346 resultados para 080703 Human Information Behaviour


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Lyngbya majuscula is a cyanobacterium (blue-green algae) occurring naturally in tropical and subtropical coastal areas worldwide. Deception Bay, in Northern Moreton Bay, Queensland, has a history of Lyngbya blooms, and forms a case study for this investigation. The South East Queensland (SEQ) Healthy Waterways Partnership, collaboration between government, industry, research and the community, was formed to address issues affecting the health of the river catchments and waterways of South East Queensland. The Partnership coordinated the Lyngbya Research and Management Program (2005-2007) which culminated in a Coastal Algal Blooms (CAB) Action Plan for harmful and nuisance algal blooms, such as Lyngbya majuscula. This first phase of the project was predominantly of a scientific nature and also facilitated the collection of additional data to better understand Lyngbya blooms. The second phase of this project, SEQ Healthy Waterways Strategy 2007-2012, is now underway to implement the CAB Action Plan and as such is more management focussed. As part of the first phase of the project, a Science model for the initiation of a Lyngbya bloom was built using Bayesian Networks (BN). The structure of the Science Bayesian Network was built by the Lyngbya Science Working Group (LSWG) which was drawn from diverse disciplines. The BN was then quantified with annual data and expert knowledge. Scenario testing confirmed the expected temporal nature of bloom initiation and it was recommended that the next version of the BN be extended to take this into account. Elicitation for this BN thus occurred at three levels: design, quantification and verification. The first level involved construction of the conceptual model itself, definition of the nodes within the model and identification of sources of information to quantify the nodes. The second level included elicitation of expert opinion and representation of this information in a form suitable for inclusion in the BN. The third and final level concerned the specification of scenarios used to verify the model. The second phase of the project provides the opportunity to update the network with the newly collected detailed data obtained during the previous phase of the project. Specifically the temporal nature of Lyngbya blooms is of interest. Management efforts need to be directed to the most vulnerable periods to bloom initiation in the Bay. To model the temporal aspects of Lyngbya we are using Object Oriented Bayesian networks (OOBN) to create ‘time slices’ for each of the periods of interest during the summer. OOBNs provide a framework to simplify knowledge representation and facilitate reuse of nodes and network fragments. An OOBN is more hierarchical than a traditional BN with any sub-network able to contain other sub-networks. Connectivity between OOBNs is an important feature and allows information flow between the time slices. This study demonstrates more sophisticated use of expert information within Bayesian networks, which combine expert knowledge with data (categorized using expert-defined thresholds) within an expert-defined model structure. Based on the results from the verification process the experts are able to target areas requiring greater precision and those exhibiting temporal behaviour. The time slices incorporate the data for that time period for each of the temporal nodes (instead of using the annual data from the previous static Science BN) and include lag effects to allow the effect from one time slice to flow to the next time slice. We demonstrate a concurrent steady increase in the probability of initiation of a Lyngbya bloom and conclude that the inclusion of temporal aspects in the BN model is consistent with the perceptions of Lyngbya behaviour held by the stakeholders. This extended model provides a more accurate representation of the increased risk of algal blooms in the summer months and show that the opinions elicited to inform a static BN can be readily extended to a dynamic OOBN, providing more comprehensive information for decision makers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Neo-angiogenesis during neoplastic growth involves endothelial mitogenic and migration stimuli produced by cancer or tumour stromal cells. Although this active angiogenesis takes place in the tumour periphery, the process of vessel growth and survival in inner areas and its clinical role remain largely unexplored. The present study compared the microvessel score (MS) as well as the single endothelial cell score (ECS) in the invading edge and in inner areas of non-small cell lung carcinomas (NSCLCs). Three different patterns of vascular growth were distinguished: the edvin (edge vs. inner) type 1, where a low MS was observed in both peripheral and inner tumour areas; the edvin type 2, where a high MS was noted in the invading front but a low MS in inner areas; and the edvin type 3, where both peripheral and inner tumour areas had a high MS. The ECS was high in the invading edge in edvin type 2 and 3 cases and was sharply decreased in both types in inner areas, suggesting that endothelial cell migration is unlikely to contribute to the angiogenic process in areas away from the tumour front. Expression of the vascular endothelial growth factor (VEGF) and of thymidine phosphorylase (TP) was associated with a high MS in the invading edge. VEGF was associated with a high MS in inner areas (edvin 3), while TP expression was associated with edvin type 2, showing that VEGF (and not TP) contributes to the preservation of the inner vasculature. Both edvin type 2 and 3 cases showed an increased incidence of node metastasis, but edvin type 3 cases had a poorer prognosis, even in the N1-stage group. The present study suggests that tumour factors regulating angiogenesis and vascular survival are not identical. A possible method is reported to quantify these two parameters by comparing the MS in the invading edge and inner areas (edvin types). This observation may contribute to the evaluation of the effectiveness of different therapeutic approaches, namely vascular targeting vs. anti-angiogenesis. Copyright (C) 2000 John Wiley and Sons, Ltd.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose Women who experience cancer treatment-induced menopause are at risk of long-term chronic morbidity. This risk can be prevented or offset with adherence to health promotion and risk reduction guidelines. The purpose of this study was to explore health behaviours in younger female survivors of cancer and the variables (quality of life and psychological distress) believed to moderate health behaviours. Design Cross-sectional survey of a convenience sample of women (n = 85) in southeast Queensland. Methods Health behaviour and health status were elicited with items from the Australian Health Survey and the Behavioural Risk Factor Surveillance System. The WHO Quality of Life (Brief) measured participants’ self-reported quality of life and their satisfaction with their health. The Brief Symptom Inventory-18 measured psychological distress. Findings Higher self-reported health status was associated with regular exercise and better quality of life. However, a substantial proportion of participants did not engage in the physical activity, dietary or cervical screening practices recommended by Australian guidelines. Conclusions The participants require education regarding the benefits of diet, exercise, weight loss and decreased alcohol intake, as well as information on future health risks and possible comorbidities. These education sessions could be addressed by a nurse-led health promotion model of care at the time of discharge or in the community.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis addresses the process simulation and validation in Business Process Management. It proposes that the hybrid Multi Agent System (MAS) / 3D Virtual World approach is a valid method for better simulating the behaviour of human resources in business processes, supporting a wide range of rich visualization applications that can facilitate communication between business analysts and stakeholders. It is expected that the findings of this thesis may be fruitfully extended from BPM to other application domains, such as social simulation in video games and computer-based training animations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Previous studies have shown that users’ cognitive styles play an important role during Web searching. However, only limited studies have showed the relationship between cognitive styles and Web search behavior. Most importantly, it is not clear which components of Web search behavior are influenced by cognitive styles. This paper examines the relationships between users’ cognitive styles and their Web searching and develops a model that portrays the relationship. The study uses qualitative and quantitative analyses to inform the study results based on data gathered from 50 participants. A questionnaire was utilised to collect participants’ demographic information, and Riding’s (1991) Cognitive Style Analysis (CSA) test to assess their cognitive styles. Results show that users’ cognitive styles influenced their information searching strategies, query reformulation behaviour, Web navigational styles and information processing approaches. The user model developed in this study depicts the fundamental relationships between users’ Web search behavior and their cognitive styles. Modeling Web search behavior with a greater understanding of user’s cognitive styles can help information science researchers and information systems designers to bridge the semantic gap between the user and the systems. Implications of the research for theory and practice, and future work are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Biomonitoring has become the ‘gold standard’ in assessing chemical exposures, and plays an important role in risk assessment. The pooling of biological specimens – combining multiple individual specimens into a single sample – can be used in biomonitoring studies to monitor levels of exposure and identify exposure trends, or to identify susceptible populations in a cost-effective manner. Pooled samples provide an estimate of central tendency, and may also reveal information about variation within the population. The development of a pooling strategy requires careful consideration of the type and number of samples collected, the number of pools required, and the number of specimens to combine per pool in order to maximize the type and robustness of the data. Creative pooling strategies can be used to explore exposure-outcome associations, and extrapolation from other larger studies can be useful in identifying elevated exposures in specific individuals. The use of pooled specimens is advantageous as it saves significantly on analytical costs, may reduce the time and resources required for recruitment, and in certain circumstances, allows quantification of samples approaching the limit of detection. In addition, use of pooled samples can provide population estimates while avoiding ethical difficulties that may be associated with reporting individual results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Making a conscious effort to hide the fact that one is texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened crash risk from engaging in this behaviour. First, several small focus group discussions (N = 12) were carried out to elicit the underlying salient beliefs regarding this behaviour, in accordance with the Theory of Planned Behaviour (TPB). Findings from these discussions, in conjunction with available prior evidence regarding general mobile phone use while driving, then informed questionnaire items that assessed young peoples’ beliefs regarding this behaviour, as well as intention to engage in this behaviour in the next week. In the questionnaire phase of the study, participants (N = 171) were aged 17–25 years, owned a mobile phone, and held a current driver’s licence. Results showed that there were significant differences between low and high intenders (to engage in concealed texting while driving) on the behavioural, normative, and control beliefs investigated. Specifically, high intenders were more likely to believe that concealed texting while driving would result in sharing information with others, using time effectively, and were less likely to think that free-flowing traffic would prevent their engagement in this behaviour. By targeting these beliefs, these findings may potentially inform the development of advertising and other public intervention strategies, aimed at ensuring young drivers reconsider their engagement in this risky behaviour.