265 resultados para Messages


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evidence is needed for the acceptability and user preferences of receiving skin cancer-related text messages. We prepared 27 questions to evaluate attitudes, satisfaction with program characteristics such as timing and spacing, and overall satisfaction with the Healthy Text program in young adults. Within this randomised controlled trial (age 18-42 years), 546 participants were assigned to one of three Healthy Text message groups; sun protection, skin self-examination, or attention-control. Over a 12-month period, 21 behaviour-specific text messages were sent to each group. Participants’ preferences were compared between the two interventions and control group at the 12-month follow-up telephone interview. In all three groups, participants reported the messages were easy to understand (98%), provided good suggestions or ideas (88%), and were encouraging (86%) and informative (85%) with little difference between the groups. The timing of the texts was received positively (92%); however, some suggestions for frequency or time of day the messages were received from 8% of participants. Participants in the two intervention groups found their messages more informative, and triggering behaviour change compared to control. Text messages about skin cancer prevention and early detection are novel and acceptable to induce behaviour change in young adults.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social marketing by Western governments that use fear tactics and threatening information to promote anti-drinking messages has polarized ‘binge drinking’ and ‘moderate drinking’ through a continuum that implies benefits and harms for both individuals and society. With the goal of extending insights into social marketing approaches that promote safer drinking cultures in Australia, we discuss findings from a study that examines alcohol consumers' moderate-drinking intentions. By applying the theory of planned behaviour and emotions theory, we discuss survey results from a sample of alcohol consumers, which demonstrate that positively framed value propositions that evoke happiness and love are more influential in the processing of an alcohol moderation message for alcohol consumers. The key limitations of this study are the cross-sectional nature of the data and the focal-dependent variable being behavioural intentions rather than behaviours. Research insight into the stronger influence of positive emotions on processing an alcohol moderation message establishes an important avenue for future social marketing communications that moves beyond negative, avoidance appeals to promote behaviour change in drinkers. These research findings will benefit professionals involved in developing social change campaigns that promote and reinforce consumers' positive intentions, with messages about the benefits of controlled, moderate drinking.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Efficient error-Propagating Block Chaining (EPBC) is a block cipher mode intended to simultaneously provide both confidentiality and integrity protection for messages. Mitchell’s analysis pointed out a weakness in the EPBC integrity mechanism that can be used in a forgery attack. This paper identifies and corrects a flaw in Mitchell’s analysis of EPBC, and presents other attacks on the EPBC integrity mechanism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research investigated the potential of folk opera as a tool for HIV and AIDS education in Papua New Guinea. It began with an investigation on the indigenous performativities and theatricalities of Papua New Guineans, conducting an audit of eight selected performance traditions in Papua New Guinea. These traditions were analysed, and five cultural forms and twenty performance elements were drawn out for further exploration. These elements were fused and combined with theatre techniques from western theatre traditions, through a script development process involving Australians, Papua New Guineans and international collaborators. The resulting folk opera, entitled Kumul, demonstrates what Murphy (2010) has termed story force, picture force, and feeling force, in the service of a story designed to educate Papua New Guinean audiences about HIV and the need to adopt safer sexual practices. Kumul is the story of a young man faced with decisions on whether or not to engage in risky sexual behaviours. Kumul's narrative is carefully framed within selected Papua New Guinean beliefs drawn from the audit to deliver HIV and AIDS messages using symbolic and metaphoric communication techniques without offending people. The folk opera Kumul was trialled in two communities in Papua New Guinea: a village community and an urban settlement area. Kumul is recognisable to Papua New Guinean audiences because it reflects their lifestyle and a worldview, which connects them to their beliefs and spirituality, and the larger cosmological order. Feedback from audience members indicated that the performance facilitated HIV and AIDS communication, increased people's awareness of HIV and AIDS, and encouraged behaviour change. Tellingly, in one performance venue, forty people queued for Voluntary Testing and Counseling immediately after the performance. Twenty of these people were tested on that night and the other twenty were tested the following day. Many of the volunteers were young men – a demographic historically difficult to engage in HIV testing. This encouraging result indicates that the Kumul folk opera form of applied theatre could be useful for facilitating communication and education regarding sexual health and safer sexual behaviours in Papua New Guinea. Feedback from participants, audience members and other research stakeholders suggests that the form might also be adapted to address other social and development issues, particularly in the areas of health and social justice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examines the benefits of Cooperative Intelligent Transport Systems (C-ITS) in weaving sections. The research proposes a lane-changing advisory application to alleviate the lane-changing concentration in weaving sections by coordinating weaving vehicles. While non-weaving vehicles travel as normal, weaving vehicles are monitored and advised through personalized messages based on their destination lane. The findings of this research, derived from a microscopic simulation in AIMSUN, reveal that the proposed strategy has the potential to improve delay significantly and that it can be applied to any existing one-sided weaving sections.