960 resultados para high security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe the introduction, service growth, benefits and holistic support approach of a centrally supported universitywide online survey tool for researchers at QUT. The online survey service employs the Key Survey software, and has grown into a significant service for QUT researchers since being introduced in 2009. Key benefits of the approach include the ability of QUT to handle important issues relating to data such as security, privacy, integrity, archiving & disposal. The service also incorporates a workflow process that enhances the institution’s ability to ensure survey quality control through controlled approval and pilot testing before any survey is widely released. An important issue is that a tool like this can make it very easy to do very poor research very quickly while creating lots of data, due to the absence of a rigorous methodology designed to reduce errors and collect accurate, comprehensive, timely data. With this in mind, a holistic approach to service provision and support has been taken, which has included the introduction of an integrated system of seminars, tools and workshops to get researchers thinking about the quality of their research while becoming operational quickly. The system of seminars, workshops, checks and approvals we have put in place at QUT is designed to ensure better quality outcomes for QUT’s research and the individual researchers concerned.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Refactoring focuses on improving the reusability, maintainability and performance of programs. However, the impact of refactoring on the security of a given program has received little attention. In this work, we focus on the design of object-oriented applications and use metrics to assess the impact of a number of standard refactoring rules on their security by evaluating the metrics before and after refactoring. This assessment tells us which refactoring steps can increase the security level of a given program from the point of view of potential information flow, allowing application designers to improve their system’s security at an early stage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The motivation for secondary school principals in Queensland, Australia, to investigate curriculum change coincided with the commencement in 2005 of the state government’s publication of school exit test results as a measure of accountability. Aligning the schools’ curriculum with the requirements of high-stakes testing is considered by many academics and teachers as negative outcome of accountability for reasons such as ‘teaching to the test’ and narrowing the curriculum. However, this article outlines empirical evidence that principals are instigating curriculum change to improve published high-stakes test results. Three principals in this study offered several reasons as to why they wished to implement changes to school curricula. One reason articulated by all three was the pressures of accountability, particularly through the publication of high-stakes test data which has now become commonplace in education systems of many Western Nations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

If current population and accommodation trends continue, Australian cities will, in the future, have noticeable numbers of apartment buildings over 60 storeys high. With an aging population it follows that a significant proportion of those occupying these buildings will be senior citizens, many of whom will have some form of disability. For these occupants a fire emergency in a high rise building presents a serious problem. Currently lifts cannot be used for evacuation and going down 60 storeys in a fire isolated staircase would be physically impossible for many. Therefore, for many, the temptation to remain in one’s unit will be very strong. With an awareness of this behaviour trend in older residents, many researchers have, in recent years, explored the possible wider use of lifts in a fire emergency. So far the use of lifts for evacuation has been approved for a small number of buildings but wide acceptance of this solution is still to be achieved. This paper concludes that even in high-rise apartment buildings where lifts are approved for evacuation, architects should design the building with alternative evacuation routes and provide suitable safe refuge areas for those who cannot use the stairs when the lifts are unavailable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sustainability decisions and their impacts may be among the greatest challenges facing the world in the 21st century (Davos 2000). Apart from adaptation on the part of established organizations these challenges are arguably going to require solutions developed by new actors However, young ventures have only recently begun generating research interest within sustainability literature (Shepherd et al. 2009). In particular, little is known about resource behaviours of these ventures and how they adapt to substantial resource constraints. One promising theory that has been identified as a way that some entrepreneurs manage constraints is bricolage: a construct defined as “making do by applying combinations of the resources at hand to new problems and opportunities” (Baker and Nelson 2005: 333). Bricolage may be critical as the means of continued venture success as these ventures are frequently developed in severe resource constraint, owing to higher levels of technical sophistication (Rothaermel and Deeds 2006). Further, they are often developed by entrepreneurs committed to personal and social goals of resourcefulness, including values that focus on conservation rather than consumption of resources (Shepherd et al. 2009). In this paper, using seven novel cases of high potential sustainability firms from CAUSEE we consider how constraints impact resource behaviours and further illustrate and extend bricolage domains previously developed by Baker and Nelson (2005) with recommendations