867 resultados para Security, International
Resumo:
In Australia there is growing interest in a national curriculum to replace the variety of matriculation credentials managed by State Education departments, ostensibly to address increasing population mobility. Meanwhile, the International Baccalaureate (IB) is attracting increasing interest and enrolments in State and private schools in Australia, and has been considered as one possible model for a proposed Australian Certificate of Education. This paper will review the construction of this curriculum in Australian public discourse as an alternative frame for producing citizens, and ask why this design appeals now, to whom, and how the phenomenon of its growing appeal might inform national curricular debates. The IB’s emergence is understood with reference to the larger context of neo-liberal marketization policies, neo-conservative claims on the curriculum and middle class strategy. The paper draws on public domain documents from the IB Organisation and newspaper reportage to demonstrate how the IB is constructed for public consumption in Australia.
Resumo:
This paper reports on a study of students choosing the International Baccalaureate Diploma (IBD) over state-based curricula in Australian schools. The IBD was initially designed as a matriculation certificate to facilitate international mobility. While first envisaged as a lifestyle agenda for cultural elites, such mobility is now widespread with more people living ‘beyond the nation’ through choice or circumstance. Beck (2007) and others highlight how the capacity to cross national borders offers a competitive edge with which to strategically pursue economic and cultural capital. Beck’s ‘border artistes’ are those who use national borders to their individual advantage through reflexive strategy. The study explored the rationales and strategy behind the choice of the IBD curriculum expressed by students in a focus group interview and an online survey. This paper reports on their imagined transnational routes and mobile orientations, and how a localised curriculum limits their imagined mobile futures.
Resumo:
Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.
Resumo:
This is an important book that ought to launch a debate about how we research our understanding of the world, it is an innovative intervention in a vital public issue, and it is an elegant and scholarly hard look at what is actually happening. Jean Seaton, Prof of Media History, U of Westminster, UK & Official Historian of the BBC -- Summary: This book investigates the question of how comparative studies of international TV news (here: on violence presentation) can best be conceptualized in a way that allows for crossnational, comparative conclusions on an empirically validated basis. This book shows that such a conceptualization is necessary in order to overcome existing restrictions in the comparability of international analysis on violence presentation. Investigated examples include the most watched news bulletins in Great Britain (10o'clock news on the BBC), Germany (Tagesschau on ARD) and Russia (Vremja on Channel 1). This book highlights a substantial cross-national violence news flow as well as a cross-national visual violence flow (key visuals) as distinct transnational components. In addition, event-related textual analysis reveals how the historical rootedness of nations and its symbols of power are still manifested in televisual mediations of violence. In conclusion, this study lobbies for a conscientious use of comparative data/analysis both in journalism research and practice in order to understand what it may convey in the different arenas of today’s newsmaking.
Resumo:
Electronic Health Record (EHR) systems are being introduced to overcome the limitations associated with paper-based and isolated Electronic Medical Record (EMR) systems. This is accomplished by aggregating medical data and consolidating them in one digital repository. Though an EHR system provides obvious functional benefits, there is a growing concern about the privacy and reliability (trustworthiness) of Electronic Health Records. Security requirements such as confidentiality, integrity, and availability can be satisfied by traditional hard security mechanisms. However, measuring data trustworthiness from the perspective of data entry is an issue that cannot be solved with traditional mechanisms, especially since degrees of trust change over time. In this paper, we introduce a Time-variant Medical Data Trustworthiness (TMDT) assessment model to evaluate the trustworthiness of medical data by evaluating the trustworthiness of its sources, namely the healthcare organisation where the data was created and the medical practitioner who diagnosed the patient and authorised entry of this data into the patient’s medical record, with respect to a certain period of time. The result can then be used by the EHR system to manipulate health record metadata to alert medical practitioners relying on the information to possible reliability problems.
Resumo:
This work aims to take advantage of recent developments in joint factor analysis (JFA) in the context of a phonetically conditioned GMM speaker verification system. Previous work has shown performance advantages through phonetic conditioning, but this has not been shown to date with the JFA framework. Our focus is particularly on strategies for combining the phone-conditioned systems. We show that the classic fusion of the scores is suboptimal when using multiple GMM systems. We investigate several combination strategies in the model space, and demonstrate improvement over score-level combination as well as over a non-phonetic baseline system. This work was conducted during the 2008 CLSP Workshop at Johns Hopkins University.
Resumo:
Child abuse and neglect is a significant health and social problem with serious consequences for children, families and communities. This chapter provides students, early childhood teachers, and administrators with an evidence base for understanding their role in relation to child abuse and neglect. The chapter draws from international and interdisciplinary research to address four key areas of responsibility: i) recognising signs of child abuse and neglect; ii) reporting child abuse and neglect; iii) supporting children in the classroom; and iv) teaching children to protect themselves (Watts, 1997).
Resumo:
This paper reports on part of a study which was aimed at assessing the views of leading researchers, theorists or clinicians working in the field of bereavement on key issues including, as reported here, concepts of different forms of grief as well as favoured theoretical orientations. Of a range of conceptual models the most favoured, by a large margin, were attachment theory and the psychodynamic model. The views of the “experts’ were canvassed with respect to the use of seven selected terms used to denote some variant of the grieving process. There was, on the part of the respondents, reasonable support for the syndromes of “delayed’, “chronic’, “anticipatory’ and “absent’ grief. “Inhibited’ and “unresolved’ grief tended to be described using one of the four terms already supported, while the use of the term “distorted grief’ attracted little support.
