498 resultados para Baccalaureate addresses.
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
Recent reports from Bangladesh about the Grameen Bank (GB) having to seriously review its policies and restructure its procedures have not stopped countries like the Philippines from making a success of Grameen Bank Replicas (GBRs). Women across Asia continue to benefit from microfinance initiatives and are motivated to move out of poverty through the influence of the GB and other microfinance institutes. This paper addresses specifically the microfinance activities in the Philippines and reports on some of the issues surrounding the successes and setbacks of programs in that country.
Resumo:
Consumersatisfaction is fundamental to organisational success. It is well recognised that personal service is important in achieving consumer satisfaction. However, the application of self-service technology (SST) is widcning and is attennuating traditional exchanges between consumers and service employees. The effect of this reduction of personal service on consumer satisfaction judgements is not well understood. This study addresses this gap by investigating the relative effects of SST and personal service attributes on overall consumer satisfaction. Thc study highlights important service attributes applicable to SST and personal service. The conceptual framework is tested using data collected from 241 leisure and business travellers drawn from premium hotels in a regional area. Structural equation modelling techniques support the conceptual framework. As expected, the attributes of personal service and SST contribute to consumer satisfaction. However, thc impact of personal service attributes 011 consumer satisfaction is much stronger than the effects of SST attributes. Though SST is an important determinant of consumer satisfaction, interactions with staff are critical. These results have applications for the theory and practice of services marketing, and high light avenues for further investigation.
Resumo:
Views on the nature and relevance of science education have changed significantly over recent decades. This has serious implications for the way in which science is taught in secondary schools, particularly with respect to teaching emerging topics such as biotechnology, which have a socio-scientific dimension and also require novel laboratory skills. It is apparent in current literature that there is a lack of adequate teacher professional development opportunities in biotechnology education and that a significant need exists for researchers to develop a carefully crafted and well supported professional development design which will positively impact on the way in which teachers engage with contemporary science. This study used a retrospective case study methodology to document the recent evolution of modern biotechnology education as part of the changing nature of science education; examine the adoption and implementation processes for biotechnology education by three secondary schools; and to propose an evidence based biotechnology professional development model for science educators. Data were gathered from documents, one-on-one interviews and focus group discussions. Analysis of these data has led to the proposal of a biotechnology professional development model which considers all of the key components of science professional development that are outlined in the literature, as well as the additional components which were articulated by the educators studied. This research is timely and pertinent to the needs of contemporary science education because of its recognition of the need for a professional development model in biotechnology education that recognizes and addresses the content knowledge, practical skills, pedagogical knowledge and curriculum management components.
Resumo:
This paper reports on progress in developing new design and measurement concepts, and translating these concepts into practical applications. This research addresses gaps in ‘best practice’ green building, and is aimed ultimately at replacing green buildings with sustainable urban environments. Building on the author’s previously articulated concepts of Design for Eco-services and Positive Development, this research will demonstrate how to eco-retrofit cities so that they reverse the negative impacts of past design and generate net positive ecological impacts, at no extra cost. In contrast to ‘restorative’ design,this means increasing ecological carrying capacity and natural and social capital through built environment design. Some exemplars for facilitating Positive development will be presented in this talk,such as Green Scaffolding for retrofits, and Green Space Walls for new construction. These structures have been designed to grow and change over time, be easily deconstructed, and entail little waste. The frames support mini-ecospheres that provide a wide range of ecosystem services and biodiversity habitats, as well as heating, cooling and ventilating. In combination, the modules serve to improve human and environmental health. Current work is focused on developing a range of such space frame walls, optimised through an innovative marriage of eco-logical design and virtual modelling.
