252 resultados para Collaborations and Networking


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Science, Art and Science Art collaborations are generally presented and understood in terms of their products. We argue that the process of Science art can be a significant, even principal benefit of these collaborations, even though it may be largely invisible to anyone other than the collaborators. Hosting the Centenary of Canberra Science Art Commission at the Commonwealth Scientific and Industrial Research Organisation (CSIRO) has shown us that while Science and Art pursue orthogonal dimensions of creativity and innovation, collaborators can combine these directions to access new areas of imagination and ideas.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This essay makes three related claims about digital media creative clusters through a case study of the Hub in Glasgow, Scotland. First, online social networking platforms are an increasingly “common sense” feature that property developers include to attract media workers to purpose-built properties. Second, integrating and managing professional identities through the construction of place are considered necessary to promote that place to a larger audience. Finally, reorganizing place in this way refashions creative work as a more nebulous concept, a process that integrates formerly distinct aspects of our work and nonwork lives into the common pursuit of innovation for economic gain.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article considers the artistic and legal practices of Bangarra Dance Theatre in a case study of copyright law management in relation to Indigenous culture. It is grounded in the particular local experience, knowledge and understanding of copyright law displayed by the performing arts company. The first part considers the special relationship between Bangarra Dance Theatre and the Munyarrun Clan. It examines the contractual arrangements developed to recognise communal ownership. The next section examines the role of the artistic director and choreographer. It looks at the founder, Carole Johnson, and her successor, Stephen Page. The third part of the article focuses on the role of the composer, David Page. It examines his ambition to set up a Indigenous recording company, Nikinali. Part 4 focuses upon the role of the artistic designers. It looks at the contributions of artistic designers such as Fiona Foley. Part 5 deals with broadcasts of performances on television, film, and multi-media. Part 6 considers the collaborations of Bangarra Dance Theatre with the Australian Ballet, and the Sydney Organising Committee for the Olympic Games. The conclusion considers how Bangarra Dance Theatre has played a part ina general campaign to increase protection of Indigenous copyright law.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In his 1987 book, The Media Lab: Inventing the Future at MIT, Stewart Brand provides an insight into the visions of the future of the media in the 1970s and 1980s. 1 He notes that Nicolas Negroponte made a compelling case for the foundation of a media laboratory at MIT with diagrams detailing the convergence of three sectors of the media—the broadcast and motion picture industry; the print and publishing industry; and the computer industry. Stewart Brand commented: ‘If Negroponte was right and communications technologies really are converging, you would look for signs that technological homogenisation was dissolving old boundaries out of existence, and you would expect an explosion of new media where those boundaries used to be’. Two decades later, technology developers, media analysts and lawyers have become excited about the latest phase of media convergence. In 2006, the faddish Time Magazine heralded the arrival of various Web 2.0 social networking services: You can learn more about how Americans live just by looking at the backgrounds of YouTube videos—those rumpled bedrooms and toy‐strewn basement rec rooms—than you could from 1,000 hours of network television. And we didn’t just watch, we also worked. Like crazy. We made Facebook profiles and Second Life avatars and reviewed books at Amazon and recorded podcasts. We blogged about our candidates losing and wrote songs about getting dumped. We camcordered bombing runs and built open‐source software. America loves its solitary geniuses—its Einsteins, its Edisons, its Jobses—but those lonely dreamers may have to learn to play with others. Car companies are running open design contests. Reuters is carrying blog postings alongside its regular news feed. Microsoft is working overtime to fend off user‐created Linux. We’re looking at an explosion of productivity and innovation, and it’s just getting started, as millions of minds that would otherwise have drowned in obscurity get backhauled into the global intellectual economy. The magazine announced that Time’s Person of the Year was ‘You’, the everyman and everywoman consumer ‘for seizing the reins of the global media, for founding and framing the new digital democracy, for working for nothing and beating the pros at their own game’. This review essay considers three recent books, which have explored the legal dimensions of new media. In contrast to the unbridled exuberance of Time Magazine, this series of legal works displays an anxious trepidation about the legal ramifications associated with the rise of social networking services. In his tour de force, The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, Daniel Solove considers the implications of social networking services, such as Facebook and YouTube, for the legal protection of reputation under privacy law and defamation law. Andrew Kenyon’s edited collection, TV Futures: Digital Television Policy in Australia, explores the intersection between media law and copyright law in the regulation of digital television and Internet videos. In The Future of the Internet and How to Stop It, Jonathan Zittrain explores the impact of ‘generative’ technologies and ‘tethered applications’—considering everything from the Apple Mac and the iPhone to the One Laptop per Child programme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In 2013, social networking was the second most popular online activity after internet banking for Australians (ABS, 2014). The popularity and apparent ubiquity of social media is one of the most obvious and compelling arguments for integrating such technologies into higher education. Already, social media impacts a wide range of activities ranging in scope from marketing and communication to teaching and learning in higher education (Hrastinski & Dennen, 2012). Social media presents many exciting possibilities and opportunities for higher education. This session will focus on one staff focussed and one student focussed social media innovation currently underway at QUT. First, it will focus on the actions of QUT’s social media working group. The working group’s aim is to ensure an overarching social media policy for the university is developed and implemented that supports staff in the use of social media across a range of activities. Second, it will discuss the eResponsible and eProfessional Online resources for students project. The focus of this project is to develop a suite of online resources targeted at the devel opment of social media skills for undergraduate students at QUT. These initiatives are complementary and both aim to minimise risk while maximising opportuniti es for the university

