To see the other types of publications on this topic, follow the link: Australian Security and Intelligence Organisation.

Journal articles on the topic 'Australian Security and Intelligence Organisation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Australian Security and Intelligence Organisation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, H. P. "The Australian Security Intelligence Organisation—New Mechanisms for Accountability." International and Comparative Law Quarterly 38, no. 4 (1989): 890–905. http://dx.doi.org/10.1093/iclqaj/38.4.890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ireland-Piper, Danielle, and Jonathan Crowe. "Whistleblowing, National Security and the Constitutional Freedom of Political Communication." Federal Law Review 46, no. 3 (2018): 341–65. http://dx.doi.org/10.1177/0067205x1804600301.

Full text
Abstract:
Whistleblowers promote the values of responsible government and the rule of law by drawing attention to criminal or other forms of wrongdoing in publicly accountable organisations. This article explores the relationship between whistleblowing, national security and the implied freedom of political communication under the Australian Constitution. Legislation such as the Crimes Act 1914 (Cth) (‘ Crimes Act’), the Australian Security Intelligence Organisation Act 1979 (Cth) (‘ ASIO Act’) and the Australian Border Force Act 2015 (Cth) (‘ Border Force Act’) makes it an offence to reveal certain types of information obtained as a Commonwealth officer. The Public Interest Disclosure Act 2013 (Cth) (‘ PIDA’) offers limited protection to whistleblowers in the Commonwealth public sector, but this protection does not extend to information relating to intelligence operations. We argue that blanket criminalisation of unauthorised disclosure by Commonwealth officers or contractors under s 70 of the Crimes Act, along with similar prohibitions in s 35P of the ASIO Act and s 42 of the Border Force Act, offend the implied freedom of political communication by failing to strike an adequate balance between national security and organisational secrecy, on the one hand, and public debate and discussion, on the other. The courts should read down these laws to protect disclosures that hold significant public interest for discussion and debate over government policy or the performance of government officials.
APA, Harvard, Vancouver, ISO, and other styles
3

McKnight, David. "Australian Film and the Cultural Cold War." Media International Australia 111, no. 1 (2004): 118–30. http://dx.doi.org/10.1177/1329878x0411100112.

Full text
Abstract:
This article examines whether, and in what way, anti-communism was a factor in the slow development of an Australian film industry in the 1950s and early 1960s and in the kind of film culture developed in Australia, particularly through film festivals. In particular it examines the activities of the Australian Security Intelligence Organisation (ASIO) towards left and liberal filmmakers and film lovers. It briefly examines the effect of anti-communism on the struggle for Australian content by Actors' Equity in the early years of television.
APA, Harvard, Vancouver, ISO, and other styles
4

McCulloch, Jude, and Joo-Cheong Tham. "Secret State, Transparent Subject: The Australian Security Intelligence Organisation in the Age of Terror." Australian & New Zealand Journal of Criminology 38, no. 3 (2005): 400–415. http://dx.doi.org/10.1375/acri.38.3.400.

Full text
Abstract:
This article describes the secrecy provisions embodied in the Australian Security Intelligence Organisation Legislation Amendment Act 2003 (Cwlth). The article explains how these provisions curb freedom of speech and remove ASIO's activities from the domain of public scrutiny. It argues that by effectively criminalising open discussion of ASIO's activities the provisions insulate much of the domestic ‘war on terror’ from the public gaze. It also argues that the provisions implicitly sanction lawlessness by ASIO in open breach of the rule of law. By undermining free speech and the rule of law, this legislation increases the risk of torture of persons detained by ASIO. The legislation also exacerbates the punitiveness of such detention. Moreover, the secrecy offences will distort Australian politics by enabling the government to control and manipulate ‘security’ information. The article concludes that the increase in state secrecy and its impact are part of a continuing shift in the relative distribution of power between state and subject in liberal democracies; a shift that signals a move to more repressive or authoritarian forms of rule.
APA, Harvard, Vancouver, ISO, and other styles
5

McGarrity, Nicola, and Keiran Hardy. "Digital surveillance and access to encrypted communications in Australia." Common Law World Review 49, no. 3-4 (2020): 160–81. http://dx.doi.org/10.1177/1473779520902478.

Full text
Abstract:
Australia’s counterterrorism laws have significantly expanded the powers of its law enforcement and intelligence agencies with regard to digital surveillance. In this article, we explain and evaluate Australia’s counterterrorism laws with respect to intercepting telecommunications, other forms of digital surveillance and access to encrypted communications. We focus on the statutory powers held by federal law enforcement agencies and the Australian Security Intelligence Organisation (ASIO), Australia’s domestic security intelligence agency. These powers confirm several important trends. They have further blurred the lines between intelligence and evidence and they have granted law enforcement and ASIO extraordinary powers to modify consumer technologies. They also create significant potential for conflict of laws across national boundaries. Significant strengthening of existing accountability mechanisms is needed to ensure public transparency and reduce opportunities for misuse.
APA, Harvard, Vancouver, ISO, and other styles
6

Head, Michael. "ASIO’s ‘official history’: More unanswered questions." Alternative Law Journal 42, no. 4 (2017): 304–9. http://dx.doi.org/10.1177/1037969x17732710.

Full text
Abstract:
The Secret Cold War, Volume 3 of the official history of the Australian Security Intelligence Organisation (ASIO), leaves many unanswered questions, particularly about the 1978 Sydney Hilton Hotel bombing and the ongoing lawlessness of ASIO’s activities. These questions undermine the central claim of Volume 3, that ASIO has become a reformed and accountable agency, shedding the notorious record of politically motivated surveillance, victimisation, harassment and ‘dirty tricks’ that the agency acquired in its first quarter century.
APA, Harvard, Vancouver, ISO, and other styles
7

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Australian Journal of Telecommunications and the Digital Economy 6, no. 4 (2018): 109–40. http://dx.doi.org/10.18080/ajtde.v6n4.167.

Full text
Abstract:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more precise location estimates, in the legal and policy context of the exceptions and privacy safeguards introduced after 2015; the discretionary powers of the agencies to use personal and sensitive information to identify inquiries and investigations to pursue, to enforce the law and perform their functions, and to carry out activities related to their functions and purposes; and the flexible oversight principles contained in the guidelines that create conflicts between law enforcement and privacy interests. The review proposes future multidisciplinary research.
APA, Harvard, Vancouver, ISO, and other styles
8

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Journal of Telecommunications and the Digital Economy 6, no. 4 (2018): 109–40. http://dx.doi.org/10.18080/jtde.v6n4.167.

Full text
Abstract:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more precise location estimates, in the legal and policy context of the exceptions and privacy safeguards introduced after 2015; the discretionary powers of the agencies to use personal and sensitive information to identify inquiries and investigations to pursue, to enforce the law and perform their functions, and to carry out activities related to their functions and purposes; and the flexible oversight principles contained in the guidelines that create conflicts between law enforcement and privacy interests. The review proposes future multidisciplinary research.
APA, Harvard, Vancouver, ISO, and other styles
9

Williams, George. "The Legal Assault on Australian Democracy." QUT Law Review 16, no. 2 (2016): 19. http://dx.doi.org/10.5204/qutlr.v16i2.651.

