384 resultados para 319.237
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.
Resumo:
In this chapter, we look at the step beyond reporting, to the external audit or assurance function. The role of any audit engagement is to provide a professional opinion on a set of financial or non-financial assertions reported by an organization's management, based on an agreed evaluative framework. Any such opinion is not a guarantee that the underlying report is free from fraud or misstatement. Where an audit opinion on financial statements is incorrect, this is referred to as an audit failure. Specifically, the textbook definition of audit failure has two components: that the financial statements contain a serious error and that the auditor has failed to detect the error due to the auditor's failure during the audit process.
Resumo:
There has been much debate over recent years about whether Australian copyright law should adopt a fair use doctrine. In this chapter we argue by pointing to the historical record that the incorporation of the term 'copyrights' in the Australian Constitution embeds a notion of balance and fair use in Australian law and that this should be taken into account when interpreting the Australian Copyright Act 1968. English case law in the 18th and 19th centuries developed a principle that copyright infringement did not occur where a person had made a fair use of a work. Fair use was generally established where the defendant had made a productive use that did more than alter the original work for the purpose of evading liability, and where the defendant had made an original contribution to the resulting work. Additionally, fairness was shown by a use that did not supersede or prejudice the market for the original work. At the time of including the copyright power in the Constitution, the UK Parliament’s understanding of “copyrights” included the notion of fair use as it had been developed in U.K. precedent. In this chapter we argue that the work “copyrights” in the Australia Constitution takes its definition from copyright in 1900 and as it has evolved since. Importantly, the word “copyrights” is infused with a particular meaning that incorporates the principle of copyright balance. The constitutional notion of copyright, therefore, is not that of an unlimited power to prevent all copying. Rather, copyright distinguishes between infringing copying and non-infringing copying and grants to the copyright owner only the power to control the former. Non-infringing copying includes well-accepted limitations on the copyright owner’s rights, including the copying of ideas, the copying of public domain works and the copying of insubstantial parts of copyrighted works. In this chapter we argue that non-infringing copying also includes copying to make a fair use of a work. The sections that distinguish infringing copying from non-infringing copying in the Copyright Act 1968 are sections 36(1) and 101(1), which define infringement as the doing, without licence, of an “act comprised in the copyright”. An infringing copy is an act comprised the copyright, whereas a non-infringing copy is not. We argue that space for fair uses of copyrighted works is built into the Copyright Act 1968 through these sections, because a fair use will not produce an infringing copy and so is not an act comprised in the copyright.
Resumo:
Post-traumatic stress disorder (PTSD) is a debilitating psychiatric disorder that has a major impact on the ability to function effectively in daily life. PTSD may develop as a response to exposure to an event or events perceived as potentially harmful or life-threatening. It has high prevalence rates in the community, especially among vulnerable groups such as military personnel or those in emergency services. Despite extensive research in this field, the underlying mechanisms of the disorder remain largely unknown. The identification of risk factors for PTSD has posed a particular challenge as there can be delays in onset of the disorder, and most people who are exposed to traumatic events will not meet diagnostic criteria for PTSD. With the advent of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM V), the classification for PTSD has changed from an anxiety disorder into the category of stress- and trauma-related disorders. This has the potential to refocus PTSD research on the nature of stress and the stress response relationship. This review focuses on some of the important findings from psychological and biological research based on early models of stress and resilience. Improving our understanding of PTSD by investigating both genetic and psychological risk and coping factors that influence stress response, as well as their interaction, may provide a basis for more effective and earlier intervention.
Resumo:
Historically, determining the country of origin of a published work presented few challenges, because works were generally published physically – whether in print or otherwise – in a distinct location or few locations. However, publishing opportunities presented by new technologies mean that we now live in a world of simultaneous publication – works that are first published online are published simultaneously to every country in world in which there is Internet connectivity. While this is certainly advantageous for the dissemination and impact of information and creative works, it creates potential complications under the Berne Convention for the Protection of Literary and Artistic Works (“Berne Convention”), an international intellectual property agreement to which most countries in the world now subscribe. Under the Berne Convention’s national treatment provisions, rights accorded to foreign copyright works may not be subject to any formality, such as registration requirements (although member countries are free to impose formalities in relation to domestic copyright works). In Kernel Records Oy v. Timothy Mosley p/k/a Timbaland, et al. however, the Florida Southern District Court of the United States ruled that first publication of a work on the Internet via an Australian website constituted “simultaneous publication all over the world,” and therefore rendered the work a “United States work” under the definition in section 101 of the U.S. Copyright Act, subjecting the work to registration formality under section 411. This ruling is in sharp contrast with an earlier decision delivered by the Delaware District Court in Håkan Moberg v. 33T LLC, et al. which arrived at an opposite conclusion. The conflicting rulings of the U.S. courts reveal the problems posed by new forms of publishing online and demonstrate a compelling need for further harmonization between the Berne Convention, domestic laws and the practical realities of digital publishing. In this chapter, we argue that even if a work first published online can be considered to be simultaneously published all over the world it does not follow that any country can assert itself as the “country of origin” of the work for the purpose of imposing domestic copyright formalities. More specifically, we argue that the meaning of “United States work” under the U.S. Copyright Act should be interpreted in line with the presumption against extraterritorial application of domestic law to limit its application to only those works with a real and substantial connection to the United States. There are gaps in the Berne Convention’s articulation of “country of origin” which provide scope for judicial interpretation, at a national level, of the most pragmatic way forward in reconciling the goals of the Berne Convention with the practical requirements of domestic law. We believe that the uncertainties arising under the Berne Convention created by new forms of online publishing can be resolved at a national level by the sensible application of principles of statutory interpretation by the courts. While at the international level we may need a clearer consensus on what amounts to “simultaneous publication” in the digital age, state practice may mean that we do not yet need to explore textual changes to the Berne Convention.
