863 resultados para critical infrastructure security
Resumo:
Modern trains with different axle configurations, speeds and loads are used in railway networks. As a result, one of the most important questions of the mangers involved in bridge managements systems (BMS) is how these changes affect the structural behavior of the critical components of the railway bridges. Although researchers have conducted, many investigations on the dynamic effects of the moving loads on bridges, the influence of the changes in the speed of the train on the demand by capacity ratios of the different critical components of the bridge have not yet been properly studied. This study is important, because different components with different capacities and roles for carrying loads in the structure may be affected differently. To investigate the above phenomenon in this research, a structural model of a simply supported bridge is developed. It will be verified that the dynamic behavior of this bridge is similar to a group of railway bridges in Australia. Demand by capacity ratios of the critical components of the bridge, when it is subjected to a train load with different speeds will be calculated. The results show that the effect of increase or decrease of speed should not be underestimated. The outcome is very significant as it is contrary to what is currently expected, i.e. by reducing the speed of the train, the demand by capacity ratio of components may increase and make the bridge unsafe for carrying live load.
Resumo:
Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record systems. Among these are the perceived threats to the security and privacy of patients’ health data, and a widely held belief that these cannot be adequately addressed. We hypothesise that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone. Human dimensions must be considered when analysing the provision of the three fundamental information security goals: confidentiality, integrity and availability. A sociotechnical analysis to establish the information security and privacy requirements when designing and developing a given eHealth system is important and timely. A framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system. Successful implementation of this approach would enable the possibilities, practicalities and sustainabilities of proposed eHealth systems to be realised.
Resumo:
The development of toll roads in Indonesia started around 1978. Initially, the management and development of toll roads sat directly under the Government of Indonesia (GoI) being undertaken through PT JasaMarga, a state owned enterprise specifically established to provide toll roads. Due to the slow growth and low capability of toll roads to fulfil infrastructure needs in the first ten years of operation (only 2.688kms/year), GoI changed its strategy in 1989 to one of using private sector participation for roads delivery through a Public Private Partnership (PPP) scheme. In this latter period, PT JasaMarga had two roles, both as regulator on behalf of the private sector as well as being the operator. However, from 1989 to 2004 the growth rate of toll roads actually decreased further to 2.300kms/year. Facing this challenge of low growth rate of toll roads, in 2004GoI changed the toll road management system and the role of regulator was returned to the Government through the establishment of the Toll Road Regulatory Agency (BPJT). GoI also amended the institutional framework to strengthen the toll road management system. Despite the introduction of this new institutional framework, the growth of toll roads still showed insignificant change. This problem in toll road development has generated an urgent need for research into this issue. The aim of the research is to understand the performance of the new institutional framework in enhancing PPP procured toll road development. The methodology of the research was to undertake a questionnaire survey distributed to private sector respondents involved in toll road development. The results of this study show that there are several problems inherent in the institutional framework, but the most significant problem comes from the uncertainty of the function of the strategic executive body in the land expropriation process.
Resumo:
Highway infrastructure development typically requires major capital input. Unless planned properly, such requirements can cause serious financial constraints for investors. The push for sustainability adds a new dimension to the complexity of evaluating highway projects. Finding environmentally and socially responsible solutions for highway construction will improve its potential for acceptance by the society and in many instances the infrastructure's life span. Even so, the prediction and determination of a project's long-term financial viability can be a precarious exercise. Existing studies in this area have not indicated details of how to identify and deal with costs incurred in pursuing sustainability measures in highway infrastructure. This paper provides insights into the major challenges of implementing sustainability in highway project development in terms of financial concerns and obligations. It discusses the results from recent research through a literature study and a questionnaire survey of key industry stakeholders involved in highway infrastructure development. The research identified critical cost components relating to sustainability measures based on perspectives of industry stakeholders. All stakeholders believe sustainability related costs are an integral part of the decision making. However, the importance rating of these costs is relative to each stakeholder's core business objectives. This will influence the way these cost components are dealt with during the evaluation of highway investment alternatives and financial implications. This research encourages positive thinking among the highway infrastructure practitioners about sustainability. It calls for the construction industry to maximise sustainability deliverables while ensuring financial viability over the life cycle of highway infrastructure projects.