Full text
Abstract:
<p><em>Recent years have seen fierce public debate on whether Australia’s parliaments are passing laws that undermine fundamental democratic values, such as freedom of speech and freedom of association. Such debate has tended to focus on a few contentious laws, including s 18C of the Racial Discrimination Act 1975 (Cth), s 35P of the Australian Security Intelligence Organisation Act 1979 (Cth) and Queensland’s anti-bikie legislation. This article conducts a survey of the federal, state and territory statute books in order to determine whether such examples are isolated, or indicative of a broader trend. It identifies 350 instances of laws that arguably encroach upon rights and freedoms essential to the maintenance of a healthy democracy. Most of these laws have entered onto the statute book since September 2001. The article finds that the terrorist attacks of that month marked a watershed moment in the making of Australian laws, and that since that time parliamentarians have been less willing to exercise self-restraint by not passing laws that undermine Australia’s democratic system.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
10

McKnight, David. "‘Not Attributable to Official Sources’: Counter-Propaganda and the Mass Media." Media International Australia 128, no. 1 (2008): 5–17. http://dx.doi.org/10.1177/1329878x0812800103.

Full text
Abstract:
During the Cold War in Australia, the political agenda was dominated by the threat of communism. One factor in building this agenda was the ‘counter-propaganda operations’ of the Australian Security Intelligence Organisation (ASIO) which regularly released unattributable information to selected mass media outlets. In the period when these activities were most prevalent (1960–72), ASIO officers had regular contact with editors and with selected journalists on major newspapers and television. This formed part of a broader ‘cultural Cold War’ in which anti-communism was an organising principle. This article outlines new information on these activities, suggests that these operations were more extensive than previously thought, and discusses this relationship in terms of the scholarly work on media sources, government-sponsored intervention in the media and classical theories of propaganda. It suggests that one way to understand the controversial media role in counter-propaganda operations lies in the relationship between police and crime reporters.
APA, Harvard, Vancouver, ISO, and other styles
11

Gray, Geoffrey. "‘In my file, I am two different people’: Max Gluckman and A.L. Epstein, the Australian National University, and Australian Security Intelligence Organisation, 1958–60." Cold War History 20, no. 1 (2019): 59–76. http://dx.doi.org/10.1080/14682745.2019.1575367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Boda, József. "The Situation of National Security Studies." Nemzetbiztonsági Szemle 10, no. 3 (2022): 13–24. http://dx.doi.org/10.32561/nsz.2022.3.2.

Full text
Abstract:
The author provides an overview of the national security and intelligence studies of some international organisations and some countries. The main focus of the article is on the development of national security and intelligence education in the European Union (EU), North Atlantic Treaty Organization (NATO) and China, Romania, Russia, the United State of America (USA), the United Kingdom, Singapore and Australia.
APA, Harvard, Vancouver, ISO, and other styles
13

Witczak, Maciej. "Biały wywiad w zarządzaniu bezpieczeństwem informacji." Przegląd Bezpieczeństwa Wewnętrznego 16, no. 30 (2024): 213–40. http://dx.doi.org/10.4467/20801335pbw.24.009.19611.

Full text
Abstract:
Open-source intelligence (OSINT) poses a threat to the information security system in an organisation (business, armed forces) and even in a whole state. The aim of the article is to provide an overview of this issue, to present the threats posed by open source intelligence and to identify ways of countering them. The theoretical part is complemented by a practical case study and confirms the hypotheses: gathering information from the open sources is possible, but it does not always allow for a comprehensive intelligence product. Moreover, the information security management minimises the risk of collecting data from the open sources. The second part provides recommendations and proposes a universal model of information security management in an organisation.
APA, Harvard, Vancouver, ISO, and other styles
14

Koller, Marco. "Recommendations for Safety-Conscious Smart Device Use by Military Professionals." Academic and Applied Research in Military and Public Management Science 21, no. 2 (2022): 5–14. http://dx.doi.org/10.32565/aarms.2022.2.1.

Full text
Abstract:
Security-conscious behaviour is of paramount importance, both in the field of information security and in various public institutions. Thus, in the public administration, especially in the various armed bodies, the training of personnel in this direction is of strategic importance, as a person with low security awareness can endanger the security of the entire organisation. Human security issues may even have national security or intelligence relevance.
APA, Harvard, Vancouver, ISO, and other styles
15

May, Lauren, and Tim Lane. "A Model for Improving e-Security in Australian Universities." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (2006): 90–96. http://dx.doi.org/10.3390/jtaer1020016.

Full text
Abstract:
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increasingly relevant role. In many cases security in universities is approached through the addition of tactical solutions. Often systems security is added on as a final consideration instead of during early design stages. This approach can be incomprehensive and inefficient. Although this approach can provide limited security, there is no guarantee that business requirements for security are incorporated and integrated effectively. This situation is partly due to security management in Australian universities being challenged by the complexity of both university culture and diverse operating environments. In many circumstances the champion for security in universities tends to be relegated to an officer in the IT department, hidden away from the business itself. Often this person with operational responsibility for security will have a detailed understanding of what should occur in security, but faces difficulties in determining exactly how to go about achieving this on an enterprise level. In order to assist in securing university IT systems and thereby improving e-business security, this research proposes a security practitioner’s management model. This model is aimed at facilitating the transition of security knowledge into actual implementation across the enterprise, with an end goal of an improved culture of compliance towards security practices in the university sector. This work is of significant value as it results from a study into specific security management issues facing Australian universities. This study highlights that future research would be well-placed to focus on benchmarking information security management within the university sector.
APA, Harvard, Vancouver, ISO, and other styles
16

Dr., Ibrahim M. Oleimat, Khalil Abu Saleem Dr., Abeer Samara Dr., Ahmad Al Issa Mr., M. Oleimat Mr.Muaath, and Ali M. G. Khawaldeh Mr. "Artificial Intelligence Importance in Improving the Quality of Financial Reporting." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN MULTIDISCIPLINARY EDUCATION 03, no. 01 (2024): 116–18. https://doi.org/10.5281/zenodo.10591200.

Full text
Abstract:
Artificial Intelligence plays a great role in improving the quality of financial reporting to the stakeholders as it canfree up the human resources and improves security measures as well as makes sure that the organisation is going in righttechnological direction or not. This kind of technology is also helpful in retaining customers towards business which is the maincause of this research study. The time and cost are to be used in an effective manner by the organisation that helps in improving itsoverall performance. The current research has covered secondary sources for collecting qualitative data in a successful manner.
APA, Harvard, Vancouver, ISO, and other styles
17

HENIGMAN, ŽARKO, and ANŽE RODE. "SMERNICE RAZVOJA OBVEŠČEVALNO- VARNOSTNE DEJAVNOSTI 21. STOLETJA." PROFESIONALIZACIJA SLOVENSKE VOJSKE / PROFESSIONALIZATION OF THE SLOVENIAN ARMED FORCES, VOLUME 2012/ ISSUE 14/1 (May 30, 2012): 69–87. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.14.1.5.

