Literatura científica selecionada sobre o tema "Australian Security and Intelligence Organisation"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Australian Security and Intelligence Organisation".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Australian Security and Intelligence Organisation"

1

Lee, H. P. "The Australian Security Intelligence Organisation—New Mechanisms for Accountability". International and Comparative Law Quarterly 38, n.º 4 (outubro de 1989): 890–905. http://dx.doi.org/10.1093/iclqaj/38.4.890.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Ireland-Piper, Danielle, e Jonathan Crowe. "Whistleblowing, National Security and the Constitutional Freedom of Political Communication". Federal Law Review 46, n.º 3 (setembro de 2018): 341–65. http://dx.doi.org/10.1177/0067205x1804600301.

Texto completo da fonte
Resumo:
Whistleblowers promote the values of responsible government and the rule of law by drawing attention to criminal or other forms of wrongdoing in publicly accountable organisations. This article explores the relationship between whistleblowing, national security and the implied freedom of political communication under the Australian Constitution. Legislation such as the Crimes Act 1914 (Cth) (‘ Crimes Act’), the Australian Security Intelligence Organisation Act 1979 (Cth) (‘ ASIO Act’) and the Australian Border Force Act 2015 (Cth) (‘ Border Force Act’) makes it an offence to reveal certain types of information obtained as a Commonwealth officer. The Public Interest Disclosure Act 2013 (Cth) (‘ PIDA’) offers limited protection to whistleblowers in the Commonwealth public sector, but this protection does not extend to information relating to intelligence operations. We argue that blanket criminalisation of unauthorised disclosure by Commonwealth officers or contractors under s 70 of the Crimes Act, along with similar prohibitions in s 35P of the ASIO Act and s 42 of the Border Force Act, offend the implied freedom of political communication by failing to strike an adequate balance between national security and organisational secrecy, on the one hand, and public debate and discussion, on the other. The courts should read down these laws to protect disclosures that hold significant public interest for discussion and debate over government policy or the performance of government officials.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

McKnight, David. "Australian Film and the Cultural Cold War". Media International Australia 111, n.º 1 (maio de 2004): 118–30. http://dx.doi.org/10.1177/1329878x0411100112.

Texto completo da fonte
Resumo:
This article examines whether, and in what way, anti-communism was a factor in the slow development of an Australian film industry in the 1950s and early 1960s and in the kind of film culture developed in Australia, particularly through film festivals. In particular it examines the activities of the Australian Security Intelligence Organisation (ASIO) towards left and liberal filmmakers and film lovers. It briefly examines the effect of anti-communism on the struggle for Australian content by Actors' Equity in the early years of television.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

McCulloch, Jude, e Joo-Cheong Tham. "Secret State, Transparent Subject: The Australian Security Intelligence Organisation in the Age of Terror". Australian & New Zealand Journal of Criminology 38, n.º 3 (dezembro de 2005): 400–415. http://dx.doi.org/10.1375/acri.38.3.400.

Texto completo da fonte
Resumo:
This article describes the secrecy provisions embodied in the Australian Security Intelligence Organisation Legislation Amendment Act 2003 (Cwlth). The article explains how these provisions curb freedom of speech and remove ASIO's activities from the domain of public scrutiny. It argues that by effectively criminalising open discussion of ASIO's activities the provisions insulate much of the domestic ‘war on terror’ from the public gaze. It also argues that the provisions implicitly sanction lawlessness by ASIO in open breach of the rule of law. By undermining free speech and the rule of law, this legislation increases the risk of torture of persons detained by ASIO. The legislation also exacerbates the punitiveness of such detention. Moreover, the secrecy offences will distort Australian politics by enabling the government to control and manipulate ‘security’ information. The article concludes that the increase in state secrecy and its impact are part of a continuing shift in the relative distribution of power between state and subject in liberal democracies; a shift that signals a move to more repressive or authoritarian forms of rule.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

McGarrity, Nicola, e Keiran Hardy. "Digital surveillance and access to encrypted communications in Australia". Common Law World Review 49, n.º 3-4 (26 de fevereiro de 2020): 160–81. http://dx.doi.org/10.1177/1473779520902478.

