433 resultados para Internet Security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Is the brain evolving and adapting to new technological environments such as that of Silicon Valley? This paper examines changes that are being observed and studied relating to a possible correlation between ‘excessive’ focus on technology and the emergence of diagnosable social, physical and mental health dysfunction. The author explores the possible role of university staff and student services in the duty of care toward students. Would it not be more ethical to provide education on healthy technology use and to provide evidence based therapy for those students who fall through the web? Currently students end up being excluded from their courses. Many suffer from social anxiety and depression and lack confidence and social skills to find or hold down a job. Currently many “hibernate” in their rooms for months or years frequently in a state of despair.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

By 2020 Australia‟s National Digital Economy Strategy aims to increase household online participation and engage 12 per cent of all employees in teleworking arrangements. Achieving these goals is generally perceived as positive due to the reduced impact on the natural environment from less use of transport. However, this also will enable greater flexibility as to where people live and thus will impact upon the maintenance and formation of communities and on property use. This paper commences by clarifying what is Australia‟s internet economy before highlighting the impact of the internet on community formation and maintenance. The paper concludes by identifying what the achievement of these goals will mean for property use in the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sustainable property practices will be essential for Australia’s future. The various levels of government offer incentives aimed at encouraging residents to participate in sustainable practices. Many of these programmes however are only accessible by owner occupiers, or landlords and tenants with long term tenancies. Improving security of tenure for tenants, to enable longer term tenancies, would positively impact upon property practices. This article explains what security of tenure is and identifies how a lack of security of tenure adversely impacts property practices. By comparison with Genevan property practices, it concludes by making suggestions as to how security of tenure can be reinforced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Taxonometrical uncertainty is prevalent in the field of locative media, which has been variously referred to as “the geomobile web” (Crawford and Goggin, 2009), “the geoweb” (Lake et al., 2004), “Where 2.0” (O’Reilly, 2008:1), and “DigiPlace” (Zook and Graham, 2007). However, it is not only the rapid development of the technology, or the various academic disciplinary approaches to it, that have resulted in this uncertainty but also the deeply ideological debates and concerns about what locative media should and should not be. The intention of this article is to provide an overview of existing literature and research in this field in order to develop a synthetic overview of the various types of locative media, and the geographies arising from them. Not only will such taxonomy clarify communication about locative media, it will identify for developers, users, policy-makers and scholars the specific contours and affordances of the different types of locative media, as well as the issues associated with them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increased participation in the internet economy is actively encouraged and supported by all levels of government. Research to date clearly shows the positive impacts that increased internet access can bring, particularly for rural Australia. Meanwhile, for the most part, identification of any negative impacts of increased broadband access on existing and potential property uses is avoided. The aim of this article is to identify issues for property use arising as a consequence of increased engagement in the internet economy. The article commences by clarifying what is meant by the term ‘internet economy’ before highlighting current impacts of the internet. It concludes by suggesting potential impacts for property and property uses in the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation and offender management and treatment practice in the area of Internet child abuse. Internet use has grown considerably over the last five years, and information technology now forms a core part of the formal education system in many countries. There is however, increasing evidence that the Internet is used by some adults to access children and young people in order to ‘groom’ them for the purposes of sexual abuse; as well as to produce and distribute indecent illegal images of children. This book presents and assesses the most recent and current research on internet child abuse, addressing: its nature, the behaviour and treatment of its perpetrators, international policy, legislation and protection, and policing. It will be required reading for an international audience of academics, researchers, policy-makers and criminal justice practitioners with interests in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a number of characteristics of the Internet that makes it attractive to online groomers. Relevant Internet characteristics include disconnected personal communication, mediating technology, universality, network externalities, distribution channel, time moderator, low‐cost standard, electronic double, electronic double manipulation, information asymmetry, infinite virtual capacity, independence in time and space, cyberspace, and dynamic social network. Potential sex offenders join virtual communities, where they meet other persons who have the same interest. A virtual community provides an online meeting place where people with similar interests can communicate and find useful information. Communication between members may be via email, bulletin boards, online chat, web‐based conferencing or other computer‐based media.