Full text
Abstract:
Republika Slovenija in njena obveščevalno-varnostna dejavnost sta vpeti v medna- rodno okolje. Spremembe v njenem strateškem in varnostnem okolju ter nalogah obrambnega sistema in zahteve po hitrem prenosu ter posredovanju informacij zahtevajo temeljito analizo procesov v obveščevalno-varnostni dejavnosti. Obveščevalno-varnostna dejavnost na obrambnem področju ima pomembno mesto v vodenju vodilnih političnih struktur in vojaških oseb. S ciljem racionalne organi- zacije in posredovanja pravočasnih ter kakovostnih informacij podajamo smernice za njen nadaljnji razvoj. Smernice za razvoj obveščevalno-varnostne dejavnosti temeljijo na podlagi zgo- dovinskorazvojne, kvalitativne in primerjalne analize umestitve, delovanja in orga- niziranosti obveščevalno-varnostne dejavnosti v Natu in slovenskem obrambnem resorju. V članku je analizirana obveščevalno-varnostna dejavnost v obdobju od osamo- svojitvene vojne in začetka profesionalizacije Slovenske vojske do današnjih dni. Analizirani so pravne podlage in procesi dela na vseh ravneh. The Republic of Slovenia and its intelligence and security activities are strongly connected to the international environment. The changes in strategic and security environment and defence system tasks, as well as the demands for high speed tran- smission and provision of information thus require a thorough analysis of intelligen- ce and security processes. Intelligence and security activities in the field of defence have an important place in the management of leading political structures and military personnel. We therefore offer guidelines for their future development so that rational organisation and provision of timely and quality information could be provided. The guidelines for the development of intelligence and security activities are based on the historical development, qualitative and comparative analysis of the placement, functioning and organisation of intelligence and security activities in NATO and Slovenian defence sector as such. The article provides the analysis of intelligence and security activities in the period between the War for Independence and the beginnings of Slovenian Armed Forces professionalization, and today, whereby all legal bases and work processes at all levels have been analysed.
APA, Harvard, Vancouver, ISO, and other styles
18

Sharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (2021): 1849. http://dx.doi.org/10.3390/electronics10151849.

Full text
Abstract:
Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to guarantee the security of national information infrastructure. However, the existing models and methodology are not addressing the attributes of threats like motivation, opportunity, and capability (C, M, O), and the critical threat intelligence (CTI) feed to the threat agents during the penetration process is ineffective, due to which security assurance arises for an organisation and the business of companies. This paper proposes a semi-automatic information security model, which can deal with situational awareness data, strategies prevailing information security activities, and protocols monitoring specific types of the network next to the real-time information environment. This paper looks over analyses and implements the threat assessment of network traffic in one particular real-time informational environment. To achieve this, we determined various unique attributes of threat agents from the Packet Capture Application Programming Interface (PCAP files/DataStream) collected from the network between the years 2012 and 2019. We used hypothetical and real-world examples of a threat agent to evaluate the three different factors of threat agents, i.e., Motivation, Opportunity, and Capability (M, O, C). Based on this, we also designed and determined the threat profiles, critical threat intelligence (CTI), and complexity of threat agents that are not addressed or covered in the existing threat agent taxonomies models and methodologies.
APA, Harvard, Vancouver, ISO, and other styles
19

Harrison, Mark, Patrick F. Walsh, Shane Lysons-Smith, David Truong, Catherine Horan, and Ramzi Jabbour. "Tradecraft to Standards—Moving Criminal Intelligence Practice to a Profession through the Development of a Criminal Intelligence Training and Development Continuum." Policing: A Journal of Policy and Practice 14, no. 2 (2018): 312–24. http://dx.doi.org/10.1093/police/pay053.

Full text
Abstract:
Abstract Australian governments, academia, and law enforcement agencies have recognized the need to improve intelligence capabilities in order to adapt to the increasingly complex criminal and security environments. In response, the Australian Criminal Intelligence Commission (ACIC), the Australian Federal Police (AFP) and other Australian policing agencies have adopted several reform measures to improve intelligence capability support. While some have focused on developing specific criminal intelligence doctrine, others have sought to improve more challenging aspects of intelligence capability such as analytical and field collection workforce planning. The complexity of the current and emerging criminal environment and a growing professionalization of policing practice more broadly has resulted in a uniquely new strategic approach to developing the analytical and field collection workforce. This article surveys the development of an Australian Criminal Intel Training and Development Continuum (CITDC). The continuum is an end-to-end continuing professional development framework for criminal intelligence analysts and field intelligence officers that monitor proficiency, competence, and knowledge achievement through pre-entry aptitude testing, rigorous class room, and workplace mentoring. The continuum is designed at the post-graduate level and articulates with Charles Sturt University’s MA (Intelligence Analysis). The article argues that both the philosophy of rigorous standards and the learning underpinning the continuum are having demonstrable and positive outcomes for intelligence practitioners and the investigative workforce they support.
APA, Harvard, Vancouver, ISO, and other styles
20

Mills, Richard. "John Howard, weapons of mass destruction and the public’s right to know." Pacific Journalism Review : Te Koakoa 14, no. 2 (2008): 37–48. http://dx.doi.org/10.24135/pjr.v14i2.943.

Full text
Abstract:
In March 2003, Australia went to war in Iraq to find and remove Saddam Hussein’s weapons of mass destruction (WMD). None were found. An Australian Parliamentary Committee concluded: The case made by the government was that Iraq possessed WMD on large quantities and posed a grave and unacceptable threat to the region and the world, particularly as there was a danger that Iraq's WMD might be passed to terrorist organisations. This is not the picture that emerges from an examination of the assessments provided to the Commmittee by the Australian Office of National Assessments (ONA) and the Defence Intelligence Organisation (DIO).
APA, Harvard, Vancouver, ISO, and other styles
21

Kure, Halima, and Shareeful Islam. "Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure." JUCS - Journal of Universal Computer Science 25, no. (11) (2019): 1478–502. https://doi.org/10.3217/jucs-025-11-1478.

Full text
Abstract:
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security Risk Management (CSRM) task more challenging. Critical Infrastructure needs a new line of security defence to control these threats and minimise risks. Cyber Threat Intelligence (CTI) provides evidence-based information about the threats aiming to prevent threats. There are existing works and industry practice that emphasise the necessity of CTI and provides methods for threat intelligence and sharing. However, despite these significant efforts, there is a lack of focus on how CTI information can support the CSRM activities so that the organisation can undertake appropriate controls to mitigate the risk proactively. This paper aims to fill this gap by integrating CTI for improving cybersecurity risks management practice specifically focusing on the critical infrastructure. In particular, the proposed approach contributes beyond state of the art practice by incorporating CTI information for the risk management activities. This helps the organisation to provide adequate and appropriate controls from strategic, tactical and operational perspectives. We have integrated concepts relating to CTI and CSRM so that threat actor's profile, attack detailed can support calculating the risk. We consider smart grid system as a Critical Infrastructure to demonstrate the applicability of the work. The result shows that cyber risks in critical infrastructures can be minimised if CTI information is gathered and used as part of CSRM activities. CTI not only supports understanding of threat for accurate risk estimation but also evaluates the effectiveness of existing controls and recommend necessity controls to improve overall cybersecurity. Also, the result shows that our approach provides early warning about issues that need immediate attention.
APA, Harvard, Vancouver, ISO, and other styles
22

Colbran, Richard, Robyn Ramsden, Karen Stagnitti, and Samantha Adams. "Measures to assess the performance of an Australian non-government charitable non-acute health service: A Delphi Survey of Organisational Stakeholders." Health Services Management Research 31, no. 1 (2017): 11–20. http://dx.doi.org/10.1177/0951484817725681.

