To see the other types of publications on this topic, follow the link: Australian Security and Intelligence Organisation.

Journal articles on the topic 'Australian Security and Intelligence Organisation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Australian Security and Intelligence Organisation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lee, H. P. "The Australian Security Intelligence Organisation—New Mechanisms for Accountability." International and Comparative Law Quarterly 38, no. 4 (1989): 890–905. http://dx.doi.org/10.1093/iclqaj/38.4.890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ireland-Piper, Danielle, and Jonathan Crowe. "Whistleblowing, National Security and the Constitutional Freedom of Political Communication." Federal Law Review 46, no. 3 (2018): 341–65. http://dx.doi.org/10.1177/0067205x1804600301.

Full text
Abstract:
Whistleblowers promote the values of responsible government and the rule of law by drawing attention to criminal or other forms of wrongdoing in publicly accountable organisations. This article explores the relationship between whistleblowing, national security and the implied freedom of political communication under the Australian Constitution. Legislation such as the Crimes Act 1914 (Cth) (‘ Crimes Act’), the Australian Security Intelligence Organisation Act 1979 (Cth) (‘ ASIO Act’) and the Australian Border Force Act 2015 (Cth) (‘ Border Force Act’) makes it an offence to reveal certain typ
APA, Harvard, Vancouver, ISO, and other styles
3

McKnight, David. "Australian Film and the Cultural Cold War." Media International Australia 111, no. 1 (2004): 118–30. http://dx.doi.org/10.1177/1329878x0411100112.

Full text
Abstract:
This article examines whether, and in what way, anti-communism was a factor in the slow development of an Australian film industry in the 1950s and early 1960s and in the kind of film culture developed in Australia, particularly through film festivals. In particular it examines the activities of the Australian Security Intelligence Organisation (ASIO) towards left and liberal filmmakers and film lovers. It briefly examines the effect of anti-communism on the struggle for Australian content by Actors' Equity in the early years of television.
APA, Harvard, Vancouver, ISO, and other styles
4

McCulloch, Jude, and Joo-Cheong Tham. "Secret State, Transparent Subject: The Australian Security Intelligence Organisation in the Age of Terror." Australian & New Zealand Journal of Criminology 38, no. 3 (2005): 400–415. http://dx.doi.org/10.1375/acri.38.3.400.

Full text
Abstract:
This article describes the secrecy provisions embodied in the Australian Security Intelligence Organisation Legislation Amendment Act 2003 (Cwlth). The article explains how these provisions curb freedom of speech and remove ASIO's activities from the domain of public scrutiny. It argues that by effectively criminalising open discussion of ASIO's activities the provisions insulate much of the domestic ‘war on terror’ from the public gaze. It also argues that the provisions implicitly sanction lawlessness by ASIO in open breach of the rule of law. By undermining free speech and the rule of law,
APA, Harvard, Vancouver, ISO, and other styles
5

McGarrity, Nicola, and Keiran Hardy. "Digital surveillance and access to encrypted communications in Australia." Common Law World Review 49, no. 3-4 (2020): 160–81. http://dx.doi.org/10.1177/1473779520902478.

Full text
Abstract:
Australia’s counterterrorism laws have significantly expanded the powers of its law enforcement and intelligence agencies with regard to digital surveillance. In this article, we explain and evaluate Australia’s counterterrorism laws with respect to intercepting telecommunications, other forms of digital surveillance and access to encrypted communications. We focus on the statutory powers held by federal law enforcement agencies and the Australian Security Intelligence Organisation (ASIO), Australia’s domestic security intelligence agency. These powers confirm several important trends. They ha
APA, Harvard, Vancouver, ISO, and other styles
6

Head, Michael. "ASIO’s ‘official history’: More unanswered questions." Alternative Law Journal 42, no. 4 (2017): 304–9. http://dx.doi.org/10.1177/1037969x17732710.

Full text
Abstract:
The Secret Cold War, Volume 3 of the official history of the Australian Security Intelligence Organisation (ASIO), leaves many unanswered questions, particularly about the 1978 Sydney Hilton Hotel bombing and the ongoing lawlessness of ASIO’s activities. These questions undermine the central claim of Volume 3, that ASIO has become a reformed and accountable agency, shedding the notorious record of politically motivated surveillance, victimisation, harassment and ‘dirty tricks’ that the agency acquired in its first quarter century.
APA, Harvard, Vancouver, ISO, and other styles
7

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Australian Journal of Telecommunications and the Digital Economy 6, no. 4 (2018): 109–40. http://dx.doi.org/10.18080/ajtde.v6n4.167.

