992 resultados para public integrity verification


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over the last century, environmental and occupational medicine has played a significant role in the protection and improvement of public health. However, scientific integrity in this field has been increasingly threatened by pressure from some industries and governments. For example, it has been reported that the tobacco industry manipulated eminent scientists to legitimise their industrial positions, irresponsibly distorted risk and deliberately subverted scientific processes, and influenced many organisations in receipt of tobacco funding. Many environmental whistleblowers were sued and encountered numerous personal attacks. In some countries, scientific findings have been suppressed and distorted, and scientific advisory committees manipulated for political purposes by government agencies. How to respond to these threats is an important challenge for environmental and occupational medicine professionals and their societies. The authors recommend that professional organisations adopt a code of ethics that requires openness from public health professionals; that they not undertake research or use data where they do not have freedom to publish their results if these data have public health implications; that they disclose all possible conflicts; that the veracity of their research results should not be compromised; and that their research independence be protected through professional and legal support. The authors furthermore recommend that research funding for public health not be directly from the industry to the researcher. An independent, intermediate funding scheme should be established to ensure that there is no pressure to analyse data and publish results in bad faith. Such a funding system should also provide equal competition for funds and selection of the best proposals according to standard scientific criteria.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines some of the central global ethical and governance challenges of climate change and carbon emis-sions reduction in relation to globalization, the “global financial crisis” (GFC), and unsustainable conceptions of the “good life”, and argues in favour of the development of a global carbon “integrity system”. It is argued that a funda-mental driver of our climate problems is the incipient spread of an unsustainable Western version of the “good life”, where resource-intensive, high-carbon western lifestyles, although frequently criticized as unsustainable and deeply unsatisfying, appear to have established an unearned ethical legitimacy. While the ultimate solution to climate change is the development of low carbon lifestyles, the paper argues that it is also important that economic incentives support and stimulate that search: the sustainable versions of the good life provide an ethical pull, whilst the incentives provide an economic push. Yet, if we are going to secure sustainable low carbon lifestyles, it is argued, we need more than the ethical pull and the economic push. Each needs to be institutionalized—built into the governance of global, regional, national, sub-regional, corporate and professional institutions. Where currently weakness in each exacerbates the weaknesses in others, it is argued that governance reform is required in all areas supporting sustainable, low carbon versions of the good life.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current research in secure messaging for Vehicular Ad hoc Networks (VANETs) appears to focus on employing a digital certificate-based Public Key Cryptosystem (PKC) to support security. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This paper proposes a non-certificate-based public key management for VANETs. A comprehensive evaluation of performance and scalability of the proposed public key management regime is presented, which is compared to a certificate-based PKC by employing a number of quantified analyses and simulations. Not only does this paper demonstrate that the proposal can maintain security, but it also asserts that it can improve overall performance and scalability at a lower cost, compared to the certificate-based PKC. It is believed that the proposed scheme will add a new dimension to the key management and verification services for VANETs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It is argued that concerns arise about the integrity and fairness of the taxation regime where charitable organizations, which avail themselves of the tax exemption status while undertaking commercial activities, compete directly with the for-profit sector. The appropriateness of the tax concessions granted to charitable organizations is considered in respect of income derived from commercial activities. It is principally argued that the traditional line of reasoning for imposing limitations on tax concessions focuses on an incorrect underlying inquiry. Traditionally, it is argued that limitations should be imposed because of unfair competition, lack of competitive neutrality, or an arbitrary decision relating to a lack of deserving. However, it is argued that a more appropriate question from which to base any limitations is one which considers the value attached to the integrity of the taxation regime as a whole, and the tax base specifically compared to the public good of charities. When the correct underlying question is asked, sound taxation policy ensues, as a less arbitrary approach may be adopted to limit the scope of tax concessions available to charitable organizations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Over the last twenty years, the use of open content licenses has become increasingly and surprisingly popular. The use of such licences challenges the traditional incentive-based model of exclusive rights under copyright. Instead of providing a means to charge for the use of particular works, what seems important is mitigating against potential personal harm to the author and, in some cases, preventing non-consensual commercial exploitation. It is interesting in this context to observe the primacy of what are essentially moral rights over the exclusionary economic rights. The core elements of common open content