473 resultados para Personal Security.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research into the human dynamics of expeditions is a potentially rewarding and fruitful area of study. However, the complex nature of expedition work presents the researcher with numerous challenges. This paper presents a personal reflection on the challenges linked to determining appropriate methodological processes for a study into expedition teamwork. Previous expedition research is outlined and reviewed for appropriateness. Some alternative methodological theories are described and limitations highlighted. Lastly the actual data gathering and analysis processes are detailed. The aim being to show that what happened in the field inevitably dictated how methodological processes were adapted. Essentially the paper describes a personal journey into research. A journey that sparked numerous personal insights in the science of human dynamics and expeditions and one that I hope will add to the development of expedition research in general.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mainstream discourse on the revolving around food security is often portrayed by macro level indicators on nutrition, consumption and food production. While these indicators may prove significant in addressing food security in the national and regional levels, it falls short in addressing it among the indigenous peoples’ (IP) communities in the Philippines. Reflecting through the experiences in agricultural production, indigenous knowledge and socio-political institutions are relevant factors that must be seriously considered when food security among IPs are concerned. It is argued that disregarding micro level interactions over macro development policies will not address the issue of food security among marginalized sectors. The paper presents policy recommendations in taking cultural systems seriously in addressing food security among indigenous peoples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As we race towards a new era, rapid change of conventional models has become the norm. Just as technology has etched itself to the core of society, the sheer quantity of student devices connecting to university networks presents a sector wide challenge coinciding almost perfectly with many universities creating technology rich learning spaces. New fears include future proofing. It is not just a matter of technology becoming outdated. In seeking to accommodate the teaching styles and experience of staff across diverse faculties, is this technology simply too vanilla to meet their needs as they become increasingly skilled and inspired by technology’s potential? Through the early findings of a study into staff use of technology within Queensland University of Technology's next generation collaborative learning spaces, this paper explores whether the answers lie in a model presented by students equipping themselves with the tools they need to learn in the 21st century.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we develop and test a model of the relationships between mega-project leaders’ personal attributes and their ratings of project success in the context of the Australian defense industry. In our model, emotional intelligence, cognitive flexibility, and systemic thinking were hypothesized to be related to project success ratings, mediated by internal and external stakeholder relationships. We tested the model in an online survey study of 373 mega-project leaders. Results were that emotional intelligence and cognitive flexibility were found to be related to the quality of mega-project leader’s relationships with both internal and external stakeholders; and that these relationships in turn were found to be associated with the project leaders’ ratings of project success. We found however that systemic thinking had no relationship with either stakeholder relationships or ratings of project success. We conclude with a discussion of the implications of these findings and make recommendations for future research. In particular, additional research is needed to examine the contribution of a wider range of competencies on stakeholder relationships and project success in mega-projects, and that there is also a need for research in future to attempt to use more objective ratings of project success.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we develop and test a model of the associations between major project managers' personal attributes and project success in the context of the Australian Defence industry. In our model, emotional intelligence, cognitive flexibility and systemic thinking were hypothesised to relate to project success, mediated by internal and external stakeholder relationships. The model was tested in an online survey with 373 major project managers. Emotional intelligence and cognitive flexibility were found to be related to the development, quality and effectiveness of major project managers' relationships with both internal and external stakeholders; and these in turn were associated with their ratings of project success. Systemic thinking, however, had no relationship with either stakeholder relationships or project success. Additional research is needed to examine the contribution of a wider range of personal attributes to stakeholder relationships and project success, and to assess whether this model is applicable in other industries and types of projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been considerable scientific interest in personal exposure to ultrafine particles (UFP). In this study, the inhaled particle surface area doses and dose relative intensities in the tracheobronchial and alveolar regions of lungs were calculated using the measured 24-hour UFP time series of school children personal exposures for each recorded activity. Bayesian hierarchical modelling was used to determine mean doses and dose intensities for the various microenvironments. Analysis of measured personal exposures for 137 participating children from 25 schools in the Brisbane Metropolitan Area showed similar trends for all the participating children. Bayesian regression modelling was performed to calculate the daily proportion of children's total doses at different microenvironments. The proportion of alveolar doses in the total daily dose for \emph{home}, \emph{school}, \emph{commuting} and \emph{other} were 55.3\%, 35.3\%, 4.5\% and 5.0\%, respectively, with the \emph{home} microenvironment contributing a majority of children's total daily dose. Children's mean indoor dose was never higher than the outdoor's at any of the schools, indicating there were no persistent indoor particle sources in the classrooms during the measurements. Outdoor activities, eating/cooking at home and commuting were the three activities with the highest dose intensities. Personal exposure was more influenced by the ambient particle levels than immediate traffic.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we will examine passenger actions and activities at the security screening points of Australian domestic and international airports. Our findings and analysis provide a more complete understanding of the current airport passenger security screening experience. Data in this paper is comprised of field studies conducted at two Australian airports, one domestic and one international. Video data was collected by cameras situated either side of the security screening point. A total of one hundred and ninety-six passengers were observed. Two methods of analysis are used. First, the activities of passengers are coded and analysed to reveal the common activities at domestic and international security regimes and between quiet and busy periods. Second, observation of passenger activities is used to reveal uncommon aspects. The results show that passengers do more at security screening that being passively scanned. Passengers queue, unpack the required items from their bags and from their pockets, walk through the metal-detector, re-pack and occasionally return to be re-screened. For each of these activities, passengers must understand the procedures at the security screening point and must co-ordinate various actions and objects in time and space. Through this coordination passengers are active participants in making the security checkpoint function – they are co-producers of the security screening process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the last decade, one question has haunted me: what helps people to cope with large-scale organisational change in their workplace? This study explores the construct of personal change resilience, and its potential for identifying solutions to the problems of change fatigue and change resistance. The thesis has emerged from the fields of change management, leadership, training, mentoring, evaluation, management and trust within the context of higher education in Australia at the beginning of the twenty-first century. In this thesis I present a theoretical model of the factors to consider in increasing peoples’ personal change resilience as they navigate large-scale organisational change at work, thereby closing a gap in the literature on the construct of change resilience. The model presented is based on both the literature in the realms of business and education, and on the findings of the research. In this thesis, an autoethnographic case study of two Australian university projects is presented as one narrative, resulting in a methodological step forward in the use of multiple research participants’ stories in the development of a single narrative. The findings describe the experiences of workers in higher education and emphasise the importance of considerate management in the achievement of positive experiences of organisational change. This research makes a significant contribution to new knowledge in three ways. First, it closes a gap in the literature in the realm of change management around personal change resilience as a solution to the problem of change fatigue by presenting models of both change failure and personal change resilience. Second, it is methodologically innovative in the use of personae to tell the stories of multiple participants in one coherent tale presented as a work of ethnographic fiction seen through an autoethnographic lens. By doing so, it develops a methodology for giving a voice to those to whom change is done in the workplace. Third, it provides a perspective on organisational change management from the view of the actual workers affected by change, thereby adding to the literature that currently exists, which is based on the views of those with responsibility for leading or managing change rather than those it affects. This thesis is intended as a practical starting point for conversations by actual change managers in higher education, and it is written in such a way as to help them see how theory can be applied in real life, and how empowering and enabling the actual working staff members, and engaging with them in a considerate way before, during and even after the change process, can help to make them resilient enough to cope with the change, rather than leaving them burned out or disengaged and no longer a well-functioning member of the institution. This thesis shows how considerately managed large-scale organisational change can result in positive outcomes for both the organisation and the individuals who work in it.