415 resultados para Australian home loan market
Pregnancy Discrimination in Queensland: Internal Labour Market Issues and Progress to Formal Redress
Resumo:
"Globalisation‟ and the "global knowledge economy‟ have become some of the most common "buzzwords‟ in Australian business, economic, and social sectors in the past decade. Further, knowledge service exports are a growing sector for Australia that utilise complex technical and creative capacities, increasingly rely on virtual work innovations, require new socio-technical systems to establish and maintain effective client relationships in global contexts; and – along with other innovations in the electronic age – may require novel coping abilities on the part of both managers and their employees to achieve desired outcomes (Bandura, 2002). Accordingly, this paper overviews such trends. The paper also includes a research agenda which is a "work-in-progress‟ with a major global company, Shell (Australia); it highlights both the objectives and proposed methodology of the study; it also outlines anticipated key benefits arising from the research.
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.