1,482 research outputs found

    The Australian Charter of Employment Rights: The missing dimensions

    Get PDF
    Just prior to the 2007 General Election, a group of labour lawyers and economists, broadly sympathetic to the Labor Party, produced a Charter of Employment Rights. This article examines the Charter's proposals and its underlying framework, and suggests significant aspects of work and labour have been omitted. It contends that the Charter would have been improved if it had not retained an artificially stretched definition of workers as employees, in which the only relationship worthy of inclusion in a Charter is that between the direct employer and employee. The framework and language of the Charter convey a paternalistic approach and an outdated focus on industrial labour, while ignoring aspects of the emerging global system of work linked to the concept of occupation

    Large emergency-response exercises: qualitative characteristics - a survey

    Get PDF
    Exercises, drills, or simulations are widely used, by governments, agencies and commercial organizations, to simulate serious incidents and train staff how to respond to them. International cooperation has led to increasingly large-scale exercises, often involving hundreds or even thousands of participants in many locations. The difference between ‘large’ and ‘small’ exercises is more than one of size: (a) Large exercises are more ‘experiential’ and more likely to undermine any model of reality that single organizations may create; (b) they create a ‘play space’ in which organizations and individuals act out their own needs and identifications, and a ritual with strong social implications; (c) group-analytic psychotherapy suggests that the emotions aroused in a large group may be stronger and more difficult to control. Feelings are an unacknowledged major factor in the success or failure of exercises; (d) successful large exercises help improve the nature of trust between individuals and the organizations they represent, changing it from a situational trust to a personal trust; (e) it is more difficult to learn from large exercises or to apply the lessons identified; (f) however, large exercises can help develop organizations and individuals. Exercises (and simulation in general) need to be approached from a broader multidisciplinary direction if their full potential is to be realized

    Web Vulnerability Study of Online Pharmacy Sites

    Get PDF
    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems

    Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation

    Full text link
    Owing to a growing number of attacks, the assessment of Industrial Control Systems (ICSs) has gained in importance. An integral part of an assessment is the creation of a detailed inventory of all connected devices, enabling vulnerability evaluations. For this purpose, scans of networks are crucial. Active scanning, which generates irregular traffic, is a method to get an overview of connected and active devices. Since such additional traffic may lead to an unexpected behavior of devices, active scanning methods should be avoided in critical infrastructure networks. In such cases, passive network monitoring offers an alternative, which is often used in conjunction with complex deep-packet inspection techniques. There are very few publications on lightweight passive scanning methodologies for industrial networks. In this paper, we propose a lightweight passive network monitoring technique using an efficient Media Access Control (MAC) address-based identification of industrial devices. Based on an incomplete set of known MAC address to device associations, the presented method can guess correct device and vendor information. Proving the feasibility of the method, an implementation is also introduced and evaluated regarding its efficiency. The feasibility of predicting a specific device/vendor combination is demonstrated by having similar devices in the database. In our ICS testbed, we reached a host discovery rate of 100% at an identification rate of more than 66%, outperforming the results of existing tools.Comment: http://dx.doi.org/10.14236/ewic/ICS2018.

    Security governance and the private military industry in Europe and North America

    Get PDF
    Even before Iraq the growing use of private military contractors has been widely discussed in the academic and public literature. However, the reasons for this proliferation of private military companies and its implications are frequently generalized due to a lack of suitable theoretical approaches for the analysis of private means of violence in contemporary security. As a consequence, this article contends, the analysis of the growth of the private military industry typically conflates two separate developments: the failure of some developing states to provide for their national security and the privatisation of military services in industrialized nations in Europe and North America. This article focuses on the latter and argues that the concept of security governance can be used as a theoretical framework for understanding the distinct development, problems and solutions for the governance of the private military industry in developed countries.The United States Institute of Peace and the German Academic Exchange Service

