473 resultados para Personal Security.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Urban agriculture refers to the production of food in urban and peri-urban spaces. It can contribute positively to health and food security of a city, while also reducing ‘food miles.’ It takes on many forms, from the large and organised community garden, to the small and discrete backyard or balcony. This study focuses on small-scale food production in the form of residential gardening for home or personal use. We explore opportunities to support people’s engagement in urban agriculture via human-computer interaction design. This research presents the findings and HCI design insights from our study of residential gardeners in Brisbane, Australia. By exploring their understanding of gardening practice with a human-centred design approach, we present six key themes, highlighting opportunities and challenges relating to available time and space; the process of learning and experimentation; and the role of existing online platforms to support gardening practice. Finally we discuss the overarching theme of shared knowledge, and how HCI could improve community engagement and gardening practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Experimental studies have found that when the state-of-the-art probabilistic linear discriminant analysis (PLDA) speaker verification systems are trained using out-domain data, it significantly affects speaker verification performance due to the mismatch between development data and evaluation data. To overcome this problem we propose a novel unsupervised inter dataset variability (IDV) compensation approach to compensate the dataset mismatch. IDV-compensated PLDA system achieves over 10% relative improvement in EER values over out-domain PLDA system by effectively compensating the mismatch between in-domain and out-domain data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis considers whether the Australian Privacy Commissioner's use of its powers supports compliance with the requirement to 'take reasonable steps' to protect personal information in National Privacy Principle 4 of the Privacy Act 1988 (Cth). Two unique lenses were used. First, the Commissioner's use of powers was assessed against the principles of transparency, balance and vigorousness and secondly against alignment with an industry practice approach to securing information. Following a comprehensive review of publicly available materials, interviews and investigation file records, this thesis found that the Commissioner's use of his powers has not been transparent, balanced or vigorous, nor has it been supportive of an industry practice approach to securing data. Accordingly, it concludes that the Privacy Commissioner's use of its regulatory powers is unlikely to result in any significant improvement to the security of personal information held by organisations in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Telephone and web-based technologies such as SMS, smartphone apps, gamification, online/mobile games, online quizzes and tools can be used in personal health interventions in two ways: health promotion or social marketing. In response to the Queensland government's call for submissions to the parliamentary inquiry, a social marketing and design submission from four of the faculties at Queensland University of Technology was submitted. There appears to be a great deal of confusion in government circles about the terms ‘social marketing’ and ‘health promotion’ and often they are used interchangeably when they are actually significantly different approaches. Social marketing is the science and practice of behaviour change and involves goods and services that offer a value proposition, and which incentivises citizens to change their behaviour voluntarily. However, social marketing is often mistakenly used to describe advertising and communication or social media marketing. This submission contains an overview of how technology interventions need to be implemented to be successful, provides examples of the evidence that telephone and web-based interventions can effectively influence public health outcome. This submission poses seven critical factors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is an ongoing debate in relation to Part 3-5 of the ACL, particularly over its use in relation to other civil liability remedies. This article looks more closely at ss 138 and 139. It argues that, because of a possible design flaw in the statutory construction of s 138, it can be interpreted much more broadly than it has been to date. Also, the paper discusses the effect on an interpretation of s 139 ACL of both the High Court’s decision in Marks v GIO Australia Holdings Ltd, and a small but significant amendment to s 139 when the ACL was enacted. It argues that s 139 can now be interpreted broadly to include claims not just for loss of financial support or services but for all loss or damage or injury caused.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this paper is to determine the suitability of solely stationary measurements for exposure assessment and management applications. For this purpose, quantified inhaled particle surface area (IPSA) doses using both stationary and personal particle exposure monitors were evaluated and compared.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study questions how the categories of security, education and literacy were brought together as related elements of a whole-of-government strategy in the production of civil society. Drawing on an analysis of key political texts, the study argues that the categories of education and literacy have been used in diverse ways in the production of national, social, economic and geopolitical security interests. As dialogue about security has intensified, rationalisations about the national interest have engaged notions of security leading to the legitimation of a diverse set of policy instruments, strategically used to contain the rise of complex social forces and protect homogenous cultural values.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Integrated reporting () holds significant promise as a new reporting paradigm that is holistic, strategic, responsive, material, and relevant across multiple time frames. However, its uptake in Australia is being hampered by directors’ concerns about personal liability exposure, particularly for forward-looking statements that subsequently prove to be unfounded. This article seeks to illuminate the bases for these liability concerns by outlining the similarities between and the operating and financial review requirements under the Corporations Act 2001 (Cth), and the relevant grounds for liability for misleading and deceptive disclosures, and breach of directors’ duties. In light of this discussion, this article proposes four possible reform options, ranging from minor adaptations to the Framework to far-reaching reforms of the Corporations Act. As assurance is desirable to ensure that reliance can be placed on integrated reports, the development of a legal safe harbour for auditors of forward-looking information is also canvassed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study