Journal articles on the topic 'Australian Security and Intelligence Organisation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Australian Security and Intelligence Organisation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lee, H. P. "The Australian Security Intelligence Organisation—New Mechanisms for Accountability." International and Comparative Law Quarterly 38, no. 4 (October 1989): 890–905. http://dx.doi.org/10.1093/iclqaj/38.4.890.
Full textIreland-Piper, Danielle, and Jonathan Crowe. "Whistleblowing, National Security and the Constitutional Freedom of Political Communication." Federal Law Review 46, no. 3 (September 2018): 341–65. http://dx.doi.org/10.1177/0067205x1804600301.
Full textMcKnight, David. "Australian Film and the Cultural Cold War." Media International Australia 111, no. 1 (May 2004): 118–30. http://dx.doi.org/10.1177/1329878x0411100112.
Full textMcCulloch, Jude, and Joo-Cheong Tham. "Secret State, Transparent Subject: The Australian Security Intelligence Organisation in the Age of Terror." Australian & New Zealand Journal of Criminology 38, no. 3 (December 2005): 400–415. http://dx.doi.org/10.1375/acri.38.3.400.
Full textMcGarrity, Nicola, and Keiran Hardy. "Digital surveillance and access to encrypted communications in Australia." Common Law World Review 49, no. 3-4 (February 26, 2020): 160–81. http://dx.doi.org/10.1177/1473779520902478.
Full textHead, Michael. "ASIO’s ‘official history’: More unanswered questions." Alternative Law Journal 42, no. 4 (November 27, 2017): 304–9. http://dx.doi.org/10.1177/1037969x17732710.
Full textShanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Australian Journal of Telecommunications and the Digital Economy 6, no. 4 (December 31, 2018): 109–40. http://dx.doi.org/10.18080/ajtde.v6n4.167.
Full textShanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Journal of Telecommunications and the Digital Economy 6, no. 4 (December 31, 2018): 109–40. http://dx.doi.org/10.18080/jtde.v6n4.167.
Full textWilliams, George. "The Legal Assault on Australian Democracy." QUT Law Review 16, no. 2 (June 17, 2016): 19. http://dx.doi.org/10.5204/qutlr.v16i2.651.
Full textMcKnight, David. "‘Not Attributable to Official Sources’: Counter-Propaganda and the Mass Media." Media International Australia 128, no. 1 (August 2008): 5–17. http://dx.doi.org/10.1177/1329878x0812800103.
Full textGray, Geoffrey. "‘In my file, I am two different people’: Max Gluckman and A.L. Epstein, the Australian National University, and Australian Security Intelligence Organisation, 1958–60." Cold War History 20, no. 1 (April 2, 2019): 59–76. http://dx.doi.org/10.1080/14682745.2019.1575367.
Full textBoda, József. "The Situation of National Security Studies." Nemzetbiztonsági Szemle 10, no. 3 (November 11, 2022): 13–24. http://dx.doi.org/10.32561/nsz.2022.3.2.
Full textWitczak, Maciej. "Biały wywiad w zarządzaniu bezpieczeństwem informacji." Przegląd Bezpieczeństwa Wewnętrznego 16, no. 30 (2024): 213–40. http://dx.doi.org/10.4467/20801335pbw.24.009.19611.
Full textKoller, Marco. "Recommendations for Safety-Conscious Smart Device Use by Military Professionals." Academic and Applied Research in Military and Public Management Science 21, no. 2 (November 30, 2022): 5–14. http://dx.doi.org/10.32565/aarms.2022.2.1.
Full textMay, Lauren, and Tim Lane. "A Model for Improving e-Security in Australian Universities." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 90–96. http://dx.doi.org/10.3390/jtaer1020016.
Full textSharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (July 31, 2021): 1849. http://dx.doi.org/10.3390/electronics10151849.
Full textHENIGMAN, ŽARKO, and ANŽE RODE. "SMERNICE RAZVOJA OBVEŠČEVALNO- VARNOSTNE DEJAVNOSTI 21. STOLETJA." PROFESIONALIZACIJA SLOVENSKE VOJSKE / PROFESSIONALIZATION OF THE SLOVENIAN ARMED FORCES, VOLUME 2012/ ISSUE 14/1 (May 30, 2012): 69–87. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.14.1.5.
Full textColbran, Richard, Robyn Ramsden, Karen Stagnitti, and Samantha Adams. "Measures to assess the performance of an Australian non-government charitable non-acute health service: A Delphi Survey of Organisational Stakeholders." Health Services Management Research 31, no. 1 (August 17, 2017): 11–20. http://dx.doi.org/10.1177/0951484817725681.
Full textMills, Richard. "John Howard, weapons of mass destruction and the public’s right to know." Pacific Journalism Review : Te Koakoa 14, no. 2 (September 1, 2008): 37–48. http://dx.doi.org/10.24135/pjr.v14i2.943.