Full text
Abstract:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more pr
APA, Harvard, Vancouver, ISO, and other styles
8

Shanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia." Journal of Telecommunications and the Digital Economy 6, no. 4 (2018): 109–40. http://dx.doi.org/10.18080/jtde.v6n4.167.

Full text
Abstract:
This article reviews existing knowledge regarding the powers of the Australian Security Intelligence Organisation and the Australian Federal Police to access and use metadata. The review is primarily based on published research on the privacy impact of the revised metadata retention and collection framework introduced in 2015. The review reveals that, after 2015, no comprehensive study was undertaken in the following areas: how location information is generated and exchanged in the IP-mediated long-term evolution telecommunications network, and how mobile devices are tracked and create more pr
APA, Harvard, Vancouver, ISO, and other styles
9

Williams, George. "The Legal Assault on Australian Democracy." QUT Law Review 16, no. 2 (2016): 19. http://dx.doi.org/10.5204/qutlr.v16i2.651.

Full text
Abstract:
<p><em>Recent years have seen fierce public debate on whether Australia’s parliaments are passing laws that undermine fundamental democratic values, such as freedom of speech and freedom of association. Such debate has tended to focus on a few contentious laws, including s 18C of the Racial Discrimination Act 1975 (Cth), s 35P of the Australian Security Intelligence Organisation Act 1979 (Cth) and Queensland’s anti-bikie legislation. This article conducts a survey of the federal, state and territory statute books in order to determine whether such examples are isolated, or indicati
APA, Harvard, Vancouver, ISO, and other styles
10

McKnight, David. "‘Not Attributable to Official Sources’: Counter-Propaganda and the Mass Media." Media International Australia 128, no. 1 (2008): 5–17. http://dx.doi.org/10.1177/1329878x0812800103.

Full text
Abstract:
During the Cold War in Australia, the political agenda was dominated by the threat of communism. One factor in building this agenda was the ‘counter-propaganda operations’ of the Australian Security Intelligence Organisation (ASIO) which regularly released unattributable information to selected mass media outlets. In the period when these activities were most prevalent (1960–72), ASIO officers had regular contact with editors and with selected journalists on major newspapers and television. This formed part of a broader ‘cultural Cold War’ in which anti-communism was an organising principle. T
APA, Harvard, Vancouver, ISO, and other styles
11

Gray, Geoffrey. "‘In my file, I am two different people’: Max Gluckman and A.L. Epstein, the Australian National University, and Australian Security Intelligence Organisation, 1958–60." Cold War History 20, no. 1 (2019): 59–76. http://dx.doi.org/10.1080/14682745.2019.1575367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Boda, József. "The Situation of National Security Studies." Nemzetbiztonsági Szemle 10, no. 3 (2022): 13–24. http://dx.doi.org/10.32561/nsz.2022.3.2.

Full text
Abstract:
The author provides an overview of the national security and intelligence studies of some international organisations and some countries. The main focus of the article is on the development of national security and intelligence education in the European Union (EU), North Atlantic Treaty Organization (NATO) and China, Romania, Russia, the United State of America (USA), the United Kingdom, Singapore and Australia.
APA, Harvard, Vancouver, ISO, and other styles
13

Witczak, Maciej. "Biały wywiad w zarządzaniu bezpieczeństwem informacji." Przegląd Bezpieczeństwa Wewnętrznego 16, no. 30 (2024): 213–40. http://dx.doi.org/10.4467/20801335pbw.24.009.19611.

Full text
Abstract:
Open-source intelligence (OSINT) poses a threat to the information security system in an organisation (business, armed forces) and even in a whole state. The aim of the article is to provide an overview of this issue, to present the threats posed by open source intelligence and to identify ways of countering them. The theoretical part is complemented by a practical case study and confirms the hypotheses: gathering information from the open sources is possible, but it does not always allow for a comprehensive intelligence product. Moreover, the information security management minimises the risk
APA, Harvard, Vancouver, ISO, and other styles
14

Koller, Marco. "Recommendations for Safety-Conscious Smart Device Use by Military Professionals." Academic and Applied Research in Military and Public Management Science 21, no. 2 (2022): 5–14. http://dx.doi.org/10.32565/aarms.2022.2.1.

