341 resultados para Secure environments
Resumo:
While highly cohesive groups are potentially advantageous they are also often correlated with the emergence of knowledge and information silos based around those same functional or occupational clusters. Consequently, an essential challenge for engineering organisations wishing to overcome informational silos is to implement mechanisms that facilitate, encourage and sustain interactions between otherwise disconnected groups. This paper acts as a primer for those seeking to gain an understanding of the design, functionality and utility of a suite of software tools generically termed social media technologies in the context of optimising the management of tacit engineering knowledge. Underpinned by knowledge management theory and using detailed case examples, this paper explores how social media technologies achieve such goals, allowing for the transfer of knowledge by tapping into the tacit and explicit knowledge of disparate groups in complex engineering environments.
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Resumo:
Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.
Resumo:
In a study aimed at better understanding how students adapt to new blended studio learning environments, all undergraduate and masters of architecture students at a large school of architecture in Australia, learned a semester of architectural design in newly renovated, technology embedded, design studio environments. The renovations addressed the lessons learned from a 2011 pilot study of a second year architectural design studio learned in a high technology embedded prototype digital laboratory. The new design studios were purpose designed for the architecture students and adapted Student-Centred Active Learning Environment for Undergraduate Programs design principles. At the end of the semester, the students completed a questionnaire about their experiences of learning in the new design studio environments. Using a dual method qualitative approach, the questionnaire data were coded and extrapolated using both thematic analysis and grounded theory methodology. The results from these two approaches were compared, contrasted and finally merged, to reveal five distinct emerging themes, which were instrumental in offering resistance or influencing adaptation to, the new blended studio learning environments. This paper reports on the study, discusses the major contributors to resistance and adaptation, and proposes points for consideration when renovating or designing new blended studio learning environments. This research extends the 2011 pilot study by the same authors: ‘Dichotomy in the design studio: Adapting to new blended learning environments’.
Resumo:
Background. Governments face a significant challenge to ensure that community environments meet the mobility needs of an ageing population. Therefore, it is critical to investigate the effect of suburban environments on the choice of transportation and its relation to participation and active ageing. Objective. This research explores if and how suburban environments impact older people’s mobility and their use of different modes of transport. Methods. Data derived from GPS tracking, travel diaries, brief questionnaires, and semistructured interviews were gathered from thirteen people aged from 56 to 87 years, living in low-density suburban environments in Brisbane, Australia. Results. The suburban environment influenced the choice of transportation and out-of-home mobility. Both walkability and public transportation (access and usability) impact older people’s transportation choices. Impracticality of active and public transportation within suburban environments creates car dependency in older age. Conclusion. Suburban environments often create barriers to mobility, which impedes older people’s engagement in their wider community and ability to actively age in place. Further research is needed to develop approaches towards age-friendly suburban environments which will encourage older people to remain active and engaged in older age.
Resumo:
Ethnography is now a well-established research methodology for virtual environments, and the vast majority of accounts have one aspect in common, whether textual or graphic environments – that of the embodied avatar. In this article, I first discuss the applicability of such a methodology to non-avatar environments such as Eve Online, considering where the methodology works and the issues that arise in its implementation – particularly for the consideration of sub-communities within the virtual environment. Second, I consider what alternative means exist for getting at the information that is obtained through an ethnographic study of the virtual environment. To that end, I consider the practical and ethical implications of utilizing existing accounts, the importance of the meta-game discourse, including those sources outside of the control of the environment developer, and finally the utility in combining personal observations with accounts of other ethnographers, both within and between environments.
Resumo:
Since the architectural design studio learning environment was first established in the early 19th century at the École des Beaux-Arts in Paris, there has been a complete transformation in how the discipline of architecture is practiced and how students of architecture acquire information. Digital technologies allow students to access information instantly and learning is no longer confined to the rigid boundaries of a physical campus environment. In many schools of architecture in Australia, the physical design studio learning environments however, remain largely unchanged. Many learning environments could be mistaken for those last refurbished 30 years ago, being devoid of any significant technological intervention. While some teaching staff are eagerly embracing new digital technologies and attempting to modify their pedagogical approaches, the physical design studio learning environment is resistant to such efforts. In a study aimed at better understanding how staff and students adapt to new blended learning environments, a group of 165 second year architecture students at a large school of architecture in Australia were separated into two different design studio learning environments. 70% of students were allocated to a traditional design studio setting and 30% to a new, high technology embedded, prototype digital learning laboratory. The digital learning laboratory was purpose designed for the case-study users, adapted Student-Centred Active Learning Environment for Undergraduate Programs [SCALE-UP] principles, and built as part of a larger university research project. The architecture students attended the same lectures, followed the same studio curriculum and completed the same pieces of assessment; the only major differences were the teaching staff and physical environment within which the studios were conducted. At the end of the semester, all staff and students were asked to complete a questionnaire about their experiences and preferences within the two respective learning environments. The questionnaire response rate represented the opinions of 100% of the 10 teaching staff and over 70% of the students. Using a qualitative grounded theory approach, data were coded, extrapolated and compared, to reveal emerging key themes. The key themes formed the basis for in-depth interviews and focus groups of teaching staff and students, allowing the researchers to understand the data in more detail. The results of the data verified what had become increasingly evident during the course of the semester: an underlying negative resistance to the new digital studio learning environment, by both staff and students. Many participants openly exhibited a yearning for a return to the traditional design studio learning environments, particularly when the new technology caused frustration, by being unreliable or failing altogether. This paper reports on the study, discusses the negative resistance and explores the major contributors to resistance. The researchers are not aware of any similar previous studies across these particular settings and believe that it offers a necessary and important contribution to emergent research about adaptation to new digital learning environments.
