720 resultados para Notions of security


Relevância:

80.00% 80.00%

Publicador:

Resumo:

This is a review of painter Andrzej Zielinski's exhibition at gallery 9 in Sydney. It highlights the artist's expressionistic style and strong colour sense as well as his association with American painterly traditions. The artist application of acrylic modelling paste and his paintings also gives them a sculptural and architectural dimension, and on a conceptual level play with notions of mimesis and material form.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Site-specific performance provides choices in audience experience via degrees of scale, proximity, levels of immersion and viewing perspectives. Beyond these choices, multi-site promenade events also form a connected audience/performer relationship in which moving together in time and space can produce a shared narrative and aesthetic sensibility of collective, yet individuated and shifting meanings. This paper interrogates this notion through audience/performer experiences in two separate multi-site, dance-led events. here/there/then/now occurred in four intimate sites within the Brisbane Powerhouse, providing a theatricalised platform for audiences to create linked narratives through open-ended and fragmented intertextuality. Accented Body, based on the concept of “the body as site and in site” and notions of connectivity, provided a more expansive platform for a similar, but heightened, shared engagement. Audiences traversed 6 outdoor and 2 indoor Brisbane sites moving to varying levels of a large complex. Eleven, predominantly interactive, screens provided links to other sites as well as to distributed presences in Seoul and London. The differentiation in scale and travel time between sites deepened the immersive experiences of audiences who reported transformative engagements with both site and architecture, accompanied by a sense of extended and yet quickened time.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Video surveillance systems using Closed Circuit Television (CCTV) cameras, is one of the fastest growing areas in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. This work attempts to address these problems by proposing an automatic suspicious behaviour detection which utilises contextual information. The utilisation of contextual information is done via three main components: a context space model, a data stream clustering algorithm, and an inference algorithm. The utilisation of contextual information is still limited in the domain of suspicious behaviour detection. Furthermore, it is nearly impossible to correctly understand human behaviour without considering the context where it is observed. This work presents experiments using video feeds taken from CAVIAR dataset and a camera mounted on one of the buildings Z-Block) at the Queensland University of Technology, Australia. From these experiments, it is shown that by exploiting contextual information, the proposed system is able to make more accurate detections, especially of those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information gives critical feedback to the system designers to refine the system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This chapter focuses on two challenges to science teachers’ knowledge that Fensham identifies as having recently emerged—one a challenge from beyond Science and the other a challenge from within Science. Both challenges stem from common features of contemporary society, namely, its complexity and uncertainty. Both also confront science teachers with teaching situations that contrast markedly with the simplicity and certainty that have been characteristic of most school science education, and hence both present new demands for science teachers’ knowledge and skill. The first, the challenge from without Science, comes from the new world of work and the “knowledge society”. Regardless of their success in traditional school learning, many young persons in many modern economies are now seen as lacking other knowledge and skills that are essential for their personal, social and economic life. The second, the challenge from within Science, derives from changing notions of the nature of science itself. If the complexity and uncertainty of the knowledge society demand new understandings and contributions from science teachers, these are certainly matched by the demands that are posed by the role of complexity and uncertainty in science itself.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article critiques the rise of parenting orders in Scotland within New Labour’s self-styled model of ‘respect’ and ‘responsibility’. It examines the emergence of parenting orders in Scotland, which became available in April 2005, and argues that Scottish local authorities are sceptical of an approach they perceive as an ideological and legislative mix premised on punitive notions of individual responsibility and justice.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Living City 2010 was a three-day place-based urban design immersion workshop program held at Logan Road Conference Centre, Stones Corner, for 30 self-selected Year 11 Visual Art Students and 4 Teachers drawn from 11 state and private Brisbane Secondary Schools, that focused on the active Brisbane City Council redevelopment site of Stones Corner, specifically Logan Road, public spaces at Stones Corner Library and rehabilitation of the nearby creek corridor. The workshop, framed within notions of ecological, economic, social and cultural sustainability, aimed to raise awareness of the layered complexity and perspectives involved in the design of shared city spaces and to encourage young people to voice their own concerns as future citizens about the shape and direction of their city. On Day 1, Brisbane City Council Public Art Officers Brendan Doherty and Genevieve Searle, local landscape architect Peter Boyle (Verge) and artists Malcolm Enright and Barbara Heath provided students with an overview of the historic and future context of the area including proposed design and public art interventions, followed by a site walk. The afternoon session, led by Natalie Wright and QUT design staff and students, focused on design tools to assist in the tackling of the redesign of the Stones Corner library precinct, where students worked on ideas. On Day 2, students were mentored by artist Liam Key to participate in a computer animation activity using the built environment as a canvas, and by artist Sebastian Moody to participate in an activity using red helium balloons as a playful catalyst for interaction to activate and create new public space. Later, students worked in teams on their ideas for redevelopment of the site in preparation for their Day 3 presentations. The workshop culminated in an exchange of planning ideas with Georgina Aitchison from Brisbane City Council's Urban Renewal Division. Students were introduced to design methodology, team thinking strategies, the scope of design practices and professions, presentation skills and post-secondary pathways, while participating teachers acquired content and design learning strategies transferable in many other contexts.