Full textHarrison, Mark, Patrick F. Walsh, Shane Lysons-Smith, David Truong, Catherine Horan, and Ramzi Jabbour. "Tradecraft to Standards—Moving Criminal Intelligence Practice to a Profession through the Development of a Criminal Intelligence Training and Development Continuum." Policing: A Journal of Policy and Practice 14, no. 2 (August 6, 2018): 312–24. http://dx.doi.org/10.1093/police/pay053.
Full textBolto, Richard. "Accountability and secrecy in the Australian Intelligence Community: the Parliamentary Joint Committee on Intelligence and Security." International Review of Administrative Sciences 85, no. 1 (March 17, 2017): 137–53. http://dx.doi.org/10.1177/0020852316687646.
Full textBraat, Eleni. "Loyalty and Secret Intelligence: Anglo‒Dutch Cooperation during World War II." Politics and Governance 6, no. 4 (December 28, 2018): 159–67. http://dx.doi.org/10.17645/pag.v6i4.1556.
Full textLaundon, Melinda, and Penny Williams. "Flexible Work: Barrier to Benefits?" Financial Planning Research Journal 4, no. 2 (December 1, 2018): 51–68. http://dx.doi.org/10.2478/fprj-2018-0007.
Full textČRNČEC, DAMIR, and JANEZ URBANC. "STREAMLINING THE INTELLIGENCE AND SECURITY STRUCTURES IN NATO AND THE EUROPEAN UNION." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2014/ ISSUE 16/3 (September 30, 2014): 63–75. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.16.3.4.
Full textZhao, Yue. "Australian Anti-encryption Legislation and Its Impacts on Security and Privacy." Lecture Notes in Education Psychology and Public Media 53, no. 1 (June 6, 2024): 145–49. http://dx.doi.org/10.54254/2753-7048/53/20240056.
Full textPamulatsih, Heni Yekti, and Anak Agung Banyu Perwita. "Bhayangkara and Platypus: The Cooperation between Indonesian National Police (Polri) and Australian Federal Police (AFP) in Dealing With Terrorism Threat in the Post of Lombok Treaty." Indonesian Perspective 5, no. 2 (September 17, 2020): 119–37. http://dx.doi.org/10.14710/ip.v5i2.33957.
Full textJones, David Martin. "Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community." Intelligence and National Security 33, no. 1 (November 17, 2016): 1–20. http://dx.doi.org/10.1080/02684527.2016.1259796.
Full textChivurugwi, Josphat. "The Overarching Mission of an Intelligence Security Organisation in the Defence of the National Security Goals: The Case of Zimbabwe." Journal of Public Administration 58, no. 2 (June 2023): 509–24. http://dx.doi.org/10.53973/jopa.2023.58.2.a19.
Full textGhaffari, Shahram, Terri J. Jackson, Christopher M. Doran, Andrew Wilson, and Chris Aisbett. "Describing Iranian hospital activity using Australian Refined DRGs: A case study of the Iranian Social Security Organisation." Health Policy 87, no. 1 (July 2008): 63–71. http://dx.doi.org/10.1016/j.healthpol.2007.09.014.
Full textFarneubun, Petrus K. "China’s Rise and its Implications for Australian Foreign Policy." Papua Journal of Diplomacy and International Relations 2, no. 2 (August 7, 2022): 142–62. http://dx.doi.org/10.31957/pjdir.v2i2.2234.
Full textCox, James W., Michele Akeroyd, and Danielle P. Oliver. "Integrated water resource assessment for the Adelaide region, South Australia." Proceedings of the International Association of Hydrological Sciences 374 (October 17, 2016): 69–73. http://dx.doi.org/10.5194/piahs-374-69-2016.
Full textZheng, Chaoliang. "Web-based Financial Shared Service Platform Construction Research." Frontiers in Business, Economics and Management 10, no. 3 (August 22, 2023): 24–27. http://dx.doi.org/10.54097/fbem.v10i3.11204.
Full textClarke, Marilyn. "Building employability through graduate development programmes." Personnel Review 46, no. 4 (June 5, 2017): 792–808. http://dx.doi.org/10.1108/pr-12-2015-0321.
Full textRoffey, Paul, and Michelle Gahan. "Responses to Security Sensitive Biological Agents (SSBA) risks by the Australian Federal Police." Microbiology Australia 41, no. 3 (2020): 128. http://dx.doi.org/10.1071/ma20034.
Full textCrooks, David, James Acris, Liam Atherton, Paul Clark, Pau Cutrina, David Jordan, Shawn McKee, and Liviu Vâlsan. "Collaborative Operational Security: The future of Cybersecurity for Research and Education." EPJ Web of Conferences 295 (2024): 04013. http://dx.doi.org/10.1051/epjconf/202429504013.
