188 resultados para Intrusive Thoughts


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Distributed Network Protocol v3.0 (DNP3) is one of the most widely used protocols to control national infrastructure. The move from point-to-point serial connections to Ethernet-based network architectures, allowing for large and complex critical infrastructure networks. However, networks and con- figurations change, thus auditing tools are needed to aid in critical infrastructure network discovery. In this paper we present a series of intrusive techniques used for reconnaissance on DNP3 critical infrastructure. Our algorithms will discover DNP3 outstation slaves along with their DNP3 addresses, their corresponding master, and class object configurations. To validate our presented DNP3 reconnaissance algorithms and demonstrate it’s practicality, we present an implementation of a software tool using a DNP3 plug-in for Scapy. Our implementation validates the utility of our DNP3 reconnaissance technique. Our presented techniques will be useful for penetration testing, vulnerability assessments and DNP3 network discovery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Self-tracking, the process of recording one's own behaviours, thoughts and feelings, is a popular approach to enhance one's self-knowledge. While dedicated self-tracking apps and devices support data collection, previous research highlights that the integration of data constitutes a barrier for users. In this study we investigated how members of the Quantified Self movement---early adopters of self-tracking tools---overcome these barriers. We conducted a qualitative analysis of 51 videos of Quantified Self presentations to explore intentions for collecting data, methods for integrating and representing data, and how intentions and methods shaped reflection. The findings highlight two different intentions---striving for self-improvement and curiosity in personal data---which shaped how these users integrated data, i.e. the effort required. Furthermore, we identified three methods for representing data---binary, structured and abstract---which influenced reflection. Binary representations supported reflection-in-action, whereas structured and abstract representations supported iterative processes of data collection, integration and reflection. For people tracking out of curiosity, this iterative engagement with personal data often became an end in itself, rather than a means to achieve a goal. We discuss how these findings contribute to our current understanding of self-tracking amongst Quantified Self members and beyond, and we conclude with directions for future work to support self-trackers with their aspirations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines incorporating video-stimulated recall (VSR) as a data collection technique in cross-cultural research. With VSR, participants are invited to watch video-recordings of particular events that they are involved in; they then recall their thoughts in relation to their observations of their behaviour in relation the event. The research draws on a larger PhD project completed at an Australian university that explored Vietnamese lecturers’ beliefs about learner autonomy. In cross-cultural research using the VSR technique provided significant challenges including time constraints of participants, misunderstandings of the VSR protocol and the possibility of participants’ losing face when reflecting on their teaching episodes. Adaptations to the VSR technique were required to meet the cultural challenges specific to this population, indicating a need for flexibility and awareness of the cultural context for research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The InstaBooth is a portable demountable interactive installation for situated community engagement. Its aim is to give a voice to communities who can share their thoughts and ideas in an unstructured and playful way that combines digital technology with tangible materials. It is constructed from standard CNC-cut plywood stock and plans for its construction are available for others to download and use. Its modular design accommodates a range of bespoke interactive technologies, both analogue and digital, designed to facilitate the engagement process by providing means to present different materials and offer different ways to collect feedback. The appearance and interactions of the booth are designed to appeal to different demographics and foster an interactive discussion about a range of different topics such as change management, policy development, and urban planning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Functional Imagery Training (FIT) is a new theory-based, manualized intervention that trains positive goal imagery. Multisensory episodic imagery of proximal personal goals is elicited and practised, to sustain motivation and compete with less functional cravings. This study tested the impact of a single session of FIT plus a booster phone call on snacking. In a stepped-wedge design, 45 participants who wanted to lose weight or reduce snacking were randomly assigned to receive a session of FIT immediately or after a 2-week delay. High-sugar and high-fat snacks were recorded using timeline follow back for the previous 3 days, at baseline, 2 and 4 weeks. At 2 weeks, snacking was lower in the immediate group than in the delayed group, and the reduction after FIT was replicated in the delayed group between 2 and 4 weeks. Frequencies of motivational thoughts about snack reduction rose following FIT for both groups, and this change correlated with reductions in snacking and weight loss. By showing that FIT can support change in eating behaviours, these findings show its potential as a motivational intervention for weight management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wildlife conservation involves an understanding of a specific animal, its environment and the interaction within a local ecosystem. Unmanned Aerial Vehicles (UAVs) present cost effective, non-intrusive solution for detecting animals over large areas and the use thermal imaging cameras offer the ability detect animals that would otherwise be concealed to visible light cameras. This report examines some of limitations on using SURF for the development of large maps using multiple stills images extracted from the thermal imaging video camera which contain wildlife (eg. Koala in them).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Smart everyday objects could support the wellbeing, independent living and social connectedness of ageing people, but their successful adoption depends upon them fitting with their skills, values and goals. Many technologies fail in this respect. Our work is aimed at designs that engage older people by building on their individual affective attachment to habituated objects and leveraging, from a participatory design perspective, the creative process through which people continuously adapt their homes and tools to their own lifestyle. We contribute a novel analytic framework based on an analysis of related research on appropriation and habituated objects. It identifies steps in appropriation from inspection to performance and habituation. We test this framework with the preliminary testing of an augmented habituated object, a messaging kettle. While only used in one home so far, its daily use has provoked many thoughts, scenarios and projections about use by friends, both practical, utopian and dystopian.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In late 2010, the online nonprofit media organization WikiLeaks published classified documents detailing correspondence between the U.S. State Department and its diplomatic missions around the world, numbering around 250,000 cables. These diplomatic cables contained classified information with comments on world leaders, foreign states, and various international and domestic issues. Negative reactions to the publication of these cables came from both the U.S. political class (which was generally condemnatory of WikiLeaks, invoking national security concerns and the jeopardizing of U.S. interests abroad) and the corporate world, with various companies ceasing to continue to provide services to WikiLeaks despite no legal measure (e.g., a court injunction) forcing them to do so. This article focuses on the legal remedies available to WikiLeaks against this corporate suppression of its speech in the U.S. and Europe since these are the two principle arenas in which the actors concerned are operating. The transatlantic legal protection of free expression will be considered, yet, as will be explained in greater detail, the legal conception of this constitutional and fundamental right comes from a time when the state posed the greater threat to freedom. As a result, it is not generally enforceable against private, non-state entities interfering with speech and expression which is the case here. Other areas of law, namely antitrust/competition, contract and tort will then be examined to determine whether WikiLeaks and its partners can attempt to enforce their right indirectly through these other means. Finally, there will be some concluding thoughts about the implications of the corporate response to the WikiLeaks embassy cables leak for freedom of expression online.