The four themes for GovHack 2013 are:
- Open Government
- Digital Humanities
- Data Journalism
On a similar theme, the Australian National University is hosting "Start-Up Camp Canberra 2013" from 6pm Friday 14 June to 5pm Sunday 16 June 2013.
JOIN THE CHALLENGE AND BUILD A START-UP IN ONE WEEKEND!Start-Up Camp
Looking for an opportunity to re-live the heady days of the late 1990s when geeks with a cool idea for the next 'killer application' became instant millionaires?
Over the course of a single weekend, teams will be formed, brainstorms will result in idea tsunamis, business strategies developed, code written and (hopefully) a web application launched to the world.
- Workshops on lean start-up, marketing and deployment strategy
- Interactive innovation thinking sessions
- Talks and mentoring from successful entrepreneurs
- Food and caffeine to sustain your momentum
- Sunday pitch presentation to a panel of high-profile web technology investors, experts and successful entrepreneurs
PUSH YOUR BOUNDARIES . . .
REGISTER A TEAM OR AS AN INDIVIDUAL!
Start-Up Camp Canberra 2013 will run from 6pm Friday 14 June to 5pm Sunday 16 June 2013
The ANU College of Business and Economics (Kingsley St, ANU) ...
NOT REQUIRED: prior skills or knowledge.
Thanks to the support of ANU and UC, free for participants affiliated with these institutions. Other participants will be asked to make a $50 contribution for catering.
Go to Eventbrite: http://startupcampcanberra4.eventbrite.com/
Early Career Academics (ECA) are under increasing pressure to teach, as well as research. While PHD graduates have extensive experience of the university system, most have no formal education or training in how to teach. Some formal training in how to design and deliver courses would greatly reduce the frustration new academics, and their students, feel. ECAs would benefit from the discipline which comes from designing courses for pure on-line delivery, even if a face-to-face component is used later. This is illustrated in my experience of designing an award winning course in ICT Sustainability, which is now offered by universities in Australia and North America. Massive Open Online Courses (MOOCs) have recently come to prominence. Some of the techniques of these can be combined with conventional teaching for easy adoption by ECAs, using synchronized asynchronous e-learning with a linear syllabus, or for short: "MOOCs with Books".
ANU CECS SEMINAR SERIES
Dr Robert Layton, Research Associate (ICSL, University of Ballarat )CECS SEMINAR SERIES
TIME: 15:00:00 - 16:00:00
LOCATION: CSIT Seminar Room, N101
In this talk, Robert will be discussing some of the issues relating to indirect attribution of cybercrime, and how authorship analysis provides techniques to overcome issues of traceability on the internet. Further, he will discuss the state-of-the-art in authorship analysis, as applied to written documents. Finally, he will discuss some of the clues that are appearing within these techniques for attribution studies in non-written documents and how this relates to some other techniques in machine learning.
Dr. Robert Layton is a researcher at the Internet Commerce Security Laboratory (ICSL) at the University of Ballarat. His research investigates authorship analysis methods, particularly in unsupervised applications to cybercrime. He completed his PhD in 2011, investigating an application of these techniques to phishing webpages, in order to determine the size and scope of the operations behind them. He is now continuing his research at the ICSL, working with industry partners Westpac, Australian Federal Police and IBM. Current projects include the application of the techniques to alias-matching in IRC rooms and online reviews.
Thursday, 20 June 2013 - 5:30pm - 6:30pmSpeaker: Dr Christopher Ward, Wentworth Selborne Chambers (Sydney)
An introduction to the numerous and overlapping disputes in the South China Sea, and the international legal framework within which they sit.
Dr Ward is a barrister based in Sydney with an extensive specialist practise in public international law. He has appeared in many contentious cases in fields including maritime boundaries and human rights. He is a visiting Fellow at the Centre for International and Public Law at the ANU and is the President of the International Law Association (Australian Branch).
Cyber2.82 The 2009 Defence White Paper acknowledged that national security could be compromised by cyber attacks on defence, government or commercial information networks. Cyber security continues to be a serious and pressing national security challenge. The seriousness of the cyber threat was affirmed in 2011 when Australia and the US confirmed the applicability of the ANZUS Treaty to cyber attacks. This further emphasised the need for capabilities that allow us to gain an advantage in cyberspace, guard the integrity of our information, and ensure the successful conduct of operations.
2.83 Australia, advantaged by the cyber dimension of our international strategic partnerships, should find that the rise of cyber power has at least as many pluses as minuses. But the net effect on Australia’s position will depend on how well we exploit cyber power, including working with partners and integrating cyber power into national strategy and a whole-of-nation effort.
