44 resultados para H56 - National Security and War


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper describes a number of requirements for enhancing the trust of location acquisition from Satellite Navigation Systems, particularly for those applications where the location is monitored through a remote GNSS receiver. We discuss how the trust of a location acquisition could be propagated to an application through the use of a proposed tamper-­resistant GNSS receiver which quantifies the trust of a location solution from the signaling used (ie. P(Y) code, Galileo SOL, PRS, CS) and provides a cryptographic proof of this to a remote application. The tamper­-resistance state of the receiver is also included in this cryptographic proof.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Operators of busy contemporary airports have to balance tensions between the timely flow of passengers, flight operations, the conduct of commercial business activities and the effective application of security processes. In addition to specific onsite issues airport operators liaise with a range of organisations which set and enforce aviation-related policies and regulations as well as border security agencies responsible for customs, quarantine and immigration, in addition to first response security services. The challenging demands of coordinating and planning in such complex socio-technical contexts place considerable pressure on airport management to facilitate coordination of what are often conflicting goals and expectations among groups that have standing in respect to safe and secure air travel. What are, as yet, significantly unexplored issues in large airports are options for the optimal coordination of efforts from the range of public and private sector participants active in airport security and crisis management. A further aspect of this issue is how airport management systems operate when there is a transition from business-as-usual into an emergency/crisis situation and then, on recovery, back to ‘normal’ functioning. Business Continuity Planning (BCP), incorporating sub-plans for emergency response, continuation of output and recovery of degraded operating capacity, would fit such a context. The implementation of BCP practices in such a significant high security setting offers considerable potential benefit yet entails considerable challenges. This paper presents early results of a 4 year nationally funded industry-based research project examining the merger of Business Continuity Planning and Transport Security Planning as a means of generating capability for improved security and reliability and, ultimately, enhanced resilience in major airports. The project is part of a larger research program on the Design of Secure Airports that includes most of the gazetted ‘first response’ international airports in Australia, key Aviation industry groups and all aviation-related border and security regulators as collaborative partners. The paper examines a number of initial themes in the research, including: ? Approaches to integrating Business Continuity & Aviation Security Planning within airport operations; ? Assessment of gaps in management protocols and operational capacities for identifying and responding to crises within and across critical aviation infrastructure; ? Identification of convergent and divergent approaches to crisis management used across Austral-Asia and their alignment to planned and possible infrastructure evolution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article compares YouTube and the National Film and Sound Archive (NFSA) as resources for television historians interested in viewing old Australian television programs. The author searched for seventeen important television programs, identified in a previous research project, to compare what was available in the two archives and how easy it was to find. The analysis focused on differences in curatorial practices of accessioning and cataloguing. NFSA is stronger in current affairs and older programs, while YouTube is stronger in game shows and lifestyle programs. YouTube is stronger than the NFSA on “human interest” material—births, marriages, and deaths. YouTube accessioning more strongly accords with popular histories of Australian television. Both NFSA and YouTube offer complete episodes of programs, while YouTube also offers many short clips of “moments.” YouTube has more surprising pieces of rare ephemera. YouTube cataloguing is more reliable than that of the NFSA, with fewer broken links. The YouTube metadata can be searched more intuitively. The NFSA generally provides more useful reference information about production and broadcast dates.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Attachment difficulties have been proposed as a key risk factor for the development of alexithymia, a multifaceted personality trait characterised by difficulties identifying and describing feelings, a lack of imagination and an externally oriented thinking style. The present study investigated the relationship between attachment and alexithymia in an alcohol dependent population. Participants were 210 outpatients in a Cognitive Behavioural Treatment Program assessed on the Toronto Alexithymia Scale (TAS-20) and the Revised Adult Attachment Scale (RAAS). Significant relationships between anxious attachment and alexithymia factors were confirmed. Furthermore, alexithymic alcoholics reported significantly higher levels of anxious attachment and significantly lower levels of closeness (secure attachment) compared to non-alexithymic alcoholics. These findings highlight the importance of assessing and targeting anxious attachment among alexithymic alcoholics in order to improve alcohol treatment outcomes. Keywords: Attachment, alexithymia, alcohol dependence.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article considers the impact of the WikiLeaks organisation in relation to debates around the defence of national security and free speech, global media citizenship and the emerging dynamics of the global public sphere. Building on the author’s previous work on political communication, journalism and ‘cultural chaos’, it explores the implications of WikiLeaks for emerging conceptions and definitions of journalism, and for the changing structure of media–politics power relations at the global level, against the background of three trends: democratisation, declining deference and digitalisation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article offers a discourse analysis comparing selected articles in the national press over the consultative period for Phase 1 subjects in the new Australian Curriculum, with rationales prefacing official Australian Curriculum Assessment and Reporting Authority documents. It traces how various versions of Australia, its ‘nation-ness’ and its future citizens have been taken up in the final product. The analysis uses Lemke's analytic elaboration of Bakhtin's concept of heteroglossia and its derivative, intertextuality. It identifies a range of intertextual thematic formations around ‘nation’, ‘history’, ‘citizen’ and ‘curriculum’ circulating in the public debates, then traces their presence in official curriculum documents. Rather than concluding that these themes are contradictory and incoherent, the conclusion asks how these multiple dialogic facets of Australian nation-ness potentially offer a better response to complex times than any coherent monologic orthodoxy might.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

