209 resultados para national security law
Resumo:
This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.
Resumo:
Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.
Resumo:
Traditional approaches to teaching criminal law in Australian law schools include lectures that focus on the transmission of abstracted and decontextualised knowledge, with content often prioritised at the expense of depth. This paper discusses The Sapphire Vortex, a blended learning environment that combines a suite of on-line modules using Second Life machinima to depict a narrative involving a series of criminal offences and the ensuing courtroom proceedings, expert commentary by practising lawyers and class discussions.
Resumo:
This chapter explores the objectives, principle and methods of climate law. The United Nations Framework Convention on Climate Change (UNFCCC) lays the foundations of the international regime by setting out its ultimate objectives in Article 2, the key principles in Article 3, and the methods of the regime in Article 4. The ultimate objective of the regime – to avoid dangerous anthropogenic interference – is examined and assessments of the Intergovernmental Panel on Climate Change (IPCC) are considered when seeking to understand the definition of this concept. The international environmental principles of: state sovereignty and responsibility, preventative action, cooperation, sustainable development, precaution, polluter pays and common but differentiated responsibility are then examined and their incorporation within the international climate regime instruments evaluated. This is followed by an examination of the methods used by the mitigation and adaptation regimes in seeking to achieve the objective of the UNFCCC. Methods of the mitigation regime include: domestic implementation of policies, setting of standards and targets and allocation of rights, use of flexibility mechanisms, and reporting. While it is noted that methods of the adaptation regime are still evolving, the latter includes measures such as impact assessments, national adaptation plans and the provision of funding.
Resumo:
Australia has new national legislation - the Personal Property Securities Act 2009 (Cth) and the Personal Property Securities Regulations 2010 – which commenced operation on 30 January 2012. The policy objectives of the new legislation are to increase certainty and consistency and to reduce complexity and cost. To achieve this, the legislation treats like transactions alike, by focusing on substance over form, and so removes distinctions between security interests which have been based on their structure. Differences based on the location or nature of the secured property and the debtor’s legal form, as an individual or company, have also disappeared. We now have one single national scheme and one national electronic registration system for all security interests throughout Australia. The Act applies to security interests in tangible and intangible personal property, including those based on some form of title retention which are not security interests under the general law. This legislation rationalises previous laws and bring about substantial changes to this area of law. This paper seeks to explain the principal changes and their implications.
Resumo:
Reform of Australia’s inconsistent Commonwealth, State and Territory consumer laws is now a reality. The 1 January 2011 commencement of the Australian Consumer Law (ACL), within the Competition and Consumer Act 2010, is the culmination of a long process of consultation. Unifying and rationalising the plethora of laws, this new Act sees the disappearance of the “Trade Practices Act” and the amendment of a raft of State and Territory legislation; the new national regime informed by them operates in their stead. This is indisputably the most comprehensive change in the history of the Trade Practices Act 1974. This book aims to assist practitioners, academics and students understand the Australian Consumer Law regime and its impact. It summarises the history and constitutional basis of the ACL, explaining how the ACL will be implemented, amended and enforced. In addition it explores how the various general and specific protections interrelate, and the scope of their overlap, and considers the content of the ACL, and the principal changes from the provisions of the Trade Practices Act.
Resumo:
To protect the health information security, cryptography plays an important role to establish confidentiality, authentication, integrity and non-repudiation. Keys used for encryption/decryption and digital signing must be managed in a safe, secure, effective and efficient fashion. The certificate-based Public Key Infrastructure (PKI) scheme may seem to be a common way to support information security; however, so far, there is still a lack of successful large-scale certificate-based PKI deployment in the world. In addressing the limitations of the certificate-based PKI scheme, this paper proposes a non-certificate-based key management scheme for a national e-health implementation. The proposed scheme eliminates certificate management and complex certificate validation procedures while still maintaining security. It is also believed that this study will create a new dimension to the provision of security for the protection of health information in a national e-health environment.
Resumo:
This book examines the influence of emerging economies on international legal rules, institutions and processes. It describes recent and predicted changes in economic, political and cultural powers, flowing from the growth of emerging economies such as China, India, Brazil, South Africa and Russia, and analyses the influence of these changes on various legal frameworks and norms. Its contributors come from a variety of fields of expertise, including international law, politics, environmental law, human rights, economics and finance. The book begins by providing a broad analysis of the nature of the shifting global dynamic in its historical and contemporary contexts, including analysis of the rise of China as a major economic and political power and the end of the period of United States domination in international affairs. It illustrates the impact of these changes on states’ domestic policies and priorities, as they adapt to a new international dynamic. The authors then offer a range of perspectives on the impact of these changes as they relate to specific regimes and issues, including climate change regulation, collective security, indigenous rights, the rights of women and girls, environmental protection and foreign aid and development. The book provides a fresh and comprehensive analysis of an issue with extensive implications for international law and politics.
Resumo:
Tax law and policy is a vital part of Australian society. Australian society insists that the Federal Government provide extensive public programs, such as health services, education, social security, foreign aid, legal infra¬structure, regulation, police services, national defence and funding for sports development. These programs are costly to provide and are funded by taxation. The aim of this book is to introduce and explain the principles of tax law and tax policy in plain English. The book contains detailed commentary on tax principles together with extracts from cases and materials that illustrate the application of the principles. The book considers tax policy and the economic and social aspects of tax law. While tax students must develop technical competence in tax law, given the speed with which changes are made to the technical details of tax law, it is also important to grasp tax principles and policy to understand why tax law has changed or why it should change. The chapters are structured to direct readers to the key provisions of the tax law. Each case is introduced by an explanation of the facts, followed by the taxpayer’s arguments, the Commissioner’s assertions and the decision of the Administrative Appeals Tribunal or a court. The commentary guides readers through the issues considered in the judgments. The book contains extracts from: articles; materials dealing with tax policy; and the Commissioner’s rulings. The book also has references for further reading and medium-neutral citations (Internet citations) for cases decided since 1998.