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Problem, research strategy and findings: On January 10, 2011, the town of Grantham, Queensland (Australia), was inundated with a flash flood in which 12 of the town's 370 residents drowned. The overall damage bill in Queensland was AUD∃2.38 billion (USD∃2.4 billion) with 35 deaths, and more than three-quarters of the state was declared a flood disaster zone. In this study, we focus on the unusual and even rare decision to relocate Grantham in March 2011. The Lockyer Valley Regional Council (LVRC) acquired a 377-hectare (932-acre) site to enable a voluntary swap of equivalent-sized lots. In addition, planning regulations were set aside to streamline the relocation of a portion of the town. We review the natural hazard literature as it relates to community relocation, state and local government documents related to Grantham, and reports and newspaper articles related to the flood. We also analyze data from interviews with key stakeholders. We document the process of community relocation, assess the relocation process in Grantham against best practice, examine whether the process of community relocation can be upscaled and if the Grantham relocation is an example of good planning or good politics. Takeaway for practice: Our study reveals two key messages for practice. Community relocation (albeit a small one) is possible, and the process can be done quickly; some Grantham residents moved into their new, relocated homes in December 2012, just 11 months after the flood. Moreover, the role of existing planning regulations can be a hindrance to quick action; political leadership, particularly at the local level, is key to implementing the relocation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A one size fits all approach dominates alcohol programs in school settings (Botvin et al., 2007), which may limit program effectiveness (Snyder et al., 2004). Programs tailored to the meet the needs and wants of adolescent groups may be more effective. Limited attention has been directed towards employing a full segmentation process. Where segmentation has been examined, the focus has remained on socio-demographic characteristics and more recently psychographic variables (Mathijssen et al., 2012). The current study aimed to identify whether the addition of behaviour could be used to identify segments. Variables included attitudes towards binge drinking (α = 0.86), behavioral intentions’ (α = 0.97), perceived behavioral control (PBC), injunctive norms (α = 0.94); descriptive norms (α = 0.87), knowledge and reported behaviour. Data was collected from five schools, n = 625 (32.96% girls). Two-Step cluster analysis produced a sample (n = 625) with a silhouette measure of cohesion and separation of 0.4. The intention measure and whether students reported previously consuming alcohol were the most distinguishing characteristics - predictor importance scores of (1.0). A four segment solution emerged. The first segment (“Male abstainers” – 37.2%) featured the highest knowledge score (M: 5.9) along with the lowest-risk drinking attitudes and intentions to drink excessively. Segment 2 (“At risk drinkers” - 11.2%) were characterised by their high-risk attitudes and high-risk drinking intentions. Injunctive (M: 4.1) and descriptive norms (M: 4.9) may indicate a social environment where drinking is the norm. Segment 3 (”Female abstainers” – 25.9%) represents young girls, who have the lowest-risk attitudes and low intentions to drink excessively. The fourth and final segment (boys = 67.4%) (“Moderate drinkers” – 25.7%) all report previously drinking alcohol yet their attitudes and intentions towards excessive alcohol consumption are lower than other segments. Segmentation focuses on identifying groups of individuals who feature similar characteristics. The current study illustrates the importance of including reported behaviour in addition to psychographic and demographic characteristics to identify unique groups to inform intervention planning and design. Key messages The principle of segmentation has received limited attention in the context of school-based alcohol education programs. This research identified four segments amongst 14-16 year high school students, each of which can be targeted with a unique, tailored program to meet the needs and wants of the target audience.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

During the critical neurobiological and social developmental period of adolescence, binge drinking of alcohol increases the risk of mental health problems, school exclusion, convictions, fatal and non-fatal accidents. The present research utilizes a simple cluster randomized control trial design to evaluate a social marketing program, Game On: Know Alcohol (GOKA), employing innovative online edutainment games to target binge drinking. Pre and post data were collected for seven program (942 students, mean age: 14.6 years) and five control schools (578 students, mean age: 14.4 years). Significant improvements in alcohol knowledge and affective attitude toward binge drinking was observed for adolescents who participated in GOKA compared to the control group, with maintenance of desirable subjective norms, instrumental attitudes and intentions. Given considerable external competition from messages promoting the benefits of alcohol use, a one-off program that modifies incorrect knowledge and alters perceptions of binge drinking as a fun, recreational activity represents an important step. This research contributes to current understanding of social marketing’s capacity to change drivers and maintain inhibitors of binge drinking intentions of adolescents and provides an important basis for future research in the domain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Brave New Welcome is the title of a short film, and a project, which was driven by a diverse group of young people who engaged with arts practices such as playback theatre, visual and media arts, and who worked with a range of professionals to develop their own response to the issue of how young people from refugee backgrounds are welcomed in Brisbane. Film Description on Vimeo: In January 2014, at a time when Australia is full of messages of ‘unwelcome’, a group of 20 young people from diverse backgrounds came together in Brisbane. We asked, ‘What does it take to make friends with people who are really different from ourselves?’ We told stories using music, playback theatre and community café dialogue. Our experience was so awesome we decided to give others a taste. So, three months later, we brought over 80 young people together in a forum to meet each other and tell stories in creative and interesting ways. We shared our ideas, asked big questions, and challenged others in our community. What can you do to create a Brave New Welcome?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Essentialism is an ontological belief that there exists an underlying essence to a category. This article advances and tests in three studies the hypothesis that communication about a social category, and expected or actual mutual validation, promotes essentialism about a social category. In Study 1, people who wrote communications about a social category to their ingroup audiences essentialized it more strongly than those who simply memorized about it. In Study 2, communicators whose messages about a novel social category were more elaborately discussed with a confederate showed a stronger tendency to essentialize it. In Study 3, communicators who elaborately talked about a social category with a naive conversant also essentialized the social category. A meta-analysis of the results supported the hypothesis that communication promotes essentialism. Although essentialism has been discussed primarily in perceptual and cognitive domains, the role of social processes as its antecedent deserves greater attention.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter provides a history of the media as political actors and identifies key principles that have shaped their role in both democratic and authoritarian polities (i.e., information, interpretation, participation, critical scrutiny). In addition, the chapter explores recent trends impacting on the performance of that role, such as the emergence of the Internet and, as a consequence of that process, a globalized public sphere of transnational news media outlets. It is argued that to make the Internet truly valuable as a political resource, democratic societies continue to require the work of skilled, professional journalists and their sense making, interpretative functions. Because of that journalists and their organizations remain crucial to the translation of content into meaningful messages.