Full text
Abstract:
Security-conscious behaviour is of paramount importance, both in the field of information security and in various public institutions. Thus, in the public administration, especially in the various armed bodies, the training of personnel in this direction is of strategic importance, as a person with low security awareness can endanger the security of the entire organisation. Human security issues may even have national security or intelligence relevance.
APA, Harvard, Vancouver, ISO, and other styles
15

May, Lauren, and Tim Lane. "A Model for Improving e-Security in Australian Universities." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (2006): 90–96. http://dx.doi.org/10.3390/jtaer1020016.

Full text
Abstract:
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increasingly relevant role. In many cases security in universities is approached through the addition of tactical solutions. Often systems security is added on as a final consideration instead of during early design stages. This approach can be incomprehensive and inefficient. Although this approach can provide limited security, there is no guarantee that business requirements for security are incorporated and integrated ef
APA, Harvard, Vancouver, ISO, and other styles
16

Dr., Ibrahim M. Oleimat, Khalil Abu Saleem Dr., Abeer Samara Dr., Ahmad Al Issa Mr., M. Oleimat Mr.Muaath, and Ali M. G. Khawaldeh Mr. "Artificial Intelligence Importance in Improving the Quality of Financial Reporting." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN MULTIDISCIPLINARY EDUCATION 03, no. 01 (2024): 116–18. https://doi.org/10.5281/zenodo.10591200.

Full text
Abstract:
Artificial Intelligence plays a great role in improving the quality of financial reporting to the stakeholders as it canfree up the human resources and improves security measures as well as makes sure that the organisation is going in righttechnological direction or not. This kind of technology is also helpful in retaining customers towards business which is the maincause of this research study. The time and cost are to be used in an effective manner by the organisation that helps in improving itsoverall performance. The current research has covered secondary sources for collecting qualitative
APA, Harvard, Vancouver, ISO, and other styles
17

HENIGMAN, ŽARKO, and ANŽE RODE. "SMERNICE RAZVOJA OBVEŠČEVALNO- VARNOSTNE DEJAVNOSTI 21. STOLETJA." PROFESIONALIZACIJA SLOVENSKE VOJSKE / PROFESSIONALIZATION OF THE SLOVENIAN ARMED FORCES, VOLUME 2012/ ISSUE 14/1 (May 30, 2012): 69–87. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.14.1.5.

Full text
Abstract:
Republika Slovenija in njena obveščevalno-varnostna dejavnost sta vpeti v medna- rodno okolje. Spremembe v njenem strateškem in varnostnem okolju ter nalogah obrambnega sistema in zahteve po hitrem prenosu ter posredovanju informacij zahtevajo temeljito analizo procesov v obveščevalno-varnostni dejavnosti. Obveščevalno-varnostna dejavnost na obrambnem področju ima pomembno mesto v vodenju vodilnih političnih struktur in vojaških oseb. S ciljem racionalne organi- zacije in posredovanja pravočasnih ter kakovostnih informacij podajamo smernice za njen nadaljnji razvoj. Smernice za razvoj obveščev
APA, Harvard, Vancouver, ISO, and other styles
18

Sharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (2021): 1849. http://dx.doi.org/10.3390/electronics10151849.

Full text
Abstract:
Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to
APA, Harvard, Vancouver, ISO, and other styles
19

Harrison, Mark, Patrick F. Walsh, Shane Lysons-Smith, David Truong, Catherine Horan, and Ramzi Jabbour. "Tradecraft to Standards—Moving Criminal Intelligence Practice to a Profession through the Development of a Criminal Intelligence Training and Development Continuum." Policing: A Journal of Policy and Practice 14, no. 2 (2018): 312–24. http://dx.doi.org/10.1093/police/pay053.

Full text
Abstract:
Abstract Australian governments, academia, and law enforcement agencies have recognized the need to improve intelligence capabilities in order to adapt to the increasingly complex criminal and security environments. In response, the Australian Criminal Intelligence Commission (ACIC), the Australian Federal Police (AFP) and other Australian policing agencies have adopted several reform measures to improve intelligence capability support. While some have focused on developing specific criminal intelligence doctrine, others have sought to improve more challenging aspects of intelligence capabilit
APA, Harvard, Vancouver, ISO, and other styles
20

Mills, Richard. "John Howard, weapons of mass destruction and the public’s right to know." Pacific Journalism Review : Te Koakoa 14, no. 2 (2008): 37–48. http://dx.doi.org/10.24135/pjr.v14i2.943.

