181 resultados para cyber-terrorism


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent thinking on globalization places risk at the centre of contemporary life. Yet what if our perception of risk is misplaced? What if the greatest risk is not terrorism itself but the conditions that allow terrorism to flourish? This fascinating book illustrates that elevated perceptions of terrorism-related risks are having a deleterious impact on many societies, exacerbating feelings of exclusion among individuals and groups. Via their exploration of various societies, the expert contributors show that as a causal factor of terrorism, social exclusion can be remedied by inclusive, participatory and deliberative measures. They prescribe a recalibration of counter-terrorism policies to unite rather than divide multicultural societies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the surge of scholarly interest in terrorism and counter-terrorism in the post-9/11 world, surprisingly little attention has been paid to the role of religious actors (especially faith communities and faith leaders) in combating the threat of terrorism. However, the resurgence of religiosity in contemporary politics should not be viewed as an inherently dangerous force. As Appleby has argued, a new secular-religious model of inter and intra-state diplomacy looms as a development with significant potential to resolve conflict and deny terrorist groups access to communities of support. By drawing on an Australian example, we argue that in societies that have a strong multicultural and multifaith character secular-religious diplomacy pitched at the national and sub-national level can play an important role in the formation of a flexible long-term counterterrorism strategy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Operating systems and programmes are more protected these days and attackers have shifted their attention to human elements to break into the organisation's information systems. As the number and frequency of cyber-attacks designed to take advantage of unsuspecting personnel are increasing, the significance of the human factor in information security management cannot be understated. In order to counter cyber-attacks designed to exploit human factors in information security chain, information security awareness with an objective to reduce information security risks that occur due to human related vulnerabilities is paramount. This paper discusses and evaluates the effects of various information security awareness delivery methods used in improving end-users’ information security awareness and behaviour. There are a wide range of information security awareness delivery methods such as web-based training materials, contextual training and embedded training. In spite of efforts to increase information security awareness, research is scant regarding effective information security awareness delivery methods. To this end, this study focuses on determining the security awareness delivery method that is most successful in providing information security awareness and which delivery method is preferred by users. We conducted information security awareness using text-based, game-based and video-based delivery methods with the aim of determining user preferences. Our study suggests that a combined delivery methods are better than individual security awareness delivery method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using ships to transport illicit drugs is not new; nor is the practice of concealing them
in shipping containers decreasing – or is it? This article questions whether recent container security initiatives created to stop terrorism have also achieved a decrease in the use of containers for smuggling illicit drugs. Or, are these maritime security regimes creating a false sense of achievement, being too limited in scope to be truly useful in this secondary role? Logically, improved detection of illicit drugs in containers shipped by sea is more likely when port personnel are better trained, x-ray scanners installed, port fencing improved and official collaboration encouraged. However, since the number of containers being electronically screened and physically searched has only marginally improved, the question is, is it enough?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We are witnessing numerous cyber attacks every day, however, we do not see many cyber criminals are brought to justice. One reason is that it is technically hard to identify and trace cyber criminals. One reason for this passive situation is our limited or even inappropriate understanding of the cyber space. In this paper, we survey the challenges and opportunities in this research field for interested readers. We also list promising tools and directions based on our understanding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While Timothy McVeigh—the Oklahoma City Bomber—made no verbal statement before being executed in 2001, he did offer as his ‘final written statement’ a poem (without attribution): W.E. Henley’s ‘Invictus’. This paper offers a reading of this text as ‘Timothy McVeigh’s “Invictus”’, a limit case for our understanding of poetry, quotation, and the relationship between literary and non-literary discourses. The paper will demonstrate how McVeigh’s enigmatic act of appropriation produces a poetry of the uncanny, so that categories such as ‘poet’ and ‘terrorist’ become disquietingly porous. It will also demonstrate how ‘Timothy McVeigh’s “Invictus”’ offers unexpected insights into some basic concerns of contemporary literary theory, especially with regard to quotation, obscurity, and poetic address. Lastly, it will show how ‘Timothy McVeigh’s “Invictus”’ illustrates the unpredictable ways that a supposedly marginal cultural practice—poetry—can act in times of crisis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: The development of new diagnostic technologies for cerebrovascular diseases requires an understanding of the mechanism behind the growth and rupture of cerebral aneurysms. To provide a comprehensive diagnosis and prognosis of this disease, it is desirable to evaluate wall shear stress, pressure, deformation and strain in the aneurysm region, based on information provided by medical imaging technologies. Methods: In this research, we propose a new cyber-physical system composed of in vitro dynamic strain experimental measurements and computational fluid dynamics (CFD) simulation for the diagnosis of cerebral aneurysms. A CFD simulation and a scaled-up membranous silicone model of a cerebral aneurysm were completed, based on patient-specific data recorded in August 2008. In vitro blood flow simulation was realized with the use of a specialized pump. A vision system was also developed to measure the strain at different regions on the model by way of pulsating blood flow circulating inside the model. Results: Experimental results show that distance and area strain maxima were larger near the aneurysm neck (0.042 and 0.052), followed by the aneurysm dome (0.023 and 0.04) and finally the main blood vessel section (0.01 and 0.014). These results were complemented by a CFD simulation for the addition of wall shear stress, oscillatory shear index and aneurysm formation index. Diagnosis results using imaging obtained in August 2008 are consistent with the monitored aneurysm growth in 2011. Conclusion: The presented study demonstrates a new experimental platform for measuring dynamic strain within cerebral aneurysms. This platform is also complemented by a CFD simulation for advanced diagnosis and prediction of the growth tendency of an aneurysm in endovascular surgery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The long-standing Patani Muslim separatist resistance of Southern Thailand is not one that is well known, and its contemporaneous spill over onto the Internet even less so. The more radical Patani online propaganda is in fact symptomatic of the relocation of the struggle within the sphere of influence of global jihadism, distancing itself from the ethno-nationalism characteristic of a previous generation of fighters. New media propaganda, in particular Jihad 2.0, has opened a new sphere of influence to the Patani neojihadist movement, allowing the militants to expand their propaganda campaign to a wider audience, while reaching out to a younger Melayu public. While Jihad 2.0 has presented the resistance movement with new ways to diffuse its message, in a more innovative and appealing manner, it also has enabled it to engage with its audiences more interactively. Because the message is no longer linear, anyone can contribute to the dialectics of the struggle, which in fine results in the alteration and reshaping of its ideological discourse in unprecedented directions. Arguably the ‘glocalisation’ of Islamophobia within Thai culture has resulted in the alteration of the Thai cultural stereotype of the Muslim khaek ‘Other’, transforming the khaek into an evil violent Muslim, both in real and virtual worlds. This further leads to discriminatory attitudes and behaviours towards Muslims, which causes the hardening of the views of the online Patani community of support towards the Thais and possibly its radicalisation.