Texto completo da fonte
Resumo:
Australia’s counterterrorism laws have significantly expanded the powers of its law enforcement and intelligence agencies with regard to digital surveillance. In this article, we explain and evaluate Australia’s counterterrorism laws with respect to intercepting telecommunications, other forms of digital surveillance and access to encrypted communications. We focus on the statutory powers held by federal law enforcement agencies and the Australian Security Intelligence Organisation (ASIO), Australia’s domestic security intelligence agency. These powers confirm several important trends. They have further blurred the lines between intelligence and evidence and they have granted law enforcement and ASIO extraordinary powers to modify consumer technologies. They also create significant potential for conflict of laws across national boundaries. Significant strengthening of existing accountability mechanisms is needed to ensure public transparency and reduce opportunities for misuse.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Head, Michael. "ASIO’s ‘official history’: More unanswered questions". Alternative Law Journal 42, n.º 4 (27 de novembro de 2017): 304–9. http://dx.doi.org/10.1177/1037969x17732710.

Texto completo da fonte
Resumo:
The Secret Cold War, Volume 3 of the official history of the Australian Security Intelligence Organisation (ASIO), leaves many unanswered questions, particularly about the 1978 Sydney Hilton Hotel bombing and the ongoing lawlessness of ASIO’s activities. These questions undermine the central claim of Volume 3, that ASIO has become a reformed and accountable agency, shedding the notorious record of politically motivated surveillance, victimisation, harassment and ‘dirty tricks’ that the agency acquired in its first quarter century.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia". Australian Journal of Telecommunications and the Digital Economy 6, n.º 4 (31 de dezembro de 2018): 109–40. http://dx.doi.org/10.18080/ajtde.v6n4.167.

Texto completo da fonte
Resumo:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more precise location estimates, in the legal and policy context of the exceptions and privacy safeguards introduced after 2015; the discretionary powers of the agencies to use personal and sensitive information to identify inquiries and investigations to pursue, to enforce the law and perform their functions, and to carry out activities related to their functions and purposes; and the flexible oversight principles contained in the guidelines that create conflicts between law enforcement and privacy interests. The review proposes future multidisciplinary research.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia". Journal of Telecommunications and the Digital Economy 6, n.º 4 (31 de dezembro de 2018): 109–40. http://dx.doi.org/10.18080/jtde.v6n4.167.

Texto completo da fonte
Resumo:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more precise location estimates, in the legal and policy context of the exceptions and privacy safeguards introduced after 2015; the discretionary powers of the agencies to use personal and sensitive information to identify inquiries and investigations to pursue, to enforce the law and perform their functions, and to carry out activities related to their functions and purposes; and the flexible oversight principles contained in the guidelines that create conflicts between law enforcement and privacy interests. The review proposes future multidisciplinary research.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Williams, George. "The Legal Assault on Australian Democracy". QUT Law Review 16, n.º 2 (17 de junho de 2016): 19. http://dx.doi.org/10.5204/qutlr.v16i2.651.

Texto completo da fonte
Resumo:
<p><em>Recent years have seen fierce public debate on whether Australia’s parliaments are passing laws that undermine fundamental democratic values, such as freedom of speech and freedom of association. Such debate has tended to focus on a few contentious laws, including s 18C of the Racial Discrimination Act 1975 (Cth), s 35P of the Australian Security Intelligence Organisation Act 1979 (Cth) and Queensland’s anti-bikie legislation. This article conducts a survey of the federal, state and territory statute books in order to determine whether such examples are isolated, or indicative of a broader trend. It identifies 350 instances of laws that arguably encroach upon rights and freedoms essential to the maintenance of a healthy democracy. Most of these laws have entered onto the statute book since September 2001. The article finds that the terrorist attacks of that month marked a watershed moment in the making of Australian laws, and that since that time parliamentarians have been less willing to exercise self-restraint by not passing laws that undermine Australia’s democratic system.</em></p>
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

McKnight, David. "‘Not Attributable to Official Sources’: Counter-Propaganda and the Mass Media". Media International Australia 128, n.º 1 (agosto de 2008): 5–17. http://dx.doi.org/10.1177/1329878x0812800103.

Texto completo da fonte
Resumo:
During the Cold War in Australia, the political agenda was dominated by the threat of communism. One factor in building this agenda was the ‘counter-propaganda operations’ of the Australian Security Intelligence Organisation (ASIO) which regularly released unattributable information to selected mass media outlets. In the period when these activities were most prevalent (1960–72), ASIO officers had regular contact with editors and with selected journalists on major newspapers and television. This formed part of a broader ‘cultural Cold War’ in which anti-communism was an organising principle. This article outlines new information on these activities, suggests that these operations were more extensive than previously thought, and discusses this relationship in terms of the scholarly work on media sources, government-sponsored intervention in the media and classical theories of propaganda. It suggests that one way to understand the controversial media role in counter-propaganda operations lies in the relationship between police and crime reporters.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Australian Security and Intelligence Organisation"

1

Thomson, James William Hugh. "Prolegomenon to a political economy of intelligence and security : can microeconomic analysis explain success or failure in intelligence cooperation?" Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/11668.

