63 resultados para Security classification (Government documents)

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The research design for this paper is based on the critical need for greater emphasis by Australian arts organizations on relationship marketing as a means of achieving sustainability. Recent injections of government funds into the performing arts in Australia, to meet a "crisis" in financial viability and audience development, highlighted the dependence of arts organizations on government funds in building audiences. A hypothesis was developed through an analysis of the literature on relationship marketing, cultural economics and value measurement, and an analysis of the long-term outcomes of government strategies for the funding of arts marketing. The hypothesis is that while social intervention is acceptable (even desirable and necessary), and achieves the social goals of governments, market intervention reduces the benefits of relationship-building and the exchange of values between arts organizations and their audiences.

Analysis of government documents and primary research in audience development proved the hypothesis. Empirical research resulted in the development of a theory and model that describe the limits of market intervention and in the development of a definition of values in the continuum of government activity from social to market intervention. The model could be useful for governments in developing arts policy with regard to audiencebuilding. It could also be useful in demonstrating to arts managers that sustainability results not from government funding but rather from relationship-marketing strategies.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Using a 2 (incarceration length) × 2 (custody type) between-groups design, the present study assessed whether inmates’ perceptions of the prison social climate were influenced by their security classification and length of time they had been incarcerated. Analyses of data collected from 76 male prisoners who completed a 15-item measure of prison social climate revealed an interaction effect between length of incarceration and protective prisoner status. Those housed in protectivecustody who had been incarcerated for longer than 6 months rated the social climate significantly more positively than both protective custody prisoners incarcerated for less than 6 months and those not in protective custody. This interaction was strongest on those social climate dimensions relating to therapeutic hold and social cohesion. A univariate effect was also observed whereby protective custody prisoners, irrespective of incarceration length, reported that they experienced the environment as less safe than their mainstream (non-protective custody) counterparts.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Purpose – The aim of this study is to examine how the use of indirect government control mechanisms is used as a means of holding government agencies such as job network providers and recipients of social security benefits accountable. The mechanisms of indirect government will be examined using Michel Foucault's discourses on disciplinary power, surveillance and normalisation.

Design/methodology/approach – The mechanisms of indirect government are investigated through a survey questionnaire and focus group interviews. The questionnaire is assessed and analysed using descriptive statistics and principal component analysis with varimax rotation.

Findings – It is found that the rationing and disciplinary mechanisms of the breaching regime, through a process of disciplinary power, surveillance and normalisation, combine to help hold government agencies and recipients of social security benefits accountable, which in turn helps control the level of social security expenditure.

