927 resultados para threat
Resumo:
“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.
Resumo:
The notion of sovereignty is central to any international tax issue. While a nation is free to design its tax laws as it sees fit and raise revenue in accordance with the needs of its citizens, it is not possible to undertake such a task in isolation. In a world of cross-border investments and business transactions, all tax regimes impact on one another. Tax interactions between sovereign states cannot be avoided. Ultimately, the interactions mean that a nation must decide whether to engage in both collaboration and coordination with other nations and supranational bodies alike or maintain an individualised stance in relation to its tax policy. Whatever the decision, there is arguably an exercise in national sovereignty in some form. In the context of an international tax regime, whether that regime is interpreted broadly as meaning international norms generally adopted by nations around the world or domestic regimes legislating for cross-border transactions, rhetoric around national fiscal sovereignty takes on many different forms. At one end of the spectrum it is relied upon by financial secrecy jurisdictions (tax havens) as a defence to their position on the basis that ‘other’ nations cannot interfere with the fiscal sovereignty of a jurisdiction. At the other end of the spectrum, it is argued that profit shifting and international tax avoidance if not stopped is, in and of itself, a threat to a nation’s fiscal sovereignty on the basis that it threatens the ability to tax and raise the revenue needed. This paper considers a modern conceptualisation of sovereignty along with its role within international tax coordination and collaboration to argue that a move towards a more unified approach to addressing international base erosion and profit shifting may be the ultimate exercise of national fiscal sovereignty. By using the current transfer pricing regime as a case study, this paper posits that it is not merely enough to have international agreement on allocation rules to be applied, but that the ultimate exercise of national sovereignty is political agreement with other states to ensure that it is governments which determine the allocational basis of worldwide profits to be taxed. In doing so, it is demonstrated that the arm’s length pricing requirement of the current transfer pricing regime, rather than providing governments with the ability to determine the location of profits, is providing multinational entities with the ultimate power to determine that location. If left unchecked, this will eventually erode a nation’s ability to capture the required tax revenue and, as a consequence, may be deemed a failure by nation states to exercise their fiscal sovereignty.
Resumo:
For the first of the baby boomers turning 65 years of age, after a decade littered with financial shocks (dot.com bubble, sub-prime, global financial crisis, sovereign debt), sequencing risk can represent a significant threat to their retirement nest eggs. This paper takes an outcomeoriented approach to the problem, to provide practical insights into how sequencing risk works and the critical dependency of retirement outcomes on sequencing risk. Our analysis challenges the conventional wisdom that it is the accumulated average of investment returns that matter. We show, instead, that it is the realised sequence of returns which largely determines the sustainability of retirement incomes.
Resumo:
The former Archbishop of York stood accused last night of covering up allegations that a senior Church of England clergyman had abused choirboys and school pupils. Lord Hope of Thornes was made aware of the accusations against the Very Rev Robert Waddington, a former Dean of Manchester Cathedral and once the cleric in overall charge of Church schools, in 1999 and again in 2003. Waddington was stripped of his right to conduct church services but the archbishop did not report concerns about alleged past abuse or a potential continuing threat to children to police or child protection agencies. The extent of Waddington’s alleged history of abuse and the Church’s inaction has been revealed through a joint investigation by The Times and The Australian newspaper in Sydney.
Resumo:
Young children are thought to be particularly sensitive to heatwaves, but relatively less research attention has been paid to this field to date. A systematic review was conducted to elucidate the relationship between heat waves and children’s health. Literature published up to August 2012 were identified using the following MeSH terms and keywords: “heatwave”, “heat wave”, “child health”, “morbidity”, “hospital admission”, “emergency department visit”, “family practice”, “primary health care”, “death” and “mortality”. Of the 628 publications identified, 12 met the selection criteria. The existing literature does not consistently suggest that mortality among children increases significantly during heat waves, even though infants were associated with more heat-related deaths. Exposure to heat waves in the perinatal period may pose a threat to children’s health. Pediatric diseases or conditions associated with heat waves include renal disease, respiratory disease, electrolyte imbalance and fever. Future research should focus on how to develop a consistent definition of a heat wave from a children’s health perspective, identifying the best measure of children’s exposure to heat waves, exploring sensitive outcome measures to quantify the impact of heat waves on children, evaluating the possible impacts of heat waves on children’s birth outcomes, and understanding the differences in vulnerability to heat waves among children of different ages and from different income countries. Projection of the children’s disease burden caused by heat waves under climate change scenarios, and development of effective heat wave mitigation and adaptation strategies that incorporate other child protective health measures, are also strongly recommended.
Resumo:
Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.
Reframing Conceptions of Contemporary Literacy Capabilities in Pre-Service Primary Teacher Education
Resumo:
This chapter describes the challenges of integrating new technologies with literacy education in pre-service primary teacher education in Australia. The authors describe the policy context and regulatory mechanisms controlling pre-service education, including a national set of professional standards for graduate teachers, a new national curriculum for school students, the introduction of high stakes national assessment for school students, and the looming threat of decontextualized back-to-the-basics professional entry tests for aspiring teachers. The chapter includes three case studies of the authors’ pedagogical practices that attempt to reframe conceptions of the literacy capabilities of pre-service teachers to reflect the complex and sophisticated requirements of teachers in contemporary schooling. The authors conclude the chapter with a discussion of the implications of these case studies as they illustrate the ways that pre-service teachers can be scaffolded and supported to develop creative capacity and critical awareness of the kinds of literacies required in the digital age despite restrictive regimes.
