243 resultados para threat
Reframing Conceptions of Contemporary Literacy Capabilities in Pre-Service Primary Teacher Education
Resumo:
This chapter describes the challenges of integrating new technologies with literacy education in pre-service primary teacher education in Australia. The authors describe the policy context and regulatory mechanisms controlling pre-service education, including a national set of professional standards for graduate teachers, a new national curriculum for school students, the introduction of high stakes national assessment for school students, and the looming threat of decontextualized back-to-the-basics professional entry tests for aspiring teachers. The chapter includes three case studies of the authors’ pedagogical practices that attempt to reframe conceptions of the literacy capabilities of pre-service teachers to reflect the complex and sophisticated requirements of teachers in contemporary schooling. The authors conclude the chapter with a discussion of the implications of these case studies as they illustrate the ways that pre-service teachers can be scaffolded and supported to develop creative capacity and critical awareness of the kinds of literacies required in the digital age despite restrictive regimes.
Resumo:
Espionage, surveillance and clandestine operations by secret agencies and governments were something of an East–West obsession in the second half of the twentieth century, a fact reflected in literature and film. In the twenty-first century, concerns of the Cold War and the threat of Communism have been rearticulated in the wake of 9/11. Under the rubric of ‘terror’ attacks, the discourses of security and surveillance are now framed within an increasingly global context. As this article illustrates, surveillance fiction written for young people engages with the cultural and political tropes that reflect a new social order that is different from the Cold War era, with its emphasis on spies, counter espionage, brainwashing and psychological warfare. While these tropes are still evident in much recent literature, advances in technology have transformed the means of tracking, profiling and accumulating data on individuals’ daily activities. Little Brother, The Hunger Games and Article 5 reflect the complex relationship between the real and the imaginary in the world of surveillance and, as this paper discusses, raise moral and ethical issues that are important questions for young people in our age of security.
Resumo:
Refugees flee their countries of origin due to supreme hardship and threat to life; frequently bearing witness to mass atrocity. This research is embedded in a salutogenic paradigm which emphasises strength and adjustment. Twenty-five refugees from Burma who were newly arrived in Australia were interviewed and transcripts were analysed using an Interpretive Phenomenological Analytic (IPA) approach. In addition to themes of distress, data revealed an extraordinary adaptive capacity and highlighted strengths, both individually and collectively. Specific adaptive strategies included religiousness, and a sense of duty to family, community and country. Findings have implications for policy and practice that aim to support refugees and asylum seekers.
Resumo:
Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.
Resumo:
The design of society’s major infrastructure systems are generally based on anthropogenic learnings and seldom encapsulate learning from nature. This results from a pervading attitude of superiority of human-designed systems, particularly since the Industrial Revolution. Problems created by such behaviours have previously not been thought to present a serious threat to humanity. However, many built environment professionals are now reconsidering the impact of such systems on the environment and their vulnerability to issues such as climate change. This paper presents an approach to delivering sustainable urban infrastructure that addresses 21st Century needs by emulating natural form, function and process - biomimicry – in infrastructure design. The analysis reveals the context for infrastructure change and the need for sustainable solutions, detailing the current inquiry into biomimicry informed design and highlighting potential applications from literature that demonstrate precedence for nature to inspire the design of urban infrastructure, in particular water and energy systems.
Resumo:
Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.
