To see the other types of publications on this topic, follow the link: Australian Security and Intelligence Organisation.

Journal articles on the topic 'Australian Security and Intelligence Organisation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Australian Security and Intelligence Organisation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, H. P. "The Australian Security Intelligence Organisation—New Mechanisms for Accountability." International and Comparative Law Quarterly 38, no. 4 (October 1989): 890–905. http://dx.doi.org/10.1093/iclqaj/38.4.890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ireland-Piper, Danielle, and Jonathan Crowe. "Whistleblowing, National Security and the Constitutional Freedom of Political Communication." Federal Law Review 46, no. 3 (September 2018): 341–65. http://dx.doi.org/10.1177/0067205x1804600301.

Full text
Abstract:
Whistleblowers promote the values of responsible government and the rule of law by drawing attention to criminal or other forms of wrongdoing in publicly accountable organisations. This article explores the relationship between whistleblowing, national security and the implied freedom of political communication under the Australian Constitution. Legislation such as the Crimes Act 1914 (Cth) (‘ Crimes Act’), the Australian Security Intelligence Organisation Act 1979 (Cth) (‘ ASIO Act’) and the Australian Border Force Act 2015 (Cth) (‘ Border Force Act’) makes it an offence to reveal certain types of information obtained as a Commonwealth officer. The Public Interest Disclosure Act 2013 (Cth) (‘ PIDA’) offers limited protection to whistleblowers in the Commonwealth public sector, but this protection does not extend to information relating to intelligence operations. We argue that blanket criminalisation of unauthorised disclosure by Commonwealth officers or contractors under s 70 of the Crimes Act, along with similar prohibitions in s 35P of the ASIO Act and s 42 of the Border Force Act, offend the implied freedom of political communication by failing to strike an adequate balance between national security and organisational secrecy, on the one hand, and public debate and discussion, on the other. The courts should read down these laws to protect disclosures that hold significant public interest for discussion and debate over government policy or the performance of government officials.
APA, Harvard, Vancouver, ISO, and other styles
3

McKnight, David. "Australian Film and the Cultural Cold War." Media International Australia 111, no. 1 (May 2004): 118–30. http://dx.doi.org/10.1177/1329878x0411100112.

Full text
Abstract:
This article examines whether, and in what way, anti-communism was a factor in the slow development of an Australian film industry in the 1950s and early 1960s and in the kind of film culture developed in Australia, particularly through film festivals. In particular it examines the activities of the Australian Security Intelligence Organisation (ASIO) towards left and liberal filmmakers and film lovers. It briefly examines the effect of anti-communism on the struggle for Australian content by Actors' Equity in the early years of television.
APA, Harvard, Vancouver, ISO, and other styles
4

McCulloch, Jude, and Joo-Cheong Tham. "Secret State, Transparent Subject: The Australian Security Intelligence Organisation in the Age of Terror." Australian & New Zealand Journal of Criminology 38, no. 3 (December 2005): 400–415. http://dx.doi.org/10.1375/acri.38.3.400.

Full text
Abstract:
This article describes the secrecy provisions embodied in the Australian Security Intelligence Organisation Legislation Amendment Act 2003 (Cwlth). The article explains how these provisions curb freedom of speech and remove ASIO's activities from the domain of public scrutiny. It argues that by effectively criminalising open discussion of ASIO's activities the provisions insulate much of the domestic ‘war on terror’ from the public gaze. It also argues that the provisions implicitly sanction lawlessness by ASIO in open breach of the rule of law. By undermining free speech and the rule of law, this legislation increases the risk of torture of persons detained by ASIO. The legislation also exacerbates the punitiveness of such detention. Moreover, the secrecy offences will distort Australian politics by enabling the government to control and manipulate ‘security’ information. The article concludes that the increase in state secrecy and its impact are part of a continuing shift in the relative distribution of power between state and subject in liberal democracies; a shift that signals a move to more repressive or authoritarian forms of rule.
APA, Harvard, Vancouver, ISO, and other styles
5

McGarrity, Nicola, and Keiran Hardy. "Digital surveillance and access to encrypted communications in Australia." Common Law World Review 49, no. 3-4 (February 26, 2020): 160–81. http://dx.doi.org/10.1177/1473779520902478.

Full text
Abstract:
Australia’s counterterrorism laws have significantly expanded the powers of its law enforcement and intelligence agencies with regard to digital surveillance. In this article, we explain and evaluate Australia’s counterterrorism laws with respect to intercepting telecommunications, other forms of digital surveillance and access to encrypted communications. We focus on the statutory powers held by federal law enforcement agencies and the Australian Security Intelligence Organisation (ASIO), Australia’s domestic security intelligence agency. These powers confirm several important trends. They have further blurred the lines between intelligence and evidence and they have granted law enforcement and ASIO extraordinary powers to modify consumer technologies. They also create significant potential for conflict of laws across national boundaries. Significant strengthening of existing accountability mechanisms is needed to ensure public transparency and reduce opportunities for misuse.
APA, Harvard, Vancouver, ISO, and other styles
6

Head, Michael. "ASIO’s ‘official history’: More unanswered questions." Alternative Law Journal 42, no. 4 (November 27, 2017): 304–9. http://dx.doi.org/10.1177/1037969x17732710.

Full text
Abstract:
The Secret Cold War, Volume 3 of the official history of the Australian Security Intelligence Organisation (ASIO), leaves many unanswered questions, particularly about the 1978 Sydney Hilton Hotel bombing and the ongoing lawlessness of ASIO’s activities. These questions undermine the central claim of Volume 3, that ASIO has become a reformed and accountable agency, shedding the notorious record of politically motivated surveillance, victimisation, harassment and ‘dirty tricks’ that the agency acquired in its first quarter century.
APA, Harvard, Vancouver, ISO, and other styles
7

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Australian Journal of Telecommunications and the Digital Economy 6, no. 4 (December 31, 2018): 109–40. http://dx.doi.org/10.18080/ajtde.v6n4.167.

Full text
Abstract:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more precise location estimates, in the legal and policy context of the exceptions and privacy safeguards introduced after 2015; the discretionary powers of the agencies to use personal and sensitive information to identify inquiries and investigations to pursue, to enforce the law and perform their functions, and to carry out activities related to their functions and purposes; and the flexible oversight principles contained in the guidelines that create conflicts between law enforcement and privacy interests. The review proposes future multidisciplinary research.
APA, Harvard, Vancouver, ISO, and other styles
8

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Journal of Telecommunications and the Digital Economy 6, no. 4 (December 31, 2018): 109–40. http://dx.doi.org/10.18080/jtde.v6n4.167.

Full text
Abstract:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more precise location estimates, in the legal and policy context of the exceptions and privacy safeguards introduced after 2015; the discretionary powers of the agencies to use personal and sensitive information to identify inquiries and investigations to pursue, to enforce the law and perform their functions, and to carry out activities related to their functions and purposes; and the flexible oversight principles contained in the guidelines that create conflicts between law enforcement and privacy interests. The review proposes future multidisciplinary research.
APA, Harvard, Vancouver, ISO, and other styles
9

Williams, George. "The Legal Assault on Australian Democracy." QUT Law Review 16, no. 2 (June 17, 2016): 19. http://dx.doi.org/10.5204/qutlr.v16i2.651.

