865 resultados para security sector reform
Resumo:
This paper profiles Queensland's recent Crime and Misconduct Commission Inquiry into the abuse of children in foster care. The authors welcome the outcome as an opportunity to highlight the problems encountered by child protection jurisdictions in Australia and internationally, and they applaud some of the Inquiry's findings. However, the paper argues that the path to reform is hampered by insufficient accountability by government and management, and an inadequate challenge to the ideologies underpinning contemporary child protection policy and practice. The authors conclude with a call to value and assert social work's contribution to child protection systems so as to vastly improve outcomes for children and families.
Resumo:
This paper examines the place of the creative sector -- the arts, design, media and communications -- within the framework of contemporary innovation. The historical focus on science-and-technology by innovation policy makers has spurred many within the creative sector to argue how and why it also contributes to innovation. Drawing on a wide range of English-speaking research and policy documents, the full gamut of places for the creative sector in innovation is surveyed. The paper ends by scoping out the conceptual and empirical research that is required if ideas about innovation in the creative sector are to take up a mature position within innovation studies and related policy.
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Resumo:
The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.
Resumo:
This paper will explore how a general education can contribute successfully to vocational outcomes using both Participatory Action Research (PAR) and Program Theory methodology. The paper will focus on the development aspects of ‘marrying’ vocational and general education including engagement processes, student, teacher, institute and employer preparation and the pathway possibilities that emerge. Successful cases presented include the: Healthy Futures program (pathways into the Health and Allied industries); Accounting Pathways program (simultaneously studying a general Accounting subject and a Certificate III vocational qualification); and Sustainable Sciences initiative (development of a vocational qualification that focuses on the emerging renewable energy industry and is linked to school science programs). The case studies have been selected because they are unique in character and application and can be used as a basis for future program development in other settings or curriculum areas.
Resumo:
Public and private sector organisations worldwide are putting strategies in place to manage the commercial and operational risks of climate change. However, community organisations are lagging behind in their understanding and preparedness, despite them being among the most exposed to the effects of climate change impacts and regulation. This poster presents a proposal for a multidisciplinary study that addresses this issue by developing, testing and applying a novel climate risk assessment methodology that is tailored to the needs of Australia’s community sector and its clients. Strategies to mitigate risks and build resilience and adaptive capacity will be identified including new opportunities afforded by urban informatics, social media, and technologies of scale making.
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.
Resumo:
The forms social enterprises can take and the industries they operate in are so many and various that it has always been a challenge to define, find and count social enterprises. In 2009 Social Traders partnered with the Australian Centre for Philanthropy and Nonprofit Studies (ACPNS) at Queensland University of Technology to define social enterprise and, for the first time in Australia, to identify and map the social enterprise sector: its scope, its variety of forms, its reasons for trading, its financial dimensions, and the individuals and communities social enterprises aim to benefit.
Resumo:
Governments undertake extensive planning of many services and functions, but tend to neglect planning of public service workforces. Disruptions to public service delivery, such as shortages of nurses and doctors, have rejuvenated interest in workforce planning, but many organisations struggle to do it effectively. This historical study examines the capacity of central personnel agencies to predict workforce risks and support workforce planning, using a study of the Queensland public service. It identifies lack of workforce data as a barrier to effective workforce planning, as a result of factors such as changes in the direction of the central personnel agency, lack of appreciation for the value of comprehensive central workforce data, and limited agency human resource (HR) skills or capacity.
Resumo:
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.
Resumo:
Current research and practice related to the first year experience (FYE) of commencing higher education students are still mainly piecemeal rather than institution-wide with institutions struggling to achieve cross-institutional integration, coordination and coherence of FYE policy and practice. Drawing on a decade of FYE-related research including an ALTC Senior Fellowship and evidence at a large Australian metropolitan university, this paper explores how one institution has addressed that issue by tracing the evolution and maturation of strategies that ultimately conceptualize FYE as “everybody's business.” It is argued that, when first generation co-curricular and second generation curricular approaches are integrated and implemented through an intentionally designed curriculum by seamless partnerships of academic and professional staff in a whole-of-institution transformation, we have a third generation approach labelled here as transition pedagogy. It is suggested that transition pedagogy provides the optimal vehicle for dealing with the increasingly diverse commencing student cohorts by facilitating a sense of engagement, support and belonging. What is presented here is an example of transition pedagogy in action.
Resumo:
Construction procurement organisations in the Australian framework provide broad guidelines on project management in setting benchmark performance measurements and processes for evaluating their projects. Despite this, little has been known in the project management practise in transport construction projects in Australia, in particular Queensland. Questionnaire data from 53 project management practitioners employed in State and City public sector organisations in Queensland,suggested that many practitioners in the public sector have little or a lack of understanding of government regulatory policies, which are used as economic evaluation tools for project options. Public sector project managers perceive socio-economic evaluation tools as inappropriate for public sector projects. The survey results also found conducting risk management analysis, developing a risk register and mitigation of risks were most effective way of managing risk. This study provides an opportunity for the public sector to review and provide training on project management practices and government regulatory policies governing public projects. This will improve project management practitioners’ understanding and interpretation of government regulatory policies.
Resumo:
Discusses the role of negotiated frameworks as a regulatory mechanism in the development of Australia's premier industry of the 20th century.
Resumo:
On the back of the growing capacity of networked digital information technologies to process and visualise large amounts of information in a timely, efficient and user-driven manner we have seen an increasing demand for better access to and re-use of public sector information (PSI). The story is not a new one. Share knowledge and together we can do great things; limit access and we reduce the potential for opportunity. The two volumes of this book seek to explain and analyse this global shift in the way we manage public sector information. In doing so they collect and present papers, reports and submissions on the topic by leading authors and institutions from across the world. These in turn provide people tasked with mapping out and implementing information policy with reference material and practical guidance. Volume 1 draws together papers on the topic by policymakers, academics and practitioners while Volume 2 presents a selection of the key reports and submissions that have been published over the last few years.