69 resultados para outsider-insider
Resumo:
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.
Resumo:
This project is an account of one teacher's journey with her students, across cultural boundaries in search of creating authentic Asian/Australian Drama experiences. The project explores the notion of establishing a shared cultural context. The early chapters focus on the background influences that determine where and how the project is set. Subsequent chapters provide an account of the innovative use of dramatic forms used in preparation for the fieldwork, then account of the fieldwork and post classwork. The study ends with a series of recommendations for any teacher intending to undertake a similar project.
Resumo:
The focus of this paper is the role of Australian parents in early childhood education and care (ECEC), in particular, their role in shaping ECEC public policy. The paper reports the findings of a study investigating the different ways in which a group of parents viewed and experienced this role. Set against a policy backdrop where parents are positioned as 'consumers' and 'participants' in ECEC, the study employed a phenomenographic research approach to describe this role as viewed and experienced by parents. The study identified four logically related, qualitatively different ways of constituting this role among this group of parents, ranging from 'no role in shaping public policy' (the no role conception) to 'participating in policy decision-making, particularly where policy was likely to affect their child and family (the participating in policy decision-making conception). The study provides an insider-perspective on the role of parents in shaping policy and highlights variation in how this role is constituted by parents. The study also identifies factors perceived by parents as influencing their participation and discusses their implications for both policy and practice.
Resumo:
We describe research into the identification of anomalous events and event patterns as manifested in computer system logs. Prototype software has been developed with a capability that identifies anomalous events based on usage patterns or user profiles, and alerts administrators when such events are identified. To reduce the number of false positive alerts we have investigated the use of different user profile training techniques and introduce the use of abstractions to group together applications which are related. Our results suggest that the number of false alerts that are generated is significantly reduced when a growing time window is used for user profile training and when abstraction into groups of applications is used.
Resumo:
Increasingly, large amounts of public and private money are being invested in education and as a result, schools are becoming more accountable to stakeholders for this financial input. In terms of the curriculum, governments worldwide are frequently tying school funding to students‟ and schools‟ academic performances, which are monitored through high-stakes testing programs. To accommodate the resultant pressures from these testing initiatives, many principals are re-focussing their school‟s curriculum on the testing requirements. Such a re-focussing, which was examined critically in this thesis, constituted an externally facilitated rapid approach to curriculum change. In line with previously enacted change theories and recommendations from these, curriculum change in schools has tended to be a fairly slow, considered, collaborative process that is facilitated internally by a deputy-principal (curriculum). However, theoretically based research has shown that such a process has often proved to be difficult and very rarely successful. The present study reports and theorises the experiences of an externally facilitated process that emerged from a practitioner model of change. This case study of the development of the controlled rapid approach to curriculum change began by establishing the reasons three principals initiated curriculum change and why they then engaged an outsider to facilitate the process. It also examined this particular change process from the perspectives of the research participants. The investigation led to the revision of the practitioner model as used in the three schools and challenged the current thinking about the process of school curriculum change. The thesis aims to offer principals and the wider education community an alternative model for consideration when undertaking curriculum change. Finally, the thesis warns that, in the longer term, the application of study‟s revised model (the Controlled Rapid Approach to Curriculum Change [CRACC] Model) may have less then desirable educational consequences.
Resumo:
Women are substantially under-represented in the professoriate in Australia with a ratio of one female professor to every three male professors. This gender imbalance has been an ongoing concern with various affirmative action programs implemented in universities but to limited effect. Hence, there is a need to investigate the catalysts for and inhibitors to women’s ascent to the professoriate. This investigation focussed on women appointed to the professoriate between 2005, when a research quality assessment was first proposed, and 2008. Henceforth, these women are referred to as “New Women Professors”. The catalysts and inhibitors in these women’s careers were investigated through an electronic survey and focus group interviews. The survey was administered to new women professors (n=255) and new men professors (n=240) to enable a comparison of responses. However, only women participated in focus group discussions (n=21). An analysis of the survey and interview data revealed that the most critical catalysts for women’s advancement to the professoriate were equal employment opportunities and mentoring. Equal opportunity initiatives provided women with access to traditionally male-dominated forums. Mentoring gave women an insider perspective on the complexity of academia and the politics of the academy. The key inhibitors to women’s career advancement were negative discrimination, the culture of the boys’ club, the tension between personal and professional life, and isolation. Negative discrimination and the boys’ club are problematic because they favour men and marginalise women. The tension between personal and professional life is a particular concern for women who bear children and typically assume the major role in a family for child rearing. Isolation was a concern for both women and men with isolation appearing to increase after ascent to the professoriate. Knowledge of the significant catalysts and inhibitors provides a pragmatic way to orient universities towards redressing the gender balance in the professoriate.
