407 resultados para Authenticated key exchange


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intermediaries have introduced electronic services with varying success. One of the problems an intermediary faces is deciding what kind of exchange service it should offer to its customers and suppliers. For example, should it only provide a catalogue or should it also enable customers to order products? Developing the right exchange design is a complex undertaking because of the many design options on the one hand and the interests of multiple actors to be considered on the other. This is far more difficult than simple prescriptions like ‘creating a win-win situation’ suggest. We address this problem by developing design patterns for the exchanges between customers, intermediary, and suppliers related to role, linkage, transparency, and ovelty choices. For developing these design patterns, we studied four distinct electronic intermediaries and dentified exchange design choices that require trade-offs relating to the interests of customers, intermediary, and suppliers. The exchange design patterns contribute to the development of design theory for electronic intermediaries by filling a gap between basic business models and detailed business process designs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The primary goal of the Vehicular Ad Hoc Network (VANET) is to provide real-time safety-related messages to motorists to enhance road safety. Accessing and disseminating safety-related information through the use of wireless communications technology in VANETs should be secured, as motorists may make critical decisions in dealing with an emergency situation based on the received information. If security concerns are not addressed in developing VANET systems, an adversary can tamper with, or suppress, the unprotected message to mislead motorists to cause traffic accidents and hazards. Current research on secure messaging in VANETs focuses on employing the certificate-based Public Key Infrastructure (PKI) scheme to support message encryption and digital signing. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This thesis has proposed a novel public key verification and management approach for VANETs; namely, the Public Key Registry (PKR) regime. Compared to the VANET PKI scheme, this new approach can satisfy necessary security requirements with improved performance and scalability, and at a lower cost by reducing the security overheads of message transmission and eliminating digital certificate deployment and maintenance issues. The proposed PKR regime consists of the required infrastructure components, rules for public key management and verification, and a set of interactions and associated behaviours to meet these rule requirements. This is achieved through a system design as a logic process model with functional specifications. The PKR regime can be used as development guidelines for conforming implementations. An analysis and evaluation of the proposed PKR regime includes security features assessment, analysis of the security overhead of message transmission, transmission latency, processing latency, and scalability of the proposed PKR regime. Compared to certificate-based PKI approaches, the proposed PKR regime can maintain the necessary security requirements, significantly reduce the security overhead by approximately 70%, and improve the performance by 98%. Meanwhile, the result of the scalability evaluation shows that the latency of employing the proposed PKR regime stays much lower at approximately 15 milliseconds, whether operating in a huge or small environment. It is therefore believed that this research will create a new dimension to the provision of secure messaging services in VANETs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Room ventilation is a key determinant of airborne disease transmission. Despite this, ventilation guidelines in hospitals are not founded on robust scientific evidence related to prevention of airborne transmission. Methods: We sought to assess the effect of ventilation rates on influenza, tuberculosis (TB) and rhinovirus infection risk within three distinct rooms in a major urban hospital; a Lung Function Laboratory, Emergency Department (ED) Negative-pressure Isolation Room and an Outpatient Consultation Room were investigated. Air exchange rate measurements were performed in each room using CO2 as a tracer. Gammaitoni and Nucci’s model was employed to estimate infection risk. Results: Current outdoor air exchange rates in the Lung Function Laboratory and ED Isolation Room limited infection risks to between 0.1 and 3.6%. Influenza risk for individuals entering an Outpatient Consultation Room after an infectious individual departed ranged from 3.6 to 20.7%, depending on the duration for which each person occupied the room. Conclusions: Given the absence of definitive ventilation guidelines for hospitals, air exchange measurements combined with modelling afford a useful means of assessing, on a case-by-case basis, the suitability of room ventilation at preventing airborne disease transmission.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social procurement provides a key source of income for the Third Sector, and is vital for the sustainability of many nonprofit organisations. Social procurement involves the exchange of economic capital from one organisation, typically government (although for-profit and non-profit organisations can also purchase), with a nonprofit organisations in order to deliver other forms of. It is this transformation of economic capital into other forms of capital (cultural, human, social) in the social procurement process, which is the focus of this paper. Four case studies, which are representative of the four main types of social procurement, will be examined in order to trace how economic capital is transformed into other types of capital in each of these cases. In so doing, the paper will advance our understanding of social procurement theoretically, and lead to a wider discussion about the role of social procurement in ensuring the sustainability of nonprofit organisations, and the civil societies in which they operate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper focuses on information sharing with key suppliers and seeks to explore the factors that might influence its extent and depth. We also investigate how information sharing affects a company’s performance with regards to resource usage, output, and flexibility. Drawing from transaction cost- and contingency theories, several factors, namely environmental uncertainty, demand uncertainty, dependency and, the product life cycle stage are proposed to explain the level of information shared with key suppliers. We develop a model where information sharing mediates the (contingent) factors and company performance. A mail survey was used to collect data from Finnish and Swedish companies. Partial Least Squares analysis was separately performed for each country (n=119, n=102). There was consistent evidence that environmental uncertainty, demand uncertainty and supplier/buyer dependency had explanatory power, whereas no significance was found for the product life cycle stage. The results also confirm previous studies by providing support for a positive relationship between information sharing and performance, where output performance was found to be the most strongly related

