3,272,418 research outputs found
Submission to the Attorney-General’s Department on the Exposure Draft Telecommunications and Other Legislation Amendment Bill 2015
EXECUTIVE SUMMARY
As has been stated in previous submissions to Government, the Associations acknowledge Government’s desire to protect telecommunications infrastructure and the information transmitted across it from unauthorised access and interference.
Indeed, Australian Carriers, Carriage Service Providers and Carriage Service Intermediaries (C/CSPs) and other industry participants have an active and vested interest in ensuring that the nation’s networks and communications infrastructure are robust and resistant to external attack. Industry is, however, unable to support the proposed Telecommunications Sector Security Reform (TSSR), as described in the exposure draft legislation, for reasons including that it constitutes regulatory ‘over-reach’ in the form of a framework that:
will face challenges protecting communications networks, i.e. it will not deliver the increased protection the proposed reforms are aiming to achieve;
is out of step with regulatory approaches to protecting networks adopted in other countries, including the UK, USA and Canada, thereby putting Australia at a disadvantage in fighting cyber threats and undermine Industry’s ability to support these important peers;
hands unjustifiably significant additional and intrusive powers to Government and places regulatory burdens on Industry that will undermine its ability to protect against and respond to cyber attacks;
risks being highly disruptive to the deployment of new network technologies that are more robust in preventing cyber attacks;
will be a significant deterrent to technological investment in Australia;
imposes additional costs on Industry and (ultimately) consumers undermining Australia’s competitiveness at a time when digital innovation is an important area for growth for Australia;
fails to offer protection/indemnity to C/CSPs against the risk of civil litigation through ‘safe harbours’, thereby limiting information sharing and the ability to quickly respond to threats and to jointly engage in preventative action;
carries the risk that competition in infrastructure supply will be reduced, to the detriment of all Australians;
lacks transparency; and
fails to provide adequate consultative mechanisms and avenues of appeal
Malware detection techniques for mobile devices
Mobile devices have become very popular nowadays, due to its portability and
high performance, a mobile device became a must device for persons using
information and communication technologies. In addition to hardware rapid
evolution, mobile applications are also increasing in their complexity and
performance to cover most needs of their users. Both software and hardware
design focused on increasing performance and the working hours of a mobile
device. Different mobile operating systems are being used today with different
platforms and different market shares. Like all information systems, mobile
systems are prone to malware attacks. Due to the personality feature of mobile
devices, malware detection is very important and is a must tool in each device
to protect private data and mitigate attacks. In this paper, analysis of
different malware detection techniques used for mobile operating systems is
provides. The focus of the analysis will be on the to two competing mobile
operating systems - Android and iOS. Finally, an assessment of each technique
and a summary of its advantages and disadvantages is provided. The aim of the
work is to establish a basis for developing a mobile malware detection tool
based on user profiling.Comment: 11 pages, 6 figure
Innovation in Mobile Learning: A European Perspective
In the evolving landscape of mobile learning, European researchers have conducted significant mobile learning projects, representing a distinct perspective on mobile learning research and development. Our paper aims to explore how these projects have arisen, showing the driving forces of European innovation in mobile learning. We propose context as a central construct in mobile learning and examine theories of learning for the mobile world, based on physical, technological, conceptual, social and temporal mobility. We also examine the impacts of mobile learning research on educational practices and the implications for policy. Throughout, we identify lessons learnt from European experiences to date
- …
