Uncovering the organisational dynamics of pirates and maritime terrorists. This project will develop a novel framework to assess the organisational dynamics of two major maritime threats: piracy syndicates and maritime-capable terrorist groups. The results will allow analysts and policymakers to understand the behaviour of violent maritime organisations, and to maximise the effectiveness of policies designed to stop them.
Developing Australia's legal response to military and security applications of nanotechnology. A critical regulatory gap exists for military applications of nanotechnology under international law. This project will provide a conceptual framework and policy options to develop Australia's legal response to the use of nanotechnology in military and security settings through collaborations with experts in the United States.
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
The World's Most Enterprising Country: North Korea's Survival in the Global Economy. This project explores the seeming paradox at the heart of North Korea: The most politically isolated state in the world sustains itself economically in large part by international trade and integration into the global economy. Adopting a framework from the economic geography literature, the project will use archival and field research to address how the North Korean state and its citizens use trade networks in E ....The World's Most Enterprising Country: North Korea's Survival in the Global Economy. This project explores the seeming paradox at the heart of North Korea: The most politically isolated state in the world sustains itself economically in large part by international trade and integration into the global economy. Adopting a framework from the economic geography literature, the project will use archival and field research to address how the North Korean state and its citizens use trade networks in East Asia and beyond to ensure their economic survival in the face of a hostile political environment. This will allow analysts to assess the implications of North Korea's economic integration for the country's development, as well as the effect that North Korea’s unique integration into the global economy has on regional and global stability.Read moreRead less
Extended Nuclear Deterrence and the Restraint of Non-Nuclear Allies: Material Cooperation and Strategic Dialogue. Extended nuclear deterrence is central to the security commitments offered by the US to its European and Asian allies, but little is known about why non-nuclear allies ask for the nuclear assurances they do and how they influence the assurances they ultimately receive. Using the lenses of intra-alliance bargaining, the role and composition of assurances, and domestic and internationa ....Extended Nuclear Deterrence and the Restraint of Non-Nuclear Allies: Material Cooperation and Strategic Dialogue. Extended nuclear deterrence is central to the security commitments offered by the US to its European and Asian allies, but little is known about why non-nuclear allies ask for the nuclear assurances they do and how they influence the assurances they ultimately receive. Using the lenses of intra-alliance bargaining, the role and composition of assurances, and domestic and international interactions, the project investigates why non-nuclear allies often seek modest extended nuclear deterrence guarantees when they could push for more ambitious commitments. The outcomes of the project will advance theoretical understanding of alliances, assurance and nuclear strategy, with direct relevance to foreign policy and nuclear disarmament.Read moreRead less
LittleBrother: Vision Systems Supporting Detection of Offenders in Public Places. Current visual surveillance systems can track people in an area only if complete camera coverage is provided. This project will develop a visual surveillance system able to track and record people's movements in a public building requiring only limited visual coverage. We will propose novel ways of matching images of a single individual from distant cameras by using features such as color histograms decomposed for ....LittleBrother: Vision Systems Supporting Detection of Offenders in Public Places. Current visual surveillance systems can track people in an area only if complete camera coverage is provided. This project will develop a visual surveillance system able to track and record people's movements in a public building requiring only limited visual coverage. We will propose novel ways of matching images of a single individual from distant cameras by using features such as color histograms decomposed for the different body parts, estimated height, and build type. Creating a record with this tracking information will effectively support security officers in the identification of responsible parties in the event of an offence.Read moreRead less
Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection ....Civilian Protection and the Use of Force in UN Peacekeeping Operations. This project seeks to evaluate the use of force to protect civilians in United Nations peacekeeping. United Nations peacekeepers are on the frontline of efforts to protect civilians from violence. More than 100 were killed in 2014. Hundreds of thousands of civilians depend on peacekeepers for their safety. To date, however, there has been little systematic evaluation of the impact of the use of force for civilian protection mandates on both immediate protection goals and the wider goals of peacekeeping. This project aims to assess the impact of the implementation of mandates to use force to protect civilians. Through a focused comparison of six missions, it plans to identify what works, what doesn't, and the factors which determine these outcomes in order to identify ways of improving performance in the future.Read moreRead less
Foundations for Physically Unclonable nano-Security on Silicon. This project aims to develop an on-chip physical unclonable function (PUF) based on recent progress in nanotechnology to generate unprecedented number of unique signatures. This is significant because these signatures can be used for preventing fraud and counterfeiting, protecting sensitive data and securing communications. PUFs will play an extremely vital role in future security systems. The PUF in the proposed project will be sim ....Foundations for Physically Unclonable nano-Security on Silicon. This project aims to develop an on-chip physical unclonable function (PUF) based on recent progress in nanotechnology to generate unprecedented number of unique signatures. This is significant because these signatures can be used for preventing fraud and counterfeiting, protecting sensitive data and securing communications. PUFs will play an extremely vital role in future security systems. The PUF in the proposed project will be simple, fast, tiny, energy efficient and highly secure as a result of the abundant nano-fabrication variations. The outcome of this project will be a prototype of a super high secure nanoelectronic-based PUF that will be tested to evaluate the technology and its security against malicious attacks.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less