249 resultados para Message
Resumo:
Speeding remains a pervasive road safety problem, increasing both crash frequency and severity. Advertising countermeasures which aim to change individuals’ attitudes and behaviours are a key component in the array of countermeasures aimed at reducing this risky behaviour. Enhancing individuals’ perceptions of the personal relevance of such messages is important for increasing persuasiveness. This study examined what males and females reported as the most concerning aspects associated with (i) receiving a speeding fine, (ii) losing one’s license, and (iii) being involved in a crash. For each of these outcomes, a range of specific and appropriate aspects were assessed. For instance, in relation to receiving a fine, individuals reported the extent to which they would, for example, feel concerned about losing demerit points and paying more in insurance premiums. An online survey of 751 drivers (579 males; 16-79 years) was administered. When controlling for age, overall significant gender differences were found in relation to two of the three outcomes; receiving a fine and being in a crash. Follow-up tests of univariate effects revealed that females consistently reported being significantly more concerned than males on all aspects. Thus, for being fined, females were significantly more concerned with, for example, being caught and receiving a ticket in the mail; while, for being in a crash, specific aspects included, for example, injuring/killing oneself and seeing oneself as not a good/safe driver. The findings are discussed in terms of their implications for developing well-targeted messages aimed at discouraging drivers from speeding.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
Recent developments in wearable ECG technology have seen renewed interest in the use of Heart Rate Variability (HRV) feedback for stress management. Yet, little is know about the efficacy of such interventions. Positive reappraisal is an emotion regulation strategy that involves changing the way a situation is construed to decrease emotional impact. We sought to test the effectiveness of an intervention that used feedback on HRV data to prompt positive reappraisal during a stressful work task. Participants (N=122) completed two 20-minute trials of an inbox activity. In-between the first and the second trial participants were assigned to the waitlist control condition, a positive reappraisal via psycho-education condition, or a positive reappraisal via HRV feedback condition. Results revealed that using HRV data to frame a positive reappraisal message is more effective than using psycho-education (or no intervention)–especially for increasing positive mood and reducing arousal.
Resumo:
The Australian Commission on Safety and Quality in Health Care commissioned this rapid review to identify recent evidence in relation to three key questions: 1. What is the current evidence of quality and safety issues regarding the hospital experience of people with cognitive impairment (dementia/delirium)? 2. What are the existing evidence-based pathways, best practice or guidelines for cognitive impairment in hospitals? 3. What are the key components of an ideal patient journey for a person with dementia and/or delirium? The purpose of this review is to identify best practice in caring for patients with cognitive impairment (CI) in acute hospital settings. CI refers to patients with dementia and delirium but can include other conditions. For the purposes of this report, ‘Hospitals’ is defined as acute care settings and includes care provided by acute care institutions in other settings (e.g. Multipurpose Services and Hospital in the Home). It does not include residential aged care settings nor palliative care services that are not part of a service provided by an acute care institution. Method Both peer-reviewed publications and the grey literature were comprehensively searched for recent (primarily post 2010) publications, reports and guidelines that addressed the three key questions. The literature was evaluated and graded according to the National Health and Medical Research Council (NHMRC) levels of criteria (see Evidence Summary – Appendix B). Results Thirty-one recent publications were retrieved in relation to quality and safety issues faced by people with CI in acute hospitals. The results indicate that CI is a common problem in hospitals (upwards of 30% - the rate increases with increasing patient age), although this is likely to be an underestimate, in part, due to numbers of patients without a formal dementia diagnosis. There is a large body of evidence showing that patients with CI have worse outcomes than patients without CI following hospitalisation including increased mortality, more complications, longer hospital stays, increased system costs as well as functional and cognitive decline. 4 To improve the care of patients with CI in hospital, best practice guidelines have been developed, of which sixteen recent guidelines/position statements/standards were identified in this review (Table 2). Four guidelines described standards or quality indicators for providing optimal care for the older person with CI in hospital, in general, while three focused on delirium diagnosis, prevention and management. The remaining guidelines/statements focused on specific issues in relation to the care of patients with CI in acute hospitals including hydration, nutrition, wandering and care in the Emergency Department (ED). A key message in several of the guidelines was that older patients should be assessed for CI at admission and this is particularly important in the case of delirium, which can indicate an emergency, in order to implement treatment. A second clear mess...
