872 resultados para POST-PAID SERVICE PLANS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective environmental governance is hampered by the continuing presumption of the state as central actor in the domestic and international political contexts. Over the last 20 years, the traditional 'Westphalian' conception of the sovereign state has come under increasing pressure not only in theory, but also in practice, as evidenced by the increasing importance attributed to the participation of quasi-government and non-government actors in decision-making in domestic and international political issues. This paper is a contribution to the on-going debate about the meaning of effective environmental governance by mapping out a post-Westphalian conception of governance. In particular, it defines governance in relation to the protection of biodiversity; highlights obstacles to effective governance in this area, and discusses forming environmental management plans and environmental governance regimes to implement them. The final section of the paper suggests seven directions for ensuring the realisation of effective environmental governance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study, entitled "Surviving" Adolescence: Apocalyptic and post-apocalyptic transformations in young adult fiction‖, analyses how discourses surrounding the apocalyptic and post-apocalyptic are represented in selected young adult fiction published between 1997 and 2009. The term ―apocalypse‖ is used by current theorists to refer to an uncovering or disclosure (most often a truth), and ―post-apocalypse‖ means to be after a disclosure, after a revelation, or after catastrophe. This study offers a double reading of apocalyptic and post-apocalyptic discourses, and the dialectical tensions that are inherent in, and arise from, these discourses. Drawing on the current scholarship of children‘s and young adult literature this thesis uses post-structural theoretical perspectives to develop a framework and methodology for conducting a close textual analysis of exclusion, ‗un‘differentiation, prophecy, and simulacra of death. The combined theoretical perspectives and methodology offer new contributions to young adult fiction scholarship. This thesis finds that rather than conceiving adolescence as the endurance of a passing phase of a young person‘s life, there is a new trend emerging in young adult fiction that treats adolescence as a space of transformation essential to the survival of the young adult, and his/her community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Denial of Service Testing Framework (dosTF) being developed as part of the joint India-Australia research project for ‘Protecting Critical Infrastructure from Denial of Service Attacks’ allows for the construction, monitoring and management of emulated Distributed Denial of Service attacks using modest hardware resources. The purpose of the testbed is to study the effectiveness of different DDoS mitigation strategies and to allow for the testing of defense appliances. Experiments are saved and edited in XML as abstract descriptions of an attack/defense strategy that is only mapped to real resources at run-time. It also provides a web-application portal interface that can start, stop and monitor an attack remotely. Rather than monitoring a service under attack indirectly, by observing traffic and general system parameters, monitoring of the target application is performed directly in real time via a customised SNMP agent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Through a grant received from the Australian Library and Information Association (ALIA), members of Health Libraries Australia (HLA) are collaborating with a researcher/educator to conduct a twelve month research project with the goal of developing an educational framework for the Australian health librarianship workforce of the future. The collaboration comprises the principal researcher and a representative group of practitioners from different sectors of the health industry who are affiliated with ALIA in various committees, advisory groups and roles. The research has two main aims: to determine the future skills requirements for the health librarian workforce in Australia; and to develop a structured, modular education framework for specialist post-graduate qualifications together with a structure for ongoing continuing professional development. The paper highlights some of the major trends in the health sector and some of the main environmental influences that may act as drivers for change for health librarianship as a profession, and particularly for educating the future workforce. The research methodology is outlined and the main results are described; the findings are discussed with regard to their implications for the development of a structured, competency-based education framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: The aim of the present study was to investigate whether parent report of family resilience predicted children’s disaster-induced post-traumatic stress disorder (PTSD) and general emotional symptoms, independent of a broad range of variables including event-related factors, previous child mental illness and social connectedness. ---------- Methods: A total of 568 children (mean age = 10.2 years, SD = 1.3) who attended public primary schools, were screened 3 months after Cyclone Larry devastated the Innisfail region of North Queensland. Measures included parent report on the Family Resilience Measure and Strengths and Difficulties Questionnaire (SDQ)–emotional subscale and child report on the PTSD Reaction Index, measures of event exposure and social connectedness. ---------- Results: Sixty-four students (11.3%) were in the severe–very severe PTSD category and 53 