2.84 The potential impact of malicious cyber activity has grown with Defence’s increasing reliance on networked operations. Reducing Defence’s vulnerability to cyber attacks or intrusions in a crisis or conflict will remain a high priority. This includes protection of deployed networks and information systems. In a future conflict or escalation to conflict, an adversary could use a cyber attack against Australia to deter, delay or prevent Australia’s response or the ADF’s deployment of forces. This would probably include the targeting of information systems, networks and broader support infrastructure perceived to be integral to the ADF’s decision-making and war-fighting capabilities. Once deployed, our forces will need to operate as a networked force in a contested environment.
2.85 It is equally important to protect information in peacetime. Australia’s national security, economic prosperity and social wellbeing now depend on the internet and the security of information. Compromise of Australian Government information could allow an adversary to gain economic, diplomatic or political advantage over us. Compromise of commercial, government or private citizens’ information would undermine public and international confidence in Australia as a secure digital environment.
2.86 Defence capability would be seriously undermined by compromised sensitive information on command and control, operational planning, platform design or weapon system performance. Additionally, without effective mitigation and protection measures in place, the costs to Defence of addressing cyber intrusions could far outweigh the effort expended by an adversary.
2.87 Understanding of the cyber threat has increased markedly since the 2009 Defence White Paper.
The establishment of the Cyber Security Operations Centre (CSOC) within the Defence Signals Directorate (DSD) – to be renamed the Australian Signals Directorate – has allowed the development of a comprehensive understanding of the cyber threat environment and coordinated responses to malicious cyber events that target government networks. Through the CSOC, Australia has increased its intrusion detection, analytic and threat assessment capabilities, and improved its capacity to respond to cyber security incidents.
2.88 Within Defence, there is also a significant body of work to be done to ensure the security and resilience of defence systems in this environment. Network and system management, along with personnel and physical security need to be strengthened as part of our response.
2.89 Australia works within the framework of its traditional defence and intelligence and broader national security relationships to counter cyber threats. More broadly, Australia believes that the existing framework of international law, including the UN Charter and international humanitarian law, applies to cyberspace. Australia is participating in international efforts to achieve a common understanding of these laws.
2.90 In January 2013, the Prime Minister announced the establishment of a new Australian Cyber Security Centre to improve partnerships between government Agencies and with industry. The Centre will bring together cyber security capabilities from across the national security community, fully located in one facility. DSD’s CSOC, other elements of DSD’s Cyber Security Branch, the Attorney-General’s Computer Emergency Response Team Australia, the Australian Security Intelligence Organisation’s Cyber Espionage Branch, elements of the Australian Federal Police’s High-Tech Crime Operations capability and all-source-assessment analysts from the Australian Crime Commission will be co-located. This will facilitate faster and more effective responses to serious cyber incidents, and provide a comprehensive understanding of the threat to Australian Government networks and systems of national interest. The Centre will be overseen by a Board, led by the Secretary of the Attorney-General’s Department, with a mandate to report regularly to the National Security Committee of Cabinet.
2.91 Additional capability will be enhanced through participation of key industry and other private sector partners. Defence will play the principal role in the operation of the Centre and will continue to dedicate significant expertise to this important national capability.
From Defence White Paper 2013, Pages 20 and 21, Australian Government, May 2013
IR and friends
David Hawking (Funnelback)
Making the best of poor user queriesA common cause of user disappointment with search arises from difficulty in posing an effective query. Choosing a good query is particularly critical behind the firewall where SEO is virtually non-existent and where many useful ranking features are typically missing.
Over the decades, many techniques have been developed which can assist, either in guiding users to choose better queries or in improving the queries which are submitted: Query suggestion, query completion, query correction, query substitution, query expansion, query shortening, query segmentation, query translation and query blending.
In this talk I will review the state of the art in automatic query guidance and query improvement methods which are most useful in the context of enterprise search and demonstrate their operation.
CSIRO seminar room, 4-5
DesignGov, an experimental initiative of the Australian Public Service, is seeking your ideas about how the public service could better interact with business.
“Renewable Energy in Spain: Technology and Politics”
Public Lecture by Professor Cayetano López, Director General of CIEMAT
Thursday, 23 May 2013, 5.00pm drinks reception, lecture from 5.30 - 6.30pmRenewable Energy deployment in Spain has progressed rapidly in the past decade due to a convergence of several factors: a political will to meet the 2020 renewable energy and climate change objectives defined by the European Union, the existence of Research Centres that have spearheaded innovation and commercialisation of renewable energy technologies as well as large amount of private sector investment.