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Business transformations are large-scale organisational change projects that, evidence suggests, are often unsuccessful. This study aims to develop a conceptual model that explains how management services that are required for a business transformation are orchestrated during such a initiative. We classify management services such as (but not limited to) change management, risk management, IT management, financial management, program management and so forth as bearing transformational and/or transactional capabilities in a transformation initiative. We then draw upon three principles of musical composition, namely melody, harmony and rhythm, and illustrate how they apply to the orchestration of management services in the management of business transformations. In order to illustrate our emerging model, we examine the case of Malaysia Airlines, who have managed to successfully turnaround the near-bankrupt organisation beyond survival. We demonstrate how the notions of melody, harmony and rhythm can be used to describe their endeavour. We conclude by discussing next steps of our research.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Over the last few decades, there has been a marked increase in media and debate surrounding a specific group of offences in modern Democratic nations which bear the brunt of the label ‘crimes against morality’. Included within this group are offences related to prostitution and pornography, homosexuality and incest and child sexual abuse. This book examines the nexus between sex, crime and morality from a theoretical perspective. This is the first academic text to offer an examination and analysis of the philosophical underpinnings of sex-related crimes and social attitudes towards them and the historical, anthropological and moral reasons for differentiating these crimes in contemporary western culture. The book is divided into three sections corresponding to three theoretical frameworks: - Part 1 examines the moral temporality of sex and taboo as a foundation for legislation governing sex crimes - Part 2 focuses on the geography of sex and deviance, specifically notions of public morality and the public private divide - Part 3 examines the moral economy of sex and harm, including the social construction of harm. Sex, Crime and Morality will be key reading for students of criminology, criminal justice, gender studies and ethics, and will also be of interest to justice professionals.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Design and design thinking have been identified as making valuable contributions to business and management and the numbers of higher education programs that teach design thinking to business students, managers and executives are growing. However multiple definitions of design thinking and the range of perspectives have created some confusion about potential pathways. This paper examines notions of design and design thinking and uses these definitions to identify themes in higher educational programs. We present the findings from an initial exploratory investigation of design and design thinking in higher education business programs and define four distinct educational approaches around human centred innovation, integrative thinking, design management and design as strategy. Potential directions for management education programs are presented.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this video, phrases sourced from social networking websites are reformatted into a slowly rotating mandala form. As the text changes colour, an abstract, atmospheric soundtrack develops. “In the Beyond” examines how we construct and communicate notions of identity. It mixes language gleaned from social networks, and fuses them with a mandala form. Drawing on Zygmunt Bauman’s theoretical work on “liquid modernity”, this work questions how and where we find space for contemplation and reflection in a contemporary context increasingly defined by temporary social bonds and consumer choices.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Citizen Coombs Wins! appears to be a standard arcade game placed within the gallery. Mortal Kombat is displayed on the screen inviting the viewer to press play. The ‘player’ selects their character and awaits the commencement of the game; at first move however, the player dies – sound and text informs them that ‘Citizen Coombs Wins!’. By altering the expected play of the game, this work exploring notions of play, control, the institution and expectation. This work seeks to invite, engage and repel the viewer in order to question, critique and play with the role of the artist and the viewer within the context of the institution. The work was included in the international group show 'Ceci n'est pas une Casino!', curated by Kevin Muhlen and Jo Kox for the Casino Luxembourg and later toured to Villa Merkel, Esslingen, Germany.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article reports on the first year of the Exceptional Teachers for Disadvantaged Schools project, a teacher education approach designed to prepare high quality teachers for low socio-economic schools. The Exceptional Teachers for Disadvantaged Schools (ETDS) project is an innovative way to prepare high-quality teachers for employment in low-SES schools. The program, based at Queensland University of Technology (QUT), offers a specialised curriculum, designed to equip high-achieving pre-service teachers for work in the schools that need them most. Selected pre-service teachers at QUT are invited to take part in the trial course, based on their academic performance over the first two years of their four-year Bachelor of Education degree, and on a demonstrated commitment to social justice. These participants undertake a modified version of QUT's B Ed on-campus curriculum. They have their practicum/field experience at one of a range of disadvantaged schools throughout Queensland which have agreed to partner with QUT in the program. In the past, teacher education for disadvantaged schools has been described as applying a 'missionary' or deficit model (Larabee, 2010; Comber and Kamler, 2004; Flessa, 2007). The principals of schools participating in the ETDS react strongly against such an approach, and have explicitly asked project staff not to send them anyone who 'thinks they can save the world'. The ETDS project has moved well away from such a model, towards a position that is explicitly centred on notions of academic excellence. The project is now at the end of its first trial year.