106 resultados para IT security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The dynamic nature of threats and vulnerabilities within the e-business environment can impede online functionality, compromise organisational or customer information, contravene security implementations and thereby undermine online customer confidence. To negate these problems, e-business security has to become proactive, by reviewing and continuously improving security to strengthen e-business security measures and policies. This can be accomplished through benchmarking the security measures and policies utilised within the e-business, against recognised Information Technology (IT) and Information Security (IS) security standards.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Economic factors are important determinants of food security. In terms of food access, financial resources determine an individual’s ability to procure food; on the supply side, the cost of food is equally important. The interplay of these two factors, financial resources and cost, is perhaps the most immediate and important determinant of what people do (or do not) put into their shopping trolleys or purchase at the takeaway and ultimately eat – if you cannot afford it you cannot eat it even if you want to!

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The advancement in Internet and bandwidth has resulted in a number of new applications to be developed. An area of advancement has been in the development of virtual worlds, where people can interact together via virtual characters. Virtual World systems have been so complex that virtual lives can be lived, including all aspect of life such as education, commerce, social activities etc. Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism and terrorism, also exist in the virtual worlds. The more developed these virtual worlds become the greater the breaches of security will be in the virtual as well as the real world.This paper explores and categorises several security issues within the Virtual World of Second Life. It contributes to practice and research by emphasising the importance of security awareness for businesses and the general public in Virtual Worlds.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information security is portrayed as a global problem that impacts all countries that are considered as part of the Information Society. Recent surveys show that there are increased concerns about computer crime. The paper will focus upon recent national security surveys from Australia and New Zealand and the trends that this research shows. Is it fair to assume the security practices are the same all over the world? The paper looks at security practices from a number of different countries perspectives and shows that security practices are not generic and vary from country to country. The paper will also evaluate the worth that National Security Surveys have in the field of Information Security Surveys.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While there is considerable evidence about the prevalence of student alcohol use, little empirical work has examined the range and level of exposure to alcohol-related risks facing student populations, and the views of key stakeholders about these. This study was conducted at a large multi-campus university in order to gauge the scale and severity of students’ alcohol-related problems, and ways in which these may be mitigated. Student perspectives on campus based policy making with respect to alcohol were also canvassed. This study utilised a range of evaluative instruments, including standardised questionnaire protocols, structured interviews and focus groups. Data gained from students showed a large level of exposure to alcohol-related harm, and staff informants reported student harms such as drink-driving, interpersonal aggression, social nuisance, inadequate security, sexually risky behaviour, and physical malaise. As a group, students seem receptive to campus-based policies that have a harm reduction focus, but are less supportive of institutionalised measures aimed at the student body. Given the divergence of views about the harms arising from student drinking, and a general repudiation of institutional policy measures which may lessen these, the development of harm-reducing policy on alcohol remains challenging.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Traditional approaches such as theorem proving and model checking have been successfully used to analyze security protocols. Ideally, they assume the data communication is reliable and require the user to predetermine authentication goals. However, missing and inconsistent data have been greatly ignored, and the increasingly complicated security protocol makes it difficult to predefine such goals. This paper presents a novel approach to analyze security protocols using association rule mining. It is able to not only validate the reliability of transactions but also discover potential correlations between secure messages. The algorithm and experiment demonstrate that our approaches are useful and promising.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

International arbitrations can be conducted under either federal or State legislation in Australia. In both cases complexities arise in the resolution of procedural questions, such as whether security for costs can be granted. There is scant Australian case law on such issues. This article considers whether an arbitral tribunal or a court has the power [*2] to order security for costs in an international arbitration in Australia. After analysing Australia's international arbitration laws and discussing New Zealand and House of Lords' authority, it is argued that unless the parties have specifically empowered the arbitral tribunal to order security for costs, only the relevant court has that power, and even that is uncertain.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security protocol analysis has been discussed for quite some time in the past few years. Although formal methods have been widely used to identify various vulnerabilities, mainly susceptibility to freshness attacks and impersonation, the arisen inconsistent data between principals and collusion attacks held by a group of dishonest principals have been largely ignored. Moreover, the previous methods focus on reasoning about certain security-related properties and detecting known attacks against secure message, whereas there have been insufficient efforts to handle the above hidden but powerful attacks. In this paper, we address these critical issues and prove the efficiency and intuitiveness of rule-based dependency models in defending a protocol against the attacks. This is able to provide a numerical estimation to measure he occurrence of these attacks. It will be useful in enhancing the current protocol analysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent times, Virtual Worlds such as Second Life have generated substantial publicity due to the participation of Fortune 500 companies, and other public and private organisations. As practitioners continue to discuss how organisations could derive business value from Virtual Worlds, new security and ethical issues in Virtual Worlds have emerged to challenge Virtual World users and stakeholders. This paper discusses privacy, intellectual property and a host of other security and ethical issues in Virtual Worlds. It contributes to practice and research by (i) providing insight into emerging security and ethical issues in Virtual Worlds, (ii) analysing the implication of these issues, within and beyond Virtual Worlds, and (iii) raising awareness on security and ethics among Virtual World users and stakeholders.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Summary: "In the wake of the September 11 and subsequent terrorist attacks, the academic and media commentaries on Islam the religion and Islam the basis for political ideology haves received an unprecedented high level of exposure and attention. The acts of political violence by extremist groups and the omnipresent war on terror have added fresh uncertainties to an already complex global order. Just as terrorism and counter-terrorism are locked in a mutually re-enforcing symbiosis, the sense of insecurity felt by Muslims and non-Muslims alike is mutually dependent and has the potential to escalate. This general assessment holds true for Muslims living in the Muslim world and beyond. The pervasive sense of being under attack physically and culturally by the United States and its allies has contributed to a growing unease among Muslims and re-enforced deep-seated mistrust of the ʻWestʼ. Public articulation of such misgivings has in turn, lent credence to Western observers who posit an inherent antipathy between the West and the Muslim world. The subsequent policies that have emerged in this context of fear and mutual distrust have contributed to the vicious cycle of insecurity. The present volume is anchored in the current debates on the uneasy and potentially mutually destructive relationship between the Muslim world and certain West countries. It brings together leading international scholars in this interdisciplinary field to deal with such inter-related questions as the nature of Islamism, the impact of the ʻwar on terrorʼ on the spread of militancy, the growing sense of being under siege by Muslim Diasporas and the many unintended ramifications of a security-minded world order. This volume deliberately focuses on these issues both at a broad theoretical level but more importantly in the form of a number of prominent case studies including Indonesia, Algeria and Turkey."--Publisher description.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objective : Food Security has become a global concern, yet its measurement has varied considerably across disciplines and countries. We examined the current discrepancies in the definitions of food security and propose a framework for understanding and measuring food security.

