21 resultados para Terrorists

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper I consider some issues that I, as a creative writer and academic, find with the concept and current understandings of the term creative industries. The subject of creative industries is not one that has been adequately teased out in relation to creative writing, even though the creative industries model has been a strong force in cultural policymaking internationally since the late 1990s. It influences policies that in turn may affect writers, especially those applying for state or national funds to resource their writing, and also writers working within the academy and attempting to gain recognition and funding for creative work there. The issues relating to creative industries are also particularly pertinent at this time in Australian universities, as the new system of research quality measurement is negotiated, and creative arts scholars, including those in creative writing, struggle to define their work in terms of those negotiations. I will argue that the recent work of Paul Carter looks towards ways in which creative industries may be more inclusive and useful for the creative arts, including creative writing, and suggest that a reclaimed term, creative ecologies, indicates a good way of taking creative industries into the future.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Terrorist groups are in theory currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber arena to coordinate cyber based attacks. This paper examines a proposed cyber-terrorism SCADA risk framework concept. The paper proposes a conceptual framework which is designed to measure and protect the threat of cyber-terrorism against SCADA systems within Australia. The findings and results of a focus group will be examined to help validate the framework concept.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and
Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry adoption and acceptance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to investigate the level and nature of criminal abuse of financial products that are classified as posing a low anti-money laundering/combating of financing of terrorists (AML/CFT) risk in South Africa to determine the effectiveness of the simplified due diligence measures that apply to these products.

Design/methodology/approach – The paper presents empirical research on the views of bank officials and law enforcement officials regarding the criminal abuse of South African financial products that are subject to simplified customer due diligence controls.

Findings – South Africa's AML/CFT laws allow certain deposit-taking institutions and money remitters to implement simplified customer due diligence measures in relation to specific low-risk products that are mainly designed to allow previously unbanked persons to access financial services. The paper finds that the products have been abused by criminals but that the incidence of such abuse and the amounts involved are low. The paper investigates possible weaknesses in the current system that allow limited criminal abuse to occur. It concludes with a number of guidelines that emerge from the study and are of value to regulators that wish to implement a similar system.

Originality/value –
The South African AML/CFT scheme in relation to low-risk products is of interest to many international regulators that are grappling with the interplay between effective AML/CFT controls and the impact of strict controls on the ability of socially and economically excluded persons to access appropriate financial services. This paper provides evidence that appropriately designed controls can facilitate financial inclusion while limiting the risk of criminal abuse.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to  coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems.

This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group is presented in support of the developed framework for SCADA industry adoption and acceptance.