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study explored the creation, dissemination and exchange of electronic word of mouth, in the form of product reviews and ratings of digital technology products. Based on 43 in-depth interviews and 500 responses to an online survey, it reveals a new communication model describing consumers' info-active and info-passive information search styles. The study delivers an in-depth understanding of consumers' attitudes towards current advertising tools and user-generated content, and points to new marketing techniques emerging in the online environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Human Resources (HR) policies and practices have changed due to global environmental instability. These policies and practices are key factors for successful environmental management. Using the Theory of Planned Behaviour, this article aims to understand the critical factors which influence senior management’s decision to adopt ‘green’ HR practices. Data were collected from 210 organisations in Australia using two separate surveys. Survey one, which was addressed directly to HR managers and directors, contained questions relating to HR policies (the dependent variables), while survey two, which was addressed directly to CEOs and senior managers, contained questions about environmental-related attitudes, subjective norms and perceived control (the independent variables). Results indicated that senior management’s environmental-related attitudes, subjective norms from stakeholders and perceived green resource readiness influenced their decision to adopt green HR initiatives. However, attitudes and green resource readiness in particular had greater impacts than subjective norms. Limitations, implications and future research are also outlined.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We extended the previous work of Moss, O’Connor and White, to include a measure of group norms within the theory of planned behaviour (TPB), to examine the influences on students’ decisions to use lecture podcasts as part of their learning. Participants (N = 90) completed the extended TPB predictors before semester began (Time 1) and mid-semester (Time 2) and reported on their podcast use at mid-semester (Time 2) and end of semester (Time 3). We found that attitudes and perceived social pressures were important in informing intentions at both time points. At Time 1, perceptions of control over performing the behaviour and, at Time 2, perceptions of whether podcast use was normative among fellow students (group norms) also predicted intended podcast use. Intentions to use podcasting predicted self-reported use at both Time 2 and Time 3. These results provide important applied information for educators to encourage student use of novel on-line educational tools.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A victim of phishing emails could be subjected to money loss and identity theft. This paper investigates the different types of phishing email victims, with the goal of increasing such victims' defences. To obtain this kind of information, an experiment which involves sending a phishing email to participants is conducted. Quantitative and qualitative methods are also used to collect users' information. A model for detecting deception has been employed to understand victims' behaviour. This paper reports the qualitative results. The findings suggest that victims of phishing emails do not always exhibit the same vulnerability. The cause of being a victim is a result of three weaknesses in the detection process: (1) lack of knowledge; (2) weak confirmation channel, and; (3) victims' high propensity towards risk-taking. Therefore, it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishing emails.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we seek to operationalize Amartya Sen's concept of human capability to guide a scholarly investigation of student career choice capability. We begin by outlining factors affecting youth labour markets in Australia; a prosperous country that is affected by a ‘two-speed’ national economy. We then examine recent government initiatives that have been designed to combat youth unemployment and cyclical disadvantage by enhancing the aspirations and career knowledge of secondary school students. We argue that these policy measures are based on four assumptions: first, that career choice capability is a problem of individual agency; second, that the dissemination of career information can empower students to act as ‘consumers’ in an unequal job market; third, that agency is simply a question of will; and finally, that school education and career advice – as a means to freedom in the space of career development – is of equal quality, distribution and value to an increasingly diverse range of upper secondary school students. The paper concludes by outlining a conceptual framework capable of informing an empirical research project that aims to test these assumptions by measuring and comparing differences between groups in the range of freedom to achieve and, therefore, to choose.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Human polybrominated diphenyl ether (PBDE) exposure occurs through a range of pathways including: ingestion of dust including hand-to-mouth contact; inhalation (air/particulate matter); and ingestion via food including the unique nutrition sources of human milk and placental transfer. While inhalation has been deemed a minor source of exposure, ingestion of food and dust make greater contributions to overall PBDE body burden with intake via dust reported to be much higher in infants than in adults. PBDEs have been detected in samples of human milk, blood serum, cord blood, and adipose tissue worldwide. Concentrations have been found to be highest in populations from North America, followed by Australia, Europe, and Asia. While factors such as gender and parity may not affect concentrations, occupational exposure and age (infants and children) are associated with higher PBDE concentrations. In contrast to “traditional” persistent organic pollutants, there is an inverse relationship between PBDE body burden and age. Predicted body burden calculated using available information on intake and elimination rates of BFRs appears to underestimate measured human body burden data obtained through analysis of BFRs in blood or human milk. This may be due to unknown exposure or inaccurate elimination data. Further exposure studies should focus on younger age groups and an investigation of human PBDE half-lives.