Texto completo da fonte
Resumo:
The governmental functions of security and intelligence require a number of distinct organisations and functions to interact in a symbiotic way. Because the external environment is uncertain and complex, these organisations must constantly negotiate with each other to establish which of them addresses which issue, and with what resources. Coasian principles suggest that if there are no transacting costs and property rights are clear, then such negotiations should lead to an overall maximisation of the benefits gained (in this case better security and intelligence provision), yet this is rarely realised. By coupling the transaction cost theory devised by Oliver Williamson in 1975 with a range of alternate theoretical perspectives that impact on these areas of governance, an institutional costs approach is developed. By increasing the resolution of the analysis whilst still retaining a comprehensive overview, the frictions that hinder negotiated cooperation become apparent. The two cases of counterterrorism and defence intelligence in both the United Kingdom and the United States are then used to test and refine the institutional costs paradigm that results. These demonstrate that orthodox views of good cooperation in the former and poor cooperation in the latter are overly simplistic, as neither is necessarily more disposed to behave cooperatively than the other; rather, the institutional costs environment that their respective organisational architectures create incentivises different cooperative behaviour in different circumstances. The analysis also shows that the impact of the various factors that make up the institutional costs paradigm is in fact far more nuanced in these areas than is evident in earlier transaction costs scholarship. Their relevance differs by type as well as degree. Institutional costs analysis therefore provides the beginnings of a political economy for cooperative working in the intelligence and security spheres of governance.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Marlowe, Kirk S. "The homeland security enterprise where do we fit?" Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMarlowe.pdf.

Texto completo da fonte
Resumo:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Bellavita, Christopher. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Homeland security, collaborative capacity, federalism, grants, homeland security stakeholders, Australian Security Intelligence Organization (AISO), domestic intelligence agency, information sharing, Virginia State Police. Includes bibliographical references (p. 101-110). Also available in print.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Smith, Andrew Humanities &amp Social Sciences Australian Defence Force Academy UNSW. "The factors influencing the employment of the Australian Defence Organisation in homeland security roles since 11 September 2001". Awarded by:University of New South Wales - Australian Defence Force Academy. School of Humanities and Social Sciences, 2007. http://handle.unsw.edu.au/1959.4/38735.

Texto completo da fonte
Resumo:
This thesis makes an assessment of the factors influencing the involvement of the Australian Defence Organisation (ADO) in homeland security roles since 11 September 2001 (9/11). This is approached on a largely empirical basis, using document analysis and case studies supported with interviews with key individuals and experts. The thesis commences with an Introduction that provides brief context for the thesis and specifies its central question as ???what factors have shaped the role of the ADO in Australia's response to the homeland security environment that has emerged since 11 September 2001.??? Chapter One provides an historical and theoretical context for the key concepts of homeland security and the challenges confronting Western governments in the homeland security arena. Chapter Two explores the implications of those challenges for Australia, before outlining the research method and providing a literature review. Chapter Three is an historical exposition of homeland security in Australia from British settlement in 1788 until 2001. The Chapter examines events in increasing detail in the 30 years immediately prior to 2001, including a detailed case study of ADO support to the Sydney 2000 Olympic and Paralympic Games, before drawing some broad conclusions on the Australian experience of the involvement of its Defence Organisation in homeland security pre-9/11. Chapter Four establishes the pre-9/11 status quo in relation to the ADO???s involvement in homeland security role before analysing the general pattern of those roles. Chapter Five analyses and draws conclusions about the reasons for the ADO???s pre-9/11 involvement in homeland security roles, introducing an hypothetical construct to explain causal factors. Chapter Six examines the ADO???s involvement in homeland security roles post-9/11, including cases studies of ADO support to the conduct of the 2002 Commonwealth Heads of Government Meeting and the Melbourne 2006 Commonwealth Games. Chapter Seven analyses and identifies the factors led to the ADO???s pattern of involvement in homeland security post-9/11, further developing the hypothetical construct introduced in Chapter 5. Chapter Seven also contains supporting case studies on the ADO???s contribution to Australia???s national chemical, biological, radiological and nuclear response capability and on the state of New South Wales??? homeland security capabilities. Chapter Eight draws overall conclusions, including recommendations for Australian policy development and areas for further research. The essential conclusion reached is that the ADO???s involvement in homeland security roles, both before and since 9/11, has been shaped mostly by pragmatic political and managerial considerations of governments. Developments have normally occurred in an episodic and incremental fashion in response to ???trigger events,??? although 9/11 altered this pattern somewhat by acting as a ???threshold??? event that re-calibrated demands and expectations for ADO involvement. Supporting Appendices provide detail on the Australian Government???s strategic guidance on ADO involvement in homeland security since 1973; on Australia???s policy for Defence Assistance to the Civilian Community and Defence Force Aid to the Civil Authorities; and on the involvement of former Department of Defence employees in non-Defence homeland-security related roles. A Bibliography provides details of sources used.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

