401 resultados para security analysis
Resumo:
This paper seeks to address the widespread call in the literature for the cross-cultural examination ( and validation) of accepted concepts within consumer behaviour, such as consumer risk perceptions and information search. The findings of the study provide support for a number of accepted relationships, whilst identifying distinct cross cultural differences in external information search and willingness to buy genetically modified (GM) food products by consumers.
Resumo:
Over the past several years, there has been resurgent interest in regional planning in North America, Europe and Australasia. Spurred by issues such as metropolitan growth, transportation infrastructure, environmental management and economic development, many states and metropolitan regions are undertaking new planning initiatives. These regional efforts have also raised significant question about governance structures, accountability and measures of effectiveness.n this paper, the authors conducted an international review of ten case studies from the United States, Canada, England, Belgium, New Zealand and Australia to explore several critical questions. Using qualitative data template, the research team reviewed plans, documents, web sites and published literature to address three questions. First, what are the governance arrangements for delivering regional planning? Second, what are the mechanisms linking regional plans with state plans (when relevant) and local plans? Third, what means and mechanisms do these regional plans use to evaluate and measure effectiveness? The case study analysis revealed several common themes. First, there is an increasing focus on goverance at the regional level, which is being driven by a range of trends, including regional spatial development initiatives in Europe, regional transportation issues in the US, and the growth of metropolitan regions generally. However, there is considerable variation in how regional governance arrangements are being played out. Similarly, there is a range of processes being used at the regional level to guide planning that range from broad ranging (thick) processes to narrow and limited (thin) approaches. Finally, evaluation and monitoring of regional planning efforts are compiling data on inputs, processes, outputs and outcomes. Although there is increased attention being paid to indicators and monitoring, most of it falls into outcome evaluations such as Agenda 21 or sustainability reporting. Based on our review we suggest there is a need for increased attention on input, process and output indicators and clearer linkages of these indicators in monitoring and evaluation frameworks. The focus on outcome indicators, such as sustainability indicators, creates feedback systems that are too long-term and remote for effective monitoring and feedback. Although we found some examples of where these kinds of monitoring frameworks are linked into a system of governance, there is a need for clearer conceptual development for both theory and practice.
Resumo:
Community development is increasingly using participatory processes that aim to be inclusive and empowering. However, researchers have found that such processes can have contradictory effects. Australian research has highlighted the significant leadership of rural women in sustainable community and economic development and in the adoption of new communication technologies such as the Internet. A focus on gender in participatory development may therefore lead to more effective programs and policies. This chapter outlines an interdisciplinary feminist framework for critically evaluating the participation and empowerment of rural women. This framework was found effective in evaluating an Australian project that aimed to enhance rural women’s access to communication technologies and to empower its participants. Its multiple theoretical and methodological approaches are outlined. The framework advocates an analysis of diversity and difference and the macro and micro contexts. Some principles and strategies for rural women’s inclusion, participation, empowerment, and for participatory feminist evaluation are outlined.
Resumo:
We used geographic information systems and a spatial analysis approach to explore the pattern of Ross River virus (RRV) incidence in Brisbane, Australia. Climate, vegetation and socioeconomic data in 2001 were obtained from the Australian Bureau of Meteorology, the Brisbane City Council and the Australian Bureau of Statistics, respectively. Information on the RRV cases was obtained from the Queensland Department of Health. Spatial and multiple negative binomial regression models were used to identify the socioeconomic and environmental determinants of RRV transmission. The results show that RRV activity was primarily concentrated in the northeastern, northwestern, and southeastern regions in Brisbane. Multiple negative binomial regression models showed that the spatial pattern of RRV disease in Brisbane seemed to be determined by a combination of local ecologic, socioeconomic, and environmental factors.
Resumo:
This paper explores how people communicate in reference to local interests and suggests information and communication technology (ICT) design for enhancement of local community networks. Qualitative data was gathered from participant observations of local community collective action and open interviews with active community members. Data analysis revealed concepts, leading to categories in relation to local interactions and interests. Design suggestions consider introducing people to local community private-strategic activity via public displays that indicate simple entry points to active participation, and creating information collections according to local community perspectives for long-term reference.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
ABSTRACT. The phenomenon of consumer co-creation is often framed in terms of whether either economic market forces or socio-cultural non-market forces ultimately dominate. We propose an alternate model of consumer co-creation in terms of co-evolution between markets and non-markets. Our model is based on a recent ethnographic study of a massively multiplayer online game through its development, release and ultimate failure, and cast in terms of two explanatory models: multiple games and social network markets. We conclude that consumer co-creation is indeed complex, but in ways that relate to both emergent market expectations and the evolution of markets, not to the transcendence of markets.
Resumo:
Search engines have forever changed the way people access and discover knowledge, allowing information about almost any subject to be quickly and easily retrieved within seconds. As increasingly more material becomes available electronically the influence of search engines on our lives will continue to grow. This presents the problem of how to find what information is contained in each search engine, what bias a search engine may have, and how to select the best search engine for a particular information need. This research introduces a new method, search engine content analysis, in order to solve the above problem. Search engine content analysis is a new development of traditional information retrieval field called collection selection, which deals with general information repositories. Current research in collection selection relies on full access to the collection or estimations of the size of the collections. Also collection descriptions are often represented as term occurrence statistics. An automatic ontology learning method is developed for the search engine content analysis, which trains an ontology with world knowledge of hundreds of different subjects in a multilevel taxonomy. This ontology is then mined to find important classification rules, and these rules are used to perform an extensive analysis of the content of the largest general purpose Internet search engines in use today. Instead of representing collections as a set of terms, which commonly occurs in collection selection, they are represented as a set of subjects, leading to a more robust representation of information and a decrease of synonymy. The ontology based method was compared with ReDDE (Relevant Document Distribution Estimation method for resource selection) using the standard R-value metric, with encouraging results. ReDDE is the current state of the art collection selection method which relies on collection size estimation. The method was also used to analyse the content of the most popular search engines in use today, including Google and Yahoo. In addition several specialist search engines such as Pubmed and the U.S. Department of Agriculture were analysed. In conclusion, this research shows that the ontology based method mitigates the need for collection size estimation.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.
Resumo:
This paper presents an investigation into the properties of a new narrative technique for career assessment and counselling, My Career Chapter: A Dialogical Autobiography. This technique is used to facilitate clients’ construction of a meaningful career-related autobiography. Previous research indicates the usefulness of My Career Chapter for adult clients and its alignment with recommendations for the development and application of qualitative assessment and counselling techniques. This study specifically commences research into the technique’s applicability for adolescents. A focus group, comprised of guidance counselling professionals whose work primarily pertained to the needs of adolescents, found that there is potential to develop a version of My Career Chapter that is suitable for adolescents.