Full text
Abstract:
<p><em>Recent years have seen fierce public debate on whether Australia’s parliaments are passing laws that undermine fundamental democratic values, such as freedom of speech and freedom of association. Such debate has tended to focus on a few contentious laws, including s 18C of the Racial Discrimination Act 1975 (Cth), s 35P of the Australian Security Intelligence Organisation Act 1979 (Cth) and Queensland’s anti-bikie legislation. This article conducts a survey of the federal, state and territory statute books in order to determine whether such examples are isolated, or indicative of a broader trend. It identifies 350 instances of laws that arguably encroach upon rights and freedoms essential to the maintenance of a healthy democracy. Most of these laws have entered onto the statute book since September 2001. The article finds that the terrorist attacks of that month marked a watershed moment in the making of Australian laws, and that since that time parliamentarians have been less willing to exercise self-restraint by not passing laws that undermine Australia’s democratic system.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
10

McKnight, David. "‘Not Attributable to Official Sources’: Counter-Propaganda and the Mass Media." Media International Australia 128, no. 1 (August 2008): 5–17. http://dx.doi.org/10.1177/1329878x0812800103.

Full text
Abstract:
During the Cold War in Australia, the political agenda was dominated by the threat of communism. One factor in building this agenda was the ‘counter-propaganda operations’ of the Australian Security Intelligence Organisation (ASIO) which regularly released unattributable information to selected mass media outlets. In the period when these activities were most prevalent (1960–72), ASIO officers had regular contact with editors and with selected journalists on major newspapers and television. This formed part of a broader ‘cultural Cold War’ in which anti-communism was an organising principle. This article outlines new information on these activities, suggests that these operations were more extensive than previously thought, and discusses this relationship in terms of the scholarly work on media sources, government-sponsored intervention in the media and classical theories of propaganda. It suggests that one way to understand the controversial media role in counter-propaganda operations lies in the relationship between police and crime reporters.
APA, Harvard, Vancouver, ISO, and other styles
11

Gray, Geoffrey. "‘In my file, I am two different people’: Max Gluckman and A.L. Epstein, the Australian National University, and Australian Security Intelligence Organisation, 1958–60." Cold War History 20, no. 1 (April 2, 2019): 59–76. http://dx.doi.org/10.1080/14682745.2019.1575367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Boda, József. "The Situation of National Security Studies." Nemzetbiztonsági Szemle 10, no. 3 (November 11, 2022): 13–24. http://dx.doi.org/10.32561/nsz.2022.3.2.

Full text
Abstract:
The author provides an overview of the national security and intelligence studies of some international organisations and some countries. The main focus of the article is on the development of national security and intelligence education in the European Union (EU), North Atlantic Treaty Organization (NATO) and China, Romania, Russia, the United State of America (USA), the United Kingdom, Singapore and Australia.
APA, Harvard, Vancouver, ISO, and other styles
13

Witczak, Maciej. "Biały wywiad w zarządzaniu bezpieczeństwem informacji." Przegląd Bezpieczeństwa Wewnętrznego 16, no. 30 (2024): 213–40. http://dx.doi.org/10.4467/20801335pbw.24.009.19611.

Full text
Abstract:
Open-source intelligence (OSINT) poses a threat to the information security system in an organisation (business, armed forces) and even in a whole state. The aim of the article is to provide an overview of this issue, to present the threats posed by open source intelligence and to identify ways of countering them. The theoretical part is complemented by a practical case study and confirms the hypotheses: gathering information from the open sources is possible, but it does not always allow for a comprehensive intelligence product. Moreover, the information security management minimises the risk of collecting data from the open sources. The second part provides recommendations and proposes a universal model of information security management in an organisation.
APA, Harvard, Vancouver, ISO, and other styles
14

Koller, Marco. "Recommendations for Safety-Conscious Smart Device Use by Military Professionals." Academic and Applied Research in Military and Public Management Science 21, no. 2 (November 30, 2022): 5–14. http://dx.doi.org/10.32565/aarms.2022.2.1.

Full text
Abstract:
Security-conscious behaviour is of paramount importance, both in the field of information security and in various public institutions. Thus, in the public administration, especially in the various armed bodies, the training of personnel in this direction is of strategic importance, as a person with low security awareness can endanger the security of the entire organisation. Human security issues may even have national security or intelligence relevance.
APA, Harvard, Vancouver, ISO, and other styles
15

May, Lauren, and Tim Lane. "A Model for Improving e-Security in Australian Universities." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 90–96. http://dx.doi.org/10.3390/jtaer1020016.

Full text
Abstract:
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increasingly relevant role. In many cases security in universities is approached through the addition of tactical solutions. Often systems security is added on as a final consideration instead of during early design stages. This approach can be incomprehensive and inefficient. Although this approach can provide limited security, there is no guarantee that business requirements for security are incorporated and integrated effectively. This situation is partly due to security management in Australian universities being challenged by the complexity of both university culture and diverse operating environments. In many circumstances the champion for security in universities tends to be relegated to an officer in the IT department, hidden away from the business itself. Often this person with operational responsibility for security will have a detailed understanding of what should occur in security, but faces difficulties in determining exactly how to go about achieving this on an enterprise level. In order to assist in securing university IT systems and thereby improving e-business security, this research proposes a security practitioner’s management model. This model is aimed at facilitating the transition of security knowledge into actual implementation across the enterprise, with an end goal of an improved culture of compliance towards security practices in the university sector. This work is of significant value as it results from a study into specific security management issues facing Australian universities. This study highlights that future research would be well-placed to focus on benchmarking information security management within the university sector.
APA, Harvard, Vancouver, ISO, and other styles
16

Sharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (July 31, 2021): 1849. http://dx.doi.org/10.3390/electronics10151849.

Full text
Abstract:
Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to guarantee the security of national information infrastructure. However, the existing models and methodology are not addressing the attributes of threats like motivation, opportunity, and capability (C, M, O), and the critical threat intelligence (CTI) feed to the threat agents during the penetration process is ineffective, due to which security assurance arises for an organisation and the business of companies. This paper proposes a semi-automatic information security model, which can deal with situational awareness data, strategies prevailing information security activities, and protocols monitoring specific types of the network next to the real-time information environment. This paper looks over analyses and implements the threat assessment of network traffic in one particular real-time informational environment. To achieve this, we determined various unique attributes of threat agents from the Packet Capture Application Programming Interface (PCAP files/DataStream) collected from the network between the years 2012 and 2019. We used hypothetical and real-world examples of a threat agent to evaluate the three different factors of threat agents, i.e., Motivation, Opportunity, and Capability (M, O, C). Based on this, we also designed and determined the threat profiles, critical threat intelligence (CTI), and complexity of threat agents that are not addressed or covered in the existing threat agent taxonomies models and methodologies.
APA, Harvard, Vancouver, ISO, and other styles
17

HENIGMAN, ŽARKO, and ANŽE RODE. "SMERNICE RAZVOJA OBVEŠČEVALNO- VARNOSTNE DEJAVNOSTI 21. STOLETJA." PROFESIONALIZACIJA SLOVENSKE VOJSKE / PROFESSIONALIZATION OF THE SLOVENIAN ARMED FORCES, VOLUME 2012/ ISSUE 14/1 (May 30, 2012): 69–87. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.14.1.5.