WHITMORE, Margaret, e whittys2002@yahoo com au. "The search for character: servant-leadership in an Australian organisation". Edith Cowan University. Business And Public Management: School Of Business And Law, 2004. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0003.html.

Texto completo da fonte
Resumo:
This study is in response to globalisation, changing world values and the call in modern literature for leaders of good character. Servant-leadership is offered to fill this requirement because its effectiveness is said to be reliant on the good character of the leader. In the literature this type of leadership is said to represent a new paradigm. The work of servant-leadership's proponent, Robert Greenleaf, is thoroughly examined to explain how his understanding of trust as faith is linked to spirituality and this is the key to understanding the character of servant-leaders. Greenleaf's work is compared with the modern servant-leadership literature and identifies a gap in the literature explaining Greenleaf's spirituality.This is a qualitative analysis using classical Grounded Theory and uses the work of Anthony Giddens to give it a modern sociological grounding. Classical Grounded Theory uses typologies or
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Whitmore, Margaret R. "The search for character: Servant-leadership in an Australian organisation". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/113.

Texto completo da fonte
Resumo:
This study is in response to globalisation, changing world values and the call in modern literature for leaders of good character. Servant-leadership is offered to fill this requirement because its effectiveness is said to be reliant on the good character of the leader. In the literature this type of leadership is said to represent a new paradigm. The work of servant-leadership’s proponent, Robert Greenleaf, is thoroughly examined to explain how his understanding of trust as faith is linked to spirituality and this is the key to understanding the character of servant-leaders. Greenleaf’s work is compared with the modern servant-leadership literature and identifies a gap in the literature explaining Greenleaf’s spirituality. This is a qualitative analysis using classical Grounded Theory and uses the work of Anthony Giddens to give it a modern sociological grounding. Classical Grounded Theory uses typologies or “created groups” to give meaning to the way in which participants view their circumstance. The application of Giddens’ work allows for the data analysis to incorporate the historical social context that has shaped the views of the participants. Greenleaf and Giddens share the same understanding of trust and this alignment of Giddens and Greenleaf permeates the work. Giddens identifies two types of trust, which this research has termed Reciprocal Trust, and Trust as Principle. The research gives an explanation of the two types of trust and argues that understanding Trust as Principle is the key to understanding new paradigm thought. It is also the key to understanding character in terms of servant-leadership character. The research for this thesis was carried out in an organisation that until recently had been a government entity and for the purpose of this research is given the fictitious name of Railcorp. The historical circumstances of Railcorp have led to major dysfunctions, which are inhibiting the business progress of the company. There is a crisis of culture and a crisis in leadership. There is evidence of servant-leadership existing in Railcorp and these leaders have a vital role in providing the new leadership required to take Railcorp forward.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

O’Rourke, Simon. "An intelligence model for terrorist incident prevention for Australian police: A systemic investigation". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2010. https://ro.ecu.edu.au/theses/379.

