1,482 research outputs found
The Australian Charter of Employment Rights: The missing dimensions
Just prior to the 2007 General Election, a group of labour lawyers and economists, broadly sympathetic to the Labor Party, produced a Charter of Employment Rights. This article examines the Charter's proposals and its underlying framework, and suggests significant aspects of work and labour have been omitted. It contends that the Charter would have been improved if it had not retained an artificially stretched definition of workers as employees, in which the only relationship worthy of inclusion in a Charter is that between the direct employer and employee. The framework and language of the Charter convey a paternalistic approach and an outdated focus on industrial labour, while ignoring aspects of the emerging global system of work linked to the concept of occupation
Large emergency-response exercises: qualitative characteristics - a survey
Exercises, drills, or simulations are widely used, by governments, agencies and commercial organizations, to simulate serious incidents and train staff how to respond to them. International cooperation has led to increasingly large-scale exercises, often involving hundreds or even thousands of participants in many locations. The difference between âlargeâ and âsmallâ exercises is more than one of size: (a) Large exercises are more âexperientialâ and more likely to undermine any model of reality that single organizations may create; (b) they create a âplay spaceâ in which organizations and individuals act out their own needs and identifications, and a ritual with strong social implications; (c) group-analytic psychotherapy suggests that the emotions aroused in a large group may be stronger and more difficult to control. Feelings are an unacknowledged major factor in the success or failure of exercises; (d) successful large exercises help improve the nature of trust between individuals and the organizations they represent, changing it from a situational trust to a personal trust; (e) it is more difficult to learn from large exercises or to apply the lessons identified; (f) however, large exercises can help develop organizations and individuals. Exercises (and simulation in general) need to be approached from a broader multidisciplinary direction if their full potential is to be realized
Web Vulnerability Study of Online Pharmacy Sites
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumersâ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems
Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation
Owing to a growing number of attacks, the assessment of Industrial Control
Systems (ICSs) has gained in importance. An integral part of an assessment is
the creation of a detailed inventory of all connected devices, enabling
vulnerability evaluations. For this purpose, scans of networks are crucial.
Active scanning, which generates irregular traffic, is a method to get an
overview of connected and active devices. Since such additional traffic may
lead to an unexpected behavior of devices, active scanning methods should be
avoided in critical infrastructure networks. In such cases, passive network
monitoring offers an alternative, which is often used in conjunction with
complex deep-packet inspection techniques. There are very few publications on
lightweight passive scanning methodologies for industrial networks. In this
paper, we propose a lightweight passive network monitoring technique using an
efficient Media Access Control (MAC) address-based identification of industrial
devices. Based on an incomplete set of known MAC address to device
associations, the presented method can guess correct device and vendor
information. Proving the feasibility of the method, an implementation is also
introduced and evaluated regarding its efficiency. The feasibility of
predicting a specific device/vendor combination is demonstrated by having
similar devices in the database. In our ICS testbed, we reached a host
discovery rate of 100% at an identification rate of more than 66%,
outperforming the results of existing tools.Comment: http://dx.doi.org/10.14236/ewic/ICS2018.
Security governance and the private military industry in Europe and North America
Even before Iraq the growing use of private military contractors has been widely discussed in the
academic and public literature. However, the reasons for this proliferation of private military
companies and its implications are frequently generalized due to a lack of suitable theoretical
approaches for the analysis of private means of violence in contemporary security. As a consequence,
this article contends, the analysis of the growth of the private military industry typically conflates two
separate developments: the failure of some developing states to provide for their national security and
the privatisation of military services in industrialized nations in Europe and North America. This
article focuses on the latter and argues that the concept of security governance can be used as a
theoretical framework for understanding the distinct development, problems and solutions for the
governance of the private military industry in developed countries.The United States Institute of Peace and the German Academic Exchange Service
Equity in health care financing: The case of Malaysia
Background: Equitable financing is a key objective of health care systems. Its importance is
evidenced in policy documents, policy statements, the work of health economists and policy
analysts. The conventional categorisations of finance sources for health care are taxation, social
health insurance, private health insurance and out-of-pocket payments. There are nonetheless
increasing variations in the finance sources used to fund health care. An understanding of the equity
implications would help policy makers in achieving equitable financing.
Objective: The primary purpose of this paper was to comprehensively assess the equity of health
care financing in Malaysia, which represents a new country context for the quantitative techniques
used. The paper evaluated each of the five financing sources (direct taxes, indirect taxes,
contributions to Employee Provident Fund and Social Security Organization, private insurance and
out-of-pocket payments) independently, and subsequently by combined the financing sources to
evaluate the whole financing system.
Methods: Cross-sectional analyses were performed on the Household Expenditure Survey
Malaysia 1998/99, using Stata statistical software package. In order to assess inequality,
progressivity of each finance sources and the whole financing system was measured by Kakwani's
progressivity index.
Results: Results showed that Malaysia's predominantly tax-financed system was slightly
progressive with a Kakwani's progressivity index of 0.186. The net progressive effect was produced
by four progressive finance sources (in the decreasing order of direct taxes, private insurance
premiums, out-of-pocket payments, contributions to EPF and SOCSO) and a regressive finance
source (indirect taxes).
Conclusion: Malaysia's two tier health system, of a heavily subsidised public sector and a user
charged private sector, has produced a progressive health financing system. The case of Malaysia
exemplifies that policy makers can gain an in depth understanding of the equity impact, in order to
help shape health financing strategies for the nation
The Current Crisis in Emergency Care and the Impact on Disaster Preparedness
<p>Abstract</p> <p>Background</p> <p>The Homeland Security Act (HSA) of 2002 provided for the designation of a critical infrastructure protection program. This ultimately led to the designation of emergency services as a targeted critical infrastructure. In the context of an evolving crisis in hospital-based emergency care, the extent to which federal funding has addressed disaster preparedness will be examined.</p> <p>Discussion</p> <p>After 9/11, federal plans, procedures and benchmarks were mandated to assure a unified, comprehensive disaster response, ranging from local to federal activation of resources. Nevertheless, insufficient federal funding has contributed to a long-standing counter-trend which has eroded emergency medical care. The causes are complex and multifactorial, but they have converged to present a severely overburdened system that regularly exceeds emergency capacity and capabilities. This constant acute overcrowding, felt in communities all across the country, indicates a nation at risk. Federal funding has not sufficiently prioritized the improvements necessary for an emergency care infrastructure that is critical for an all hazards response to disaster and terrorist emergencies.</p> <p>Summary</p> <p>Currently, the nation is unable to meet presidential preparedness mandates for emergency and disaster care. Federal funding strategies must therefore be re-prioritized and targeted in a way that reasonably and consistently follows need.</p
Fear filter: Visualising the UK terror threat level
Fear Filter is a digital artwork comprising of a mobile phone photo filters application for Android / iOS platforms and a digital photo stream. The photo filters are created by gathering current and historical information about the UK Threat Level from a live feed from MI5, the UK security service. Photographs taken with the mobile application are transformed by the photo filters, each of which correspond to a different moment in time and the related Threat Level from that period. The filters cover the period 1 August 2006 until the present moment. Photos shared from the mobile application are automatically posted to a public photo stream.Fear Filter exploits the confluence of mobile digital photography, platforms, networks and the online security theatre of the UK Threat Level to reformulate the relationship between photography and terrorism
Child support reform: some analysis of the 1999 white paper
This paper uses a sample of lone mothers (and former lone mothers who are now repartnered) drawn from the 1997 Family Resources Survey to analyse the potential effects of reforming the UK system of Child Support. The main deficiency of the data is that non-resident fathers cannot be matched to the mothers in the data and this is overcome by exploiting information from another dataset which gives the joint distribution of the characteristics of separated parents. The effects of reforming the Child Support system is simulated for the amount of maintenance liabilities, the amount paid and the net incomes of households containing mothers with care and households containing non-resident fathers. The likely effects of the reform are simulated at various levels of compliance. The analysis highlights the need for further research into the incentive effects of Child Support on individual behaviour
- âŠ