433 resultados para Internet Security
Resumo:
With the rise in attacks and attempted attacks on marine‐based critical infrastructure, maritime security is an issue of increasing importance worldwide. However, there are three significant shortfalls in the efforts to overcome potential threats to maritime security: the need for greater understanding of whether current standards of best practice are truly successful in combating and reducing the risks of terrorism and other security issues, the absence of a collective maritime security best practice framework and the need for improved access to maritime security specific graduate and postgraduate (long) courses. This paper presents an overview of existing international, regional national standards of best practice and shows that literature concerning the measurement and/ or success of standards is virtually non‐existent. In addition, despite the importance of maritime workers to ensuring the safety of marine based critical infrastructure, a similar review of available Australian education courses shows a considerable lack of availability of maritime security‐specific courses other than short courses that cover only basic security matters. We argue that the absence of an Australian best practice framework informed by evaluation of current policy responses – particularly in the post 9/11 environment – leaves Australia vulnerable to maritime security threats. As this paper shows, the reality is that despite the security measures put in place post 9/11, there is still considerable work to be done to ensure Australia is equipped to overcome the threats posed to maritime security.
Resumo:
Barreto-Lynn-Scott (BLS) curves are a stand-out candidate for implementing high-security pairings. This paper shows that particular choices of the pairing-friendly search parameter give rise to four subfami- lies of BLS curves, all of which offer highly efficient and implementation- friendly pairing instantiations. Curves from these particular subfamilies are defined over prime fields that support very efficient towering options for the full extension field. The coefficients for a specific curve and its correct twist are automat-ically determined without any computational effort. The choice of an extremely sparse search parameter is immediately reflected by a highly efficient optimal ate Miller loop and final exponentiation. As a resource for implementors, we give a list with examples of implementation-friendly BLS curves through several high-security levels.
Resumo:
Spatial representations, metaphors and imaginaries (cyberspace, web pages) have been the mainstay of internet research for a long time. Instead of repeating these themes, this paper seeks to answer the question of how we might understand the concept of time in relation to internet research. After a brief excursus on the general history of the concept, this paper proposes three different approaches to the conceptualisation of internet time. The common thread underlying all the approaches is the notion of time as an assemblage of elements such as technical artefacts, social relations and metaphors. By drawing out time in this way, the paper addresses the challenge of thinking of internet time as coexistence, a clash of fluxes, metaphors, lived experiences and assemblages. In other words, this paper proposes a way to articulate internet time as a multiplicity.
Resumo:
This chapter describes current trends in the global media environment, with a focus on their implications for the management of public agendas and political processes. It assesses the extent to which trends such as the growth of the blogosphere, "citizen journalism," and other forms if user-generated content, have complicated and problematized news and agenda management as engaged in by both media and political elites. It argues that, in large part due to the rise of the internet and the proliferation if online producers of information and commentary, alongside 24-hour news channels such as CNN and Al Jazeera, political and social actors today face a much more complex, chaotic communication environment than ever bifore, an environment characterized as one of cultural chaos. Having outlined the roots of this trend in the emergence of an expanded, globalized public sphere, the chapter goes on to ask if elite control over the political agenda has been eroded, and if it has, what the consequences for governmmt and the exercise if power might be. Can authoritarian regimes in China, the Middle East, and elsewhere survive the onset if internet-fueled global journalism, for example? In a political environment where public opinion is driven and buffeted by news coverage if unprecedented speed and volume, can democratic governments retain sufficient control over decision- and policy-making processes to enable competent social administration al'ld political management? Can the citizens of contemporary democracies use the emerging media environment to enhance elite accountability and strengthen the democratic process? The chapter concludes that the changing global media environment has the potmtial to strengthen democratic processes, though there is no sil'lgle template for the impact of the internet and other new media on specific countries.
