433 resultados para Internet Security
Resumo:
This paper addresses the gap in economic theory underlying the multidimensional concept of food security and observed data by deriving a composite food security index using the latent class model. The link between poverty and food security is then examined using the new food security index and the robustness of the link is compared with two unidimensional measures often used in the literature. Using Vietnam as a case study, it was found that a weak link exists for the rural but not for the urban composite food security index. The unidimensional measures on the other hand show a strong link in both the rural and urban regions. The results on the link are also different and mixed when two poverty types given by persistent and transient poverty are considered. These findings have important policy implications for a targeted approach to addressing food security.
Resumo:
This paper examines the dispute between the Seattle company Virtual Countries Inc. and the Republic of South Africa over the ownership of the domain name address southafrica.com. The first part of the paper deals with the pre-emptive litigation taken by Virtual Countries Inc. in a District Court of the United States. The second part considers the possible arbitration of the dispute under the Uniform Domain Name Dispute Resolution Process of the Internet Corporation for Assigned Names and Numbers (ICANN) and examines the wider implications of this dispute for the jurisdiction and the governance of ICANN. The final section of the paper evaluates the Final Report of the Second WIPO Internet Domain Name Process.
Resumo:
In his 1987 book, The Media Lab: Inventing the Future at MIT, Stewart Brand provides an insight into the visions of the future of the media in the 1970s and 1980s. 1 He notes that Nicolas Negroponte made a compelling case for the foundation of a media laboratory at MIT with diagrams detailing the convergence of three sectors of the media—the broadcast and motion picture industry; the print and publishing industry; and the computer industry. Stewart Brand commented: ‘If Negroponte was right and communications technologies really are converging, you would look for signs that technological homogenisation was dissolving old boundaries out of existence, and you would expect an explosion of new media where those boundaries used to be’. Two decades later, technology developers, media analysts and lawyers have become excited about the latest phase of media convergence. In 2006, the faddish Time Magazine heralded the arrival of various Web 2.0 social networking services: You can learn more about how Americans live just by looking at the backgrounds of YouTube videos—those rumpled bedrooms and toy‐strewn basement rec rooms—than you could from 1,000 hours of network television. And we didn’t just watch, we also worked. Like crazy. We made Facebook profiles and Second Life avatars and reviewed books at Amazon and recorded podcasts. We blogged about our candidates losing and wrote songs about getting dumped. We camcordered bombing runs and built open‐source software. America loves its solitary geniuses—its Einsteins, its Edisons, its Jobses—but those lonely dreamers may have to learn to play with others. Car companies are running open design contests. Reuters is carrying blog postings alongside its regular news feed. Microsoft is working overtime to fend off user‐created Linux. We’re looking at an explosion of productivity and innovation, and it’s just getting started, as millions of minds that would otherwise have drowned in obscurity get backhauled into the global intellectual economy. The magazine announced that Time’s Person of the Year was ‘You’, the everyman and everywoman consumer ‘for seizing the reins of the global media, for founding and framing the new digital democracy, for working for nothing and beating the pros at their own game’. This review essay considers three recent books, which have explored the legal dimensions of new media. In contrast to the unbridled exuberance of Time Magazine, this series of legal works displays an anxious trepidation about the legal ramifications associated with the rise of social networking services. In his tour de force, The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, Daniel Solove considers the implications of social networking services, such as Facebook and YouTube, for the legal protection of reputation under privacy law and defamation law. Andrew Kenyon’s edited collection, TV Futures: Digital Television Policy in Australia, explores the intersection between media law and copyright law in the regulation of digital television and Internet videos. In The Future of the Internet and How to Stop It, Jonathan Zittrain explores the impact of ‘generative’ technologies and ‘tethered applications’—considering everything from the Apple Mac and the iPhone to the One Laptop per Child programme.
Resumo:
What role does Australia play in debates over the regulation and governance of the Internet? Is it a hub? A node in the information grid? Or is it a mere cul–de–sac? Or are we mere road–kill, bush junk, on the information autobahn?
Resumo:
Earlier this week, the New York Police Department in partnership with Homeland Security arrested seven people and seized a number of documents pertaining to the website Rentboy.com. Although the website purports to help men connect for companionship only, authorities allege that it has been used to “facilitate the promotion, management, establishment, and carrying on of an unlawful activity, namely an enterprise involving prostitution”. Unlike Australia, which started the decriminalisation of sex work as early as 1979, sex work is illegal across all of the USA, save a few counties in Nevada where it is subject to heavy regulation. The raid on Rentboy.com raises important questions about sex work, including its visibility, consumer demand for such services, and the ongoing marginalisation of those who buy and sell sexual services...
