Proceedings of the Australia-China Wetland Network Research Partnership Symposium
- Authors: Kattel, Giri
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: This publication is a compilation of short papers presented at the Australia-China Wetland Network Research Partnership Symposium, held in China at the Nanjing International Conference Hotel, 24 March 2014. The symposium, jointly organised by the Collaborative Research Network (CRN) of Federation University Australia and the Nanjing Institute of Geography and Limnology Chinese Academy of Sciences (NIGLAS), brought together a range of scientists including the neo-ecologists, palaeoecologists and hydrologists from both Australia and China. More than 100 students and scientists from across China attended the symposium. A majority of papers presented at the symposium have overlapping themes between ecology and hydrology of the large river and wetland systems that are exposed to a range of impacts posed by humans and recent climate change. The research focus of this volume is around the topic highlighting the conservation and management of degraded wetlands in Australia and China and the maintenance of a long term ecological resilience.
- Authors: Kattel, Giri
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: This publication is a compilation of short papers presented at the Australia-China Wetland Network Research Partnership Symposium, held in China at the Nanjing International Conference Hotel, 24 March 2014. The symposium, jointly organised by the Collaborative Research Network (CRN) of Federation University Australia and the Nanjing Institute of Geography and Limnology Chinese Academy of Sciences (NIGLAS), brought together a range of scientists including the neo-ecologists, palaeoecologists and hydrologists from both Australia and China. More than 100 students and scientists from across China attended the symposium. A majority of papers presented at the symposium have overlapping themes between ecology and hydrology of the large river and wetland systems that are exposed to a range of impacts posed by humans and recent climate change. The research focus of this volume is around the topic highlighting the conservation and management of degraded wetlands in Australia and China and the maintenance of a long term ecological resilience.
The importance of mandatory data breach notification to identity crime
- Holm, Eric, Mackenzie, Geraldine
- Authors: Holm, Eric , Mackenzie, Geraldine
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identity crime. Initiatives around data breach notification have become increasingly prevalent and are now seen in many State legislatures in the United States and overseas. The Australian Government is currently in the process of introducing mandatory data breach notification laws. This paper explores the introduction of mandatory data breach notification in Australia, and lessons learned from the experience in the US, particularly noting the link between data breaches and identity crime. The paper proposes that through the introduction of such laws, identity crimes are likely to be reduced.
- Authors: Holm, Eric , Mackenzie, Geraldine
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identity crime. Initiatives around data breach notification have become increasingly prevalent and are now seen in many State legislatures in the United States and overseas. The Australian Government is currently in the process of introducing mandatory data breach notification laws. This paper explores the introduction of mandatory data breach notification in Australia, and lessons learned from the experience in the US, particularly noting the link between data breaches and identity crime. The paper proposes that through the introduction of such laws, identity crimes are likely to be reduced.
- Mala-Jetmarova, Helena, Schwarz, S., Barton, Andrew, Le Roux, S, Smalley, P., Gerke, S.
- Authors: Mala-Jetmarova, Helena , Schwarz, S. , Barton, Andrew , Le Roux, S , Smalley, P. , Gerke, S.
- Date: 2011
- Type: Text , Conference proceedings
- Full Text: false
- Description: Hydraulic simulation models have become a valuable tool to manage water distribution networks commencing from their initial design through their operation, assessment of the level of service to customers, system performance improvement, analysis of planning alternatives, to system optimisation. The development of hydraulic models can be a time consuming task with complex and large scale water distribution networks being particularly challenging. The Wimmera Mallee Pipeline (WMP) in Western Victoria, Australia is a recently constructed and unique regional scale water distribution system which consists of over 8,800 km of pressurised pipelines spreading across an area of approximately 20,000 km 2. Currently, the WMP provides water to 34 townships, rural farms and other water users across the Wimmera Mallee region with an annual design capacity of 31.6 mil. m 3. The WMP sources its water from multiple reservoirs in the Grampians mountain ranges in the south and the River Murray in the north. Grampians Wimmera Mallee Water (GWMWater) is the local water organisation responsible for managing the WMP. GWMWater is currently initiating the development of a water market to generate and support growth, and to ensure that water is available for the highest value social, economic or environmental use. The hydraulic models discussed in this paper will assure that informed decisions are made by GWMWater regarding the capacity to deliver water through the pipeline system, and therefore the extent of trade by customers. The philosophy for development of the WMP hydraulic models was to replicate the real system as credibly as possible into the level of required accuracy for decision making, yet enable simple model operation, maintenance and update. The network is modelled to the individual customer level in order to accommodate small diameter pipes. Modelling at this level simplifies the future model maintenance and updates, and also ensures the compatibility with other GWMWater's systems such as Geographic Information System (GIS) and the customer database. A major part of the model development consisted of data preparation. This was undertaken by using "as constructed" GIS asset data captured during the WMP construction and entered into a GIS database (ArcGIS by ESRI). Due to the scale of the system and associated amounts of data, it was essential to develop sophisticated data transformation and validation procedures to simplify the model build which thereby minimised manual data entry and potential sources of errors. This paper focuses on the methodologies and techniques used in data preparation for hydraulic models and development of hydraulic models. An example is also provided of how the models will be used as a decision support tool in water supply and allocation planning.