Full text
Abstract:
Republika Slovenija in njena obveščevalno-varnostna dejavnost sta vpeti v medna- rodno okolje. Spremembe v njenem strateškem in varnostnem okolju ter nalogah obrambnega sistema in zahteve po hitrem prenosu ter posredovanju informacij zahtevajo temeljito analizo procesov v obveščevalno-varnostni dejavnosti. Obveščevalno-varnostna dejavnost na obrambnem področju ima pomembno mesto v vodenju vodilnih političnih struktur in vojaških oseb. S ciljem racionalne organi- zacije in posredovanja pravočasnih ter kakovostnih informacij podajamo smernice za njen nadaljnji razvoj. Smernice za razvoj obveščevalno-varnostne dejavnosti temeljijo na podlagi zgo- dovinskorazvojne, kvalitativne in primerjalne analize umestitve, delovanja in orga- niziranosti obveščevalno-varnostne dejavnosti v Natu in slovenskem obrambnem resorju. V članku je analizirana obveščevalno-varnostna dejavnost v obdobju od osamo- svojitvene vojne in začetka profesionalizacije Slovenske vojske do današnjih dni. Analizirani so pravne podlage in procesi dela na vseh ravneh. The Republic of Slovenia and its intelligence and security activities are strongly connected to the international environment. The changes in strategic and security environment and defence system tasks, as well as the demands for high speed tran- smission and provision of information thus require a thorough analysis of intelligen- ce and security processes. Intelligence and security activities in the field of defence have an important place in the management of leading political structures and military personnel. We therefore offer guidelines for their future development so that rational organisation and provision of timely and quality information could be provided. The guidelines for the development of intelligence and security activities are based on the historical development, qualitative and comparative analysis of the placement, functioning and organisation of intelligence and security activities in NATO and Slovenian defence sector as such. The article provides the analysis of intelligence and security activities in the period between the War for Independence and the beginnings of Slovenian Armed Forces professionalization, and today, whereby all legal bases and work processes at all levels have been analysed.
APA, Harvard, Vancouver, ISO, and other styles
18

Colbran, Richard, Robyn Ramsden, Karen Stagnitti, and Samantha Adams. "Measures to assess the performance of an Australian non-government charitable non-acute health service: A Delphi Survey of Organisational Stakeholders." Health Services Management Research 31, no. 1 (August 17, 2017): 11–20. http://dx.doi.org/10.1177/0951484817725681.

Full text
Abstract:
Organisation performance measurement is relevant for non-profit charitable organisations as they strive for security in an increasingly competitive funding environment. This study aimed to identify the priority measures and indicators of organisational performance of an Australian non-government charitable organisation that delivers non-acute health services. Seventy-seven and 59 participants across nine stakeholder groups responded to a two-staged Delphi technique study of a case study organisation. The stage one questionnaire was developed using information garnered through a detailed review of literature. Data from the first round were aggregated and analysed for the stage two survey. The final data represented a group consensus. Quality of care was ranked the most important of six organisational performance measures. Service user satisfaction was ranked second followed by financial performance, internal processes, employee learning and growth and community engagement. Thirteen priority indicators were determined across the six measures. Consensus was reached on the priority organisational performance measures and indicators. Stakeholders of the case study organisation value evidence-based practice, technical strength of services and service user satisfaction over more commercially orientated indicators.
APA, Harvard, Vancouver, ISO, and other styles
19

Mills, Richard. "John Howard, weapons of mass destruction and the public’s right to know." Pacific Journalism Review : Te Koakoa 14, no. 2 (September 1, 2008): 37–48. http://dx.doi.org/10.24135/pjr.v14i2.943.

Full text
Abstract:
In March 2003, Australia went to war in Iraq to find and remove Saddam Hussein’s weapons of mass destruction (WMD). None were found. An Australian Parliamentary Committee concluded: The case made by the government was that Iraq possessed WMD on large quantities and posed a grave and unacceptable threat to the region and the world, particularly as there was a danger that Iraq's WMD might be passed to terrorist organisations. This is not the picture that emerges from an examination of the assessments provided to the Commmittee by the Australian Office of National Assessments (ONA) and the Defence Intelligence Organisation (DIO).
APA, Harvard, Vancouver, ISO, and other styles
20

Harrison, Mark, Patrick F. Walsh, Shane Lysons-Smith, David Truong, Catherine Horan, and Ramzi Jabbour. "Tradecraft to Standards—Moving Criminal Intelligence Practice to a Profession through the Development of a Criminal Intelligence Training and Development Continuum." Policing: A Journal of Policy and Practice 14, no. 2 (August 6, 2018): 312–24. http://dx.doi.org/10.1093/police/pay053.

Full text
Abstract:
Abstract Australian governments, academia, and law enforcement agencies have recognized the need to improve intelligence capabilities in order to adapt to the increasingly complex criminal and security environments. In response, the Australian Criminal Intelligence Commission (ACIC), the Australian Federal Police (AFP) and other Australian policing agencies have adopted several reform measures to improve intelligence capability support. While some have focused on developing specific criminal intelligence doctrine, others have sought to improve more challenging aspects of intelligence capability such as analytical and field collection workforce planning. The complexity of the current and emerging criminal environment and a growing professionalization of policing practice more broadly has resulted in a uniquely new strategic approach to developing the analytical and field collection workforce. This article surveys the development of an Australian Criminal Intel Training and Development Continuum (CITDC). The continuum is an end-to-end continuing professional development framework for criminal intelligence analysts and field intelligence officers that monitor proficiency, competence, and knowledge achievement through pre-entry aptitude testing, rigorous class room, and workplace mentoring. The continuum is designed at the post-graduate level and articulates with Charles Sturt University’s MA (Intelligence Analysis). The article argues that both the philosophy of rigorous standards and the learning underpinning the continuum are having demonstrable and positive outcomes for intelligence practitioners and the investigative workforce they support.
APA, Harvard, Vancouver, ISO, and other styles
21

Bolto, Richard. "Accountability and secrecy in the Australian Intelligence Community: the Parliamentary Joint Committee on Intelligence and Security." International Review of Administrative Sciences 85, no. 1 (March 17, 2017): 137–53. http://dx.doi.org/10.1177/0020852316687646.

Full text
Abstract:
The Parliamentary Joint Committee on Intelligence and Security is a significant, evolving and little-known accountability mechanism. As the basis of a case study, publicly available committee documents offer valuable insights into accountability practices within an unusual area of government. These documents highlight a range of accountability exchanges and broader relationships, as well as some of their defining features. Exploring critical institutional factors requires conceptual clarity about accountability and what makes it effective or ineffective. An accountability forum can thus be examined as a social mechanism through which the key stages of accountability unfold, at least in theory. Secrecy is a potentially significant intervening variable in this case, but by applying democratic and constitutional perspectives on accountability, some more general strengths and weaknesses are evident. Points for practitioners While this institution and the Australian Intelligence Community are distinctive and interesting, empirical and normative understandings are limited. The relationship between accountability and secrecy is also significant but not particularly well understood. Accountability studies tend to have a strong conceptual focus, although some scholars have explored ‘good’ or ‘poor’ accountability. Focused on developing an evaluative framework concerning accountability within a secretive context, this study aims to contribute to these knowledge gaps, institutional concepts of accountability and emerging empirical work.
APA, Harvard, Vancouver, ISO, and other styles
22

Braat, Eleni. "Loyalty and Secret Intelligence: Anglo‒Dutch Cooperation during World War II." Politics and Governance 6, no. 4 (December 28, 2018): 159–67. http://dx.doi.org/10.17645/pag.v6i4.1556.