Resumo:
This paper summarises the achievements of the Smart Skies Project, a three-year, multi-award winning international project that researched, developed and extensively flight tested four enabling aviation technologies: an electrooptical mid-air collision avoidance system, a static obstacle avoidance system, a mobile ground-based air traffic surveillance system, and a global automated airspace separation management system. The project included the development of manned and unmanned flight test aircraft, which were used to characterise the performance of the prototype systems for a range of realistic scenarios under a variety of environmental conditions. In addition to the collection of invaluable flight data, the project achieved world-firsts in the demonstration of future automated collision avoidance and separation management concepts. This paper summarises these outcomes, the overall objectives of the project, the research and the development of the prototype systems, the engineering of the flight test systems, and the results obtained from flight-testing.
Resumo:
Service robots that operate in human environments will accomplish tasks most efficiently and least disruptively if they have the capability to mimic and understand the motion patterns of the people in their workspace. This work demonstrates how a robot can create a humancentric navigational map online, and that this map re ects changes in the environment that trigger altered motion patterns of people. An RGBD sensor mounted on the robot is used to detect and track people moving through the environment. The trajectories are clustered online and organised into a tree-like probabilistic data structure which can be used to detect anomalous trajectories. A costmap is reverse engineered from the clustered trajectories that can then inform the robot's onboard planning process. Results show that the resultant paths taken by the robot mimic expected human behaviour and can allow the robot to respond to altered human motion behaviours in the environment.
Resumo:
Changing environments present a number of challenges to mobile robots, one of the most significant being mapping and localisation. This problem is particularly significant in vision-based systems where illumination and weather changes can cause feature-based techniques to fail. In many applications only sections of an environment undergo extreme perceptual change. Some range-based sensor mapping approaches exploit this property by combining occasional place recognition with the assumption that odometry is accurate over short periods of time. In this paper, we develop this idea in the visual domain, by using occasional vision-driven loop closures to infer loop closures in nearby locations where visual recognition is difficult due to extreme change. We demonstrate successful map creation in an environment in which change is significant but constrained to one area, where both the vanilla CAT-Graph and a Sum of Absolute Differences matcher fails, use the described techniques to link dissimilar images from matching locations, and test the robustness of the system against false inferences.
Resumo:
We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.
Resumo:
This report, prepared by QUT Social Work and Human Services, in collaboration with key sector stakeholders, identifies the current and potentially expanded uses of Simulated Learning Environments (SLE) as part of the Health Workforce Australia (HWA) National Project. An expert Reference Group guided the project, facilitated the data collection, and provided feedback and support on the findings and broad recommendations.
Resumo:
We consider the problem of how to maximize secure connectivity of multi-hop wireless ad hoc networks after deployment. Two approaches, based on graph augmentation problems with nonlinear edge costs, are formulated. The first one is based on establishing a secret key using only the links that are already secured by secret keys. This problem is in NP-hard and does not accept polynomial time approximation scheme PTAS since minimum cutsets to be augmented do not admit constant costs. The second one is based of increasing the power level between a pair of nodes that has a secret key to enable them physically connect. This problem can be formulated as the optimal key establishment problem with interference constraints with bi-objectives: (i) maximizing the concurrent key establishment flow, (ii) minimizing the cost. We show that both problems are NP-hard and MAX-SNP (i.e., it is NP-hard to approximate them within a factor of 1 + e for e > 0 ) with a reduction to MAX3SAT problem. Thus, we design and implement a fully distributed algorithm for authenticated key establishment in wireless sensor networks where each sensor knows only its one- hop neighborhood. Our witness based approaches find witnesses in multi-hop neighborhood to authenticate the key establishment between two sensor nodes which do not share a key and which are not connected through a secure path.
Resumo:
As a result of growing evidence regarding the effects of environmental characteristics on the health and wellbeing of people in healthcare facilities (HCFs), more emphasis is being placed on, and more attention being paid to, the consequences of design choices in HCFs. Therefore, we have critically reviewed the implications of key indoor physical design parameters, in relation to their potential impact on human health and wellbeing. In addition, we discussed these findings within the context of the relevant guidelines and standards for the design of HCFs. A total of 810 abstracts, which met the inclusion criteria, were identified through a Pubmed search, and these covered journal articles, guidelines, books, reports and monographs in the studied area. Of these, 231 full publications were selected for this review. According to the literature, the most beneficial design elements were: single-bed patient rooms, safe and easily cleaned surface materials, sound-absorbing ceiling tiles, adequate and sufficient ventilation, thermal comfort, natural daylight, control over temperature and lighting, views, exposure and access to nature, and appropriate equipment, tools and furniture. The effects of some design elements, such as lighting (e.g. artificial lighting levels) and layout (e.g. decentralized versus centralized nurses’ stations), on staff and patients vary, and “the best design practice” for each HCF should always be formulated in co-operation with different user groups and a multi-professional design team. The relevant guidelines and standards should also be considered in future design, construction and renovations, in order to produce more favourable physical indoor environments in HCFs.