Full text
Abstract:
Organisation performance measurement is relevant for non-profit charitable organisations as they strive for security in an increasingly competitive funding environment. This study aimed to identify the priority measures and indicators of organisational performance of an Australian non-government charitable organisation that delivers non-acute health services. Seventy-seven and 59 participants across nine stakeholder groups responded to a two-staged Delphi technique study of a case study organisation. The stage one questionnaire was developed using information garnered through a detailed review of literature. Data from the first round were aggregated and analysed for the stage two survey. The final data represented a group consensus. Quality of care was ranked the most important of six organisational performance measures. Service user satisfaction was ranked second followed by financial performance, internal processes, employee learning and growth and community engagement. Thirteen priority indicators were determined across the six measures. Consensus was reached on the priority organisational performance measures and indicators. Stakeholders of the case study organisation value evidence-based practice, technical strength of services and service user satisfaction over more commercially orientated indicators.
APA, Harvard, Vancouver, ISO, and other styles
23

Braat, Eleni. "Loyalty and Secret Intelligence: Anglo‒Dutch Cooperation during World War II." Politics and Governance 6, no. 4 (2018): 159–67. http://dx.doi.org/10.17645/pag.v6i4.1556.

Full text
Abstract:
Secrecy and informal organisation produce, sustain, and reinforce feelings of loyalty within intelligence and security services. This article demonstrates that loyalty is needed for cooperation between intelligence partners as well as within and between services. Under many circumstances, loyalty plays a larger role in the level of internal and external collaboration than formal work processes along hierarchical lines. These findings are empirically based on the case study of Anglo‒Dutch intelligence cooperation during World War II. By demonstrating that ‘loyalty’ critically affects the work of intelligence communities, this article contributes to current and future research that integrates history, intelligence studies, and research on emotions.
APA, Harvard, Vancouver, ISO, and other styles
24

Bolto, Richard. "Accountability and secrecy in the Australian Intelligence Community: the Parliamentary Joint Committee on Intelligence and Security." International Review of Administrative Sciences 85, no. 1 (2017): 137–53. http://dx.doi.org/10.1177/0020852316687646.

Full text
Abstract:
The Parliamentary Joint Committee on Intelligence and Security is a significant, evolving and little-known accountability mechanism. As the basis of a case study, publicly available committee documents offer valuable insights into accountability practices within an unusual area of government. These documents highlight a range of accountability exchanges and broader relationships, as well as some of their defining features. Exploring critical institutional factors requires conceptual clarity about accountability and what makes it effective or ineffective. An accountability forum can thus be examined as a social mechanism through which the key stages of accountability unfold, at least in theory. Secrecy is a potentially significant intervening variable in this case, but by applying democratic and constitutional perspectives on accountability, some more general strengths and weaknesses are evident. Points for practitioners While this institution and the Australian Intelligence Community are distinctive and interesting, empirical and normative understandings are limited. The relationship between accountability and secrecy is also significant but not particularly well understood. Accountability studies tend to have a strong conceptual focus, although some scholars have explored ‘good’ or ‘poor’ accountability. Focused on developing an evaluative framework concerning accountability within a secretive context, this study aims to contribute to these knowledge gaps, institutional concepts of accountability and emerging empirical work.
APA, Harvard, Vancouver, ISO, and other styles
25

Laundon, Melinda, and Penny Williams. "Flexible Work: Barrier to Benefits?" Financial Planning Research Journal 4, no. 2 (2018): 51–68. http://dx.doi.org/10.2478/fprj-2018-0007.

Full text
Abstract:
ABSTRACT The Australian financial services industry has been a leader in offering flexible work policies, positioning them as a solution to the tensions between women’s dual work and family roles. While Australian legislation provides the right to request flexible work, this study uncovers how, in one finance organisation, flexible work is framed as an employee benefit within a suite of benefits. The study shows that employees using flexible work arrangements are less likely to understand and know how to access the full range of benefits, many of which have short- and longterm financial implications. This has consequences for the long-term financial security of women (as the heaviest users of flexible work arrangements) and for financial planners, both as employees of organisations in the Australian finance industry and as providers of advice to women working in this sector.
APA, Harvard, Vancouver, ISO, and other styles
26

ČRNČEC, DAMIR, and JANEZ URBANC. "STREAMLINING THE INTELLIGENCE AND SECURITY STRUCTURES IN NATO AND THE EUROPEAN UNION." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2014/ ISSUE 16/3 (September 30, 2014): 63–75. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.16.3.4.

Full text
Abstract:
Just like every other organisation, NATO and the EU are more or less constantly changing and organisationally adapting to new challenges and related new priorities and tasks. The intelligence and security structures of both organisations are no exception and although radical or major organisational changes, mainly due to the consensus mode, are not very frequent and require more time, minor changes and adjustments occur constantly. In recent years, the field of intelligence and security in both organisations has not witnessed any major organisational changes. Nevertheless, especially within NATO, the intelligence structure has significantly increased in quality due to the extra effort to include, in addition to military and defence, civil intelligence and security structures of Member States to play a more active role in the exchange of intelligence with the Alliance. Similarly, although less obviously, a similar trend took place in the context of the intelligence and security structures within the EU. In parallel with the termination of operations in Afghanistan, with a slow stabilisation of the situation in the Western Balkans, and mainly as a result of the new/old challenges posed by the situation in relation to Ukraine, there is no doubt that the intelligence and security structures of both organisations, especially NATO, will be further modified and upgraded over the coming years. The aim of this paper is thus, in addition to outlining the current organisation of the intelligence and security structures in both organisations, to indicate the future trends in the field of intelligence and security. Kot vsaka organizacija se tudi zveza Nato in EU bolj ali manj stalno spreminjata ter organizacijsko prilagajata novim izzivom in posledično novim prednostim ter nalogam. Obveščevalno-varnostni deli obeh organizacij niso izjema in čeprav radikalne oziroma večje organizacijske spremembe, predvsem zaradi konsenzualnega načina delovanja, niso zelo pogoste ter zahtevajo več časa, se manjše spremembe nenehno dogajajo. V zadnjem času se sicer na obveščevalno-varnostnem področju v obeh organizacijah niso zgodile večje organizacijske spremembe, kljub temu pa se je predvsem znotraj Nata struktura na obveščevalnem področju pomembno kvalitativno dopolnila. Dopolnitev se je zgodila zato, da se k bolj aktivni vlogi pri izmenjavi obveščevalnih podatkov z zavezništvom (še močneje kot v preteklosti) vključijo poleg vojaških oziroma obrambnih tudi civilne obveščevalno-varnostne strukture držav članic. Podoben, čeprav manj očiten, trend je potekal tudi v okviru obveščevalno-varnostnih struktur EU. Vzporedno z zaključevanjem operacij v Afganistanu, s počasnim stabiliziranjem razmer na Zahodnem Balkanu, predvsem pa kot posledica novih/starih izzivov, ki jih povzročajo razmere v povezavi z Ukrajino, postane jasno, da se bo obveščevalno-varnostna struktura v obeh organizacijah, zlasti pa v Natu, v naslednjih letih dodatno spreminjala in izpopolnjevala. Cilj prispevka je poleg prikaza trenutne organiziranosti obveščevalno-varnostne strukture v obeh organizacijah napovedati prihodnje usmeritve na obveščevalno-varnostnem področju.
APA, Harvard, Vancouver, ISO, and other styles
27

Pamulatsih, Heni Yekti, and Anak Agung Banyu Perwita. "Bhayangkara and Platypus: The Cooperation between Indonesian National Police (Polri) and Australian Federal Police (AFP) in Dealing With Terrorism Threat in the Post of Lombok Treaty." Indonesian Perspective 5, no. 2 (2020): 119–37. http://dx.doi.org/10.14710/ip.v5i2.33957.