Resumo:
Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.
Resumo:
The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.
Resumo:
Railway Bridges deteriorate over time due to different critical factors including, flood, wind, earthquake, collision, and environment factors, such as corrosion, wear, termite attack, etc. In current practice, the contributions of the critical factors, towards the deterioration of railway bridges, which show their criticalities, are not appropriately taken into account. In this paper, a new method for quantifying the criticality of these factors will be introduced. The available knowledge as well as risk analyses conducted in different Australian standards and developed for bridge-design will be adopted. The analytic hierarchy process (AHP) is utilized for prioritising the factors. The method is used for synthetic rating of railway bridges developed by the authors of this paper. Enhancing the reliability of predicting the vulnerability of railway bridges to the critical factors, will be the significant achievement of this research.
Resumo:
For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.
Resumo:
The growing importance of logistics in increasingly globalised production and consumption systems strengthens the case for explicit consideration of the climate risks that may impact on the operation of ports in the future, as well as the formulation of adaptation responses that act to enhance their resilience. Within a logistics chain, seaports are functional nodes of significant strategic importance, and are considered as critical gateways linking local and national supply chains to global markets. However, they are more likely to be exposed to vagaries of climate-related extreme events due to their coastal locations. As such, they need to be adaptive and respond to the projected impacts of climate change, in particular extreme weather events. These impacts are especially important in the logistics context as they could result in varying degrees of business interruption; including business closure in the worst case scenario. Since trans-shipment of freight for both the import and export of goods and raw materials has a significant impact on Australia’s sustained economic growth it was considered important to undertake a study of port functional assets, to assess their vulnerability to climate change, to model the potential impacts of climate-related extreme events, and to highlight possible adaptation responses.
Resumo:
Disproportionate representation of males and females in science courses and careers continues to be of concern. This article explores gender differences in Australian high school students’ perceptions of school science and their intentions to study university science courses. Nearly 3800 15-year-old students responded to a range of 5-point Likert items relating to intentions to study science at university, perceptions of career-related instrumental issues such as remuneration and job security, self-rated science ability and enjoyment of school science. Australian boys and girls reported enjoying science to a similar extent, however boys reported enjoying it more in relation to other subjects than did girls, and rated their ability in science compared to others in their class more highly than did girls. There was no significant difference between the mean responses of girls and boys to the item “It is likely I will choose a science-related university course when I leave school” and the strongest predictors of responses to this item were items relating to students’ liking for school science and awareness from school science of new and exciting jobs, followed by their perceived self-ability. These results are discussed in relation to socio-scientific values that interact with identity and career choices, employment prospects in science, and implications for science education.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.
Resumo:
E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.
Resumo:
Access to clean water is essential for human life and a critical issue facing much of modern society, especially as a result of the 21st Century triad of challenges – population growth, resource scarcity and pollution – which contribute to the rising complexity of providing adequate access to this essential resource for large parts of society. As such, there is now an increasing need for innovative solutions to source, treat and distribute water to cities across the globe. This position paper explores biomimicry – emulating natural form, function, process and systems – as an alternative and sustainable design approach to traditional water infrastructure systems. The key barriers to innovations such as biomimicry are summarised, indicating that regulatory and economic grounds are some of the major hindrances to integrating alternative design approaches in the water sector in developed countries. This paper examines some of the benefits of moving past these barriers to develop sustainable, efficient and resilient solutions that provide adequate access to water in the face of contemporary challenges.
Resumo:
In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect criticalnational infrastructure and critical information infrastructure. In particular,this protection is crucial for the proper functioning of a modern society and for a government to fulfill one of its most important prerogatives – namely, the protection of its people. Computer networks have many benefits that governments, corporations, and individuals alike take advantage of in order to promote and perform their duties and roles. Today, there is almost complete dependence on private sector telecommunication infrastructures and the associated computer hardware and software systems.1 These infrastructures and systems even support government and defense activity.2 This Article discusses possible attacks on critical information infrastructures and the government reactions to these attacks.