252 resultados para Collaborations and Networking
Resumo:
This study investigates grade eight girls’ use of status updates on Facebook in order to create identities online. Using sociologist Erving Goffman’s theory of self-presentation as a framework, Jones and Pittman’s subsequent strategies of self-presentation are used to discover the ways in which teenage girls use status updates in order to create identities online and manage audience impressions. Using a mixed methods design, the results showed that, while existing self-presentation strategies persist, social networking has created new means of self-presentation. This study adds to a growing pool of research regarding teens’ engagement with social networking websites to form identities.
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
This article will discuss the ways in which community service learning programs in music can foster meaningful collaborations between universities and Indigenous communities. Drawing on recent pedagogical literature on service learning and insights from a four-year partnership between Australian Indigenous musicians at the Winanjjikari Music Centre in Tennant Creek and music students from Queensland Conservatorium Griffith University, it will describe how such programs can facilitate significant cross-cultural exchanges between students and Indigenous communities. By drawing on observations and interview data from those involved in the project, this paper argues that these partnerships can both assist communities with activities such as cultural maintenance, and provide students with intercultural experiences that have the potential to transform their understandings of Indigenous culture.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.
Resumo:
Most urban dwelling Australians take secure and safe water supplies for granted. That is, they have an adequate quantity of water at a quality that can be used by people without harm from human and animal wastes, salinity and hardness or pollutants from agriculture and manufacturing industries. Australia wide urban and peri-urban dwellers use safe water for all domestic as well as industrial purposes. However, this is not the situation remote regions in Australia where availability and poor quality water can be a development constraint. Nor is it the case in Sri Lanka where people in rural regions are struggling to obtain a secure supply of water, irrespective of it being safe because of the impact of faecal and other contaminants. The purposes of this paper are to overview: the population and environmental health challenges arising from the lack of safe water in rural and remote communities; response pathways to address water quality issues; and the status of and need for integrated catchment management (ICM) in selected remote regions of Australia and vulnerable and lagging rural regions in Sri Lanka. Conclusions are drawn that focus on the opportunity for inter-regional collaborations between Australia and Sri Lanka for the delivery of safe water through ICM.
Resumo:
As the boundaries between public and private, human and technology, digital and social, mediated and natural, online and offline become increasingly blurred in modern techno-social hybrid societies, sociology as a discipline needs to adapt and adopt new ways of accounting for these digital cultures. In this paper I use the social networking site Pinterest to demonstrate how people today are shaped by, and in turn shape, the digital tools they are assembled with. Digital sociology is emerging as a sociological subdiscipline that engages with the convergence of the digital and the social. However, there seems to be a focus on developing new methods for studying digital social life, yet a neglect of concrete explorations of its culture. I argue for the need for critical socio-cultural ‘thick description’ to account for the interrelations between humans and technologies in modern digitally mediated cultures.
Resumo:
Background Rapid developments in technology have encouraged the use of smartphones in physical activity research, although little is known regarding their effectiveness as measurement and intervention tools. Objective This study systematically reviewed evidence on smartphones and their viability for measuring and influencing physical activity. Data Sources Research articles were identified in September 2013 by literature searches in Web of Knowledge, PubMed, PsycINFO, EBSCO, and ScienceDirect. Study Selection The search was restricted using the terms (physical activity OR exercise OR fitness) AND (smartphone* OR mobile phone* OR cell phone*) AND (measurement OR intervention). Reviewed articles were required to be published in international academic peer-reviewed journals, or in full text from international scientific conferences, and focused on measuring physical activity through smartphone processing data and influencing people to be more active through smartphone applications. Study Appraisal and Synthesis Methods Two reviewers independently performed the selection of articles and examined titles and abstracts to exclude those out of scope. Data on study characteristics, technologies used to objectively measure physical activity, strategies applied to influence activity; and the main study findings were extracted and reported. Results A total of 26 articles (with the first published in 2007) met inclusion criteria. All studies were conducted in highly economically advantaged countries; 12 articles focused on special populations (e.g. obese patients). Studies measured physical activity using native mobile features, and/or an external device linked to an application. Measurement accuracy ranged from 52 to 100 % (n = 10 studies). A total of 17 articles implemented and evaluated an intervention. Smartphone strategies to influence physical activity tended to be ad hoc, rather than theory-based approaches; physical activity profiles, goal setting, real-time feedback, social support networking, and online expert consultation were identified as the most useful strategies to encourage physical activity change. Only five studies assessed physical activity intervention effects; all used step counts as the outcome measure. Four studies (three pre–post and one comparative) reported physical activity increases (12–42 participants, 800–1,104 steps/day, 2 weeks–6 months), and one case-control study reported physical activity maintenance (n = 200 participants; >10,000 steps/day) over 3 months. Limitations Smartphone use is a relatively new field of study in physical activity research, and consequently the evidence base is emerging. Conclusions Few studies identified in this review considered the validity of phone-based assessment of physical activity. Those that did report on measurement properties found average-to-excellent levels of accuracy for different behaviors. The range of novel and engaging intervention strategies used by smartphones, and user perceptions on their usefulness and viability, highlights the potential such technology has for physical activity promotion. However, intervention effects reported in the extant literature are modest at best, and future studies need to utilize randomized controlled trial research designs, larger sample sizes, and longer study periods to better explore the physical activity measurement and intervention capabilities of smartphones.