Resumo:
Historically, determining the country of origin of a published work presented few challenges, because works were generally published physically – whether in print or otherwise – in a distinct location or few locations. However, publishing opportunities presented by new technologies mean that we now live in a world of simultaneous publication – works that are first published online are published simultaneously to every country in world in which there is Internet connectivity. While this is certainly advantageous for the dissemination and impact of information and creative works, it creates potential complications under the Berne Convention for the Protection of Literary and Artistic Works (“Berne Convention”), an international intellectual property agreement to which most countries in the world now subscribe. Under the Berne Convention’s national treatment provisions, rights accorded to foreign copyright works may not be subject to any formality, such as registration requirements (although member countries are free to impose formalities in relation to domestic copyright works). In Kernel Records Oy v. Timothy Mosley p/k/a Timbaland, et al. however, the Florida Southern District Court of the United States ruled that first publication of a work on the Internet via an Australian website constituted “simultaneous publication all over the world,” and therefore rendered the work a “United States work” under the definition in section 101 of the U.S. Copyright Act, subjecting the work to registration formality under section 411. This ruling is in sharp contrast with an earlier decision delivered by the Delaware District Court in Håkan Moberg v. 33T LLC, et al. which arrived at an opposite conclusion. The conflicting rulings of the U.S. courts reveal the problems posed by new forms of publishing online and demonstrate a compelling need for further harmonization between the Berne Convention, domestic laws and the practical realities of digital publishing. In this article, we argue that even if a work first published online can be considered to be simultaneously published all over the world it does not follow that any country can assert itself as the “country of origin” of the work for the purpose of imposing domestic copyright formalities. More specifically, we argue that the meaning of “United States work” under the U.S. Copyright Act should be interpreted in line with the presumption against extraterritorial application of domestic law to limit its application to only those works with a real and substantial connection to the United States. There are gaps in the Berne Convention’s articulation of “country of origin” which provide scope for judicial interpretation, at a national level, of the most pragmatic way forward in reconciling the goals of the Berne Convention with the practical requirements of domestic law. We believe that the uncertainties arising under the Berne Convention created by new forms of online publishing can be resolved at a national level by the sensible application of principles of statutory interpretation by the courts. While at the international level we may need a clearer consensus on what amounts to “simultaneous publication” in the digital age, state practice may mean that we do not yet need to explore textual changes to the Berne Convention.
Resumo:
Power system dynamic analysis and security assessment are becoming more significant today due to increases in size and complexity from restructuring, emerging new uncertainties, integration of renewable energy sources, distributed generation, and micro grids. Precise modelling of all contributed elements/devices, understanding interactions in detail, and observing hidden dynamics using existing analysis tools/theorems are difficult, and even impossible. In this chapter, the power system is considered as a continuum and the propagated electomechanical waves initiated by faults and other random events are studied to provide a new scheme for stability investigation of a large dimensional system. For this purpose, the measured electrical indices (such as rotor angle and bus voltage) following a fault in different points among the network are used, and the behaviour of the propagated waves through the lines, nodes, and buses is analyzed. The impact of weak transmission links on a progressive electromechanical wave using energy function concept is addressed. It is also emphasized that determining severity of a disturbance/contingency accurately, without considering the related electromechanical waves, hidden dynamics, and their properties is not secure enough. Considering these phenomena takes heavy and time consuming calculation, which is not suitable for online stability assessment problems. However, using a continuum model for a power system reduces the burden of complex calculations
Resumo:
Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
Resumo:
Internet and computer addiction has been a popular research area since the 90s. Studies on Internet and computer addiction have usually been conducted in the US, and the investigation of computer and Internet addiction at different countries is an interesting area of research. This study investigates computer and Internet addiction among teenagers and Internet cafe visitors in Turkey. We applied a survey to 983 visitors in the Internet cafes. The results show that the Internet cafe visitors are usually teenagers, mostly middle and high-school students and usually are busy with computer and Internet applications like chat, e-mail, browsing and games. The teenagers come to the Internet cafe to spend time with friends and the computers. In addition, about 30% of cafe visitors admit to having an Internet addiction, and about 20% specifically mention the problems that they are having with the Internet. It is rather alarming to consider the types of activities that the teenagers are performing in an Internet cafe, their reasons for being there, the percentage of self-awareness about Internet addiction, and the lack of control of applications in the cafe.
Resumo:
To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the traditional provable security approach, though well-established for proving the security of cryptographic primitives, is not applicable to PEPs. We apply the formal language of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various privacy properties of PIEMCP using state space analysis techniques. This investigation provides insights into the modelling and analysis of PEPs in general, and demonstrates the benefit of applying a CPN-based formal approach to the privacy compliance verification of PEPs.