draws on an eclectic range of influences. The early research was guided by the traditions of Personal Construct Theory. The study was later extended by drawing on theoretical tenets of social constructionism and the notion of the Saturated Self and Anthony Gidden's work on structuration and his later work on self identity. This has provided a new way of investigating how becoming a PE teacher through constructed knowledge established a professional identity. The data suggest that during the process of constructing professional knowledge, the students forge their identities by establishing 'position' and 'role'. In doing so, the participants in this study experienced a series of dilemmas of professional self. These dilemmas are a product of what Giddens calls high modernity and what Gergen refers to as postmodernity. It seems that to become a PE teacher, the dilemmas must be worked through until a position of ontological security has been achieved. For some this was profoundly difficult. In spite of this, the methods of study allowed the participants to begin to articulate their theories and visions of teaching physical education, and the therapeutic qualities of Kelly's theory encouraged many of the students to 'see it differently' (Rossi, 1997) and to begin to develop a rationale for professional work in physical education based on socially just practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As a relatively new piece of legislation, the Personal Property Securities Act 2009 (Cth) (PPSA) is yet to be the subject of much significant judicial consideration. Whilst the position of the Australian courts is becoming clearer in relation to domestic disputes, parties to cross-border transactions continue to encounter an alarming number of uncertainties with respect to the enforcement and maintenance of their security interests. This article considers the relevant problematic provisions of the PPSA and considers them in light of the authorities dealing with corresponding legislation in other jurisdictions. It then attempts to provide some guidance and suggestions as to the best means of protecting security interests in cross-border transactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"It could easily provide the back-drop for a James Bond movie. Deep inside a mountain near the North Pole, down a fortified tunnel, and behind airlocked doors in a vault frozen to -18 degrees Celsius, scientists are squirreling away millions of seed samples. The samples constitute the very foundation of agriculture, the biological diversity needed so the world's major food crops can adapt to the next pest or disease, or to climate change. It's little wonder that the Svalbard Global Seed Vault has captured the public's imagination more than almost any agricultural topic in recent years. Popular press reports about the ‘Doomsday Vault,’ however, typically mask the complexity of the endeavor and, if anything, underestimate its practical utility." Cary Fowler This chapter considers the use of seed banks to address concerns about intellectual property, climate change and food security. It has a number of themes. First of all, it is interested in the use of ‘Big Science’ projects to address pressing global scientific concerns and Millennium Development Goals. Second, it highlights the increasing use of banks as a means of managing both property and intellectual property across a wide range of fields of agriculture and biotechnology. Third, it considers the linkage of intellectual property, access to genetic resources and benefit sharing. There are a variety of positions in this debate. Some see requirements in respect of access to genetic resources and benefit sharing as an inconvenient burden for science and commerce. Others defend access to genetic resources and benefit sharing as meaningful and productive. Those inclined to somewhat more conspiratorial views suggest that access to genetic resources and benefit sharing are a ruse to facilitate biopiracy. This chapter has a number of components. Section I focuses upon the Consultative Group on International Agricultural Research (CGIAR) network – often raised as a model for Climate Innovation Centres. Section II considers the Svalbard Global Seed Vault – the so-called Doomsday Vault. After a consideration of the World Summit on Food Security in 2009, it is concluded in this chapter that any future international agreement on climate change needs to address intellectual property, plant genetic resources and food security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In light of larger public policy debates over intellectual property and climate change, this article considers patent practice, law, and policy in respect of biofuels. This debate has significant implications for public policy discussions in respect of energy independence, food security, and climate change. The first section of the paper provides a network analysis of patents in respect of biofuels across the three generations. It provides empirical research in respect of patent subject matter, ownership, and strategy in respect of biofuels. The second section provides a case study of significant patent litigation over biofuels. There is an examination of the biofuels patent litigation between the Danish company Novozymes, and Danisco and DuPont. The third section examines flexibilities in respect of patent law and clean technologies in the context of the case study of biofuels. In particular, it explores the debate over substantive doctrinal matters in respect of biofuels – such as patentable subject matter, technology transfer, patent pools, compulsory licensing, and disclosure requirements. The conclusion explores the relevance of the debate over patent law and biofuels to the larger public policy discussions over energy independence, food security, and climate change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The evolution of technological systems is hindered by systemic components, referred to as reverse salients, which fail to deliver the necessary level of technological performance thereby inhibiting the performance delivery of the system as a whole. This paper develops a performance gap measure of reverse salience and applies this measurement in the study of the PC (personal computer) technological system, focusing on the evolutions of firstly the CPU (central processing unit) and PC game sub-systems, and secondly the GPU (graphics processing unit) and PC game sub-systems. The measurement of the temporal behavior of reverse salience indicates that the PC game sub-system is the reverse salient, continuously trailing behind the technological performance of the CPU and GPU sub-systems from 1996 through 2006. The technological performance of the PC game sub-system as a reverse salient trails that of the CPU sub-system by up to 2300 MHz with a gradually decreasing performance disparity in recent years. In contrast, the dynamics of the PC game sub-system as a reverse salient trails the GPU sub-system with an ever increasing performance gap throughout the timeframe of analysis. In addition, we further discuss the research and managerial implications of our findings.