791 resultados para Secure and Resilient Infrastructure
Resumo:
In the networked information driven world that we now inhabit the ability to access and reuse information, data and culture is a key ingredient to social, economic and cultural innovation. As government holds enormous amounts of publicly funded material that can be released to the public without breaching the law it should move to implement policies that will allow better access to and reuse of that information, knowledge and culture. The Queensland Government Information Licensing Framework (GILF) Project4 is one of the first projects in the world to systemically approach this issue and should be consulted as a best practice model.
Resumo:
Urban expansion continues to encroach on once isolated sewerage infrastructure. In this context,legislation and guidelines provide limited direction to the amenity allocation of appropriate buffer distances for land use planners and infrastructure providers. Topography, wind speed and direction,temperature, humidity, existing land uses and vegetation profiles are some of the factors that require investigation in analytically determining a basis for buffer separations. This paper discusses the compilation and analysis of six years of Logan sewerage odour complaint data. Graphically,relationships between the complaints, topographical features and meteorological data are presented. Application of a buffer sizing process could assist planners and infrastructure designers alike, whilst automatically providing extra green spaces. Establishing a justifiable criterion for buffer zone allocations can only assist in promoting manageable growth for healthier and more sustainable communities.
Resumo:
This paper explores attempts to shape resilient personae through relations of self-government, and highlights the way that this features as part of advanced liberal forms of rule. As an example of this process, it focuses on the way that undergraduate law students are encouraged to fashion resilient personae throughout their legal studies, so as to avoid, or effectively respond to, experiences that may have a detrimental effect on their mental health. This paper argues that the production of such resilience relies on students being encouraged to take up psychologically- and biomedically-infused subject positions, becoming well-disciplined subjects, entrepreneurs of the self, and even virtuous persons. It highlights that the fashioning of resilient personae in this way involves extensions to the targets and practices of self-government and reinforces advanced liberal government. The paper then suggests how insights into fashioning resilience in this context can inform further research on resilience, particularly resilience produced within criminal justice professionals.
Resumo:
Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
Resumo:
Sourcing appropriate funding for the provision of new urban infrastructure has been a policy dilemma for governments around the world for decades. This is particularly relevant in high growth areas where new services are required to support swelling populations. The Australian infrastructure funding policy dilemmas are reflective of similar matters in many countries, particularly the United States of America, where infrastructure cost recovery policies have been in place since the 1970’s. There is an extensive body of both theoretical and empirical literature from these countries that discusses the passing on (to home buyers) of these infrastructure charges, and the corresponding impact on housing prices. The theoretical evidence is consistent in its findings that infrastructure charges are passed on to home buyers by way of higher house prices. The empirical evidence is also consistent in its findings, with “overshifting” of these charges evident in all models since the 1980’s, i.e. $1 infrastructure charge results in greater than $1 increase in house prices. However, despite over a dozen separate studies over two decades in the US on this topic, no empirical works have been carried out in Australia to test if similar shifting or overshifting occurs here. The purpose of this research is to conduct a preliminary analysis of the more recent models used in these US empirical studies in order to identify the key study area selection criteria and success factors. The paper concludes that many of the study area selection criteria are implicit rather than explicit. By collecting data across the models, some implicit criteria become apparent, whilst others remain elusive. This data will inform future research on whether an existing model can be adopted or adapted for use in Australia.
Resumo:
Transport and logistics are essential to effective business. Very little is currently known about the impact of improved transport on micro-enterprises in developing economies and whether improvements in this area would assist the very poor. This paper looks at the obstacles of an inefficient transport facilitation system and the high costs incurred by 22 survival micro-entrepreneurs funded by the same local NGO and operating in diverse industry sectors in a peri-urban context in Mozambique. Six case studies are selected to illustrate the most common constraints they face. The perspectives of the micro-business owners are confronted with those of government officials and community leaders for two reasons: to identify any mismatch and to discuss possible solutions. Significant discrepancies are detected between government agenda and needs of the population, while community-based entrepreneurship (CBE) is discussed as a possible collective strategy in dealing with the problem.