Full text
Abstract:
Secrecy and informal organisation produce, sustain, and reinforce feelings of loyalty within intelligence and security services. This article demonstrates that loyalty is needed for cooperation between intelligence partners as well as within and between services. Under many circumstances, loyalty plays a larger role in the level of internal and external collaboration than formal work processes along hierarchical lines. These findings are empirically based on the case study of Anglo‒Dutch intelligence cooperation during World War II. By demonstrating that ‘loyalty’ critically affects the work of intelligence communities, this article contributes to current and future research that integrates history, intelligence studies, and research on emotions.
APA, Harvard, Vancouver, ISO, and other styles
23

Laundon, Melinda, and Penny Williams. "Flexible Work: Barrier to Benefits?" Financial Planning Research Journal 4, no. 2 (December 1, 2018): 51–68. http://dx.doi.org/10.2478/fprj-2018-0007.

Full text
Abstract:
ABSTRACT The Australian financial services industry has been a leader in offering flexible work policies, positioning them as a solution to the tensions between women’s dual work and family roles. While Australian legislation provides the right to request flexible work, this study uncovers how, in one finance organisation, flexible work is framed as an employee benefit within a suite of benefits. The study shows that employees using flexible work arrangements are less likely to understand and know how to access the full range of benefits, many of which have short- and longterm financial implications. This has consequences for the long-term financial security of women (as the heaviest users of flexible work arrangements) and for financial planners, both as employees of organisations in the Australian finance industry and as providers of advice to women working in this sector.
APA, Harvard, Vancouver, ISO, and other styles
24

ČRNČEC, DAMIR, and JANEZ URBANC. "STREAMLINING THE INTELLIGENCE AND SECURITY STRUCTURES IN NATO AND THE EUROPEAN UNION." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2014/ ISSUE 16/3 (September 30, 2014): 63–75. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.16.3.4.

Full text
Abstract:
Just like every other organisation, NATO and the EU are more or less constantly changing and organisationally adapting to new challenges and related new priorities and tasks. The intelligence and security structures of both organisations are no exception and although radical or major organisational changes, mainly due to the consensus mode, are not very frequent and require more time, minor changes and adjustments occur constantly. In recent years, the field of intelligence and security in both organisations has not witnessed any major organisational changes. Nevertheless, especially within NATO, the intelligence structure has significantly increased in quality due to the extra effort to include, in addition to military and defence, civil intelligence and security structures of Member States to play a more active role in the exchange of intelligence with the Alliance. Similarly, although less obviously, a similar trend took place in the context of the intelligence and security structures within the EU. In parallel with the termination of operations in Afghanistan, with a slow stabilisation of the situation in the Western Balkans, and mainly as a result of the new/old challenges posed by the situation in relation to Ukraine, there is no doubt that the intelligence and security structures of both organisations, especially NATO, will be further modified and upgraded over the coming years. The aim of this paper is thus, in addition to outlining the current organisation of the intelligence and security structures in both organisations, to indicate the future trends in the field of intelligence and security. Kot vsaka organizacija se tudi zveza Nato in EU bolj ali manj stalno spreminjata ter organizacijsko prilagajata novim izzivom in posledično novim prednostim ter nalogam. Obveščevalno-varnostni deli obeh organizacij niso izjema in čeprav radikalne oziroma večje organizacijske spremembe, predvsem zaradi konsenzualnega načina delovanja, niso zelo pogoste ter zahtevajo več časa, se manjše spremembe nenehno dogajajo. V zadnjem času se sicer na obveščevalno-varnostnem področju v obeh organizacijah niso zgodile večje organizacijske spremembe, kljub temu pa se je predvsem znotraj Nata struktura na obveščevalnem področju pomembno kvalitativno dopolnila. Dopolnitev se je zgodila zato, da se k bolj aktivni vlogi pri izmenjavi obveščevalnih podatkov z zavezništvom (še močneje kot v preteklosti) vključijo poleg vojaških oziroma obrambnih tudi civilne obveščevalno-varnostne strukture držav članic. Podoben, čeprav manj očiten, trend je potekal tudi v okviru obveščevalno-varnostnih struktur EU. Vzporedno z zaključevanjem operacij v Afganistanu, s počasnim stabiliziranjem razmer na Zahodnem Balkanu, predvsem pa kot posledica novih/starih izzivov, ki jih povzročajo razmere v povezavi z Ukrajino, postane jasno, da se bo obveščevalno-varnostna struktura v obeh organizacijah, zlasti pa v Natu, v naslednjih letih dodatno spreminjala in izpopolnjevala. Cilj prispevka je poleg prikaza trenutne organiziranosti obveščevalno-varnostne strukture v obeh organizacijah napovedati prihodnje usmeritve na obveščevalno-varnostnem področju.
APA, Harvard, Vancouver, ISO, and other styles
25

Zhao, Yue. "Australian Anti-encryption Legislation and Its Impacts on Security and Privacy." Lecture Notes in Education Psychology and Public Media 53, no. 1 (June 6, 2024): 145–49. http://dx.doi.org/10.54254/2753-7048/53/20240056.

Full text
Abstract:
Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 gives relevant authorities (e.g. law enforcement, national security agencies and intelligence agencies) significant new powers regarding access to encrypted communications data, and hence extensive public attention have been attracted and opinions expressed concerning general security and privacy of users. This essay will first briefly introduce the key contents of the Assistance and Access Act 2018, then discuss how it will affect security and privacy of users respectively by considering both supporting and opposing arguments, and then further the discussion into a global environment by examining the history of a variety of efforts on similar powers. It concludes that though the Assistance and Access Act 2018 has sophisticated oversight mechanism and takes into consideration the most concerned systemic weaknesses security issue, its definition and guidance are vague and is likely not practical to achieve what the Act is designed for in practice. The potential overreach of the Act not only will impose great threats to system security as a whole, but also will breach the principle of privacy.
APA, Harvard, Vancouver, ISO, and other styles
26

Pamulatsih, Heni Yekti, and Anak Agung Banyu Perwita. "Bhayangkara and Platypus: The Cooperation between Indonesian National Police (Polri) and Australian Federal Police (AFP) in Dealing With Terrorism Threat in the Post of Lombok Treaty." Indonesian Perspective 5, no. 2 (September 17, 2020): 119–37. http://dx.doi.org/10.14710/ip.v5i2.33957.

Full text
Abstract:
Terrorism has become the utmost concern of many countries in the world including Indonesia and Australia. Indonesia and Australia have signed a security agreement on 13 November 2006, which was known as Lombok Treaty to promote security relations between the two countries. This article aimed to discuss the security cooperation between Indonesia and Australia especially between Indonesian National Police and Australian Federal Police cooperation in addressing terrorism threat in Indonesia. By using descriptive qualitative method, this article scrutinizes the implementation of security cooperation especially cooperation between Indonesian National Police (POLRI) and Australian Federal Police (AFP) during 2012-2017. It was found that the type and the nature of cooperation between the two police institution could be divided into several dimension. It covered to further build cybercrime investigation satellite office (CCISO), increase personnel capacity building, and promote intelligence exchange to address terrorism threat.
APA, Harvard, Vancouver, ISO, and other styles
27

Jones, David Martin. "Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community." Intelligence and National Security 33, no. 1 (November 17, 2016): 1–20. http://dx.doi.org/10.1080/02684527.2016.1259796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Chivurugwi, Josphat. "The Overarching Mission of an Intelligence Security Organisation in the Defence of the National Security Goals: The Case of Zimbabwe." Journal of Public Administration 58, no. 2 (June 2023): 509–24. http://dx.doi.org/10.53973/jopa.2023.58.2.a19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ghaffari, Shahram, Terri J. Jackson, Christopher M. Doran, Andrew Wilson, and Chris Aisbett. "Describing Iranian hospital activity using Australian Refined DRGs: A case study of the Iranian Social Security Organisation." Health Policy 87, no. 1 (July 2008): 63–71. http://dx.doi.org/10.1016/j.healthpol.2007.09.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Farneubun, Petrus K. "China’s Rise and its Implications for Australian Foreign Policy." Papua Journal of Diplomacy and International Relations 2, no. 2 (August 7, 2022): 142–62. http://dx.doi.org/10.31957/pjdir.v2i2.2234.

Full text
Abstract:
This article places a particular emphasis on the rise of China and its implications for Australian foreign policy. It qualitatively examines the perceptions of China’s rise, its intentions, and the Australian responses, based on government and international organisation reports, and secondary sources such as books, journals, and media articles. Using realism as a theoretical lens, this article argues that Australia’s foreign policy still reflects an ambiguity, as a result of, on the one hand, the economic opportunities China creates, and on the other hand, uncertainty regarding China’s intentions, whether offensive or defensive, peaceful or aggressive. Facing this condition, this article demonstrates that Australia adopts several important policy strategies. First, it maintains a hedging strategy to balance its economic interests and its security concern. Second, Australia continues to rely on the protection of the US. In the long-term, however, this reliance may be changed. For this reason, Australia needs to increase its own military capability. This article concludes that Australian foreign policy will likely remain ambivalent in its response to the rise of China.KEYWORDSAustralia; China’s Rise; Foreign Policy; Military Capability; Power Shift
APA, Harvard, Vancouver, ISO, and other styles
31

Cox, James W., Michele Akeroyd, and Danielle P. Oliver. "Integrated water resource assessment for the Adelaide region, South Australia." Proceedings of the International Association of Hydrological Sciences 374 (October 17, 2016): 69–73. http://dx.doi.org/10.5194/piahs-374-69-2016.

Full text
Abstract:
Abstract. South Australia is the driest state in the driest inhabited country in the world, Australia. Consequently, water is one of South Australia's highest priorities. Focus on water research and sources of water in the state became more critical during the Millenium drought that occurred between 1997 and 2011. In response to increased concern about water sources the South Australian government established The Goyder Institute for Water Research – a partnership between the South Australian State Government, the Commonwealth Scientific and Industrial Research Organisation (CSIRO), Flinders University, University of Adelaide and University of South Australia. The Goyder Institute undertakes cutting-edge science to inform the development of innovative integrated water management strategies to ensure South Australia's ongoing water security and enhance the South Australian Government's capacity to develop and deliver science-based policy solutions in water management. This paper focuses on the integrated water resource assessment of the northern Adelaide region, including the key research investments in water and climate, and how this information is being utilised by decision makers in the region.
APA, Harvard, Vancouver, ISO, and other styles
32

Zheng, Chaoliang. "Web-based Financial Shared Service Platform Construction Research." Frontiers in Business, Economics and Management 10, no. 3 (August 22, 2023): 24–27. http://dx.doi.org/10.54097/fbem.v10i3.11204.

Full text
Abstract:
With the arrival of the era of big wisdom and cloud, accounting work is gradually developing in the direction of platformisation and digital intelligence. The construction of financial shared service platform is an important link to promote the transformation of enterprise digital intelligence, the article is based on the strategic positioning of the enterprise, from the strategy, organisation, talent, process, data and technology, six aspects of the construction of Web-based financial shared service platform, shared service platform module functions and construction of security measures. In order to optimise the management of financial shared service platform, promote enterprise information technology, digital transformation and high-quality development to make a new exploration.
APA, Harvard, Vancouver, ISO, and other styles
33

Clarke, Marilyn. "Building employability through graduate development programmes." Personnel Review 46, no. 4 (June 5, 2017): 792–808. http://dx.doi.org/10.1108/pr-12-2015-0321.

Full text
Abstract:
Purpose Graduate development programmes are a well-established strategy for recruiting graduates into the sector at the start of a lifetime public service career. There are indications, however, that public sector careers are becoming less secure and less long term in keeping with overall career trends across all sectors, a trend that has seen the emergence of employment contracts based on employability rather than job security. The purpose of this paper is to explore a graduate development programme offered by a state-based Australian public sector organisation to identify the extent to which it reflects and supports the shift to an employability-based contract from the perspective of programme participants. Design/methodology/approach Semi-structured interviews were conducted with 23 participants from three intakes of a public sector graduate development programme. Data were analysed through identification of first- and second-order themes as well as cross-case comparison. Findings Findings indicate that the one-year development programme partially supports an employability-based contract. The organisation could not promise ongoing employment and job security but did assist participants to develop skills and competencies for the future through its formal training and development programme. Work unit support for employability was, however, much more variable and depended to a large extent on line managers. Research limitations/implications The study was conducted in a single organisation and only included current and past programme participants who were still employed in the public sector. Practical implications The success of the programme was largely dependent on job placement and level of line manager support. Addressing these areas through better programme design and management can support the development of future leaders through opportunities for enhanced employability. Originality/value The study extends current research on employability by exploring how a public sector organisation provides support for graduates in a developmental programme from a participant perspective.
APA, Harvard, Vancouver, ISO, and other styles
34

Roffey, Paul, and Michelle Gahan. "Responses to Security Sensitive Biological Agents (SSBA) risks by the Australian Federal Police." Microbiology Australia 41, no. 3 (2020): 128. http://dx.doi.org/10.1071/ma20034.

Full text
Abstract:
As Australia’s national law enforcement agency the Australia Federal Police (AFP) plays a number of roles, broadly grouped under intelligence and investigation, in supporting a whole of government approach to responding to, and mitigating, risks from Security Sensitive Biological Agents (SSBA). The AFP is responsible for coordinating the investigation of national and transnational crimes, which includes acts of bioterrorism, and preventing, countering and responding to attacks in Australia and on Australian interests overseas. This paper provides an overview of the responses to SSBA risks by the AFP.
APA, Harvard, Vancouver, ISO, and other styles
35

Crooks, David, James Acris, Liam Atherton, Paul Clark, Pau Cutrina, David Jordan, Shawn McKee, and Liviu Vâlsan. "Collaborative Operational Security: The future of Cybersecurity for Research and Education." EPJ Web of Conferences 295 (2024): 04013. http://dx.doi.org/10.1051/epjconf/202429504013.

Full text
Abstract:
No single organisation has the resources to defend its services alone against most modern malicious actors and so we must protect ourselves as a community. In the face of determined and well-resourced attackers, we must actively collaborate in this effort across HEP and more broadly across Research and Education (R&E). Parallel efforts are necessary to respond appropriately to this requirement. We must share threat intelligence about ongoing cybersecurity incidents with our trusted partners and deploy the fine-grained security network monitoring necessary to make active use of this intelligence. We must also engage with senior management in our organizations to ensure that we work alongside any broader organisational cybersecurity development programs. We report on progress of the Security Operations Center (SOC) Working Group, established by the WLCG but with membership encompassing the R&E sector. The goal of the Working Group is to develop reference designs for SOC deployments and empower R&E organisations to collect, leverage, and act upon targeted, contextualized, actionable threat intelligence. This report will include recent SOC deployment activities at sites with network connectivity in excess of 100Gb/s, as well as new technology designs. An important development, which is likely to form a key part of the WLCG security strategy, is the potential use of passive DNS logs to allow sites without fine-grained network monitoring to benefit from the threat intelligence available to our community. We also report on higher-level progress in engaging with the broader community to establish common approaches to this vital area of cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
36

Mason, Claire M., Melanie Ayre, and Shanae M. Burns. "Implementing Industry 4.0 in Australia: Insights from Advanced Australian Manufacturers." Journal of Open Innovation: Technology, Market, and Complexity 8, no. 1 (March 15, 2022): 53. http://dx.doi.org/10.3390/joitmc8010053.

Full text
Abstract:
This study explores Industry 4.0 in the Australian context, where manufacturing is dominated by smaller firms servicing the domestic market. We interviewed 20 advanced Australian manufacturers from diverse fields, capturing detailed descriptions of the Industry 4.0 implementation process. We compared the themes that emerged from their descriptions with the factors typically assessed in Industry 4.0 frameworks to draw out differences in emphasis. Consistent with these frameworks, Australian manufacturers were focused on using Industry 4.0 technologies to automate the capture, integration and analysis of data. To enable this activity, they were reorganising workforce roles and developing new skill sets. Knowledge sharing and collaborations within and across the organisation were seen to be especially important for small Australian manufacturers (with limited funding for technology investment and research and development) to maintain global competitiveness. However, while most Industry 4.0 frameworks describe supply chain applications, the development of smart products and services, and the need to adopt a strategy-led approach, relatively few participants spoke about these opportunities. Even fewer addressed the need for improved governance, standards and data security in the context of Industry 4.0. We argue that these gaps are best addressed through government policy and investment focusing beyond manufacturers, to support Industry 4.0 uplift across key domestic supply chains.
APA, Harvard, Vancouver, ISO, and other styles
37

Glennie, Miriam, Michael O’Donnell, John Benson, and Michelle Brown. "Work as a government ‘scientist’: Professional status security during organisational change and downsizing." Journal of Sociology 55, no. 2 (June 18, 2018): 252–69. http://dx.doi.org/10.1177/1440783318781271.

Full text
Abstract:
An increasingly complex and competitive funding environment has led many public research organisations to intervene in the organisation of scientists’ work. Government scientists represent a major component of the public research workforce but little is known of how workers in this sector have fared amid institutional and organisational change. Government scientists have applied research objectives but must still meet the profession’s requirements for legitimisation through independent research and peer-reviewed publishing to be recognised professionally as ‘scientists’. This study examines the impact of organisational change and downsizing in an Australian government science agency on the professional status security of its scientists. It uses a mixed method approach involving one focus group, 22 in-depth interviews and 803 survey responses. It finds that structural change reduced scientists’ professional status security and that a context of job insecurity and limited external employment opportunities inhibits individual scientists’ capacity to resist adverse changes to their work conditions.
APA, Harvard, Vancouver, ISO, and other styles
38

Drach, Iryna, Olha Petroye, Oleksandra Borodiyenko, Iryna Reheilo, Oleksandr Bazeliuk, Nataliia Bazeliuk, and Olena Slobodianiuk. "The Use of Artificial Intelligence in Higher Education." International Scientific Journal of Universities and Leadership, no. 15 (July 7, 2023): 66–82. http://dx.doi.org/10.31874/2520-6702-2023-15-66-82.

Full text
Abstract:
The article analyses the theoretical foundations of using artificial intelligence (AI) in higher education. It shows that the AI system as a strategic technology provides many benefits for the lives of people and society as a whole and also symbolises a new stage not only in the history of digital technologies but also on a global scale of development of modern civilisation. The article provides an overview of the policies of European and global organisations, including the United Nations Educational, Scientific and Cultural Organisation (UNESCO), the European Union, the Organisation for Economic Cooperation and Development, the European University Association, etc. on the effective use of AI in everyday life and, in particular, in education. Based on the analysis results, the article systematises ethical principles (human-centred values, governance, transparency, accountability, sustainability, proportionality, confidentiality, safety, security, and inclusiveness) that should be applied in using AI. The SWOT analysis helped identify strengths and weaknesses, opportunities and risks of using AI in higher education. The article examines the regulatory framework for the implementation of AI in the Ukrainian educational area and identifies the peculiarities of AI application in the educational process of higher education institutions. It analyses statistical data for identifying the risks and threats of using AI in HEIs under the Open Science, obtained in 2023 by researchers of the Institute of Higher Education of NAES of Ukraine in the all-Ukrainian survey “Open Science in Higher Education Institutions of Ukraine,” more than 1.5 thousand respondents participated. The article also substantiates practical recommendations for developing and implementing AI in higher education at the national, institutional and individual levels.
APA, Harvard, Vancouver, ISO, and other styles
39

Trystan, A., D. Zhukov, and A. Bеrеzhnyi. "MODELS OF THE SYSTEM OF COLLECTIVE SELF-ORGANISATION OF UNMANNED AERIAL VEHICLES USING ARTIFICIAL INTELLIGENCE." Системи управління, навігації та зв’язку. Збірник наукових праць 2, no. 76 (April 30, 2024): 47–52. http://dx.doi.org/10.26906/sunz.2024.2.047.

Full text
Abstract:
The article examines the current state and trends in the development of unmanned aerial vehicles (hereinafter - UAVs), methods and means of their control, self-organisation, flight routing, as well as the involvement of artificial intelligence technologies in the UAV teams system. The main trends in the use of UAVs in the defence sector are analysed. The key problems in this area are highlighted, as well as the shortcomings of existing methods and systems. The article analyses scientific works of domestic and foreign scholars, studies problematic issues and suggests ways of their solution. The introduction of artificial intelligence into the UAV control system has significant potential and makes the development of these technologies urgent. The development of UAV collective control systems, including those using artificial intelligence, allows for the effective use of technology in various fields, ensuring increased coordination, functionality and overall efficiency. At the same time, despite active research in this area, a number of problems related to the development of methods and algorithms for group work still remain unresolved. The issue of integrating information technologies created on their basis and the specifics of their implementation in collective intelligence systems in order to increase the efficiency of solving complex formalised tasks is not sufficiently studied. A method of self-organisation of the UAV team with decentralised control is proposed, in which a number of functions (route planning, distribution of roles, determination of optimal actions, obtaining and processing information) assigned to the onboard control system of the robotic air complex can be performed by each element of the UAV team system due to their self-organisation. The practicality of this method lies in the fact that the UAV's artificial intelligence will constantly self-learn and improve, and if necessary, can be reprogrammed to meet the required conditions of the task. As a consequence, the results and time required to complete missions will improve significantly, while the number of control operators will decrease. It solves a number of problems and shortcomings related to the organisation of the management system, route planning, distribution of roles, speed and completeness of receiving, processing and transmitting information, which in turn improves the security and performance of the system.
APA, Harvard, Vancouver, ISO, and other styles
40

Ferguson, Megan, Emma Tonkin, Julie Brimblecombe, Amanda Lee, Bronwyn Fredericks, Katherine Cullerton, Catherine L. Mah, et al. "Communities Setting the Direction for Their Right to Nutritious, Affordable Food: Co-Design of the Remote Food Security Project in Australian Indigenous Communities." International Journal of Environmental Research and Public Health 20, no. 4 (February 8, 2023): 2936. http://dx.doi.org/10.3390/ijerph20042936.

