856 resultados para security of tenure


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sustainable property practices will be essential for Australia’s future. The various levels of government offer incentives aimed at encouraging residents to participate in sustainable practices. Many of these programmes however are only accessible by owner occupiers, or landlords and tenants with long term tenancies. Improving security of tenure for tenants, to enable longer term tenancies, would positively impact upon property practices. This article explains what security of tenure is and identifies how a lack of security of tenure adversely impacts property practices. By comparison with Genevan property practices, it concludes by making suggestions as to how security of tenure can be reinforced.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Queensland residential tenancies are usually granted for up to 12 months with no guarantee of renewal. On expiration of the term, the landlord, without need to provide an explanation, can require the tenant to leave. Europeans find this unusual. As Hammar observes, to ‘never be sure whether ... you will be allowed to stay for another year ... is ok for a student, or for someone working ... but not for households’. This article informs Queensland policy makers and industry about European practices and concludes by proposing legislative amendments to realise the tenant’s security of tenure.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 2005 17.3% of Australians were aged 60 years and older (Australian Bureau of Statistics). A consequence of this aging population is the increased use of self-contained independent living units (SCILU) in Retirement Villages by older Australians. The retirement village sector has thus become a significant sector within the residential property market. In seeking to determine the impact of tenure type on the desirability of RV living this paper first profiles a typical SCILU in Australia, before explaining and examining the various tenure types offered by the market. This paper concludes that the multiplicity of offerings of the SCILU product with respect to tenure type, when combined with deferred management fees and participation in capital gains/losses, may be contributing to a lack of clarity in what the SCILU product entails and the security of investment it offers. This perception is supported by litigated disputes and may be damaging the reputation, ongoing viability and desirability of SCILUs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The majority of women in Third World countries depend on land for their livelihood. Security of tenure is important for them to ensure sustainable development, especially in rural areas. In most parts of Africa, land ownership is affected by traditional values, inheritance rights, and government influence. These forces have provided varying types of tenure which are detrimental to the women in rural and urban areas. Land acquisition and its development has been an emotive issue due to traditional pressures and the law as regards the process of land certification. The government and traditional administrations are highly involved in the way women own land and subsequently develop it in Anglophone Cameroon. State authority over land acquisition is important, but the process for obtaining land title is herculean especially for the rural woman. This study illustrates that land acquisition and development by women constitute a problem because of traditional pressures and the law guiding the process of land certification. There is need to exhume the barriers of government’s legal instrument (The Land Consultative Board) that regulates the ownership of land and to revisit some traditional practices as regards land ownership that impact negatively on women in a changing and globalizing world. A compromise approach is advocated for land acquisition that can transcend traditional barriers as well as render the process of land registration more realistic especially for women.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Following the collapse across the last decade of a number of large organizations such as Enron in the USA and several domestic organizations including Ansett Airlines, HIH Insurance and One.Tel, much discussion has ensued about the need to secure employee entitlements. However, tangible improvements in this area are elusive. Good corporate governance policies would suggest that deferred obligations as well as current debts should not be neglected and that appropriate arrangements be put in place to adequately fund employee entitlements. In this paper we consider recent Australian attempts to introduce better governance of employee entitlements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decision-making situations, increasingly powerful attacks become possible against machine learning systems. In this paper, we present three broad research directions towards the end of developing truly secure learning. First, we suggest that finding bounds on adversarial influence is important to understand the limits of what an attacker can and cannot do to a learning system. Second, we investigate the value of adversarial capabilities-the success of an attack depends largely on what types of information and influence the attacker has. Finally, we propose directions in technologies for secure learning and suggest lines of investigation into secure techniques for learning in adversarial environments. We intend this paper to foster discussion about the security of machine learning, and we believe that the research directions we propose represent the most important directions to pursue in the quest for secure learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. This paper provides an explicit theoretical analysis towards watermarking security and robustness in figuring out the exact problem status from the literature. With the necessary hypotheses and analyses from technical perspective, we demonstrate the fundamental realization of the problem. Finally, some necessary recommendations are made for complete assessment of watermarking security and robustness.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The article explains and compares sustainability programs available for use by residential and commercial premises; as well as the respective legal tenure frameworks of commercial and residential tenancies. It identifies that while the desire of commercial tenants drive the participation by landlords in these programs, residential tenants appear to be ignorant of sustainable measures. The article contends that the reason for this difference is rooted in the legal and social status of residential tenants. It explores the impact that secure tenure may have in promoting residential sustainability programs and concludes by observing that the lack of involvement of residential tenants in programs stems from the absence of tenure security, which prevents any long term cooperation between the parties.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present and analyze several gaze-based graphical password schemes based on recall and cued-recall of grid points; eye-trackers are used to record user's gazes, which can prevent shoulder-surfing and may be suitable for users with disabilities. Our 22-subject study observes that success rate and entry time for the grid-based schemes we consider are comparable to other gaze-based graphical password schemes. We propose the first password security metrics suitable for analysis of graphical grid passwords and provide an in-depth security analysis of user-generated passwords from our study, observing that, on several metrics, user-generated graphical grid passwords are substantially weaker than uniformly random passwords, despite our attempts at designing schemes to improve quality of user-generated passwords.