44 resultados para H56 - National Security and War
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
Identifying railway capacity is an important task that can identify "in principal" whether the network can handle an intended traffic flow, and whether there is any free capacity left for additional train services. Capacity determination techniques can also be used to identify how best to improve an existing network, and at least cost. In this article an optimization approach has been applied to a case study of the Iran national railway, in order to identify its current capacity and to optimally expand it given a variety of technical conditions. This railway is very important in Iran and will be upgraded extensively in the coming years. Hence the conclusions in this article may help in that endeavor. A sensitivity analysis is recommended to evaluate a wider range of possible scenarios. Hence more useful lower and upper bounds can be provided for the performance of the system
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
This chapter analyses recent policy reforms in the national history curriculum in both Australia and the Russian Federation. It analyses those emphases in the national curriculum in history that depict new representations and historiography and the ways in which this is foregrounded in History school textbooks. In doing so, it considers the debates about what version of the nation’s past are deemed significant, and what should be transmitted to future generations of citizens. In this discussion of national history curricula, consideration is made of the curriculum’s officially defined status as an instrument in the process of ideological transformation, and nation-building. The chapter also examines how history textbooks are implicit in this process, in terms of reproducing and representing what content is selected and emphasised in a national history curriculum.
Resumo:
Overview The incidence of skin tears, pressure injuries and chronic wounds increases with age [1-4] and therefore is a serious issue for staff and residents in Residential Aged Care Facilities (RACFs). A pilot project funded in Round 2 of the Encouraging Best Practice in Residential Aged Care (EBPRAC) program by the then Australian Government Department of Health and Ageing found that a substantial proportion of residents in aged care facilities experienced pressure injuries, skin tears or chronic wounds. It also found the implementation of the evidence based Champions for Skin Integrity (CSI) model of wound care was successful in significantly decreasing the prevalence and severity of wounds in residents, improving staff skills and knowledge of evidence based wound management, increasing staff confidence with wound management, increasing implementation of evidence based wound management and prevention strategies, and increasing staff awareness of their roles in evidence based wound care at all levels [5]. Importantly, during the project, the project team developed a resource kit on evidence based wound management. Two critical recommendations resulting from the project were that: - The CSI model or a similar strategic approach should be implemented in RACFs to facilitate the uptake of evidence based wound management and prevention - The resource kit on evidence based wound management should be made available to all Residential Aged Care Facilities and interested parties A proposal to disseminate or rollout the CSI model of wound care to all RACFs across Australia was submitted to the department in 2012. The department approved funding from the Aged Care Services Improvement Healthy Ageing Grant (ACSIHAG) at the same time as the Round 3 of the Encouraging Better Practice in Aged Care (EBPAC) program. The dissemination involved two crucial elements: 1. The updating, refining and distribution of a Champions for Skin Integrity Resource Kit, more commonly known as a CSI Resource Kit and 2. The presentation of intensive one day Promoting Healthy Skin “Train the Trainer” workshops in all capital cities and major regional towns across Australia Due to demand, the department agreed to fund a second round of workshops focussing on regional centres and the completion date was extended to accommodate the workshops. Later, the department also decided to host a departmental website for a number of clinical domains, including wound management, so that staff from the residential aged care sector had easy access to a central repository of helpful clinical resource material that could be used for improving the health and wellbeing of their older adults, consumers and carers. CSI Resource Kit Upgrade and Distribution: At the start of the project, a full evidence review was carried out on the material produced during the EBPRAC-CSI Stage 1 project and the relevant evidence based changes were made to the documentation. At the same time participants in the EBPRAC-CSI Stage 1 project were interviewed for advice on how to improve the resource material. Following this the documentation, included in the kit, was sent to independent experts for peer review. When this process was finalised, a learning designer and QUT’s Visual Communications Services were engaged to completely refine and update the design of the resources, and combined resource kit with the goal of keeping the overall size of the kit suitable for bookshelf mounting and the cost at reasonable levels. Both goals were achieved in that the kit is about the same size as a 25 mm A4 binder and costs between $19.00 and $28.00 per kit depending on the size of the print run. The dissemination of the updated CSI resource kit was an outstanding success. Demand for the kits was so great that a second print run of 2,000 kits was arranged on top of the initial print run of 4,000 kits. All RACFs across Australia were issued with a kit, some 2,740 in total. Since the initial distribution another 1,100 requests for kits has been fulfilled as well as 1,619 kits being distributed to participants at the Promoting Healthy Skin workshops. As the project was winding up a final request email was sent to all workshop participants asking if they required additional kits or resources to distribute the remaining kits and resources. This has