Resumo:
There has been much written about the Internet’s potential to enhance international market growth opportunities for SME’s. However, the literature is vague as to how Internet usage and the application of Internet marketing also known as Internet marketing intensity has an impact on firm international market growth. This paper examines the level and role of the Internet in the international operations of a sample of 218 Australian SMEs with international customers. This study shows evidence of a statistical relationship between Internet usage and Internet marketing intensity, which in turn leads to international market growth, in terms of increased sales from new customers in new countries, new customers in existing countries and from existing customers.
Resumo:
This study explores the international entrepreneurial values influencing the intensity of Internet use in the internationalization process of small to medium sized enterprises (SMEs), within the Australian tourism industry. The findings point to a relationship between the values of international entrepreneurs and the inclination of the firm to develop and initiate international activity. And so, this study endeavors to offer insight into issues that remain unresolved in existing tourism and international entrepreneurship (IE) literature. Two effective but underutilized qualitative methods were used in this study to identify the values of international entrepreneurs. They are repertory test and laddering analysis.
Resumo:
It has been suggested that the accumulation of valuable resources and capabilities, such as Internet application, is not enough to support a firm’s sustainable competitive advantage, especially for high technology-mediated firms; which often operate in fast changing dynamic environments. While the idea of ‘Internet-enabled resources and capabilities’ has been recognised by RBV theorists, the notion has largely been ignored in conceptual and empirical studies. Given this finding, a conceptual framework is constructed and research issues are then developed in order to focus attention on the relationship between, the Internet and a firm’s resource base, dynamic capabilities and international market performance. We postulate that successful Internet-enabled market performance arises from those international entrepreneurial-oriented firms which encompass: international vision, international business experience, Internet-international marketing capabilities and international networking capabilities. Recommendations for future theory development are presented, along with the implications for international entrepreneurial managers in Australian small and medium sized firms
Resumo:
In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. This paper provides an explicit theoretical analysis towards watermarking security and robustness in figuring out the exact problem status from the literature. With the necessary hypotheses and analyses from technical perspective, we demonstrate the fundamental realization of the problem. Finally, some necessary recommendations are made for complete assessment of watermarking security and robustness.
Resumo:
Service-oriented Architectures (SOA) and Web services leverage the technical value of solutions in the areas of distributed systems and cross-enterprise integration. The emergence of Internet marketplaces for business services is driving the need to describe services, not only from a technical level, but also from a business and operational perspective. While, SOA and Web services reside in an IT layer, organizations owing Internet marketplaces are requiring advertising and trading business services which reside in a business layer. As a result, the gap between business and IT needs to be closed. This paper presents USDL (Unified Service Description Language), a specification language to describe services from a business, operational and technical perspective. USDL plays a major role in the Internet of Services to describe tradable services which are advertised in electronic marketplaces. The language has been tested using two service marketplaces as use cases.
Resumo:
Introduction and Aims: Long-term use of benzodiazepines remains common, and conveys significant risk. Providing psychological intervention in association with gradual dose reduction increases cessation rates above dose reduction alone, but appropriate psychological support is difficult to obtain. This study was undertaken to assess the outcomes of an uncontrolled case series of an internet-based cognitive-behaviour therapy (I-CBT) for benzodiazepine cessation. Design and Method: Users of benzodiazepines for > 3 months who wanted to reduce or cease benzodiazepines participated in the trial. They completed online assessments and accessed 13 newsletters on managing withdrawal symptoms and developing alternate ways to cope with life events. Therapist assistance was provided by email. Follow-up was at 3 and 6 months and feedback was obtained via comments and emails. Results: Program ratings and emailed comments of the program were positive. Thirty-two people registered for the program and 14 (44%) completed a 6-month follow-up. Of these, 8 (57%) reduced weekly intake by at least half, including 5 (36%) who ceased use. Shorter duration of use and birth outside Australia predicted greater percentage reductions at 3 months, while being partnered and in paid employment predicted reductions at 6 months. Discussion and Conclusion: While results were encouraging, controlled research is required to confirm the efficacy of the program, and engagement of both users and prescribers needs further attention.