Full text
Abstract:
Despite long histories of traditional food security, Indigenous peoples globally are disproportionately exposed to food insecurity. Addressing this imbalance must be a partnership led by Indigenous peoples in accordance with the UN Declaration of the Rights of Indigenous Peoples. We report the co-design process and resulting design of a food security research project in remote Australia and examine how the co-design process considered Indigenous peoples’ ways of knowing, being, and doing using the CREATE Tool. Informed by the Research for Impact Tool, together Aboriginal Community Controlled Health Organisation staff, Indigenous and non-Indigenous public health researchers designed the project from 2018–2019, over a series of workshops and through the establishment of research advisory groups. The resulting Remote Food Security Project includes two phases. Phase 1 determines the impact of a healthy food price discount strategy on the diet quality of women and children, and the experience of food (in)security in remote communities in Australia. In Phase 2, community members propose solutions to improve food security and develop a translation plan. Examination with the CREATE Tool showed that employing a co-design process guided by a best practice tool has resulted in a research design that responds to calls for food security in remote Indigenous communities in Australia. The design takes a strengths-based approach consistent with a human rights, social justice, and broader empowerment agenda. Trial registration: The trial included in Phase 1 of this project has been registered with Australian New Zealand Clinical Trials Registry: ACTRN12621000640808.
APA, Harvard, Vancouver, ISO, and other styles
41

Bonilla, Diego Navarro. "Information Management professionals working for intelligence organizations: ethics and deontology implications." Security and Human Rights 24, no. 3-4 (April 30, 2014): 264–79. http://dx.doi.org/10.1163/18750230-02404005.

Full text
Abstract:
Archive and information management experts trained in library science programs are ideal candidates for jobs in intelligence organizations. Their skills, abilities and knowledge are frequently required in at least two well-defined areas: open source information gathering and records management/archival organisation. Under the general overview of the debate between “big data vs. big narrative” this article focuses on the ethical challenges that affect this community of information professionals. As a key component of the so-called “intelligence culture”, it will be also underlined the need for intensifying from our university classrooms the ethical dimension of information exploitation for security and defence purposes. The role played by these information profiles involved in multiple phases of the intelligence production process must be based not only on efficiency and efficacy criteria but also on deontology principles whose benefits are the fortification of democratic practice by intelligence services working in strong legal frameworks designed to guarantee fundamental rights.
APA, Harvard, Vancouver, ISO, and other styles
42

Sarre, Rick, and Alikki Vernon. "Access to Safe Justice in Australian Courts: Some Reflections upon Intelligence, Design and Process." International Journal for Crime, Justice and Social Democracy 2, no. 2 (September 11, 2013): 133–47. http://dx.doi.org/10.5204/ijcjsd.v2i2.116.

Full text
Abstract:
There have been great strides taken in Australia recently to make our courts safer, principally through an emphasis on risk management. After all, governments have a responsibility to protect those who work in, or who visit, court precincts. A greater understanding of how court safety can be enhanced by managing people, curial processes and the court environment requires assessing the physical mechanisms of risk management alongside a ‘needs-focus’ of stakeholders’ safety considerations. At the same time there must be a focus on enabling participation and well-being in justice processes. By examining the way in which courts now operate around Australia and the developments in security intelligence, court design and processes, this paper seeks to outline how access to safe justice is possible.
APA, Harvard, Vancouver, ISO, and other styles
43

Daneshgar, Farhad, and Jim Wang. "Validation of the awareness net model for the Australian security investment processes." Knowledge-Based Systems 20, no. 8 (December 2007): 736–44. http://dx.doi.org/10.1016/j.knosys.2006.10.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sharif, Mohd Hisham Mohd, Indrit Troshani, and Robyn Davidson. "Determinants of Social Media Impact in Local Government." Journal of Organizational and End User Computing 28, no. 3 (July 2016): 82–103. http://dx.doi.org/10.4018/joeuc.2016070106.

Full text
Abstract:
Limited attention has been directed towards understanding the impact of social media in the public sector, particularly in local government organisations. Although social media offer substantial benefits and opportunities to local government, research into the impact of social media remains scant. To address this gap, the authors draw on the technology, organisation, and environment (TOE) framework and propose a model of the determinants of social media impact in local government. The model is tested with data collected via a survey with 173 Australian local government organisations using social media. Data were analysed using the partial least squares-structural equation modelling (PLS-SEM) technique. The results indicate that TOE factors including perceived benefits, perceived security risks, compatibility, and degree of formalisation are important predictors of social media impact in local government.
APA, Harvard, Vancouver, ISO, and other styles
45

Stewart, Jonathon, Juan Lu, Nestor Gahungu, Adrian Goudie, P. Gerry Fegan, Mohammed Bennamoun, Peter Sprivulis, and Girish Dwivedi. "Western Australian medical students’ attitudes towards artificial intelligence in healthcare." PLOS ONE 18, no. 8 (August 31, 2023): e0290642. http://dx.doi.org/10.1371/journal.pone.0290642.

Full text
Abstract:
Introduction Surveys conducted internationally have found widespread interest in artificial intelligence (AI) amongst medical students. No similar surveys have been conducted in Western Australia (WA) and it is not known how medical students in WA feel about the use of AI in healthcare or their understanding of AI. We aim to assess WA medical students’ attitudes towards AI in general, AI in healthcare, and the inclusion of AI education in the medical curriculum. Methods A digital survey instrument was developed based on a review of available literature and consultation with subject matter experts. The survey was piloted with a group of medical students and refined based on their feedback. We then sent this anonymous digital survey to all medical students in WA (approximately 1539 students). Responses were open from the 7th of September 2021 to the 7th of November 2021. Students’ categorical responses were qualitatively analysed, and free text comments from the survey were qualitatively analysed using open coding techniques. Results Overall, 134 students answered one or more questions (8.9% response rate). The majority of students (82.0%) were 20–29 years old, studying medicine as a postgraduate degree (77.6%), and had started clinical rotations (62.7%). Students were interested in AI (82.6%), self-reported having a basic understanding of AI (84.8%), but few agreed that they had an understanding of the basic computational principles of AI (33.3%) or the limitations of AI (46.2%). Most students (87.5%) had not received teaching in AI. The majority of students (58.6%) agreed that AI should be part of medical training and most (72.7%) wanted more teaching focusing on AI in medicine. Medical students appeared optimistic regarding the role of AI in medicine, with most (74.4%) agreeing with the statement that AI will improve medicine in general. The majority (56.6%) of medical students were not concerned about the impact of AI on their job security as a doctor. Students selected radiology (72.6%), pathology (58.2%), and medical administration (44.8%) as the specialties most likely to be impacted by AI, and psychiatry (61.2%), palliative care (48.5%), and obstetrics and gynaecology (41.0%) as the specialties least likely to be impacted by AI. Qualitative analysis of free text comments identified the use of AI as a tool, and that doctors will not be replaced as common themes. Conclusion Medical students in WA appear to be interested in AI. However, they have not received education about AI and do not feel they understand its basic computational principles or limitations. AI appears to be a current deficit in the medical curriculum in WA, and most students surveyed were supportive of its introduction. These results are consistent with previous surveys conducted internationally.
APA, Harvard, Vancouver, ISO, and other styles
46

Belfanti, Charmaine. "Emotional capacity in the public sector – an Australian review." International Journal of Public Sector Management 30, no. 5 (July 10, 2017): 429–46. http://dx.doi.org/10.1108/ijpsm-10-2016-0182.