for theory and practice provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Given there is currently a migration trend from traditional electrical supervisory control and data acquisition (SCADA) systems towards a smart grid based approach to critical infrastructure management. This project provides an evaluation of existing and proposed implementations for both traditional electrical SCADA and smart grid based architectures, and proposals a set of reference requirements which test bed implementations should implement. A high-level design for smart grid test beds is proposed and initial implementation performed, based on the proposed design, using open source and freely available software tools. The project examines the move towards smart grid based critical infrastructure management and illustrates the increased security requirements. The implemented test bed provides a basic framework for testing network requirements in a smart grid environment, as well as a platform for further research and development. Particularly to develop, implement and test network security related disturbances such as intrusion detection and network forensics. The project undertaken proposes and develops an architecture of the emulation of some smart grid functionality. The Common Open Research Emulator (CORE) platform was used to emulate the communication network of the smart grid. Specifically CORE was used to virtualise and emulate the TCP/IP networking stack. This is intended to be used for further evaluation and analysis, for example the analysis of application protocol messages, etc. As a proof of concept, software libraries were designed, developed and documented to enable and support the design and development of further smart grid emulated components, such as reclosers, switches, smart meters, etc. As part of the testing and evaluation a Modbus based smart meter emulator was developed to provide basic functionality of a smart meter. Further code was developed to send Modbus request messages to the emulated smart meter and receive Modbus responses from it. Although the functionality of the emulated components were limited, it does provide a starting point for further research and development. The design is extensible to enable the design and implementation of additional SCADA protocols. The project also defines an evaluation criteria for the evaluation of the implemented test bed, and experiments are designed to evaluate the test bed according to the defined criteria. The results of the experiments are collated and presented, and conclusions drawn from the results to facilitate discussion on the test bed implementation. The discussion undertaken also present possible future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The principal’s leadership and curriculum development are considered the core elements for creating a high performing junior high school. In Taiwan, mathematics curriculum reform has been an ongoing topic since 1994. The pedagogy, classroom interactions, and the underlying philosophy of mathematics education have varied with different versions of guidelines. These changes inevitably increase the requirement for principals’ leadership in order to effectively implement the curriculum reform. Principals’ leadership is essential to the success of the implementation in their school. This study aimed to explore and identify the leadership of junior high school principals whose schools had been judged by the Taipei City Government as Grade A junior high schools. Principals’ implementations of the reformed mathematics curriculum were used as examples to generate insights of their leadership. This study drew upon a multiple-case study approach. Data were collected from interviews, observations, and documentations. Bass and Avolio’s (1997) full range leadership theory provided a structure for gaining insight into these principals’ leadership practices. Five Grade A Taipei junior high school principals participated and shared their leadership concepts and experiences. Findings revealed that the leadership preferences of the five principles varied considerably. Management by exception-active, contingent reward, individualised consideration, and idealised influence were Grade A Taipei junior high school principals’ preferred leadership practices. In addition, principals’ leadership strategies associated with these practices were identified. These principals had adopted a range of leadership strategies according to the staff and school needs. Results of this study have implications for both Taiwanese principals and education departments. Principals can enhance their leadership by gaining more understanding about the Grade A principals’ leadership practices and strategies. Taiwanese education departments can improve school leadership training programs by focusing on these practices and strategies, which may also lead to more effective strategies for implementing national curriculum reform.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we presented an automatic system for precise urban road model reconstruction based on aerial images with high spatial resolution. The proposed approach consists of two steps: i) road surface detection and ii) road pavement marking extraction. In the first step, support vector machine (SVM) was utilized to classify the images into two categories: road and non-road. In the second step, road lane markings are further extracted on the generated road surface based on 2D Gabor filters. The experiments using several pan-sharpened aerial images of Brisbane, Queensland have validated the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Technology is not always introduced into educational contexts in ways that position pedagogy to the fore. In optimizing learning, forward looking approaches require that we question what it means to be an educated person in the 21st Century and how individuals should engage with technologies to be suitably equipped for emergent knowledge age work. Responses to such ideas typically emphasize collaborative knowledge building where technology is employed as a tool to think with and allows for the active messing with and the development of ideas, rather than merely being a passive window to information. This paper discusses a very deliberate attempt to address a range of imperatives and competing demands within a high school setting where wireless handheld technologies integrated with a learning management system (Moodle) are used to scaffold and implement knowledge sharing and knowledge-building within the school community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