Texto completo da fonte
Resumo:
This study examines the role that intelligence will continue to play in the ongoing efforts to mitigate the effects of contemporary terrorism. The role of domestic policing agencies is expanding to meet the challenge of transnational organised crime and also the threat to community safety and cohesion that terrorism entails. The September 11 attacks on the twin towers in New York city showcased the darkest elements of humanity whilst the courage personified by the police, firefighters and paramedics who entered the buildings to save others illuminated al that is best, in an event that was broadcast globally into the homes of millions around the world through television via television and the Internet. Whilst shielded to some degree by distance, Australians were hit even harder by the bombings in Bali on the 12th October 2002, during which 88 Australians died and many more were injured. For many Bali was seen as a place to relax, an idyllic paradise whose peace was forever shattered with the detonation of the terrorist bombs. The traditional intelligence community needed to draw upon the existing capabilities of policing agencies to build partnerships with key community groups in an endeavour to prevent such an atrocity from happening in Australia. No longer was an advanced technical intelligence capability and the access to material obtained enough to guarantee security, material needed to be shared with the police in order to prevent an incident, thus creating the potential for national security classified material to be disclosed in subsequent court proceedings. Culture and practices underwent a paradigm shift and the police now have a role in the national intelligence community in Australia, something that continues to present significant challenges requiring new legislation to keep pace with technology and the dynamically evolving threat. Drawing upon Checkland’s (1999, p.178) Soft Systems Methodology (SSM) this research synthesised text based analytical software called Leximancer, to create a conceptual model with minimal inherent biases. It is believed that this is the first time that such an approach to SSM has been undertaken allowing the research to contribute towards the methodological field as well as the chosen study. Access to interview practitioners was granted and the results provided unique insight into the contemporary and future challenges of police counterterrorist intelligence.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Smith, Erin. "Structuring for serendipity: family wealth creation, farmer autonomy and the pursuit of security in an uncertain Australian countryside". Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13363.

Texto completo da fonte
Resumo:
The social and economic particularities of family farms have captured researchers’ attention for many years; but rural scholarship still lacks a clear, analytical sense of how and why family farms are organised in the ways that they are. This thesis critically examines the internal logics underpinning the socio-economic organisation of Australian farms. It adopts Johnsen’s (2003) conceptualisation of farm enterprises as three-way coalitions between farm businesses, farm households and the respective property holdings. Changes to the Australian agricultural property regime are used as the lens through which to observe how the organisational logics of farm enterprises are recalibrated in response to environmental policy reforms; specifically, the separation of land and water titles. Despite the obvious economic significance of separating land and water titles, the impacts on farm organisation remain under-researched. Hence, this thesis uniquely brings together scholarship on family farming with that of water reforms. A qualitative research method – farm life history – is used to generate narratives of the development of 40 farms in Victoria, Australia. Twenty-one of these are from an irrigation district where land and water titles have been separated, and nineteen from a dry land region unaffected by the reforms. The interpretive chapters comprise an analysis of the ways in which the ownership configurations of farm businesses, land and water assets embody farmers’ aspirations for building wealth and maintaining autonomy. These aspirations are jointly articulated in the concept of ‘structuring for serendipity’, which elevates the notions of risk, uncertainty and security as critical drivers shaping farm-level responses to contemporary conditions. The thesis concludes that the organisational forms observed within the Australian agricultural sector ultimately represent farmers’ pursuit of a sense of security in a constantly changing and uncertain countryside.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Scott, Rob. "Forging an unusual intelligence partnership : Operation Rusty and the rise of the CIA: how did the newly created CIA get involved with former Nazi military and security staff of the Hitler regime? How and why did the CIA agree to take over control of the Gehlen Organisation from the US Army Intelligence Division?/ Rob Scott". Title page, table of contents and introduction only, 2005. http://web4.library.adelaide.edu.au/theses/09AR/09ars4251.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Hagberg, Mathias. "Sjukvårdsorganisationen vid svenska marina missioner". Thesis, Swedish National Defence College, Swedish National Defence College, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-29.

Texto completo da fonte
Resumo:

Försvarsmaktsorganisationen har varit i förändring sedan försvarsbeslutet 2004, då Försvarsmakten gick från ett invasionsförsvars till ett rörligt insatsförsvar. Denna nya inriktning innebär att de svenska enheter skall kunna genomföra uppdrag långt ifrån den svenska kusten och infrastruktur, vilket kan medföra en del nya intressanta frågeställningar.

Ett exempel på en sådan frågeställning är om de svenska enheterna är lämpliga för sådana uppdrag då det gäller att ta hand om och transportera eventuella skadade ombord. Har sjukvårdsorganisationen och Försvarsmakten medel till att transportera och ge adekvat vård vid större krissituationer internationellt?

Uppsatsen syfte är att genom ett organisationsteoretiskt perspektiv undersöka hur Försvarsmaktens förmåga att ta hand om skadade vid internationella missioner ser ut, samt vilka brister i organisationen som kan påvisas.

Den metod som har använts är den deskriptiva metoden tillsammans med fallstudier. Det som har studerats är svenska reglementen, doktriner samt den utländska Nato doktrinen AJP 4-10. Fallstudierna har utgjorts av ML 01-02 samt ME 01. Maslows teori om säkerhetsbehov har hela tiden verkat som utgångspunkt vid presenterande av fakta samt assisterande för att besvara frågeställningarna.

