252 resultados para Notions of security
Resumo:
Video surveillance systems using Closed Circuit Television (CCTV) cameras, is one of the fastest growing areas in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. This work attempts to address these problems by proposing an automatic suspicious behaviour detection which utilises contextual information. The utilisation of contextual information is done via three main components: a context space model, a data stream clustering algorithm, and an inference algorithm. The utilisation of contextual information is still limited in the domain of suspicious behaviour detection. Furthermore, it is nearly impossible to correctly understand human behaviour without considering the context where it is observed. This work presents experiments using video feeds taken from CAVIAR dataset and a camera mounted on one of the buildings Z-Block) at the Queensland University of Technology, Australia. From these experiments, it is shown that by exploiting contextual information, the proposed system is able to make more accurate detections, especially of those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information gives critical feedback to the system designers to refine the system.
Resumo:
This chapter focuses on two challenges to science teachers’ knowledge that Fensham identifies as having recently emerged—one a challenge from beyond Science and the other a challenge from within Science. Both challenges stem from common features of contemporary society, namely, its complexity and uncertainty. Both also confront science teachers with teaching situations that contrast markedly with the simplicity and certainty that have been characteristic of most school science education, and hence both present new demands for science teachers’ knowledge and skill. The first, the challenge from without Science, comes from the new world of work and the “knowledge society”. Regardless of their success in traditional school learning, many young persons in many modern economies are now seen as lacking other knowledge and skills that are essential for their personal, social and economic life. The second, the challenge from within Science, derives from changing notions of the nature of science itself. If the complexity and uncertainty of the knowledge society demand new understandings and contributions from science teachers, these are certainly matched by the demands that are posed by the role of complexity and uncertainty in science itself.
Resumo:
This article critiques the rise of parenting orders in Scotland within New Labour’s self-styled model of ‘respect’ and ‘responsibility’. It examines the emergence of parenting orders in Scotland, which became available in April 2005, and argues that Scottish local authorities are sceptical of an approach they perceive as an ideological and legislative mix premised on punitive notions of individual responsibility and justice.
Resumo:
Living City 2010 was a three-day place-based urban design immersion workshop program held at Logan Road Conference Centre, Stones Corner, for 30 self-selected Year 11 Visual Art Students and 4 Teachers drawn from 11 state and private Brisbane Secondary Schools, that focused on the active Brisbane City Council redevelopment site of Stones Corner, specifically Logan Road, public spaces at Stones Corner Library and rehabilitation of the nearby creek corridor. The workshop, framed within notions of ecological, economic, social and cultural sustainability, aimed to raise awareness of the layered complexity and perspectives involved in the design of shared city spaces and to encourage young people to voice their own concerns as future citizens about the shape and direction of their city. On Day 1, Brisbane City Council Public Art Officers Brendan Doherty and Genevieve Searle, local landscape architect Peter Boyle (Verge) and artists Malcolm Enright and Barbara Heath provided students with an overview of the historic and future context of the area including proposed design and public art interventions, followed by a site walk. The afternoon session, led by Natalie Wright and QUT design staff and students, focused on design tools to assist in the tackling of the redesign of the Stones Corner library precinct, where students worked on ideas. On Day 2, students were mentored by artist Liam Key to participate in a computer animation activity using the built environment as a canvas, and by artist Sebastian Moody to participate in an activity using red helium balloons as a playful catalyst for interaction to activate and create new public space. Later, students worked in teams on their ideas for redevelopment of the site in preparation for their Day 3 presentations. The workshop culminated in an exchange of planning ideas with Georgina Aitchison from Brisbane City Council's Urban Renewal Division. Students were introduced to design methodology, team thinking strategies, the scope of design practices and professions, presentation skills and post-secondary pathways, while participating teachers acquired content and design learning strategies transferable in many other contexts.
Resumo:
Business transformations are large-scale organisational change projects that, evidence suggests, are often unsuccessful. This study aims to develop a conceptual model that explains how management services that are required for a business transformation are orchestrated during such a initiative. We classify management services such as (but not limited to) change management, risk management, IT management, financial management, program management and so forth as bearing transformational and/or transactional capabilities in a transformation initiative. We then draw upon three principles of musical composition, namely melody, harmony and rhythm, and illustrate how they apply to the orchestration of management services in the management of business transformations. In order to illustrate our emerging model, we examine the case of Malaysia Airlines, who have managed to successfully turnaround the near-bankrupt organisation beyond survival. We demonstrate how the notions of melody, harmony and rhythm can be used to describe their endeavour. We conclude by discussing next steps of our research.
Resumo:
Over the last few decades, there has been a marked increase in media and debate surrounding a specific group of offences in modern Democratic nations which bear the brunt of the label ‘crimes against morality’. Included within this group are offences related to prostitution and pornography, homosexuality and incest and child sexual abuse. This book examines the nexus between sex, crime and morality from a theoretical perspective. This is the first academic text to offer an examination and analysis of the philosophical underpinnings of sex-related crimes and social attitudes towards them and the historical, anthropological and moral reasons for differentiating these crimes in contemporary western culture. The book is divided into three sections corresponding to three theoretical frameworks: - Part 1 examines the moral temporality of sex and taboo as a foundation for legislation governing sex crimes - Part 2 focuses on the geography of sex and deviance, specifically notions of public morality and the public private divide - Part 3 examines the moral economy of sex and harm, including the social construction of harm. Sex, Crime and Morality will be key reading for students of criminology, criminal justice, gender studies and ethics, and will also be of interest to justice professionals.