Resumo:
Importance of the field: Reactive oxygen species (ROS) occur as natural by-products of oxygen metabolism and have important cellular functions. Normally, the cell is able to maintain an adequate balance between the formation and removal of ROS either via anti-oxidants or through the use specific enzymatic pathways. However, if this balance is disturbed, oxidative stress may occur in the cell, a situation linked to the pathogenesis of many diseases, including cancer. Areas covered in this review: HDACs are important regulators of many oxidative stress pathways including those involved with both sensing and coordinating the cellular response to oxidative stress. In particular aberrant regulation of these pathways by histone deacetylases may play critical roles in cancer progression. What the reader will gain: In this review we discuss the notion that targeting HDACs may be a useful therapeutic avenue in the treatment of oxidative stress in cancer, using chronic obstructive pulmonary disease (COPD), NSCLC and hepatocellular carcinoma (HCC) as examples to illustrate this possibility. Take home message: Epigenetic mechanisms may be an important new therapeutic avenue for targeting oxidative stress in cancer. © 2010 Informa UK, Ltd.
Resumo:
The 12th annual survey of Australian contact lens prescribing was conducted between January and April 2011, employing the same format as in previous years. About 3,000 optometrist members of Optometrists Association Australia were sent an e-mail message with a link to a downloadable questionnaire, and a request that this be accessed, printed and completed to provide details of the first 10 patients fitted with contact lenses after receipt of the questionnaire.
Resumo:
The 13th annual survey of Australian contact lens prescribing was conducted between January and April 2012. The same format as in previous years was employed. About 3,000 members of Optometrists Association Australia were sent an e-mail message with a link to a downloadable questionnaire, and a request that this be accessed, printed and completed to provide details of the first 10 patients fitted with contact lenses after receipt of the questionnaire.
Resumo:
This study assessed the revised Behavioural Inhibition System (BIS), as conceptualised by Gray and McNaughton’s (2000) revised RST, by exposing participants to a loss-framed road safety message (emphasising the negative consequences of speeding behaviour) and a high performance motor vehicle promotional advertisement. Licensed young drivers (N = 40, aged 17–25 years) were randomly allocated to view either the message or both the message and advertisement. Participants then completed a computerised lexical decision task prior to completing three personality measures: Corr-Cooper RST-PQ, CARROT and Q-Task. It was predicted that those with a stronger BIS would demonstrate greater processing of these mixed message cues compared to weaker BIS individuals, and that this BIS effect would only be observed in the mixed cues condition (due to simultaneous activation of the incentive and punishment systems). Preliminary findings will be discussed in the context of the influence of personality traits on health message processing.
Resumo:
Using Gray and McNaughton’s revised RST, this study investigated the extent to which the Behavioural Approach System (BAS) and the Fight-Flight-Freeze System (FFFS) influence the processing of gain-framed and loss-framed road safety messages and subsequent message acceptance. It was predicted that stronger BAS sensitivity and FFFS sensitivity would be associated with greater processing and acceptance of the gain-framed messages and loss-framed messages, respectively. Young drivers (N = 80, aged 17–25 years) viewed one of four road safety messages and completed a lexical decision task to assess message processing. Both self-report (e.g., Corr-Cooper RST-PQ) and behavioural measures (i.e., CARROT and Q-Task) were used to assess BAS and FFFS traits. Message acceptance was measured via self-report ratings of message effectiveness, behavioural intentions, attitudes and subsequent driving behaviour. The results are discussed in the context of the effect that differences in reward and punishment sensitivities may have on message processing and message acceptance.
Resumo:
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.
Resumo:
Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
Resumo:
Motivation Awareness is an integral part of remote collaborative work and has been an important theme within the CSCW research. Our project aims at understanding and mediating non-verbal cues between remote participants involved in a design project. Research approach Within the AMIDA project we focus on distributed 'cooperative design' teams. We especially focus on the 'material' signals - signals in which people communicate through material artefacts, locations and their embodied actions. We apply an ethnographic approach to understand the role of physical artefacts in co-located naturalistic design setting. Based on the results we will generate important implications to support remote design work. We plan to develop a mixed-reality interface supported by a shared awareness display. This awareness display will provide information about the activities happening in the design room to remotely located participants. Findings/Design Our preliminary investigation with real-world design teams suggests that both the materiality of designers' work settings and their social practices play an important role in understanding these material signals that are at play. Originality/Value Most research supporting computer mediated communication have focused on either face-to-face or linguistically oriented communication paradigms. Our research focuses on mediating the non-verbal, material cues for supporting collaborative activities without impoverishing what designers do in their day to day working lives. Take away message An ethnographic approach allows us to understand the naturalistic practices of design teams, which can lead to designing effective technologies to support group work. In that respect, the findings of our research will have a generic value beyond the application domain chosen (design teams).
Resumo:
The invention of asymmetric encryption back in the seventies was a conceptual leap that vastly increased the expressive power of encryption of the times. For the first time, it allowed the sender of a message to designate the intended recipient in an cryptographic way, expressed as a “public key” that was related to but distinct from the “private key” that, alone, embodied the ability to decrypt. This made large-scale encryption a practical and scalable endeavour, and more than anything else—save the internet itself—led to the advent of electronic commerce as we know and practice it today.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.