909 resultados para Notions of security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 2004, the discourse of ‘legacy’ was woven into the constitutional fabric of the International Olympic Committee (IOC). Bidding for Olympic events is now premised on procuring post-event legacies that will resonate through local communities and host countries long after the flame is extinguished. Given vast expenditures in security, policing, and emergency management operations at major sporting events, it is notable that the IOC and its official partners have disproportionately under-represented security and policing legacies. This paper addresses research into security and policing legacies of major events by turning much needed empirical attention towards institutional level geographies of security and policing – particularly on legacies of policing and militarisation in Olympic host cities. Accordingly, the paper traces the institutional trajectory of the Military Liaison Unit (MLU) in the Vancouver Police Department who were heavily involved in coordinating the joint civilian–military effort throughout the lifecycle of the Vancouver 2010 inter Games. Theoretically, the paper furthers Stephen Graham’s (2010) New Military Urbanism that considers the circulation of military expertise between neo-colonial frontiers of military intervention with Western urban spaces. In doing so, this paper unpacks an empirically guided temporal approach that discerns key drivers of militarisation as localised, empirical-based ‘trajectories’ of development of security and policing institutions, which are linked to, and circumscribed by, critical juncture episodes in the context of mega event security. The paper traces processes of the MLU to explain how conditions underpinning the civil–military divide in urban policing, as a series of jurisdictional, institutional, and by extension, geographical configurations have continued, changed or been abandoned in the context of the Vancouver 2010 Olympics. As such, this paper contributes to much needed debate on the controversies and opportunities inherent in security legacies and major events, which implicate the wider securitisation and militarisation of Western cities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

At a time when public debates about radicalization of Muslim youth in the West are taking center stage and when questions about “home-grown” security threats are increasing in the wake of a number of terrorist attacks in many émigré societies, this article provides fresh empirical insights from the perspective of religious leadership. It outlines a picture of a highly diverse Muslim religious landscape where competing religious discourses are struggling to attract and support Muslim youth facing social dislocation and identity crises within increasingly contested social milieus. The article argues that a typology of religious leadership is clearly emerging where a spectrum of faith-based orientations and religious practice emphasize, to different degrees, notions of attachment to universal ethics and individual agency. The fact that conservative, sometimes radical, interpretations of such contestations represent a minority of voices is heartening even though the actual damage by such minority is often disproportionate to its actual size within the so-called silent majority. The empirical insights provided by the religious leaders interviewed for this study offer hope that the future of Western Muslims is more positive than we are led to think, if the possibility of combining devout faith with local political engagement becomes a real and sustainable conduit towards social inclusion and intercultural understanding and if necessary support and understanding are extended by the host communities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

John Frazer's architectural work is inspired by living and generative processes. Both evolutionary and revolutionary, it explores informatin ecologies and the dynamics of the spaces between objects. Fuelled by an interest in the cybernetic work of Gordon Pask and Norbert Wiener, and the possibilities of the computer and the "new science" it has facilitated, Frazer and his team of collaborators have conducted a series of experiments that utilize genetic algorithms, cellular automata, emergent behaviour, complexity and feedback loops to create a truly dynamic architecture. Frazer studied at the Architectural Association (AA) in London from 1963 to 1969, and later became unit master of Diploma Unit 11 there. He was subsequently Director of Computer-Aided Design at the University of Ulter - a post he held while writing An Evolutionary Architecture in 1995 - and a lecturer at the University of Cambridge. In 1983 he co-founded Autographics Software Ltd, which pioneered microprocessor graphics. Frazer was awarded a person chair at the University of Ulster in 1984. In Frazer's hands, architecture becomes machine-readable, formally open-ended and responsive. His work as computer consultant to Cedric Price's Generator Project of 1976 (see P84)led to the development of a series of tools and processes; these have resulted in projects such as the Calbuild Kit (1985) and the Universal Constructor (1990). These subsequent computer-orientated architectural machines are makers of architectural form beyond the full control of the architect-programmer. Frazer makes much reference to the multi-celled relationships found in nature, and their ongoing morphosis in response to continually changing contextual criteria. He defines the elements that describe his evolutionary architectural model thus: "A genetic code script, rules for the development of the code, mapping of the code to a virtual model, the nature of the environment for the development of the model and, most importantly, the criteria for selection. In setting out these parameters for designing evolutionary architectures, Frazer goes beyond the usual notions of architectural beauty and aesthetics. Nevertheless his work is not without an aesthetic: some pieces are a frenzy of mad wire, while others have a modularity that is reminiscent of biological form. Algorithms form the basis of Frazer's designs. These algorithms determine a variety of formal results dependent on the nature of the information they are given. His work, therefore, is always dynamic, always evolving and always different. Designing with algorithms is also critical to other architects featured in this book, such as Marcos Novak (see p150). Frazer has made an unparalleled contribution to defining architectural possibilities for the twenty-first century, and remains an inspiration to architects seeking to create responsive environments. Architects were initially slow to pick up on the opportunities that the computer provides. These opportunities are both representational and spatial: computers can help architects draw buildings and, more importantly, they can help architects create varied spaces, both virtual and actual. Frazer's work was groundbreaking in this respect, and well before its time.