Full text
Abstract:
In March 2003, Australia went to war in Iraq to find and remove Saddam Hussein’s weapons of mass destruction (WMD). None were found. An Australian Parliamentary Committee concluded: The case made by the government was that Iraq possessed WMD on large quantities and posed a grave and unacceptable threat to the region and the world, particularly as there was a danger that Iraq's WMD might be passed to terrorist organisations. This is not the picture that emerges from an examination of the assessments provided to the Commmittee by the Australian Office of National Assessments (ONA) and the Defenc
APA, Harvard, Vancouver, ISO, and other styles
21

Kure, Halima, and Shareeful Islam. "Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure." JUCS - Journal of Universal Computer Science 25, no. (11) (2019): 1478–502. https://doi.org/10.3217/jucs-025-11-1478.

Full text
Abstract:
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security Risk Management (CSRM) task more challenging. Critical Infrastructure needs a new line of security defence to control these threats and minimise risks. Cyber Threat Intelligence (CTI) provides evidence-based information about the threats aiming to prevent threats. There are existing works and industry practice that emphasise the necessity of CT
APA, Harvard, Vancouver, ISO, and other styles
22

Colbran, Richard, Robyn Ramsden, Karen Stagnitti, and Samantha Adams. "Measures to assess the performance of an Australian non-government charitable non-acute health service: A Delphi Survey of Organisational Stakeholders." Health Services Management Research 31, no. 1 (2017): 11–20. http://dx.doi.org/10.1177/0951484817725681.

Full text
Abstract:
Organisation performance measurement is relevant for non-profit charitable organisations as they strive for security in an increasingly competitive funding environment. This study aimed to identify the priority measures and indicators of organisational performance of an Australian non-government charitable organisation that delivers non-acute health services. Seventy-seven and 59 participants across nine stakeholder groups responded to a two-staged Delphi technique study of a case study organisation. The stage one questionnaire was developed using information garnered through a detailed review
APA, Harvard, Vancouver, ISO, and other styles
23

Braat, Eleni. "Loyalty and Secret Intelligence: Anglo‒Dutch Cooperation during World War II." Politics and Governance 6, no. 4 (2018): 159–67. http://dx.doi.org/10.17645/pag.v6i4.1556.

Full text
Abstract:
Secrecy and informal organisation produce, sustain, and reinforce feelings of loyalty within intelligence and security services. This article demonstrates that loyalty is needed for cooperation between intelligence partners as well as within and between services. Under many circumstances, loyalty plays a larger role in the level of internal and external collaboration than formal work processes along hierarchical lines. These findings are empirically based on the case study of Anglo‒Dutch intelligence cooperation during World War II. By demonstrating that ‘loyalty’ critically affects the work o
APA, Harvard, Vancouver, ISO, and other styles
24

Bolto, Richard. "Accountability and secrecy in the Australian Intelligence Community: the Parliamentary Joint Committee on Intelligence and Security." International Review of Administrative Sciences 85, no. 1 (2017): 137–53. http://dx.doi.org/10.1177/0020852316687646.

Full text
Abstract:
The Parliamentary Joint Committee on Intelligence and Security is a significant, evolving and little-known accountability mechanism. As the basis of a case study, publicly available committee documents offer valuable insights into accountability practices within an unusual area of government. These documents highlight a range of accountability exchanges and broader relationships, as well as some of their defining features. Exploring critical institutional factors requires conceptual clarity about accountability and what makes it effective or ineffective. An accountability forum can thus be exa
APA, Harvard, Vancouver, ISO, and other styles
25

Laundon, Melinda, and Penny Williams. "Flexible Work: Barrier to Benefits?" Financial Planning Research Journal 4, no. 2 (2018): 51–68. http://dx.doi.org/10.2478/fprj-2018-0007.

Full text
Abstract:
ABSTRACT The Australian financial services industry has been a leader in offering flexible work policies, positioning them as a solution to the tensions between women’s dual work and family roles. While Australian legislation provides the right to request flexible work, this study uncovers how, in one finance organisation, flexible work is framed as an employee benefit within a suite of benefits. The study shows that employees using flexible work arrangements are less likely to understand and know how to access the full range of benefits, many of which have short- and longterm financial implic
APA, Harvard, Vancouver, ISO, and other styles
26

ČRNČEC, DAMIR, and JANEZ URBANC. "STREAMLINING THE INTELLIGENCE AND SECURITY STRUCTURES IN NATO AND THE EUROPEAN UNION." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2014/ ISSUE 16/3 (September 30, 2014): 63–75. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.16.3.4.