Methods : This conceptual review draws from a range of works published in Medline and the gray literature to advance the understanding of food security concepts. We begin by examining the historical background of food security and then move on to examine its various definitions and interpret food through cultural lenses in terms of food access and utilization. We finish by examining various measurements and indicators of food security and reviewing implications for public health.

Results : We argue that the reliance on coping strategies as surrogate measurements of food insecurity without taking into account the social, cultural, and political contexts in which they occur is misleading, and viewing food insecurity solely from a food access or availability perspective, without taking into account food utilization and asset creation as pillars of food security, paints an incomplete picture. Although this review does not claim to provide solutions to the discrepancies in the conceptual definition of food security, it attempts to highlights areas of concern and provide a way forward.

Conclusion : When coping strategies are used as an indicator of food insecurity, they need to be culturally relevant and focus tested, and together with objective measurements of nutritional outcomes, would allow policy makers to make evidence-based decisions to inform social and nutrition policies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the emergent security risk that information warfare poses to critical infrastructure systems, particularly as governments are increasingly concerned with protecting these assets against attack or disruption. Initially it outlines critical infrastructure systems and the notion of information warfare. It then discusses the potential implications and examining the concerns and vulnerabilities such cyber attacks would pose, utilising exemplar online attack occurrences. It then examines the current Australian situation before suggesting some considerations to mitigate the potential risk that information warfare poses to critical infrastructure systems, and by association: government, industry and the wider community.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The advancement in Internet and bandwidth has resulted in a number of new applications to be developed; many of these newer applications are described as being Web 2. A web 2 application such as Facebook has allowed people around the world to interact together. One of the interesting aspects of Facebook is the use of third parties applications and the interactions that this allows.

Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism also exist in online environment, and Web 2 applications are not exception to these issues. This paper explores and categorises several security issues within the Facebook environment. It contributes to practice and research by emphasising the importance of security awareness for businesses and the general public in the use of Web 2 applications such as Facebook.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

he prominence of global warming as an environmental issue has illustrated the close relationship between natural resources, ecosystems and global security. Whilst environmental decision making often uses techniques such as economic valuation and risk management, the security component is often not considered, at least not from a security analyst’s perspective. Yet environmental security considerations can be global, regional and/or national in impact. Environmental change and policy can effect human health and well being as well as initiating conflict; it can affect the existence of life itself. These aspects are firmly in the domain of the security discipline although the protection of the global ecosystem has not traditionally been considered by those who create security policy. The idea of environmental/ecological security ranges from the eco-centric approach which examines the impact of human activities that impact on the security of the natural systems to the more traditional anthropocentric perspectives that look at varied issues such as conflict caused by natural resource competition and environmental degradation, and the greening of military operations. This paper will assert that the inclusion of the security factor in policy creation and environmental assessments is essential to give richer solutions to these complex socio-economic and ecological situations. Systems theory over the last few decades has emphasised the inclusion of as many perspectives on messy problems as possible to provide truly systemic outcomes. It is posited that the addition of such concepts as threat analyses will produce more effective and sustainable outcomes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis presents a comparative analysis of Australian and New Zealand foreign policy in the Pacific with particular emphasis on the Bougainville and Solomon Islands peace interventions. Through a constructivist lens, it argues that New Zealand's policies have been more effective and culturally appropriate than Australia's in recent years.