Slutsatsen som har dragits är att svenska enheter inte är direkt anpassade för denna verksamhet. Avsaknaden av egen helikopter är en av orsakerna. En bristande organisation kan ge en försämrad stridsmoral, vilket kan resultera i förödande konsekvenser för hela fartyget.


The Swedish armed forces have been through a big reformation since the Parliamentary Resolution 2004. The Resolutions biggest statement was that the armed forces should change from a invasiondefence to a mobile armed force. This means that Swedish troops and ships are meant to operate far from the Swedish coast line and infrastructure; this can give many new interesting problems.

One of these problems is if the Swedish units are fit for the missions that they now are entitled to take part in. I particularly if they have the capability to take care of injured personal far from Swedish infrastructure.

Have the medical organisation and the armed forces the right means to give adequate medical treatment and transportation?

The methods that the writer has used to solve these questions have been the descriptive method combined whit fall studies on ML 01-02 and ME 01. The literature consists part of reglements, doctrines both Swedish and domestic, in particular the Nato doctrine AJP 4-10

The conclusions that have been made are that the Swedish ships are not adjusted for this kind of missions, the abcens of the helicopter capability is one of the arguments for this. The effect of what this can mean for the soldier is a decreased will to fight, which can be drastic for the ship.

Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Richter, Andreas. "Cyberepidemiologi : Hur kan utbrottsdetektion inom folkhälsa hjälpa IT-incidentsövervakning?" Thesis, Försvarshögskolan, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8375.

Texto completo da fonte
Resumo:
This study aims to shed light on what a comparison between cybersecurity intelligence and public health surveillance systems can yield in practical improvements. The issue at hand is best described by the amount of threats both systems must detect. Intelligent malicious software, malware, designed by humans to spread and reap havoc in the abundance of unprotected networks worldwide and contagious diseases with millions of years of evolution behind their design to bypass human defences, infect and multiply. These two threats stand as mighty competitors to actors who try to monitor their presence to be able to give advice on further action to hinder their spread. The sheer amount of experience in public health of dealing with surveillance of contagious disease can contribute with important lessons to cyber intelligence when malware is becoming an even more alarming threat against everybody who uses the Internet. To compare them both this study uses high reliability theory to understand how Folkhälsomyndigheten, Sweden’s main authority in public health surveillance, and CERT-SE, Sweden’s national computer emergency response team, operate to make their surveillance as reliable as possible to detect emerging threats. Some key findings of the study points to the lack of regional or global binding policy’s to share information in the cyber security sector of which CERT-SE takes part in. The major roll of trust-based information sharing can be subject to shifts in relationships between states and excludes states with which no bilateral arrangements are made, but who may possess information of urgent necessity. The lack of arrangements in the cybersecurity sector, correspondent to the International health regulations by World Health Organization in public health, stands as a major difference between the two sectors access to information. However, this study may not stretch as far as to prove that the greater access to information would have proved to be of ease in a specific cyberincident. Case studies of this kind or further research of how agreements can be made in an anarchistic domain like the Internet are to be continued from this study.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Australian Security and Intelligence Organisation"

1

Blesing, Meena. Was your dad a Russian spy?: The personal story of the Combe/Ivanov affair by David Combe's wife. South Melbourne, Australia: Sun Books, 1986.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

1954-, Bergin Anthony, Hall Robert A. 1947- e Australian Defence Studies Centre, eds. Intelligence: And Australian national security. Canberra, A.C.T: Australian Defence Studies Centre, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Marsden, Hope Robert, ed. Report on the Australian Security Intelligence Organization, December 1984. Canberra: Aust. Govt. Publ. Service, 1985.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Flood, Philip. Report of the inquiry into Australian intelligence agencies. Canberra: Dept. of the Prime Minister and Cabinet, 2004.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Cain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. North Melbourne, Vic: Australian Scholarly Pub., 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Tubbs, Michael. ASIO: The enemy within. Croyden Park, NSW: M. Tubbs, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Gobert, Wayne. The origins of Australian diplomatic intelligence in Asia, 1933-1941. Canberra, Australia: Strategic and Defence Studies Centre, Research School of Pacific Studies, Australian National University, 1992.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Cain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. North Melbourne, Vic: Australian Scholarly Pub., 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Sasson, Molly J. More cloak than dagger: One woman's career in secret intelligence. Ballarat, Vic: Connor Court Publishing, 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Wesley, Michael. Between probity and proficiency: Challenge and change within the Australian intelligence community = Probité et compétence : défis et changements au sein de l'appareil australien du renseignement. Ottawa, Ont: Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Australian Security and Intelligence Organisation"

