3,272,418 research outputs found

    Submission to the Attorney-General’s Department on the Exposure Draft Telecommunications and Other Legislation Amendment Bill 2015

    Get PDF
    EXECUTIVE SUMMARY As has been stated in previous submissions to Government, the Associations acknowledge Government’s desire to protect telecommunications infrastructure and the information transmitted across it from unauthorised access and interference. Indeed, Australian Carriers, Carriage Service Providers and Carriage Service Intermediaries (C/CSPs) and other industry participants have an active and vested interest in ensuring that the nation’s networks and communications infrastructure are robust and resistant to external attack. Industry is, however, unable to support the proposed Telecommunications Sector Security Reform (TSSR), as described in the exposure draft legislation, for reasons including that it constitutes regulatory ‘over-reach’ in the form of a framework that: will face challenges protecting communications networks, i.e. it will not deliver the increased protection the proposed reforms are aiming to achieve; is out of step with regulatory approaches to protecting networks adopted in other countries, including the UK, USA and Canada, thereby putting Australia at a disadvantage in fighting cyber threats and undermine Industry’s ability to support these important peers; hands unjustifiably significant additional and intrusive powers to Government and places regulatory burdens on Industry that will undermine its ability to protect against and respond to cyber attacks; risks being highly disruptive to the deployment of new network technologies that are more robust in preventing cyber attacks; will be a significant deterrent to technological investment in Australia; imposes additional costs on Industry and (ultimately) consumers undermining Australia’s competitiveness at a time when digital innovation is an important area for growth for Australia; fails to offer protection/indemnity to C/CSPs against the risk of civil litigation through ‘safe harbours’, thereby limiting information sharing and the ability to quickly respond to threats and to jointly engage in preventative action; carries the risk that competition in infrastructure supply will be reduced, to the detriment of all Australians; lacks transparency; and fails to provide adequate consultative mechanisms and avenues of appeal

    Malware detection techniques for mobile devices

    Full text link
    Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most needs of their users. Both software and hardware design focused on increasing performance and the working hours of a mobile device. Different mobile operating systems are being used today with different platforms and different market shares. Like all information systems, mobile systems are prone to malware attacks. Due to the personality feature of mobile devices, malware detection is very important and is a must tool in each device to protect private data and mitigate attacks. In this paper, analysis of different malware detection techniques used for mobile operating systems is provides. The focus of the analysis will be on the to two competing mobile operating systems - Android and iOS. Finally, an assessment of each technique and a summary of its advantages and disadvantages is provided. The aim of the work is to establish a basis for developing a mobile malware detection tool based on user profiling.Comment: 11 pages, 6 figure

    Innovation in Mobile Learning: A European Perspective

    Get PDF
    In the evolving landscape of mobile learning, European researchers have conducted significant mobile learning projects, representing a distinct perspective on mobile learning research and development. Our paper aims to explore how these projects have arisen, showing the driving forces of European innovation in mobile learning. We propose context as a central construct in mobile learning and examine theories of learning for the mobile world, based on physical, technological, conceptual, social and temporal mobility. We also examine the impacts of mobile learning research on educational practices and the implications for policy. Throughout, we identify lessons learnt from European experiences to date
    corecore