Full text
Abstract:
Purpose This paper presents a review examining an Australian public sector competency framework through the lens of emotional intelligence (EQ) to answer the question “To what extent is the concept of EQ used to facilitate NSW public sector reform?” The purpose of this paper is to accentuate the importance of emotional capacity as an important capability to achieve reform goals, recognising the public sector’s deep organisational history and accepting that change is an emotional event, and that people achieve change. Design/methodology/approach A literature review drawing relationships between culture, change and emotion is applied to a capability framework for the public sector in the State of NSW. This review serves two purposes. First, it examines interacting factors that define the public sector context – a culture developed over generations, identity, the impact of culture on change and the relationship between change and emotions. The second examines a concept for its ability to transform this culture in a comparatively short time compared to its evolutionary history. Emotional capacity is framed by the EQ literature and is explored as a competency with particular focus in the NSW public sector. A ProQuest search using keywords Emotional intelligence and Public Sector or Civil Service; and Emotional intelligence and Public Administration located 22 studies across 14 countries looking at EQ in the public sector. These are supplemented by additional studies on EQ. The capability framework is examined against the elements of the only recognised standardised test for EQ (Fiori and Antonakis, 2011), the Mayer-Salovey-Caruso Emotional Intelligence Test. Findings The examination concludes that emotional capacity is implicit, if not overlooked within the framework, with continued emphasis on technical and managerial competencies, evident of public sector management still encased in traditional paradigms. The discussion positions the development of emotional capacity as a high-order competency in a challenging reform environment. Research limitations/implications The literature review may suffer from publication bias in both the literature cited in this review as well as those studies that have been published, particularly given the small amount of studies available within the public sector environment. The theoretical nature of the matching assessment is subjective and allows potential for variation in interpretation in both the meaning of the competencies and the matching to the four branches of EQ. Practical implications Empirical research in EQ is limited in the public sector domain. The public sector has an embedded culture weighed with assumptions steeped in history. A public sector organisation is valuable for longitudinal studies as many employees stay for considerable years if not their whole career. Further empirical research within this sector in examining the impact of emotional capacity on cultural reform would enhance the knowledge in this field. Originality/value The paper contributes to the limited literature examining the optimal competencies in particular emotional capacity for reform in the public sector.
APA, Harvard, Vancouver, ISO, and other styles
47

Velicof, Mihai. "The Importance of Intelligence in Biosecurity and Bioterrorism." International conference KNOWLEDGE-BASED ORGANIZATION 26, no. 1 (June 1, 2020): 163–66. http://dx.doi.org/10.2478/kbo-2020-0025.

Full text
Abstract:
AbstractThe main purpose of this article is to delimitate the concepts of biosecurity and bioterrorism and to highlight the importance of intelligence in the decision-making process. Biosecurity and bioterrorism are two terms who can be very similar at first view, but they are very different, and they only interconnect at one point, the first one is including the second. The first term biosecurity or biological security can be simply defined as an action taken to prevent a damage from a biological threat and bioterrorism is a form of terrorism which involves the use of a biological weapon. The intelligence in relation with biosecurity and bioterrorism can be defined as a process which is producing an analysis for the organisation. Biosecurity, bioterrorism and intelligence are all interconnected, the last one is the most important because a good intelligence can reduce or even disrupt threats and emergencies by providing an effective decision-making support when is needed. Intelligence has a very important role in managing bio threats only if stakeholders such as scientists, the first responder, clinicians and others are engaged in the process of taking the decision. A good intelligence provides a very important mechanism in understanding the threat and estimating the risk for a better decision to enable a potential biothreat.
APA, Harvard, Vancouver, ISO, and other styles
48

Ali, Hisham, Jawad Ahmad, Zakwan Jaroucheh, Pavlos Papadopoulos, Nikolaos Pitropakis, Owen Lo, Will Abramson, and William J. Buchanan. "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform." Entropy 24, no. 10 (September 28, 2022): 1379. http://dx.doi.org/10.3390/e24101379.

Full text
Abstract:
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and improve overall organisational security. An organisation’s vulnerabilities to attacks might change over time. It is utterly important to find a balance among a current threat, the potential countermeasures, their consequences and costs, and the estimation of the overall risk that this provides to the organisation. For enhancing organisational security and automation, applying threat intelligence technology is critical for detecting, classifying, analysing, and sharing new cyberattack tactics. Trusted partner organisations can then share newly identified threats to improve their defensive capabilities against unknown attacks. On this basis, organisations can help reduce the risk of a cyberattack by providing access to past and current cybersecurity events through blockchain smart contracts and the Interplanetary File System (IPFS). The suggested combination of technologies can make organisational systems more reliable and secure, improving system automation and data quality. This paper outlines a privacy-preserving mechanism for threat information sharing in a trusted way. It proposes a reliable and secure architecture for data automation, quality, and traceability based on the Hyperledger Fabric private-permissioned distributed ledger technology and the MITRE ATT&CK threat intelligence framework. This methodology can also be applied to combat intellectual property theft and industrial espionage.
APA, Harvard, Vancouver, ISO, and other styles
49

BADEA, Dorel, and Diana Elena RANF. "The Impact of Technological Development on Managerial Resilience in the Military Organisation." Romanian Military Thinking 2021, no. 4 (November 2021): 260–71. http://dx.doi.org/10.55535/rmt.2021.4.15.

Full text
Abstract:
The current course of the 21st century has challenged humanity as a whole in terms of the operationalisation of large-scale changes, both quantitative and qualitative, one of the directions for changing social functionality being subsumed under global technological governance. Trends specific to emerging and disruptive technologies, technological superiority, digital diplomacy and sovereignty, innovation ecosystems etc. have a major impact on a macro-indicator of analysis of contemporary global performance, namely resilience. The pace of implementing the solutions characteristic to these advanced technologies is a dynamic one, practically influencing all areas of activity. At the military level, there are concerns of interest at the level of NATO member states regarding space systems, robotics and advanced conventional weapons systems (laser, hypersonic weapons), innovative resources, digitisation, artificial intelligence, cyber security etc. In this context, the present article brings to attention some presumptive aspects regarding the modification of managerial resilience, in terms of military roles and responsibilities, starting from classical managerial theories. Directions for exploring the subject proposed by the title which are of interest to military decision-makers are also presented.
APA, Harvard, Vancouver, ISO, and other styles
50

Hunter, Benjamin, Sumeet Hindocha, and Richard W. Lee. "The Role of Artificial Intelligence in Early Cancer Diagnosis." Cancers 14, no. 6 (March 16, 2022): 1524. http://dx.doi.org/10.3390/cancers14061524.

Full text
Abstract:
Improving the proportion of patients diagnosed with early-stage cancer is a key priority of the World Health Organisation. In many tumour groups, screening programmes have led to improvements in survival, but patient selection and risk stratification are key challenges. In addition, there are concerns about limited diagnostic workforces, particularly in light of the COVID-19 pandemic, placing a strain on pathology and radiology services. In this review, we discuss how artificial intelligence algorithms could assist clinicians in (1) screening asymptomatic patients at risk of cancer, (2) investigating and triaging symptomatic patients, and (3) more effectively diagnosing cancer recurrence. We provide an overview of the main artificial intelligence approaches, including historical models such as logistic regression, as well as deep learning and neural networks, and highlight their early diagnosis applications. Many data types are suitable for computational analysis, including electronic healthcare records, diagnostic images, pathology slides and peripheral blood, and we provide examples of how these data can be utilised to diagnose cancer. We also discuss the potential clinical implications for artificial intelligence algorithms, including an overview of models currently used in clinical practice. Finally, we discuss the potential limitations and pitfalls, including ethical concerns, resource demands, data security and reporting standards.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography