946 resultados para Mutual security program, 1951-
Resumo:
Espionage, surveillance and clandestine operations by secret agencies and governments were something of an East–West obsession in the second half of the twentieth century, a fact reflected in literature and film. In the twenty-first century, concerns of the Cold War and the threat of Communism have been rearticulated in the wake of 9/11. Under the rubric of ‘terror’ attacks, the discourses of security and surveillance are now framed within an increasingly global context. As this article illustrates, surveillance fiction written for young people engages with the cultural and political tropes that reflect a new social order that is different from the Cold War era, with its emphasis on spies, counter espionage, brainwashing and psychological warfare. While these tropes are still evident in much recent literature, advances in technology have transformed the means of tracking, profiling and accumulating data on individuals’ daily activities. Little Brother, The Hunger Games and Article 5 reflect the complex relationship between the real and the imaginary in the world of surveillance and, as this paper discusses, raise moral and ethical issues that are important questions for young people in our age of security.
Resumo:
Although suicide deaths in Australia continue to decline since the peak of 2,720 suicide deaths in 1997, youth suicide and self-harm are a major health issue. In 2006, in the 20 to 24 year age group, suicide accounted for approximately 21% of all male deaths and 14% of all female deaths. There is a lack of solid data on the rates of suicide and self-harm among young people from refugee backgrounds. However, this population faces a significant number of post-resettlement stressors that may add to their vulnerability and increase their risk of suicide and self-harm. The NEXUS program is an innovative strategy developed by the Queensland Program of Assistance to Survivors of Torture and Trauma (QPASTT) that aims to reduce risk factors for suicide and self-harm and to promote protective factors among youth from refugee backgrounds living in Brisbane and Toowoomba. QPASTT is a non-government organisation that provides culturally appropriate support services to refugee and humanitarian entrants to Australia. QPASTT’s primary function is to provide counselling, advocacy support and community development activities for survivors of torture and trauma at an individual, family and community level. Since 2002 the NEXUS program has been developed and implemented by QPASTT. Since then, this multi-component program has been funded by the Commonwealth Department of Health and Ageing through the National Suicide Prevention Strategy (NSPS). NSPS funding of local community suicide prevention activities will contribute to the outcomes specified in the strategic framework: Living is for Everyone (LIFE): A framework for prevention of suicide and self-harm in Australia. The focus of this report is the evaluation of the NEXUS program conducted by QPASTT between August 2007 and May 2009.
Resumo:
In this article, we study the security of the IDEA block cipher when it is used in various simple-length or double-length hashing modes. Even though this cipher is still considered as secure, we show that one should avoid its use as internal primitive for block cipher based hashing. In particular, we are able to generate instantaneously free-start collisions for most modes, and even semi-free-start collisions, pseudo-preimages or hash collisions in practical complexity. This work shows a practical example of the gap that exists between secret-key and known or chosen-key security for block ciphers. Moreover, we also settle the 20-year-old standing open question concerning the security of the Abreast-DM and Tandem-DM double-length compression functions, originally invented to be instantiated with IDEA. Our attacks have been verified experimentally and work even for strengthened versions of IDEA with any number of rounds.
Resumo:
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
Resumo:
Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.
Resumo:
This paper provides a detailed description of the current Australian e-passport implementation and makes a formal verification using model checking tools CASPER/CSP/FDR. We highlight security issues present in the current e-passport implementation and identify new threats when an e-passport system is integrated with an automated processing systems like SmartGate. Because the current e-passport specification does not provide adequate security goals, to perform a rational security analysis we identify and describe a set of security goals for evaluation of e-passport protocols. Our analysis confirms existing security issues that were previously informally identified and presents weaknesses that exists in the current e-passport implementation.
