' by Margaret Raven & Dora 
                          Marinova (2006)'Cleaning 
                          Metadata on the World Wide Web: Suggestions for a Regulatory 
                          Approach' by Marcel Gordon in 24(4) John Marshall 
                          Journal of Computer & Information Law (2006), 
                          531-568'Email-facilitated 
                          qualitative interviews with traumatic brain injury survivors: 
                          A new and accessible method' by Jennifer Egan, Lesley 
                          Chenoweth & Donna McAuliffe in 20(12) Brain 
                          Injury (2006), 1283-1294'Identity 
                          Management: Is an Identity Card the Solution for Australia?' 
                          by Margaret Jackson & Julian Ligertwood in 24(4) 
                          Prometheus (2006), 379-387'Muted 
                          voices in the legislative process: the role of scholarship 
                          in US Congressional efforts to protect children from 
                          internet pornography' by Jeffrey Blevins & Fernando 
                          Anton in 10(1) New Media & Society (2008), 
                          115-137 
                          'Spam After CAN-SPAM: How Inconsistent Thinking Has 
                          Made A Hash Out of Unsolicited Commercial E-Mail Policy' 
                          by Jeffrey Sullivan & Michael de Leeuw in 20(4) 
                          Santa Clara Computer & High Technology Law Journal 
                          (2004), 887-932'Content 
                          Cybercrimes: Criminality and Censorship in Asia' by 
                          Roderic Broadhurst in 34 Indian Journal of Criminology 
                          (2006), 11-30'Centre 
                          & Creative Periphery in the Histories of the Book 
                          in the English Speaking World and Global English Studies' 
                          by Ian Willison in Publishing History (2006)'Fine 
                          Art Online: Digital Imagery and Current International 
                          Interpretations of Ethical Considerations in Copyright 
                          Law' by Molly Torsen' in 5(1) Digital Technology 
                          Law Journal (2004) 
                          'An intelligent proactive security system for cyber 
                          centres using Cognitive Agents' by P. Venkataram, Jeremy 
                          Pitt, B. Sathish Babu & E. Mamdani in 2(3) International 
                          Journal of Information and Computer Security (2008), 
                          235-249  
                          'On updating problems in latent semantic indexing' by 
                          Hongyuan Zha & Horst Simon in 21(2) SIAM Journal 
                          on Scientific Computing (1999), 782-791'New 
                          Zealand's Efforts to Catch Up in Legislating Against 
                          Spam' by Adrian Sawyer in 21(7) Journal of International 
                          Banking Law and Regulation (2006), 409-415'International 
                          regulation of the publication of publicly accessible 
                          personal information' by Marcia Neave in 10 Privacy 
                          Law & Policy Reporter (2003), 120'Be 
                          Careful What You Click For: An Analysis of Online Contracting' 
                          by Rachel Conklin in 20(3) Loyola Consumer Law Review 
                          (2008), 325-347 
                          'Deregulating Relevancy in Internet Trademark Law' by 
                          Eric Goldman in 54 Emory Law Journal (2005), 
                          507-598'Cyberstalking: 
                          Utilizing Newspaper Accounts to Establish Victimization 
                          Patterns' by Laura Moriarty & Kimberly Freiberger 
                          in 3(2) Victims and Offenders (2008), 131-141'The 
                          Maoriland Worker and Blasphemy in New Zealand' by Geoffrey 
                          Troughton in 91 Labour History (2006), 113-129'High 
                          Speed and Reliable Anti-Spam Filter' by Jalel Rejeb, 
                          Thuy Le & Narinder Anand in International Conference 
                          on Software Engineering Advances (2006), 66Graham 
                          Greenleaf's Still quacking like a duck: The national 
                          ID Card proposal - University of New South Wales 
                          Faculty of Law Research Series (2007) 
                          Ana Alonso's 'La globalización y el mito del 
                          tamaño en la industria mediática y de 
                          telecomunicaciones' (2005)'Media 
