623 resultados para Security issues
Resumo:
In this response to Tom G. K. Bryce and Stephen P. Day’s (Cult Stud Sci Educ. doi:10.1007/s11422-013-9500-0, 2013) original article, I share with them their interest in the teaching of climate change in school science, but I widen it to include other contemporary complex socio-scientific issues that also need to be discussed. I use an alternative view of the relationship between science, technology and society, supported by evidence from both science and society, to suggest science-informed citizens as a more realistic outcome image of school science than the authors’ one of mini-scientists. The intellectual independence of students Bryce and Day assume, and intend for school science, is countered with an active intellectual dependence. It is only in relation to emerging and uncertain scientific contexts that students should be taught about scepticism, but they also need to learn when, and why to trust science as an antidote to the expressions of doubting it. Some suggestions for pedagogies that could lead to these new learnings are made. The very recent fifth report of the IPCC answers many of their concerns about climate change.
Resumo:
Personal ultraviolet dosimeters have been used in epidemiological studies to understand the risks and benefits of individuals' exposure to solar ultraviolet radiation (UVR). We investigated the types and determinants of non-compliance associated with a protocol for use of polysulphone UVR dosimeters. In the AusD Study, 1,002 Australian adults (aged 18-75 years) were asked to wear a new dosimeter on their wrist each day for 10 consecutive days to quantify their daily exposure to solar UVR. Of the 10,020 dosimeters distributed, 296 (3%) were not returned or used (Type I non-compliance) and other usage errors were reported for 763 (8%) returned dosimeters (Type II non-compliance). Type I errors were more common in participants with predominantly outdoor occupations. Type II errors were reported more frequently on the first day of measurement; weekend days or rainy days; and among females; younger people; more educated participants or those with outdoor occupations. Half (50%) the participants reported a non-compliance error on at least one day during the 10-day period. However, 92% of participants had at least 7 days of usable data without any apparent non-compliance issues. The factors identified should be considered when designing future UVR dosimetry studies.
Resumo:
This article attempts an audit of changes in the NSW penal system over the last nearly 30 years. Taking the 1978 Nagle Royal Commission findings and analysis as the starting point a comparison is made between the Nagle era and the contemporary scene across a range of practices including imprisonment rates, violence, drug use, deaths in custody, prison conditions, prisoners rights, legal regulation, and others. It is suggested that developments since Nagle are mixed and cannot be attributed to a single logic or force. Major changes include a doubling of imprisonment rates, significant increases in Indigenous and women's imprisonment rates, the apparent ending of institutionalised bashings and the centrality of drug use to imprisonment and to the culture, health and security practices which characterise the current prison experience. The article may constitute a useful starting point for broader attempts to relate current penal practices to far wider changes in the conditions of life under late modernity.
Resumo:
The growing importance of logistics in increasingly globalised production and consumption systems strengthens the case for explicit consideration of the climate risks that may impact on the operation of ports in the future, as well as the formulation of adaptation responses that act to enhance their resilience. Within a logistics chain, seaports are functional nodes of significant strategic importance, and are considered as critical gateways linking local and national supply chains to global markets. However, they are more likely to be exposed to vagaries of climate-related extreme events due to their coastal locations. As such, they need to be adaptive and respond to the projected impacts of climate change, in particular extreme weather events. These impacts are especially important in the logistics context as they could result in varying degrees of business interruption; including business closure in the worst case scenario. Since trans-shipment of freight for both the import and export of goods and raw materials has a significant impact on Australia’s sustained economic growth it was considered important to undertake a study of port functional assets, to assess their vulnerability to climate change, to model the potential impacts of climate-related extreme events, and to highlight possible adaptation responses.
Resumo:
For over 150 years Australia has exported bulk, undifferentiated, commodities such as wool, wheat, meat and sugar to the UK and more recently to Japan, Korea, and the Middle East. It is estimated that, each year, Australia's farming system feeds a domestic population of some 22 million people, while exporting enough food to feed another 40 million. With the Australian population expected to double in the next 40 years, and with the anticipated growth in the world's population to reach a level of some 9 billion (from its present level of 7 billion) in the same period, there are strong incentives for an expansion of food production in Australia. Neoliberal settings are encouraging this expansion at the same time as they are facilitating importation of foods, higher levels of foreign direct investment and the commoditisation of resources (such as water). Yet, expansion in food production – and in an era of climate change – will continue to compromise the environment. After discussing Australia's neoliberal framework and its relation to farming, this paper outlines how Australia is attempting to address the issue of food security. It argues that productivist farming approaches that are favoured by both industry and government are proving incapable of bringing about long-term production outcomes that will guarantee national food security.
Resumo:
Disproportionate representation of males and females in science courses and careers continues to be of concern. This article explores gender differences in Australian high school students’ perceptions of school science and their intentions to study university science courses. Nearly 3800 15-year-old students responded to a range of 5-point Likert items relating to intentions to study science at university, perceptions of career-related instrumental issues such as remuneration and job security, self-rated science ability and enjoyment of school science. Australian boys and girls reported enjoying science to a similar extent, however boys reported enjoying it more in relation to other subjects than did girls, and rated their ability in science compared to others in their class more highly than did girls. There was no significant difference between the mean responses of girls and boys to the item “It is likely I will choose a science-related university course when I leave school” and the strongest predictors of responses to this item were items relating to students’ liking for school science and awareness from school science of new and exciting jobs, followed by their perceived self-ability. These results are discussed in relation to socio-scientific values that interact with identity and career choices, employment prospects in science, and implications for science education.
