473 resultados para Personal Security.
Resumo:
This paper provides a detailed description of the current Australian e-passport implementation and makes a formal verification using model checking tools CASPER/CSP/FDR. We highlight security issues present in the current e-passport implementation and identify new threats when an e-passport system is integrated with an automated processing systems like SmartGate. Because the current e-passport specification does not provide adequate security goals, to perform a rational security analysis we identify and describe a set of security goals for evaluation of e-passport protocols. Our analysis confirms existing security issues that were previously informally identified and presents weaknesses that exists in the current e-passport implementation.
Resumo:
In many cities around the world, surveillance by a pervasive net of CCTV cameras is a common phenomenon in an attempt to uphold safety and security across the urban environment. Video footage is being recorded and stored, sometimes live feeds are being watched in control rooms hidden from public access and view. In this study, we were inspired by Steve Mann’s original work on sousveillance (surveillance from below) to examine how a network of camera equipped urban screens could allow the residents of Oulu in Finland to collaborate on the safekeeping of their city. An agile, rapid prototyping process led to the design, implementation and ‘in the wild’ deployment of the UbiOpticon screen application. Live video streams captured by web cams integrated at the top of 12 distributed urban screens were broadcast and displayed in a matrix arrangement on all screens. The matrix also included live video streams of two roaming mobile phone cameras. In our field study we explored the reactions of passers-by and users of this screen application that seeks to inverse Bentham’s original panopticon by allowing the watched to be watchers at the same time. In addition to the original goal of participatory sousveillance, the system’s live video feature sparked fun and novel user-led apprlopriations.
Resumo:
The final report for the ARC project "Airports of the Future". It contains the findings and recommendations provided by the various teams to the industry partners.
Resumo:
The shared nature of genetic information presents new challenges for legal understandings of the self. Within traditional legal discourses the individual is conceptualised as separate and autonomous. In contrast, the genetic individual is understood as inherently relational. This paper analyses the transformation of our understandings of the personal. The transformative processes are assessed through discussion of the changing meanings of privacy in the context of genetic information within families; changing views over access to information about biological parentage by children conceived through assisted reproductive technology; preimplantation genetic diagnosis and the changing context of reproductive decisionmaking.
Resumo:
The concept of dispositional resistance to change has been introduced in a series of exploratory and confirmatory analyses through which the validity of the Resistance to Change (RTC) Scale has been established (S. Oreg, 2003). However, the vast majority of participants with whom the scale was validated were from the United States. The purpose of the present work was to examine the meaningfulness of the construct and the validity of the scale across nations. Measurement equivalence analyses of data from 17 countries, representing 13 languages and 4 continents, confirmed the cross-national validity of the scale. Equivalent patterns of relationships between personal values and RTC across samples extend the nomological net of the construct and provide further evidence that dispositional resistance to change holds equivalent meanings across nations.
Resumo:
The decision of Atkinson J in Watkins v State of Queensland [2007] QSC 057 on an application for disclosure of documents under s27 of the Personal Injuries Proceedings Act 2002 (Qld) required determination of a range of issues relating to the disclosure of documents and legal professional privilege.
Resumo:
In Huag v Jupiters Limited [2007] QSC 068, Lyons J considered the extent of the obligations imposed upon a respondent under the Personal Injuries Proceedings Act 2002 to disclose documents and information.
Resumo:
In Huag v Jupiters Limited [2007] QCA 199 the Queensland Court of Appeal allowed an appeal from interlocutory orders made in the trial division of the court and concluded that, although provisions such as s27 of the Personal Injuries Proceedings Act 2002 (Qld) should be given a broad, remedial construction, this did not mean the words of limitation in the section could be ignored.
Resumo:
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient
Resumo:
This paper investigates the outsourcing of income tax return preparation by Australian accounting firms. It identifies the extent to which firms are currently outsourcing accounting services or considering outsourcing accounting services, with a focus on personal and business income tax return preparation. The motivations and barriers for outsourcing by Australian accounting firms are also considered in this paper. Privacy, security of client data, and the competence of the outsourcing provider's staff have been identified as risks associated with outsourcing. An expectation relating to confidentiality of client data is also examined in this paper. Statistical analysis of data collected from a random sample of Australian accounting firms using a survey questionnaire provided the empirical data for the paper. The results indicate that the majority of Australian accounting firms are either currently outsourcing or considering outsourcing accounting services, and firms are outsourcing taxation preparation both onshore and offshore. The results also indicate that firms expect the volume of outsourced work to increase in the future. In contrast to the literature identifying labour arbitrage as the primary driver for organisations choosing to outsource, this study found that the main factors considered by accounting firms in the decision to outsource were to expedite delivery of services to clients and to enable the firm to focus on core competencies. Data from this study also supports the literature which ndicates that not all tax practitioners are adhering to codes of conduct in relation to client confidentiality. Research identifying the extent to which accounting services are outsourced is limited, therefore significant contributions to the academic literature and the accounting profession are provided by this ndicates that not all tax practitioners are adhering to codes of conduct in relation to client confidentiality. Research identifying the extent to which accounting services are outsourced is limited, therefore significant contributions to the academic literature and the accounting profession are provided by this study.
