226 resultados para Refugee Protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In his report into corruption in Queensland, Fitzgerald listed whistleblower protection as a necessary part of a strong governance regime. "What is required is an accessible, independent body to which disclosures can be made, confidentially (at least in the first instance) and in any event free from fear of reprisals." It was one of the reforms studied by the Electoral and Administrative Review Committee, the report of which resulted in the Whistleblowers Protection Act 1994 (WPA). The need for whistleblower protection was supported by all sides of Parliament. The Premier, Wayne Goss, in his Second Reading Speech on the Public Sector Ethics Bill , said that that Act and the WPA would form a package with the former outlining required behaviour and the WPA encouraging staff to report wrongdoing. The WPA was subsequently passed and has remained virtually unamended for over a decade. Such consistency is either an indication of skilled drafting and effectiveness or the fact that the Act has been neglected. It is the hypothesis of this paper that the latter is the case. This hypothesis will be tested by examining the sincerity and diligence with which the Act has been treated during, and following, its passage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explains the relevance of the Code and its place in the regulatory framework, discusses some of the key issues arising in the recent review (as identified by consumer advocates1), and explains the relationship between the Code and the Financial Ombudsman Service.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This issue of the Griffith Law Review focuses on consumer law, and the pervasive nature of this area of law. We are all consumers, but do not necessarily identify as such, nor are we a homogeneous group. The boundaries of

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The requirement for improved efficiency whilst maintaining system security necessitates the development of improved system analysis approaches and the development of advanced emergency control technologies. Load shedding is a type of emergency control that is designed to ensure system stability by curtailing system load to match generation supply. This paper presents a new adaptive load shedding scheme that provides emergency protection against excess frequency decline, whilst minimizing the risk of line overloading. The proposed load shedding scheme uses the local frequency rate information to adapt the load shedding behaviour to suit the size and location of the experienced disturbance. The proposed scheme is tested in simulation on a 3-region, 10-generator sample system and shows good performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Homework presents many challenges for refugees from Africa who are arriving in Australian schools with histories of little, no or severely interrupted schooling. This is evident in the emergence of school- and community-based homework help, clubs and tutoring programs for the students. The aim of this article is to describe the homework support options accessed by eight students from Burundi, Rwanda, Eritrea and Sudan who participated in a study of pedagogy for middle school-aged African refugees, and the views on homework of their parents and teachers. The article shows some tensions between family and school expectations and the dilemmas that arise for teachers in a broader context of public concern about and official policy statement on excessive and repetitive homework. It is argued that application of policy guidelines needs to account for disadvantages that potentially accrue to students who cannot design their own independent study programs. Further, it is suggested that integration of skills and meaning-based pedagogy inherent in recent approaches to literacy education has potential for ensuring that students receive the forms of homework they require.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research reported in this paper investigated the engagement of students who arrived in Australian secondary schools as refugees from Africa. Enrolment of large cohorts of refugees from Africa is a relatively new phenomenon in the English-speaking West. The literature provides evidence that emotional engagement with the promises of schooling is strong for many of the young African refugees. Students envision successful professional careers as doctors, engineers, lawyers, and IT experts; they envision returning to their country as professionals able to help the people. The question investigated in this paper is: How does schooling in Australia impact on young African refugees’ education and career aspirations? Engagement is understood in Bourdieuian terms as dispositions to be and to become an educated person. This is a disposition which entails fundamental belief in the value of the stakes of schooling. The data analysed in the paper were produced in a study undertaken in the state of Queensland where 5000 of the 39 000 African refugees who have arrived in Australia since 2000 have settled. Semi-structured interviews were conducted with students and their parents and teachers after arrival in an intensive language school, and then after transition to a regular secondary school. The findings show both the durability and malleability of educational dispositions in conditions of dramatic social change occasioned by refugee experience. Engagement in the stakes of schooling is both built and eroded as students flee their homelands for countries of refuge. Previously unimaginable educational dreams are possible for some; but for others, long-held dreams become unattainable. The paper concludes with recommendations for better supporting young people through this re-shaping of self.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ascendency of neoliberal ideas in education and social policy in the 1980s and 1990s was succeeded in the new millennium by a ‘new’ social democratic commitment with emphases on community empowerment, building social capital and a ‘whole of government’ approach to partnering with civil society to meet community needs. In Australia this approach has resulted in the development of partnerships between schools and community organisations formed as part of a targeted, holistic approach to service delivery to meet the settlement and educational needs of refugee youth. Drawing on interviews conducted with community workers and government officers involved in the school-community partnerships, we document how these partnerships are working ‘on the ground’ in Queensland schools. We analyse our findings against the international literature on changing notions of neoliberal governance, and discuss the implications of the shift to the ‘partnering state’ for schools and community organisations working with refugee young people.