Academic literature on the topic 'Australian Security and Intelligence Organisation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Australian Security and Intelligence Organisation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Australian Security and Intelligence Organisation"

1

Lee, H. P. "The Australian Security Intelligence Organisation—New Mechanisms for Accountability." International and Comparative Law Quarterly 38, no. 4 (1989): 890–905. http://dx.doi.org/10.1093/iclqaj/38.4.890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ireland-Piper, Danielle, and Jonathan Crowe. "Whistleblowing, National Security and the Constitutional Freedom of Political Communication." Federal Law Review 46, no. 3 (2018): 341–65. http://dx.doi.org/10.1177/0067205x1804600301.

Full text
Abstract:
Whistleblowers promote the values of responsible government and the rule of law by drawing attention to criminal or other forms of wrongdoing in publicly accountable organisations. This article explores the relationship between whistleblowing, national security and the implied freedom of political communication under the Australian Constitution. Legislation such as the Crimes Act 1914 (Cth) (‘ Crimes Act’), the Australian Security Intelligence Organisation Act 1979 (Cth) (‘ ASIO Act’) and the Australian Border Force Act 2015 (Cth) (‘ Border Force Act’) makes it an offence to reveal certain typ
APA, Harvard, Vancouver, ISO, and other styles
3

McKnight, David. "Australian Film and the Cultural Cold War." Media International Australia 111, no. 1 (2004): 118–30. http://dx.doi.org/10.1177/1329878x0411100112.

Full text
Abstract:
This article examines whether, and in what way, anti-communism was a factor in the slow development of an Australian film industry in the 1950s and early 1960s and in the kind of film culture developed in Australia, particularly through film festivals. In particular it examines the activities of the Australian Security Intelligence Organisation (ASIO) towards left and liberal filmmakers and film lovers. It briefly examines the effect of anti-communism on the struggle for Australian content by Actors' Equity in the early years of television.
APA, Harvard, Vancouver, ISO, and other styles
4

McCulloch, Jude, and Joo-Cheong Tham. "Secret State, Transparent Subject: The Australian Security Intelligence Organisation in the Age of Terror." Australian & New Zealand Journal of Criminology 38, no. 3 (2005): 400–415. http://dx.doi.org/10.1375/acri.38.3.400.

Full text
Abstract:
This article describes the secrecy provisions embodied in the Australian Security Intelligence Organisation Legislation Amendment Act 2003 (Cwlth). The article explains how these provisions curb freedom of speech and remove ASIO's activities from the domain of public scrutiny. It argues that by effectively criminalising open discussion of ASIO's activities the provisions insulate much of the domestic ‘war on terror’ from the public gaze. It also argues that the provisions implicitly sanction lawlessness by ASIO in open breach of the rule of law. By undermining free speech and the rule of law,
APA, Harvard, Vancouver, ISO, and other styles
5

McGarrity, Nicola, and Keiran Hardy. "Digital surveillance and access to encrypted communications in Australia." Common Law World Review 49, no. 3-4 (2020): 160–81. http://dx.doi.org/10.1177/1473779520902478.

Full text
Abstract:
Australia’s counterterrorism laws have significantly expanded the powers of its law enforcement and intelligence agencies with regard to digital surveillance. In this article, we explain and evaluate Australia’s counterterrorism laws with respect to intercepting telecommunications, other forms of digital surveillance and access to encrypted communications. We focus on the statutory powers held by federal law enforcement agencies and the Australian Security Intelligence Organisation (ASIO), Australia’s domestic security intelligence agency. These powers confirm several important trends. They ha
APA, Harvard, Vancouver, ISO, and other styles
6

Head, Michael. "ASIO’s ‘official history’: More unanswered questions." Alternative Law Journal 42, no. 4 (2017): 304–9. http://dx.doi.org/10.1177/1037969x17732710.

