966 resultados para Internet policy
Resumo:
The planning of airports has long been contentious because of their localisation of negative impacts. The globalisation, commercialisation and deregulation of the aviation industry has unleashed powerful new economic forces both on and offairport. Over the last two decades, many airports have evolved into airport cities located at the heart of the wider aerotropolis region. This shifts the appropriate scale of planning analysis towards broader regional concerns. However,governments have been slow to respond and airport planning usually remains poorly integrated with local, city and regional planning imperatives. The Australian experience exemplifies the divide. The privatization of major Australian airports from 1996 has seen billions of dollars spent on new airside and landside infrastructure but with little oversight from local and state authorities because the ultimate authority for on-airport development is the Federal Minister for Transport. Consequently, there have been growing tensions in many major airport regions between the private airport lessee and the broader community, exacerbated by both the building of highly conspicuous non-aeronautical developments and growing airport area congestion. This paper examines the urban planning content of Australia’s national aviation policy review (2008-09) with reference to current and potential opportunities for all-of-region collaboration in the planning process.
Resumo:
This article has been edited from a transcript of the keynote address to the combined ALEA/MTE National Conference, Hobart, Tasmania, August 2001. In this talk Allan reflects on some of the difficulties facing makers of literacy policy in 'New Times'. His reflections are informed by some important research that is having an impact· on literacy teaching in Australia and he raises various issues, ranging from what he sees as a 'dumbing down' of curriculum, to addressing the needs of'at risk' students, to issues of lifelong education in a rapidly changing world.
Resumo:
This article develops a critical analysis of the ideological framework that informed the Australian Federal government’s 2007 intervention into Northern Territory Indigenous communities (ostensibly to address the problem of child sexual abuse). Continued by recently elected Prime Minister, Kevin Rudd, the NT ‘emergency response’ has aroused considerable public debate and scholarly inquiry. In addressing what amounts to a broad bi-partisan approach to Indigenous issues we highlight the way in which Indigenous communities are problematised and therefore subject to interventionist regimes that override differentiated Indigenous voices and intensify an internalised sense of rage occasioned by disempowering interventionist projects. We further argue that in rushing through the emergency legislation and suspending parts of the Racial Discrimination Act, the Howard and Rudd governments have in various ways perpetuated racialised and neo-colonial forms of intervention that override the rights of Indigenous people. Such policy approaches require critical understanding on the part of professions involved most directly in community practice, particularly when it comes to mounting effective opposition campaigns. The article offers a contribution to this end.
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
Resumo:
In mid 2007, the Australian Learning and Teaching Council (ALTC), formerly the Carrick Institute for Learning and Teaching in Higher Education, commissioned an intensive research project to examine the use of ePortfolios by university students in Australia. The project was awarded to a consortium of four universities: Queensland University of Technology as lead institution, The University of Melbourne, University of New England and University of Wollongong.---------- The overarching aim of the research project, which was given the working title of the Australian ePortfolio Project, was to examine the current levels of ePortfolio practice in Australian higher education. The principal project goals sought to provide an overview and analysis of the national and international ePortfolio contexts, document the types of ePortfolios used in Australian higher education, examine the relationship with the National Diploma Supplement project funded by the Federal government, identify any significant issues relating to ePortfolio implementation, and offer guidance about future opportunities for ePortfolio development. The research findings revealed that there was a high level of interest in the use of ePortfolios in the context of higher education, particularly in terms of the potential to help students become reflective learners who are conscious of their personal and professional strengths and weaknesses, as well as to make their existing and developing skills more explicit. There were some good examples of early adoption in different institutions, although this tended to be distributed across the sector. The greatest use of ePortfolios was recorded in coursework programs, rather than in research programs, with implementation generally reflecting subject-specific or program-based activity, as opposed to faculty- or university-wide activity. Accordingly, responsibility for implementation frequently rested with the individual teaching unit, although an alternative centralised model of coordination by ICT services, careers and employment or teaching and learning support was beginning to emerge. The project report concludes with a series of recommendations to guide the process, drawing on the need for open dialogue and effective collaboration between the stakeholders across the range of contexts: government policy, international technical standards, academic policy, and learning and teaching research and practice.
Resumo:
Reforms to the national research and research training system by the Commonwealth Government of Australia sought to effectively connect research conducted in universities to Australia's national innovation system. Research training has a key role in ensuring an adequate supply of highly skilled people for the national innovation system. During their studies, research students produce and disseminate a massive amount of new knowledge. Prior to this study, there was no research that examined the contribution of research training to Australia's national innovation system despite the existence of policy initiatives aiming to enhance this contribution. Given Australia's below average (but improving) innovation performance compared to other OECD countries, the inclusion of Finland and the United States provided further insights into the key research question. This study examined three obvious ways that research training contributes to the national innovation systems in the three countries: the international mobility and migration of research students and graduates, knowledge production and distribution by research students, and the impact of research training as advanced human capital formation on economic growth. Findings have informed the concept of a research training culture of innovation that aims to enhance the contribution of research training to Australia's national innovation system. Key features include internationally competitive research and research training environments; research training programs that equip students with economically-relevant knowledge and the capabilities required by employers operating in knowledge-based economies; attractive research careers in different sectors; a national commitment to R&D as indicated by high levels of gross and business R&D expenditure; high private and social rates of return from research training; and the horizontal coordination of key organisations that create policy for, and/or invest in research training.