Resumo:
This paper presents the outcomes of an international collaboration between researchers and young people in Australia and the United States, using participatory design to engage young people as research partners in the collaborative development of a conceptual framework for the Online WellBeing Center (OWBC), a repository of evidence-based mental health tools focused on mental health promotion and the prevention of mental illness developed as part of Young and Well Cooperative Research Centre. Eighteen participants (nine in Australia and nine in USA) were involved as key partners through a series of participatory design workshops to develop the framework for the OWBC. Key objectives of the collaboration included an increased understanding of: how to recruit young people to be part of an international project team collaborating remotely; how to use new technologies to manage communication and maintain engagement; how to apply principles of participatory research to create a youth informed research project; how to develop an international stakeholder partnership to ensure relevancy in value systems, cultural orientation and project outcomes. Recommendations included guidelines for how others can establish international collaborations that integrate young people as active project participants.
Resumo:
As the boundaries between public and private, human and technology, digital and social, mediated and natural, online and offline become increasingly blurred in modern techno-social hybrid societies, sociology as a discipline needs to adapt and adopt new ways of accounting for these digital cultures. In this paper I use the social networking site Pinterest to demonstrate how people today are shaped by, and in turn shape, the digital tools they are assembled with. Digital sociology is emerging as a sociological subdiscipline that engages with the convergence of the digital and the social. However, there seems to be a focus on developing new methods for studying digital social life, yet a neglect of concrete explorations of its culture. I argue for the need for critical socio-cultural ‘thick description’ to account for the interrelations between humans and technologies in modern digitally mediated cultures.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
This chapter explores preschools as networked spaces into which iPads were introduced, which involved the mediation of complex relationships between children and adults, physical and virtual technology and other materials like toys, play spaces, art materials and books. The chapter aims to explain how these human and non-human ‘actors’ come to coexist and lead to the development of literacy and creativity in specific ways. This approach particularly draws attention to specific challenges faced by the teachers as they negotiated a range of complex demands and obstacles to make the iPads available to the children for play and learning.
Resumo:
This tutorial primarily focuses on the technical challenges surrounding the design and implementation of Accountable-eHealth (AeH) systems. The potential benefits of shared eHealth records systems are promising for the future of improved healthcare; however, their uptake is hindered by concerns over the privacy and security of patient information. In the current eHealth environment, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well informed decisions. This conflict is evident in the review of Australia's PCEHR system. Accountable-eHealth systems aim to balance these concerns by implementing Information Accountability (IA) mechanisms. AeH systems create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency, thus, enabling the creation of shared eHealth records that can be useful to both patients and HCPs. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of AeH systems and the solutions we have devised. A prototype AeH system will be used to demonstrate the functionality of AeH systems, and illustrate some of the proposed solutions. The topics that will be covered include: designing for usability in AeH systems, the privacy and security of audit mechanisms, providing for diversity of users, the scalability of AeH systems, and finally the challenges of enabling research and Big Data Analytics on shared eHealth Records while ensuring accountability and privacy are maintained.
Resumo:
Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...