419 resultados para Labour issues state hierarchization
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
It has now been over a decade since the concept of creative industries was first put into the public domain through the Creative Industries Mapping Documents developed by the Blair Labour government in Britain. The concept has developed traction globally, but it has also been understood and developed in different ways in Europe, Asia, Australia, New Zealand and North America, as well as through international bodies such as UNCTAD and UNESCO. A review of the policy literature reveals that while questions and issues remain around definitional coherence, there is some degree of consensus emerging about the size, scope and significance of the sectors in question in both advanced and developing economies. At the same time, debate about the concept remains highly animated in media, communication and cultural studies, with its critics dismissing the concept outright as a harbinger of neo-liberal ideology in the cultural sphere. This paper couches such critiques in light of recent debates surrounding the intellectual coherence of the concept of neo-liberalism, arguing that this term itself possesses problems when taken outside of the Anglo-American context in which it originated. It is argued that issues surrounding the nature of participatory media culture, the relationship between cultural production and economic innovation, and the future role of public cultural institutions can be developed from within a creative industries framework, and that writing off such arguments as a priori ideological and flawed does little to advance debates about 21st century information and media culture.
Resumo:
It is proposed from this study that engaging productively with others to achieve change has never been more critical in educational environments, such as universities. Via semi-structured interviews with a cohort of senior leaders from one Australian university, this paper explores their perceptions of the key issues and challenges facing them in their work. The study found that the most significant challenges centred around the need for strategic leadership, flexibility, creativity and change-capability; responding to competing tensions and remaining relevant; maintaining academic quality; and managing fiscal and people resources. Sound interpersonal engagement, particularly in terms of change leadership capability, was found to be critical to meeting the key challenges identified by most participants. In light of the findings from the sample studied some tentative implications for leadership and leadership development in university environments are proposed, along with suggestions for further empirical exploration.
Resumo:
This study examines the relationships between job demands (in the form of role stressors and emotional management) and employee burnout amongst high contact service employees. Employees in customer facing roles are frequently required to manage overwhelming, conflicting or ambiguous demands, which they may feel ill-equipped to handle. Simultaneously, they must manage the emotions they display towards customers, suppressing some, and expressing others, be they genuine or contrived. If the in-role effort required of employees exceeds their inherent capacity to cope, burnout may result. Burnout, in turn, can have serious detrimental consequences for the psychological well being of employees. We find that both emotional management and role stressors impact burnout. We also confirm that burnout predicts psychological strain. In line with the Job Demands and Resources Model, we examine the mitigating impact of perceived support on these relationships but do not find a significant mitigating impact.
Resumo:
The creative industries concept was born in the UK, nurtured in Australia (among other countries), but is now being implemented most vigorously in China. The UK and Australia seem to be pulling back from the concept: • Critical response to CI policy in the UK; and post-GFC cutbacks limit scope for government action. • Australia relies on the resources boom; even though recent WIPO report puts Australian ‘copyright industries’ at over 10 percent of GDP (second only to the USA at 11%). Not surprisingly the USA remains happy with the term ‘copyright industries.’ This faltering policy environment in advanced countries may work to their own longer-term economic detriment. The creative industries’ transformative impact on the global economy may come instead from China.
Resumo:
Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegation is particularly useful in federated environments where multiple systems, with their own security autonomy, are connected under one common federation. Although many delegation schemes have been studied, current models do not seriously take into account the issue of delegation commitment of the involved parties. In order to address this issue, this paper introduces a new mechanism to help parties involved in the delegation process to express commitment constraints, perform the commitments and track the committed actions. This mechanism looks at two different aspects: pre-delegation commitment and post-delegation commitment. In pre-delegation commitment, this mechanism enables the involved parties to express the delegation constraints and address those constraints. The post-delegation commitment phase enables those parties to inform the delegator and service providers how the commitments are conducted. This mechanism utilises a modified SAML assertion structure to support the proposed delegation and constraint approach.