As a result, one third ofSpain’s electricity is generated from renewable sources. Spanish companies have also emerged as world leaders in a number of renewable energy technologies, notably wind power and concentrated solar. All this have been brought about by generous public funding schemes in R & D and early stage commercialisation as well as fiscal and regulatory policies supportive of a rapid expansion of the renewable energy market.
The European crisis have prompted significant policy changes that could jeopardise the continuity of existing support schemes and negatively affect the state of renewable energy in Spain. Professor Cayetano López, Director General of CIEMAT, describes the present situation and discusses the strengths and weaknesses of policy changes going forward.
CIEMAT is the leading public research institution that operates under key Spanish ministries, including the Ministry of Economics and Competitiveness and the Ministry of Research, Development and Innovation. Established in 1986, it promotes and carries out research and technological development projects of environmentally friendly energy technologies. It also aims at improving the competitiveness of existing renewable energy technologies in the global energy market. CIEMAT has six key facilities in Spain, including world renowned Plataforma Solar de Almería, the world leader in concentrated solar power research since 1977.
This event is jointly hosted by The ANU Energy Change Institute (ECI) and The Embassy of Spain. ECI combines leading research and teaching in energy technologies, efficiency, policy, law, sociology and economics. ECI Director Professor Ken Baldwin will chair the public lecture. Registration is essential.
Improving public preparedness through national public awareness campaignsPreparing for and responding to floods, fires and other hazards is not just a matter for government but is a responsibility shared across all levels of the community. Developing resilient communities where people understand their risks, have taken steps to anticipate disasters and to protect themselves and work with their neighbours, local leaders and with the emergency services to prepare for and deal with disasters is the ultimate goal of current government policy.
Communicating with communities to help them understand those risks, what they can expect from government and what they can do to help themselves is a critical step in achieving those objectives. This lecture will be of interest to anyone who needs to bring the community together to achieve common goals.
About the speakerRobert Jensen is Principal Deputy Assistant Secretary for Public Affairs with the United States’ Department of Homeland Security. He has over 32 years’ experience as a professional communicator including service in three US Government Departments and the White House. His experience includes leading multiple national awareness campaigns as well as coordinating government information campaigns following the Haiti earthquake and the Deepwater Horizon oil disaster.
ACS ICT Management SIG
ICT Enabled Change Transformation – Critical Success FactorsLarge, ICT enabled change programs are challenging undertakings. There have been many well-documented examples of organisations getting things wrong, but these experiences have generally created opportunities to learn and draw out insights on how to increase the chances of future success.
The past decade has seen a massive improvement in the functionality, configurability and process maturity of business process software. Improved User interoperability and the elimination of low value work through process automation means that managers can now have real time access to high quality data on the health and performance of their operations, leading to improved delivery times, better use of resources, greater client satisfaction and, for the Private Sector, improved margins and profitability.
Yet, for all the value, organisation’s are still struggling with the same old problems that have always plagued transformation projects. What are these problems and why do they continue impact on the success of implementation? Before embarking on a transformation project what do you need to have in place? And, having commenced, how do you ensure a successful outcome is achieved?
In this session, Randall and Phil Young will share some of their experiences in working on large change programs along with some of the factors they consider critical to the success of such complex endeavours.
Biography:Randall Brugeaud Chief Information Officer, ComSuper Presenter 1: Randall Brugeaud joined ComSuper as Chief Information Officer in July 2011. Randall has 23 years experience in technical and leadership roles and has worked in both the private and public sectors. Prior to joining ComSuper, Randall worked with the Department of Immigration and Citizenship, the Boston Consulting Group and was the founder and Director of an IT consulting company. He has been involved in a number of major ICT enabled change transformations, with the most significant being the Systems for People Program at the Department of Immigration and Citizenship. Randall holds a Master of Business Administration degree, a Graduate Diploma in Applied Computing and a Bachelor of Education degree.
Centenary Seminar Series 2013
“Planes, Trains and Regional Development”Stephen Byron, Capital Airport Group
5.30pm-7.00pm, Monday, 27 May 2013
Ann Harding Conference Centre, Building 24, University Drive South, University of Canberra
Capital Airport Group’s Stephen Byron will discuss how better infrastructure will have an impact on Canberra and the region.
The Canberra Airport has positioned itself in
2013/14 for international services following the completion of the new $480m terminal. Canberra and the communities in the region are set to benefit from this major upgrade.
Stephen studied Commerce and Law at the
Australian National University and was development manager for Capital Property Trust and Capital Property Corporation.
For more information, and to register for this event, contact:
Canberra Urban and Regional Futures
Campus map: http://www.canberra.edu.au/maps/printing