Originality/value – The current study extends our understanding of the functions of indirect government by providing an applied example of how the process of government works indirectly through government agencies and the abundant rules and regulations that underpin such bureaucracies.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article is devoted to experimental investigation of a novel application of a clustering technique introduced by the authors recently in order to use robust and stable consensus functions in information security, where it is often necessary to process large data sets and monitor outcomes in real time, as it is required, for example, for intrusion detection. Here we concentrate on a particular case of application to profiling of phishing websites. First, we apply several independent clustering algorithms to a randomized sample of data to obtain independent initial clusterings. Silhouette index is used to determine the number of clusters. Second, rank correlation is used to select a subset of features for dimensionality reduction. We investigate the effectiveness of the Pearson Linear Correlation Coefficient, the Spearman Rank Correlation Coefficient and the Goodman--Kruskal Correlation Coefficient in this application. Third, we use a consensus function to combine independent initial clusterings into one consensus clustering. Fourth, we train fast supervised classification algorithms on the resulting consensus clustering in order to enable them to process the whole large data set as well as new data. The precision and recall of classifiers at the final stage of this scheme are critical for the effectiveness of the whole procedure. We investigated various combinations of several correlation coefficients, consensus functions, and a variety of supervised classification algorithms.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Purpose – The purpose of this study is to explore Australian public and stakeholders views towards the regulation of the Internet and its content. The federal government called for submissions addressing their proposal, and this paper analyses these submissions for themes and provides clarity as to the Australian public and stakeholders key concerns in regards to the proposed policy. Design/methodology/approach – The paper uses a qualitative approach to analyse the public consultations to the Australian Federal Government. These documents are coded and analysed to determine negative and positive viewpoints. Findings – The research has shown, based upon the analysis of the consultation, that there was no public support for any of the measures put forward, that the Australian Federal Government in its response has not recognised this public feedback and instead has only utilised some of the qualitative feedback obtained through the public consultation process to try to justify its case to proceed with its proposals. Research limitations/implications – The study is focussed on Australia. Practical implications – The paper analyses a proposed national approach to filtering the content of the Internet and discussed the public reaction to such an approach. Social implications – The paper looks at how different parts of Australian society view Internet filtering in a positive or negative manner. Originality/value – The only study that directly looks at the viewpoint of the Australian public.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the wake of the Bali bombing the Australian government has proposed a number of national security measures that pose a real danger to human security in Australia and the region. These measures include renewed and increased military and intelligence exchanges with Indonesia, and laws that allow the Australian Security Intelligence Organization (ASIO) to detain people without charge or even suspicion in order to gather intelligence. In less emotional times these initiatives would be rejected as contrary to human rights concerns and Australia’s democratic traditions, which include the rule of law and due process protections. In the current climate, however, human rights and civil liberties are apt to be portrayed as unaffordable luxuries.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article examines the underlying fairness of applying equitable security presumptions to the deposit of title documents belonging to third parties. It argues that within such transactions, the focus of the equitable jurisdiction must be upon the intention of the owner of the title documents rather than presumptions arising from the fact of the deposit. It suggests that there is no logic in applying equitable presumptions, founded on the principles of part performance, to infer a security intention in transactions involving third party title documents. The fact that the parties to a loan advance may have intended to create a mortgage between themselves does not mean that the third party owner of the title documents also intended to create a mortgage. In third party transactions, the objectives of the equity jurisdiction are best achieved through a comprehensive assessment of the intention of all parties and the abolition of presumptions based upon the bare fact of title deposit.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Secure management of Australia's commercial critical infrastructure presents ongoing challenges to owners and the government. Currently a high-level iriformation sharing collaboration between the government and business manages complex security issues, but critical irifrastructure protection also lacks a scalable model exhibiting the overall structure of critical infrastructure at various levels, sectors and sub-sectors. This research builds on the work of Marasea and Warren (2003) to establish a representative model of Australia's critical irifrastructure; discusses the boundaries between critical infrastructures, and considers the existence andpotential irifluence ofcritical irifrastructure relationships.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt. This volume is essential reading for scholars, researchers, and practitioners interested inkeeping pace with the ever-growing field of Information Security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, we have witnessed many information security developmental trends. As a consequence, the dimensions of information security - once single disciplinary area - have become multifaceted and convoluted. This paper aims to (1) recapitulate these key developments: (2) argue that the emergence of many complex information security dimensions are the result of 'constant change agents' (CCAs); (3) discuss the implications on Australia's society, i. e. government, companies and individuals; and (4) propose key consideration areas and possible solutions thereof. We hope that the discussion presented here will position Australia to make better aligned information security and strategic plans, such as choosing appropriate investments and adopting effective solutions to strengthen and secure Australia's national information security posture.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many classification methods have been proposed to find patterns in text documents. However, according to Occam's razor principle, "the explanation of any phenomenon should make as few assumptions as possible", short patterns usually have more explainable and meaningful for classifying text documents. In this paper, we propose a depth-first pattern generation algorithm, which can find out short patterns from text document more effectively, comparing with breadth-first algorithm

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Local government in Australia is under pressure to modernize its structures in the new public management environment, as well as respond to  increasing demands from its local electorates for better delivery of services and greater levels of participation in the democratic process. This article analyzes local government’s response to these pressures through its use of information communication technologies (ICT) to execute its broad range of tasks. I begin by discussing e-governance in the light of Chadwick and May’s (2003) three basic models of interaction between the state and its citizens: managerial, consultative, and participatory. Using data collected from an analysis of 658 local government Web sites in Australia together with existing survey research, I analyze the extent to which local government sites fit into the three models. The article then concludes with a discussion of the issues and problems faced by local government in its attempt to develop e-governance, as both an extension of its administrative as well as democratic functions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article examines the results of a study conducted of the top 100 public sector units in Sweden. These units comprise 40 entities of government, 40 municipalities, and 20 county councils. The aim of the study was to examine and describe the codes of ethics in these Swedish public sector units. This research reports on the responses of 27 public sector units that possessed a code of ethics. The principal contribution of this work is a customized PUB SEC-scale to measure and evaluate the content of codes of ethics artefacts in public sector units. The PUB SEC-scale differs to a large extent from the current private sector-scales (PRlSEC-scales) in literature, due to the specific characteristics of the public sector.