848 resultados para Counter-Reforms of the Social Security
Resumo:
Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a formal modelling methodology called Coloured Petri Nets (CPN) to create an executable model representation of DNP3 protocol. The model facilitates the analysis of the protocol to ensure that the protocol will behave as expected. Also, we illustrate how to verify and validate the behaviour of the protocol, using the CPN model and the corresponding state space tool to determine if there are insecure states. With this approach, we were able to identify a Denial of Service (DoS) attack against the DNP3 protocol.
Resumo:
The refereed papers contained in this volume of conference proceedings were among those presented at the 2nd International Conference on Crime, Justice and Social Democracy, hosted by the Crime and Justice Research Centre, Faculty of Law, QUT, from 8 – 11 July 2013. The conference attracted an impressive list of speakers from Australasia, Europe, North America and Latin America. These seven papers can be viewed at the Crime and Justice Research Centre’s website at http://crimejusticeconference.com/publications/ as can Volume 1 representing another 26 selected papers from the conference. As with the papers contained in the first volume, this set of papers raises important questions about the links between crime, justice and social democracy, and continues the contribution that the Crime and Justice Research Centre makes towards engaging with these topics. We thank all those who submitted papers for review for this second volume of proceedings, as well as the peer reviewers for taking the time to review the papers, often within very tight timelines.
Neoliberal social inclusion? The agenda of the Australian Universities Community Engagement Alliance
Resumo:
University–community engagement (UCE) represents a hybrid discourse and a set of practices within contemporary higher education. As a modality of research and teaching, ‘engagement’ denotes the process of universities forming partnerships with external communities for the promised generation of mutually beneficial and socially responsive knowledge, leading to enhanced economic, social and cultural developments. A critical discourse analysis (Fairclough 2003. Analysing Discourse: Textual analysis for social research. London: Routledge) of the Australian Universities Community Engagement Alliance’s (AUCEA) ‘Position Paper’(2008 Universities and community engagement (Position paper 2008–2010)), as reported in this article, suggests that its uneasy synthesis of neoliberal, social inclusion and civic engagement discourses into a hybrid UCE discourse semantically privileges neoliberal forms of engagement. Perhaps, as a result, the AUCEA seems to have missed an opportunity to influence the Australian ‘widening participation’ debate on securing access and opportunity for marginalised students at universities and building social and cultural capital within their communities of origin.
Resumo:
The Australasian Information Security Conference (AISC) 2011 was held on 18th-19th January 2011 in Perth, Australia, as a part of the Australasian Computer Science Week 2011. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
Resumo:
The Australasian Information Security Conference (AISC) 2012 was held at RMIT University in Melbourne, Australia, as a part of the Australasian Computer Science Week, January 30 - February 3, 2012. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
Resumo:
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the attractive feature of provable pseudorandomness security assuming the hardness of the RSA inversion problem. However, despite extensive study, the most efficient provably secure RSA-based generators output asymptotically only at most O(logn) bits per multiply modulo an RSA modulus of bitlength n, and hence are too slow to be used in many practical applications. To bring theory closer to practice, we present a simple modification to the proof of security by Fischlin and Schnorr of an RSA-based PRG, which shows that one can obtain an RSA-based PRG which outputs Ω(n) bits per multiply and has provable pseudorandomness security assuming the hardness of a well-studied variant of the RSA inversion problem, where a constant fraction of the plaintext bits are given. Our result gives a positive answer to an open question posed by Gennaro (J. of Cryptology, 2005) regarding finding a PRG beating the rate O(logn) bits per multiply at the cost of a reasonable assumption on RSA inversion.
Resumo:
Submission in response to government options paper regarding arrangements for regulation of charities following abolition of the Australian Charities and Not-for-profits Commission.
Resumo:
The Japanese electricity industry has experienced regulatory reforms since the mid-1990s. This article measures productivity in Japan's steam power-generation sector and examines the effect of reforms on the productivity of this industry over the period 1978-2003. We estimate the Luenberger productivity indicator, which is a generalization of the commonly used Malmquist productivity index, using a data envelopment analysis approach. Factors associated with productivity change are investigated through dynamic generalized method of moments (GMM) estimation of panel data. Our empirical analysis shows that the regulatory reforms have contributed to productivity growth in the steam power-generation sector in Japan.