Resumo:
In Responsibility to Protect and Women, Peace and Security: Aligning the Protection Agendas, editors Davies, Nwokora, Stamnes and Teitt address the intersections of the Responsibility to Protect (R2P) principle and the Women, Peace, and Security (WPS) agenda. Widespread or systematic sexual or gender-based violence is a war crime, a crime against humanity and an act of genocide, all of which are clearly addressed in the R2P principle. The protection of those at risk of widespread sexual violence is therefore not only relative to the Women, Peace and Security (WPS) agenda, but a fundamental sovereign obligation for all states as part of their commitment to R2P. Contributions from policy-makers and academics consider both the merits and the utility of aligning the protection agendas of R2P and WPS. Ultimately, a number of actionable recommendations are made concerning a unification of the agendas to best support the global empowerment of women and prevention of mass atrocities.
Resumo:
This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.
Resumo:
As prison populations increase in Australia and worldwide, Corrections Criminology is a timely stocktake of what we know about corrections. The book encompasses corrections in the community as well as private and public prisons, and is written by leading academics and senior practitioners. The book covers seven main themes: Trends in Correctional Populations (in Australia and worldwide) The Objectives, Standards and Efficacy of Imprisonment, including key issues such as accountability, treatment of prisoners, security and privatisation Special Prison Populations, such as Indigenous, female and ageing prisoners Prisoner Health, including mental health and strategies for minimising self-harm Rehabilitation and Reparation, including consideration of “what works?” and post-release support Correctional Officers, particularly considering the changing career of corrections staff and Future Directions in corrections.
Resumo:
After the terrorist attacks in the United States on 11 September 2001, terrorism and counter-terrorism efforts moved to the front of popular consciousness and became the focus of national security for governments worldwide. With this increased attention came an urgent interest in understanding and identifying what works in fighting terrorism (Belasco 2010). For Australia, understanding the relative effectiveness of counter-terrorism efforts in nearby neighbours of Indonesia, Thailand and the Philippines is highly relevant for our country's national security. Indonesia, Thailand and the Philippines are all countries that are important to Australia not just because of geographic proximity, but also because of a history of economic ties and the role these countries play as Australia’s regional partners...
Resumo:
Attempts by universities to provide an improved learning environment to students have led to an increase in team-teaching approaches in higher education. While the definitions of team-teaching differ slightly, the benefits of team-teaching have been cited widely in the higher education literature. By tapping the specialist knowledge of a variety of staff members, students are exposed to current and emerging knowledge in different fields and topic areas; students are also able to understand concepts from a variety of viewpoints. However, while there is some evidence of the usefulness of team-teaching, there is patchy empirical support to underpin how well students appreciate and adapt to team-teaching approaches. This paper reports on the team-teaching approaches adopted in the delivery of an introductory journalism and communication course at the University of Queensland. The success of the approaches is examined against the background of quantitative and qualitative data. The study found that team-teaching is generally very well received by undergraduate students because they value the diverse expertise and teaching styles they are exposed to. Despite the positive feedback, students also complained about problems of continuity and cohesiveness.
Resumo:
Although there are many approaches for developing secure programs, they are not necessarily helpful for evaluating the security of a pre-existing program. Software metrics promise an easy way of comparing the relative security of two programs or assessing the security impact of modifications to an existing one. Most studies in this area focus on high level source code but this approach fails to take compiler-specific code generation into account. In this work we describe a set of object-oriented Java bytecode security metrics which are capable of assessing the security of a compiled program from the point of view of potential information flow. These metrics can be used to compare the security of programs or assess the effect of program modifications on security using a tool which we have developed to automatically measure the security of a given Java bytecode program in terms of the accessibility of distinguished ‘classified’ attributes.
Resumo:
Bitcoin is a distributed digital currency which has attracted a substantial number of users. We perform an in-depth investigation to understand what made Bitcoin so successful, while decades of research on cryptographic e-cash has not lead to a large-scale deployment. We ask also how Bitcoin could become a good candidate for a long-lived stable currency. In doing so, we identify several issues and attacks of Bitcoin, and propose suitable techniques to address them.
Resumo:
In this introductory chapter to Schmeinck, D. and Lidstone, J. (2014) “Current trends and issues in geographical education” in Schmeinck, D. and Lidstone, J. (2014) Eds) Standards and Research in Geographical Education: Current Trends and International Issues. Berlin. Mensch und Buch Verlag. Pp. 5 - 16. , the authors review and analyse eleven papers originally presented to the Congress of the International Geographical Union held in Cologne in 2012. Taking the collection of papers as a single corpus representing the “state of the art” of geography education, they applied lexical and bibliometric analyses in an innovative attempt to identify the nature of geographical education as represented by this anthology of peer reviewed chapters presented at the start of the second decade of the Twenty-first century?
Resumo:
For the past several decades, cryptographers have consistently provided us with stronger and more capable primitives and protocols that have found many applications in security systems in everyday life. One of the central tenets of cryptographic design is that, whereas a system’s architecture ought to be public and open to scrutiny, the keys on which it depends — long, utterly random, unique strings of bits — will be perfectly preserved by their owner, and yet nominally inaccessible to foes.