Full text
Abstract:
Terrorism has become the utmost concern of many countries in the world including Indonesia and Australia. Indonesia and Australia have signed a security agreement on 13 November 2006, which was known as Lombok Treaty to promote security relations between the two countries. This article aimed to discuss the security cooperation between Indonesia and Australia especially between Indonesian National Police and Australian Federal Police cooperation in addressing terrorism threat in Indonesia. By using descriptive qualitative method, this article scrutinizes the implementation of security cooperation especially cooperation between Indonesian National Police (POLRI) and Australian Federal Police (AFP) during 2012-2017. It was found that the type and the nature of cooperation between the two police institution could be divided into several dimension. It covered to further build cybercrime investigation satellite office (CCISO), increase personnel capacity building, and promote intelligence exchange to address terrorism threat.
APA, Harvard, Vancouver, ISO, and other styles
28

Zhao, Yue. "Australian Anti-encryption Legislation and Its Impacts on Security and Privacy." Lecture Notes in Education Psychology and Public Media 53, no. 1 (2024): 145–49. http://dx.doi.org/10.54254/2753-7048/53/20240056.

Full text
Abstract:
Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 gives relevant authorities (e.g. law enforcement, national security agencies and intelligence agencies) significant new powers regarding access to encrypted communications data, and hence extensive public attention have been attracted and opinions expressed concerning general security and privacy of users. This essay will first briefly introduce the key contents of the Assistance and Access Act 2018, then discuss how it will affect security and privacy of users respectively by considering both supporting and opposing arguments, and then further the discussion into a global environment by examining the history of a variety of efforts on similar powers. It concludes that though the Assistance and Access Act 2018 has sophisticated oversight mechanism and takes into consideration the most concerned systemic weaknesses security issue, its definition and guidance are vague and is likely not practical to achieve what the Act is designed for in practice. The potential overreach of the Act not only will impose great threats to system security as a whole, but also will breach the principle of privacy.
APA, Harvard, Vancouver, ISO, and other styles
29

Doroszczyk, Justyna. "Rola wywiadu agenturalnego w zwalczaniu zagrożenia terrorystycznego." Studia Polityczne 46, no. 4 (2018): 147–65. https://doi.org/10.35757/stp.2018.46.4.07.

Full text
Abstract:
Contemporary international terrorism is a serious threat to the security of nation states and is a special challenge for intelligence services. One of the most effective ways to fight the terrorist threat is intelligence gathered by means of interpersonal contact – human intelligence (HUMINT). Its main purpose is to obtain reliable pre-emptive information. The article contains an analysis of the issue of terrorism and the role of human intelligence in combating the terrorist threat. The thesis of the article is the conviction that human intelligence is an indispensable method of obtaining secret information, and its effectiveness results from the involvement of the human factor, which is not subject to the limitations typical of technological methods of obtaining information. Deep infiltration of an organisation or terrorist group enhances the effectiveness of preventive services.
APA, Harvard, Vancouver, ISO, and other styles
30

Jones, David Martin. "Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community." Intelligence and National Security 33, no. 1 (2016): 1–20. http://dx.doi.org/10.1080/02684527.2016.1259796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Zheng, Chaoliang. "Web-based Financial Shared Service Platform Construction Research." Frontiers in Business, Economics and Management 10, no. 3 (2023): 24–27. http://dx.doi.org/10.54097/fbem.v10i3.11204.

Full text
Abstract:
With the arrival of the era of big wisdom and cloud, accounting work is gradually developing in the direction of platformisation and digital intelligence. The construction of financial shared service platform is an important link to promote the transformation of enterprise digital intelligence, the article is based on the strategic positioning of the enterprise, from the strategy, organisation, talent, process, data and technology, six aspects of the construction of Web-based financial shared service platform, shared service platform module functions and construction of security measures. In order to optimise the management of financial shared service platform, promote enterprise information technology, digital transformation and high-quality development to make a new exploration.
APA, Harvard, Vancouver, ISO, and other styles
32

Ghaffari, Shahram, Terri J. Jackson, Christopher M. Doran, Andrew Wilson, and Chris Aisbett. "Describing Iranian hospital activity using Australian Refined DRGs: A case study of the Iranian Social Security Organisation." Health Policy 87, no. 1 (2008): 63–71. http://dx.doi.org/10.1016/j.healthpol.2007.09.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Chivurugwi, Josphat. "The Overarching Mission of an Intelligence Security Organisation in the Defence of the National Security Goals: The Case of Zimbabwe." Journal of Public Administration 58, no. 2 (2023): 509–24. http://dx.doi.org/10.53973/jopa.2023.58.2.a19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Farneubun, Petrus K. "China’s Rise and its Implications for Australian Foreign Policy." Papua Journal of Diplomacy and International Relations 2, no. 2 (2022): 142–62. http://dx.doi.org/10.31957/pjdir.v2i2.2234.

Full text
Abstract:
This article places a particular emphasis on the rise of China and its implications for Australian foreign policy. It qualitatively examines the perceptions of China’s rise, its intentions, and the Australian responses, based on government and international organisation reports, and secondary sources such as books, journals, and media articles. Using realism as a theoretical lens, this article argues that Australia’s foreign policy still reflects an ambiguity, as a result of, on the one hand, the economic opportunities China creates, and on the other hand, uncertainty regarding China’s intentions, whether offensive or defensive, peaceful or aggressive. Facing this condition, this article demonstrates that Australia adopts several important policy strategies. First, it maintains a hedging strategy to balance its economic interests and its security concern. Second, Australia continues to rely on the protection of the US. In the long-term, however, this reliance may be changed. For this reason, Australia needs to increase its own military capability. This article concludes that Australian foreign policy will likely remain ambivalent in its response to the rise of China.KEYWORDSAustralia; China’s Rise; Foreign Policy; Military Capability; Power Shift
APA, Harvard, Vancouver, ISO, and other styles
35

Cox, James W., Michele Akeroyd, and Danielle P. Oliver. "Integrated water resource assessment for the Adelaide region, South Australia." Proceedings of the International Association of Hydrological Sciences 374 (October 17, 2016): 69–73. http://dx.doi.org/10.5194/piahs-374-69-2016.