Resumo:
Ordinary desktop computers continue to obtain ever more resources – in-creased processing power, memory, network speed and bandwidth – yet these resources spend much of their time underutilised. Cycle stealing frameworks harness these resources so they can be used for high-performance computing. Traditionally cycle stealing systems have used client-server based architectures which place significant limits on their ability to scale and the range of applica-tions they can support. By applying a fully decentralised network model to cycle stealing the limits of centralised models can be overcome. Using decentralised networks in this manner presents some difficulties which have not been encountered in their previous uses. Generally decentralised ap-plications do not require any significant fault tolerance guarantees. High-performance computing on the other hand requires very stringent guarantees to ensure correct results are obtained. Unfortunately mechanisms developed for traditional high-performance computing cannot be simply translated because of their reliance on a reliable storage mechanism. In the highly dynamic world of P2P computing this reliable storage is not available. As part of this research a fault tolerance system has been created which provides considerable reliability without the need for a persistent storage. As well as increased scalability, fully decentralised networks offer the ability for volunteers to communicate directly. This ability provides the possibility of supporting applications whose tasks require direct, message passing style communication. Previous cycle stealing systems have only supported embarrassingly parallel applications and applications with limited forms of communication so a new programming model has been developed which can support this style of communication within a cycle stealing context. In this thesis I present a fully decentralised cycle stealing framework. The framework addresses the problems of providing a reliable fault tolerance sys-tem and supporting direct communication between parallel tasks. The thesis includes a programming model for developing cycle stealing applications with direct inter-process communication and methods for optimising object locality on decentralised networks.
Resumo:
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.
Resumo:
Research Background - Young people with negative experiences of mainstream education often display low levels of traditional academic achievement. These young people tend to display considerable cultural and social resources developed through their repeated experiences of adversity. Education research has a duty to provide these young people with opportunities to showcase, assess and translate their social and cultural resources into symbolic forms of capital. This creative work addresses the following research question. How can educators develop disengaged teenager's social and cultural capital through live music performances? Research Contribution - These live music performances afford the young participants opportunities to display their artistic, technical, social and cultural resources through a popular cultural format. In doing so they require education institutions to provide venues that demonstrate the skills these young people acquire through flexible learning environments. The new knowledge derived from this research focuses on the academic and self confidence benefits for disengaged young people using festival performances as authentic learning activities. Research Significance - This research is significant because it aims to maximise the number of tangible outcomes related to a school-based arts project. The young participants gained technical, artistic, social and commercial skills during this project. This performance led to more recording and opportunities to perform at other youth festivals in SE QLD. Individual performances were distributed and downloaded via creative commons licences at the Australian Creative Resource Archive. It also contributed to their certified qualifications and acted as pilot research data for two competitively funded ARC grants (DP0209421 & LP0883643)
Resumo:
Principal topic: Is habitual entrepreneurship different? Answering this is important to the field, however there is little systematic evidence, thus far. We addresses this by examining the role experience plays at three possible points of difference: motivations, actions and expectations; and by comparing those currently in the process of starting a business with those who have recent success in business creation. Firstly, we assess the balance of opportunity versus necessity motivation, internally versus externally stimulated decision processes and future growth aspirations. Literature suggests novices are more likely motivated to nascency out of necessity, and favour a manageable business size, while habitual entrepreneurs are more likely motivated by internally stimulated or idea driven processes. Secondly, we examine actions undertaken by successful experienced founders during gestation, contrasting ‘information collection’ and ‘opportunity definition’. Drawing on prior research we expect novices more likely to have enacted ‘information search’ while habitual entrepreneurs enact ‘opportunity definition’. Thirdly, we examine perceptions of venture success, where findings on overconfidence suggest that habitual entrepreneurs expect a higher chance of success for their ventures, while inexperience leads novices to underestimate the difficulty of entrepreneurial survival. Method: Empirical evidence to test these conjectures was drawn from a screened random sample of over 1100 Australian nascent and newly started business ventures. This information was collected during 2007/8 using a telephone survey. Results and Implications: Why do habitual entrepreneurs keep coming back? Findings suggest that while the pursuit of opportunity is shared by novice and experienced entrepreneur alike, consideration of repeat entrepreneurship may be motivated by a desire for growth. While idea driven motivations might not delineate a distinction during nascency, it does seem to be a factor contributing to the success of young firms. This warrants further research. How do habitual entrepreneurs behave differently? It seems they act to clearly define market opportunities as a matter of priority during venture gestation. What effect does entrepreneurial experience have on future expectations? Clearly a sense of realism is drawn over the difficulties that might be faced, and accords more circumspect judgements of venture survival. This finding informs practitioners considering entrepreneurship for the first time.
Resumo:
"An Introduction to Public Health is about the discipline of public health and the nature and scope of public health activity set within the challenges of the twenty first century. It is an introductory text to the principles and practice of public health written in a way that is easy to understand. Of what relevance is public health to the many allied health disciplines who contribute to it? How might an understanding of public health contribute to a range of health professionals who use the principles and practices of public health in their professional activities? These are the questions that this book addresses. An Introduction to Public Health leads the reader on a journey of discovery that concludes with not only an understanding of the nature and scope of public health but the challenges that face the field into the future." Provided by publisher.
Resumo:
Engineering graduates of today, face a working environment that assumes global mobility in the labour market. This challenge means, amongst universities worldwide, a demand to increase the globalisation of educational programs, context, and increase and support the mobility of students through mechanisms such as student exchange and double masters degrees. Engineering student mobility from Australia is low with only a few Engineering Faculties encouraging students to go internationally. This comparative study, using universities in Australia and Europe, of feedback from students who have been on exchange or proposing to go on exchange, employers and faculty addresses the motivators and barriers to student mobility and exchange from the perspectives of the university, faculty, students and employers. Recommendations will be presented on how student mobility and exchange can be improved, and mechanisms such as double Masters Degrees, dual accreditation and Erasmus Mundus 2009 – 2013 can be utilised to improve student mobility.
Resumo:
Encouraging Ethics and Preventing Corruption brings theory and practice together in addressing the question: How are we to be ethical in public life and through public institutions? It is a major contribution to public sector ethics within Australia and internationally because it provides an exhaustive analysis of reform across a decade in one jurisdiction, Queensland, and then proceeds to itemise a best practice integrity system or ethics regime. Drawing on the extensive research of two of Australia's leading practical ethicists, this text is essential reading for all students and practitioners of applied and professional ethics in the public sphere. Part A of the text provides a preferred theoretical and conceptual framework which both justifies and guides the development of a public sector ethics regime. Part B examines the place of the individual within a world of institutional ethics. Part C outlines the Queensland governance reforms introduced since 1989 following the Fitzgerald Inquiry which exposed corruption in the police and ministry. The final chapter, the 'Epilogue', gathers the insights of earlier chapters and suggests a more explicitly ethics-centred approach to governance reform that may take us 'beyond best practice'. Clearly, while it is the Australian context we have in mind, we are confident that this is a text which addresses the quest for integrity and ethics in government wherever society is committed to social and liberal democratic ideals.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Clinical Nutrition for Oncology Patients provides clinicians with the information they need to help cancer survivors and patients make informed choices about their nutrition and improve their short-term and long-term health. This comprehensive resource outlines nutritional management recommendations for care prior to, during, and after treatment and addresses specific nutritional needs and complementary therapies that may be of help to a patient. This book is written by a variety of clinicians who not only care for cancer survivors and their caregivers but are also experts in the field of nutritional oncology.
Resumo:
Since the 1980s, in Australia and other developed nations, public sector management philosophies and how the public sector is organized have changed dramatically. At the same time, there have been many demands, and several attempts, to preserve and promote ethical behaviour within the public sector - though few go much beyond the publication of a code. Both developments require an understanding of how public organizations operate in this new environment. Organizational and management theory are seen as providing important potential insights into the opportunities and pitfalls for building ethics into the practices, culture and norms of public organizations. This book brings together the experience and research of a range of "reflective practitioners" and "engaged academics" in public sector management, organizational theory, management theory, public sector ethics and law. It addresses what management and organization theory might suggest about the nature of public organizations and the institutionalization of ethics.