865 resultados para security sector reform
Resumo:
Dáwat, Pamahándí, Tawíd, Ságda, Lampísa, Ibabások, Lapát, Panedlák: for most of us gathered here, these are words that we don’t usually use in our daily lives. Others may consider them as exotic, alien, funny and even backward. However, for indigenous kindred among us, these words denote an intimate identity and deep understanding of the world around them. It constitutes a broader knowledge system, be written or otherwise, which guides them in the management of resources within their ancestral land. This paper will provide a brief theoretical framework of the concepts of indigenous knowledge systems—hereinafter called IKS, and indigenous peoples food security, and hopefully a deeper or continued appreciation in the study of both concepts in general.
Resumo:
This thesis examines the role of government as proprietor, preserver and user of copyright material under the Copyright Act 1968 (Cth) and the policy considerations which Australian law should take into account in that role. There are two recurring themes arising in this examination which are significant to the recommendations and conclusions. The first is whether the needs and status of government should be different from private sector institutions, which also obtain copyright protection under the law. This theme stems from the 2005 Report on Crown Copyright by the Copyright Law Review Committee and the earlier Ergas Committee Report which are discussed in Chapters 2 and 8 of this thesis. The second is to identify the relationship between government copyright law and policy, national cultural policy and fundamental governance values. This theme goes to the essence of the thesis. For example, does the law and practice of government copyright properly reflect technological change in the way we now access and use information and does it facilitate the modern information management principles of government? Is the law and practice of government copyright consistent with the greater openness and accountability of government? The thesis concludes that government copyright law and practice in each of the three governmental roles recognised under the Copyright Act 1968 has not responded adequately to the information age and to the desire and the ability of individuals to access information quickly and effectively. The solution offered in this thesis is reform of the law and of public policy that is in step with access to information policy, the promotion of better communication and interaction with the community, and the enhanced preservation of government and private copyright materials for reasons of government accountability, effective administration and national culture and heritage.
Resumo:
Less than twenty years on from the proclamation of the Child Care Act 1972, and introduction of funding for not-for-profit child care centres, a series of market-driven public policies paved the way for the emergence of Australia’s current ECEC quasi-market. Seeking to respond to increasing demand for work-related child care in the 1990s, and to manage associated costs, a succession of Australian Governments turned to market theory and New Public Management (NPM) principles to inform ECEC policy. Reflecting on an era of high policy activity within ECEC, this paper examines a series of policy events and texts that set the course for the reform agenda that was to ensue in ECEC.
Resumo:
Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record systems. Among these are the perceived threats to the security and privacy of patients’ health data, and a widely held belief that these cannot be adequately addressed. We hypothesise that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone. Human dimensions must be considered when analysing the provision of the three fundamental information security goals: confidentiality, integrity and availability. A sociotechnical analysis to establish the information security and privacy requirements when designing and developing a given eHealth system is important and timely. A framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system. Successful implementation of this approach would enable the possibilities, practicalities and sustainabilities of proposed eHealth systems to be realised.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
This paper presents and discusses organisational barriers and opportunities arising from the dissemination of design led innovation within a leading Australian airport corporation. This research is part of a greater action research program which aims to integrate design as a strategic capability through design led innovation within Australian businesses. Findings reveal that there is an opportunity to employ the theoretical framework and tools of design led innovation in practice to build collaborative idea generation by involving customers and stakeholders within the proposal of new to world propositions. The iterative gathering of deep customer insights also provided an opportunity to leverage a greater understanding of stakeholders and customers in strengthening continuing business partnerships through co-design. Challenges to the design led approach include resistance to the exploratory nature of gathering deep customer insights, the testing of long held assumptions and market data, and the disruption of an organisational mindset geared toward risk aversion instilled within the aviation industry. The implication from these findings is that design led innovation can provide the critical platform to allow for a business to grow and sustain internal design capabilities necessary to challenge prevailing assumptions about how its business model operates to deliver value to customers and stakeholders alike. The platform of design led innovation also provides an avenue to support a cultural transformation towards anticipating future needs necessary for establishing a position of leadership within the broader economic environment.