Full text
Abstract:
Abstract. South Australia is the driest state in the driest inhabited country in the world, Australia. Consequently, water is one of South Australia's highest priorities. Focus on water research and sources of water in the state became more critical during the Millenium drought that occurred between 1997 and 2011. In response to increased concern about water sources the South Australian government established The Goyder Institute for Water Research – a partnership between the South Australian State Government, the Commonwealth Scientific and Industrial Research Organisation (CSIRO), Flinders University, University of Adelaide and University of South Australia. The Goyder Institute undertakes cutting-edge science to inform the development of innovative integrated water management strategies to ensure South Australia's ongoing water security and enhance the South Australian Government's capacity to develop and deliver science-based policy solutions in water management. This paper focuses on the integrated water resource assessment of the northern Adelaide region, including the key research investments in water and climate, and how this information is being utilised by decision makers in the region.
APA, Harvard, Vancouver, ISO, and other styles
36

Lavorgna, Anita, and Anna Sergi. "Serious, therefore Organised? A Critique of the Emerging “Cyber-Organised Crime” Rhetoric in the United Kingdom." International Journal of Cyber Criminology 10, no. 2 (2016): 170–87. https://doi.org/10.5281/zenodo.163400.

Full text
Abstract:
This paper, based on discourse analysis of policy documents, departs from a critique of the juxtaposition of the terms “serious” and “organised” in policies against organised crime in the UK. The conceptualisation of organised crime as national security threat supports our hypothesis that a similar critique can be applied to the emerging narrative of cyber-organised crime in the country. We argue that, whereby organised crime has become essentially “serious” as consequence of its characterisation as a national security threat, cyber crime is becoming “organised” in the policy narrative because of its seriousness. The seriousness and organisation of cyber crime justifies its inclusion within the national security agenda, thus accessing the procedural benefits of criminal intelligence assigned to national security threats. The implications associated to the evolution of such narratives in policy-making need to be assessed while policies are still developing.
APA, Harvard, Vancouver, ISO, and other styles
37

Roffey, Paul, and Michelle Gahan. "Responses to Security Sensitive Biological Agents (SSBA) risks by the Australian Federal Police." Microbiology Australia 41, no. 3 (2020): 128. http://dx.doi.org/10.1071/ma20034.

Full text
Abstract:
As Australia’s national law enforcement agency the Australia Federal Police (AFP) plays a number of roles, broadly grouped under intelligence and investigation, in supporting a whole of government approach to responding to, and mitigating, risks from Security Sensitive Biological Agents (SSBA). The AFP is responsible for coordinating the investigation of national and transnational crimes, which includes acts of bioterrorism, and preventing, countering and responding to attacks in Australia and on Australian interests overseas. This paper provides an overview of the responses to SSBA risks by the AFP.
APA, Harvard, Vancouver, ISO, and other styles
38

Clarke, Marilyn. "Building employability through graduate development programmes." Personnel Review 46, no. 4 (2017): 792–808. http://dx.doi.org/10.1108/pr-12-2015-0321.

Full text
Abstract:
Purpose Graduate development programmes are a well-established strategy for recruiting graduates into the sector at the start of a lifetime public service career. There are indications, however, that public sector careers are becoming less secure and less long term in keeping with overall career trends across all sectors, a trend that has seen the emergence of employment contracts based on employability rather than job security. The purpose of this paper is to explore a graduate development programme offered by a state-based Australian public sector organisation to identify the extent to which it reflects and supports the shift to an employability-based contract from the perspective of programme participants. Design/methodology/approach Semi-structured interviews were conducted with 23 participants from three intakes of a public sector graduate development programme. Data were analysed through identification of first- and second-order themes as well as cross-case comparison. Findings Findings indicate that the one-year development programme partially supports an employability-based contract. The organisation could not promise ongoing employment and job security but did assist participants to develop skills and competencies for the future through its formal training and development programme. Work unit support for employability was, however, much more variable and depended to a large extent on line managers. Research limitations/implications The study was conducted in a single organisation and only included current and past programme participants who were still employed in the public sector. Practical implications The success of the programme was largely dependent on job placement and level of line manager support. Addressing these areas through better programme design and management can support the development of future leaders through opportunities for enhanced employability. Originality/value The study extends current research on employability by exploring how a public sector organisation provides support for graduates in a developmental programme from a participant perspective.
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Lanting. "Constructing a Multi-Dimensional Governance System for the Application of Generative AI in Schools: Policy Analysis and Implications of the “Australian Framework for Generative AI in Schools”." Journal of Contemporary Educational Research 9, no. 1 (2025): 157–62. https://doi.org/10.26689/jcer.v9i1.9540.

Full text
Abstract:
With the rapid development of generative artificial intelligence (AI) technology in the field of education, global educational systems are facing unprecedented opportunities and challenges, urgently requiring the establishment of comprehensive, flexible, and forward-looking governance solutions. The “Australian Framework for Generative AI in Schools” builds a multi-dimensional governance system covering aspects such as teaching and humanistic care, fairness and transparency, and accountability and security. Based on 22 specific principles and six core elements, it emphasizes a human-centered design concept, adopts a principle-based flexible structure, focuses on fairness and transparency, and stresses accountability and security. The framework provides valuable references for the use of generative AI in China’s education system and holds significant importance for promoting educational modernization and cultivating innovative talents adapted to the era of artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
40

Crooks, David, James Acris, Liam Atherton, et al. "Collaborative Operational Security: The future of Cybersecurity for Research and Education." EPJ Web of Conferences 295 (2024): 04013. http://dx.doi.org/10.1051/epjconf/202429504013.

Full text
Abstract:
No single organisation has the resources to defend its services alone against most modern malicious actors and so we must protect ourselves as a community. In the face of determined and well-resourced attackers, we must actively collaborate in this effort across HEP and more broadly across Research and Education (R&E). Parallel efforts are necessary to respond appropriately to this requirement. We must share threat intelligence about ongoing cybersecurity incidents with our trusted partners and deploy the fine-grained security network monitoring necessary to make active use of this intelligence. We must also engage with senior management in our organizations to ensure that we work alongside any broader organisational cybersecurity development programs. We report on progress of the Security Operations Center (SOC) Working Group, established by the WLCG but with membership encompassing the R&E sector. The goal of the Working Group is to develop reference designs for SOC deployments and empower R&E organisations to collect, leverage, and act upon targeted, contextualized, actionable threat intelligence. This report will include recent SOC deployment activities at sites with network connectivity in excess of 100Gb/s, as well as new technology designs. An important development, which is likely to form a key part of the WLCG security strategy, is the potential use of passive DNS logs to allow sites without fine-grained network monitoring to benefit from the threat intelligence available to our community. We also report on higher-level progress in engaging with the broader community to establish common approaches to this vital area of cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
41

Trystan, A., D. Zhukov, and A. Bеrеzhnyi. "MODELS OF THE SYSTEM OF COLLECTIVE SELF-ORGANISATION OF UNMANNED AERIAL VEHICLES USING ARTIFICIAL INTELLIGENCE." Системи управління, навігації та зв’язку. Збірник наукових праць 2, no. 76 (2024): 47–52. http://dx.doi.org/10.26906/sunz.2024.2.047.