resulted in requests for 200 additional kits and resources. Feedback from the residential aged care sector and other clinical providers who have interest in wound care has been very positive regarding the utility of the kit, (see Appendix 4). Promoting Healthy Skin Workshops The workshops also exceeded the project team’s initial objective. Our goal of providing workshop training for staff from one in four facilities and 450 participants was exceeded, with overwhelming demand for workshop places resulting in the need to provide a second round of workshops across Australia. At the completion of the second round, 37 workshops had been given, with 1286 participants, representing 835 facilities. A number of strategies were used to promote the workshops ranging from invitations included in the kit, to postcard mail-outs, broadcast emailing to all facilities and aged care networks and to articles and paid advertising in aged care journals. The most effective method, by far, was directly phoning the facilities. This enabled the caller to contact the relevant staff member and enlist their support for the workshop. As this is a labour intensive exercise, it was only used where numbers needed bolstering, with one venue rising from 3 registrants before the calls to 53 registrants after. The workshops were aimed at staff who had the interest and the capability of implementing evidence-based wound management within their facility or organisation. This targeting was successful in that a large proportion (68%) of participants were Registered Nurses, Nurse Managers, Educators or Consultants. Twenty percent were Endorsed Enrolled Nurses with the remaining 12% being made up of Personal Care Workers or Allied Health Professionals. To facilitate long term sustainability, the workshop employed train-the-trainer strategies. Feedback from the EBPRAC-CSI Stage 1 interviews was used in the development of workshop content. In addition, feedback from the workshop conducted at the end of the EBPRAC-CSI Stage 1 project suggested that change management and leadership training should be included in the workshops. The program was trialled in the first workshop conducted in Brisbane and then rolled out across Australia. Participants were asked to complete pre and post workshop surveys at the beginning and end of the workshop to determine how knowledge and confidence improved over the day. Results from the pre and post surveys showed significant improvements in the level of confidence in attendees’ ability to implement evidence based wound management. The results also indicated a significant increase in the level of confidence in ability to implement change within their facility or organisation. This is an important indication that the inclusion of change management/leadership training with clinical instruction can increase staff capacity and confidence in translating evidence into practice. To encourage the transfer of the evidence based content of the workshop into practice, participants were asked to prepare an Action Plan to be followed by a simple one page progress report three months after the workshop. These reports ranged from simple (e.g. skin moisturising to prevent skin tears), to complex implementation plans for introducing the CSI model across the whole organisation. Outcomes described in the project reports included decreased prevalence of skin tears, pressure injuries and chronic wounds, along with increased staff and resident knowledge and resident comfort. As stated above, some organisations prepared large, complex plans to roll out the CSI model across their organisation. These plans included a review of the organisation’s wound care system, policies and procedures, the creation of new processes, the education of staff and clients, uploading education and resource material onto internal electronic platforms and setting up formal review and evaluation processes. The CSI Resources have been enthusiastically sought and incorporated into multiple health care settings, including aged care, acute care, Medicare Local intranets (e.g. Map of Medicine e-pathways), primary health care, community and home care organisations, education providers and New Zealand aged and community health providers. Recommendations: Recommendations for RACFs, aged care and health service providers and government Skin integrity and the evidence-practice gap in this area should be recognised as a major health issue for health service providers for older adults, with wounds experienced by up to 50% of residents in aged care settings (Edwards et al. 2010). Implementation of evidence based wound care through the Champions for Skin Integrity model in this and the pilot project has demonstrated the prevalence of wounds, wound healing times and wound infections can be halved. A national program and Centre for Evidence Based Wound Management should be established to: - expand the reach of the model to other aged care facilities and health service providers for older adults - sustain the uptake of models such as the Champions for Skin Integrity (CSI) model - ensure current resources, expertise and training are available for consumers and health care professionals to promote skin integrity for all older adults Evidence based resources for the CSI program and similar projects should be reviewed and updated every 3 – 4 years as per NH&MRC recommendations Leadership and change management training is fundamental to increasing staff capacity, at all levels, to promote within-organisation dissemination of skills and knowledge gained from projects providing evidence based training Recommendations for future national dissemination projects A formal program of opportunities for small groups of like projects to share information and resources, coordinate activities and synergise education programs interactively would benefit future national dissemination projects - Future workshop programs could explore an incentive program to optimise attendance and reduce ‘no shows’ - Future projects should build in the capacity and funding for increased follow-up with workshop attendees, to explore the reasons behind those who are unable to translate workshop learnings into the workplace and identify factors to address these barriers.
