10 resultados para high security
em University of Queensland eSpace - Australia
Resumo:
Twenty-seven patients undergoing treatment in a high-secure forensic facility participated in focus group interviews to elicit their perceptions of (1) the factors leading to aggressive behaviour; and (2) strategies to reduce the risk of such behaviour. The focus group interviews were audiotaped, transcribed and analysed using content analysis. The participants identified that a combination of patient, staff and environmental factors contributed to violence in the study wards. The cause of aggressive behaviour centred around five major themes: the environment; empty days; staff interactions; medication issues; and patient-centred factors. Potential strategies identified by patients to reduce aggressive behaviour included: early intervention; the provision of meaningful activities to reduce boredom; separation of acutely disturbed patients; improved staff attitudes; implementation of effective justice procedures; and a patient advocate to mediate during times of conflict. Findings suggested that social and organizational factors need to be addressed to change the punitive subculture inherent in forensic psychiatric facilities, and to ensure a balance between security and effective therapy.
Resumo:
This article provides an analysis of the policy and practice of prisoner rehabilitation in Queensland, and the extent to which they accord with international best practice. Actual practice was identified through interviews and written submissions from 20 ex-prisoners and 18 prisoner service providers (including two past staff members from Queensland prisons), as well as through an examination of reported judicial review decisions and Department of Corrective Services statistics. The results demonstrate that although the legislation and procedures suggest that a best practice system of prisoner rehabilitation exists in Queensland, there is a significant gulf between policy and practice. Far from being sufficiently prepared for release, Queensland prisoners are generally released directly from high security facilities into a community which they have great difficulty reintegrating into. The results suggest that the corrective services system in Queensland is not succeeding in fulfilling its primary purpose, 'correction', or in meeting its well-publicised goal of ensuring community safety.
Resumo:
The relative merits of different systems of property rights to allocate water among different extractive uses are evaluated for the case where variability of supply is important. Three systems of property rights are considered. In the first, variable supply is dealt with through the use of water entitlements defined as shares of the total quantity available. In the second, there are two types of water entitlements, one for water with a high security of supply and the other a lower security right for the residual supply. The third is a system of entitlements specified as state-contingent claims. With zero transaction costs, all systems are efficient. In the realistic situation where transaction costs matter, the system based on state-contingent claims is globally optimal, and the system with high-security and lower security entitlements is preferable to the system with share entitlements.
Resumo:
Many people who go to gaol are mentally ill. Remandees, prisoner receptions or people in jails have a substantially higher rate of severe mental disorder than other prisoners and the general population. There are no completely satisfactory ways to screen for psychosis and few existing screening questionnaires are available for use in correctional establishments. The Screening Instrument for Psychosis (PS) was developed in the context of the Australian Mental Health Survey: Study of Low Prevalence Disorders. It can help indicate whether a person should be referred to mental health professional for a diagnostic evaluation and possible treatment and/or diversion. We trialled the PS in a high security remand and reception centre. Measures of validity and reliability are reported. (c) 2006 Published by Elsevier Inc.
Resumo:
Streaming video application requires high security as well as high computational performance. In video encryption, traditional selective algorithms have been used to partially encrypt the relatively important data in order to satisfy the streaming performance requirement. Most video selective encryption algorithms are inherited from still image encryption algorithms, the encryption on motion vector data is not considered. The assumption is that motion vector data are not as important as pixel image data. Unfortunately, in some cases, motion vector itself may be sufficient enough to leak out useful video information. Normally motion vector data consume over half of the whole video stream bandwidth, neglecting their security may be unwise. In this paper, we target this security problem and illustrate attacks at two different levels that can restore useful video information using motion vectors only. Further, an information analysis is made and a motion vector information model is built. Based on this model, we describe a new motion vector encryption algorithm called MVEA. We show the experimental results of MVEA. The security strength and performance of the algorithm are also evaluated.
Resumo:
We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.
Resumo:
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.
Resumo:
Grid computing is an emerging technology for providing the high performance computing capability and collaboration mechanism for solving the collaborated and complex problems while using the existing resources. In this paper, a grid computing based framework is proposed for the probabilistic based power system reliability and security analysis. The suggested name of this computing grid is Reliability and Security Grid (RSA-Grid). Then the architecture of this grid is presented. A prototype system has been built for further development of grid-based services for power systems reliability and security assessment based on probabilistic techniques, which require high performance computing and large amount of memory. Preliminary results based on prototype of this grid show that RSA-Grid can provide the comprehensive assessment results for real power systems efficiently and economically.
Resumo:
Security protocols are often modelled at a high level of abstraction, potentially overlooking implementation-dependent vulnerabilities. Here we use the Z specification language's rich set of data structures to formally model potentially ambiguous messages that may be exploited in a 'type flaw' attack. We then show how to formally verify whether or not such an attack is actually possible in a particular protocol using Z's schema calculus.