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Market-based environmental regulation is becoming increasingly common within international and national frameworks. Environmental offset and trading regimes are part of the market-based instrument revolution. This paper proposes that environmental market mechanisms could be used to introduce an ethic of land holder responsibility. In order for market based regimes to attract sufficient levels of stakeholder engagement, participants within such scheme require an incentive to participate and furthermore need to feel a sense of security about investing in such processes. A sense of security is often associated with property based interests. This paper explores the property related issues connected with environmental offset and trading scheme initiatives. Relevant property-related considerations include land tenure considerations, public versus private management of land choices, characteristics and powers associated with property interests, theories defining property and the recognition of legal proprietal interests. The Biodiversity Banking Scheme in New South Wales is then examined as a case study followed by a critique on the role of environmental markets.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This essay explores the political significance of Balinese death/thrash fandom. In the early 1990s, the emergence of a death/thrash scene in Bali paralleled growing criticism of accelerated tourism development on the island. Specifically, locals protested the increasing ubiquity of Jakarta, 'the centre', cast as threatening to an authentically 'low', peripheral Balinese culture. Similarly, death/thrash enthusiasts also gravitated toward certain fringes, although they rejected dominant notions of Balinese-ness by gesturing elsewhere, toward a global scene. The essay explores the ways in which death/thrash enthusiasts engaged with local discourses by coveting their marginality, and aims to demonstrate how their articulations of 'alien-ness' contributed in important ways to a broader regionalism.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Cultural policy settings attempting to foster the growth and development of the Australian feature film industry in era of globalisation are coming under increasing pressure. Global forces and emerging production and distribution models are challenging the “narrowness” of cultural policy – mandating a particular film culture, circumscribing certain notions of value and limiting the variety of films produced through cultural policy driven subvention models. Australian horror film production is an important case study. Horror films are a production strategy well suited to the financial limitations of the Australian film industry with competitive advantages for producers against international competitors. However, emerging within a “national” cinema driven by public subsidy and social/cultural objectives, horror films – internationally oriented with a low-culture status – have been severely marginalised within public funding environments. This paper introduces Australian horror film production, and examines the limitations of cultural policy, and the impacts of these questions for the Producer Offset.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

There is a growing body of literature within social and cultural geography that explores notions of place, space, culture, race and identity. The more recent works suggest that places are experienced and understood in multiple ways and are embedded within an array of politics. Memmott and Long, who have undertaken place-based research with Australian Indigenous people, present the theoretical position that ‘place is made and takes on meaning through an interaction process involving mutual accommodation between people and the environment’. They outline that places and their cultural meanings are generated through one or a combination of three types of people–environment interactions. These include: a place that is created by altering the physical characteristics of a piece of environment and which might encompass a feature or features which are natural or made; a place that is created totally through behaviour that is carried out within a specific area, therefore that specific behaviour becomes connected to that specific place; and a place created by people moving or being moved from one environment to another and establishing a new place where boundaries are created and activities carried out. All these ideas of places are challenged and confirmed by what Indigenous women have said about their particular use of, and relationship with, space within several health services in Rockhampton, Central Queensland. As my title suggests, Indigenous women do not see themselves as ‘neutral’ or ‘non-racialised’ citizens who enter and ‘use’ a supposedly neutral health service. Instead, Aboriginal women demonstrate they are active recognisers of places that would identify them within the particular health place. That is, they as Aboriginal women didn’t just ‘make’ place, the places and spaces ‘make’ them. The health services were identified as sites within which spatial relations could begin to grow with recognition of themselves as Aboriginal women in place, or instead create a sense of marginality in the failure of the spaces to identify them. The women’s voices within this paper are drawn from interviews undertaken with twenty Aboriginal women in Rockhampton, Central Queensland, Australia, who participated in a research project exploring ‘how the relationship between health services and Aboriginal women can be more empowering from the viewpoints of Aboriginal women’. The assumption underpinning this study was that empowering and re-empowering practices for Aboriginal women can lead to improved health outcomes. Throughout the interviews women shared some of their lived realities including some of their thoughts on identity, the body, employment in the health sector, service delivery and their notions of health service spaces and places. Their thoughts on health service spaces and places provide an understanding of the lived reality for Aboriginal women and are explored and incorporated within this paper.