Resumo:
An engaging narrative is maintained throughout this edited collection of articles that address the issue of militarism in international relations. The book seamlessly integrates historical and contemporary perspectives on militarism with theory and relevant international case studies, resulting in a very informative read. The work is comprised of three parts. Part 1 deals with the theorisation of militarism and includes chapters by Anna Stavrianakis and Jan Selby, Martin Shaw, Simon Dalby, and Nicola Short. It covers a range of topics relating to historical and contemporary theories of militarism, geopolitical threat construction, political economy, and the US military’s ‘cultural turn’.
Resumo:
Alcohol-related driving is a longstanding, serious problem in China (Li, Xie, Nie, & Zhang, 2012). On 1st May, 2011 a national law was introduced to criminalize drunk driving, and imposed serious penalties including jail for driving with a blood alcohol level of above 80mg/100ml. This pilot study, undertaken a year after introduction of the law, sought traffic police officers’ perceptions of drink driving and the practice of breath alcohol testing (BAT) in a large city in Guangdong Province, southern China. A questionnaire survey and semi-structured interviews were used to gain an in-depth understanding of issues relevant to alcohol-related driving. Fifty-five traffic police officers were recruited for the survey and six traffic police officers with a variety of working experience including roadside alcohol breath testing, traffic crash investigation and police resourcing were interviewed individually. The officers were recruited by the first author with the assistance of the staff from Guangdong Institute of Public Health, Centre for Disease Control and Prevention (CDC). Interview participants reported three primary reasons why people drink and drive: 1) being prepared to take the chance of not being apprehended by police; 2) the strong traditional Chinese drinking culture; and 3) insufficient public awareness about the harmfulness of drink driving. Problems associated with the process of breath alcohol testing (BAT) were described and fit broadly into two categories: resourcing and avoiding detection. It was reported that there were insufficient traffic police officers to conduct routine traffic policing, including alcohol testing. Police BAT equipment was considered sufficient for routine traffic situations but not highway traffic operations. Local media and posters are used by the Public Security Bureau which is responsible for education about safe driving but participants thought that the education campaigns are limited in scope. Participants also described detection avoidance strategies used by drivers including: changing route; ignoring a police instruction to stop; staying inside the vehicle with windows and doors locked to avoid being tested; intentionally not performing breath tests correctly; and arguing with officers. This pilot study provided important insights from traffic police in one Chinese city which suggest there may be potential unintended effects of introducing more severe penalties including a range of strategies reportedly used by drivers to avoid detection. Recommendations for future research include a larger study to confirm these findings and examine the training and education of drivers; the focus and reach of publicity; and possible resource needs to support police enforcement.
Resumo:
This study was undertaken in an effort to contribute to the limited knowledge of women who commit murder. Women account for approximately 10% of the total Australian homicides and according to Mouzos (2000), 20% of these female perpetrated homicides result in murder convictions. In her extensive study of female homicide offending in England, Brookman (2005) asserts that nearly two thirds of the victims of women who kill are intimates, to include violent partners and their own children. The other third of the victims consist largely of acquaintances and to lesser degree strangers (Brookman, 2005). This study strives to introduce further knowledge regarding women convicted of murder; the smaller subgroup of female homicide offenders of which less is known. It is comprised of women who killed intimates and non-intimates to include acquaintances. The study engages the narratives of seven women, all of whom were convicted of murder and serving lengthy sentences at the Dame Phyllis Frost Centre, a medium and maximum security prison that is located on the outskirts of Melbourne, Australia. The seven women fall largely outside of the characteristics of female homicide offenders as revealed in the studies from Australia’s National Homicide Monitoring Program (NHMP, 2007), from Canada by Hoffmann, Lavigne, and Dickie (1998) and research from the United States by Scott and Davies (2002). In this study there were no Indigenous women represented. Only one of the women had a previous criminal charge. The women were older on average than the prevailing demographics from western nations. Two of the women had substance abuse and co-occurring mental illness, which reflects a significant lower rate than the literature suggests. This study expands the current understanding of the phenomenon of women who murder. It communicates the narratives of seven women charged and convicted of murder as they attempt to understand their lives and identities. It moves the dialogue beyond the preponderance of feminist criminological research that examines motive and the relationship the woman has with her victim to the social discourses which dominate in her identity formation. This research found that in their attempt to create a favourable identity the women needed to engage with the master script of normative femininity through the feminisation of victimisation, motherhood and domesticity.
Resumo:
For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.
Resumo:
Health information systems are being implemented in countries by governments and regional health authorities in an effort to modernize healthcare. With these changes, there has emerged a demand by healthcare organizations for nurses graduating from college and university programs to have acquired nursing informatics competencies that would allow them to work in clinical practice settings (e.g. hospitals, clinics, home care etc). In this paper we examine the methods employed by two different countries in developing national level nursing informatics competencies expected of undergraduate nurses prior to graduation (i.e. Australia, Canada). This work contributes to the literature by describing the science and methods of nursing informatics competency development at a national level.