Full text
Abstract:
The article examines the current state and trends in the development of unmanned aerial vehicles (hereinafter - UAVs), methods and means of their control, self-organisation, flight routing, as well as the involvement of artificial intelligence technologies in the UAV teams system. The main trends in the use of UAVs in the defence sector are analysed. The key problems in this area are highlighted, as well as the shortcomings of existing methods and systems. The article analyses scientific works of domestic and foreign scholars, studies problematic issues and suggests ways of their solution. The introduction of artificial intelligence into the UAV control system has significant potential and makes the development of these technologies urgent. The development of UAV collective control systems, including those using artificial intelligence, allows for the effective use of technology in various fields, ensuring increased coordination, functionality and overall efficiency. At the same time, despite active research in this area, a number of problems related to the development of methods and algorithms for group work still remain unresolved. The issue of integrating information technologies created on their basis and the specifics of their implementation in collective intelligence systems in order to increase the efficiency of solving complex formalised tasks is not sufficiently studied. A method of self-organisation of the UAV team with decentralised control is proposed, in which a number of functions (route planning, distribution of roles, determination of optimal actions, obtaining and processing information) assigned to the onboard control system of the robotic air complex can be performed by each element of the UAV team system due to their self-organisation. The practicality of this method lies in the fact that the UAV's artificial intelligence will constantly self-learn and improve, and if necessary, can be reprogrammed to meet the required conditions of the task. As a consequence, the results and time required to complete missions will improve significantly, while the number of control operators will decrease. It solves a number of problems and shortcomings related to the organisation of the management system, route planning, distribution of roles, speed and completeness of receiving, processing and transmitting information, which in turn improves the security and performance of the system.
APA, Harvard, Vancouver, ISO, and other styles
42

Mason, Claire M., Melanie Ayre, and Shanae M. Burns. "Implementing Industry 4.0 in Australia: Insights from Advanced Australian Manufacturers." Journal of Open Innovation: Technology, Market, and Complexity 8, no. 1 (2022): 53. http://dx.doi.org/10.3390/joitmc8010053.

Full text
Abstract:
This study explores Industry 4.0 in the Australian context, where manufacturing is dominated by smaller firms servicing the domestic market. We interviewed 20 advanced Australian manufacturers from diverse fields, capturing detailed descriptions of the Industry 4.0 implementation process. We compared the themes that emerged from their descriptions with the factors typically assessed in Industry 4.0 frameworks to draw out differences in emphasis. Consistent with these frameworks, Australian manufacturers were focused on using Industry 4.0 technologies to automate the capture, integration and analysis of data. To enable this activity, they were reorganising workforce roles and developing new skill sets. Knowledge sharing and collaborations within and across the organisation were seen to be especially important for small Australian manufacturers (with limited funding for technology investment and research and development) to maintain global competitiveness. However, while most Industry 4.0 frameworks describe supply chain applications, the development of smart products and services, and the need to adopt a strategy-led approach, relatively few participants spoke about these opportunities. Even fewer addressed the need for improved governance, standards and data security in the context of Industry 4.0. We argue that these gaps are best addressed through government policy and investment focusing beyond manufacturers, to support Industry 4.0 uplift across key domestic supply chains.
APA, Harvard, Vancouver, ISO, and other styles
43

Shalini, Vermani, and Bhattacharjee Sayak. "Performance Management System of Airports Authority of India : Process Improvement through use of Technology." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 10 (2018): 931–36. https://doi.org/10.5281/zenodo.1478583.

Full text
Abstract:
Managing human resource in today’s environment is a complex and challenging task for managements. Recognising people as a valuable resource has led in increment in the trend of employee maintenance, job security, regular hike in payment and employee retention. Performance Management System (PMS) plays a vital role in an organisation. This paper discusses the PMS of Airports Authority of India (AAI), satisfaction level of employees of AAI towards the new online PMS and the ways by which AAI can further improve their PMS using Artificial Intelligence (AI).
APA, Harvard, Vancouver, ISO, and other styles
44

Bonilla, Diego Navarro. "Information Management professionals working for intelligence organizations: ethics and deontology implications." Security and Human Rights 24, no. 3-4 (2014): 264–79. http://dx.doi.org/10.1163/18750230-02404005.

Full text
Abstract:
Archive and information management experts trained in library science programs are ideal candidates for jobs in intelligence organizations. Their skills, abilities and knowledge are frequently required in at least two well-defined areas: open source information gathering and records management/archival organisation. Under the general overview of the debate between “big data vs. big narrative” this article focuses on the ethical challenges that affect this community of information professionals. As a key component of the so-called “intelligence culture”, it will be also underlined the need for intensifying from our university classrooms the ethical dimension of information exploitation for security and defence purposes. The role played by these information profiles involved in multiple phases of the intelligence production process must be based not only on efficiency and efficacy criteria but also on deontology principles whose benefits are the fortification of democratic practice by intelligence services working in strong legal frameworks designed to guarantee fundamental rights.
APA, Harvard, Vancouver, ISO, and other styles
45

Drach, Iryna, Olha Petroye, Oleksandra Borodiyenko, et al. "The Use of Artificial Intelligence in Higher Education." International Scientific Journal of Universities and Leadership, no. 15 (July 7, 2023): 66–82. http://dx.doi.org/10.31874/2520-6702-2023-15-66-82.

Full text
Abstract:
The article analyses the theoretical foundations of using artificial intelligence (AI) in higher education. It shows that the AI system as a strategic technology provides many benefits for the lives of people and society as a whole and also symbolises a new stage not only in the history of digital technologies but also on a global scale of development of modern civilisation. The article provides an overview of the policies of European and global organisations, including the United Nations Educational, Scientific and Cultural Organisation (UNESCO), the European Union, the Organisation for Economic Cooperation and Development, the European University Association, etc. on the effective use of AI in everyday life and, in particular, in education.
 Based on the analysis results, the article systematises ethical principles (human-centred values, governance, transparency, accountability, sustainability, proportionality, confidentiality, safety, security, and inclusiveness) that should be applied in using AI. The SWOT analysis helped identify strengths and weaknesses, opportunities and risks of using AI in higher education. The article examines the regulatory framework for the implementation of AI in the Ukrainian educational area and identifies the peculiarities of AI application in the educational process of higher education institutions. It analyses statistical data for identifying the risks and threats of using AI in HEIs under the Open Science, obtained in 2023 by researchers of the Institute of Higher Education of NAES of Ukraine in the all-Ukrainian survey “Open Science in Higher Education Institutions of Ukraine,” more than 1.5 thousand respondents participated. The article also substantiates practical recommendations for developing and implementing AI in higher education at the national, institutional and individual levels.
APA, Harvard, Vancouver, ISO, and other styles
46

Glennie, Miriam, Michael O’Donnell, John Benson, and Michelle Brown. "Work as a government ‘scientist’: Professional status security during organisational change and downsizing." Journal of Sociology 55, no. 2 (2018): 252–69. http://dx.doi.org/10.1177/1440783318781271.

