1000 resultados para pacs: security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The study developed a model to help Australian organisations transition toward an improved IT security culture. The IT Security Culture Transition Model improved organisations' IT security awareness, knowledge, attitude and behaviour allowing them to better protect their IT security. The model can be implemented face-to-face and as an e-learning program.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an innovative fusion-based multi-classifier e-mail classification on a ubiquitous multicore architecture. Many previous approaches used text-based single classifiers to identify spam messages from a large e-mail corpus with some amount of false positive tradeoffs. Researchers are trying to prevent false positive in their filtering methods, but so far none of the current research has claimed zero false positive results. In e-mail classification false positive can potentially cause serious problems for the user. In this paper, we use fusion-based multi-classifier classification technique in a multi-core framework. By running each classifier process in parallel within their dedicated core, we greatly improve the performance of our multi-classifier-based filtering system in terms of running time, false positive rate, and filtering accuracy. Our proposed architecture also provides a safeguard of user mailbox from different malicious attacks. Our experimental results show that we achieved an average of 30% speedup at an average cost of 1.4 ms. We also reduced the instances of false positives, which are one of the key challenges in a spam filtering system, and increases e-mail classification accuracy substantially compared with single classification techniques.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Prime Minister Kevin Rudd has recently announced plans to develop greater regional integration and cooperation in the Asia-Pacific region.

Historically, Australian opinion, however, has expressed some anxiety about forging closer economic, political and security ties with Asia. Using trend data from the Australian Election Study and the Lowy Institute Poll, this article examines changes in Australian public opinion on closer engagement with Asia and whether the Australian public is likely to support the Rudd government’s push towards developing deeper regional diplomacy. The article finds a shift in opinion since the 1990s with a younger generation of voters who are moderately supportive of Australia’s engagement with Asia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service commerce platforms and Internet Integration which was introduced with a concise literature review. The purpose of this paper is to offer a macro level solution for identified common infrastructure security requirements. This model with a number of emerged patterns can be applied to infrastructure aspect of Cloud Computing as a proposed shared security approach in system development life cycle focusing on the plan-built-run scope.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information technology has become the core tool of business organisations’. External and internal threats as well as legal, regulatory and contractual compliance requirements are all combining to make effective information security a key information technology management challenges. This paper describes an undergraduate information technology security management course that provides comprehensive knowledge and skills necessary to manage both strategic and operational aspects of information security. The course covers a broad range of managerial topics in information technology security and makes use of a number of security tools and techniques to complement the theory taught. In this paper, we describe our approach, our experiences and lessons learned for teaching information technology security management course. The paper details the content of the course and outlines how it is taught and assessed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Armed separatist movements in Papua, East Timor and Aceh have been a serious problem for Indonesia's central government. This book examines the policies of successive Indonesian governments to contain secessionist forces, focusing in particular on Jakarta's response towards the armed separatist movement in Aceh. Unlike other studies of separatism in Indonesia, this book concentrates on the responses of the central government rather than looking only at the separatist forces. It shows how successive governments have tried a wide range of approaches, including military repression, offers of autonomy, peace talks and a combination of these. It discusses the lessons that have been learned from these different approaches and analyzes the impact of the tsunami, including the successful accommodation of former rebels within an Indonesian devolved state structure and the expanding implementation of Islamic law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines networks as a means of organising counter-terrorism in Australia and the conditions that promote the effectiveness of security networks. It presents a framework for analysing network dynamics and network effectiveness in this field that can assist researchers to better understand networks and practitioners to better manage networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Looking mainly at the changing nature of the U.S.-Japan security alliance since 11 September 2001, this thesis argues that the recent emergence of a more assertive Japanese security policy has led to a more robust Chinese response to perceived security challenges from Tokyo and Washington.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.