Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection ....Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection mandates on both immediate protection goals and the wider goals of peacekeeping. This project aims to assess the impact of the implementation of mandates to use force to protect civilians. Through a focused comparison of six missions, it plans to identify what works, what doesn't, and the factors which determine these outcomes in order to identify ways of improving performance in the future.Read moreRead less
An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Toward inclusive peace. Toward inclusive peace. This project will investigate how peace agreements can advance women’s rights and participation after post-conflict and political transitions. It will examine the relationship between women’s presence in peacemaking processes, women’s rights and gender provisions in peace agreements, and women’s participation in post-conflict governance of countries with successful peace agreements. Women’s participation in peace processes makes a successful peace ....Toward inclusive peace. Toward inclusive peace. This project will investigate how peace agreements can advance women’s rights and participation after post-conflict and political transitions. It will examine the relationship between women’s presence in peacemaking processes, women’s rights and gender provisions in peace agreements, and women’s participation in post-conflict governance of countries with successful peace agreements. Women’s participation in peace processes makes a successful peace agreement likelier, but may not consolidate peace or lead to greater participation by women in the governance of the country. Anticipated outcomes are analysis of the relationship between peace processes and gender equality in conflict-affected societies; improved consular delivery of aid programmes in fragile states; and targeted air delivery that empowers women.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Au ....Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Australian public sector. By identifying and promoting current best practice in workplace responses to public interest whistleblowing, the project will use the experience and perceptions of internal witnesses and first- and second-level managers to identify more routine strategies for preventing, reducing and addressing reprisals and other whistleblowing-related conflicts.Read moreRead less
Printable technologies for high security documents and consumer products. Printable technologies for high security documents and consumer products. This project aims to develop two next-generation printable security feature technologies to protect users from counterfeiting, which costs the world economy billions in lost revenue and undermines the security of citizens. First, it aims to enhance the security of banknotes by developing printable active device patches with energy harvesting flexible ....Printable technologies for high security documents and consumer products. Printable technologies for high security documents and consumer products. This project aims to develop two next-generation printable security feature technologies to protect users from counterfeiting, which costs the world economy billions in lost revenue and undermines the security of citizens. First, it aims to enhance the security of banknotes by developing printable active device patches with energy harvesting flexible polymers as a power source and thin film graphene/polymer nanomaterial as an electrode/energy storage media. Second, it aims to design invisible carbon nanotube inks for optical authentication via near infrared activation. Both technologies are expected to thwart sophisticated counterfeits, particularly those supported by organised crime.Read moreRead less
Measuring the Commercial Real Estate Sector in Australia. This project aims to address a significant gap in our understanding of the Australian commercial real estate sector. It will use detailed data to develop sophisticated models of the prices of commercial buildings. Expected outcomes include a suite of commercial real estate price indexes for Australia, by region and property type, and a comprehensive and transparent examination of the methods used to construct them. This will shed light on ....Measuring the Commercial Real Estate Sector in Australia. This project aims to address a significant gap in our understanding of the Australian commercial real estate sector. It will use detailed data to develop sophisticated models of the prices of commercial buildings. Expected outcomes include a suite of commercial real estate price indexes for Australia, by region and property type, and a comprehensive and transparent examination of the methods used to construct them. This will shed light on a hitherto poorly measured sector and provide significant benefits by better informing market participants, guiding statistical agencies in developing such measures and better-enabling policymakers, banks, superfunds and macroprudential authorities to understand the risk profile of the sector.Read moreRead less