    Equity in health care financing: The case of Malaysia

    Get PDF
    Background: Equitable financing is a key objective of health care systems. Its importance is evidenced in policy documents, policy statements, the work of health economists and policy analysts. The conventional categorisations of finance sources for health care are taxation, social health insurance, private health insurance and out-of-pocket payments. There are nonetheless increasing variations in the finance sources used to fund health care. An understanding of the equity implications would help policy makers in achieving equitable financing. Objective: The primary purpose of this paper was to comprehensively assess the equity of health care financing in Malaysia, which represents a new country context for the quantitative techniques used. The paper evaluated each of the five financing sources (direct taxes, indirect taxes, contributions to Employee Provident Fund and Social Security Organization, private insurance and out-of-pocket payments) independently, and subsequently by combined the financing sources to evaluate the whole financing system. Methods: Cross-sectional analyses were performed on the Household Expenditure Survey Malaysia 1998/99, using Stata statistical software package. In order to assess inequality, progressivity of each finance sources and the whole financing system was measured by Kakwani's progressivity index. Results: Results showed that Malaysia's predominantly tax-financed system was slightly progressive with a Kakwani's progressivity index of 0.186. The net progressive effect was produced by four progressive finance sources (in the decreasing order of direct taxes, private insurance premiums, out-of-pocket payments, contributions to EPF and SOCSO) and a regressive finance source (indirect taxes). Conclusion: Malaysia's two tier health system, of a heavily subsidised public sector and a user charged private sector, has produced a progressive health financing system. The case of Malaysia exemplifies that policy makers can gain an in depth understanding of the equity impact, in order to help shape health financing strategies for the nation

    The Current Crisis in Emergency Care and the Impact on Disaster Preparedness

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The Homeland Security Act (HSA) of 2002 provided for the designation of a critical infrastructure protection program. This ultimately led to the designation of emergency services as a targeted critical infrastructure. In the context of an evolving crisis in hospital-based emergency care, the extent to which federal funding has addressed disaster preparedness will be examined.</p> <p>Discussion</p> <p>After 9/11, federal plans, procedures and benchmarks were mandated to assure a unified, comprehensive disaster response, ranging from local to federal activation of resources. Nevertheless, insufficient federal funding has contributed to a long-standing counter-trend which has eroded emergency medical care. The causes are complex and multifactorial, but they have converged to present a severely overburdened system that regularly exceeds emergency capacity and capabilities. This constant acute overcrowding, felt in communities all across the country, indicates a nation at risk. Federal funding has not sufficiently prioritized the improvements necessary for an emergency care infrastructure that is critical for an all hazards response to disaster and terrorist emergencies.</p> <p>Summary</p> <p>Currently, the nation is unable to meet presidential preparedness mandates for emergency and disaster care. Federal funding strategies must therefore be re-prioritized and targeted in a way that reasonably and consistently follows need.</p

    Fear filter: Visualising the UK terror threat level

    Get PDF
    Fear Filter is a digital artwork comprising of a mobile phone photo filters application for Android / iOS platforms and a digital photo stream. The photo filters are created by gathering current and historical information about the UK Threat Level from a live feed from MI5, the UK security service. Photographs taken with the mobile application are transformed by the photo filters, each of which correspond to a different moment in time and the related Threat Level from that period. The filters cover the period 1 August 2006 until the present moment. Photos shared from the mobile application are automatically posted to a public photo stream.Fear Filter exploits the confluence of mobile digital photography, platforms, networks and the online security theatre of the UK Threat Level to reformulate the relationship between photography and terrorism

    Child support reform: some analysis of the 1999 white paper

    Get PDF
    This paper uses a sample of lone mothers (and former lone mothers who are now repartnered) drawn from the 1997 Family Resources Survey to analyse the potential effects of reforming the UK system of Child Support. The main deficiency of the data is that non-resident fathers cannot be matched to the mothers in the data and this is overcome by exploiting information from another dataset which gives the joint distribution of the characteristics of separated parents. The effects of reforming the Child Support system is simulated for the amount of maintenance liabilities, the amount paid and the net incomes of households containing mothers with care and households containing non-resident fathers. The likely effects of the reform are simulated at various levels of compliance. The analysis highlights the need for further research into the incentive effects of Child Support on individual behaviour
    • 

    corecore