16 resultados para Private security

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to the poor reputation of the private security industry and the multiple lines of concerns raised by scholars over the potentially corrosive costs of commercial security provision, it is important to consider whether for-profit companies are a welcome addition to the network of actors who respond to the needs of domestic violence victims. Using the case study of ‘Protective Services’ in Victoria, Australia, who appear to be one of the first known instances of a private security company offering services to victims of domestic violence, we argue that there may be advantages for victims engaging with commercial providers and reasons for optimism that commercial outfits can improve feelings of safety for a particularly vulnerable and underprotected population.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Over the past two decades private and hybrid forms of policing have grown considerably in Australia. As a result, governments have begun to recognize the role played by non-state police agencies and personnel in the provision of public order and safety, further extending and legitimizing non-state policing. In addition, the private ownership of critical infrastructure and 'communal spaces' has led to a central role for non-state police in the area of 'high policing' counter-terrorism. In response to changes to the auspices and providers of policing, state police were beginning to explore new ways of working with private and hybrid forms of policing, with the emergence of a new type of experiment in policing partnerships, the Police-Private Security Committee (POLSEC). This paper examines these trends and implications for ongoing developments in Australian policing.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In Kurunavanua (the trembling of the earth) Bolatagici investigates representations of Pacific Island masculinity, Fiji and the economy of war. Her ongoing research is concerned with neo-colonial encounters between the US, Australia, Britain and Pacific Island nations. This exhibition is informed by research into the exploitation of the Pacific by comparing the participation of Fijian soldiers in the nuclear tests at Christmas Island in the 1950s to the current recruitment of Fijians to work for Private Security Military Companies in the Middle East.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Fijian bodies have become a valuable commodity in the economy of war. Remittances from workers overseas are Fiji’s largest income – exceeding that of tourism and sugar export. This essay examines historical and contemporary representations of the black male body that perpetuate the exploitation of Fijians by inscribing the Fijian male body as warrior, criminal and protector. Taking a multidisciplinary approach informed by sociology, cultural theory, Pacific studies, visual culture, feminist and post-colonial theory, my practice is the vehicle through which I address issues of neocolonial commodification of Fijian bodies. Through an analysis of my own staged photographs and vernacular images taken by Fijians working for private security military companies and British and US armies, I hope to challenge audiences to consider their own perceptions of Fijian agency and subjectivity. By theorising the politicisation of the black body and interrogating colonial representations of blackness, I argue that we can begin to create links between the historical and contemporary exploitation of Fijians and that at the essence of both is an underlying racial hierarchy and economic requirement for cheap and, arguably, expendable labour.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Bolatagici has a strong interest in the symbolic aspects of traditional Fijian mat weaving and its ceremonial importance for various stages of the life cycle. This work draws from online archives of Fijian military and private security workers posted in social media. The faces are pixelated to obscure identities, and in this process they become a visual reference to woven patterns. On the other side of the screen we see a woman's hands weaving a portrait of a soldier together, as she tries to make someone or something visible again. Yet the image of the face is never completed.; it remains unresolved and the identity unknown.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mixed-media, Fijian barkcloth (masi), screenprint, digital photographic prints, Fijian wooden comb all exhibited in the exhibition Meleponi Pasifika.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The lived experience of the soldier has long been the subject of artistic inquiry and scholarly analysis. In this paper I reflect on my own art practice and research into Fijian military embodiment and the ways that Fijian soldiers and private security workers negotiate a liminal space between embodied indigenous knowledge (presence) and somaesthetic military practice (absence). As Maltby and Thornham (2012, 37) explain, “the dual articulation of the body constructs multiple understandings of it as simulta- neously lived and imagined, public and private, present and absent, experienced and represented”. I broaden these ideas around visibility/invisibility and the absence and presence of the military body through an analysis of key works by contemporary artists Lisa Barnard and Suzanne Opton.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

All Australian governments are committed to the establishment of a  comprehensive, adequate and representative system of conservation  reserves. Many of the most threatened species and communities throughout Australia occur mainly or wholly on private land. A range of mechanisms has been developed to achieve conservation on private land. This article  assesses the legal security, permanence and management intent of such mechanisms in Victoria, in relation to protected area criteria. The  implications of this analysis for the Australian National Reserve System and landowners with these mechanisms on their properties are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The importance of effective multilateral security networks is widely recognised in Australia and internationally as being essential to facilitate the large-scale sharing of information required to respond to the threat of terrorism. Australian national security agencies are currently constructing networks in order to bring the diverse national and international security agencies together to achieve this. This paper examines this process of security network formation in the area of critical infrastructure protection, with particular emphasis on airport security. We address the key issues and factors shaping network formation and the dynamics involved in network practice. These include the need for the networks to extend membership beyond the strictly defined elements of national security; the integration of public and private ‘nodes’ in counter-terrorism ‘networks’; and the broader ‘responsibilisation’ of the private sector and the challenges with ‘enabling’ them in counter-terrorism networks. We argue that the need to integrate public and private agencies in counter-terrorism networks is necessary but faces considerable organisational, cultural, and legal barriers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent times, Virtual Worlds such as Second Life have generated substantial publicity due to the participation of Fortune 500 companies, and other public and private organisations. As practitioners continue to discuss how organisations could derive business value from Virtual Worlds, new security and ethical issues in Virtual Worlds have emerged to challenge Virtual World users and stakeholders. This paper discusses privacy, intellectual property and a host of other security and ethical issues in Virtual Worlds. It contributes to practice and research by (i) providing insight into emerging security and ethical issues in Virtual Worlds, (ii) analysing the implication of these issues, within and beyond Virtual Worlds, and (iii) raising awareness on security and ethics among Virtual World users and stakeholders.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Research has shown that data security has always been an important aspect of quality of service for data service providers; but cloud computing poses new and challenging security threats. The most common security concerns for users of cloud storage are data confidentiality, integrity and availability. Microsoft has considered these concerns and responded with the Azure virtual private storage based on Searchable Encryption. Amazon has also responded to these security issues with its Amazon Web Services. In this paper, we investigate and compare in depth the features of Microsoft Azure and Amazon Web Services deemed to provide security with a particular focus on confidentiality, integrity and availability of data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Android is a new generation of an open operating system directed at mobile devices that are carried every day. The openness of this architecture is leading to new applications and opportunities including a host of multimedia services, new interfaces and browsers, multitasking including support for wireless local, personal and wide area networking services. Security with mobility and wireless connectivity thus becomes even more important with all these exciting developments. Vital security issues such as leakage of private information, file stealing and spambots abound in networks in practice and Android networks continue to be subject to these same families of vulnerabilities. This paper provides a demonstration of such vulnerabilities in spite of the best efforts of designers and implementers. In particular it describes examples of data leakage and file stealing (address books, contact lists, SMS messages, pictures) as well as demonstrating how Android devices can create spambots. © 2013 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

 Mobile platform security solution has become especially important for mobile computing paradigms, due to the fact that increasing amounts of private and sensitive information are being stored on the smartphones' on-device memory or MicroSD/SD cards. This paper aims to consider a comparative approach to the security aspects of the current smartphone systems, including: iOS, Android, BlackBerry (QNX), and Windows Phone.