443 resultados para regional security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our cross-national field study of wine entrepreneurship in the “wrong” places provides some redress to the focus of the “regional advantage” literature on places that have already won and on the firms that benefit from “clusters” and other centers of industry advantage. Regional “disadvantage” is at best a shadowy afterthought to this literature. By poking around in these shadows, we help to synthesize and extend the incipient yet burgeoning literature on entrepreneurial “resourcefulness” and we contribute to the developing body of insights and theory pertinent to the numerous but often ignored firms and startups that mostly need to worry about how they will compete at all now if they are ever to have of chance of “winning” in the future. The core of our findings suggests that understandable – though contested – processes of ingenuity underlie entrepreneurial responses to regional disadvantage. Because we study entrepreneurship that from many angles simply does not make sense, we are also able to proffer a novel perspective on entrepreneurial sensemaking.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

goDesign Travelling Workshop Program for Regional Secondary Students was an initiative of Queensland University of Technology (QUT) and the Design Institute of Australia (DIA) Queensland Branch, which aligned with the DIA unleashed: Queensland design on tour 2010 Exhibition. It was designed be delivered by university design academics in state secondary schools in Chinchilla, Mt Isa, Quilpie, Emerald, Gladstone and Bundaberg between February and September 2010, to approximately 95 secondary students and 24 teachers from the subject areas of visual art, graphics and industrial technology and design. A talk by a visiting design practitioner whose work was displayed in the exhibition, also features in the final day of the program in each town, and student work from the workshop was displayed in the exhibition alongside the professional design work. The three-day workshop is a design immersion program for regional Queensland Secondary Schools, which responds to specific actions outlined in the Queensland Government Design Strategy 2020 to ‘Build Design Knowledge and Learning’ and ‘Foster a Design Culture’. Underpinned by a place-based approach and the integration of Dr Charles Burnette’s IDESIGN teaching model, the program gives students and teachers the opportunity to explore, analyse and reimagine their local town through a series of scaffolded problem solving activities around the theme of ‘place’. The program allows students to gain hands-on experience designing graphics, products, interior spaces and architecture to assist their local community, with the support of design professionals. Students work individually and in groups on real design problems learning sketching, making, communication, presentation and collaboration skills to improve their design process, while considering social, cultural and environmental opportunities. The program was designed to facilitate an understanding of the value of design thinking and its importance to regional communities, to give students more information about various design disciplines as career options, and provide a professional development opportunity for teachers. Advisory assistance for the program was gained through Kelvin Grove State College, Queensland Studies Authority and QMI/Manufacturing Skills Queensland Manager, Manufacturing & Engineering Gateway Schools Project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Attachment difficulties have been proposed as a key risk factor for the development of alexithymia, a multifaceted personality trait characterised by difficulties identifying and describing feelings, a lack of imagination and an externally oriented thinking style. The present study investigated the relationship between attachment and alexithymia in an alcohol dependent population. Participants were 210 outpatients in a Cognitive Behavioural Treatment Program assessed on the Toronto Alexithymia Scale (TAS-20) and the Revised Adult Attachment Scale (RAAS). Significant relationships between anxious attachment and alexithymia factors were confirmed. Furthermore, alexithymic alcoholics reported significantly higher levels of anxious attachment and significantly lower levels of closeness (secure attachment) compared to non-alexithymic alcoholics. These findings highlight the importance of assessing and targeting anxious attachment among alexithymic alcoholics in order to improve alcohol treatment outcomes. Keywords: Attachment, alexithymia, alcohol dependence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Barreto-Lynn-Scott (BLS) curves are a stand-out candidate for implementing high-security pairings. This paper shows that particular choices of the pairing-friendly search parameter give rise to four subfami- lies of BLS curves, all of which offer highly efficient and implementation- friendly pairing instantiations. Curves from these particular subfamilies are defined over prime fields that support very efficient towering options for the full extension field. The coefficients for a specific curve and its correct twist are automat-ically determined without any computational effort. The choice of an extremely sparse search parameter is immediately reflected by a highly efficient optimal ate Miller loop and final exponentiation. As a resource for implementors, we give a list with examples of implementation-friendly BLS curves through several high-security levels.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines consumer adoption of 3G mobile technology in China. The qualitative study involved 45 in-depth interviews undertaken in three major Chinese cities to explore the beliefs and attitudes which determine Chinese consumers’ acceptance of the mobile technological innovation. The findings are compared and contrasted against those reported in Western studies. The variations underpinning adoption of 3G between consumers in the three regional cities were identified. Specifically, it was found that the regions differed in terms of the relative importance of the identified adoption determinants, such as perceived social outcomes for using the innovation and the effects of social influence on the adoption. These findings provide subtle insight into the nature of Chinese consumers’ responses to new mobile technologies and a better understanding of variations among regional Chinese consumers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The belief that regions play a role in determining national economic development and that advantages are found at the local and regional level has been the focus of economic geography and development studies over the last 10 years. However, this issue has historically been dominated by economic perspectives, industrial firms, and public bodies. In recent years the social economy is starting to receive greater attention in creating regional advantage as well as ameliorating regional disadvantage. The social economy includes the impact of the third sector such as social enterprises. This paper proposes that understanding the role and function of social enterprise will enable a more nuanced understanding of the socio-economic aspects of regional development. Drawing upon Oliver’s (1997) framework for sustainable competitive advantage it is argued that this established management framework provides a valuable foundation for examining the organisational resources that social enterprise need to operate effectively, as well as the socio-economic resources they produce for regional