Full text
Abstract:
Just like every other organisation, NATO and the EU are more or less constantly changing and organisationally adapting to new challenges and related new priorities and tasks. The intelligence and security structures of both organisations are no exception and although radical or major organisational changes, mainly due to the consensus mode, are not very frequent and require more time, minor changes and adjustments occur constantly. In recent years, the field of intelligence and security in both organisations has not witnessed any major organisational changes. Nevertheless, especially within NA
APA, Harvard, Vancouver, ISO, and other styles
27

Pamulatsih, Heni Yekti, and Anak Agung Banyu Perwita. "Bhayangkara and Platypus: The Cooperation between Indonesian National Police (Polri) and Australian Federal Police (AFP) in Dealing With Terrorism Threat in the Post of Lombok Treaty." Indonesian Perspective 5, no. 2 (2020): 119–37. http://dx.doi.org/10.14710/ip.v5i2.33957.

Full text
Abstract:
Terrorism has become the utmost concern of many countries in the world including Indonesia and Australia. Indonesia and Australia have signed a security agreement on 13 November 2006, which was known as Lombok Treaty to promote security relations between the two countries. This article aimed to discuss the security cooperation between Indonesia and Australia especially between Indonesian National Police and Australian Federal Police cooperation in addressing terrorism threat in Indonesia. By using descriptive qualitative method, this article scrutinizes the implementation of security cooperati
APA, Harvard, Vancouver, ISO, and other styles
28

Zhao, Yue. "Australian Anti-encryption Legislation and Its Impacts on Security and Privacy." Lecture Notes in Education Psychology and Public Media 53, no. 1 (2024): 145–49. http://dx.doi.org/10.54254/2753-7048/53/20240056.

Full text
Abstract:
Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 gives relevant authorities (e.g. law enforcement, national security agencies and intelligence agencies) significant new powers regarding access to encrypted communications data, and hence extensive public attention have been attracted and opinions expressed concerning general security and privacy of users. This essay will first briefly introduce the key contents of the Assistance and Access Act 2018, then discuss how it will affect security and privacy of users respectively by considering both supporting and op
APA, Harvard, Vancouver, ISO, and other styles
29

Doroszczyk, Justyna. "Rola wywiadu agenturalnego w zwalczaniu zagrożenia terrorystycznego." Studia Polityczne 46, no. 4 (2018): 147–65. https://doi.org/10.35757/stp.2018.46.4.07.

Full text
Abstract:
Contemporary international terrorism is a serious threat to the security of nation states and is a special challenge for intelligence services. One of the most effective ways to fight the terrorist threat is intelligence gathered by means of interpersonal contact – human intelligence (HUMINT). Its main purpose is to obtain reliable pre-emptive information. The article contains an analysis of the issue of terrorism and the role of human intelligence in combating the terrorist threat. The thesis of the article is the conviction that human intelligence is an indispensable method of obtaining secr
APA, Harvard, Vancouver, ISO, and other styles
30

Jones, David Martin. "Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community." Intelligence and National Security 33, no. 1 (2016): 1–20. http://dx.doi.org/10.1080/02684527.2016.1259796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Zheng, Chaoliang. "Web-based Financial Shared Service Platform Construction Research." Frontiers in Business, Economics and Management 10, no. 3 (2023): 24–27. http://dx.doi.org/10.54097/fbem.v10i3.11204.

Full text
Abstract:
With the arrival of the era of big wisdom and cloud, accounting work is gradually developing in the direction of platformisation and digital intelligence. The construction of financial shared service platform is an important link to promote the transformation of enterprise digital intelligence, the article is based on the strategic positioning of the enterprise, from the strategy, organisation, talent, process, data and technology, six aspects of the construction of Web-based financial shared service platform, shared service platform module functions and construction of security measures. In o
APA, Harvard, Vancouver, ISO, and other styles
32

Ghaffari, Shahram, Terri J. Jackson, Christopher M. Doran, Andrew Wilson, and Chris Aisbett. "Describing Iranian hospital activity using Australian Refined DRGs: A case study of the Iranian Social Security Organisation." Health Policy 87, no. 1 (2008): 63–71. http://dx.doi.org/10.1016/j.healthpol.2007.09.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Chivurugwi, Josphat. "The Overarching Mission of an Intelligence Security Organisation in the Defence of the National Security Goals: The Case of Zimbabwe." Journal of Public Administration 58, no. 2 (2023): 509–24. http://dx.doi.org/10.53973/jopa.2023.58.2.a19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Farneubun, Petrus K. "China’s Rise and its Implications for Australian Foreign Policy." Papua Journal of Diplomacy and International Relations 2, no. 2 (2022): 142–62. http://dx.doi.org/10.31957/pjdir.v2i2.2234.