Terrorism and simulation of terrorist incidents across Critical Infrastructure
- Birkett, Dave, Mala-Jetmarova, Helena
- Authors: Birkett, Dave , Mala-Jetmarova, Helena
- Date: 2011
- Type: Text , Conference proceedings
- Full Text: false
- Description: Terrorism has progressed to a global phenomenon as a terrorist attack has an immediate effect on society not only in the targeted area, but also across the rest of the world. Acts of terrorism are extremely difficult to predict or provide early warning in most cases. In consideration of Australia, which is to a certain extent insulated from the rest of the world by virtue of the sea barrier, there is a history of terrorist incidents reported back to the 1970s. Since the attack on New York in September 2001, the level of terrorism alert to Australia has increased significantly with a current 'Medium' national level of threat. Critical Infrastructure (CI), which is considered essential for contemporary social human existence, has been impacted by multiple and variable external threats in modern times. The destruction at Chernobyl in 1986 and more recent events such as the terrorist incidents at Madrid in 2004, London in 2005, Moscow in 2011 and the tsunami in Japan in 2011 indicate the vulnerability of this infrastructure. Such events translate to threats from both natural disasters referred to as all hazard origin and human interventions such as terrorism. Subsequently, some private and government organisations of CI now regularly rehearse and simulate models of both terrorist incidents and all hazard events as a proactive protection strategy and business continuity process. These models are implemented in a form of scripted Crisis Simulation Exercises (CSE) which simulate a crisis within an organisation in order to strengthen an organisation's ability to manage crisis situations. CI organisations which adopt these strategies are able to mitigate impact of these crises and therefore, are considered to reflect a more resilient organisation to the effects of external impact. CSEs test plans, procedures, equipment and personnel to industry standards required. Within the spectrum of counter-terrorism in particular, the CSEs are becoming more sophisticated and reflective of reality with incorporation of live actions to ensure credibility and reality. The simulated scenario may include a variety of attack methodologies such as biological, chemical, cyber and conventional bombs/blasts and bullets to maintain exercise standards with continuously developing technology of terrorist attacks. This paper defines the topic of terrorism with the profile of terrorists, and examines the terrorism concept and environment both in Australia and internationally including future considerations. It also provides an overview of the simulated framework for mitigation of crisis associated with CI protection with an Australian perspective, suitable for CI protection worldwide. Additionally, this paper examines the concept of terrorism simulation, illustrating a strong case for future simulation progression with some innovative ideas and futuristic predictions as to where terrorist simulations may advance to across the future.
Virtual teams : Worlds apart
- Authors: Knox, Ian , Wilmott, Deirdre
- Date: 2008
- Type: Text , Conference proceedings
- Full Text:
- Description: Virtual teams are a relatively new phenomenon. A number of studies have focused on the description of team development and the group process of virtual learning teams as they form. This paper is a study of how Australian and American undergraduates worked together in virtual teams to respond to ethical and business practice problems for a given scenario. The study specifically examined the communication methods, task completion methodology and cultural differences exhibited by two undergraduate classes from the University of Ballarat, Ballarat Australia and Jacksonville State University, Jacksonville, Alabama, United States. Both synchronous and asynchronous communications methods were used with differing levels of enthusiasm and acceptance. Although the study was based on a small sample, which limits its generalisability, there are implications to inform those who are considering similar methods in their teaching. © 2008 Ian Knox and Deirdre Wilmott.
