279 resultados para Islamism, securitization, security agenda, Uzbekistan


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes research investigating expertise and the types of knowledge used by airport security screeners. It applies a multi method approach incorporating eye tracking, concurrent verbal protocol and interviews. Results show that novice and expert security screeners primarily access perceptual knowledge and experience little difficulty during routine situations. During non-routine situations however, experience was found to be a determining factor for effective interactions and problem solving. Experts were found to use strategic knowledge and demonstrated structured use of interface functions integrated into efficient problem solving sequences. Comparatively, novices experienced more knowledge limitations and uncertainty resulting in interaction breakdowns. These breakdowns were characterised by trial and error interaction sequences. This research suggests that the quality of knowledge security screeners have access to has implications on visual and physical interface interactions and their integration into problem solving sequences. Implications and recommendations for the design of interfaces used in the airport security screening context are discussed. The motivations of recommendations are to improve the integration of interactions into problem solving sequences, encourage development of problem scheme knowledge and to support the skills and knowledge of the personnel that interact with security screening systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the attractive feature of provable pseudorandomness security assuming the hardness of the RSA inversion problem. However, despite extensive study, the most efficient provably secure RSA-based generators output asymptotically only at most O(logn) bits per multiply modulo an RSA modulus of bitlength n, and hence are too slow to be used in many practical applications. To bring theory closer to practice, we present a simple modification to the proof of security by Fischlin and Schnorr of an RSA-based PRG, which shows that one can obtain an RSA-based PRG which outputs Ω(n) bits per multiply and has provable pseudorandomness security assuming the hardness of a well-studied variant of the RSA inversion problem, where a constant fraction of the plaintext bits are given. Our result gives a positive answer to an open question posed by Gennaro (J. of Cryptology, 2005) regarding finding a PRG beating the rate O(logn) bits per multiply at the cost of a reasonable assumption on RSA inversion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The thesis investigates “where were the auditors in asset securitizations”, a criticism of the audit profession before and after the onset of the global financial crisis (GFC). Asset securitizations increase audit complexity and audit risks, which are expected to increase audit fees. Using US bank holding company data from 2003 to 2009, this study examines the association between asset securitization risks and audit fees, and its changes during the global financial crisis. The main test is based on an ordinary least squares (OLS) model, which is adapted from the Fields et al. (2004) bank audit fee model. I employ a principal components analysis to address high correlations among asset securitization risks. Individual securitization risks are also separately tested. A suite of sensitivity tests indicate the results are robust. These include model alterations, sample variations, further controls in the tests, and correcting for the securitizer self-selection problem. A partial least squares (PLS) path modelling methodology is introduced as a separate test, which allows for high intercorrelations, self-selection correction, and sequential order hypotheses in one simultaneous model. The PLS results are consistent with the main results. The study finds significant and positive associations between securitization risks and audit fees. After the commencement of the global financial crisis in 2007, there was an increased focus on the role of audits on asset securitization risks resulting from bank failures; therefore I expect that auditors would become more sensitive to bank asset securitization risks after the commencement of the crisis. I find that auditors appear to focus on different aspects of asset securitization risks during the crisis and that auditors appear to charge a GFC premium for banks. Overall, the results support the view that auditors consider asset securitization risks and market changes, and adjust their audit effort and risk considerations accordingly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using the lens of audit pricing, we provide insights into auditors’ behaviors in relation to the risk of asset securitizations to bank holding companies in a period encompassing the Global Financial Crisis (GFC) and the introduction of the accounting standards FAS 166 and FAS 167. Using US bank holding company data from 2003 to 2011, we find significant and positive associations between asset securitization risks and audit fees. We find that auditors appear to focus on different aspects of asset securitization risks after the onset of the GFC, and increase their attention to the systemic risks facing bank holding companies in general. After the implementation of FAS 166 and FAS 167, which removed the discretion to treat asset securitizations as sales and required the consolidation of the accounts of special purpose entities, asset securitization risks no longer have a significant effect on audit fees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The value of information technology (IT) is often realized when continuously being used after users’ initial acceptance. However, previous research on continuing IT usage is limited for dismissing the importance of mental goals in directing users’ behaviors and for inadequately accommodating the group context of users. This in-progress paper offers a synthesis of several literature to conceptualize continuing IT usage as multilevel constructs and to view IT usage behavior as directed and energized by a set of mental goals. Drawing from the self-regulation theory in the social psychology, this paper proposes a process model, positioning continuing IT usage as multiple-goal pursuit. An agent-based modeling approach is suggested to further explore causal and analytical implications of the proposed process model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three proof requirements as essential for a sustainable land registration system. These were proof of identity, proof of ownership, and authority to deal. Our attention in this paper is drawn to the latter two requirements and will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to proof of ownership and authority to deal. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Firstly, on behalf of the secretariat that has coordinated these meetings every two years since 1985, our thanks to the organising committee here at the University of Economics in Cracow, Poland, for hosting this conference. I was asked to offer comment on the research agenda. There are many famous names to refer to. Two Australian colleagues here today are Peter Dowling and Helen De Cieri, longtime stalwarts of the field of IHRM. I acknowledge their contributions over many years, along with Randy Schuler and Denise Welch, and Dennis Briscoe. Other names such as Rosalie Tung, Pawan Bhudwhar, Michael Morley, Paul Sparrow and Wayne Cascio are known to us all. Their books have become classics. One example is the 700 page benchmark 2012 work by Chris Brewster and Wolfgang Mayrhofer, Handbook of Research on Comparative Human Resource Management (Brewster & Mayrhofer, 2012). More recently, in a book published by Cambridge University press in 2014, Mustafa Özbilgin, Dimitria Groutsis and William Harvey offer students a very accessible overview of the basics in IHRM (Ozbilgin, Groutsis, & Harvey, 2014). As for a research agenda, there are excellent literature reviews to which I would refer you, such as those by people who over the years have been frequent participants at this conference (Tarique & Schuler, 2010), (Farndale, Scullion, & Sparrow, 2010), and (Scullion & Collings, 2011).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. This volume addresses the issues that are at stake in this dual process of political closure, and therefore rethinks how states can respond to terrorist threats. The contributors range from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pandemics are for the most part disease outbreaks that become widespread as a result of the spread of human-to-human infection. Beyond the debilitating, sometimes fatal, consequences for those directly affected, pandemics have a range of negative social, economic and political consequences. These tend to be greater where the pandemic is a novel pathogen, has a high mortality and/or hospitalization rate and is easily spread. According to Lee Jong-wook, former Director-General of the World Health Organization (WHO), pandemics do not respect international borders. Therefore, they have the potential to weaken many societies, political systems and economies simultaneously.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Microbial respiratory reduction of nitrous oxide (N2O) to dinitrogen (N2) via denitrification plays a key role within the global N-cycle since it is the most important process for converting reactive nitrogen back into inert molecular N2. However, due to methodological constraints, we still lack a comprehensive, quantitative understanding of denitrification rates and controlling factors across various ecosystems. We investigated N2, N2O and NO emissions from irrigated cotton fields within the Aral Sera Basin using the He/O2 atmosphere gas flow soil core technique and an incubation assay. NH4NO3 fertilizer, equivalent to 75 kg ha−1 and irrigation water, adjusting the water holding capacity to 70, 100 and 130% were applied to the incubation vessels to assess its influence on gaseous N emissions. Under soil conditions as they are naturally found after concomitant irrigation and fertilization, denitrification was the dominant process and N2 the main end product of denitrification. The mean ratios of N2/N2O emissions increased with increasing soil moisture content. N2 emissions exceeded N2O emissions by a factor of 5 ± 2 at 70% soil water holding capacity (WHC) and a factor of 55 ± 27 at 130% WHC. The mean ratios of N2O/NO emissions varied between 1.5 ± 0.4 (70% WHC) and 644 ± 108 (130% WHC). The magnitude of N2 emissions for irrigated cotton was estimated to be in the range of 24 ± 9 to 175 ± 65 kg-N ha−1season−1, while emissions of NO were only of minor importance (between 0.1 to 0.7 kg-N ha−1 season−1). The findings demonstrate that for irrigated dryland soils in the Aral Sera Basin, denitrification is a major pathway of N-loss and that substantial amounts of N-fertilizer are lost as N2 to the atmosphere for irrigated dryland soils.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nitrous oxide emissions were monitored at three sites over a 2-year period in irrigated cotton fields in Khorezm, Uzbekistan, a region located in the arid deserts of the Aral Sea Basin. The fields were managed using different fertilizer management strategies and irrigation water regimes. N2O emissions varied widely between years, within 1 year throughout the vegetation season, and between the sites. The amount of irrigation water applied, the amount and type of N fertilizer used, and topsoil temperature had the greatest effect on these emissions. Very high N2O emissions of up to 3000 μg N2O-N m−2 h−1 were measured in periods following N-fertilizer application in combination with irrigation events. These “emission pulses” accounted for 80–95% of the total N2O emissions between April and September and varied from 0.9 to 6.5 kg N2O-N ha−1.. Emission factors (EF), uncorrected for background emission, ranged from 0.4% to 2.6% of total N applied, corresponding to an average EF of 1.48% of applied N fertilizer lost as N2O-N. This is in line with the default global average value of 1.25% of applied N used in calculations of N2O emissions by the Intergovernmental Panel on Climate Change. During the emission pulses, which were triggered by high soil moisture and high availability of mineral N, a clear diurnal pattern of N2O emissions was observed, driven by daily changes in topsoil temperature. For these periods, air sampling from 8:00 to 10:00 and from 18:00 to 20:00 was found to best represent the mean daily N2O flux rates. The wet topsoil conditions caused by irrigation favored the production of N2O from NO3− fertilizers, but not from NH4+ fertilizers, thus indicating that denitrification was the main process causing N2O emissions. It is therefore argued that there is scope for reducing N2O emission from irrigated cotton production; i.e. through the exclusive use of NH4+ fertilizers. Advanced application and irrigation techniques such as subsurface fertilizer application, drip irrigation and fertigation may also minimize N2O emission from this regionally dominant agro-ecosystem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The efficiency of the nitrogen (N) application rates 0, 120, 180 and 240 kg N ha−1 in combination with low or medium water levels in the cultivation of winter wheat (Triticum aestivum L.) cv. Kupava was studied for the 2005–2006 and 2006–2007 growing seasons in the Khorezm region of Uzbekistan. The results show an impact of the initial soil Nmin (NO3-N + NH4-N) levels measured at wheat seeding on the N fertilizer rates applied. When the Nmin content in the 0–50 cm soil layer was lower than 10 mg kg−1 during wheat seeding in 2005, the N rate of 180 kg ha−1 was found to be the most effective for achieving high grain yields of high quality. With a higher Nmin content of about 30 mg kg−1 as was the case in the 2006 season, 120 kg N ha−1 was determined as being the technical and economical optimum. The temporal course of N2O emissions of winter wheat cultivation for the two water-level studies shows that emissions were strongly influenced by irrigation and N-fertilization. Extremely high emissions were measured immediately after fertilizer application events that were combined with irrigation events. Given the high impact of N-fertilizer and irrigation-water management on N2O emissions, it can be concluded that present N-management practices should be modified to mitigate emissions of N2O and to achieve higher fertilizer use efficiency.