Resumo:
As organisations increasingly engage in the selection, purchase, and adoption of packaged software products, how these activities are carried out in practice becomes increasingly relevant for researchers and practitioners. Our focus in this paper is to propose a framework for understanding the packaged software selection process. The functionalist literature on this area of study suggests a number of generic recommendations, which are based on rational assumptions about the process and view the decision making that takes place as producing the “best technology solution.’” To explore this, we conducted a longitudinal, in-depth study of packaged software selection in a small organisation. For interpretation of the case, we draw upon the Social Construction of Technology, a theoretical framework arguing that technology is socially constituted and regarding the process of development as contradictory and uncertain. We offer a number of contributions. First, we further our understanding of packaged software selection with the critique that we offer of the functionalist literature, drawing insights from the emerging critical/constructivist literature and expanding our domain of interest to encompass the wider environment. Second, we weave this together with our experiences in the field, drawing on social constructivism for theoretical support, to develop a framework of packaged software selection that shows how various actors shape the process.
Resumo:
Throughout Australia (and elsewhere in the world) public spaces are under attack by developers and also attempts by civic authorities to regulate, restrict and reframe them. A consequence of the increasingly security driven, privatised and surveilled nature of public space is the exclusion and displacement of those considered flawed and unwelcome in the “spectacular” consumption spaces of major urban centres. In this context of monitoring and control procedures, children and young people’s use of public space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to social order, requiring various forms of punitive and/or remedial action. This paper discusses developments in the surveillance, governance and control of public space used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of belonging, wellbeing and right to public space as an expression of social, political and civil citizenship.
Resumo:
Ulrich Beck's argument about risk society emphasises, among other things, the pervasiveness of risk. As a feature of the human condition in the contemporary, globalised, world that distinguishes the present from the past, risk is widespread across society and affects all social strata. While Beck has gestured towards the irregular distribution of contemporary risks, nonetheless he has suggested that traditional structural entities – class and wealth – no longer provide the key interpretive frameworks for the calculation of susceptibility. In short, the tentacles of risk are long and almost no one is out of reach. Yet, while the risk society thesis has generated a large theoretical literature, there is very little in the way of research that marries theorising to original data collection. This paper represents an attempt to address this gap by using empirical data to investigate whether risk is more textured than Beck's account suggests. Focusing on health as a domain of risk, the paper uses data from a national sample survey of the Australian electorate to investigate the extent to which social divisions structure perceptions of risk within the general population. The findings suggest that various aspects of social stratification, such as income, occupation and education, do indeed play a role in shaping perceptions of risk.
Resumo:
Until the 1970s mining leases were issued by state governments subject to conditions that companies build or substantially finance local community infrastructure, including housing, streets, transport, schools, hospitals and recreation facilities. Townships and communities went hand in hand with mining development. However, in the past thirty years mining companies have moved progressively to an expeditionary strategy for natural resources extraction - operating a continuous production cycle of 12 hour shifts - increasingly reliant on non-resident, fly-in, fly-out or drive-in, drive-out (FIFO/DIDO) workers who typically work block rosters, reside in work camps adjacent to existing communities and travel large distances from their homes. This paper presents the key findings of our survey into the social impacts of this kind of mining development in Qld. Based on the results we argue that the social license to develop new mining projects is strong for projects requiring a 25% or less non-resident workforce, diminishes significantly thereafter and is very weak for projects planning to recruit a non-resident workforce in excess of 75%. This finding is significant because there are at least 67 new mining projects undergoing social impact assessment in Queensland, and many it appears are planning to hire significant proportions of non-resident workers. The paper considers the policy implications of this growing social justice issue concluding there is a clear need for national leadership in formulating a national policy framework for guiding socially responsible and sustainable mining development into the next millennium.