families (28.6%) scored in the poor family resilience range. A lower family resilience score was associated with child emotional problems on the SDQ and longer duration of previous child mental health difficulties, but not disaster-induced child PTSD or child threat perception on either bivariate analysis, or as a main or moderator variable on multivariate analysis (main effect: adjusted odds ratio (ORadj) = 0.57, 95% confidence interval (CI) = 0.13–2.44). Similarly, previous mental illness was not a significant predictor of child PTSD in the multivariate model (ORadj = 0.75, 95%CI = 0.16–3.61). ---------- Conclusion: In this post-disaster sample children with existing mental health problems and those of low-resilience families were not at elevated risk of PTSD. The possibility that the aetiological model of disaster-induced child PTSD may differ from usual child and adolescent conceptualizations is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

If the student wellbeing pedagogy characterised by the troika metaphor is to become more widely adopted, beginning teachers need to be inducted into service learning. In this chapter, we discuss the implementation and outcomes of a service learning program in a Bachelor of Education course in Australia. The program provides pre-service teachers with insights into service learning practice. Pre-service teachers are given supported opportunities to examine and challenge traditional beliefs and values about student diversity and the role of schools in developing a more inclusive society. They are supported in developing ethics of care and concern for inclusive and equitable practices – characteristics necessary for quality teaching. Thus, the Queensland University of Technology (QUT) service learning program is an ideal example of the troika effect in practice, in that the pedagogy fuses values education, quality teaching and service learning to develop within each student an inclusive ethical framework that will inform their classroom practice as beginning quality teachers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The holistic conception of the troika, as described in the first chapter, centres on the relationship between the implicit and explicit teaching of values the nurturing of the specific dimensions of quality teaching and the opportunity to ‘walk the talk’ of the values education program through aspects such as practical citizenship (Lovat, Toomey, Clement, Crotty & Nielsen, 2009). It is proposed in this chapter that the conception can be realized through the embedding of Philosophy in the Classroom within pre-service teaching programs. The troika, a Russian sleigh with three horses, only function well when there is complete synergy and balance between all Classroom is a scaffold for ensuring that all three elements of the troika, namely, quality teaching, values education and service learning in the form of education for citizenship, exist within the classroom to achieve an optimal learning, growth and wellbeing for all students. For this to be more widely accomplished Philosophy in the Classroom and discusses how it constitutes a successful synergy and balance of the troika for effective teaching. It then proposes how it might be embedded into pre-service teacher education.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In an open railway access market, the Infrastructure Provider (IP), upon the receipts of service bids from the Train Service Providers (TSPs), assigns track access rights according to its own business objectives and the merits of the bids; and produces the train service timetable through negotiations. In practice, IP chooses to negotiate with the TSPs one by one in such a sequence that IP optimizes its objectives. The TSP bids are usually very complicated, containing a large number of parameters in different natures. It is a difficult task even for an expert to give a priority sequence for negotiations from the contents of the bids. This study proposes the application of fuzzy ranking method to compare and prioritize the TSP bids in order to produce a negotiation sequence. The results of this study allow investigations on the behaviors of the stakeholders in bid preparation and negotiation, as well as evaluation of service quality in the open railway market.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditionally, consumers who have been dissatisfied with service have typically complained to the frontline personnel or to a manager in either a direct (face-to-face, over the phone) manner, indirect by writing, or done nothing but told friends and family of the incident. More recently, the Internet has provided various “new” ways to air a grievance, especially when little might have been done at the point of service failure. With the opportunity to now spread word-of-mouth globally, consumers have the potential to impact the standing of a brand or a firm's reputation. The hotel industry is particularly vulnerable, as an increasing number of bookings are undertaken via the Internet and the decision process is likely to be influenced by what other previous guests might post on many booking-linked sites. We conducted a qualitative study of a key travel site to ascertain the forms and motives of complaints made online about hotels and resorts. 200 web-based consumer complaints were analyzed using NVivo 8 software. Findings revealed that consumers report a wide range of service failures on the Internet. They tell a highly descriptive, persuasive, and credible story, often motivated by altruism or, at the other end of the continuum, by revenge. These stories have the power to influence potential guests to book or not book accommodation at the affected properties. Implications for managers of hotels and resorts are discussed.