licences map somewhat closely to continental conceptions of the moral rights of authorship. Most obviously, almost all free software and free culture licences require attribution of authorship. More interestingly, there is a tension between social norms developed in free software communities and those that have emerged in the creative arts over integrity and commercial exploitation. For programmers interested in free software, licence terms that prohibit commercial use or modification are almost completely inconsistent with the ideological and utilitarian values that underpin the movement. For those in the creative industries, on the other hand, non-commercial terms and, to a lesser extent, terms that prohibit all but verbatim distribution continue to play an extremely important role in the sharing of copyright material. While prohibitions on commercial use often serve an economic imperative, there is also a certain personal interest for many creators in avoiding harmful exploitation of their expression – an interest that has sometimes been recognised as forming a component of the moral right of integrity. One particular continental moral right – the right of withdrawal – is present neither in Australian law or in any of the common open content licences. Despite some marked differences, both free software and free culture participants are using contractual methods to articulate the norms of permissible sharing. Legal enforcement is rare and often prohibitively expensive, and the various communities accordingly rely upon shared understandings of acceptable behaviour. The licences that are commonly used represent a formalised expression of these community norms and provide the theoretically enforceable legal baseline that lends them legitimacy. The core terms of these licences are designed primarily to alleviate risk in sharing and minimise transaction costs in sharing and using copyright expression. Importantly, however, the range of available licences reflect different optional balances in the norms of creating and sharing material. Generally, it is possible to see that, stemming particularly from the US, open content licences are fundamentally important in providing a set of normatively accepted copyright balances that reflect the interests sought to be protected through moral rights regimes. As the cost of creation, distribution, storage, and processing of expression continues to fall towards zero, there are increasing incentives to adopt open content licences to facilitate wide distribution and reuse of creative expression. Thinking of these protocols not only as reducing transaction costs but of setting normative principles of participation assists in conceptualising the role of open content licences and the continuing tensions that permeate modern copyright law.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The words of the late Don Chipp, the founder of the Australian Democrats, have a perennial relevance to politics. When Chipp talked about ‘keeping the bastards honest’, it related to a minor political party playing a role of keeping the major political parties true to their word (Warhurst 1997). Yet it is also a democratic role that citizens play on an ongoing basis, particularly through the mechanism of elections. At the ballot box, governments that are widely perceived to have acted with a lack of integrity are roundly punished. This chapter explores public opinion on issues of integrity, corruption, influence and trust in politics and politicians in Australia. The evidence paints a differentiated picture of a public which sees little sign of overtly corrupt political practices but on the other hand does not feel terribly influential and is not always confident of fair treatment from public officials...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Parliamentary committees fulfil several important functions within the Parliament, with one of these being the oversight of various agencies including those that are designed to reduce corruption within the police service and other public sector agencies. The cross-party nature of committees combined with the protections of Parliament make them powerful agencies. Prenzler & Faulkner (2010) suggest that the ideal system for an agency that has oversight of a public sector integrity commission should include monitoring by a parliamentary committee, with an inspector attached to the committee. This occurs in Queensland, New South Wales and Western Australia. There has been very little research conducted on the role of parliamentary committees with oversight responsibilities for public sector integrity agencies. This paper will address this gap by examining the relationship between a parliamentary committee, a parliamentary inspector and a corruption commission. Queensland’s Parliamentary Crime and Misconduct Committee (PCMC/the Committee) and the Parliamentary Crime and Misconduct Commissioner (the Commissioner) provide oversight of the Crime and Misconduct Commission (CMC). By focussing on the PCMC and the Commissioner, the paper will examine the legislative basis for the Committee and Commissioner and their respective roles in providing oversight of the CMC. One key method by which the PCMC provides oversight of the CMC is to conduct and publish a review of the CMC every three years. Additionally, the paper will identify some of the similarities and differences between the PCMC and other committees that operate within the Queensland Parliament. By doing so, the paper will provide insights into the relationships that exist between corruption commissions, parliamentary committees and parliamentary inspectors and demonstrate the important role of the parliamentary committee in preventing instances of public sector corruption.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New Zealand and Australia are leading the world in terms of automated land registry systems. Landonline was introduced some ten years ago for New Zealand, and the Electronic Conveyancing National Law (ECNL) is to be released over the next few years in support of a national electronic conveyancing system to be used throughout Australia. With the assistance of three proof requirements, developed for this purpose, this article measures the integrity of both systems as against the old, manual Torrens system. The authors take the position that any introduced system should at least have the same level of integrity and safety as the originally conceived manual system. The authors argue both Landonline and ECNL, as presently set up, have less credibility than the manual system as it was designed to operate, leading to the possibility of increased fraud or misuse.