267 resultados para airport security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Assessing airport service performance requires understanding of a complete set of passenger experiences covering all activities from departures to arrivals. Weight-based indicator models allow passengers to express their priority on certain evaluation criteria (airport domains) and their service attributes over the others. The application of multilevel regression analysis in questionnaire design is expected to overcome limitations of traditional questionnaires, which require application of all indicators with equal weight. The development of a Taxonomy of Passenger Activities (TOPA), which captures all passenger processing and discretionary activities, has provided a novel perspective in understanding passenger experience in various airport domains. Based on further literature reviews on various service attributes at airport passenger terminals, this paper constitutes questionnaire design to employ a weighting method for all activities from the time passengers enter an airport domain at the departure terminal until leaving the arrival terminal (i.e. seven airport domains for departure, four airport domains during transit, and seven airport domains for arrival). The procedure of multilevel regression analysis is aimed not only at identifying the ranking of each evaluation criterion from the most important to the least important but also to explain the relationship between service attributes in each airport domain and overall service performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The concept of food security is often anchored in popular understandings of the challenge to produce and supply enough food. However, decades of policies for intensive agriculture have not alleviated hunger and malnutrition, with an absence of food security featuring in both economically developing and developed nations. Despite perceptions that the economic growth in advanced, capitalist societies will ensure freedom from hunger, this is not universal across so-called ‘wealthy nations’. To explore the dynamics of food security in economically developed countries, this paper considers institutional approaches to domestic food security primarily through responses to poverty and welfare entitlements, and, secondarily, through food relief. Through the lens of social entitlements to food and their formation under various expressions of welfare capitalism, we highlight how the specific institutional settings of two economically developed nations, Australia and Norway, respond to uncertain or insufficient access to food. Whilst Norway's political agenda on agricultural support, food pricing regulation and universal social security support offers a robust, although indirect, safety net in ensuring entitlements to food, Australia's neoliberal trajectory means that approaches to food security are ad hoc and rely on a combination of self-help, charitable and market responses. Despite its extensive food production Australia appears less capable of ensuring food security for all its inhabitants compared to the highly import-dependent Norway.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent decades, the meaning and value of formal state citizenship has shifted dramatically. In the same period, scholarship on citizenship has drawn attention to the proliferation of alternative forms of sub-, supra- and transnational citizenship, at times obscuring the ongoing importance of formal state citizenship. For refugees, however, formal state citizenship remains a critical and widely shared goal. Drawing on interviews with 51 young people from refugee backgrounds in Melbourne, Australia, this article explores the intersecting themes of mobility and security that were identified by participants as the most important benefits of acquiring formal state citizenship in the country of resettlement. In contrast to the insecurity of forced migration, formal state citizenship provides a privileged mobility that enables refugee-background youth to maintain and create transnational identities and attachments and to be protected while doing so, while also granting a secure status within the nation state and insurance against further displacement in an uncertain future. In offering these forms of mobility and security, formal state citizenship contributes to a sense of ontological security among refugee-background youth, providing an important foundation for building national and transnational futures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current research proposed a conceptual design framework for airports to obtain flexible departure layouts based on passenger activity analysis obtained from Business Process Models (BPM). BPMs available for airport terminals were used as a design tool in the current research to uncover the relationships existing between spatial layout and corresponding passenger activities. An algorithm has been developed that demonstrates the applicability of the proposed design framework by obtaining relative spatial layouts based on passenger activity analysis. The generated relative spatial layout assists architects in achieving suitable alternative layouts to meet the changing needs of an airport terminal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper I conduct a Foucauldian discourse analysis of a political speech given by Brendon Nelson in 2006 when the Australian Minister for Defence in the Howard Coalition Government. The speech connects conceptualisations of terror, globalization, education and literacy as part of a whole of government security strategy. The analysis examines this speech as an example of a liberal way of governing the conduct of diverse and unpredictable populations. My analysis suggests that the apparatus of government has been strategically used in order to biopolitically contain the rise of complex social forces and protect a set of homogenous cultural values. The purposes of education and uses of literacy are seen as instruments for the inscription of a coded set of values understood to be synonymous with civil society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Growth in aviation has resulted in large airports that can be described as Airport Metropolises. This thesis reviews a variety of sustainable energy options that are suitable for such airports, and presents a decision support framework that can be used to guide decision makers towards the adoption of sound sustainable energy projects and practices. The thesis demonstrates use of the decision support framework via a number of case studies and outlines a methodology which could be incorporated within a Decision Support System.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose The purpose of this study is to identify and understand the emotions behind a passenger’s airport experience and how this can inform digital channel engagements. Design/methodology/approach This study investigates the emotional experience of two hundred (200) passengers’ journeys at an Australian domestic airport. A survey was conducted which implemented the use of Emocards and an interview approach of laddering. The responses were then analysed into attributes, consequences and values. Findings The results indicate that across key stages of the airport (parking, retail, gates and arrivals) passengers had different emotional experiences (positive, negative and neutral). The attributes, consequences and values behind these emotions were then used to propose digital channel content and purpose of various future digital channel engagements. Research limitations/implications By gaining emotional insights airports are able to generate digital channel engagements, which align with passengers’ needs and values rather than internal operational motivations. Theoretical contributions include the development of the Technology Acceptance Model to include emotional drivers as influences in the use of digital channels. Originality/value This research provides a unique method to understand the passengers’ emotional journey across the airport infrastructure and suggest how to better design digital channel engagements to address passenger latent needs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[Book] The potential of electric light as a new building “material” was recognized in the 1920s and became a useful design tool by the mid-century. Skillful lighting allowed for theatricality, narrative, and a new emphasis on structure and space. The Structure of Light tells the story of the career of Richard Kelly, the field’s most influential figure. Six historians, architects, and practitioners explore Kelly’s unparalleled influence on modern architecture and his lighting designs for some of the 20th century’s most iconic buildings: Philip Johnson’s Glass House; Louis Kahn’s Kimbell Art Museum; Eero Saarinen’s GM Technical Center; and Mies van der Rohe’s Seagram Building, among many others. This beautifully illustrated history demonstrates the range of applications, building types, and artistic solutions he employed to achieve a “nocturnal modernity” that would render buildings evocatively different at night. The survival of Kelly’s rich correspondence and extensive diaries allows an in-depth look at the triumphs and uncertainties of a young profession in the making. The first book to focus on the contributions of a master in the field of architectural lighting, this fascinating volume celebrates the practice’s significance in modern design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.