Full text
Abstract:
This article places a particular emphasis on the rise of China and its implications for Australian foreign policy. It qualitatively examines the perceptions of China’s rise, its intentions, and the Australian responses, based on government and international organisation reports, and secondary sources such as books, journals, and media articles. Using realism as a theoretical lens, this article argues that Australia’s foreign policy still reflects an ambiguity, as a result of, on the one hand, the economic opportunities China creates, and on the other hand, uncertainty regarding China’s intenti
APA, Harvard, Vancouver, ISO, and other styles
35

Cox, James W., Michele Akeroyd, and Danielle P. Oliver. "Integrated water resource assessment for the Adelaide region, South Australia." Proceedings of the International Association of Hydrological Sciences 374 (October 17, 2016): 69–73. http://dx.doi.org/10.5194/piahs-374-69-2016.

Full text
Abstract:
Abstract. South Australia is the driest state in the driest inhabited country in the world, Australia. Consequently, water is one of South Australia's highest priorities. Focus on water research and sources of water in the state became more critical during the Millenium drought that occurred between 1997 and 2011. In response to increased concern about water sources the South Australian government established The Goyder Institute for Water Research – a partnership between the South Australian State Government, the Commonwealth Scientific and Industrial Research Organisation (CSIRO), Flinders U
APA, Harvard, Vancouver, ISO, and other styles
36

Lavorgna, Anita, and Anna Sergi. "Serious, therefore Organised? A Critique of the Emerging “Cyber-Organised Crime” Rhetoric in the United Kingdom." International Journal of Cyber Criminology 10, no. 2 (2016): 170–87. https://doi.org/10.5281/zenodo.163400.

Full text
Abstract:
This paper, based on discourse analysis of policy documents, departs from a critique of the juxtaposition of the terms “serious” and “organised” in policies against organised crime in the UK. The conceptualisation of organised crime as national security threat supports our hypothesis that a similar critique can be applied to the emerging narrative of cyber-organised crime in the country. We argue that, whereby organised crime has become essentially “serious” as consequence of its characterisation as a national security threat, cyber crime is becoming “organised” in the policy narrative because
APA, Harvard, Vancouver, ISO, and other styles
37

Roffey, Paul, and Michelle Gahan. "Responses to Security Sensitive Biological Agents (SSBA) risks by the Australian Federal Police." Microbiology Australia 41, no. 3 (2020): 128. http://dx.doi.org/10.1071/ma20034.

Full text
Abstract:
As Australia’s national law enforcement agency the Australia Federal Police (AFP) plays a number of roles, broadly grouped under intelligence and investigation, in supporting a whole of government approach to responding to, and mitigating, risks from Security Sensitive Biological Agents (SSBA). The AFP is responsible for coordinating the investigation of national and transnational crimes, which includes acts of bioterrorism, and preventing, countering and responding to attacks in Australia and on Australian interests overseas. This paper provides an overview of the responses to SSBA risks by t
APA, Harvard, Vancouver, ISO, and other styles
38

Clarke, Marilyn. "Building employability through graduate development programmes." Personnel Review 46, no. 4 (2017): 792–808. http://dx.doi.org/10.1108/pr-12-2015-0321.

Full text
Abstract:
Purpose Graduate development programmes are a well-established strategy for recruiting graduates into the sector at the start of a lifetime public service career. There are indications, however, that public sector careers are becoming less secure and less long term in keeping with overall career trends across all sectors, a trend that has seen the emergence of employment contracts based on employability rather than job security. The purpose of this paper is to explore a graduate development programme offered by a state-based Australian public sector organisation to identify the extent to which
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Lanting. "Constructing a Multi-Dimensional Governance System for the Application of Generative AI in Schools: Policy Analysis and Implications of the “Australian Framework for Generative AI in Schools”." Journal of Contemporary Educational Research 9, no. 1 (2025): 157–62. https://doi.org/10.26689/jcer.v9i1.9540.

Full text
Abstract:
With the rapid development of generative artificial intelligence (AI) technology in the field of education, global educational systems are facing unprecedented opportunities and challenges, urgently requiring the establishment of comprehensive, flexible, and forward-looking governance solutions. The “Australian Framework for Generative AI in Schools” builds a multi-dimensional governance system covering aspects such as teaching and humanistic care, fairness and transparency, and accountability and security. Based on 22 specific principles and six core elements, it emphasizes a human-centered d
APA, Harvard, Vancouver, ISO, and other styles
40

Crooks, David, James Acris, Liam Atherton, et al. "Collaborative Operational Security: The future of Cybersecurity for Research and Education." EPJ Web of Conferences 295 (2024): 04013. http://dx.doi.org/10.1051/epjconf/202429504013.