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Australia's economic growth and national identity have been widely celebrated as being founded on the nation's natural resources. With the golden era of pastoralism fading into the distance, a renewed love affair with primary industries has been much lauded, particularly by purveyors of neoliberal ideology. The considerable wealth generated by resource extraction has, despite its environmental and social record, proved seductive to the university sector. The mining industry is one of a number of industries and sectors (alongside pharmaceutical, chemical and biotechnological) that is increasingly courting Australian universities. These new public-private alliances are often viewed as the much-needed cash cow to bridge the public funding shortfall in the tertiary sector. However, this trend also raises profound questions about the capacity of public good institutions, as universities were once assumed to be, to maintain institutional independence and academic freedoms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Obesity is a crucial public health issue in developed countries, with implications for cardiovascular and brain health as we age. A number of commonly-carried genetic variants are associated with obesity. Here we aim to see whether variants in obesity-associated genes - NEGR1, FTO, MTCH2, MC4R, LRRN6C, MAP2K5, FAIM2, SEC16B, ETV5, BDNF- AS, ATXN2L, ATP2A1, KCTD15, and TNN13K - are associated with white matter microstructural properties, assessed by high angular resolution diffusion imaging (HARDI) in young healthy adults between 20 and 30. years of age from the Queensland Twin Imaging study (QTIM). We began with a multi-locus approach testing how a number of common genetic risk factors for obesity at the single nucleotide polymorphism (SNP) level may jointly influence white matter integrity throughout the brain and found a wide spread genetic effect. Risk allele rs2815752 in NEGR1 was most associated with lower white matter integrity across a substantial portion of the brain. Across the area of significance in the bilateral posterior corona radiata, each additional copy of the risk allele was associated with a 2.2% lower average FA. This is the first study to find an association between an obesity risk gene and differences in white matter integrity. As our subjects were young and healthy, our results suggest that NEGR1 has effects on brain structure independent of its effect on obesity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Historically, there have been intense conflicts over the ownership and exploitation of pharmaceutical drugs and diagnostic tests dealing with infectious diseases. Throughout the 1980’s, there was much scientific, legal, and ethical debate about which scientific group should be credited with the discovery of the human immunodeficiency virus, and the invention of the blood test devised to detect antibodies to the virus. In May 1983, Luc Montagnier, Françoise Barré-Sinoussi, and other French scientists from the Pasteur Institute in Paris, published a paper in Science, detailing the discovery of a virus called lymphadenopathy (LAV). A scientific rival, Robert Gallo of the National Cancer Institute, identified the AIDS virus and published his findings in the May 1984 issue of Science. In May 1985, the United States Patent and Trademark Office awarded the American patent for the AIDS blood test to Gallo and the Department of Health and Human Services. In December 1985, the Institut Pasteur sued the Department of Health and Human Services, contending that the French were the first to identify the AIDS virus and to invent the antibody test, and that the American test was dependent upon the French research. In March 1987, an agreement was brokered by President Ronald Reagan and French Prime Minister Jacques Chirac, which resulted in the Department of Health and Human Services and the Institut Pasteur sharing the patent rights to the blood test for AIDS. In 1992, the Federal Office of Research Integrity found that Gallo had committed scientific misconduct, by falsely reporting facts in his 1984 scientific paper. A subsequent investigation by the National Institutes of Health, the United States Congress, and the US attorney-general cleared Gallo of any wrongdoing. In 1994, the United States government and French government renegotiated their agreement regarding the AIDS blood test patent, in order to make the distribution of royalties more equitable... The dispute between Luc Montagnier and Robert Gallo was not an isolated case of scientific rivalry and patent races. It foreshadowed further patent conflicts over research in respect of HIV/AIDS. Michael Kirby, former Justice of the High Court of Australia diagnosed a clash between two distinct schools of philosophy - ‘scientists of the old school... working by serendipity with free sharing of knowledge and research’, and ‘those of the new school who saw the hope of progress as lying in huge investments in scientific experimentation.’ Indeed, the patent race between Robert Gallo and Luc Montagnier has been a precursor to broader trade disputes over access to essential medicines in the 1990s and 2000s. The dispute between Robert Gallo and Luc Montagnier captures in microcosm a number of themes of this book: the fierce competition for intellectual property rights; the clash between sovereign states over access to medicines; the pressing need to defend human rights, particularly the right to health; and the need for new incentives for research and development to combat infectious diseases as both an international and domestic issue.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This chapter unpacks public institutional integrity concepts through an examination of differential obligations within the global climate regime.