Resumo:
The conflicts in Iraq and Afghanistan have been epitomized by the insurgents’ use of the improvised explosive device against vehicle-borne security forces. These weapons, capable of causing multiple severely injured casualties in a single incident, pose the most prevalent single threat to Coalition troops operating in the region. Improvements in personal protection and medical care have resulted in increasing numbers of casualties surviving with complex lower limb injuries, often leading to long-term disability. Thus, there exists an urgent requirement to investigate and mitigate against the mechanism of extremity injury caused by these devices. This will necessitate an ontological approach, linking molecular, cellular and tissue interaction to physiological dysfunction. This can only be achieved via a collaborative approach between clinicians, natural scientists and engineers, combining physical and numerical modelling tools with clinical data from the battlefield. In this article, we compile existing knowledge on the effects of explosions on skeletal injury, review and critique relevant experimental and computational research related to lower limb injury and damage and propose research foci required to drive the development of future mitigation technologies.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
Feral pigs occur throughout tropical far north Queensland, Australia and are a significant threat to biodiversity and World Heritage values, agriculture and are a vector of infectious diseases. One of the constraints on long-lasting, local eradication of feral pigs is the process of reinvasion into recently controlled areas. This study examined the population genetic structure of feral pigs in far north Queensland to identify the extent of movement and the scale at which demographically independent management units exist. Genetic analysis of 328 feral pigs from the Innisfail to Tully region of tropical Queensland was undertaken. Seven microsatellite loci were screened and Bayesian clustering methods used to infer population clusters. Sequence variation at the mitochondrial DNA control region was examined to identify pig breed. Significant population structure was identified in the study area at a scale of 25 to 35 km, corresponding to three demographically independent management units (MUs). Distinct natural or anthropogenic barriers were not found, but environmental features such as topography and land use appear to influence patterns of gene flow. Despite the strong, overall pattern of structure, some feral pigs clearly exhibited ancestry from a MU outside of that from which they were sampled indicating isolated long distance dispersal or translocation events. Furthermore, our results suggest that gene flow is restricted among pigs of domestic Asian and European origin and non-random mating influences management unit boundaries. We conclude that the three MUs identified in this study should be considered as operational units for feral pig control in far north Queensland. Within a MU, coordinated and simultaneous control is required across farms, rainforest areas and National Park Estates to prevent recolonisation from adjacent localities.
The role of the ethnic enclave in facilitating immigrant business performance and social integration
Resumo:
Chinese immigrant entrepreneurs, known the world over for their successful business practices (Kee, 1994), tend to start businesses within their ethnic enclave. But in a move away from multiculturalism, host countries increasingly fear that immigration and asylum pose a threat to social integration resulting in a lack of social cohesion and a plethora of government programs (Cheong, Edwards, Goulbourne & Solomos, 2007). For many immigrant entrepreneurs, the EE is an integral part of their social and cultural context and the location where ethnic resources reside (Logan, Alba & Stults, 2003). Immigrant entrepreneurs can harness the networks for labor and customers through various ties in their EE (Portes and Zhou, 1996). Yang, Ho and Chang (2010) illustrate in their paper that the Chinese immigrant entrepreneurs (IE) were able to utilize ethnic network resources as their social capital in order to reduce transaction costs and thus enhance business performance. Tilly (1990) explains that immigrants’ reliance on such networks for business or other information minimizes the socioeconomic hardships they would experience in host countries (Raijman & Tienda, 2000). Acquiring jobs in ethnic businesses and establishing businesses within an EE may facilitate migrants’ social integration into the host country (Tian & Shan, 1999). Although an EE has distinct economic advantages for immigrant entrepreneurs, Sequeira and Rasheed (2006: 367) argue that ‘Exclusive reliance on strong ties within the immigrant enclave has a negative effect on growth outside the enclave community.’ Similarly, Drori, Honig and Ginsberg (2010: 20) also propose that ‘The greater the reliance of transnational entrepreneurs on ethnic (versus societal) embedded resources and network structure, the narrower their possibilities of expanding the scope of their business.’ This research asks, ‘What is the role of the ethnic enclave in facilitating immigrant business growth and social integration? This project has the following important aims: A1 To better understand the role of IE, in particular Chinese IE in the Australian economy A2 To investigate the role of the EE in facilitating or inhibiting immigrant business performance A3 To understand how locating their firm inside or outside of the EE will affect the IE’s embeddedness in co-ethnic and nonco-ethnic networks and social integration A4 To understand how an IE’s social network affects business performance and social integration
Resumo:
Modern genetic research holds out the promise of a bold new future in which humanity has identified and conquered the genetic roots of many diseases. Genetic science also promises to shed light on who we are, what it is that makes us tick, what it is that makes us the way we are — in short, what it is that makes us human. Yet while genetics are a potential saviour (saving us from disease), it also appears as a threat that at the extremes appears to be the stuff of our worst nightmares, such as the prospect, probably more imagined than real, of rows of cloned individuals. The new genetics hold out the promise that through genetics we will be able to determine what we are, a promise that is simultaneously appealing and terrifying. This chapter discusses the cloning of people and parts, the law’s response to cloning, genetics and diversity, a framework for law reform.