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the ever increasing amount of eHealth data available from various eHealth systems and sources, Health Big Data Analytics promises enticing benefits such as enabling the discovery of new treatment options and improved decision making. However, concerns over the privacy of information have hindered the aggregation of this information. To address these concerns, we propose the use of Information Accountability protocols to provide patients with the ability to decide how and when their data can be shared and aggregated for use in big data research. In this paper, we discuss the issues surrounding Health Big Data Analytics and propose a consent-based model to address privacy concerns to aid in achieving the promised benefits of Big Data in eHealth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. In this paper, we take a step closer to the adoption of the Information Accountability protocols and demonstrate their functionality through an implementation in FluxMED, a customisable EHR system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This tutorial primarily focuses on the implementation of Information Accountability (IA) protocols defined in an Information Accountability Framework (IAF) in eHealth systems. Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. This conflict is evident in the review of Australia's PCEHR system and in recent studies of patient control of access to their eHealth information. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. Through the use of IA protocols, so-called Accountable-eHealth systems (AeH) create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of the IAF protocols into existing eHealth systems and demonstrate their use. The functionality of the protocols and AeH systems will be demonstrated, and an example of the implementation of the IAF protocols into an existing eHealth system will be presented and discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis investigates the role of Chinese microblogging platform Sina Weibo in how the people of Guangzhou understand and negotiate their sense of locality. The geo-identity approach used in this thesis opens up a new approach to explore the complex power relationships that structure our society in and through digital media. It finds that although the Chinese government is trying to orchestrate a homogeneous sense of national belonging, Weibo is constantly reinforcing people's awareness of and identification with the local. The findings show that as new communication technologies and practices reconfigure people's daily experience and social lives, they redefine our sense of self and belonging.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Past research has suggested that social engineering poses the most significant security risk. Recent studies have suggested that social networking sites (SNSs) are the most common source of social engineering attacks. The risk of social engineering attacks in SNSs is associated with the difficulty of making accurate judgments regarding source credibility in the virtual environment of SNSs. In this paper, we quantitatively investigate source credibility dimensions in terms of social engineering on Facebook, as well as the source characteristics that influence Facebook users to judge an attacker as credible, therefore making them susceptible to victimization. Moreover, in order to predict users’ susceptibility to social engineering victimization based on their demographics, we investigate the effectiveness of source characteristics on different demographic groups by measuring the consent intentions and behavior responses of users to social engineering requests using a role-play experiment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose This paper aims to conduct a systematic review of the literature on supply chain collaboration published over a 10-year period from 2005 to 2014. It explores the nature and extent of research undertaken to identify key themes emerging in the field and gaps that need to be addressed. Design/methodology/approach The authors review a sample of 207 articles from 69 journals, after using an iterative cycle of defining appropriate search keywords, searching the literature and conducting the analysis. Findings Key themes include the meaning of collaboration; considerations for supply chain collaboration theory; emerging areas in collaboration for sustainability, technology-enabled supply chains and humanitarian supply chains; and the need for a more holistic approach, multi-tier perspectives and research into B2C collaborations. Research limitations/implications The paper provides discussion and scope for future research into the area which would contribute to the field tremendously. Originality/value There have been very few reviews in the past on supply chain collaboration, and this is one of the first extensive reviews conducted to address how well the body of knowledge on supply chain collaboration corresponds with our contemporary society.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The late twentieth century witnessed the transformation of the global economy beyond the fixed geographic boundaries of the nation-state system to one dominated by financial centers, global markets, and transnational firms. In the two decades to 2011, cross-border philanthropy from OECD Development Assistance Committee (DAC) donor countries to the developing world grew from approximately USD 5 billion to USD 32 billion (OECD, n.d.),[1] with some estimates for 2011 as high as USD 59 billion (Center for Global Prosperity, 2013). This is only part of cross-border philanthropy, which also includes remittances from migrant communities, social-media-enabled global fundraising, and medical research collaborations.