                          Licensing, Convergence and Globalization' by Robert 
                          Horvitz in 1 EastBound (2006), 202-226 
                          Deborah Bowen's 'Towards an e-Criture Feminine: Woolf, 
                          DuPlessis, Cixous, and the Emerging Discursive Tradition 
                          in Women's Online Diaries' (2004)'A 
                          Call for Action: The Need for Canadian Spam Legislation' 
                          by Perry Cheung in 7 Asper Review of International 
                          Business and Trade Law (2007), 227-252'Language 
                          Networks on LiveJournal' by Susan Herring, John Paolillo 
                          et al in 40th Annual Hawaii International Conference 
                          on System Sciences (2007), 79-90'Apples 
                          And Oranges (And Wine): Why The International Conversation 
                          Regarding Geographic Indications Is At A Standstill' 
                          by Molly Torsen in 87 Journal of the Patent and 
                          Trademark Office Society (2005), 31-56'Jurisdiction 
                          in B2C E-Commerce Redress in the European Community' 
                          by O C Eang in 3(4) Journal of Electronic Commerce 
                          in Organizations (2005), 75-87'The 
                          Constitutional Failing of the AntiCybersquatting Act' 
                          by Ned Snow in Willamette Law Review (2005), 
                          1-84'Reconstructing 
                          Contemporary Democracy' by Jan Scholte in 15 (XXX) Indiana 
                          Journal of Global Legal Studies (2008), 1-47'The 
                          Semiotics of Digital Law' by Andreas Schreiner in 17(3) 
                          International Journal for the Semiotics of Law 
                          (2004), 259-266'Multi-Lateral 
                          Recognition of PKI Certification Authorities in the 
                          Asian Region: Transborder Data Flow and Information 
                          Privacy Issues' by Alana Maurushat in 35 Hong Kong 
                          Law Journal (2005), 569-595'Hadley's 
                          Liability-Limiting and Commerce Enhancing Principles 
                          Applied in the British Commonwealth and the USA' by 
                          Marsha Huie in 11 Texas Wesleyan Law Review 
                          (2005), 649-673'A 
                          New Impetus for Chinese Copyright Protection: The Regulations 
                          on Collective Administration of Copyright' by Yuan Zeqing 
                          in 28(4) European Intellectual Property Review 
                          (2006), 241-245 
                          'Of Nodes and Power Laws: A Network Theory Approach 
                          to Internet Jurisdiction Through Data Privacy' by Andrea 
                          Matwyshyn in 98(2) Northwestern University Law Review 
                          (2004), 493-543 
                          'Rethinking European Union Competence in the Field of 
                          Media Ownership: The Internal Market, Fundamental Rights 
                          and European Citizenship' by Rachael Smith in 29(5) 
                          European Law Review (2004), 652-672'Implementing 
                          a Swarm-based Search Engine' by Shawn Stewart (2006) 
                          'HIV 
                          and AIDS, the internet pornography industry and safer 
                          sex' by S T Green in 15(3) International Journal 
                          of STD & AIDS (2004), 206-208 
                          'Getting the Message: A Comparative Analysis of Laws 
                          Regulating Law Enforcement Agencies' Access to Stored 
                          Communications in Australia and the United States' by 
                          Tonia Starey in 10 Media & Arts Law Review 
                          (2005), 23-55'Beyond 
                          the 'digital divide': Internet diffusion and inequality 
                          in Australia' by Suzanne Willis & Bruce Tranter 
                          in 42(1) Journal of Sociology (2006), 43-59 
                          'International 
                          Distributions: Divergence of Co-Ownership Laws' by Goldie 
                          Gabriel in 9 Vanderbilt Journal of Entertainment 
                          & Technology Law (2007), 519-532'World 
                          Habeas Corpus' by Vicki Jackson in 91(2) Cornell 
                          Law Review (2006), 303-387'Indigenous 
                          Australians and the Digital Divide' by Kate Samaras 
                          in 55 Libri (2005), 84-95'I. 