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper focuses on information sharing with key suppliers and seeks to explore the factors that might influence its extent and depth. We also investigate how information sharing affects a company’s performance with regards to resource usage, output, and flexibility. Drawing from transaction cost- and contingency theories, several factors, namely environmental uncertainty, demand uncertainty, dependency and, the product life cycle stage are proposed to explain the level of information shared with key suppliers. We develop a model where information sharing mediates the (contingent) factors and company performance. A mail survey was used to collect data from Finnish and Swedish companies. Partial Least Squares analysis was separately performed for each country (n=119, n=102). There was consistent evidence that environmental uncertainty, demand uncertainty and supplier/buyer dependency had explanatory power, whereas no significance was found for the relationship between product life cycle stage and information sharing. The results also confirm previous studies by providing support for a positive relationship between information sharing and performance, where output performance was found to be the most strongly related.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, I outline a new approach towards media and diaspora using the concept of the ‘franchise nation’. It is my contention that current theories on migration, media and diaspora with their emphasis on exile, multiple belongings, hybrid identities and their representations are inadequate to the task of explaining the emergence of a new trend in diaspora, home and host nation relationship. This, I suggest, is a recent shift most notable in the attitudes of the Chinese and Indian governments toward their diasporas. From earlier eras where Chinese sojourners were regarded as disloyal and Indians overseas left to fend for themselves, Chinese and Indian migrants are today directly addressed and wooed by their nations of origin. This change is motivated in part by the realisation that diasporic populations are, in fact, resources that can bring significant influence to bear on home nation interests within host nations. Such sway in foreign lands gains greater importance as China and India are, by virtue of their economic rise and prominence on the world stage, subject to ever more intense international scrutiny. Members of these diasporas have willingly responded to these changes by claiming and cultivating pivotal roles for themselves within host nations as spokespersons, informants and representatives, trading on their assumed familiarity with home cultures, language and commerce. As a result, China and India have initiated a number of statecraft strategies in recent years to (re)engage their diasporas. Both nations have identified media as amongst the key instruments of their strategies. New media enhances the ability of all parties—home and host states, institutions and individuals—to participate, interact and reciprocate. While China’s centralised government has utilised the notion of soft power (ruan shili) to describe its practices, India’s efforts are diffused along the lines of nation branding via myriad labels like India Inc. and the Global Indian. To explain this emergent trend, I propose a new framework, franchise nation, defined as a reciprocal relationship between nation and diaspora that is characterised by mutual obligations and benefits. In appropriating this phrase from Stephenson, I liken contemporary statecraft operating in China and India to a business franchising system wherein benefits may be economic or cultural and; those thus connected signal their willingness for mutual exchange and concede a sense of obligation. As such, franchise nation is not concerned with remote, unidirectional interference in home nation affairs a la Anderson’s ‘long-distance nationalism’. Rather, it is a framework that seeks to reflect more closely the dynamism of the relationship between diaspora, home and host nations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Living City 2010 was a three-day place-based urban design immersion workshop program held at Logan Road Conference Centre, Stones Corner, for 30 self-selected Year 11 Visual Art Students and 4 Teachers drawn from 11 state and private Brisbane Secondary Schools, that focused on the active Brisbane City Council redevelopment site of Stones Corner, specifically Logan Road, public spaces at Stones Corner Library and rehabilitation of the nearby creek corridor. The workshop, framed within notions of ecological, economic, social and cultural sustainability, aimed to raise awareness of the layered complexity and perspectives involved in the design of shared city spaces and to encourage young people to voice their own concerns as future citizens about the shape and direction of their city. On Day 1, Brisbane City Council Public Art Officers Brendan Doherty and Genevieve Searle, local landscape architect Peter Boyle (Verge) and artists Malcolm Enright and Barbara Heath provided students with an overview of the historic and future context of the area including proposed design and public art interventions, followed by a site walk. The afternoon session, led by Natalie Wright and QUT design staff and students, focused on design tools to assist in the tackling of the redesign of the Stones Corner library precinct, where students worked on ideas. On Day 2, students were mentored by artist Liam Key to participate in a computer animation activity using the built environment as a canvas, and by artist Sebastian Moody to participate in an activity using red helium balloons as a playful catalyst for interaction to activate and create new public space. Later, students worked in teams on their ideas for redevelopment of the site in preparation for their Day 3 presentations. The workshop culminated in an exchange of planning ideas with Georgina Aitchison from Brisbane City Council's Urban Renewal Division. Students