Resumo:
This article examines the social networking phenomenon that has been so readily embraced by school-age adolescents, in the context of its potential to contribute further to the mechanisms for and incidence of cyberbullying amongst school students. Cyberbullying in these online for a, as a misuse of technology to harass, intimidate, tease, threaten, abuse or otherwise terrorise peers, teachers and/or the school in general, is discussed from both the psychological perspective and in terms of its legal ramifications (both criminal and civil) in Australia. Some recommendations for proactive and preventative measures, education and policy adoptions are provided, together with general advice to parents, schools and adolescents on awareness of the risks involved and how young people might better protect themselves in light of that knowledge.
Resumo:
Project Procurement is a ‘great’ environment for ethical issues with its low-price state of mind and competition. It has many opportunities that could contribute to illegal activities or unethical behavior especially in the construction industry. In 2006 alone, 17.3% of 417 Malaysian government contract projects were considered sick due to the poor performance by the contractors. Therefore it is important to govern the project procurement, especially the plan procurement stage to ensure the accountability and transparency of the decision made in awarding the right contract to the best contractor. This is where project governance framework (PGF) is really needed in project procurement planning. Project governance is a subset of corporate governance focusing on the areas of corporate governance related to project activities, including: portfolio direction, project sponsorship, project and program management and efficiency and disclosure and reporting. This paper highlights the importance of implementing project governance framework (PGF) to ensure that the decision makers are answerable and accountable to the stakeholders, and the decision making is transparent to avoid any ethical issues arises. A comprehensive preliminary literature is carried out to discover the importance of executing PGF in project procurement in Malaysian public sector. By understanding the important of PGF, it is hoped that this will bring a signal to other developing countries to implement the similar method in ensuring the transparency of the decision making in project procurement planning in their countries.
Resumo:
This paper presents a systems-level approach for adjudicating the prioritization, selection, and planning of inservcie professional development (PD) for teachers. We present a step-by-step model for documenting and assessing system-wide 'bids' for professional development programs
Resumo:
Background: International data on child maltreatment are largely derived from child protection agencies, and predominantly report only substantiated cases of child maltreatment. This approach underestimates the incidence of maltreatment and makes inter-jurisdictional comparisons difficult. There has been a growing recognition of the importance of health professionals in identifying, documenting and reporting suspected child maltreatment. This study aimed to describe the issues around case identification using coded morbidity data, outline methods for selecting and grouping relevant codes, and illustrate patterns of maltreatment identified. Methods: A comprehensive review of the ICD-10-AM classification system was undertaken, including review of index terms, a free text search of tabular volumes, and a review of coding standards pertaining to child maltreatment coding. Identified codes were further categorised into maltreatment types including physical abuse, sexual abuse, emotional or psychological abuse, and neglect. Using these code groupings, one year of Australian hospitalisation data for children under 18 years of age was examined to quantify the proportion of patients identified and to explore the characteristics of cases assigned maltreatment-related codes. Results: Less than 0.5% of children hospitalised in Australia between 2005 and 2006 had a maltreatment code assigned, almost 4% of children with a principal diagnosis of a mental and behavioural disorder and over 1% of children with an injury or poisoning as the principal diagnosis had a maltreatment code assigned. The patterns of children assigned with definitive T74 codes varied by sex and age group. For males selected as having a maltreatment-related presentation, physical abuse was most commonly coded (62.6% of maltreatment cases) while for females selected as having a maltreatment-related presentation, sexual abuse was the most commonly assigned form of maltreatment (52.9% of maltreatment cases). Conclusion: This study has demonstrated that hospital data could provide valuable information for routine monitoring and surveillance of child maltreatment, even in the absence of population-based linked data sources. With national and international calls for a public health response to child maltreatment, better understanding of, investment in and utilisation of our core national routinely collected data sources will enhance the evidence-base needed to support an appropriate response to children at risk.