                          Kant, J.G. Fichte, J.A.H. Reimarus, L'autore e i suoi 
                          diritti. Scritti polemici sulla proprietà intellettuale' 
                          by Maria Chiara Pievatolo in 5 Recensioni filosofiche 
                          (NS) (2006)'Patients' 
                          perceptions of general practitioners using computers 
                          during the patient-doctor consultation' by Joanne Callen, 
                          Megan Bevis & Jean McIntosh in 34(1) Health 
                          Information Management (2005), 8-14'Tailoring 
                          Mobile Phones to Fit The Italian Lifestyle' by Erika 
                          Papaccioli in Perspectives on Business and Economics 
                          (2003), 59-67'Direct 
                          and Indirect Human Computer Interaction Based Biometrics' 
                          by Roman Yampolskiy & Venu Govindaraju in 2(10) 
                          Journal of Computers (2007), 76-88'Promises 
                          and Perils of Weblogistan: Online Personal Journals 
                          and the Islamic Republic of Iran' by Liora Hendelman-Baavur 
                          in 11(2) Middle East Review of International Affairs 
                          (2007) 'Podcasting: 
                          A new technology in search of viable business models' 
                          by Sheri Crofts, Jon Dilley, Mark Fox, Andrew Retsema 
                          & Bob Williams in 10(9) First Monday (2005) 
                          'Cybercafes and their Potential as Community Development 
                          Tools in India' by Anikar Haseloff in 1(3) Journal 
                          of Community Informatics (2005)'Cyber 
                          crime and biometric authentication - the problem of 
                          privacy versus protection of business assets' by Michael 
                          Crowley in Proceedings of the 4th Australian Information 
                          Security Conference (Edith Cowan University, 2006)'The 
                          Resale Royalty and Australian Visual Artists: Painting 
                          the Full Picture' by Paul Lewis in 8(4) Media & 
                          Arts Law Review (2003), 306-313'WarDriving: 
                          Technical & Legal Context' by Hira Sathu in Proceedings 
                          of the 5th WSEAS International Conference on Telecommunications 
                          and Informatics (2006)David 
                          Wyld's The Blogging Revolution: Government in the 
                          Age of Web 2.0 (2007)'Online 
                          Defamation: A Case Study in Competing Rights' (2005) 
                          by Julie Dare'National 
                          innovative capacity in East Asia' by Mei-Chih Hu & 
                          John Mathews in 34 Research Policy (2005), 
                          1322-1349'Toward 
                          A Third-Wave Feminist Legal Theory: Young Women, Pornography 
                          and the Praxis of Pleasure' by Bridget Crawford in 14 
                          Michigan Journal of Gender & Law (2007), 
                          99-161 
                          'The Emerging Legal Environment for Podcasting' by Mark 
                          Fox & Tony Ciro in 16(8) Entertainment Law Review 
                          (2005), 215-223Xenophobia, 
                          Media Stereotyping, and Their Role in Global Insecurity 
                          (Geneva Centre for Security Policy) by Katja Flückiger 
                          (2006)'Protecting 
                          Moral Rights in the United States and the United Kingdom: 
                          Challenges and Opportunities under the UK's New Performances 
                          Regulations' by Robert Bird & Lucille Ponte in 24 
                          Boston University International Law Journal 
                          (2006), 213-284'Unholy 
                          Speech And Holy Laws: Blasphemy Laws In Pakistan - 
                          Controversial Origins, Design Defects And Free Speech 
                          Implications' by Osama Siddique & Zahra Hayat (2007)'Laws 
                          on Right to Privacy in Mobile Marketing' by Jawahitha 
                          Sarabdeen in 5(5) WSEAS Transactions on Business 
                          & Economics (2008), 280-290'Owning 
                          the Sun: Can Native Culture be Protected through Current 
                          Intellectual Property Law?' by Jill Kelley in 7 Journal 
                          of High Technology Law (2007), 180-200'Dating 
                          & Intimacy in the 21st Century: The Use of Online 
                          Dating Sites in Australia' by Millsom Henry-Waring & 
                          Jo Barraket in 6(1) International Journal of Emerging 
                          Technologies & Society (2008), 14-33Realignment 
                          of Corporate Structures: Integration & Consolidation 
                          in the Freight Forwarding and 3PL Industry, National 
                          University of Singapore Centre for Maritime Studies 
                          Policy Paper 2 (2006)'A 
                          brief look at the history of privacy' by Natasha Stott 
                          Despoja in 79 AQ - Australian Quarterly (May-June 
                          2007)'Laughs 
                          and Legends or The Furniture That Glows? Television 