were introduced to design methodology, team thinking strategies, the scope of design practices and professions, presentation skills and post-secondary pathways, while participating teachers acquired content and design learning strategies transferable in many other contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In maintaining quality of life, preventative health is an important area in which the performance of pro-social behaviours provides benefits to individuals who perform them as well as society. The establishment of the Preventative Health Taskforce in Australia demonstrates the significance of preventative health and aims to provide governments and health providers with evidence-based advice on preventative health issues (Preventative Health Taskforce, 2009). As preventative health behaviours are voluntary, for consumers to sustain this behaviour there needs to be a value proposition (Dann, 2008; Kotler and Lee, 2008). Customer value has been shown to influence repeat behaviour (McDougall and Levesque, 2000), word-of-mouth (Hartline and Jones, 1999), and attitudes (Dick and Basu, 2008). However to date there is little research that investigates the source of value for preventative health services. This qualitative study explores and identifies three categories of sources that influence four dimensions of value – functional, emotional, social and altruistic (Holbrook 2006). A conceptual model containing five propositions outlining these relationships is presented. This study provides evidence-based research that reveals sources of value that influence individuals’ decisions to perform pro-social behaviours in the long-term through their use of preventative health services. This research uses BreastScreen Queensland (BSQ), a cancer screening service, as the service context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose-- DB clients play a vital role in the delivery of DB system and the clients’ competences are critical to the success of DB projects. Most of DB clients, however, remain inexperienced with the DB system. This study, therefore, aims to identify the key competences that DB clients should possess to ensure the success of DB projects in the construction market of China. Design/Methodology/Approach -- Five semi-structured face-to-face interviews and two rounds Delphi questionnaire survey were conducted in the construction market of China to identify the key competences of DB clients. Rankings have been assigned to these key competences on the basis of their relative importance. Findings-- Six ranked key competences of DB clients have been identified, which are, namely, (1) the ability to clearly define project scope and objectives; (2) financial capacity for the projects; (3) capacity in contract management; (4) adequate staff or consulting team; (5) effective coordination with DB contractors and (6) experience with similar design-build projects. Calculation of Kendall’s Coefficient of Concordance (W) indicates a statistically significant consensus of panel experts on these top six key competences. Practical implications—Clients should clearly understand the competence requirements in DB projects and should assess their DB capability before going for the DB option. Originality/Value-- The examination of DB client’s key competences will help the client deepen the understanding of the DB system. DB clients can also make use of the research findings as guidelines to improve their DB competence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Design-builders play a vital role in the success of DB projects. In the construction market of the People’s Republic of China, most of the design-builders, however, lack adequate competences to conduct the DB projects successfully. The objective of this study is, therefore, to identify the key competences that design-builders should possess to not only ensure the success of DB projects but also acquire the competitive advantages in the DB market. Five semi-structured face-to-face interviews and two rounds of Delphi questionnaire survey were conducted to identify the key competences of design-builders. Rankings have been assigned to these key competences on the basis of their relative importance. Six ranked key competences of design-builders have been identified, which are, namely, (1) experience with similar DB projects; (2) capability of corporate management; (3) combination of building techniques and design expertise; (4) financial capability for DB projects; (5) enterprise qualification and scale; and (6) credit records and reputation in the industry. The design-builders can make use of the research findings as guidelines to improve their DB competence. These research findings will also be useful to clients during the selection of design-builders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design-build system has been demonstrated as an effective delivery method and gained popularity worldwide. Although there are an increasing number of clients adopting DB method in China, most of them remain inexperienced with method. The objective of this study is therefore to identify the key competences that a client or its consultant should possess to ensure the success of DB projects. Face-to-face interviews and a two-round Delphi questionnaire survey were conducted to find the following six key competences of clients, which include the (1) ability to clearly articulate project scope and objectives; (2) financial capacity for DB projects; (3) capability in contract management; (4) adequate staff or consulting team; (5) effective coordination with contractors and (6) experience with similar DB projects. This study will hopefully provide clients with measures to evaluate their DB competence and further promote their understanding of DB system in the PRC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current research in secure messaging for Vehicular Ad hoc Networks (VANETs) appears to focus on employing a digital certificate-based Public Key Cryptosystem (PKC) to support security. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This paper proposes a non-certificate-based public key management for VANETs. A comprehensive evaluation of performance and scalability of the proposed public key management regime is presented, which is compared to a certificate-based PKC by employing a number of quantified analyses and simulations. Not only does this paper demonstrate that the proposal can maintain security, but it also asserts that it can improve overall performance and scalability at a lower cost, compared to the certificate-based PKC. It is believed that the proposed scheme will add a new dimension to the key management and verification services for VANETs.