18 resultados para Defending

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

If the trade union movement is to remain an influential force in the industrial, economic and socio/political arenas of industrialised nations it is vital that its recruitment of young members improve dramatically. Australian union membership levels have declined markedly over the last three decades and youth union membership levels have decreased more than any age group. Currently around 10% of young workers aged between 16-24 years are members of unions in Australia compared to 26% of workers aged 45-58 (Oliver, 2008). This decline has occurred throughout the union movement, in all states and in almost all industries and occupations. This research, which consists of interviews with union organisers and union officials, draws on perspectives from the labour geography literature to explore how union personnel located in various places, spaces and scales construct the issue of declining youth union membership. It explores the scale of connections within the labour movement and the extent to which these connections are leveraged to address the problem of youth union membership decline. To offer the reader a sense of context and perspective, the thesis firstly outlines the historical development of the union movement. It also reviews the literature on youth membership decline. Labour geography offers a rich and apposite analytical tool for investigation of this area. The notion of ‘scale’ as a dynamic, interactive, constructed and reconstructed entity (Ellem, 2006) is an appropriate lens for viewing youth-union membership issues. In this non-linear view, scale is a relational element which interplays with space, place and the environment (Howett, in Marston, 2000) rather than being ‘sequential’ and hierarchical. Importantly, the thesis investigates the notion of unions as ‘spaces of dependence’ (Cox, 1998a, p.2), organisations whose space is centred upon realising essential interests. It also considers the quality of unions’ interactions with others – their ‘spaces of engagement‘(Cox, 1998a, p.2), and the impact that this has upon their ability to recruit youth. The findings reveal that most respondents across the spectrum of the union movement attribute the decline in youth membership levels to factors external to the movement itself, such as changes to industrial relations legislation and the impact of globalisation on employment markets. However, participants also attribute responsibility for declining membership levels to the union movement itself, citing factors such as a lack of resourcing and a need to change unions’ perceived identity and methods of operation. The research further determined that networks of connections across the union movement are tenuous and, to date, are not being fully utilised to assist unions to overcome the youth recruitment dilemma. The study concludes that potential connections between unions are hampered by poor resourcing, workload issues and some deeply entrenched attitudes related to unions ‘defending (and maintaining) their patch’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article is a response to Professor Keown’s criticism of my paper “Finding a Way Through the Ethical and Legal Maze: Withdrawal of Medical Treatment and Euthanasia” (2005) 13 (3) Medical Law Review 357. The article takes up and responds to a number of criticisms raised by Keown in an attempt to further the debate concerning the moral and legal status of withdrawing life-sustaining measures, its distinction from euthanasia, and the implications of the lawfulness of withdrawal for the principle of the sanctity of life.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The interoperable and loosely-coupled web services architecture, while beneficial, can be resource-intensive, and is thus susceptible to denial of service (DoS) attacks in which an attacker can use a relatively insignificant amount of resources to exhaust the computational resources of a web service. We investigate the effectiveness of defending web services from DoS attacks using client puzzles, a cryptographic countermeasure which provides a form of gradual authentication by requiring the client to solve some computationally difficult problems before access is granted. In particular, we describe a mechanism for integrating a hash-based puzzle into existing web services frameworks and analyze the effectiveness of the countermeasure using a variety of scenarios on a network testbed. Client puzzles are an effective defence against flooding attacks. They can also mitigate certain types of semantic-based attacks, although they may not be the optimal solution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a world where governments increasingly attempt to impose regulation on all professional activities, this paper advocates that professional standards for teachers be developed ‘by the profession for the profession’. Foucauldian archaeology is applied to two teacher standards documents recently published in Australia, one developed at national governmental level and the other by geography teachers through their professional associations. The excavation reveals that both students and geography teachers themselves are better served when teachers assert their own definition of professionalism and thus reclaim their professional territory, rather than being compliant with generic governmental agendas. Whilst we use Australia as an illustrative example, our findings are applicable to all other countries where governments attempt to impose external professional standards on the teaching profession.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We discuss issues and opportunities for designing experiences with 3D simulations of nature where the landscape and the interactant engage in an equitable dialogue. We consider the way digital representations of the world and design habits tend to detach from corporeal dimensions in experiencing the natural world and perpetuate motifs in games that reflect taming, territorializing or defending ourselves from nature. We reflect on the Digital Songlines project, which translates the schema of indigenous people to construct a natural environment, and the inherent difficulty in cross-culturally representing inter-connectedness. This leads us to discuss insights into the use of natural features by western people in cultural transmission and in their experiences in natural places. We propose McCarthy and Wright's dialogical approach may reconcile conceptions of place and self in design and conclude by considering experiments in which designers digitally reconstruct their own corporeal experience in natural physical landscape.