Resumo:
Design and design thinking have been identified as making valuable contributions to business and management and the numbers of higher education programs that teach design thinking to business students, managers and executives are growing. However multiple definitions of design thinking and the range of perspectives have created some confusion about potential pathways. This paper examines notions of design and design thinking and uses these definitions to identify themes in higher educational programs. We present the findings from an initial exploratory investigation of design and design thinking in higher education business programs and define four distinct educational approaches around human centred innovation, integrative thinking, design management and design as strategy. Potential directions for management education programs are presented.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
Resumo:
In this video, phrases sourced from social networking websites are reformatted into a slowly rotating mandala form. As the text changes colour, an abstract, atmospheric soundtrack develops. “In the Beyond” examines how we construct and communicate notions of identity. It mixes language gleaned from social networks, and fuses them with a mandala form. Drawing on Zygmunt Bauman’s theoretical work on “liquid modernity”, this work questions how and where we find space for contemplation and reflection in a contemporary context increasingly defined by temporary social bonds and consumer choices.
Resumo:
Citizen Coombs Wins! appears to be a standard arcade game placed within the gallery. Mortal Kombat is displayed on the screen inviting the viewer to press play. The ‘player’ selects their character and awaits the commencement of the game; at first move however, the player dies – sound and text informs them that ‘Citizen Coombs Wins!’. By altering the expected play of the game, this work exploring notions of play, control, the institution and expectation. This work seeks to invite, engage and repel the viewer in order to question, critique and play with the role of the artist and the viewer within the context of the institution. The work was included in the international group show 'Ceci n'est pas une Casino!', curated by Kevin Muhlen and Jo Kox for the Casino Luxembourg and later toured to Villa Merkel, Esslingen, Germany.
Resumo:
This article reports on the first year of the Exceptional Teachers for Disadvantaged Schools project, a teacher education approach designed to prepare high quality teachers for low socio-economic schools. The Exceptional Teachers for Disadvantaged Schools (ETDS) project is an innovative way to prepare high-quality teachers for employment in low-SES schools. The program, based at Queensland University of Technology (QUT), offers a specialised curriculum, designed to equip high-achieving pre-service teachers for work in the schools that need them most. Selected pre-service teachers at QUT are invited to take part in the trial course, based on their academic performance over the first two years of their four-year Bachelor of Education degree, and on a demonstrated commitment to social justice. These participants undertake a modified version of QUT's B Ed on-campus curriculum. They have their practicum/field experience at one of a range of disadvantaged schools throughout Queensland which have agreed to partner with QUT in the program. In the past, teacher education for disadvantaged schools has been described as applying a 'missionary' or deficit model (Larabee, 2010; Comber and Kamler, 2004; Flessa, 2007). The principals of schools participating in the ETDS react strongly against such an approach, and have explicitly asked project staff not to send them anyone who 'thinks they can save the world'. The ETDS project has moved well away from such a model, towards a position that is explicitly centred on notions of academic excellence. The project is now at the end of its first trial year.
Resumo:
In 2009, the researcher acted as director and dramaturg for the development of Sam Watson’s play, Oodgeroo: Bloodline to Country, culminating in a season at La Boite Theatre. This project represents the first time notions of Aboriginal politics were seriously questioned. It aimed to illuminate a key divide in the way Australian indigenous people, and the wider Australian community, deal with issues of grief and outrage – the way of resistance and revolution, or the way of reconciliation and education. The work sought to combine specific cultural artefacts belonging to the Noonuccal people and the family of Oodgeroo of the Noonuccal (Kath Walker) with traditional and contemporary ideas and performance forms.
Resumo:
The “political” dynamics and the details of conducting criminological research on a day-to-day basis are examined. The role of government and commercial contracts in contemporary criminological scholarship are explored, as well as the various obstacles that criminologists must negotiate during the completion of a research project. The criminological implications of the ways in which academic environments are changing under new managerialist philosophies are examined. The ways in which notions of “critique” have become subordinate to the politics of existing governing rationalities are also examined. Chapter 1 details the questions, contours, and methods of “deviant knowledge.” Chapter 2 discusses the contours of criminological knowledge, including early criminological developments, international reconstruction and developments in criminological research following World War II, the United Nations, and the rise of critical genres. Chapter 3 explores criminology, government, and public policy, including the policies of the Home Office of England and Wales; the National Institute of Justice in Washington, DC; and the Australian Institute of Criminology in Canberra. The politics and control of criminological knowledge are discussed in chapter 4, along with ethical and legal issues, gathering and accessing data, and publishing results of research. Chapter 5 describes the “War on Terror” and government intolerance and suppression of free speech. Chapter 6 examines the new modes of governance and the commercialization of criminological knowledge. Chapter 7 discusses intellectual independence and collective concern, and the value of critique. 3 appendices, 546 references, index
Resumo:
"Bouncing Back: Resilient Design for Brisbane" was an opportunity for QUT students to communicate their inspiring design responses to adversity, to the larger Brisbane community. The exhibition demonstrates new and innovative ways of thinking about our cities, and how they are built to be resilient and to suit extreme environmental conditions. The challenge for architecture students is to address the state of architecture as a reflection of today's world and to consider how design fits into the 21st century. Students have explored notions of 'Urban Resilience' from multiple perspectives, including emergency design while facing flooding, flood proof housing and urban designs.