Resumo:
This special issue of Futures is concerned with community engagement strategies that help to inform medium and long-term futures studies in order to foster sustainable urban environments. Recent special issues of Futures, such as Human Extinction (41:10) and Utopian Thought (41:4), reflect the increasing significance of sustainability issues, which is why we present another crucial component of sustainability, community engagement. Responding to futurists’ long term concerns about climate change outlined in Futures 41(9) [1], Stevenson concluded that we can no longer support infinite growth, and that our goal should be to reshape the economy to let us live within our means. In the face of the continued and accelerated crisis in environmental, economic and social sustainability, a number of trends informed our call for papers on the possible role of community engagement in contributing to enhanced urban sustainability: • Changes in the public sphere in terms of participation, online deliberation systems, polity of urban futures; • The possible use of user-generated content for urban planning (paralleling the rise of user generated content elsewhere); • The related role of social networking, collective and civic intelligence, and crowd- sourcing in urban futures; • The rise of technologies such as wireless Internet and mobile applications, and the impact of neogeography, simulations and 3D virtual environments that reproduce and analyse complex social phenomena and city systems in urban futures, design and planning.
Resumo:
The technological environment in which contemporary small and medium-sized enterprises (SMEs) operate can only be described as dynamic. The exponential rate of technological change, characterised by perceived increases in the benefits associated with various technologies, shortening product life cycles and changing standards, provides for the SME a complex and challenging operational context. The primary aim of this research was to concentrate on those SMEs that had already adopted technology in order to identify their needs for the new mobile data technologies (MDT), the mobile Internet. The research design utilised a mixed approach whereby both qualitative and quantitative data was collected to address the question. Overall, the needs of these SMEs for MDT can be conceptualised into three areas where the technology will assist business practices; communication, eCommerce and security.
Resumo:
E-commerce technologies such as a website, email and the use of web browsers enables access to large amounts of information, facilitates communication and provides niche companies with an effective mechanism for competing with larger organisations world-wide. However recent literature has shown Australian SMEs have been slow in the uptake of these technologies. The aim of this research was to determine which factors were important in impacting on small firms' decision making in respect of information technology and e-commerce adoption. Findings indicate that generally the more a firm was concerned about its competitive position such a firm was likely to develop a web site. Moreover the 'Industry and Skill Demands' dimension suggested that as the formal education of the owner/manager increased, coupled with the likelihood that the firm was in the transport and storage or communication services industries, and realising the cost of IT adoption was in effect an investment, then such a firm would be inclined to develop a web site.
Resumo:
The adoption of Internet technologies by the small business sector (SMEs)The adoption of Internet technologies by the small business sector is important to their on-going survival. Yet, given the opportunities and benefits that Internet technologies can provide it has been shown that Australian small businesses are relatively slow in adopting them. This paper develops a model from recent literature on the facilitators and inhibitors to the adoption of Internet technologies by small business. Cross-case analysis of findings from three case studies are presented. Findings indicate that perceived lack of business benefit, mistrust of the IT industry and lack of understanding of Internet technologies are major inhibitors to Internet adoption by small business.
Resumo:
This special issue of Innovation : Management, Policy & Practice (also released as a book: ISBN 978-1-921348-31-0) will explore some empirical and analytic connections between creative industries and innovation policy. Seven papers are presented. The first four are empirical, providing analysis of large and/or detailed data sets on creative industries businesses and occupations to discern their contribution to innovation. The next three papers focus on comparative and historical policy analysis, connecting creative industries policy (broadly considered, including media, arts and cultural policy) and innovation policy. To introduce this special issue I want to review the arguments connecting the statistical, conceptual and policy neologism of ‘creative industries’ to: (1) the elements of a national innovation system; and (2) to innovation policy. In approaching this connection, two overarching issues arise.
Resumo:
This paper describes an autonomous docking system and web interface that allows long-term unaided use of a sophisticated robot by untrained web users. These systems have been applied to the biologically inspired RatSLAM system as a foundation for testing both its long-term stability and its practicality. While docking and web interface systems already exist, this system allows for a significantly larger margin of error in docking accuracy due to the mechanical design, thereby increasing robustness against navigational errors. Also a standard vision sensor is used for both long-range and short-range docking, compared to the many systems that require both omni-directional cameras and high resolution Laser range finders for navigation. The web interface has been designed to accommodate the significant delays experienced on the Internet, and to facilitate the non- Cartesian operation of the RatSLAM system.
Resumo:
A persistent question in the development of models for macroeconomic policy analysis has been the relative role of economic theory and evidence in their construction. This paper looks at some popular strategies that involve setting up a theoretical or conceptual model (CM) which is transformed to match the data and then made operational for policy analysis. A dynamic general equilibrium model is constructed that is similar to standard CMs. After calibration to UK data it is used to examine the utility of formal econometric methods in assessing the match of the CM to the data and also to evaluate some standard model-building strategies. Keywords: Policy oriented economic modeling; Model evaluation; VAR models
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.