Resumo:
Adolescents are both aware of and have the impetuous to exploit aspects of Science, Technology, Engineering and Mathematics (STEM) within their personal lives. Whether they are surfing, cycling, skateboarding or shopping, STEM concepts impact their lives. However science, mathematics, engineering and technology are still treated in the classroom as separate fragmented entities in the educational environment where most classroom talk is seemingly incomprehensible to the adolescent senses. The aim of this study was to examine the experiences of young adolescents with the aim of transforming school learning at least of science into meaningful experiences that connected with their lives using a self-study approach. Over a 12-month period, the researcher, an experienced secondary-science teacher, designed, implemented and documented a range of pedagogical practices with his Year-7 secondary science class. Data for this case study included video recordings, journals, interviews and surveys of students. By setting an environment empathetic to adolescent needs and understandings, students were able to actively explore phenomena collaboratively through developmentally appropriate experiences. Providing a more contextually relevant environment fostered meta-cognitive practices, encouraged new learning through open dialogue, multi-modal representations and assessments that contributed to building upon, re-affirming, or challenging both the students' prior learning and the teacher’s pedagogical content knowledge. A significant outcome of this study was the transformative experiences of an insider, the teacher as researcher, whose reflections provided an authentic model for reforming pedagogy in STEM classes.
Resumo:
In dynamic and uncertain environments such as healthcare, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. The uncertainty stems from the unpredictability of users’ operational needs as well as their private incentives to misuse permissions. In Role Based Access Control (RBAC), a user’s legitimate access request may be denied because its need has not been anticipated by the security administrator. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. This paper introduces a novel approach to access control under uncertainty and presents it in the context of RBAC. By taking insights from the field of economics, in particular the insurance literature, we propose a formal model where the value of resources are explicitly defined and an RBAC policy (entailing those predictable access needs) is only used as a reference point to determine the price each user has to pay for access, as opposed to representing hard and fast rules that are always rigidly applied.
Resumo:
In dynamic and uncertain environments, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. Risk-based approaches to access control attempt to address this problem by allocating a limited budget to users, through which they pay for the exceptions deemed necessary. So far the primary focus has been on how to incorporate the notion of budget into access control rather than what or if there is an optimal amount of budget to allocate to users. In this paper we discuss the problems that arise from a sub-optimal allocation of budget and introduce a generalised characterisation of an optimal budget allocation function that maximises organisations expected benefit in the presence of self-interested employees and costly audit.
Resumo:
Women are substantially under-represented in the professoriate in Australia with a ratio of one female professor to every three male professors. This gender imbalance has been an ongoing concern with various affirmative action programs implemented in universities but to limited effect. Hence, there is a need to investigate the catalysts for and inhibitors to women’s ascent to the professoriate. This investigation focussed on women appointed to the professoriate between 2005, when a research quality assessment was first proposed, and 2008. Henceforth, these women are referred to as “New Women Professors”. The catalysts and inhibitors in these women’s careers were investigated through an electronic survey and focus group interviews. The survey was administered to new women professors (n=255) and new men professors (n=240) to enable a comparison of responses. However, only women participated in focus group discussions (n=21). An analysis of the survey and interview data revealed that the most critical catalysts for women’s advancement to the professoriate were equal employment opportunities and mentoring. Equal opportunity initiatives provided women with access to traditionally male-dominated forums. Mentoring gave women an insider perspective on the complexity of academia and the politics of the academy. The key inhibitors to women’s career advancement were negative discrimination, the culture of the boys’ club, the tension between personal and professional life, and isolation. Negative discrimination and the boys’ club are problematic because they favour men and marginalise women. The tension between personal and professional life is a particular concern for women who bear children and typically assume the major role in a family for child rearing. Isolation was a concern for both women and men with isolation appearing to increase after ascent to the professoriate. Knowledge of the significant catalysts and inhibitors provides a pragmatic way to orient universities towards redressing the gender balance in the professoriate.
Resumo:
The majority of Australians will work, sleep and die in the garments of the mass market. Yet, as Ian Griffiths has termed it, the designers of these garments are ‘invisible’ (2000). To the general public, the values, opinions and individual design processes of these designers are as unknown as their names. However, the designer’s role is crucial in making decisions which will have impacts throughout the life of the garment. The high product volume within the mass market ensures that even a small decision in the design process to source a particular fabric, or to use a certain trim or textile finish, can have a profound environmental or social effect. While big companies in Australia have implemented some visible strategies for sustainability, it is uncertain how these may have flowed through to design practices. To explore this question, this presentation will discuss preliminary findings from in-depth semi-structured interviews with Australian mass market fashion designers and product developers. The aim of the interviews was to hear the voice of the insider – to listen to mass market designers describe their design process, discuss the Australian fashion industry and its future challenges and opportunities, and to comment on what a ‘sustainability’ for their industry could look like. These interviews will be discussed within the framework of design philosopher Tony Fry’s writing on design redirection for sustainability.
Resumo:
What is the understanding of ‘artist’ held by a person with a mental illness? Being diagnosed with a mental illness often results in social isolation. Art programs are often used to address this isolation, and to expedite positive mental health and wellbeing. In these programs the cultural value of art can be moderated and replaced with therapeutic meanings or used for purposes of community integration. Some individuals develop artistic identities within these programs. These artists personify representative tensions within the art world. Artists with mental illness are symbolically positioned within the history of art as holding special creative providence and, yet are also viewed as having a peripheral position outside the cultural framework of the art world. This research engaged with eight artists to determine the understanding of artist held by a person with a mental illness. Through shared activities around the curatorial aspects of an exhibition entitled "Artist Citizen" the impact of illness, culture and alterity were examined. Overlapping approaches of Community Cultural Development and Participatory Action Research have been used. A perspective of alterity is given which was apparent in transformative processes of the research. This thesis shows that alterity and difference are both important social resources as well as positions of isolation and discrimination. Finally, conclusions are presented that indicated that a more nuanced understanding of alterity offers potential to discussions of the complex experiences of a person with a mental illness to negotiate subjective constructions of an identity for participation in broader political, social, health and cultural contexts.
Resumo:
In 1944 Australian author Eleanor Dark wrote that Australia is a hard country for an outsider to see, citing, in evidence, the writing of the “strange, foreign-looking little man with the beard” -- the self-described by D. H. Lawrence. According to Dark, Lawrence was bewildered by Australia because what his eyes saw was not what they were accustomed to seeing. Kangaroo, she wrote, suggests one long, tormented effort to see. Lawrence appears, for Dark, to be half-blind, struggling, and irritated almost beyond belief with his visit to New South Wales. Eleanor Dark wrote this critique in 1944, long after Lawrence’s 1922 visit, but for her, as for other Australian writers, Kangaroo continued to register as an important book, even if the content rankled. Katharine Susannah Prichard and Christina Stead, both advocates in general of Lawrence, likewise rejected the tenor of Kangaroo, although Lawrence would not have been worried about the response. In 1929 he referred to his irritation with Australia in letters to P.R. “Inky” Stephensen, the Australian nationalist and publisher, and he does not seem to have changed his opinions since writing Kangaroo. Yet the novel continued to be significant for Australian writers, even if as a provocation. My discussion traces the responses of the women authors to Kangaroo, and refers to Lawrence’s letters to Stephensen, as a way of emphasizing this significance, seen especially in relation to ideas about ‘seeing’ and the Australian landscape.
Resumo:
This article investigates the profile of the companies that have been investigated for corporate fraud and misconduct. Our definition of fraud includes financial statement fraud, market misconduct fraud such as insider trading or false disclosures, and managerial fraud. The particular evidence presented relates to those instances of corporate fraud and misconduct investigated by the Australian corporate regulatory, Australian Securities and Investments Commission (ASIC), and relates to sanctions for fraud, misconduct or compliance breaches. Using data compiled from the public announcements in the ASIC reports over the period 2004-2008, we categorise the type of fraud and misconduct breaches ASIC chooses to report and investigate.
Resumo:
The suitability of Role Based Access Control (RBAC) is being challenged in dynamic environments like healthcare. In an RBAC system, a user's legitimate access may be denied if their need has not been anticipated by the security administrator at the time of policy specification. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. The heart of the challenge is the intrinsic unpredictability of users' operational needs as well as their incentives to misuse permissions. In this paper we propose a novel Budget-aware Role Based Access Control (B-RBAC) model that extends RBAC with the explicit notion of budget and cost, where users are assigned a limited budget through which they pay for the cost of permissions they need. We propose a model where the value of resources are explicitly defined and an RBAC policy is used as a reference point to discriminate the price of access permissions, as opposed to representing hard and fast rules for making access decisions. This approach has several desirable properties. It enables users to acquire unassigned permissions if they deem them necessary. However, users misuse capability is always bounded by their allocated budget and is further adjustable through the discrimination of permission prices. Finally, it provides a uniform mechanism for the detection and prevention of misuses.