198 resultados para TRUST
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Privacy has become one of the main impediments for e-health in its advancement to providing better services to its consumers. Even though many security protocols are being developed to protect information from being compromised, privacy is still a major issue in healthcare where privacy protection is very important. When consumers are confident that their sensitive information is safe from being compromised, their trust in these services will be higher and would lead to better adoption of these systems. In this paper we propose a solution to the problem of patient privacy in e-health through an information accountability framework could enhance consumer trust in e-health services and would lead to the success of e-health services.
Resumo:
This was the question that confronted Wilson J in Jarema Pty Ltd v Michihiko Kato [2004] QSC 451. Facts The plaintiff was the buyer of a commercial property at Bundall. The property comprised a 6 storey office building with a basement car park with 54 car parking spaces. The property was sold for $5 million with the contract being the standard REIQ/QLS form for Commercial Land and Buildings (2nd ed GST reprint). The contract provided for a “due diligence” period. During this period, the buyer’s solicitors discovered that there was no direct access from a public road to the car park entrance. Access to the car park was over a lot of which the Gold Coast City Council was the registered owner under a nomination of trustees, the Council holding the property on trust for car parking and town planning purposes. Due to the absence of a registered easement over the Council’s land, the buyer’s solicitors sought a reduction in the purchase price. The seller would not agree to this. Finally the sale was completed with the buyer reserving its rights to seek compensation.
Resumo:
In Bennett v Stewart McMurdo J considered the operation of a contract where the buyer was described as a superannuation fund. The Bennetts signed a standard REIQ contract as buyers of the Stewarts’ house and land. However, the reference schedule to the contract document contained these words next to the word ‘buyer’: ‘Bennett Superannuation Fund’ The Bennetts wished to enforce the contract. In response, the Stewarts (the sellers) raised two issues: • As the ‘Bennett Superannuation Fund’ was a trust and not a distinct legal entity capable of making a contract, the contract did not specify who was the buyer, so that the contract was void for uncertainty; and • The contract was unenforceable as there was no sufficient note or memorandum for the purposes of s 59 of the Property Law Act 1974 (Qld) as s 59 requires, amongst other things, an identification of the parties. McMurdo J did not accept either of these arguments and made an order for specific performance in favour of the Bennetts. Looking at each issue separately:
Resumo:
Change management research has largely ignored the effects of organizational change management history in shaping employee attitudes and behavior. This article develops and tests a model of the effects of poor change management history (PCMH) on employee attitudes (trust, job satisfaction, turnover intentions, change cynicism, and openness to change) and actual turnover. We found that PCMH, through PCMH beliefs, led to lower trust, job satisfaction and openness to change, and higher cynicism and turnover intentions. Also, PCMH beliefs predicted employee turnover over 2 years.
Resumo:
Despite the challenges that giftedness can add to self-formation during early adolescence, gifted young adolescents seldom are asked about their lives outside of counselling and educational contexts. The study considers the complexities that face gifted young adolescents in the process of self-discovery and self-representation, thereby building a case for seeking their own viewpoints. A guiding assumption for the study was that gifted young adolescents may respond positively to the opportunity to share their own perspectives and their own versions of “who they are”. The theoretical underpinnings for this study drew from Dialogical Self Theory. The study resides within an interactive view of self as a dynamic construction rather than a static state, where “who we are” is formed in everyday exchanges with self and others. Self-making as a process among gifted young adolescents is presented as an interactive network of “I” voices interpreted to reflect internal and external dialogue. In this way, self is understood within dialogical concepts of voices as multiple expressions. The study invited twelve gifted young adolescents to write freely about themselves over a six month period in an email journal project. Participants were recruited online and by word-of-mouth and they were able to negotiate their own levels of involvement. Access to the lives of individual young adolescents was sought in an out-of-school setting using narrative methods of personal writing in the form of journals sent as emails to the researcher. The role of the researcher was to act as a supportive listener who responded to participant-led emails and thereby facilitated the process of authoring that occurred across the data-gathering phase. The listening process involved responses that were affirming and designed to build trust. Data in the form of email texts were analysed using a close listening method that uncovered patterns of voices that were explicitly or subtly expressed by participants. The interpretation of voices highlighted the tensions and contradictions involved in the process of participants forming a “self” that emerged as multiple “I” voices. There were three key findings of the study. First, the gifted young adolescent participants each constructed a self around four key voices of Author, Achiever, Resistor/Co-operator and Self-Innovator. These voices were dialogical selfconstructions that showed multiplicity as a normal way of being. Second, the selfmaking processes of the gifted young adolescent participants were guided by a hierarchy of voices that were directed through self-awareness. Third, authoring in association with a responsive adult listener emerged as a dialogic space for promoting self-awareness and a language of self-expression among gifted young adolescents. The findings of the study contribute to knowledge about gifted young adolescents by presenting their own versions of “who” they are, perspectives that might differ from mainstream perceptions. Participants were shown to have highly diverse, complex and individual expressions that have implications for how well they are understood and supported by others. The use of email journals helped to create a synergy for self-disclosure and a safe space for self-expression where participants’ abilities to be themselves were encouraged. Increased self-awareness and selfknowledge among gifted young adolescents is vital to their self-formation and their management of self and others’ expectations. This study makes an original contribution to the field of self-study by highlighting the processes and complexities of young adolescents’ self-constructions. Through the innovative use of narrative methods and an inter-disciplinary approach, the voices of gifted young adolescents were privileged. At a practical level, the study can inform educators, policy-makers, parents and all those who seek to contribute to the well-being of gifted young adolescents.