Resumo:
In the internet age, copyright owners are increasingly looking to online intermediaries to take steps to prevent copyright infringement. Sometimes these intermediaries are closely tied to the acts of infringement; sometimes – as in the case of ISPs – they are not. In 2012, the Australian High Court decided the Roadshow Films v iiNet case, in which it held that an Australian ISP was not liable under copyright’s authorization doctrine, which asks whether the intermediary has sanctioned, approved or countenanced the infringement. The Australian Copyright Act 1968 directs a court to consider, in these situations, whether the intermediary had the power to prevent the infringement and whether it took any reasonable steps to prevent or avoid the infringement. It is generally not difficult for a court to find the power to prevent infringement – power to prevent can include an unrefined technical ability to disconnect users from the copyright source, such as an ISP terminating users’ internet accounts. In the iiNet case, the High Court eschewed this broad approach in favor of focusing on a notion of control that was influenced by principles of tort law. In tort, when a plaintiff asserts that a defendant should be liable for failing to act to prevent harm caused to the plaintiff by a third party, there is a heavy burden on the plaintiff to show that the defendant had a duty to act. The duty must be clear and specific, and will often hinge on the degree of control that the defendant was able to exercise over the third party. Control in these circumstances relates directly to control over the third party’s actions in inflicting the harm. Thus, in iiNet’s case, the control would need to be directed to the third party’s infringing use of BitTorrent; control over a person’s ability to access the internet is too imprecise. Further, when considering omissions to act, tort law differentiates between the ability to control and the ability to hinder. The ability to control may establish a duty to act, and the court will then look to small measures taken to prevent the harm to determine whether these satisfy the duty. But the ability to hinder will not suffice to establish liability in the absence of control. This chapter argues that an inquiry grounded in control as defined in tort law would provide a more principled framework for assessing the liability of passive intermediaries in copyright. In particular, it would set a higher, more stable benchmark for determining the copyright liability of passive intermediaries, based on the degree of actual, direct control that the intermediary can exercise over the infringing actions of its users. This approach would provide greater clarity and consistency than has existed to date in this area of copyright law in Australia.
Resumo:
People can be motivated to carryout behaviours which contribute to improvement of quality of life for reasons driven by cultural norms. There is a common perception that people within a cultural cluster, particularly one with a common language such as English, will exhibit similar consumer behaviours. However there is an emerging field of research investigating intra-cultural differences in marketing that challenges this perception. In particular, the role of peers and norms as drivers of altruistic behaviours that benefit society may differ between these countries. Altruism is an important motivation for pro-social behaviours such as blood donation, water conservation and peer counselling for health problems. Understanding the social influences for these behaviours assists marketers to develop programs that meet the needs of donors and potential donors. An ongoing foundation of altruistic consumers is essential for delivering services that improve quality of life for people. Without blood donors, there would be no blood products for cancer sufferers or accident victims, without a sufficient water supply the quality of life for residents would be compromised and without breastfeeding peer counselling, new mothers and their babies would have reduced quality of life. This chapter reports the findings of two online surveys with Scottish and Australian blood donors and demonstrates differences in the way social norms influence donation behaviour, and importantly different impacts of cultural factors in the two populations.
Resumo:
We present a novel framework and algorithms for the analysis of Web service interfaces to improve the efficiency of application integration in wide-spanning business networks. Our approach addresses the notorious issue of large and overloaded operational signatures, which are becoming increasingly prevalent on the Internet and being opened up for third-party service aggregation. Extending upon existing techniques used to refactor service interfaces based on derived artefacts of applications, namely business entities, we propose heuristics for deriving relations between business entities, and in turn, deriving permissible orders in which operations are invoked. As a result, service operations are refactored on business entity CRUD which then leads to behavioural protocols generated, thus supportive of fine-grained and flexible service discovery, composition and interaction. A prototypical implementation and analysis of web services, including those of commercial logistic systems (Fedex), are used to validate the algorithms and open up further insights into service interface synthesis.