China is motorizing rapidly, with associated urban road development and extensive construction of motorways. Speeding accounts for about 10% of fatalities, which represents a large decrease from a peak of 17.2% in 2004. Speeding has been addressed at a national level through the introduction of laws and procedural requirements in 2004, in provinces either across all road types or on motorways, and at city level. Typically, documentation of speed enforcement programmes has taken place when new technology (i.e. speed cameras) is introduced, and it is likely that many programmes have not been documented or widely reported. In particular, the national legislation of 2004 and its implementation was associated with a large reduction in fatalities attributed to speeding. In Guangdong Province, after using speed detection equipment, motorway fatalities due to speeding in 2005 decreased by 32.5% comparing with 2004. In Beijing, the number of traffic monitoring units which were used to photograph illegal traffic activities such as traffic light violations, speeding and using bus lanes illegally increased to 1958 by April 1, 2009, and in the future such automated enforcement will become the main means of enforcement, expected to account for 60% of all traffic enforcement in Beijing. This paper provides a brief overview of the speeding enforcement programmes in China which have been documented and their successes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article will outline the impact of the Electronic Conveyancing National Law (ECNL) and the draft Model Participation Rules (MPR) on conveyancing practice and the obligations of lawyers and conveyancers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many commentators have treated the internet as a site of democratic freedom and as a new kind of public sphere. While there are good reasons for optimism, like any social space digital space also has its dark side. Citizens and governments alike have expressed anxiety about cybercrime and cyber-security. In August 2011, the Australian government introduced legislation to give effect to Australia becoming a signatory to the European Convention on Cybercrime (2001). At the time of writing, that legislation is still before the Parliament. In this article, attention is given to how the legal and policy-making process enabling Australia to be compliant with the European Convention on Cybercrime came about. Among the motivations that informed both the development of the Convention in Europe and then the Australian exercise of legislating for compliance with it was a range of legitimate concerns about the impact that cybercrime can have on individuals and communities. This article makes the case that equal attention also needs to be given to ensuring that legislators and policy makers differentiate between legitimate security imperatives and any over-reach evident in the implementation of this legislation that affects rule of law principles, our capacity to engage in democratic practices, and our civic and human rights.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study examines the range of Vietnamese understandings of the natural and cultural environment both in Australia and in Vietnam. It documents the differing experiences of Vietnamese-Australians to national parks, focusing on the factors influencing the involvement of Vietnamese people in parks and reserves. These include social, age, economic, gender and cultural determinants. The study also ascertains whether particular parks or reserves have social significance to Vietnamese people in Australia provides material that could impact on NPWS policy in relation to education strategies for different communities indicates ways of increasing community awareness about the NPWS in the Vietnamese community. The study is part of an NPWS research program on multiculturalism and conservation reserves.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record systems. Among these are the perceived threats to the security and privacy of patients’ health data, and a widely held belief that these cannot be adequately addressed. We hypothesise that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone. Human dimensions must be considered when analysing the provision of the three fundamental information security goals: confidentiality, integrity and availability. A sociotechnical analysis to establish the information security and privacy requirements when designing and developing a given eHealth system is important and timely. A framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system. Successful implementation of this approach would enable the possibilities, practicalities and sustainabilities of proposed eHealth systems to be realised.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The final report for the ARC project "Airports of the Future". It contains the findings and recommendations provided by the various teams to the industry partners.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

To harness safe operation of Web-based systems in Web environments, we propose an SSPA (Server-based SHA-1 Page-digest Algorithm) to verify the integrity of Web contents before the server issues an HTTP response to a user request. In addition to standard security measures, our Java implementation of the SSPA, which is called the Dynamic Security Surveillance Agent (DSSA), provides further security in terms of content integrity to Web-based systems. Its function is to prevent the display of Web contents that have been altered through the malicious acts of attackers and intruders on client machines. This is to protect the reputation of organisations from cyber-attacks and to ensure the safe operation of Web systems by dynamically monitoring the integrity of a Web site's content on demand. We discuss our findings in terms of the applicability and practicality of the proposed system. We also discuss its time metrics, specifically in relation to its computational overhead at the Web server, as well as the overall latency from the clients' point of view, using different Internet access methods. The SSPA, our DSSA implementation, some experimental results and related work are all discussed