1

Offner, K. L., E. Sitnikova, K. Joiner e C. R. MacIntyre. "Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation". In Health Security Intelligence, 92–121. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003245483-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Jones, David Martin. "Intelligence and National Security: Australian Dilemmas Post-9/11". In National Security, Surveillance and Terror, 273–96. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43243-4_12.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Palmer, Darren, e Ian Warren. "The ‘Security of Security’: Making Up the Australian Intelligence Community 1975–2015". In National Security, Surveillance and Terror, 177–98. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43243-4_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Susanto, Heru, e Alifya Kayla Shafa Susanto. "Strengthening artificial intelligence implementation of security business management in time of digital economy innovation". In Digitalisation and Organisation Design, 205–25. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003163824-15.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Walsh, Patrick F. "Australian National Security Intelligence Collection Since 9/11: Policy and Legislative Challenges". In National Security, Surveillance and Terror, 51–74. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43243-4_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Layton, Peter. "Evolution Not Revolution: Defence AI in Australia". In Contributions to Security and Defence Studies, 581–603. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58649-1_26.

Texto completo da fonte
Resumo:
AbstractMiddle power Australia has an active defence Artificial Intelligence (AI) program underway with a well-defined innovation pathway and numerous experimentation projects. The Australian Defence Force sees AI mainly being used in human–machine teams to improve efficiency, increase combat power, achieve decision superiority, and lower risks to combat personnel. The major equipment acquisition plan for the next two decades sets out six AI-relevant projects: one navy, one army, three air force and one in the information and cyber domain. Associated with this investment is a high expectation that Australian AI companies will have considerable involvement in the projects. The Australian defence AI sector, though, consists mainly of small and medium-sized companies that may need to partner with large prime contractors to achieve the requisite industrial heft. There are also wider national concerns about whether Australia will have a large enough AI workforce over the next decade to handle both commercial and defence demands. Accordingly, Australia is involved with collaborative AI developments with the United States including the “loyal wingman” fast jet drone, autonomous submarines and surface vessels, and robot land vehicles. Current defence AI plans will most likely lead to evolutionary improvements not revolutionary changes. AI is envisaged as being used to either enhance, augment, or replace existing capability. This approach means the future ADF will do things better, but it won’t necessarily be able to do better things.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

"Payne-Scott, Communist Party of Australia, Commonwealth Investigation Service and Australian Security Intelligence Organisation". In Astrophysics and Space Science Library, 237–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03141-0_13.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Lomas, Daniel W. B. "Empire, Commonwealth and security". In Intelligence, Security and the Attlee Governments, 1945-51. Manchester University Press, 2017. http://dx.doi.org/10.7228/manchester/9780719099144.003.0008.

Texto completo da fonte
Resumo:
Chapter Seven explores Government attempts to combat Communist influence in and around Britain’s overseas territories and dependencies and the development of security agencies across the Commonwealth. The Attlee era also saw the development of internal security agencies around the Commonwealth modelled on British lines, resulting from Soviet espionage and American fears that Britain’s allies were far from secure. Responding to American threats to cut-off secret information to Australia, the British government responded by assisting in the development of a new internal security agency, the Security Intelligence Organisation (ASIO). The chapter looks at the role played by Attlee and others in Commonwealth security liaison and the role of the Commonwealth Security Conferences of 1948 and 1951, highlighting the political dimension of intelligence and security liaison. Using the recently declassified files of the Colonial Information Policy Committee, the chapter assesses British attempts to direct overseas anti-Communist publicity. Chaired by the Parliamentary Under-Secretary for Commonwealth Relations, Patrick Gordon Walker, the committee was formed in the autumn of 1948. The chapter explores the role of the Committee and IRD in combatting Communism in Britain’s African colonies.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

"Embargoes, Espionage and ASIO". In The Australian Security Intelligence Organization, 49–74. Routledge, 2012. http://dx.doi.org/10.4324/9780203043752-10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

"The Acceptance of ASIO in the USA". In The Australian Security Intelligence Organization, 75–97. Routledge, 2012. http://dx.doi.org/10.4324/9780203043752-11.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Australian Security and Intelligence Organisation"