Resumo:
Wikipedia is often held up as an example of the potential of the internet to foster open, free and non-commercial collaboration. However such discourses often conflate these values without recognising how they play out in reality in a peer-production community. As Wikipedia is evolving, it is an ideal time to examine these discourses and the tensions that exist between its initial ideals and the reality of commercial activity in the encyclopaedia. Through an analysis of three failed proposals to ban paid advocacy editing in the English language Wikipedia, this paper highlights the shift in values from the early editorial community that forked encyclopaedic content over the threat of commercialisation, to one that today values the freedom that allows anyone to edit the encyclopaedia.
Resumo:
Over the past decade there has been an increased awareness in the field of international relations of the potential impact of an infectious disease epidemic on national security. While states’ attempts to combat infectious disease have a long history, what is new in this area is the adoption at the international level of securitized responses regarding the containment of infectious disease. This article argues that the securitization of infectious disease by states and the World Health Organization (WHO) has led to two key developments. First, the WHO has had to assert itself as the primary actor that all states, particularly western states, can rely upon to contain the threat of infectious diseases. The WHO's apparent success in this is evidenced by the development of the Global Outbreak Alert Response Network (GOARN), which has led to arguments that the WHO has emerged as the key authority in global health governance. The second outcome that this article seeks to explore is the development of the WHO's authority in the area of infectious disease surveillance. In particular, is GOARN a representation of the WHO's consummate authority in the area of coordinating infectious disease response or is GOARN the product of the WHO's capitulation to western states’ concerns with preventing infectious disease outbreaks from reaching their borders and as a result, are arguments expressing the authority of the WHO in infectious disease response premature?
Resumo:
Engineering design processes are necessary to attain the requisite standards of integrity for high-assurance safety-related systems. Additionally, human factors design initiatives can provide critical insights that parameterise their development. Unfortunately, the popular perception of human factors as a “forced marriage” between engineering and psychology often provokes views where the ‘human factor’ is perceived as a threat to systems design. Some popular performance-based standards for developing safety-related systems advocate identifying and managing human factors throughout the system lifecycle. However, they also have a tendency to fall short in their guidance on the application of human factors methods and tools, let alone how the outputs generated can be integrated in to various stages of the design process. This case study describes a project that converged engineering with human factors to develop a safety argument for new low-cost railway level crossing technology for system-wide implementation in Australia. The paper enjoins the perspectives of a software engineer and cognitive psychologist and their involvement in the project over two years of collaborative work to develop a safety argument for low-cost level crossing technology. Safety and reliability requirements were informed by applying human factors analytical tools that supported the evaluation and quantification of human reliability where users interfaced with the technology. The project team was confronted with significant challenges in cross-disciplinary engagement, particularly with the complexities of dealing with incongruences in disciplinary language. They were also encouraged to think ‘outside the box’ as to how users of a system interpreted system states and ehaviour. Importantly, some of these states, while considered safe within the boundary of the constituent systems that implemented safety-related functions, could actually lead the users to engage in deviant behaviour. Psychology explained how user compliance could be eroded to levels that effectively undermined levels of risk reduction afforded by systems. Linking the engineering and psychology disciplines intuitively, overall safety performance was improved by introducing technical requirements and making design decisions that minimized the system states and behaviours that led to user deviancy. As a commentary on the utility of transdisciplinary collaboration for technical specification, the processes used to bridge the two disciplines are conceptualised in a graphical model.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.