Resumo:
Espionage, surveillance and clandestine operations by secret agencies and governments were something of an East–West obsession in the second half of the twentieth century, a fact reflected in literature and film. In the twenty-first century, concerns of the Cold War and the threat of Communism have been rearticulated in the wake of 9/11. Under the rubric of ‘terror’ attacks, the discourses of security and surveillance are now framed within an increasingly global context. As this article illustrates, surveillance fiction written for young people engages with the cultural and political tropes that reflect a new social order that is different from the Cold War era, with its emphasis on spies, counter espionage, brainwashing and psychological warfare. While these tropes are still evident in much recent literature, advances in technology have transformed the means of tracking, profiling and accumulating data on individuals’ daily activities. Little Brother, The Hunger Games and Article 5 reflect the complex relationship between the real and the imaginary in the world of surveillance and, as this paper discusses, raise moral and ethical issues that are important questions for young people in our age of security.
Resumo:
Refugees flee their countries of origin due to supreme hardship and threat to life; frequently bearing witness to mass atrocity. This research is embedded in a salutogenic paradigm which emphasises strength and adjustment. Twenty-five refugees from Burma who were newly arrived in Australia were interviewed and transcripts were analysed using an Interpretive Phenomenological Analytic (IPA) approach. In addition to themes of distress, data revealed an extraordinary adaptive capacity and highlighted strengths, both individually and collectively. Specific adaptive strategies included religiousness, and a sense of duty to family, community and country. Findings have implications for policy and practice that aim to support refugees and asylum seekers.
Resumo:
Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.
Resumo:
The design of society’s major infrastructure systems are generally based on anthropogenic learnings and seldom encapsulate learning from nature. This results from a pervading attitude of superiority of human-designed systems, particularly since the Industrial Revolution. Problems created by such behaviours have previously not been thought to present a serious threat to humanity. However, many built environment professionals are now reconsidering the impact of such systems on the environment and their vulnerability to issues such as climate change. This paper presents an approach to delivering sustainable urban infrastructure that addresses 21st Century needs by emulating natural form, function and process - biomimicry – in infrastructure design. The analysis reveals the context for infrastructure change and the need for sustainable solutions, detailing the current inquiry into biomimicry informed design and highlighting potential applications from literature that demonstrate precedence for nature to inspire the design of urban infrastructure, in particular water and energy systems.
Resumo:
Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.
Resumo:
The conflicts in Iraq and Afghanistan have been epitomized by the insurgents’ use of the improvised explosive device against vehicle-borne security forces. These weapons, capable of causing multiple severely injured casualties in a single incident, pose the most prevalent single threat to Coalition troops operating in the region. Improvements in personal protection and medical care have resulted in increasing numbers of casualties surviving with complex lower limb injuries, often leading to long-term disability. Thus, there exists an urgent requirement to investigate and mitigate against the mechanism of extremity injury caused by these devices. This will necessitate an ontological approach, linking molecular, cellular and tissue interaction to physiological dysfunction. This can only be achieved via a collaborative approach between clinicians, natural scientists and engineers, combining physical and numerical modelling tools with clinical data from the battlefield. In this article, we compile existing knowledge on the effects of explosions on skeletal injury, review and critique relevant experimental and computational research related to lower limb injury and damage and propose research foci required to drive the development of future mitigation technologies.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
Feral pigs occur throughout tropical far north Queensland, Australia and are a significant threat to biodiversity and World Heritage values, agriculture and are a vector of infectious diseases. One of the constraints on long-lasting, local eradication of feral pigs is the process of reinvasion into recently controlled areas. This study examined the population genetic structure of feral pigs in far north Queensland to identify the extent of movement and the scale at which demographically independent management units exist. Genetic analysis of 328 feral pigs from the Innisfail to Tully region of tropical Queensland was undertaken. Seven microsatellite loci were screened and Bayesian clustering methods used to infer population clusters. Sequence variation at the mitochondrial DNA control region was examined to identify pig breed. Significant population structure was identified in the study area at a scale of 25 to 35 km, corresponding to three demographically independent management units (MUs). Distinct natural or anthropogenic barriers were not found, but environmental features such as topography and land use appear to influence patterns of gene flow. Despite the strong, overall pattern of structure, some feral pigs clearly exhibited ancestry from a MU outside of that from which they were sampled indicating isolated long distance dispersal or translocation events. Furthermore, our results suggest that gene flow is restricted among pigs of domestic Asian and European origin and non-random mating influences management unit boundaries. We conclude that the three MUs identified in this study should be considered as operational units for feral pig control in far north Queensland. Within a MU, coordinated and simultaneous control is required across farms, rainforest areas and National Park Estates to prevent recolonisation from adjacent localities.