Resumo:
As part of the introduction of a broader dance medicine and science related health and wellbeing program, a 9 week mindfulness-meditation ACT-based program was delivered to all students undertaking full-time University dance training (N = 106). The aim of the program was to assist students in the further development of performance psychology skills that could be applied in both performance and non-performance settings. Participant groups were comprised of both male (N = 12) and female (N = 94) students from across all three year levels of two undergraduate dance courses, divided into three groups by mixed year levels due to timetable scheduling requirements. Pre- and post-testing was undertaken utilising the Mindful Attention Awareness Scale (MAAS-15), a uni-dimensional measure of mindfulness, in addition to qualitative questions checking the current level of awareness and understanding of mindfulness practice and its application. Weekly sessions were conducted by qualified sport and exercise psychologists and covered key practices such as: Mindfulness of Body, Mindfulness of Breathing, Mindfulness of Sounds, ACT-based and general Imagery exercises, Developing Open Awareness, Mindfulness of Emotions, and Developing Inner Stillness. Students were required to maintain a reflective journal that was utilised at the end of each weekly session, in addition to completion of a mid-Semester reflective debrief. Teaching staff additionally attended the weekly sessions and linked the mindfulness practice learnings into the student’s practical dance and academic classes where appropriate. Anecdotal feedback indicates that participation in the mindfulness-meditation sessions and the development of these mental skills has resulted in positive performance and personal outcomes. Observations collated from staff and students, results from the data collection phases and recommendations regarding future applications within dance training settings will be discussed within the presentation.
Resumo:
The final report for the ARC project "Airports of the Future". It contains the findings and recommendations provided by the various teams to the industry partners.
Resumo:
Environmental engineers are increasingly being required to have knowledge about sustainability in their professional careers. Accreditation mechanisms for including sustainability in degree program requirements exist and are gradually being implemented by Engineers Australia. However, true integration of sustainability material into higher and vocational education curricula is still low, particularly outside the environmental engineering degree programs. In addition to environmental engineering, it is crucial for engineering across the specialisations, to be exposed to sustainability concepts and theories. This paper will demonstrate how sustainability as a ‘critical literacy’ can be designed for teaching within mainstream engineering education, using a current Australian project as a case study. The project demonstrates that sustainability education for all engineers is not only possible, but that there is international interest in collaborating in such an educational initiative. A pilot trial of the Introductory Module was undertaken in Semester 1 2004 and Version 2 trials are now proceeding with a number of universities and organisations nationally and internationally. Further modules are currently being developed in collaboration with Engineers Australia and UNESCO. The program is a finalist in the 2005 Banksia Awards (Category 11, Environmental Leadership Education and Training).
Resumo:
The general aim of designated driver programs is to reduce the level of drink driving by encouraging potential drink drivers to travel with a driver who has abstained from (or at least limited) consuming alcohol. Designated driver programs appear to be quite widespread around the world, however a limited number have been subject to rigorous evaluation. This paper reports results from an outcome evaluation of a designated driver program called ‘Skipper’, which was trialled in a provincial city in Queensland, Australia. The outcome evaluation included surveys three weeks prior to (baseline), four months following (1st follow-up), and 16 months following (2nd follow-up) the commencement of the trial in both the ‘intervention area’ (baseline, n = 202; 1st follow-up, n = 211; 2nd follow-up, n = 200) and a ‘comparison area’(baseline, n = 203; 1st follow-up, n = 199; 2nd follow-up, n = 201); and a comparison of random breath testing and crash data before and after the trial. The survey results indicate that awareness of the program in the intervention area was quite high four months following its introduction and that this was maintained at 16 months. The results also suggest that the ‘Skipper’ program and the related publicity had positive impacts on behaviour with an increase in the proportion of people participating in designated driver as a passenger. It is less clear, however, whether the ‘Skipper’ program impacted on other behaviours of interest, such as drink driving or involvement in alcohol-related crashes. Suggestions for further research and program improvement are discussed as well as limitations of the research.
Resumo:
Importance Active video games may offer an effective strategy to increase physical activity in overweight and obese children. However, the specific effects of active gaming when delivered within the context of a pediatric weight management program are unknown. Objective To evaluate the effects of active video gaming on physical activity and weight loss in children participating in an evidence-based weight management program delivered in the community. Design, Setting, and Participants Group-randomized clinical trial conducted during a 16-week period in YMCAs and schools located in Massachusetts, Rhode Island, and Texas. Seventy-five overweight or obese children (41 girls [55%], 34 whites [45%], 20 Hispanics [27%], and 17 blacks [23%]) enrolled in a community-based pediatric weight management program. Mean (SD) age of the participants was 10.0 (1.7) years; body mass index (BMI) z score, 2.15 (0.40); and percentage overweight from the median BMI for age and sex, 64.3% (19.9%). Interventions All participants received a comprehensive family-based pediatric weight management program (JOIN for ME). Participants in the program and active gaming group received hardware consisting of a game console and motion capture device and 1 active game at their second treatment session and a second game in week 9 of the program. Participants in the program-only group were given the hardware and 2 games at the completion of the 16-week program. Main Outcomes and Measures Objectively measured daily moderate-to-vigorous and vigorous physical activity, percentage overweight, and BMI z score. Results Participants in the program and active gaming group exhibited significant increases in moderate-to-vigorous (mean [SD], 7.4 [2.7] min/d) and vigorous (2.8 [0.9] min/d) physical activity at week 16 (P < .05). In the program-only group, a decline or no change was observed in the moderate-to-vigorous (mean [SD] net difference, 8.0 [3.8] min/d; P = .04) and vigorous (3.1 [1.3] min/d; P = .02) physical activity. Participants in both groups exhibited significant reductions in percentage overweight and BMI z scores at week 16. However, the program and active gaming group exhibited significantly greater reductions in percentage overweight (mean [SD], −10.9% [1.6%] vs −5.5% [1.5%]; P = .02) and BMI z score (−0.25 [0.03] vs −0.11 [0.03]; P < .001). Conclusions and Relevance Incorporating active video gaming into an evidence-based pediatric weight management program has positive effects on physical activity and relative weight.