Resumo:
Corporate Social Responsibility (CSR) reporting has become common practice for large organisations globally, yet there is variance in the CSR related activities claimed in disclosures. CSR researchers argue that cultural and historical backgrounds are the influential drivers of CSR behaviour. However, the links between actual activities claimed in CSR reports and the cultural systems that underpin these reported activities is an under-explored area. This thesis discusses the uniqueness of Japanese socio-cultural aspects. While Japan is well-known for having the most advanced energy efficient technologies in the world, it is also known for being below international standards for gender equality in the workplace. Therefore, this thesis aims to explore and examine organisational behaviours through the lens of relativism in order to understand what organisations are reporting and how and why managers prioritise these activities. This thesis is based on longitudinal qualitative research focusing on the Japanese transport companies that published CSR reports between 2005 and 2009. The findings from manually coded content analysis revealed: (1) that activities related to providing public safety, waste management and the 3Rs (reduce, reuse and recycle), and environmental innovation were the top three most frequently reported CSR activities; and (2) complying with laws, career planning, flexible work practices, and providing public safety were the three categories that showed the most significant increase in reporting frequency from 2005-2009. This thesis extends the previous literature. Takagaki (2010b) identified that the transport industry, particularly the air and water sub-sectors, is the industry where the environmental problems are serious and require urgent attention. Takagaki (2010b) chose to explore the electronics industry as this industry is considered to be middle ground for its level of seriousness and urgency. This research: (1) examines the transport industry; (2) investigates the links between the actual activities reported, and the activities reported to be influential drivers of these activities.
Resumo:
Mainstream discourse on the revolving around food security is often portrayed by macro level indicators on nutrition, consumption and food production. While these indicators may prove significant in addressing food security in the national and regional levels, it falls short in addressing it among the indigenous peoples’ (IP) communities in the Philippines. Reflecting through the experiences in agricultural production, indigenous knowledge and socio-political institutions are relevant factors that must be seriously considered when food security among IPs are concerned. It is argued that disregarding micro level interactions over macro development policies will not address the issue of food security among marginalized sectors. The paper presents policy recommendations in taking cultural systems seriously in addressing food security among indigenous peoples.
Resumo:
Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.
Resumo:
Keywords gerontological nursing;health care reform;health policy;long-term care;recruitment and retention Aim The aim of the study was to explore registered nurses’ experiences in long-term aged care in light of the political reform of aged care services in Australia. Background In Australia, the aged care industry has undergone a lengthy period of political and structural reform. Despite reviews into various aspects of these reforms, there has been little consideration of the effect these are having on the practice experiences and retention of nursing staff in long-term care. Methods In this critical hermeneutic study, 14 nurses from long-term care facilities in Australia were interviewed about their experiences during the reform period. Results The data revealed a sense of tension and conflict between nurses’ traditional values, roles and responsibilities and those supported by the reforms. Nurses struggled to renegotiate both their practice roles and values as the reforms were implemented and the system evolved. Nursing management support was an important aspect in mediating the effect of reforms on nursing staff. Conclusion This research highlights both the tensions experienced by nurses in long-term aged care in Australia and the need to renegotiate nursing roles, responsibilities and values within an evolving care system. This research supports a role for sensitive and proactive nursing management during periods of industry reform as a retention strategy for qualified nursing personnel.
Resumo:
Contemporary literature on long-term aged care focuses heavily on issues associated with the recruitment and retention of nursing staff, such as job satisfaction and attitudes towards caring for older people. This paper aims to highlight one aspect of a larger study of registered nurses' experiences in long-term aged care in Australia and the influence that government policy and reform has in shaping that experience. This insight into aspects of nurses' everyday experience also contributes to a broader understanding of job satisfaction in long-term care. Findings from this study suggest that registered nurses experience tension in their search for value in their practice, which incorporates professional, political and social mediators of value and worth. These issues are discussed in relation to the impact of policy and reform on nurses' sense of value in long-term aged care and highlight the need for sensitive policy initiatives that support issues of value in nursing practice.
Resumo:
The purpose of this study is to elaborate shared schema change theory in the context of the radical restructuring-commercialization of an Australian public infrastructure organization. Commercialization of the case organization imposed high individual and collective cognitive processing and emotional demands as organizational members sought to develop new shared schema. Existing schema change research suggests that radical restructuring renders pre-existing shared schema irrelevant and triggers new schema development through experiential learning (Balogun and Johnson, 2004). Focus groups and semi-structured interviews were conducted at four points over a three-year period. The analysis revealed that shared schema change occurred in three broad phases: (1) radical restructuring and aftermath; (2) new CEO and new change process schema, and: (3) large-group meeting and schema change. Key findings include: (1) radical structural change does not necessarily trigger new shared schema development as indicated in prior research; (2) leadership matters, particularly in framing new means-ends schema; (3) how change leader interventions are sequenced has an important influence on shared schema change, and; (4) the creation of facilitated social processes have an important influence on shared schema change.
Resumo:
The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.