865 resultados para security sector reform


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is still no comprehensive information strategy governing access to and reuse of public sector information, applying on a nationwide basis, across all levels of government – local, state and federal - in Australia. This is the case both for public sector materials generally and for spatial data in particular. Nevertheless, the last five years have seen some significant developments in information policy and practice, the result of which has been a considerable lessening of the barriers that previously acted to impede the accessibility and reusability of a great deal of spatial and other material held by public sector agencies. Much of the impetus for change has come from the spatial community which has for many years been a proponent of the view “that government held information, and in particular spatial information, will play an absolutely critical role in increasing the innovative capacity of this nation.”1 However, the potential of government spatial data to contribute to innovation will remain unfulfilled without reform of policies on access and reuse as well as the pervasive practices of public sector data custodians who have relied on government copyright to justify the imposition of restrictive conditions on its use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It has been common practice over past property boom and bust cycles in Australia for financial institutions and property owners who have suffered a loss in the property downturn to sue valuers for negligence. Damages claimed are based on the price differential between the valuation at or nearing the peak of the market and the subsequent sale in the market downturn. However, the context of valuers liability has become increasingly complex as a result of statutory reforms introduced in response to the Review of the Law of Negligence Final Report 2002), in particular the introduction of Civil Liability Acts introducing proportionate liability provisions. Legislative reforms have had some positive outcomes for Valuers, however valuers need to continue to maintain high ethical standards, independence and professionalism in valuation practice.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Article XX has been a valuable instrument to justify exceptions from the anti-discrimination provisions of the GATT 1994. In general, this Article is considered by experts to be the most likely defence for any climate change mitigation measure in breach GATT 1994 obligations. That assumption is not in dispute here; rather, this article considers the requirements of the Article XX exceptions, but also explores the conditions of the National Security exception contained in Article XXI. Although it is possible that this exception could be used for climate change mitigation measures, this paper argues that it is unlikely that the National Security exception could be legitimately applied in these circumstances without member agreement to the contrary.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Shared services is a prominent organizational arrangement for organizations, in particular for support functions. The success (or failure) of shared services is a critical concern as the move to shared services can entail large scale investment and involve fundamental organizational change. The Higher Education (HE) sector is particularly well poised to benefit from shared services as there is a need to improve organizational performance and strong potential from sharing. Through a multiple case study of shared services experiences in HE, this study identifies ten important antecedents of shared services success: (1) Understanding of shared services; (2) Organizational environment; (3) Top management support; (4) IT environment; (5) Governance; (6) Process centric view; (7) Implementation strategy; (8) Project management; (9) Change management; and (10) Communication. The study then develops a preliminary model of shared services success that addresses the interdependencies between the success factors. As the first empirical success model for shared services, it provides valuable guidance to practice and future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Periurban agriculture refers to agricultural practice occurring in areas with mixed rural and urban features. It is responsible 25% of the total gross value of economic production in Australia, despite only comprising 3% of the land used for agriculture. As populations grows and cities expand, they are constantly absorbing surrounding fringe areas, thus creating a new fringe, further from the city causing the periurban region to constantly shift outwards. Periurban regions are fundamental in the provision of fresh food to city populations and residential (and industrial) expansion taking over agricultural land has been noted as a major worldwide concern. Another major concern around the increase in urbanisation and resultant decrease in periurban agriculture is its potential effect on food security. Food security is the availability or access to nutritionally-adequate, culturally-relevant and safe foods in culturally-appropriate ways. Thus food insecurity occurs when access to or availability of these foods is compromised. There is an important level of connectedness between food security and food production and a decrease in periurban agriculture may have adverse effects on food security. A decrease in local, seasonal produce may result in a decrease in the availability of products and an increase in cost, as food must travel greater distances, incurring extra costs present at the consumer level. Currently, few Australian studies exist examining the change in periurban agriculture over time. Such information may prove useful for future health policy and interventions as well as infrastructure planning. The aim of this study is to investigate changes in periurban agriculture among capital cities of Australia. Methods: We compared data pertaining to selected commodities from the Australian Bureau of Statistics 2000-01 and 2005 -2006 Agricultural Census. This survey is distributed online or via mail on a five-yearly basis to approximately 175,000 Agricultural business to ascertain information on a range of factors, such as types of crops, livestock and land preparation practices. For the purpose of this study we compared the land being used for total crops, and cereal , oil seed, legume, fruit and vegetable crops separately. Data was analysed using repeated measures anova in spss. Results: Overall, total area available for crops in urbanised areas of Australia increased slightly by 1.8%. However, Sydney, Melbourne, Adelaide and Perth experienced decreases in the area available for fruit crops by 11%, 5%,and 4% respectively. Furthermore, Brisbane and Perth experienced decreases in land available for vegetable crops by 28% and 14% respectively. Finally, Sydney, Adelaide and Perth experienced decreases in land available for cereal crops by 10 – 79%. Conclusions: These findings suggest that population increases and consequent urban sprawl may be resulting in a decrease in peri-urban agriculture, specifically for several core food groups including fruit, breads and grain based foods. In doing so, access to or availability of these foods may be limited, and the cost of these foods is likely to increase, which may compromise food insecurity for certain sub-groups of the population.