                          as History' by John Hartley, Joshua Green & Jean 
                          Burgess (2005) 'Complying 
                          with Australia’s new privacy legislation' by Mark 
                          Berthold in Privacy Law and Policy Reporter 
                          (2001) 'Online 
                          shoppers in Australia: dealing with problems' by Huong 
                          Ha & Ken Coghill in International Journal of 
                          Consumer Studies (2007)'Identifying 
                          the Identity Thief: Is it time for a (smart) Australia 
                          Card?' by Lucy Cradduck & Adrian McCullagh in 16(2) 
                          International Journal of Law and Information Technology 
                          (2007), 125-158'Acceptance 
                          and Usage of Webcasting among Users of Selected Cyber 
                          Cafés in Klang Valley' by Siti Azzman Shariffadeen, 
                          Musa Abu Hassan & Md. Salleh Hassan (2007)'Behavioral 
                          Modeling' by Roman Yampolskiy in 5(5) American Journal 
                          of Applied Sciences (2008), 496-503'Cooperative 
                          Integration: A Structural Geography of Primetime Program 
                          Production and Broadcast' by Tonya Lindsey in Web 
                          Journal of Mass Communication Research (2005)'Bank 
                          Management of Risk Dynamics' by Tim Scheffmann in Conference 
                          Proceedings: The 23rd International Conference of the 
                          System Dynamics Society (2005)'ICT 
                          for development and commerce: A case study of internet 
                          cafés in India' by Nimmi Rangaswamy in Proceedings 
                          of the 9th International Conference on Social Implications 
                          of Computers in Developing Countries (2007) Blasphemy 
                          and the Law: A Comparative Study by Brenton Priestley 
                          (2006)'Overnight 
                          Internet Browsing Among Cyber Café users in Abraka, 
                          Nigeria' by Esharenana Adomi in 3(2) Journal of 
                          Community Informatics (2007) 
                          'Regulating Spam in Hong Kong and Malaysia: Lessons 
                          From Other Jurisdictions' by Rebecca Ong in 1 Journal 
                          of Information Law & Technology (2005)'Cooperative 
                          Integration: A Structural Geography of Primetime Program 
                          Production and Broadcast' by Tonya Lindsey in 8(4) Web 
                          Journal of Mass Communication Research (2005)'Progress 
                          of e-Health in Australia: the National framework' by 
                          Shivakumar Kolachalam in Nuove Tecnologie in Medicina: 
                          Applicazioni Informatiche e Telematiche in Medicina 
                          (2006)
'Behavioral 
                          Modeling: an Overview' by Roman Yampolskiy in 5(5) American 
                          Journal of Applied Sciences (2008), 496-503'Three 
                          Cases of Corporate Fraud: An Audit Perspective' (University 
                          of Waikato Working Paper Series, No 94) by Karen van 
                          Peursem, Maiqing Zhou, Tracey Flood & James Buttimore 
                          (2007)'Security 
                          and Usability: The Gap in Real-World Online Banking' 
                          by Mohammad Mannan & P. C. van Oorschot (2007) 
                          'Information, Knowledge and Truth: A Polyvalent View: 
                          Kent Business School Working Paper' by John Mingers 
                          (2005)'Technologiedynamik, 
                          Zukunftstechnologien und die Rolle von Forschungsförderungspolitik 
                          - Beiträge aus der Informatik und Physik' 
                          by Michael Rübhausen (2005) 'ICANN 
                          Can: Contracts and Porn Sites: Or Choosing to Play Internet 
                          Ball in American Cyberspace' by Brent Little & Cheryl 
                          Preston (2007)'Wissenschaftliches 
                          E-Publizieren mit 'Open-Access' - Initiativen und Widerstände' 
                          by Klaus Graf in 2(2) Zeitenblicke (2003) 
                          'New technology and partner notification - why aren't 
                          we using them?' by J E Tomnay, M K Pitts & C K Fairley 
                          in 16(1) International Journal of STD & AIDS(2005), 
                          19-22 
                          'Cyberharassment & Online Defamation: A Default 
                          Form of Regulations?' by Julie Dare in 11 Transformations 
                          (2005)'Reducing 
                          Spam With Best Practices' by Luke Haber in Proceedings 
                          of the 12th Australasian World Wide Web Conference 
                          (2006)'Parlez 
                          Usted Urdu?: The Big Picture' by Patricia Wetzel (2006)'Women 
                          in the Web of Secondary Copyright Liability and Internet 
                          Filtering' by Ann Bartow in 32(3) Northern Kentucky 
                          Law Review (2005), 449-506'Website 
                          privacy policy statements and the changing face of e-commerce' 
                          by Mark Berthold in Privacy Law & Policy Reporter 
                          (2002)'New 