Resumo:
Research is indicating that individuals who present for DUI treatment may have competing substance abuse and mental health needs. This study aimed to examine the extent of such comorbidity issues among a sample of Texas DUI offenders. Method: Records of 36,372 DUI clients and 308,695 non-DUI clients admitted to Texas treatment programs between 2005 and 2008 were obtained from the State's administrative dataset. The data were analysed to identify the relationship between substance use, psychiatric problems, program completion and recidivism rates. Results: Analysis indicated that while non-DUI clients were more likely to present with more severe illicit substance use problems, DUI clients were more likely to have a primary problem with alcohol. Additionally, a cannabis use problem was also found to be significantly associated with DUI recidivism in the last year. In regards to mental health needs, a major finding was that depression was the most common psychiatric condition reported by DUI clients, including those with more than one DUI offence in the past year. This group were also more at risk of being diagnosed with Bipolar Disorder compared to the general population, and such a diagnosis was also associated with an increased likelihood of not completing treatment. Interestingly, female DUI and non-DUI clients were also more likely to be diagnosed with mental health problems compared to males, as well as more likely to be placed on medications at admission and have problems with methamphetamine, cocaine, and opiates. Conclusion: The findings highlight the complex competing needs of some DUI offenders who enter treatment. The results also suggest that there is a need to utilise mental health and substance abuse screening methods to ensure DUI offenders are directed towards appropriate treatment pathways as well as ensure that such interventions adequately cater for complex substance abuse and psychiatric needs.
Resumo:
Raman spectrum of burgessite, Co2(H2O)4[AsO3OH]2.H2O was studied, interpreted and compared with its infrared spectrum. The stretching and bending vibrations of (AsO3) and As-OH units together with the stretching, bending and libration modes of water molecules and hydroxyl ions were assigned. The range of O-H...O hydrogen bond lengths was inferred from the Raman and infrared spectra of burgessite. The presence of (AsO3OH)2- units in the crystal structure of burgessite was proved in agreement with its recently solved crystal structure. Raman and infrared spectra of erythrite inferred from the RRUFF database are used for comparison.
Resumo:
Teacher quality is recognised as a lynchpin for education reforms internationally, and both Federal and State governments in Australia have turned their attention to teacher education institutions: the starting point for preparing quality teachers. Changes to policy and shifts in expectations impact on Faculties of Education, despite the fact that little is known about what makes a quality teacher preparation program effective. New accountability measures, mandated Professional Standards, and proposals to test all graduates before registration, mean that teacher preparation programs need capacity for flexibility and responsiveness. The risk is that undergraduate degree programs can become ‘patchwork quilts’ with traces of the old and new stitched together, sometimes at the expense of coherence and integrity. This paper provides a roadmap used by one large Faculty of Education in Queensland for reforming and reconceptualising the curriculum for a 4-year undergraduate program, in response to new demands from government and the professional bodies.
Resumo:
Todoy's monogers-drowing on the expertise of their IT professiono/s-
Resumo:
Efficient state asset management is crucial for governments as they facilitate the fulfillment of their public functions, which include the provision of essential services and other public administration support. In recent times economies internationally and particularly in South east Asia, have displayed increased recognition of the importance of efficiencies across state asset management law, policies and practice. This has been exemplified by a surge in notable instances of reform in state asset management. A prominent theme in this phenomenon is the consideration of governance principles within the re-conceptualization of state asset management law and related policy, with many countries recognizing variability in the quality of asset governance and opportunities for profit as being critical factors. This issue is very current in Indonesia where a major reform process in this area has been confirmed by the establishment of a new Directorate of State Asset Management. The incumbent Director-General of State Asset Management has confirmed a re-emphasis on adherence to governance principles within applicable state asset management law and policy reform. This paper reviews aspects of the challenge of reviewing and reforming Indonesian practice within state asset management law and policy specifically related to public housing, public buildings, parklands, and vacant land. A critical issue in beginning this review is how Indonesia currently conceptualizes the notion of asset governance and how this meaning is embodied in recent changes in law and policy and importantly in options for future change. This paper discusses the potential complexities uniquely Indonesian characteristics such as decentralisation and regional autonomy regime, political history, and bureaucratic culture