Resumo:
The Trans-Pacific Partnership (TPP) is a highly secretive trade agreement being negotiated between the US and eleven Pacific Rim countries, including Australia. Having obtained a fast-track authority from the United States Congress, US President Barack Obama is keen to finalise the deal. However, he was unable to achieve a resolution of the deal at recent talks in Hawaii on the TPP. A number of chapters of the TPP will affect the creative artists, cultural industries and internet freedom — including the intellectual property chapter, the investment chapter, and the electronic commerce chapter. Legacy copyright industries have pushed for longer and stronger copyright protection throughout the Pacific Rim. In the wake of the Hawaii talks, Knowledge Ecology International leaked the latest version of the intellectual property chapter of the TPP. Jamie Love of Knowledge Ecology International commented upon the leaked text about copyright law: ‘In many sections of the text, the TPP would change global norms, restrict access to knowledge, create significant financial risks for persons using and sharing information, and, in some cases, impose new costs on persons producing new knowledge goods.’ The recent leaked text reveals a philosophical debate about the nature of intellectual property law. There are mixed messages in respect of the treatment of the public domain under copyright law. In one part of the agreement on internet service providers, there is text that says that the parties recognise the need for ‘promoting innovation and creativity,’ ‘facilitating the diffusion of information, knowledge, technology, culture, and the arts’, and ‘foster competition and open and efficient markets.’ A number of countries suggested ‘acknowledging the importance of the public domain.’ The United States and Japan opposed the recognition of the public domain in this text.
Resumo:
An exploratory qualitative study was conducted to examine the perceptions and attitudes of both school counsellors and students to online counselling. Focus groups were conducted with two groups of school counsellors and six groups of secondary students. It was found that counsellors were hesitant to use online counselling because they were not convinced that it was effective and without the necessary online skills, they were concerned they would not be competent to deal with potential litigious and security pitfalls. Students were generally positive about the opportunity to access the school counsellor online. Implications for practice and future research are discussed.
Resumo:
This submission covers the following terms of reference: • the current levels of financial literacy of seniors and how that can be improved, for example by education programs; • what support and advice is available to assist seniors with their independent financial decision-making; • online and internet based vulnerabilities and the prevalence and vulnerability of seniors to scams; • agencies and organisations that provide advice and support to seniors requiring financial protection; and • the role of the financial sector in ensuring adequate safeguards for seniors in relation to financial decision-making.
Resumo:
Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to the adoption of IT services in the cloud. This study set up a cloud system via VMware suite to emulate hosting unified communications (UC), the integration of two or more real time communication systems, services in the cloud in a laboratory environment. An Internet Protocol Security (IPSec) gateway was also set up to support network-level security for UCaaS against possible security exposures. This study was aimed at analysis of an implementation of UCaaS over IPSec and evaluation of the latency of encrypted UC traffic while protecting that traffic. Our test results show no latency while IPSec is implemented with a G.711 audio codec. However, the performance of the G.722 audio codec with an IPSec implementation affects the overall performance of the UC server. These results give technical advice and guidance to those involved in security controls in UC security on premises as well as in the cloud.
Resumo:
Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.
Resumo:
Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
The concept of food security is often anchored in popular understandings of the challenge to produce and supply enough food. However, decades of policies for intensive agriculture have not alleviated hunger and malnutrition, with an absence of food security featuring in both economically developing and developed nations. Despite perceptions that the economic growth in advanced, capitalist societies will ensure freedom from hunger, this is not universal across so-called ‘wealthy nations’. To explore the dynamics of food security in economically developed countries, this paper considers institutional approaches to domestic food security primarily through responses to poverty and welfare entitlements, and, secondarily, through food relief. Through the lens of social entitlements to food and their formation under various expressions of welfare capitalism, we highlight how the specific institutional settings of two economically developed nations, Australia and Norway, respond to uncertain or insufficient access to food. Whilst Norway's political agenda on agricultural support, food pricing regulation and universal social security support offers a robust, although indirect, safety net in ensuring entitlements to food, Australia's neoliberal trajectory means that approaches to food security are ad hoc and rely on a combination of self-help, charitable and market responses. Despite its extensive food production Australia appears less capable of ensuring food security for all its inhabitants compared to the highly import-dependent Norway.
Resumo:
Background Many Internet-based treatments for depression and for alcohol misuse have a positive impact, yet little is known about how these treatments work. Most research on web-based interventions involves efficacy trials which, while important, offer little explanation about how people perceive and use online programs. Objective This study aimed to undertake a qualitative exploration of participants' experience, perceived impact and use of an integrated web-based program for comorbid depression and alcohol misuse. Specifically, it explored users' perspectives on the intensity of their treatment and the level of support they received. Methods Interviewees were drawn from participants in a randomised controlled trial of the OnTrack web-based treatment for depression and alcohol misuse, which compared Brief Self-Guided, Comprehensive Self-Guided and Comprehensive Therapist-Assisted versions of the program. Twenty-nine people (9–11 from each condition) completed semi-structured telephone interviews asking about their impressions and experiences with the program. Interview transcriptions were subject to a 6-step thematic analysis, employing a conceptual matrix to identify thematic differences across groups. Results Positive experiences and outcomes were more pronounced among participants receiving the comprehensive treatments than the brief one, but other responses were relatively consistent across conditions. A major theme was a wish for more individualisation and human contact, even in participants receiving emailed assistance. Some confused follow-up research assessments with therapist support. There was little correspondence between the perceived impact of the program and the amount reportedly completed, and some participants said they used strategies offline or completed exercises mentally. Conclusions This study highlighted discrepancies between how web-based treatments are intended to be used and how people actually engage with them. A challenge for the next wave of these interventions is the provision of individualised responses and coaching that retains an emphasis on self-management and constrains cost.