communities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power system dynamic analysis and security assessment are becoming more significant today due to increases in size and complexity from restructuring, emerging new uncertainties, integration of renewable energy sources, distributed generation, and micro grids. Precise modelling of all contributed elements/devices, understanding interactions in detail, and observing hidden dynamics using existing analysis tools/theorems are difficult, and even impossible. In this chapter, the power system is considered as a continuum and the propagated electomechanical waves initiated by faults and other random events are studied to provide a new scheme for stability investigation of a large dimensional system. For this purpose, the measured electrical indices (such as rotor angle and bus voltage) following a fault in different points among the network are used, and the behaviour of the propagated waves through the lines, nodes, and buses is analyzed. The impact of weak transmission links on a progressive electromechanical wave using energy function concept is addressed. It is also emphasized that determining severity of a disturbance/contingency accurately, without considering the related electromechanical waves, hidden dynamics, and their properties is not secure enough. Considering these phenomena takes heavy and time consuming calculation, which is not suitable for online stability assessment problems. However, using a continuum model for a power system reduces the burden of complex calculations

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As an international norm, the Responsibility to Protect (R2P) has gained substantial influence and institutional presence—and created no small controversy—in the ten years since its first conceptualisation. Conversely, the Protection of Civilians in Armed Conflict (PoC) has a longer pedigree and enjoys a less contested reputation. Yet UN Security Council action in Libya in 2011 has thrown into sharp relief the relationship between the two. UN Security Council Resolutions 1970 and 1973 follow exactly the process envisaged by R2P in response to imminent atrocity crimes, yet the operative paragraphs of the resolutions themselves invoke only PoC. This article argues that, while the agendas of PoC and R2P converge with respect to Security Council action in cases like Libya, outside this narrow context it is important to keep the two norms distinct. Peacekeepers, humanitarian actors, international lawyers, individual states and regional organisations are required to act differently with respect to the separate agendas and contexts covered by R2P and PoC. While overlap between the two does occur in highly visible cases like Libya, neither R2P nor PoC collapses normatively, institutionally or operationally into the other.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In June 2011, a research project team from the Institute for Ethics, Governance and Law (IEGL), Queensland University of Technology, the United Nations University, and the Australian Government’s Asia Pacific Civil-Military Centre of Excellence (APCMCOE) held three Capacity-Building Workshops (the Workshops) on the Responsibility to Protect (R2P) and the Protection of Civilians (POC) in Armed Conflict in Manila, Kuala Lumpur, and Jakarta. The research project is funded by the Australian Responsibility to Protect Fund, with support from APCMCOE. Developments in Libya and Cote d’Ivoire and the actions of the United Nations Security Council have given new significance to the relationship between R2P and POC, providing impetus to the relevance and application of the POC principle recognised in numerous Security Council resolutions, and the R2P principle, which was recognised by the United Nations General Assembly in 2005 and, now, by the Security Council. The Workshops considered the relationship between R2P and POC. The project team presented the preliminary findings of their study and sought contributions and feedback from Workshop participants. Prior to the Workshops, members of the project team undertook interviews with UN offices and agencies, international organisations (IOs) and non-government organisations (NGOs) in Geneva and New York as part of the process of mapping the relationship between R2P and POC. Initial findings were considered at an Academic-Practitioner Workshop held at the University of Sydney in November 2010. In addition to an extensive literature review and a series of academic publications, the project team is preparing a practical guidance text (the Guide) on the relationship between R2P and POC to assist the United Nations, governments, regional bodies, IOs and NGOs in considering and applying appropriate protection strategies. It is intended that the Guide be presented to the United Nations Secretariat in New York in early 2012. The primary aim of the Workshops was to test the project’s initial findings among an audience of diplomats, military, police, civilian policy-makers, practitioners, researchers and experts from within the region. Through dialogue and discussion, the project team gathered feedback – comments, questions, critique and suggestions – to help shape the development of practical guidance about when, how and by whom R2P and POC might be implemented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our cross-national field study of wine entrepreneurship in the “wrong” places provides some redress to the focus of the “regional advantage” literature on places that have already won and on the firms that benefit from “clusters” and other centers of industry advantage. Regional “disadvantage” is at best a shadowy afterthought to this literature. By poking around in these shadows, we help to synthesize and extend the incipient yet burgeoning literature on entrepreneurial “resourcefulness” and we contribute to the developing body of insights and theory pertinent to the numerous but often ignored firms and startups that mostly need to worry about how they will compete at all now if they are ever to have of chance of “winning” in the future. The core of our findings suggests that understandable – though contested – processes of ingenuity underlie entrepreneurial responses to regional disadvantage. Because we study entrepreneurship that from many angles simply does not make sense, we are also able to proffer a novel perspective on entrepreneurial sensemaking.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the determinants of China’s regional innovation capacity (RIC) and variations in these determinants between different types of regions. Based on the framework of national innovation capacity (NIC) and research on innovation system, this paper develops a framework of RIC in the Chinese context. Using panel data from 1991 to 2009, clustering analysis is first employed to classify regions according to their innovation development path. Panel data regressions with fixed effect model are conducted to explore the determinants of RIC and how these vary across the different regional clusters. We find that the 30 regions can be clustered into three groups, and there are considerable differences in the drivers of RIC between these different regional groups.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. This paper provides an explicit theoretical analysis towards watermarking security and robustness in figuring out the exact problem status from the literature. With the necessary hypotheses and analyses from technical perspective, we demonstrate the fundamental realization of the problem. Finally, some necessary recommendations are made for complete assessment of watermarking security and robustness.