929 resultados para private security military company


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the wake of the Bali bombing the Australian government has proposed a number of national security measures that pose a real danger to human security in Australia and the region. These measures include renewed and increased military and intelligence exchanges with Indonesia, and laws that allow the Australian Security Intelligence Organization (ASIO) to detain people without charge or even suspicion in order to gather intelligence. In less emotional times these initiatives would be rejected as contrary to human rights concerns and Australia’s democratic traditions, which include the rule of law and due process protections. In the current climate, however, human rights and civil liberties are apt to be portrayed as unaffordable luxuries.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

All Australian governments are committed to the establishment of a  comprehensive, adequate and representative system of conservation  reserves. Many of the most threatened species and communities throughout Australia occur mainly or wholly on private land. A range of mechanisms has been developed to achieve conservation on private land. This article  assesses the legal security, permanence and management intent of such mechanisms in Victoria, in relation to protected area criteria. The  implications of this analysis for the Australian National Reserve System and landowners with these mechanisms on their properties are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The importance of effective multilateral security networks is widely recognised in Australia and internationally as being essential to facilitate the large-scale sharing of information required to respond to the threat of terrorism. Australian national security agencies are currently constructing networks in order to bring the diverse national and international security agencies together to achieve this. This paper examines this process of security network formation in the area of critical infrastructure protection, with particular emphasis on airport security. We address the key issues and factors shaping network formation and the dynamics involved in network practice. These include the need for the networks to extend membership beyond the strictly defined elements of national security; the integration of public and private ‘nodes’ in counter-terrorism ‘networks’; and the broader ‘responsibilisation’ of the private sector and the challenges with ‘enabling’ them in counter-terrorism networks. We argue that the need to integrate public and private agencies in counter-terrorism networks is necessary but faces considerable organisational, cultural, and legal barriers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Failure to contemplate and define an appropriate role for the armed forces of the national government in domestic crises of this sort is a serious problem. It is all the more serious now as these potential crises seem to multiply in character and scope. This thesis will explore the history of this problem and its recent implications. It will argue the need for a comprehensive, operational framework, codified in law, which defines the various alternative uses of all emergency services, both civilian and military, and is applicable to “all hazards.” I will attempt to provide a blue-print for what such a framework should look like.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Strategic ties based on converging national interests shared perceptions of the evolving Asia-Pacific security environment are strengthening between India and USA. The sanctions imposed in response to IndiaEs 1998 nuclear tests were relaxed and military-to-military links were stored with the joining of India in US-led war on terror.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent times, Virtual Worlds such as Second Life have generated substantial publicity due to the participation of Fortune 500 companies, and other public and private organisations. As practitioners continue to discuss how organisations could derive business value from Virtual Worlds, new security and ethical issues in Virtual Worlds have emerged to challenge Virtual World users and stakeholders. This paper discusses privacy, intellectual property and a host of other security and ethical issues in Virtual Worlds. It contributes to practice and research by (i) providing insight into emerging security and ethical issues in Virtual Worlds, (ii) analysing the implication of these issues, within and beyond Virtual Worlds, and (iii) raising awareness on security and ethics among Virtual World users and stakeholders.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

* Threats to patient safety during clinical handover have been identified as an ongoing problem in health care delivery.

* In complex handover situations, organisational, cultural, behavioural and environmental factors associated with team performance can affect patient safety by undermining the stability of team functioning and the effectiveness of interprofessional communication.

* We present a practical framework for promoting systematic, comprehensive measurement of the factors involved in clinical handover.

* The framework can be used to develop viable solutions to the problems of clinical handover.

* The framework was devised and used in a recent project examining interprofessional communication and team performance during clinical handover in post-anaesthetic care units.

* The framework combines five key concepts: clinical governance, clinician engagement, ecological validity, safety culture and team climate, and sustainability.