Full text
Abstract:
No single organisation has the resources to defend its services alone against most modern malicious actors and so we must protect ourselves as a community. In the face of determined and well-resourced attackers, we must actively collaborate in this effort across HEP and more broadly across Research and Education (R&E). Parallel efforts are necessary to respond appropriately to this requirement. We must share threat intelligence about ongoing cybersecurity incidents with our trusted partners and deploy the fine-grained security network monitoring necessary to make active use of this intelli
APA, Harvard, Vancouver, ISO, and other styles
41

Trystan, A., D. Zhukov, and A. Bеrеzhnyi. "MODELS OF THE SYSTEM OF COLLECTIVE SELF-ORGANISATION OF UNMANNED AERIAL VEHICLES USING ARTIFICIAL INTELLIGENCE." Системи управління, навігації та зв’язку. Збірник наукових праць 2, no. 76 (2024): 47–52. http://dx.doi.org/10.26906/sunz.2024.2.047.

Full text
Abstract:
The article examines the current state and trends in the development of unmanned aerial vehicles (hereinafter - UAVs), methods and means of their control, self-organisation, flight routing, as well as the involvement of artificial intelligence technologies in the UAV teams system. The main trends in the use of UAVs in the defence sector are analysed. The key problems in this area are highlighted, as well as the shortcomings of existing methods and systems. The article analyses scientific works of domestic and foreign scholars, studies problematic issues and suggests ways of their solution. The
APA, Harvard, Vancouver, ISO, and other styles
42

Mason, Claire M., Melanie Ayre, and Shanae M. Burns. "Implementing Industry 4.0 in Australia: Insights from Advanced Australian Manufacturers." Journal of Open Innovation: Technology, Market, and Complexity 8, no. 1 (2022): 53. http://dx.doi.org/10.3390/joitmc8010053.

Full text
Abstract:
This study explores Industry 4.0 in the Australian context, where manufacturing is dominated by smaller firms servicing the domestic market. We interviewed 20 advanced Australian manufacturers from diverse fields, capturing detailed descriptions of the Industry 4.0 implementation process. We compared the themes that emerged from their descriptions with the factors typically assessed in Industry 4.0 frameworks to draw out differences in emphasis. Consistent with these frameworks, Australian manufacturers were focused on using Industry 4.0 technologies to automate the capture, integration and an
APA, Harvard, Vancouver, ISO, and other styles
43

Shalini, Vermani, and Bhattacharjee Sayak. "Performance Management System of Airports Authority of India : Process Improvement through use of Technology." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 10 (2018): 931–36. https://doi.org/10.5281/zenodo.1478583.

Full text
Abstract:
Managing human resource in today’s environment is a complex and challenging task for managements. Recognising people as a valuable resource has led in increment in the trend of employee maintenance, job security, regular hike in payment and employee retention. Performance Management System (PMS) plays a vital role in an organisation. This paper discusses the PMS of Airports Authority of India (AAI), satisfaction level of employees of AAI towards the new online PMS and the ways by which AAI can further improve their PMS using Artificial Intelligence (AI).
APA, Harvard, Vancouver, ISO, and other styles
44

Bonilla, Diego Navarro. "Information Management professionals working for intelligence organizations: ethics and deontology implications." Security and Human Rights 24, no. 3-4 (2014): 264–79. http://dx.doi.org/10.1163/18750230-02404005.

Full text
Abstract:
Archive and information management experts trained in library science programs are ideal candidates for jobs in intelligence organizations. Their skills, abilities and knowledge are frequently required in at least two well-defined areas: open source information gathering and records management/archival organisation. Under the general overview of the debate between “big data vs. big narrative” this article focuses on the ethical challenges that affect this community of information professionals. As a key component of the so-called “intelligence culture”, it will be also underlined the need for
APA, Harvard, Vancouver, ISO, and other styles
45

Drach, Iryna, Olha Petroye, Oleksandra Borodiyenko, et al. "The Use of Artificial Intelligence in Higher Education." International Scientific Journal of Universities and Leadership, no. 15 (July 7, 2023): 66–82. http://dx.doi.org/10.31874/2520-6702-2023-15-66-82.

Full text
Abstract:
The article analyses the theoretical foundations of using artificial intelligence (AI) in higher education. It shows that the AI system as a strategic technology provides many benefits for the lives of people and society as a whole and also symbolises a new stage not only in the history of digital technologies but also on a global scale of development of modern civilisation. The article provides an overview of the policies of European and global organisations, including the United Nations Educational, Scientific and Cultural Organisation (UNESCO), the European Union, the Organisation for Econo
APA, Harvard, Vancouver, ISO, and other styles
46

Glennie, Miriam, Michael O’Donnell, John Benson, and Michelle Brown. "Work as a government ‘scientist’: Professional status security during organisational change and downsizing." Journal of Sociology 55, no. 2 (2018): 252–69. http://dx.doi.org/10.1177/1440783318781271.

Full text
Abstract:
An increasingly complex and competitive funding environment has led many public research organisations to intervene in the organisation of scientists’ work. Government scientists represent a major component of the public research workforce but little is known of how workers in this sector have fared amid institutional and organisational change. Government scientists have applied research objectives but must still meet the profession’s requirements for legitimisation through independent research and peer-reviewed publishing to be recognised professionally as ‘scientists’. This study examines th
APA, Harvard, Vancouver, ISO, and other styles
47

Ferguson, Megan, Emma Tonkin, Julie Brimblecombe, et al. "Communities Setting the Direction for Their Right to Nutritious, Affordable Food: Co-Design of the Remote Food Security Project in Australian Indigenous Communities." International Journal of Environmental Research and Public Health 20, no. 4 (2023): 2936. http://dx.doi.org/10.3390/ijerph20042936.

Full text
Abstract:
Despite long histories of traditional food security, Indigenous peoples globally are disproportionately exposed to food insecurity. Addressing this imbalance must be a partnership led by Indigenous peoples in accordance with the UN Declaration of the Rights of Indigenous Peoples. We report the co-design process and resulting design of a food security research project in remote Australia and examine how the co-design process considered Indigenous peoples’ ways of knowing, being, and doing using the CREATE Tool. Informed by the Research for Impact Tool, together Aboriginal Community Controlled H
APA, Harvard, Vancouver, ISO, and other styles
48

Sultan, Hasnain, Lee-Kwun Chan, Pei-Hwa Siew, and Chen Kang Lee. "Factors Influencing Cloud Business Intelligence Adoption and Use at Organisational Level." ITM Web of Conferences 67 (2024): 01019. http://dx.doi.org/10.1051/itmconf/20246701019.

Full text
Abstract:
The integration of cloud computing and business intelligence enables analytics solutions through cloud environments. Despite the fears about issues such as security, privacy, and loss of data control issue, many enterprises are increasingly adopting cloud business intelligence (cloud BI). The interest in cloud BI is greatest among businesses and organisations. Yet, the extant literature reveals that little research related to the factors impacting the adoption of cloud BI at the level of organisations. This study aims to identify key factors that impact the adoption and utilisation of cloud BI
APA, Harvard, Vancouver, ISO, and other styles
49

Belfanti, Charmaine. "Emotional capacity in the public sector – an Australian review." International Journal of Public Sector Management 30, no. 5 (2017): 429–46. http://dx.doi.org/10.1108/ijpsm-10-2016-0182.

Full text
Abstract:
Purpose This paper presents a review examining an Australian public sector competency framework through the lens of emotional intelligence (EQ) to answer the question “To what extent is the concept of EQ used to facilitate NSW public sector reform?” The purpose of this paper is to accentuate the importance of emotional capacity as an important capability to achieve reform goals, recognising the public sector’s deep organisational history and accepting that change is an emotional event, and that people achieve change. Design/methodology/approach A literature review drawing relationships between
APA, Harvard, Vancouver, ISO, and other styles
50

Sarre, Rick, and Alikki Vernon. "Access to Safe Justice in Australian Courts: Some Reflections upon Intelligence, Design and Process." International Journal for Crime, Justice and Social Democracy 2, no. 2 (2013): 133–47. http://dx.doi.org/10.5204/ijcjsd.v2i2.116.

Full text
Abstract:
There have been great strides taken in Australia recently to make our courts safer, principally through an emphasis on risk management. After all, governments have a responsibility to protect those who work in, or who visit, court precincts. A greater understanding of how court safety can be enhanced by managing people, curial processes and the court environment requires assessing the physical mechanisms of risk management alongside a ‘needs-focus’ of stakeholders’ safety considerations. At the same time there must be a focus on enabling participation and well-being in justice processes. By ex
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!