Full text
Abstract:
The Secret Cold War, Volume 3 of the official history of the Australian Security Intelligence Organisation (ASIO), leaves many unanswered questions, particularly about the 1978 Sydney Hilton Hotel bombing and the ongoing lawlessness of ASIO’s activities. These questions undermine the central claim of Volume 3, that ASIO has become a reformed and accountable agency, shedding the notorious record of politically motivated surveillance, victimisation, harassment and ‘dirty tricks’ that the agency acquired in its first quarter century.
APA, Harvard, Vancouver, ISO, and other styles
7

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Australian Journal of Telecommunications and the Digital Economy 6, no. 4 (2018): 109–40. http://dx.doi.org/10.18080/ajtde.v6n4.167.

Full text
Abstract:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more pr
APA, Harvard, Vancouver, ISO, and other styles
8

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Journal of Telecommunications and the Digital Economy 6, no. 4 (2018): 109–40. http://dx.doi.org/10.18080/jtde.v6n4.167.

Full text
Abstract:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more pr
APA, Harvard, Vancouver, ISO, and other styles
9

Williams, George. "The Legal Assault on Australian Democracy." QUT Law Review 16, no. 2 (2016): 19. http://dx.doi.org/10.5204/qutlr.v16i2.651.

Full text
Abstract:
<p><em>Recent years have seen fierce public debate on whether Australia’s parliaments are passing laws that undermine fundamental democratic values, such as freedom of speech and freedom of association. Such debate has tended to focus on a few contentious laws, including s 18C of the Racial Discrimination Act 1975 (Cth), s 35P of the Australian Security Intelligence Organisation Act 1979 (Cth) and Queensland’s anti-bikie legislation. This article conducts a survey of the federal, state and territory statute books in order to determine whether such examples are isolated, or indicati
APA, Harvard, Vancouver, ISO, and other styles
10

McKnight, David. "‘Not Attributable to Official Sources’: Counter-Propaganda and the Mass Media." Media International Australia 128, no. 1 (2008): 5–17. http://dx.doi.org/10.1177/1329878x0812800103.

Full text
Abstract:
During the Cold War in Australia, the political agenda was dominated by the threat of communism. One factor in building this agenda was the ‘counter-propaganda operations’ of the Australian Security Intelligence Organisation (ASIO) which regularly released unattributable information to selected mass media outlets. In the period when these activities were most prevalent (1960–72), ASIO officers had regular contact with editors and with selected journalists on major newspapers and television. This formed part of a broader ‘cultural Cold War’ in which anti-communism was an organising principle. T
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Australian Security and Intelligence Organisation"

1

Thomson, James William Hugh. "Prolegomenon to a political economy of intelligence and security : can microeconomic analysis explain success or failure in intelligence cooperation?" Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/11668.

Full text
Abstract:
The governmental functions of security and intelligence require a number of distinct organisations and functions to interact in a symbiotic way. Because the external environment is uncertain and complex, these organisations must constantly negotiate with each other to establish which of them addresses which issue, and with what resources. Coasian principles suggest that if there are no transacting costs and property rights are clear, then such negotiations should lead to an overall maximisation of the benefits gained (in this case better security and intelligence provision), yet this is rarely
APA, Harvard, Vancouver, ISO, and other styles
2

Marlowe, Kirk S. "The homeland security enterprise where do we fit?" Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMarlowe.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Bellavita, Christopher. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Homeland security, collaborative capacity, federalism, grants, homeland security stakeholders, Australian Security Intelligence Organization (AISO), domestic intelligence agency, information sharing, Virginia State Police. Includes bibliographical references (p. 101-110). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Andrew Humanities &amp Social Sciences Australian Defence Force Academy UNSW. "The factors influencing the employment of the Australian Defence Organisation in homeland security roles since 11 September 2001." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Humanities and Social Sciences, 2007. http://handle.unsw.edu.au/1959.4/38735.

Full text
Abstract:
This thesis makes an assessment of the factors influencing the involvement of the Australian Defence Organisation (ADO) in homeland security roles since 11 September 2001 (9/11). This is approached on a largely empirical basis, using document analysis and case studies supported with interviews with key individuals and experts. The thesis commences with an Introduction that provides brief context for the thesis and specifies its central question as ???what factors have shaped the role of the ADO in Australia's response to the homeland security environment that has emerged since 11 September 2
APA, Harvard, Vancouver, ISO, and other styles
4

WHITMORE, Margaret, and whittys2002@yahoo com au. "The search for character: servant-leadership in an Australian organisation." Edith Cowan University. Business And Public Management: School Of Business And Law, 2004. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0003.html.

