205 resultados para Security classification (Government documents)
Resumo:
Measuring quality attributes of object-oriented designs (e.g. maintainability and performance) has been covered by a number of studies. However, these studies have not considered security as much as other quality attributes. Also, most security studies focus at the level of individual program statements. This approach makes it hard and expensive to discover and fix vulnerabilities caused by design errors. In this work, we focus on the security design of an object oriented application and define a number of security metrics. These metrics allow designers to discover and fix security vulnerabilities at an early stage, and help compare the security of various alternative designs. In particular, we propose seven security metrics to measure Data Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented class from the point of view of potential information flow.
Resumo:
The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.
Resumo:
Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.
Resumo:
Automatic detection of suspicious activities in CCTV camera feeds is crucial to the success of video surveillance systems. Such a capability can help transform the dumb CCTV cameras into smart surveillance tools for fighting crime and terror. Learning and classification of basic human actions is a precursor to detecting suspicious activities. Most of the current approaches rely on a non-realistic assumption that a complete dataset of normal human actions is available. This paper presents a different approach to deal with the problem of understanding human actions in video when no prior information is available. This is achieved by working with an incomplete dataset of basic actions which are continuously updated. Initially, all video segments are represented by Bags-Of-Words (BOW) method using only Term Frequency-Inverse Document Frequency (TF-IDF) features. Then, a data-stream clustering algorithm is applied for updating the system's knowledge from the incoming video feeds. Finally, all the actions are classified into different sets. Experiments and comparisons are conducted on the well known Weizmann and KTH datasets to show the efficacy of the proposed approach.
Resumo:
Research has noted a ‘pronounced pattern of increase with increasing remoteness' of death rates in road crashes. However, crash characteristics by remoteness are not commonly or consistently reported, with definitions of rural and urban often relying on proxy representations such as prevailing speed limit. The current paper seeks to evaluate the efficacy of the Accessibility / Remoteness Index of Australia (ARIA+) to identifying trends in road crashes. ARIA+ does not rely on road-specific measures and uses distances to populated centres to attribute a score to an area, which can in turn be grouped into 5 classifications of increasing remoteness. The current paper uses applications of these classifications at the broad level of Australian Bureau of Statistics' Statistical Local Areas, thus avoiding precise crash locating or dedicated mapping software. Analyses used Queensland road crash database details for all 31,346 crashes resulting in a fatality or hospitalisation occurring between 1st July, 2001 and 30th June 2006 inclusive. Results showed that this simplified application of ARIA+ aligned with previous definitions such as speed limit, while also providing further delineation. Differences in crash contributing factors were noted with increasing remoteness such as a greater representation of alcohol and ‘excessive speed for circumstances.' Other factors such as the predominance of younger drivers in crashes differed little by remoteness classification. The results are discussed in terms of the utility of remoteness as a graduated rather than binary (rural/urban) construct and the potential for combining ARIA crash data with census and hospital datasets.
Resumo:
This instrument was used in the project named Teachers Reporting Child Sexual Abuse: Towards Evidence-based Reform of Law, Policy and Practice (ARC DP0664847)
Resumo:
This instrument was used in the project named Teachers Reporting Child Sexual Abuse: Towards Evidence-based Reform of Law, Policy and Practice (ARC DP0664847)
Resumo:
For nearly twenty-five years, the field of youth studies has employed the same conceptual tools to explain the conduct of young people, tools that inexorably lead to the same recurrent conclusions-youth equals resistance, youth equals alienation, youth equals problem. This book offers a way out of this theoretical Groundhog Day. Starting with the familiar notion of youth subcultures, but also addressing topics such as young women's magazines, 'at risk' youth, anorexia nervosa, and HIV/AIDS programs, this book examines the way in which youth is produced as both a governmental object and a set of practices of the self. Employing the ideas of Foucault, Rose and Mauss, this new approach attempts to reinvigorate what is an important-yet slumbering-area of research.
Resumo:
This paper looks at the severe fasting practices most commonly found among young women. Almost all explanations for this behaviour centre around the notion of the pathological condition 'anorexia nervosa'. However, food asceticism has a well-documented history, particularly when it concerns religious fasting. In ancient Greece, dietary asceticism constituted an important part of the means by which individuals constructed an acceptable 'self'. Ascetic fasting then later resurfaced at various historical moments and in various different places — such as amongst medieval religious women and, in a broader way, amongst contemporary young women. It is argued that these practices have traditionally formed part of the mechanisms by which differentiation by age and sex occurs. Overall, it is hoped that this analysis will permit not only a different focus on 'anorexia nervosa', but also on some of the ways in which young people become gendered.
Resumo:
Increasing the scientific literacy of Australians has become an educational priority in recent times. The ‘Science State – Smart State’ initiative of the Queensland Government involves an action plan for improving science education that includes a Science for Life action. A desired outcome is for an increased understanding of the natural world so that responsible decisions concerning our future wellbeing can be made in an age of science and technology. Biotechnology is a technology that is having profound impact on our lives. This paper describes how 15-16 year old students and biology teachers revealed a mismatch in both attitudes and interests towards biotechnology between the students and teachers. The findings are of interest as the teachers are writing biotechnology into their work programs in response to new syllabus documents. The teacher’s areas of interest did not match those of the students, possibly resulting in a curriculum the teachers want to teach, but the students do not want to learn.
Resumo:
As with the ancient Greeks, the `self' is not something to be discovered, it is something to be created. Practices such as ascetic fasting are not expressions of the struggle between the authentic self and the external world, they are the very practices by which a `self' is formed.
Resumo:
Light Detection and Ranging (LIDAR) has great potential to assist vegetation management in power line corridors by providing more accurate geometric information of the power line assets and vegetation along the corridors. However, the development of algorithms for the automatic processing of LIDAR point cloud data, in particular for feature extraction and classification of raw point cloud data, is in still in its infancy. In this paper, we take advantage of LIDAR intensity and try to classify ground and non-ground points by statistically analyzing the skewness and kurtosis of the intensity data. Moreover, the Hough transform is employed to detected power lines from the filtered object points. The experimental results show the effectiveness of our methods and indicate that better results were obtained by using LIDAR intensity data than elevation data.
Resumo:
An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to investigate whether security culture has emerged into practices in Saudi Arabian organizations.
Resumo:
Since 2001, district governments have had the main responsibility for providing public health care in Indonesia. One of the main public health challenges facing many district governments is improving nutritional standards, particularly among poorer segments of the population. Developing effective policies and strategies for improving nutrition requires a multi-sectoral approach encompassing agricultural development policy, access to markets, food security (storage) programs, provision of public health facilities, and promotion of public awareness of nutritional health. This implies a strong need for a coordinated approach involving multiple government agencies at the district level. Due to diverse economic, agricultural, and infrastructure conditions across the country, district governments’ ought to be better placed than central government both to identify areas of greatest need for public nutrition interventions, and devise policies that reflect local characteristics. However, in the two districts observed in this study—Bantul and Gunungkidul—it was clear that local government capacity to generate, obtain and integrate evidence about local conditions into the policy-making process was still limited. In both districts, decision-makers tended to rely more on intuition,anecdote, and precedent in formulating policy. The potential for evidence-based decision making was also severely constrained by a lack of coordination and communication between agencies, and current arrangements related to central government fiscal transfers, which compel local governments to allocate funding to centrally determined programs and priorities.