* We believe that use of this framework will help overcome the limitations of previous research that has not taken into account the complex and multifaceted influences on clinical handover and interprofessional communication.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis deals with codes of ethics in the top 500 companies operating in the private sector in Australia. We seek to answer two questions. First, can businesses adopt codes of ethics in a meaningful way, or are business ethics a contradiction in terms for profit seeking organisations in competitive markets? Second, to what extent do Australia’s top 500 private sector firms show commitment to codes of ethics? A number of ancillary questions are explored to form a picture of the current Australian situation and to compare it to the rest of the world, especially the US and Canada. Chapter 1 discusses these questions and the origins of the author’s interest in business ethics. This chapter develops a focus upon codes of ethics and their role in assisting to establish and maintain an ethical culture. The chapter looks at previous research on codes of ethics and demonstrates a lack of understanding in Australia on the subject and the need for research into it. Also included in Chapter 1 is the plan for the thesis. Chapters 2 to 4 review the literature upon which the thesis is based. In Chapter 2, the meaning of the terms ethics and business ethics are considered. Deontological and teleological approaches are distinguished and a (largely) teleological model of business ethics is developed. This chapter also asks whether business ethics are possible. The contention that ethics may be good for a business’s profit is explored in-depth and the conclusion is reached that ethics should be pursued for its inherent worth regardless of the economic benefit that can be attributed to it. A number of models of ethical decision making are discussed in Chapter 3 starting with Kohlberg and Kramer (1969). This discussion leads to the conclusion that organisations must create an ethical culture for staff if they require them to embrace ethical practices. If this is a correct conclusion, then the role of senior managers becomes critical in the process. Chapter 4 looks further at the role of senior managers, organisational culture and ethical/unethical behaviour in organisations. The conclusion is that senior managers do play an integral part in shaping the culture of an organisation. Their actions, either overtly or covertly, impact upon their staff and highlight behaviour that the organisation is or is not willing to tolerate. Sims (1991) proposed ten ways to foster an ethical culture and these ideas are set out and further explored through the work of other writers on management ethics. Finally, the link between ethics and strategic planning is examined. In Chapter 5 the methods used for empirical data gathering are described and justified. A number of factors that can lead us to consider a company’s ‘commitment’ to ethics are outlined. A survey of Australian companies was the primary means of data collection. Each question in the survey instrument is listed and explained. Also the survey response rate is reported, as are major demographic characteristics of respondents. Chapter 6 provides the research findings from the survey of the top 500 companies operating in the private sector in Australia. The research examines: i) the current Australian usage and implementation of codes of ethics; ii) the measures put in place in organisations in order to support a code; From this analysis conclusions are drawn about the ‘commitment’ of companies operating in Australia to codes of ethics. Australian companies are becoming aware of the potential of code usage. Companies operating in Australia that have codes appear to be good at implementing codes and examining staff performance in relation to codes. However, they lack the procedures that incorporate education and training and the implementation of the support mechanisms necessary to enhance employee understanding of the code. In Chapter 7, Australian codes are compared to American and Canadian codes for similarity and disparity. The assessment found that in all three countries codes are primarily concerned with company continuance. Australian codes do tend to be more socially oriented than in the other two countries and also less legalistic. Chapter 8 looks at 4 companies from the first survey that were asked for more in-depth information in a quest to determine current best practice in Australia. These organisations were chosen because they appeared, from the first survey instrument, to have put in place mechanisms to assist employees to better understand the code. The implication is that companies must make a conscious, positive effort to ensure that employees are considered in the process of ethical development. They should have input into the process, rather than just being directed to follow another management initiative. The final chapter summarises the research findings and looks at answers to the two major questions and the seven subordinate empirical questions posed at the start of the thesis. The conclusion reached is that companies operating in Australia appear to be moving towards establishing codes of ethics. Those who already have codes display a real commitment to them. The movement appears to be gathering momentum as more organisations see the value of incorporating ethical business practices into the every day workings of their individual companies. Generally, most Australian companies lag behind the rest of the world, but the pace-setting companies are defining their own best practice and achieving positive outcomes for themselves, their employees and other stakeholders.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New social networking systems such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting with "strangers" through the advent of a large number of social applications. This paper will focus upon the impact of Generation F - the Facebook Generation and their attitudes to security. The paper will be based around discussing the findings of a major UK case study and the implications that this has. The case study identifies 51 recommendations to improve the situation of data security within the military of the UK. These recommendations will be the data for the analysis and will form an overview of the case study’s point of view as regards the younger generation and data security. This paper will suggest another interpretation of the results supplied by Burton.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

he prominence of global warming as an environmental issue has illustrated the close relationship between natural resources, ecosystems and global security. Whilst environmental decision making often uses techniques such as economic valuation and risk management, the security component is often not considered, at least not from a security analyst’s perspective. Yet environmental security considerations can be global, regional and/or national in impact. Environmental change and policy can effect human health and well being as well as initiating conflict; it can affect the existence of life itself. These aspects are firmly in the domain of the security discipline although the protection of the global ecosystem has not traditionally been considered by those who create security policy. The idea of environmental/ecological security ranges from the eco-centric approach which examines the impact of human activities that impact on the security of the natural systems to the more traditional anthropocentric perspectives that look at varied issues such as conflict caused by natural resource competition and environmental degradation, and the greening of military operations. This paper will assert that the inclusion of the security factor in policy creation and environmental assessments is essential to give richer solutions to these complex socio-economic and ecological situations. Systems theory over the last few decades has emphasised the inclusion of as many perspectives on messy problems as possible to provide truly systemic outcomes. It is posited that the addition of such concepts as threat analyses will produce more effective and sustainable outcomes.