Full text
Abstract:
This study is in response to globalisation, changing world values and the call in modern literature for leaders of good character. Servant-leadership is offered to fill this requirement because its effectiveness is said to be reliant on the good character of the leader. In the literature this type of leadership is said to represent a new paradigm. The work of servant-leadership's proponent, Robert Greenleaf, is thoroughly examined to explain how his understanding of trust as faith is linked to spirituality and this is the key to understanding the character of servant-leaders. Greenleaf's work
APA, Harvard, Vancouver, ISO, and other styles
5

Whitmore, Margaret R. "The search for character: Servant-leadership in an Australian organisation." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/113.

Full text
Abstract:
This study is in response to globalisation, changing world values and the call in modern literature for leaders of good character. Servant-leadership is offered to fill this requirement because its effectiveness is said to be reliant on the good character of the leader. In the literature this type of leadership is said to represent a new paradigm. The work of servant-leadership’s proponent, Robert Greenleaf, is thoroughly examined to explain how his understanding of trust as faith is linked to spirituality and this is the key to understanding the character of servant-leaders. Greenleaf’s work
APA, Harvard, Vancouver, ISO, and other styles
6

O’Rourke, Simon. "An intelligence model for terrorist incident prevention for Australian police: A systemic investigation." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2010. https://ro.ecu.edu.au/theses/379.

Full text
Abstract:
This study examines the role that intelligence will continue to play in the ongoing efforts to mitigate the effects of contemporary terrorism. The role of domestic policing agencies is expanding to meet the challenge of transnational organised crime and also the threat to community safety and cohesion that terrorism entails. The September 11 attacks on the twin towers in New York city showcased the darkest elements of humanity whilst the courage personified by the police, firefighters and paramedics who entered the buildings to save others illuminated al that is best, in an event that was broa
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Erin. "Structuring for serendipity: family wealth creation, farmer autonomy and the pursuit of security in an uncertain Australian countryside." Thesis, The University of Sydney, 2014. http://hdl.handle.net/2123/13363.

Full text
Abstract:
The social and economic particularities of family farms have captured researchers’ attention for many years; but rural scholarship still lacks a clear, analytical sense of how and why family farms are organised in the ways that they are. This thesis critically examines the internal logics underpinning the socio-economic organisation of Australian farms. It adopts Johnsen’s (2003) conceptualisation of farm enterprises as three-way coalitions between farm businesses, farm households and the respective property holdings. Changes to the Australian agricultural property regime are used as the lens
APA, Harvard, Vancouver, ISO, and other styles
8

Davies, Alan James Jnr. "Enhancing resilience in the Australian security vetting process: Application of the Psycho-Social Resources for Resilience Scale – Vetting (PRRS-V)." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2856.

Full text
Abstract:
The disclosure or leaking of classified information by a trusted insider is an ongoing challenge for the national security apparatus in Australia and globally (Auditor General, 2018; Scott, 2020). In an effort to ensure that those with access to sensitive information will not disclose it, the Australian Government has a security vetting process. The Australian security vetting process measures a person's integrity by conducting a 'whole of person' assessment against several suitability indicators. In 2015, the Australian Government added resilience as a suitability indicator to its prescribed
APA, Harvard, Vancouver, ISO, and other styles
9

Scott, Rob. "Forging an unusual intelligence partnership : Operation Rusty and the rise of the CIA: how did the newly created CIA get involved with former Nazi military and security staff of the Hitler regime? How and why did the CIA agree to take over control of the Gehlen Organisation from the US Army Intelligence Division?/ Rob Scott." Title page, table of contents and introduction only, 2005. http://web4.library.adelaide.edu.au/theses/09AR/09ars4251.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hagberg, Mathias. "Sjukvårdsorganisationen vid svenska marina missioner." Thesis, Swedish National Defence College, Swedish National Defence College, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-29.