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study seeks to examine the causality of non-nursing and nursing stressors on the job satisfaction of nurses and how coping strategies have a mediating influence on this relationship in the context of sector-wide reform. To conceptualize the relationships, a mediation path model was developed. Data were collected at two time points using a self-completed online survey over a six monthly interval. During time 1, 306 Australian nurses completed the online survey. In the first wave (time 1), 306 Australian nurses completed the survey. In the second wave (time 2), matched survey data were collected from 119 nurses. The analysis showed a significant causal relationship between time 1 administrative and role stressors and an increase in nursing stress in time 2. A significant relationship was also identified between job specific context stressors and the adoption of effective coping strategies to deal with increased level of change-induced stress and strain and the likelihood of reporting higher level of job satisfaction in time 2. This study contributes by providing an integrated theoretical perspective on how stress affects retention that has so far been elusive. This is useful to researchers wanting to examine this phenomenon further and practitioners responsible for implementing change programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses the situation of welfare claimants, often constructed as faulty citizens and flawed welfare subjects. Many are on the receiving end of complex, multi-layered forms of surveillance aimed at securing socially responsible and compliant behaviours. In Australia, as in other Western countries, neoliberal economic regimes with their harsh and often repressive treatment of welfare recipients operate in tandem with a burgeoning and costly arsenal of CCTV and other surveillance and governance assemblages. The Australian Government’s Centrelink BasicsCard is but one example of welfare surveillance, whereby a percentage of a welfare claimant’s allowances must be spent on ‘approved’ items. The BasicsCard which has perhaps slipped under the radar of public discussion and is expanding nationally, raises significant questions about whether it is possible to encourage people to take responsibility for themselves if they no longer have real control over the most important aspects of their lives. Resistance and critical feedback, particularly from Indigenous people, points to a loss of dignity around the imposition of income management, operational complexity and denial of individual agency in using the BasicsCard, alongside the contradiction of apparently becoming ‘self-reliant’ through being income managed by the welfare state. This paper highlights the lack of solid evidence for the implementation/imposition of the BasicsCard and points to the importance of developing critically based research to inform the enactment of evidence based policy, also acting as a touchstone for governmental accountability. In highlighting issues around the BasicsCard this paper makes a contribution to the largely under discussed area of income management and the growth of welfare surveillance in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Problems with charity law jurisprudence persist. The difficulties arose in the 20th century and are fundamental to the way the doctrine is presently theorised. They grew out of the approach taken in Pemsel’s Case to the categorisation of the ‘spirit and intendment’ of the Preamble to the Statute of Charitable Uses. Recent statutory reforms, such as the Charities Act 2006 (Eng&W), have compounded the underlying problems rather than resolving them. This paper aims to stimulate thinking about a new foundation for charity jurisprudence – while the approach may seem radical, the paper argues that these new foundations can be discerned underlying the current jurisprudence. The difficulties can be overcome by rediscovering the underlying jurisprudence which is disregarded in the current approach to categorisation. Giving voice, in contemporary language, to that foundational jurisprudence, this paper provides a way out of the current problems. It also provides an alternative way of conceptualising the doctrine of charitable purpose to guide reform.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vietnam has a unique culture which is revealed in the way that people have built and designed their traditional housing. Vietnamese dwellings reflect occupants’ activities in their everyday lives, while adapting to tropical climatic conditions impacted by seasoning monsoons. It is said that these characteristics of Vietnamese dwellings have remained unchanged until the economic reform in 1986, when Vietnam experienced an accelerated development based on the market-oriented economy. New housing types, including modern shop-houses, detached houses, and apartments, have been designed in many places, especially satisfying dwellers’ new lifestyles in Vietnamese cities. The contemporary housing, which has been mostly designed by architects, has reflected rules of spatial organisation so that occupants’ social activities are carried out. However, contemporary housing spaces seem unsustainable in relation to socio-cultural values because they has been influenced by globalism that advocates the use of homogeneous spatial patterns, modern technologies, materials and construction methods. This study investigates the rules of spaces in Vietnamese houses that were built before and after the reform to define the socio-cultural implications in Vietnamese housing design. Firstly, it describes occupants’ views of their current dwellings in terms of indoor comfort conditions and social activities in spaces. Then, it examines the use of spaces in pre-reform Vietnamese housing through occupants’ activities and material applications. Finally, it discusses the organisation of spaces in both pre- and post-reform housing to understand how Vietnamese housing has been designed for occupants to live, act, work, and conduct traditional activities. Understanding spatial organisation is a way to identify characteristics of the lived spaces of the occupants created from the conceived space, which is designed by designers. The characteristics of the housing spaces will inform the designers the way to design future Vietnamese housing in response to cultural contexts. The study applied an abductive approach for the investigation of housing spaces. It used a conceptual framework in relation to Henri Lefebvre’s (1991) theory to understand space as the main factor constituting the language of design, and the principles of semiotics to examine spatial structure in housing as a language used in the everyday life. The study involved a door-knocking survey to 350 households in four regional cities of Vietnam for interpretation of occupancy conditions and levels of occupants’ comfort. A statistical analysis was applied to interpret the survey data. The study also required a process of data selection and collection of fourteen cases of housing in three main climatic regions of the country for analysing spatial organisation and housing characteristics. The study found that there has been a shift in the relationship of spaces from the pre- to post-reform Vietnamese housing. It also indentified that the space for guest welcoming and family activity has been the central space of the Vietnamese housing. Based on the relationships of the central space with the others, theoretical models were proposed for three types of contemporary Vietnamese housing. The models will be significant in adapting to Vietnamese conditions to achieve socioenvironmental characteristics for housing design because it was developed from the occupants’ requirements for their social activities. Another contribution of the study is the use of methodological concepts to understand the language of living spaces. Further work will be needed to test future Vietnamese housing designs from the applications of the models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.