Resumo:
Background: Mentoring is often proposed as a solution to the problem of successfully recruiting and retaining nursing staff. The aim of this constructivist grounded theory study was to explore Australian rural nurses' experiences of mentoring. Design: The research design used was reflexive in nature resulting in a substantive, constructivist grounded theory study. Participants: A national advertising campaign and snowball sampling were used to recruit nine participants from across Australia. Participants were rural nurses who had experience in mentoring others. Methods: Standard grounded theory methods of theoretical sampling, concurrent data collection and analysis using open, axial and theoretical coding and a story line technique to develop the core category and category saturation were used. To cultivate the reflexivity required of a constructivist study, we also incorporated reflective memoing, situational analysis mapping techniques and frame analysis. Data was generated through eleven interviews, email dialogue and shared situational mapping. Results: Cultivating and growing new or novice rural nurses using supportive relationships such as mentoring was found to be an existing, integral part of experienced rural nurses' practice, motivated by living and working in the same communities. Getting to know a stranger is the first part of the process of cultivating and growing another. New or novice rural nurses gain the attention of experienced rural nurses through showing potential or experiencing a critical incidence. Conclusions: The problem of retaining nurses is a global issue. Experienced nurses engaged in clinical practice have the potential to cultivate and grow new or novice nurses-many already do so. Recognising this role and providing opportunities for development will help grow a positive, supportive work environment that nurtures the experienced nurses of tomorrow.
Resumo:
better health service.Conclusion:This research provides an insight into the perceptions of the rhetoric and reality of community member involvement in the process of developing multi-purpose services. It revealed a grounded theory in which fear and trust were intrinsic to a process of changing from a traditional hospital service to the acceptance of a new model of health care provided at a multi-purpose service.
Resumo:
The present article, which is abstracted from a larger study into the acquisition and exercise of nephrology nursing expertise, aims to explore the concept of recognition of expertise. The study used grounded theory methodology and involved 17 registered nurses who were practising in a metropolitan renal unit in New South Wales, Australia. Concurrent data collection and analysis was undertaken, incorporating participant observations and interviews. According to nurses in this study, patients, doctors and other nurses recognized that some nurses were experts while others were not. In addition, being trusted, being a role model and teaching others were important components of being recognized as an expert nephrology nurse. Of importance for nursing, the results of the present study indicate that knowledge and experience are not sufficient to ensure expert practice; recognition of expertise by others is an important function of expertise acquisition.
Resumo:
The Australian construction industry is characterized as being a competitive and risky business environment due to lack of cooperation, insufficient trust, ineffective communication and adversarial relationships which are likely lead to poor project performance. Relational contracting (RC) is advocated by literature as an innovative approach to improve the procurement process in the construction industry. Various studies have collectively added to the current knowledge of known RC norms, but there seem to be little effort on investigating the determinants of RC and its efficacy on project outcomes. In such circumstances, there is a lack of evidence and explanation on the manner on how these issues lead to different performance. Simultaneously, the New Engineering Contract (NEC) that embraced the concept of RC is seen as a modern way of contracting and also considered as one of the best approaches to the perennial problem of improving adversarial relationships within the industry. The reality of practice of RC in Australia is investigated through the lens of the NEC. A synthesis of literature views on the concept, processes and tools of RC is first conducted to develop the framework of RC.
Resumo:
It is generally agreed that if authentic teacher change is to occur then the tacit knowledge about how and why they act in certain ways in the classroom be accessed and reflected upon. While critical reflection can and often is an individual experience there is evidence to suggest that teachers are more likely to engage in the process when it is approached in a collegial manner; that is, when other teachers are involved in and engaged with the same process. Teachers do not enact their profession in isolation but rather exist within a wider community of teachers. An outside facilitator can also play an active and important role in achieving lasting teacher change. According to Stein and Brown (1997) “an important ingredient in socially based learning is that graduations of expertise and experience exist when teachers collaborate with each other or outside experts” (p. 155). To assist in the effective professional development of teachers, outside facilitators, when used, need to provide “a dynamic energy producing interactive experience in which participants examine and explore the complex components of teaching” (Bolster, 1995, p. 193). They also need to establish rapport with the participating teachers that is built on trust and competence (Hyde, Ormiston, & Hyde, 1994). For this to occur, professional development involving teachers and outside facilitators or researchers should not be a one-off event but an ongoing process of engagement that enables both the energy and trust required to develop. Successful professional development activities are therefore collaborative, relevant and provide individual, specialised attention to the teachers concerned. The project reported here aimed to provide professional development to two Year 3 teachers to enhance their teaching of a new mathematics content area, mental computation. This was achieved through the teachers collaborating with a researcher to design an instructional program for mental computation that drew on theory and research in the field.