1

Duan, Xiaoxia, Hepu Deng e Brian Corbit. "The Impacts of Government Policies on the Efficiency of Australian Universities: A Multi-Period Data Envelopment Analysis". In 2008 International Conference on Computational Intelligence and Security (CIS). IEEE, 2008. http://dx.doi.org/10.1109/cis.2008.213.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Grandhi, Lakshmi Sujatha, Srimannarayana Grandhi e Santoso Wibowo. "A Security-UTAUT Framework for Evaluating Key Security Determinants in Smart City Adoption by the Australian City Councils". In 2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter). IEEE, 2021. http://dx.doi.org/10.1109/snpdwinter52325.2021.00013.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Almer, Alexander, Anna Weber, Florian Haid, Julia Tschuden, Lucas Paletta, Michael Schneeberger, Dietmar Wallner et al. "Physiological and cognitive real-time stress analysis as a basis for optimised human-machine teaming and safe decision processes for military forces". In 5th International Conference on Human Systems Engineering and Design: Future Trends and Applications (IHSED 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1004151.

Texto completo da fonte
Resumo:
Introduction In recent decades, the development of autonomous cyber-physical systems for a wide range of tasks has been the focus of research activities for military organisations. Modern security forces can be seen as socio-technical systems. Only an integrated approach, in which people, organisation and technology are viewed as interlocking elements, enables the optimisation of the overall system. Soldiers are still at the center of deployed sociotechnical systems despite major innovations in the field of autonomous systems and artificial intelligence (Swiss, 2020). An efficient and coordinated interaction in a task force and an optimised human-machine teaming are essential prerequisites for a successful operation and thus also for increasing the safety of the soldiers in critical operational situations. This requires, on the one hand, optimal HMI development, but also, on the other hand, information about the mental and physical state of the soldier to provide improved decision processes and operational performance. Information on a common operational picture and the status of the technical systems used is usually available, but not the psychophysical situation of the soldier. Therefore extensive development projects have been launched for solutions of psycho-physiological monitoring, with new possibilities arising from innovative developments in the field of bio-sensor technology. The aim is to optimise human performance in the field and the interaction between man and machine with highly sophisticated mission equipment. An important success factor in complex operations is the quality of the necessary decisions (decision intelligence) in time-critical security situations, whereby the current psychophysical stress state of the person is a decisive factor. Therefore, an ongoing challenge for the military task forces is managing personnel to optimise and sustain performance, improve security while also ensuring health and wellbeing. In the course of intensive training and exercises as well as in real operational scenarios, soldiers often suffer physiological and psychological borderline stresses and injuries during physical and combat-related training. In this context efficient solutions for the physiological monitoring of soldiers based on the integration of innovative biosensor technology and specific load models considering load characteristics of different military forces will enable a targeted support.Motivation and Background The challenging military work tasks are often associated with a high degree of physical stress and require a high level of mental performance and concentration. Reduced concentration and reaction cause delayed or possibly even wrong decisions, which can have critical consequences. In this context a real-time system for physiological status monitoring (RT-PSM) offers new opportunities for military purpose with individual assessment of soldiers' performance limits. However, most commercially available health and performance sport systems do not meet the relevant military requirements. They typically lack validated methods and algorithms to derive essential information in real time and are not designed to be integrated into soldier's technological ecology (Friedl, 2018). Based on the specific requirements and the experience of the Austrian Armed Forces, an RT-PSM was developed as part of the VitalMonitor project and geared to the working conditions and multifactorial stress situations of CBRN defence personnel and light infantry forces. The main objectives were to analyze the individual stress in deployment scenarios and to achieve a targeted improvement in the individual performance level through personalized adaptive training concepts and thus to optimize the health and fitness of the individual soldier. The research project VitalMonitor therefore focuses on the development of a (I) real-time monitoring system, which analyses changes in physiological parameters from heart rate, heart rate variability, skin conductance, core body temperature, etc., (II) development of a stress model considering load characteristics of different military forces, (III) communication solution for a real-time data transfer, (IV) data management and interactive real-time visualization module to support decision processes for mission commanders to determine optimal work-rest-cycles preventing physical overstraining in trainings and missions and (V) an expert interface to visualize sensor data streams (low-level data) together with model-based analysis results (high-level data) in a graphical interface as a basis for model development, verification and optimization.This paper gives an overview of the main developments and results implemented and achieved within the VitalMonitor project. In the following, wearable sensors and their evaluation, the development of a specific load model, the real-time visualization modules and finally a conclusion and outlook will be presented.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia