Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Public Affairs, Public Policy and Public Administration

Understanding The Impact Of Environmental Impact Assessment Research On Policy And Practice, Angus Morrison-Saunders, Annette Nykiel, Nicole Atkins Jan 2024

Understanding The Impact Of Environmental Impact Assessment Research On Policy And Practice, Angus Morrison-Saunders, Annette Nykiel, Nicole Atkins

Research outputs 2022 to 2026

There is an enormous and ever-growing body of environmental impact assessment (EIA) research, much of which is grounded in practice or seeks to advance it. In this paper we show how the impact of EIA research on policy and practice might be conceptualised and how to set about evidencing it. A framework is developed through literature review to account for impact in four areas pertaining to instrumental impact, conceptual impact, capacity building and knowledge brokerage and co-production. Methods for implementing the framework include citations within policy documents along with content analysis to determine influence and interviews or surveys with policy …


Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo Jan 2024

Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo

Research outputs 2022 to 2026

Introduction: The research project's objective was to conduct a comprehensive horizon scan of Network Centric Warfare (NCW) technologies—specifically, Cyber, IoT/IoBT, AI, and Autonomous Systems. Recognised as pivotal force multipliers, these technologies are critical to reshaping the mission, design, structure, and operations of the Australian Defence Force (ADF), aligning with the Department of Defence (Defence)’s offset strategies and ensuring technological advantage, especially in the Indo-Pacific's competitive landscape.

Research process: Employing a two-pronged research approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding …


Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan Jan 2021

Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan

Research outputs 2014 to 2021

© 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but …


The Efficacy Of Aligning Lessons Learnt From Significant Bushfire Incidents To The Organisational Stratum, Jennifer Medbury, David J. Brooks, Michael Coole Jan 2021

The Efficacy Of Aligning Lessons Learnt From Significant Bushfire Incidents To The Organisational Stratum, Jennifer Medbury, David J. Brooks, Michael Coole

Research outputs 2014 to 2021

Australia's bushfire seasons are expected to become longer and more severe due to the effects of climate change and an increasing population living in rural-urban fringes. Social and economic vulnerability to extreme natural hazards means that Australia’s emergency services sector plays a significant role in community safety and wellbeing. Therefore, it is important that the sector continually improves. Australia has a long history of conducting external reviews into significant bushfires. While these reviews receive good support and seek to identify relevant lessons, barriers remain that prevent these lessons from being effectively learnt. It is possible that some of these barriers …


From The Tree Of Knowledge And The Golem Of Prague To Kosher Autonomous Cars: The Ethics Of Artificial Intelligence Through Jewish Eyes, Nachshon Goltz, John Zeleznikow, Tracey Dowdeswell Jul 2020

From The Tree Of Knowledge And The Golem Of Prague To Kosher Autonomous Cars: The Ethics Of Artificial Intelligence Through Jewish Eyes, Nachshon Goltz, John Zeleznikow, Tracey Dowdeswell

Research outputs 2014 to 2021

This article discusses the regulation of artificial intelligence from a Jewish perspective, with an emphasis on the regulation of machine learning and its application to autonomous vehicles and machine learning. Through the Biblical story of Adam and Eve as well as Golem legends from Jewish folklore, we derive several basic principles that underlie a Jewish perspective on the moral and legal personhood of robots and other artificially intelligent agents. We argue that religious ethics in general, and Jewish ethics in particular, show us that the dangers of granting moral personhood to robots and in particular to autonomous vehicles lie not …


No Soldiers Left Behind: An Iot-Based Low-Power Military Mobile Health System Design, James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, Paul Haskell-Dowland Jan 2020

No Soldiers Left Behind: An Iot-Based Low-Power Military Mobile Health System Design, James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, Paul Haskell-Dowland

Research outputs 2014 to 2021

© 2013 IEEE. There has been an increasing prevalence of ad-hoc networks for various purposes and applications. These include Low Power Wide Area Networks (LPWAN) and Wireless Body Area Networks (WBAN) which have emerging applications in health monitoring as well as user location tracking in emergency settings. Further applications can include real-Time actuation of IoT equipment, and activation of emergency alarms through the inference of a user's situation using sensors and personal devices through a LPWAN. This has potential benefits for military networks and applications regarding the health of soldiers and field personnel during a mission. Due to the wireless …


Distribution And Evolution Of Fukushima Dai-Ichi Derived 137cs, 90sr, And 129i In Surface Seawater Off The Coast Of Japan, Jennifer A. Kenyon, Ken O. Buesseler, Núria Casacuberta, Maxi Castrillejo, Shigeyoshi Otosaka, Pere Masqué, Jessica A. Drysdale, Steven M. Pike, Virginie Sanial Jan 2020

Distribution And Evolution Of Fukushima Dai-Ichi Derived 137cs, 90sr, And 129i In Surface Seawater Off The Coast Of Japan, Jennifer A. Kenyon, Ken O. Buesseler, Núria Casacuberta, Maxi Castrillejo, Shigeyoshi Otosaka, Pere Masqué, Jessica A. Drysdale, Steven M. Pike, Virginie Sanial

Research outputs 2014 to 2021

© 2020 American Chemical Society. The Fukushima Dai-ichi Nuclear Power Plants (FDNPPs) accident in 2011 led to an unprecedented release of radionuclides into the environment. Particularly important are 90Sr and 137Cs due to their known health detriments and long half-lives (T1/2 ≈ 30 y) relative to ecological systems. These radionuclides can be combined with the longer-lived 129I (T1/2 = 15.7 My) to trace hydrologic, atmospheric, oceanic, and geochemical processes. This study seeks to evaluate 137Cs, 90Sr, and 129I concentrations in seawater off the coast of Japan, reconcile the sources of contaminated waters, and assess the application of 137Cs/90Sr, 129I/137Cs, and …


Do Environmental And Financial Performances Affect Environmental Disclosures? Evidence From Listed Companies In Indonesia, Indah Fajarini Sri Wahyuningrum, Mochamad Arief Budihardjo, Fadel Iqbal Muhammad, Hadrian Geri Djajadikerta, Terri Trireksani Jan 2020

Do Environmental And Financial Performances Affect Environmental Disclosures? Evidence From Listed Companies In Indonesia, Indah Fajarini Sri Wahyuningrum, Mochamad Arief Budihardjo, Fadel Iqbal Muhammad, Hadrian Geri Djajadikerta, Terri Trireksani

Research outputs 2014 to 2021

© 2020 by author(s) and VsI Entrepreneurship and Sustainability Center. The number of companies in Indonesia that have participated in environmental-related activities continues to grow. Some of these companies have also engaged and implemented an assessment program called Program for Pollution Control, Evaluation, and Rating (PROPER). This assessment program was initially launched by the Indonesian Ministry of Environment in 1995 to measure and rate the environmental performance of companies in Indonesia. They have also administered an environmental management system as part of their environmental protection initiatives. However, the level of environmental disclosure by these companies is still low. This may …


Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm Jan 2020

Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm

Research outputs 2014 to 2021

© 2020 The Author(s) Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise data from a broad range of Internet of Things devices, across complex environment(s) to solve different problems. This paper surveys existing literature on the potential of using supervised classical machine learning techniques, such as K-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing live digital forensics for different IoT configurations. There are also a number of challenges associated with the use of machine learning techniques, as discussed in this paper.


Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende Jan 2016

Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende

Australian Information Security Management Conference

Throughout the past decade the methods employed by terrorist organisations have changed drastically. One of these key changes has been associated with the rise of social media such as Facebook, Twitter, YouTube and blogging in general. Terrorist organisations appear to be using the wide reach and vast network capabilities created by social media to disseminate propaganda, radicalise susceptible individuals, recruit potential fighters and communicate strategic and operational objectives. However, this growing terrorist presence on Social Media can also offer invaluable insights into the social networks of terrorist organisations through the use of Social Media Mining and Social Network Analysis. By …


Establishing Effective And Economical Traffic Surveillance In Tonga, Brian Cusack, George Maeakafa Jan 2016

Establishing Effective And Economical Traffic Surveillance In Tonga, Brian Cusack, George Maeakafa

Australian Digital Forensics Conference

The Pacific Islands are seriously challenged by the growth in wealth and the expansion of international material possessions. On the roads traffic has grown dramatically and the types of vehicles now using Island roads has greatly changed. With the importation of cheap second hand vehicles designed for freeway speeds serious safety issues have grown proportionally with the increasing numbers. In this research we consider the prohibitive costs of traditional traffic controls to economy and propose a light weight highly mobile aerial surveillance system that integrates with ground policing capability. Our research question was: How can road safety and security be …


An Investigation Of Potential Wireless Security Issues In Traffic Lights, Brian Bettany, Michael N. Johnstone, Matthew Peacock Jan 2016

An Investigation Of Potential Wireless Security Issues In Traffic Lights, Brian Bettany, Michael N. Johnstone, Matthew Peacock

Australian Information Security Management Conference

The purpose of automated traffic light systems is to safely and effectively manage the flow of vehicles through (usually) urban environments. Through the use of wireless-based communication protocols, sets of traffic lights are increasingly being connected to larger systems and also being remotely accessed for management purposes, both for monitoring and emergency purposes. These protocols, however, were not designed with security as a primary requirement, thus systems may operate with sub-standard or non-existent security implementations. This research aims to test if the same issues and vulnerabilities that appear to be present in traffic light systems in the USA are prevalent …


Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast Jan 2015

Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast

Australian Security and Intelligence Conference

The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of commercially available drones (VTOL) that cost less than $1000 (Cheap is a relative term and we consider anything less than $5000 relatively cheap). The assessment reviews the capability to provide secure and safe motor vehicle surveillance for conformance intelligence. The evaluation was conducted by initially estimating a set of requirements that would satisfy an ideal surveillance situation and then by comparing a sample of …


Volume Reduction Of Municipal Solid Wastes Contaminated With Radioactive Cesium By Ferrocyanide Coprecipitation Technique, Y. Fujikawa, H. Ozaki, H. Tsuno, P. Wei, A. Fujinaga, R. Takanami, S. Taniguchi, S. Kimura, R.R. Giri, P. Lewtas Jan 2015

Volume Reduction Of Municipal Solid Wastes Contaminated With Radioactive Cesium By Ferrocyanide Coprecipitation Technique, Y. Fujikawa, H. Ozaki, H. Tsuno, P. Wei, A. Fujinaga, R. Takanami, S. Taniguchi, S. Kimura, R.R. Giri, P. Lewtas

Research outputs 2014 to 2021

Municipal solid wastes (MSW) with elevated concentrations of radioactive cesium (rad-Cs hereafter) have been generated in some areas of Japan in the aftermath of the Fukushima Daiichi Nuclear Power Plant (F1 hereafter) accident. Both recycling and final disposal of the contaminated MSW have become a difficult problem in the affected areas, resulting in accumulation of treated residues in the treatment facilities. The rad-Cs in MSW, especially fly ash, often showed a high leaching rate. Extraction of contaminated MSW with water or hot oxalic acid followed by selective removal of rad-Cs from the extract using ferrocyanide (Fer hereafter) coprecipitation technique could …


7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University Jan 2014

7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University

Australian Security and Intelligence Conference

No abstract provided.


A Pre & Post Analysis Of The Impact Of Carbon Regulation & Ratification Of The Kyoto Protocol: An Australian Perspective, Maya Purushothaman, Ross Taplin Jan 2011

A Pre & Post Analysis Of The Impact Of Carbon Regulation & Ratification Of The Kyoto Protocol: An Australian Perspective, Maya Purushothaman, Ross Taplin

Research outputs 2011

This study examines emission and energy disclosures of 400 randomly selected Australian listed companies in 2005, 2007 and 2009 using a disclosure index derived from the Global Reporting Initiative. The longitudinal nature of this study provides a more comprehensive view of the online emissions and energy disclosures of Australian companies and highlights the impact of the ratification of the Kyoto Protocol and the introduction of carbon regulations, National Greenhouse and Energy Reporting (NGER) and Energy Efficiency Opportunities (EEO).The results were compared between the two periods, it was noted that rate of increase was lower during the latter (2007 to 2009) …


Professional Intelligence Judgement Artistry: Some Early Observations, Jeff Corkill Jan 2009

Professional Intelligence Judgement Artistry: Some Early Observations, Jeff Corkill

Australian Security and Intelligence Conference

Intelligence analysis is critical national security and law enforcement function dependant on the intellectual capacity of individual analysts. The practice of intelligence is undertaken in an extremely complex environment often under a veil of secrecy, and where uncertain and deceptive information represents the norm. In order to develop as a profession appropriate constructs with which to explore and explain how analysts process intelligence, make decisions and reach judgements are needed. An improved understanding will offer opportunities to develop appropriate training and professional development for intelligence analysts. This paper introduces the construct of Professional Intelligence Judgement Artistry together with some very …


An Analysis Of The Monitored Electronic Alarm Activations In The Perth Metropolitan Area, Lynnette M. Bloom, James M. Cross, David Mcdougall Jan 1991

An Analysis Of The Monitored Electronic Alarm Activations In The Perth Metropolitan Area, Lynnette M. Bloom, James M. Cross, David Mcdougall

Research outputs pre 2011

This study as indicated in [7] was carried out under the auspices of Edith Cowan University's Institute of Security and Applied Technology and had the support of the Western Australian Police and the Perth-based Central Monitoring Agencies. The data analysed was obtained essentially from Police records, backed up by data from two of Perth's larger security companies, and consists of all the monitored alarms in the Perth Metropolitan Area which were attended by the police in the months of May and September 1989.In our consideration of the frequency of alarms by time of day and day of week, and the …