Resumo:
Over the last three decades, a growing body of research related to epistemic beliefs has been identified as a crucial for understanding teaching and learning (Yadav, Herron, & Samarapungavan, 2011). In particular, research related to beliefs about teaching, learning and knowledge has been considered important for understanding why teachers engage in certain approaches to pedagogy, curriculum and assessment in classrooms (Stromlo & Bråten, 2011). The beliefs held by teachers about knowledge and knowing, otherwise known as personal epistemology (Hofer, 2010), have been shown to influence other knowledge and beliefs (Schommer-Aikens, 2004). Five and Buehl (2012) indicated that because an individual’s understanding of reality is always seen through the lens of existing beliefs, the role of beliefs as a filter is particularly relevant in the context of teacher education. That is, if beliefs influence how individuals interpret new information and experiences, preservice and practicing teachers’ beliefs shape what and how they learn about teaching.” (p. 470-480). It is likely that such beliefs have an important relationship with teacher knowledge and practices...
Resumo:
INTRODUCTION Globally, one-third of food production is lost annually due to negligent authorities. India alone loses some 21 million tonnes of wheat per year even while it has 200 million food-insecure people in the nation. Disturbingly provocative as it may sound, it is amazing how national and international institutions and governments make use of human hunger for their own survival (Raghib 2013). The global food system is increasingly insecure. Challenges to long-term global food security are encapsulated by resource scarcity, environmental degradation, biodiversity loss, climate change, reductions of farm labour and a growing world population. These issues are caused and aggravated by the spread of corporatised and monopolised food systems, dietary change, and urbanisation. These factors have rapidly brought food insecurity under the umbrella of unconventional security threats (Heukelom 2011). For some, humanitarian crises associated with food insecurity, or what has been dubbed ‘the silent tsunami’, is a pending peril, notably for the world’s poorest and most vulnerable people. For others, the food production industry is an emerging market with unprecedented profits. Despite this problem of food scarcity we are witnessing extraordinary ‘food wastage’, notably in North America and Europe, on a scale that would reportedly be capable of feeding the world’s hungry six times over (Stuart 2012). As the opening quotation to this chapter suggests, governments and corporations are deeply involved in the contexts, politics, and resources associated with food related issues. As many economically developed and advanced industrial nations are reporting a rise out of recession, announcements are made by the world’s richest countries that they are to cut $US2 billion per year from food aid. The head of the World Food Aid Programme, Rosette Sheeran, warns that such cuts could result in ‘the loss of a generation’ (Walters 2011). The global food crisis has also reinvigorated debates about agricultural development and genetically modified (GM) food; as well as fuelling debates about poverty, debt and security. This chapter provides a discussion of the political economy of global food debates and explores the threats and opportunities surrounding food production and future food security.
Resumo:
In Lamb v State of Queensland [2003] QDC 003 McGill DCJ considered an application under s43 of the Personal Injuries Proceedings Act 2002. That provision permits the court to give a claimant leave to start a proceeding notwithstanding non-compliance with part 1 of chapter two of the Act, "if the court is satisfied there is an urgent need to start the proceeding."
Resumo:
In Hooper v Robinson [2002] QDC 080 (District Court of Queensland, D 4841 of 2001, McGill DCJ, 19.4.2002) McGill DCJ considered the application of the decision in John Pfeiffer Pty Ltd v Rogerson [2000] 203 CLR 503 to notice requirements such as in s42 of NSW Motor Accident Insurance Act 1988 and concluded such provisions are now substantive.
Resumo:
In Amos v Brisbane City Council [2005] QCA 433 the Queensland Court of Appeal was called upon to determine the scope of s56 of the Personal Injuries Proceedings Act 2002. The decision makes it clear that the section does not provide a complete code governing awards of damages and does not deprive the court of power to award costs against a plaintiff who fails to succeed on liability.