Resumo:
Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
"It could easily provide the back-drop for a James Bond movie. Deep inside a mountain near the North Pole, down a fortified tunnel, and behind airlocked doors in a vault frozen to -18 degrees Celsius, scientists are squirreling away millions of seed samples. The samples constitute the very foundation of agriculture, the biological diversity needed so the world's major food crops can adapt to the next pest or disease, or to climate change. It's little wonder that the Svalbard Global Seed Vault has captured the public's imagination more than almost any agricultural topic in recent years. Popular press reports about the ‘Doomsday Vault,’ however, typically mask the complexity of the endeavor and, if anything, underestimate its practical utility." Cary Fowler This chapter considers the use of seed banks to address concerns about intellectual property, climate change and food security. It has a number of themes. First of all, it is interested in the use of ‘Big Science’ projects to address pressing global scientific concerns and Millennium Development Goals. Second, it highlights the increasing use of banks as a means of managing both property and intellectual property across a wide range of fields of agriculture and biotechnology. Third, it considers the linkage of intellectual property, access to genetic resources and benefit sharing. There are a variety of positions in this debate. Some see requirements in respect of access to genetic resources and benefit sharing as an inconvenient burden for science and commerce. Others defend access to genetic resources and benefit sharing as meaningful and productive. Those inclined to somewhat more conspiratorial views suggest that access to genetic resources and benefit sharing are a ruse to facilitate biopiracy. This chapter has a number of components. Section I focuses upon the Consultative Group on International Agricultural Research (CGIAR) network – often raised as a model for Climate Innovation Centres. Section II considers the Svalbard Global Seed Vault – the so-called Doomsday Vault. After a consideration of the World Summit on Food Security in 2009, it is concluded in this chapter that any future international agreement on climate change needs to address intellectual property, plant genetic resources and food security.
Resumo:
In light of larger public policy debates over intellectual property and climate change, this article considers patent practice, law, and policy in respect of biofuels. This debate has significant implications for public policy discussions in respect of energy independence, food security, and climate change. The first section of the paper provides a network analysis of patents in respect of biofuels across the three generations. It provides empirical research in respect of patent subject matter, ownership, and strategy in respect of biofuels. The second section provides a case study of significant patent litigation over biofuels. There is an examination of the biofuels patent litigation between the Danish company Novozymes, and Danisco and DuPont. The third section examines flexibilities in respect of patent law and clean technologies in the context of the case study of biofuels. In particular, it explores the debate over substantive doctrinal matters in respect of biofuels – such as patentable subject matter, technology transfer, patent pools, compulsory licensing, and disclosure requirements. The conclusion explores the relevance of the debate over patent law and biofuels to the larger public policy discussions over energy independence, food security, and climate change.
Resumo:
This paper offers one explanation for the institutional basis of food insecurity in Australia, and argues that while alternative food networks and the food sovereignty movement perform a valuable function in building forms of social solidarity between urban consumers and rural producers, they currently make only a minor contribution to Australia’s food and nutrition security. The paper begins by identifying two key drivers of food security: household incomes (on the demand side) and nutrition-sensitive, ‘fair food’ agriculture (on the supply side). We focus on this second driver and argue that healthy populations require an agricultural sector that delivers dietary diversity via a fair and sustainable food system. In order to understand why nutrition-sensitive, fair food agriculture is not flourishing in Australia we introduce the development economics theory of urban bias. According to this theory, governments support capital intensive rather than labour intensive agriculture in order to deliver cheap food alongside the transfer of public revenues gained from rural agriculture to urban infrastructure, where the majority of the voting public resides. We chart the unfolding of the Urban Bias across the twentieth century and its consolidation through neo-liberal orthodoxy, and argue that agricultural policies do little to sustain, let alone revitalize, rural and regional Australia. We conclude that by observing food system dynamics through a re-spatialized lens, Urban Bias Theory is valuable in highlighting rural–urban socio-economic and political economy tensions, particularly regarding food system sustainability. It also sheds light on the cultural economy tensions for alternative food networks as they move beyond niche markets to simultaneously support urban food security and sustainable rural livelihoods.
Resumo:
Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.
Resumo:
Dáwat, Pamahándí, Tawíd, Ságda, Lampísa, Ibabások, Lapát, Panedlák: for most of us gathered here, these are words that we don’t usually use in our daily lives. Others may consider them as exotic, alien, funny and even backward. However, for indigenous kindred among us, these words denote an intimate identity and deep understanding of the world around them. It constitutes a broader knowledge system, be written or otherwise, which guides them in the management of resources within their ancestral land. This paper will provide a brief theoretical framework of the concepts of indigenous knowledge systems—hereinafter called IKS, and indigenous peoples food security, and hopefully a deeper or continued appreciation in the study of both concepts in general.
Resumo:
Espionage, surveillance and clandestine operations by secret agencies and governments were something of an East–West obsession in the second half of the twentieth century, a fact reflected in literature and film. In the twenty-first century, concerns of the Cold War and the threat of Communism have been rearticulated in the wake of 9/11. Under the rubric of ‘terror’ attacks, the discourses of security and surveillance are now framed within an increasingly global context. As this article illustrates, surveillance fiction written for young people engages with the cultural and political tropes that reflect a new social order that is different from the Cold War era, with its emphasis on spies, counter espionage, brainwashing and psychological warfare. While these tropes are still evident in much recent literature, advances in technology have transformed the means of tracking, profiling and accumulating data on individuals’ daily activities. Little Brother, The Hunger Games and Article 5 reflect the complex relationship between the real and the imaginary in the world of surveillance and, as this paper discusses, raise moral and ethical issues that are important questions for young people in our age of security.