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This study is an inquiry into the professional identity constructions of early childhood educators, where identity is conceptualised as social and contextual. Through a genealogical analysis of narratives of four Queensland early childhood teachers, the thesis renders as problematic universal and fixed notions of what it is to be an early childhood professional. The data are the four teachers’ professional life history narratives recounted through a series of conversational interviews with each participant. As they spoke about professionalism and ethics, these teachers struggled to locate themselves as professionals, as they drew on a number of dominant discourses available to them. These dominant discourses were located and mapped through analysis of the participants’ talk about relationships with parents, colleagues and authorities. Genealogical analysis enabled multiple readings of the ways in which the participants’ talk held together certainties and uncertainties, as they recounted their experiences and spoke of early childhood expertise, relational engagement and ethics. The thesis concludes with suggestions for ways to support early childhood teachers and pre-service teachers to both engage with and resist normative processes and expectations of professional identity construction. In so doing, multiple and contextual opportunities can be made available when it comes to being professional and ‘doing’ ethics. The thesis makes an argument for new possibilities for thinking and speaking professional identities that include both certainty and uncertainty, comfort and discomfort, and these seemingly oppositional terms are held together in tension, with an insistence that both are necessary and true. The use of provocations offers tools through which pre-service teachers, teachers and teacher educators can access new positions associated with certainties and uncertainties in professional identities. These new positions call for work that supports experiences of ‘de-comfort’ – that is, experiences that encourage early childhood educators to step away from the comfort zones that can become part of expertise, professional relationships and ethics embedded within normative representations of what it is to be an early childhood professional.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Measuring quality attributes of object-oriented designs (e.g. maintainability and performance) has been covered by a number of studies. However, these studies have not considered security as much as other quality attributes. Also, most security studies focus at the level of individual program statements. This approach makes it hard and expensive to discover and fix vulnerabilities caused by design errors. In this work, we focus on the security design of an object oriented application and define a number of security metrics. These metrics allow designers to discover and fix security vulnerabilities at an early stage, and help compare the security of various alternative designs. In particular, we propose seven security metrics to measure Data Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented class from the point of view of potential information flow.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Current regulatory requirements on data privacy make it increasingly important for enterprises to be able to verify and audit their compliance with their privacy policies. Traditionally, a privacy policy is written in a natural language. Such policies inherit the potential ambiguity, inconsistency and mis-interpretation of natural text. Hence, formal languages are emerging to allow a precise specification of enforceable privacy policies that can be verified. The EP3P language is one such formal language. An EP3P privacy policy of an enterprise consists of many rules. Given the semantics of the language, there may exist some rules in the ruleset which can never be used, these rules are referred to as redundant rules. Redundancies adversely affect privacy policies in several ways. Firstly, redundant rules reduce the efficiency of operations on privacy policies. Secondly, they may misdirect the policy auditor when determining the outcome of a policy. Therefore, in order to address these deficiencies it is important to identify and resolve redundancies. This thesis introduces the concept of minimal privacy policy - a policy that is free of redundancy. The essential component for maintaining the minimality of privacy policies is to determine the effects of the rules on each other. Hence, redundancy detection and resolution frameworks are proposed. Pair-wise redundancy detection is the central concept in these frameworks and it suggests a pair-wise comparison of the rules in order to detect redundancies. In addition, the thesis introduces a policy management tool that assists policy auditors in performing several operations on an EP3P privacy policy while maintaining its minimality. Formal results comparing alternative notions of redundancy, and how this would affect the tool, are also presented.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper has argued that subcultural social formations, such as the Gothics, did not evolve as resistance to a dominant culture. Instead, they are a response to the governmental construction of youth as an object of knowledge—the by-product of particular forms of government, generated by specific power/knowledge relations. Accordingly, attempts to account for the phenomenon of ‘subcultures’ should begin, not with notions of a shared, resistant class/generational consciousness, but rather with detailed investigations of specific forms of government, such as those involving conventions and customs within the fashion and music industries, the distribution of technologies of marketing and consumption, the adoption of various techniques of self-shaping, the prevalence of different journalistic practices, routines of policing, and so on. ‘Subcultural style’ is not an expression of relationship between a given social class, its material conditions and its economic and cultural aspirations. Rather, it constitutes the construction of particular habitus, shaped by fashion and leisure activities, through which certain youthful personae are given their form.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The ascendency of neoliberal ideas in education and social policy in the 1980s and 1990s was succeeded in the new millennium by a ‘new’ social democratic commitment with emphases on community empowerment, building social capital and a ‘whole of government’ approach to partnering with civil society to meet community needs. In Australia this approach has resulted in the development of partnerships between schools and community organisations formed as part of a targeted, holistic approach to service delivery to meet the settlement and educational needs of refugee youth. Drawing on interviews conducted with community workers and government officers involved in the school-community partnerships, we document how these partnerships are working ‘on the ground’ in Queensland schools. We analyse our findings against the international literature on changing notions of neoliberal governance, and discuss the implications of the shift to the ‘partnering state’ for schools and community organisations working with refugee young people.