Resumo:
Organisations are always focussed on ensuring that their business operations are performed in the most cost-effective manner, and that processes are responsive to ever-changing cost pressures. In many organisations, however, strategic cost-based decisions at the managerial level are not directly or quickly translatable to process-level operational support. A primary reason for this disconnect is the limited system-based support for cost-informed decisions at the process-operational level in real time. In this paper, we describe the different ways in which a workflow management system can support process-related decisions, guided by cost-informed considerations at the operational level, during execution. As a result, cost information is elevated from its non-functional attribute role to a first-class, fully functional process perspective. The paper defines success criteria that a WfMS should meet to provide such support, and discusses a reference implementation within the YAWL workflow environment that demonstrates how the various types of cost-informed decision rules are supported, using an illustrative example.
Resumo:
Social audit is one of those important mechanisms for strengthening NGOs’ accountability to poor communities (as NGOs’ key beneficiaries). However, conducting social audits within the NGO sector often rests on the individual interests and priorities of donors or NGOs themselves, effectively resulting in self-selection bias, and limiting the effectiveness and usefulness of social audits as a control and evaluation mechanism. The purpose of this chapter is to identify the prevalence, scale, and scope of social audits within the NGO sector, particularly NGOs engaging in microenterprise development programs. Accordingly, this study examined 20 NGOs operating in two countries - Bangladesh and Indonesia. Data were collected from publicly available sources and in-depth interviews with senior executives of the participating NGOs. Further, 10 interviews were conducted with a small sample of beneficiaries (individuals or groups from four of the participating NGOs) in order to gain an understanding of beneficiaries’ perceptions of the NGOs’ social audit mechanism. The findings reveal a range of approaches to social audit among NGOs, as well as the usefulness and limitations of this mechanism for strengthening NGO accountability, particularly to beneficiaries. Findings highlight that within the NGOs investigated the conduct of social audits remained voluntary and was strongly dependant on donors’ requirements. As social audit regulation within the NGO sector is minimal, the findings provide regulators with valuable guidance for better understanding the value of social audit as a mechanism to strengthen accountability of the NGO sector, particularly accountability to beneficiaries.
Resumo:
The rising demand for medical implants for ageing populations and ongoing advancements in medical technology continue to drive the use of implantable devices. Higher implant usage has a consequent increased incidence of implant-related infections, and associated prolonged patient care, pain and loss of limb and other organ function. Numerous antibacterial surfaces have been designed that prevent the onset of biofilm formation, thus reducing or preventing implant-associated infections through inhibiting bacterial adhesion or by killing the organisms that successfully attach to the surface of the implant. Other surfaces have been designed to stimulate a local immune response, promoting the natural clearing of the invading pathogen. The desired antibacterial effects are typically achieved by modulating the surface chemistry and morphology of the implant material, by means of the controlled release of pharmacological agents and bioactive compounds from the surface of the material, or by a combination of both processes. An important issue for any type of antibacterial surface modification lies in balancing the non-fouling, bacteriostatic or bactericidal effects against local and systemic biocompatibility. In this chapter, we will first describe the concept of biocompatibility and its evolution, from devices that do not evoke a negative host response to those that actively drive host regeneration. We will then review the challenges associated with merging the need for an implant material to withstand a bacterial load with those associated with supporting function restoration and tissue healing.
Resumo:
The partnership form of privatisation is increasingly being used, in particular to carry out complex and evolving bundles of services. These have not previously been privatised because of incomplete contracts and contract management difficulties. Improved performance of the government entity as contract administrator and member of the partnership is crucial to modern service delivery expectations yet the privatisation literature has focused on other aspects of partnerships leaving the understanding of factors impacting the effectiveness of the government entity underdeveloped. This paper proposes the development of knowledge as to the range of factors which impact the effectiveness of the government entity. There is limited data available as to the operation of trust in the partnership relationship, and as to the capability of a range of privatisation forms to achieve stewardship of infrastructure. This research will utilise the findings from that research to build a tentative framework which will be utilised in staged research interrogating first the privatization literature and then the literature of other disciplines and sectors. The combined data will be analysed to provide government and practitioners such as government entity CEO’s with a complete listing of the operation of the factors which impact the effectiveness of the government entity in contributing to improved service delivery.
Resumo:
In this chapter, we present a lifespan model of leadership that outlines how leader and follower age as well as age-related changes in leader traits and characteristics, leader behaviors, and follower attribution and identification processes may influence leadership effectiveness. First, we describe how leader traits and characteristics change with age and how these developmental changes may impact on leader behaviors and, subsequently, leadership effectiveness. Specifically, we discuss age-related changes in leaders’ task competence, interpersonal attributes, and motivation to lead. We particularly focus on how generativity – a set of interconnected motives pertaining to establishing and guiding future generations – may emerge as an important concern among older leaders. Second, we review theoretical approaches that help explain how and why leader age and age-related traits and characteristics, follower age, as well as leader-follower age differences may influence follower attribution and identification processes. Third, we outline a number of boundary conditions of the effects proposed by our lifespan model of leadership, including leader-follower relationship duration, situational characteristics, as well as the cultural, social, and historical context. We conclude the chapter by discussing our model’s implications for future research and organizational practice.