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Gradual authentication is a principle proposed by Meadows as a way to tackle denial-of-service attacks on network protocols by gradually increasing the confidence in clients before the server commits resources. In this paper, we propose an efficient method that allows a defending server to authenticate its clients gradually with the help of some fast-to-verify measures. Our method integrates hash-based client puzzles along with a special class of digital signatures supporting fast verification. Our hash-based client puzzle provides finer granularity of difficulty and is proven secure in the puzzle difficulty model of Chen et al. (2009). We integrate this with the fast-verification digital signature scheme proposed by Bernstein (2000, 2008). These schemes can be up to 20 times faster for client authentication compared to RSA-based schemes. Our experimental results show that, in the Secure Sockets Layer (SSL) protocol, fast verification digital signatures can provide a 7% increase in connections per second compared to RSA signatures, and our integration of client puzzles with client authentication imposes no performance penalty on the server since puzzle verification is a part of signature verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The immune system plays an important role in defending the body against tumours and other threats. Currently, mechanisms involved in immune system interactions with tumour cells are not fully understood. Here we develop a mathematical tool that can be used in aiding to address this shortfall in understanding. This paper de- scribes a hybrid cellular automata model of the interaction between a growing tumour and cells of the innate and specific immune system including the effects of chemokines that builds on previous models of tumour-immune system interactions. In particular, the model is focused on the response of immune cells to tumour cells and how the dynamics of the tumour cells change due to the immune system of the host. We present results and predictions of in silico experiments including simulations of Kaplan-Meier survival-like curves.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last three decades neoliberalism has transitioned from occupying the margins of economic policy debate to becoming the dominant approach by governments and their economic advisers, a process that has accelerated with the collapse of the former Stalinist states in Eastern Europe and the Soviet Union. This thesis adopts a Marxist framework for understanding this process, beginning as it did in the realm of relatively abstract philosophical and ideological debate to the permeation of neoliberal values throughout all capitalist institutions, including the state bureaucracy. This necessarily means a focus on the dialectical relationship between the rise of neoliberalism and the shifting balance of class forces that accompanied the success of the neoliberal project in transforming the dominant economic policy paradigm. The extent to which neoliberal reforms impacted on workers and public sector institutions, along with the success or otherwise of traditional working class institutions in defending the material interests of workers will therefore be a recurring theme throughout this body of work. The evidence borne from this research and analysis suggests a major shift in the dialectic of class struggle in favour of the power of capital over labour during the period covered, with the neoliberal age being one of defeat for a labour movement that largely failed to adopt successful strategies for defending itself.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigated the influence of interpersonal coordination tendencies on performance outcomes of 1-vs-1 subphases in youth soccer. Eight male developing soccer players (age: 11.8+0.4 years; training experience: 3.6+1.1 years) performed an in situ simulation of a 1-vs-1 sub-phase of soccer. Data from 82 trials were obtained with motion-analysis techniques, and relative phase used to measure the space-time coordination tendencies of attacker-defender dyads. Approximate entropy (ApEn) was then used to quantify the unpredictability of interpersonal interactions over trials. Results revealed how different modes of interpersonal coordination emerging from attacker-defender dyads influenced the 1-vs-1 performance outcomes. High levels of space-time synchronisation (47%) and unpredictability in interpersonal coordination processes (ApEn: 0.91+0.34) were identified as key features of an attacking player’s success. A lead-lag relation attributed to a defending player (34% around 7308 values) and a more predictable coordination mode (ApEn: 0.65+0.27, P50.001), demonstrated the coordination tendencies underlying the success of defending players in 1-vs-1 sub-phases. These findings revealed how the mutual influence of each player on the behaviour of dyadic systems shaped emergent performance outcomes. More specifically, the findings showed that attacking players should be constrained to exploit the space-time synchrony with defenders in an unpredictable and creative way, while defenders should be encouraged to adopt postures and behaviours that actively constrain the attacker’s actions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Paul Keating recently noted that what the Rudd Government lacked was an overall narrative or story. I would like to argue that Paul Keating is correct and suggest a narrative: that of retrieving and defending aspects of our social democratic heritage from some of the damaging effects wrought by neo-liberalism. Moreover I want to argue that criminal justice policy needs to be seen as a part of this broader narrative, which requires it being prised from its current site, where it is wedged firmly in the narrative of law and order.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Animals are often used as symbols in policy debates and media accounts of marine pollution. Images of miserable oil-soaked marine birds and mammals are prominent following high profile oil spills such as the Exxon Valdez, Prestige and Pacific Adventurer incidents. Portrayed as hapless victims, these animal actors are not only cast as powerful symbols of the effects of anthropogenic pollution but also represent an environment in crisis. Animals, like the broader environment, are seen as something which is acted upon. Less attention has been given to the ways in which animals have been cast as either the cause of marine pollution or as having the potential to actively mitigate the potential impacts of anthropogenic marine pollution. This article explores how animals are constructed with respect to vessel-sourced sewage pollution. Through a process of interpretive policy analysis, drawing on media reports and responses to an Australian regulatory review process this study found that, when defending the perceived right to pollute recreational boaters implicated animals such as dogs, fish, turtles, dolphins and seabirds in their pollution discourses. Scapegoating was an important rhetorical feature of claims-making strategies designed to avoid responsibility for changing sewage disposal practices.