Full text
Abstract:
An increasingly complex and competitive funding environment has led many public research organisations to intervene in the organisation of scientists’ work. Government scientists represent a major component of the public research workforce but little is known of how workers in this sector have fared amid institutional and organisational change. Government scientists have applied research objectives but must still meet the profession’s requirements for legitimisation through independent research and peer-reviewed publishing to be recognised professionally as ‘scientists’. This study examines the impact of organisational change and downsizing in an Australian government science agency on the professional status security of its scientists. It uses a mixed method approach involving one focus group, 22 in-depth interviews and 803 survey responses. It finds that structural change reduced scientists’ professional status security and that a context of job insecurity and limited external employment opportunities inhibits individual scientists’ capacity to resist adverse changes to their work conditions.
APA, Harvard, Vancouver, ISO, and other styles
47

Ferguson, Megan, Emma Tonkin, Julie Brimblecombe, et al. "Communities Setting the Direction for Their Right to Nutritious, Affordable Food: Co-Design of the Remote Food Security Project in Australian Indigenous Communities." International Journal of Environmental Research and Public Health 20, no. 4 (2023): 2936. http://dx.doi.org/10.3390/ijerph20042936.

Full text
Abstract:
Despite long histories of traditional food security, Indigenous peoples globally are disproportionately exposed to food insecurity. Addressing this imbalance must be a partnership led by Indigenous peoples in accordance with the UN Declaration of the Rights of Indigenous Peoples. We report the co-design process and resulting design of a food security research project in remote Australia and examine how the co-design process considered Indigenous peoples’ ways of knowing, being, and doing using the CREATE Tool. Informed by the Research for Impact Tool, together Aboriginal Community Controlled Health Organisation staff, Indigenous and non-Indigenous public health researchers designed the project from 2018–2019, over a series of workshops and through the establishment of research advisory groups. The resulting Remote Food Security Project includes two phases. Phase 1 determines the impact of a healthy food price discount strategy on the diet quality of women and children, and the experience of food (in)security in remote communities in Australia. In Phase 2, community members propose solutions to improve food security and develop a translation plan. Examination with the CREATE Tool showed that employing a co-design process guided by a best practice tool has resulted in a research design that responds to calls for food security in remote Indigenous communities in Australia. The design takes a strengths-based approach consistent with a human rights, social justice, and broader empowerment agenda. Trial registration: The trial included in Phase 1 of this project has been registered with Australian New Zealand Clinical Trials Registry: ACTRN12621000640808.
APA, Harvard, Vancouver, ISO, and other styles
48

Sultan, Hasnain, Lee-Kwun Chan, Pei-Hwa Siew, and Chen Kang Lee. "Factors Influencing Cloud Business Intelligence Adoption and Use at Organisational Level." ITM Web of Conferences 67 (2024): 01019. http://dx.doi.org/10.1051/itmconf/20246701019.

Full text
Abstract:
The integration of cloud computing and business intelligence enables analytics solutions through cloud environments. Despite the fears about issues such as security, privacy, and loss of data control issue, many enterprises are increasingly adopting cloud business intelligence (cloud BI). The interest in cloud BI is greatest among businesses and organisations. Yet, the extant literature reveals that little research related to the factors impacting the adoption of cloud BI at the level of organisations. This study aims to identify key factors that impact the adoption and utilisation of cloud BI, focusing on organisational level, which will serve as valuable resources for organisations, helping them to implement cloud BI adoption securely and efficiently in business operations. Wymer and Regan's criteria are used as the basis for analysis. From the results of the study, it is evident that there are 18 factors that significantly impact the adoption and continual usage of cloud BI services in organisations: Complexity, Privacy, Competitive pressure, Security, Government support, Availability, Relative advantage, Culture, Management support, Observability, Regulatory support, Technology readiness, Type of system, Organisation size, Trialability, Effective adaptable solutions, Compatibility, and Scalability. The findings can help Organisations, cloud BI service providers, and governments to develop cloud BI adoption strategies.
APA, Harvard, Vancouver, ISO, and other styles
49

Sarre, Rick, and Alikki Vernon. "Access to Safe Justice in Australian Courts: Some Reflections upon Intelligence, Design and Process." International Journal for Crime, Justice and Social Democracy 2, no. 2 (2013): 133–47. http://dx.doi.org/10.5204/ijcjsd.v2i2.116.

Full text
Abstract:
There have been great strides taken in Australia recently to make our courts safer, principally through an emphasis on risk management. After all, governments have a responsibility to protect those who work in, or who visit, court precincts. A greater understanding of how court safety can be enhanced by managing people, curial processes and the court environment requires assessing the physical mechanisms of risk management alongside a ‘needs-focus’ of stakeholders’ safety considerations. At the same time there must be a focus on enabling participation and well-being in justice processes. By examining the way in which courts now operate around Australia and the developments in security intelligence, court design and processes, this paper seeks to outline how access to safe justice is possible.
APA, Harvard, Vancouver, ISO, and other styles
50

Belfanti, Charmaine. "Emotional capacity in the public sector – an Australian review." International Journal of Public Sector Management 30, no. 5 (2017): 429–46. http://dx.doi.org/10.1108/ijpsm-10-2016-0182.

Full text
Abstract:
Purpose This paper presents a review examining an Australian public sector competency framework through the lens of emotional intelligence (EQ) to answer the question “To what extent is the concept of EQ used to facilitate NSW public sector reform?” The purpose of this paper is to accentuate the importance of emotional capacity as an important capability to achieve reform goals, recognising the public sector’s deep organisational history and accepting that change is an emotional event, and that people achieve change. Design/methodology/approach A literature review drawing relationships between culture, change and emotion is applied to a capability framework for the public sector in the State of NSW. This review serves two purposes. First, it examines interacting factors that define the public sector context – a culture developed over generations, identity, the impact of culture on change and the relationship between change and emotions. The second examines a concept for its ability to transform this culture in a comparatively short time compared to its evolutionary history. Emotional capacity is framed by the EQ literature and is explored as a competency with particular focus in the NSW public sector. A ProQuest search using keywords Emotional intelligence and Public Sector or Civil Service; and Emotional intelligence and Public Administration located 22 studies across 14 countries looking at EQ in the public sector. These are supplemented by additional studies on EQ. The capability framework is examined against the elements of the only recognised standardised test for EQ (Fiori and Antonakis, 2011), the Mayer-Salovey-Caruso Emotional Intelligence Test. Findings The examination concludes that emotional capacity is implicit, if not overlooked within the framework, with continued emphasis on technical and managerial competencies, evident of public sector management still encased in traditional paradigms. The discussion positions the development of emotional capacity as a high-order competency in a challenging reform environment. Research limitations/implications The literature review may suffer from publication bias in both the literature cited in this review as well as those studies that have been published, particularly given the small amount of studies available within the public sector environment. The theoretical nature of the matching assessment is subjective and allows potential for variation in interpretation in both the meaning of the competencies and the matching to the four branches of EQ. Practical implications Empirical research in EQ is limited in the public sector domain. The public sector has an embedded culture weighed with assumptions steeped in history. A public sector organisation is valuable for longitudinal studies as many employees stay for considerable years if not their whole career. Further empirical research within this sector in examining the impact of emotional capacity on cultural reform would enhance the knowledge in this field. Originality/value The paper contributes to the limited literature examining the optimal competencies in particular emotional capacity for reform in the public sector.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!