Full textMason, Claire M., Melanie Ayre, and Shanae M. Burns. "Implementing Industry 4.0 in Australia: Insights from Advanced Australian Manufacturers." Journal of Open Innovation: Technology, Market, and Complexity 8, no. 1 (March 15, 2022): 53. http://dx.doi.org/10.3390/joitmc8010053.
Full textGlennie, Miriam, Michael O’Donnell, John Benson, and Michelle Brown. "Work as a government ‘scientist’: Professional status security during organisational change and downsizing." Journal of Sociology 55, no. 2 (June 18, 2018): 252–69. http://dx.doi.org/10.1177/1440783318781271.
Full textDrach, Iryna, Olha Petroye, Oleksandra Borodiyenko, Iryna Reheilo, Oleksandr Bazeliuk, Nataliia Bazeliuk, and Olena Slobodianiuk. "The Use of Artificial Intelligence in Higher Education." International Scientific Journal of Universities and Leadership, no. 15 (July 7, 2023): 66–82. http://dx.doi.org/10.31874/2520-6702-2023-15-66-82.
Full textTrystan, A., D. Zhukov, and A. Bеrеzhnyi. "MODELS OF THE SYSTEM OF COLLECTIVE SELF-ORGANISATION OF UNMANNED AERIAL VEHICLES USING ARTIFICIAL INTELLIGENCE." Системи управління, навігації та зв’язку. Збірник наукових праць 2, no. 76 (April 30, 2024): 47–52. http://dx.doi.org/10.26906/sunz.2024.2.047.
Full textFerguson, Megan, Emma Tonkin, Julie Brimblecombe, Amanda Lee, Bronwyn Fredericks, Katherine Cullerton, Catherine L. Mah, et al. "Communities Setting the Direction for Their Right to Nutritious, Affordable Food: Co-Design of the Remote Food Security Project in Australian Indigenous Communities." International Journal of Environmental Research and Public Health 20, no. 4 (February 8, 2023): 2936. http://dx.doi.org/10.3390/ijerph20042936.
Full textBonilla, Diego Navarro. "Information Management professionals working for intelligence organizations: ethics and deontology implications." Security and Human Rights 24, no. 3-4 (April 30, 2014): 264–79. http://dx.doi.org/10.1163/18750230-02404005.
Full textSarre, Rick, and Alikki Vernon. "Access to Safe Justice in Australian Courts: Some Reflections upon Intelligence, Design and Process." International Journal for Crime, Justice and Social Democracy 2, no. 2 (September 11, 2013): 133–47. http://dx.doi.org/10.5204/ijcjsd.v2i2.116.
Full textDaneshgar, Farhad, and Jim Wang. "Validation of the awareness net model for the Australian security investment processes." Knowledge-Based Systems 20, no. 8 (December 2007): 736–44. http://dx.doi.org/10.1016/j.knosys.2006.10.005.
Full textSharif, Mohd Hisham Mohd, Indrit Troshani, and Robyn Davidson. "Determinants of Social Media Impact in Local Government." Journal of Organizational and End User Computing 28, no. 3 (July 2016): 82–103. http://dx.doi.org/10.4018/joeuc.2016070106.
Full textStewart, Jonathon, Juan Lu, Nestor Gahungu, Adrian Goudie, P. Gerry Fegan, Mohammed Bennamoun, Peter Sprivulis, and Girish Dwivedi. "Western Australian medical students’ attitudes towards artificial intelligence in healthcare." PLOS ONE 18, no. 8 (August 31, 2023): e0290642. http://dx.doi.org/10.1371/journal.pone.0290642.
Full textBelfanti, Charmaine. "Emotional capacity in the public sector – an Australian review." International Journal of Public Sector Management 30, no. 5 (July 10, 2017): 429–46. http://dx.doi.org/10.1108/ijpsm-10-2016-0182.
Full textVelicof, Mihai. "The Importance of Intelligence in Biosecurity and Bioterrorism." International conference KNOWLEDGE-BASED ORGANIZATION 26, no. 1 (June 1, 2020): 163–66. http://dx.doi.org/10.2478/kbo-2020-0025.
Full textAli, Hisham, Jawad Ahmad, Zakwan Jaroucheh, Pavlos Papadopoulos, Nikolaos Pitropakis, Owen Lo, Will Abramson, and William J. Buchanan. "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform." Entropy 24, no. 10 (September 28, 2022): 1379. http://dx.doi.org/10.3390/e24101379.
Full textBADEA, Dorel, and Diana Elena RANF. "The Impact of Technological Development on Managerial Resilience in the Military Organisation." Romanian Military Thinking 2021, no. 4 (November 2021): 260–71. http://dx.doi.org/10.55535/rmt.2021.4.15.
Full textHunter, Benjamin, Sumeet Hindocha, and Richard W. Lee. "The Role of Artificial Intelligence in Early Cancer Diagnosis." Cancers 14, no. 6 (March 16, 2022): 1524. http://dx.doi.org/10.3390/cancers14061524.
Full text