Resumo:
The requirement for improved efficiency whilst maintaining system security necessitates the development of improved system analysis approaches and the development of advanced emergency control technologies. Load shedding is a type of emergency control that is designed to ensure system stability by curtailing system load to match generation supply. This paper presents a new adaptive load shedding scheme that provides emergency protection against excess frequency decline, whilst minimizing the risk of line overloading. The proposed load shedding scheme uses the local frequency rate information to adapt the load shedding behaviour to suit the size and location of the experienced disturbance. The proposed scheme is tested in simulation on a 3-region, 10-generator sample system and shows good performance.
Resumo:
The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.
Resumo:
Agent-oriented conceptual modelling (AoCM) approaches in Requirements Engineering (RE) have received considerable attention recently. Semi-formal modeling frameworks such as i* assist analysts in requirements elicitation and reasoning of early-phase RE. AgentSpeak(L) is a widely accepted agent programming language. The Strategic Rationale (SR) model of the i* framework naturally lends itself to AgentSpeak(L) programs. Furthermore, the Strategic Dependency (SD) component of the i* framework prescribes the interaction between the agents in a multi-agent environment. This paper proposes a formal methodology for transforming a SR model to an AgentS- peak(L) agent. The constructed AgentSpeak(L) agents will then form the essential components of a multi-agent system, MAS.
Resumo:
Automatic detection of suspicious activities in CCTV camera feeds is crucial to the success of video surveillance systems. Such a capability can help transform the dumb CCTV cameras into smart surveillance tools for fighting crime and terror. Learning and classification of basic human actions is a precursor to detecting suspicious activities. Most of the current approaches rely on a non-realistic assumption that a complete dataset of normal human actions is available. This paper presents a different approach to deal with the problem of understanding human actions in video when no prior information is available. This is achieved by working with an incomplete dataset of basic actions which are continuously updated. Initially, all video segments are represented by Bags-Of-Words (BOW) method using only Term Frequency-Inverse Document Frequency (TF-IDF) features. Then, a data-stream clustering algorithm is applied for updating the system's knowledge from the incoming video feeds. Finally, all the actions are classified into different sets. Experiments and comparisons are conducted on the well known Weizmann and KTH datasets to show the efficacy of the proposed approach.
Resumo:
Advances in information and communications technologies during the last two decades have allowed organisations to capture and utilise data on a vast scale, thus heightening the importance of adequate measures for protecting unauthorised disclosure of personal information. In this respect, data breach notification has emerged as an issue of increasing importance throughout the world. It has been the subject of law reform in the United States and in other international jurisdictions. Following the Australian Law Reform Commission’s review of privacy, data breach notification will soon be addressed in Australia. This article provides a review of US and Australian legal initiatives regarding the notification of data breaches. The authors highlight areas of concern based on the extant US literature that require specific consideration in Australia regarding the development of an Australian legal framework for the notification of data breaches.
Resumo:
In this paper, cognitive load analysis via acoustic- and CAN-Bus-based driver performance metrics is employed to assess two different commercial speech dialog systems (SDS) during in-vehicle use. Several metrics are proposed to measure increases in stress, distraction and cognitive load and we compare these measures with statistical analysis of the speech recognition component of each SDS. It is found that care must be taken when designing an SDS as it may increase cognitive load which can be observed through increased speech response delay (SRD), changes in speech production due to negative emotion towards the SDS, and decreased driving performance on lateral control tasks. From this study, guidelines are presented for designing systems which are to be used in vehicular environments.
Resumo:
Building integrated living systems (BILS), such as green roofs and living walls, could mitigate many of the challenges presented by climate change and biodiversity protection. However, few if any such systems have been constructed, and current tools for evaluating them are limited, especially under Australian subtropical conditions. BILS are difficult to assess, because living systems interact with complex, changing and site-specific social and environmental conditions. Our past research in design for eco-services has confirmed the need for better means of assessing the ecological values of BILS - let alone better models for assessing their thermal and hydrological performance. To address this problem, a research project is being developed jointly by researchers at the Central Queensland University (CQ University) and the Queensland University of Technology (QUT), along with industry collaborators. A mathematical model under development at CQ University will be applied and tested to determine its potential for predicting their complex, dynamic behaviour in different contexts. However, the paper focuses on the work at QUT. The QUT school of design is generating designs for living walls and roofs that provide a range of ecosystem goods and services, or ‘eco-services’, for a variety of micro-climates and functional contexts. The research at QUT aims to develop appropriate designs, virtual prototypes and quantitative methods for assessing the potential multiple benefits of BILS in subtropical climates. It is anticipated that the CQ University model for predicting thermal behaviour of living systems will provide a platform for the integration of ecological criteria and indicators. QUT will also explore means to predict and measure the value of eco-services provided by the systems, which is still largely uncharted territory. This research is ultimately intended to facilitate the eco-retrofitting of cities to increase natural capital and urban resource security - an essential component of sustainability. The talk will present the latest range of multifunctional, eco-productive living walls, roofs and urban space frames and their eco-services.