My oldest daughter recently secured a position as a Science/Geography teacher in a P-12 Catholic College in regional Queensland. This paper looks at the teaching world into which she has graduated. Specifically, the paper will outline and discuss findings from a survey of graduating early childhood student teachers in relation to their knowledge and skills of the current regime of high-stakes testing in Australia. The paper argues that understanding accountability and possessing skills to scrutinise test data are essential for the new teacher as s/he enters a profession in which governments world-wide are demanding a return for their investment in education. The paper will examine literature on accountability and surveillance in the form of high-stakes testing from global, school and classroom perspectives. It makes the claim that it is imperative for beginning teachers to be able to interpret high-stakes test data and considers the skills required to do this. The paper also draws on local research to comment on the readiness of graduates to meet this comparatively new professional demand.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, two different high bandwidth converter control strategies are discussed. One of the strategies is for voltage control and the other is for current control. The converter, in each of the cases, is equipped with an output passive filter. For the voltage controller, the converter is equipped with an LC filter, while an output has an LCL filter for current controller. The important aspect that has been discussed the paper is to avoid computation of unnecessary references using high-pass filters in the feedback loop. The stability of the overall system, including the high-pass filters, has been analyzed. The choice of filter parameters is crucial for achieving desirable system performance. In this paper, the bandwidth of achievable performance is presented through frequency (Bode) plot of the system gains. It has been illustrated that the proposed controllers are capable of tracking fundamental frequency components along with low-order harmonic components. Extensive simulation results are presented to validate the control concepts presented in the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines the relationships between job demands (in the form of role stressors and emotional management) and employee burnout amongst high contact service employees. Employees in customer facing roles are frequently required to manage overwhelming, conflicting or ambiguous demands, which they may feel ill-equipped to handle. Simultaneously, they must manage the emotions they display towards customers, suppressing some, and expressing others, be they genuine or contrived. If the in-role effort required of employees exceeds their inherent capacity to cope, burnout may result. Burnout, in turn, can have serious detrimental consequences for the psychological well being of employees. We find that both emotional management and role stressors impact burnout. We also confirm that burnout predicts psychological strain. In line with the Job Demands and Resources Model, we examine the mitigating impact of perceived support on these relationships but do not find a significant mitigating impact.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Even though security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human machine interface. This paper reports on a diary study conducted in order to investigate what people identify as security decisions that they make while using the web. The study aimed to uncover how security is perceived in the individual's context of use. From this data, themes were drawn, with a focus on addressing security goals such as confidentiality and authentication. This study is the first study investigating users' web usage focusing on their self-documented perceptions of security and the security choices they made in their own environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Delegation, from the technical point of view, is widely considered as a potential approach in addressing the problem of providing dynamic access control decisions in activities with a high level of collaboration, either within a single security domain or across multiple security domains. Although delegation continues to attract significant attention from the research community, presently, there is no published work that presents a taxonomy of delegation concepts and models. This paper intends to address this gap by presenting a set of taxonomic criteria relevant to the concept of delegation and applies the taxonomy to a selection of significant delegation models published in the literature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Delegation, from a technical point of view, is widely considered as a potential approach in addressing the problem of providing dynamic access control decisions in activities with a high level of collaboration, either within a single security domain or across multiple security domains. Although delegation continues to attract significant attention from the research community, presently, there is no published work that presents a taxonomy of delegation concepts and models. This article intends to address this gap by presenting a set of taxonomic criteria relevant to the concept of delegation. This article also applies the taxonomy to a selection of significant delegation models published in the literature.