Full text
Abstract:
<p>Försvarsmaktsorganisationen har varit i förändring sedan försvarsbeslutet 2004, då Försvarsmakten gick från ett invasionsförsvars till ett rörligt insatsförsvar. Denna nya inriktning innebär att de svenska enheter skall kunna genomföra uppdrag långt ifrån den svenska kusten och infrastruktur, vilket kan medföra en del nya intressanta frågeställningar.</p><p>Ett exempel på en sådan frågeställning är om de svenska enheterna är lämpliga för sådana uppdrag då det gäller att ta hand om och transportera eventuella skadade ombord. Har sjukvårdsorganisationen och Försvarsmakten medel till att trans
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Australian Security and Intelligence Organisation"

1

Blesing, Meena. Was your dad a Russian spy?: The personal story of the Combe/Ivanov affair by David Combe's wife. Sun Books, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1954-, Bergin Anthony, Hall Robert A. 1947-, and Australian Defence Studies Centre, eds. Intelligence: And Australian national security. Australian Defence Studies Centre, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Marsden, Hope Robert, ed. Report on the Australian Security Intelligence Organization, December 1984. Aust. Govt. Publ. Service, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Flood, Philip. Report of the inquiry into Australian intelligence agencies. Dept. of the Prime Minister and Cabinet, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. Australian Scholarly Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tubbs, Michael. ASIO: The enemy within. M. Tubbs, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gobert, Wayne. The origins of Australian diplomatic intelligence in Asia, 1933-1941. Strategic and Defence Studies Centre, Research School of Pacific Studies, Australian National University, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cain, Frank. Terrorism & intelligence in Australia: A history of ASIO and national surveillance. Australian Scholarly Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sasson, Molly J. More cloak than dagger: One woman's career in secret intelligence. Connor Court Publishing, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wesley, Michael. Between probity and proficiency: Challenge and change within the Australian intelligence community = Probité et compétence : défis et changements au sein de l'appareil australien du renseignement. Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Australian Security and Intelligence Organisation"

1

Offner, K. L., E. Sitnikova, K. Joiner, and C. R. MacIntyre. "Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation." In Health Security Intelligence. Routledge, 2021. http://dx.doi.org/10.4324/9781003245483-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jones, David Martin. "Intelligence and National Security: Australian Dilemmas Post-9/11." In National Security, Surveillance and Terror. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43243-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Palmer, Darren, and Ian Warren. "The ‘Security of Security’: Making Up the Australian Intelligence Community 1975–2015." In National Security, Surveillance and Terror. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43243-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Susanto, Heru, and Alifya Kayla Shafa Susanto. "Strengthening artificial intelligence implementation of security business management in time of digital economy innovation." In Digitalisation and Organisation Design. Routledge, 2022. http://dx.doi.org/10.4324/9781003163824-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walsh, Patrick F. "Australian National Security Intelligence Collection Since 9/11: Policy and Legislative Challenges." In National Security, Surveillance and Terror. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43243-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Layton, Peter. "Evolution Not Revolution: Defence AI in Australia." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58649-1_26.

Full text
Abstract:
AbstractMiddle power Australia has an active defence Artificial Intelligence (AI) program underway with a well-defined innovation pathway and numerous experimentation projects. The Australian Defence Force sees AI mainly being used in human–machine teams to improve efficiency, increase combat power, achieve decision superiority, and lower risks to combat personnel. The major equipment acquisition plan for the next two decades sets out six AI-relevant projects: one navy, one army, three air force and one in the information and cyber domain. Associated with this investment is a high expectation that Australian AI companies will have considerable involvement in the projects. The Australian defence AI sector, though, consists mainly of small and medium-sized companies that may need to partner with large prime contractors to achieve the requisite industrial heft. There are also wider national concerns about whether Australia will have a large enough AI workforce over the next decade to handle both commercial and defence demands. Accordingly, Australia is involved with collaborative AI developments with the United States including the “loyal wingman” fast jet drone, autonomous submarines and surface vessels, and robot land vehicles. Current defence AI plans will most likely lead to evolutionary improvements not revolutionary changes. AI is envisaged as being used to either enhance, augment, or replace existing capability. This approach means the future ADF will do things better, but it won’t necessarily be able to do better things.
APA, Harvard, Vancouver, ISO, and other styles
7

"Payne-Scott, Communist Party of Australia, Commonwealth Investigation Service and Australian Security Intelligence Organisation." In Astrophysics and Space Science Library. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03141-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lomas, Daniel W. B. "Empire, Commonwealth and security." In Intelligence, Security and the Attlee Governments, 1945-51. Manchester University Press, 2017. http://dx.doi.org/10.7228/manchester/9780719099144.003.0008.