Resumo:
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient
Resumo:
INTRODUCTION Globally, one-third of food production is lost annually due to negligent authorities. India alone loses some 21 million tonnes of wheat per year even while it has 200 million food-insecure people in the nation. Disturbingly provocative as it may sound, it is amazing how national and international institutions and governments make use of human hunger for their own survival (Raghib 2013). The global food system is increasingly insecure. Challenges to long-term global food security are encapsulated by resource scarcity, environmental degradation, biodiversity loss, climate change, reductions of farm labour and a growing world population. These issues are caused and aggravated by the spread of corporatised and monopolised food systems, dietary change, and urbanisation. These factors have rapidly brought food insecurity under the umbrella of unconventional security threats (Heukelom 2011). For some, humanitarian crises associated with food insecurity, or what has been dubbed ‘the silent tsunami’, is a pending peril, notably for the world’s poorest and most vulnerable people. For others, the food production industry is an emerging market with unprecedented profits. Despite this problem of food scarcity we are witnessing extraordinary ‘food wastage’, notably in North America and Europe, on a scale that would reportedly be capable of feeding the world’s hungry six times over (Stuart 2012). As the opening quotation to this chapter suggests, governments and corporations are deeply involved in the contexts, politics, and resources associated with food related issues. As many economically developed and advanced industrial nations are reporting a rise out of recession, announcements are made by the world’s richest countries that they are to cut $US2 billion per year from food aid. The head of the World Food Aid Programme, Rosette Sheeran, warns that such cuts could result in ‘the loss of a generation’ (Walters 2011). The global food crisis has also reinvigorated debates about agricultural development and genetically modified (GM) food; as well as fuelling debates about poverty, debt and security. This chapter provides a discussion of the political economy of global food debates and explores the threats and opportunities surrounding food production and future food security.
Resumo:
Obesity rates are increasing in children of all ages, and reduced physical activity (PA) is a likely contributor to this trend. Little is known about the physical activity behavior of preschool-age children, or about the influence of preschool attendance on physical activity. Purpose The purpose of this study was to quantify the physical activity levels of children attending a center-based half-day preschool program. Methods Forty-two 3-to-5-year old children (Mean age = 4.0 ± 0.7, 54.8% Male, Mean BMI = 16.5 ± 5.5, Mean BMI %tile = 52.1 ± 33.5) from four class groups (two morning and two afternoon), wore an Actigraph 7164 accelerometer for the entire halfday program (including classroom learning experiences, snack and recess time) 2 times per week, for 10 weeks (20 activity monitoring records in total). Activity counts for each 5-sec interval were uploaded to a customized data reduction program to determine total counts, minutes of moderate PA (MPA) (3–5.9 METs), and minutes of vigorous PA (VPA) (> = 6 METs) per session. Counts were categorized as either MPA or VPA using the cutpoints developed by Sirard and colleagues (2001). Results Across the four 2.5 hour programs, the average MPA, VPA and total counts (× 103) were 12.4 ± 3.1 minutes, 18.3 ± 4.6 minutes, and 171.1 ± 29.7 counts, respectively. Thus, on average, children accumulated just over 12 minutes of moderateto-vigorous PA per hour of program attendance. The PA variables did not differ significantly by gender, weight status, or time of day. There were, however, significant age differences, with 3-year-olds exhibiting significantly less PA than their 4- and 5-year-old counterparts. Conclusions These results suggest that young children are relatively lowactive while attending preschool. Accordingly, interventions to increase movement opportunities during the preschool day are warranted.