Resumo:
This article describes the rationale, developmental process, and content of a resilience-building program that has been implemented with new recruits to a police academy. The process of extensive consultation with the police service (consistent with community-based participatory research principles) has helped to provide a sustainable and pragmatic program framework. The Promoting Resilient Officers (PRO) program is a seven-session strength-based program that integrates CBT and interpersonal perspectives within a salutogenic paradigm. PRO also includes two “refresher” sessions delivered online up to 18 months post the initial face-to-face sessions. PRO was delivered with high fidelity as an integral part of police recruit training and made sustainable by using psychologists within the police service to deliver the intervention. Implementation incorporated a Randomized Controlled design by which a rigorous evaluation of program effectiveness is being conducted. Initial data presented indicates a high level of engagement and acceptability of the PRO program.
Resumo:
From its early birth through to the twenty-first century, the planning for social infrastructure has been viewed as a crucial element in promoting the development of healthy communities. The existence of good social infrastructure in every level of human settlement (i.e. neighbourhoods, districts, regions etc.) is vital because it is considered to be an element that impacts positively and meaningfully on the quality of life for members of the targeted community. The increasing importance of the sustainable development agenda in human settlements has prompted concerns over the cost of the government’s failure to provide for adequate social infrastructure for their communities. Part of this failure is attributed to the inconsistent outcome from the use of traditional planning standards that are based on population-to-facility ratios. This paper explores the literature discussion on social infrastructure for sustainable communities. It examines how a participation-oriented, need-sensitive approach in the planning and provision of social infrastructure is used as an alternative to the traditional standards that are based on population-to-facility ratios. It does this by giving an overview of its application in the planning and provision of social infrastructure for Australia’s fastest growing region of South-East Queensland.
Resumo:
Public participate in the planning and design of major public infrastructure and construction (PIC) projects is crucial to their success, as the interests of different stakeholders can be systematically captured and built into the finalised scheme. However, public participation may not always yield a mutually acceptable solution, especially when the interests of stakeholders are diverse and conflicting. Confrontations and disputes can arise unless the concerns or needs of the community are carefully analysed and addressed. The aim of the paper is to propose a systematic method of analysing stakeholder concerns relating to PIC projects by examining the degree of consensus and/or conflict involved. The results of a questionnaire survey and a series of interviews with different entities are provided, which indicate the existence of a significant divergence of views among stakeholder groups and that conflicts arise when there is a mismatch between peoples’ perception concerning money and happiness on the one hand and development and damages on the other. Policy and decision-makers should strive to resolve at least the majority of conflicts that arise throughout the lifecycle of major PIC projects so as to maximise their chance of success.
Resumo:
Just as telecommunications has played a key role in the global economy,1 high-speed broadband will have a significant role to play in the future of the digital economy. In particular high-speed broadband will have a role to play in the delivery of applications and services necessary for acquiring, and maintaining into the future Australia and Australians’ appropriate education level; community; health services, information provision and support; government services and engagement and participation by the public in the political process.
Resumo:
Many governments world-wide are increasingly encouraging the involvement of interested individuals, groups and organisations in their publicinfrastructure and construction (PIC) projects as a means of improving the openness, transparency and accountability of the decision-making process and help improve the projects’ long-term viability and benefits to the community. In China, however, the current participatory mechanism at the project level exists only as part of the environmental impact assessment (EIA) process. With an increasing demand for PIC projects and social equality in China, this suggests a need to bring the participatory process into line with international practice. The aim of this paper, therefore, is to identify the weaknesses of EIA-basedpublicparticipation in China and the means by which it may be improved for the whole lifecycle of PIC schemes. To do this, the results of a series of interviews with a diverse group of experts is reported which analyse the nature and extent of existing problems of publicparticipation in EIA and suggestions for improvement. These indicate that the current level of participation in PIC projects is quite limited, particularly in the crucial earlier stages, primarily due to traditional culture and values, uneven progress in the adoption of participatory mechanisms, the risk of not meeting targets and lack of confidence in public competence. Finally, aprocess flowchart is proposed to guide construction practitioners and the community in general.
Resumo:
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.
Resumo:
Since the late twentieth century, there has been a shift away from delivery of infrastructure, including road networks, exclusively by the state. Subsequently, a range of alternative delivery models including governance networks have emerged. However, little is known about how connections between these networks and their stakeholders are created, managed or sustained. Using an analytical framework based on a synthesis of theories of network and stakeholder management, three cases in road infrastructure in Queensland, Australia are examined. The paper finds that although network management can be used to facilitate stakeholder engagement, such activities in the three cases are mainly focused within the core network of those most directly involved with delivery of the infrastructure often to the exclusion of other stakeholder groups.