Full text
Abstract:
Chapter Seven explores Government attempts to combat Communist influence in and around Britain’s overseas territories and dependencies and the development of security agencies across the Commonwealth. The Attlee era also saw the development of internal security agencies around the Commonwealth modelled on British lines, resulting from Soviet espionage and American fears that Britain’s allies were far from secure. Responding to American threats to cut-off secret information to Australia, the British government responded by assisting in the development of a new internal security agency, the Security Intelligence Organisation (ASIO). The chapter looks at the role played by Attlee and others in Commonwealth security liaison and the role of the Commonwealth Security Conferences of 1948 and 1951, highlighting the political dimension of intelligence and security liaison. Using the recently declassified files of the Colonial Information Policy Committee, the chapter assesses British attempts to direct overseas anti-Communist publicity. Chaired by the Parliamentary Under-Secretary for Commonwealth Relations, Patrick Gordon Walker, the committee was formed in the autumn of 1948. The chapter explores the role of the Committee and IRD in combatting Communism in Britain’s African colonies.
APA, Harvard, Vancouver, ISO, and other styles
9

"Embargoes, Espionage and ASIO." In The Australian Security Intelligence Organization. Routledge, 2012. http://dx.doi.org/10.4324/9780203043752-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"The Acceptance of ASIO in the USA." In The Australian Security Intelligence Organization. Routledge, 2012. http://dx.doi.org/10.4324/9780203043752-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Australian Security and Intelligence Organisation"

1

Duan, Xiaoxia, Hepu Deng, and Brian Corbit. "The Impacts of Government Policies on the Efficiency of Australian Universities: A Multi-Period Data Envelopment Analysis." In 2008 International Conference on Computational Intelligence and Security (CIS). IEEE, 2008. http://dx.doi.org/10.1109/cis.2008.213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Grandhi, Lakshmi Sujatha, Srimannarayana Grandhi, and Santoso Wibowo. "A Security-UTAUT Framework for Evaluating Key Security Determinants in Smart City Adoption by the Australian City Councils." In 2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter). IEEE, 2021. http://dx.doi.org/10.1109/snpdwinter52325.2021.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, Yuwei, and Mathew Todres. "Boom or Bust? Exploring the Use of Generative AI in Higher Education Institutions [Extended Abstract]." In InSITE 2025: Informing Science + IT Education Conferences: Hiroshima. Informing Science Institute, 2025. https://doi.org/10.28945/5554.

Full text
Abstract:
Aim/Purpose The purpose of this paper is to (1) examine if higher education institutions’ (HEIs) generative artificial intelligence (Gen AI) literacy policy will impact educators’ and students’ attitudes and actions in educational settings and (2) explore educators and students’ attitudes towards Gen AI and academic behavior with or without institutional support. Background Since OpenAI launched ChatGPT in November 2022, AI has attracted significant attention in both research and practice across various institutions. Although the use of Gen AI is still in the preliminary phase, it has been ado
APA, Harvard, Vancouver, ISO, and other styles
4

Almer, Alexander, Anna Weber, Florian Haid, et al. "Physiological and cognitive real-time stress analysis as a basis for optimised human-machine teaming and safe decision processes for military forces." In 5th International Conference on Human Systems Engineering and Design: Future Trends and Applications (IHSED 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1004151.

Full text
Abstract:
Introduction In recent decades, the development of autonomous cyber-physical systems for a wide range of tasks has been the focus of research activities for military organisations. Modern security forces can be seen as socio-technical systems. Only an integrated approach, in which people, organisation and technology are viewed as interlocking elements, enables the optimisation of the overall system. Soldiers are still at the center of deployed sociotechnical systems despite major innovations in the field of autonomous systems and artificial intelligence (Swiss, 2020). An efficient and coordina
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!