                          Trends in Global Broadcasting: "Nuestro Norte es 
                          el Sur" (Our North is the South)' by Orayb Najjar 
                          in 6(10) Global Media Journal (2006)'Open 
                          Access and the divide between "mainstream" 
                          and "peripheral" science' by Jean-Claude Guédon 
                          in Como gerir e qualificar revistas científicas 
                          (2007) edited by Sueli Ferreira & Maria Targino'Robert 
                          Maxwell: A Study of Power in Media Leadership' by Anders 
                          Bjursted (2006)'HIV 
                          and AIDS, the internet pornography industry and safer 
                          sex' by S T Green in 15(3) International Journal 
                          of STD & AIDS (2004), 206-208'Designs 
                          for Immunity: A Comparison of the Criminal Prosecutions 
                          of United States Presidents & Italian Prime Ministers' 
                          by Brianne Biggiani in 14(1) Cardozo Journal of 
                          International & Comparative Law (2006), 209-246'Management 
                          2.0: a primer on blogging for executives' by David Wyld 
                          in 31(6) Management Research News (2008), 448-483'Google 
                          Search Engine and its Usefulness to Library Professionals' 
                          by Vivekanand Jain & Sanjiv Sarafin in 26(5) DESIDOC 
                          Bulletin of Information Technology (2006), 23-28'Blog: 
                          Fiction: Intent - A critical study of the creation of 
                          intentional and unintentional fictions in the current 
                          online blog culture' by Kirsty McGill (2008) 
                          'Behavioural biometrics: a survey and classification' 
                          by Roman Yampolskiy & Venu Govindaraju in 1(1) International 
                          Journal of Biometrics (2008), 81-113'Taxation 
                          and Global Justice: Closing the Gap between Theory and 
                          Practice' by Gillian Brock in 39(2) in Journal of 
                          Social Philosophy (2008), 161-184'Indigenous 
                          Knowledge in Peru' by Norka Paden in 1 Tribes and 
                          Tribals (2007), 195-204'Privacy 
                          Impact Assessment in Australian Contexts' by Roger Clarke 
                          in 15(1) Murdoch eLaw Journal (2008)'A 
                          Totally Online Course in Web Design for Teachers: Aids 
                          and Cautions' by Cleborne Maddux, Leping Liu, Rhoda 
                          Cummings & Marlowe Smaby in 19(7) Technology 
                          & Teacher Education Annual (2008), 4227-4232Laws 
                          and Regulations Dealing with Information Security and 
                          Privacy: An Investigative Study' by John Cassini, Dawn 
                          Medlin & Adriana Romaniello in 2(2) International 
                          Journal of Information Security & Privacy (2008), 
                          70-82'Global 
                          communication and political culture in the semi-periphery: 
                          the rise of the Globo corporation' by Peter Wilkin in 
                          34 Review of International Studies (2008), 
                          93-114'No 
                          Age Discrimination For Biometrics' by Marthie Lessing 
                          & L. Weissenberger (2008)'Towards 
                          a User Generated State? The impact of web 2.0 on government 
                          and the public sector' (Media@lse Fifth Anniversary 
                          Conference, 2008) by Valerie Frissen, Noor Huijboom 
                          & Bas Kotterink'What 
                          makes a document readable?' by Richard Castle in 58 
                          Clarity: Journal of the international association 
                          promoting plain legal language (2007), 12-16Internet 
                          Business Methods: Problems with Patentability: A paper 
                          submitted for the Loman Friedlander Award, NZIPA (2005) 
                          by Anne Griffin'Preserving 
                          Creativity from Endless Digital Exploitation: Has the 
                          Time Come for the New Concept of Copyright Dilution?' 
                          (6th Annual Intellectual Property Colloquium, Tulane 
                          Uni Law School, 2008) by Lucille Ponte'Recent 
                          amendments in the Laws pertaining to crimes against 
                          women: An overview' by Dasari Harish, Kumar Ashwini 
                          & B Sharma in 30(4) Journal of Indian Academy 
                          of Forensic Medicine (2008)'Legal 
                          Bans on Pro-Suicide Web Sites: An Early Retrospective 
                          From Australia' by Jane Pirkis, Luke Neal, Andrew Dare, 
                          Warwick Blood & David Studdert in 39(2) Suicide 
                          & Life Threatening Behaviour (2009) 190-193'National 
                          and International Dimensions of Copyright’s Public 
                          Domain (An Australian Case Study)' by Graham Greenleaf 
                          in 6(2) SCRIPTed (2009) 259 
 
 
 
 
 
 
  next page (recognition 
                      in reports) 
 
 
 
 | 
                        
                       |