- Description: 2003010647
- Authors: Knox, Ian , Wilmott, Deirdre
- Date: 2008
- Type: Text , Conference proceedings
- Full Text:
- Description: Virtual teams are a relatively new phenomenon. A number of studies have focused on the description of team development and the group process of virtual learning teams as they form. This paper is a study of how Australian and American undergraduates worked together in virtual teams to respond to ethical and business practice problems for a given scenario. The study specifically examined the communication methods, task completion methodology and cultural differences exhibited by two undergraduate classes from the University of Ballarat, Ballarat Australia and Jacksonville State University, Jacksonville, Alabama, United States. Both synchronous and asynchronous communications methods were used with differing levels of enthusiasm and acceptance. Although the study was based on a small sample, which limits its generalisability, there are implications to inform those who are considering similar methods in their teaching. © 2008 Ian Knox and Deirdre Wilmott.
- Description: 2003010647
Changing fluxes of sediments and salts as recorded in lower River Murray wetlands, Australia
- Gell, Peter, Fluin, Jennie, Tibby, John, Haynes, Deborah, Khanum, Syeda, Walsh, Brendan, Hancock, Gary, Harrison, Jennifer, Zawadzki, Atun, Little, Fiona
- Authors: Gell, Peter , Fluin, Jennie , Tibby, John , Haynes, Deborah , Khanum, Syeda , Walsh, Brendan , Hancock, Gary , Harrison, Jennifer , Zawadzki, Atun , Little, Fiona
- Date: 2006
- Type: Conference proceedings
- Full Text:
- Description: The River Murray basin, Australia's largest, has been significantly impacted by changed flow regimes and increased fluxes of salts and sediments since settlement in the 1840s. The river's flood plain hosts an array of cut-off meanders, levee lakes and basin depression lakes that archive historical changes. Pre-European sedimentation rates are typically approx. 0.1-1 mm year-1, while those in the period after European arrival are typically 10 to 30 fold greater. This increased sedimentation corresponds to a shift in wetland trophic state from submerged macrophytes in clear waters to phytoplankton-dominated, turbid systems. There is evidence for a decline in sedimentation in some natural wetlands after river regulation from the 1920s, but with the maintenance of the phytoplankton state. Fossil diatom assemblages reveal that, while some wetlands had saline episodes before settlement, others became saline after, and as early as the 1880s. The oxidation of sulphurous salts deposited after regulation has induced hyperacidity in a number of wetlands in recent years. While these wetlands are rightly perceived as being heavily impacted, other, once open water systems, that have infilled and now support rich macrophyte beds, are used as interpretive sites. The rate of filling, however, suggests that the lifespan of these wetlands is short. The rate of wetland loss through such increased infilling is unlikely to be matched by future scouring as regulation has eliminated middle order floods from the lower catchment.
- Authors: Gell, Peter , Fluin, Jennie , Tibby, John , Haynes, Deborah , Khanum, Syeda , Walsh, Brendan , Hancock, Gary , Harrison, Jennifer , Zawadzki, Atun , Little, Fiona
- Date: 2006
- Type: Conference proceedings
- Full Text:
- Description: The River Murray basin, Australia's largest, has been significantly impacted by changed flow regimes and increased fluxes of salts and sediments since settlement in the 1840s. The river's flood plain hosts an array of cut-off meanders, levee lakes and basin depression lakes that archive historical changes. Pre-European sedimentation rates are typically approx. 0.1-1 mm year-1, while those in the period after European arrival are typically 10 to 30 fold greater. This increased sedimentation corresponds to a shift in wetland trophic state from submerged macrophytes in clear waters to phytoplankton-dominated, turbid systems. There is evidence for a decline in sedimentation in some natural wetlands after river regulation from the 1920s, but with the maintenance of the phytoplankton state. Fossil diatom assemblages reveal that, while some wetlands had saline episodes before settlement, others became saline after, and as early as the 1880s. The oxidation of sulphurous salts deposited after regulation has induced hyperacidity in a number of wetlands in recent years. While these wetlands are rightly perceived as being heavily impacted, other, once open water systems, that have infilled and now support rich macrophyte beds, are used as interpretive sites. The rate of filling, however, suggests that the lifespan of these wetlands is short. The rate of wetland loss through such increased infilling is unlikely to be matched by future scouring as regulation has eliminated middle order floods from the lower catchment.
- «
- ‹
- 1
- ›
- »