62 resultados para Warfare, Conventional.

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Educational researchers have long derided the university lecture as an effective mode of delivery of educational materials, but currently there are many reports on the advantages offered by computer. In this study a multimedia solution was sought to replace existing face to face lectures because it appeared to offer a close 'media versus need' match. Consequently, a decision was made to develop a design template for an interactive computer based program that would be suitable for a range of subject content. In order to personalise the instruction, a large video insert was incorporated as the main screen's most prominent design feature. From here the learner could navigate to support material including interactive simulations. The program was piloted with a small group of students and, in particular, the student tracking data that the program automatically generates yield some interesting learning style information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research into Intelligent Agent (IA) technology and how it can assist computer systems in the autonomous completion of common office and home computing tasks is extremely widespread. The use oflA's is becoming more feasible as the functionality moves Into line with what users require for their everyday computing needs. However, this does not mean that IA technology cannot be exploited or developed for use in a malicious manner, such as within an Information Waifare (IW) scenario, where systems may be attacked autonomously by agent system implem-entations. This paper will discuss tne cilrrenlStcite Ofmalicious use of lA's as well as focusing on attack techniques, the difficulties brought about by such attacks as well as security methods, both proactive and reactive, that could be instated within compromised or sensitive systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The continuing erosion of civil liberties in Western democracies, and in particular Australia, as a response to the threat of terrorist attack - the position taken that laws eroding civil liberties will ultimately fail in its attempt to combat terrorist activity while adding to human insecurity and violence - counter-terrorism measures resulting in the militarisation of law enforcement and provoking terrorism - linking counter-terrorism with globalisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is commonly assumed that solar hot water systems save energy and reduce greenhouse gas emissions. The net energy requirement of solar hot water systems has rarely been analysed, including their embodied energy. The extent to which solar hot water systems save energy compared to conventional systems in Melbourne, Australia, is shown through a comparative net energy analysis. It was shown that the embodied energy component of the net energy requirement of solar and conventional hot water systems was insignificant. The solar hot water systems provided a net energy saving compared to the conventional systems after 0.5–2 years, for electric- and gas-boosted systems respectively.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With information warfare (IW) becoming a reality, the need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. With the shift from computer security to information warfare, logical transformation models (LTMS) were looked at as a solution to quantifying information system requirements. The paper will introduce the concepts involved with fourth generational models and it's application to IW. The basic advantages and disadvantages will also be discussed and presented.