509 resultados para anonimato rete privacy deep web onion routing cookie
Resumo:
Cold-formed steel Lipped Channel Beams (LCB) with web openings are commonly used as floor joists and bearers in building structures. Shear behaviour of these beams is more complicated and their shear capacities are considerably reduced by the presence of web openings. Hence detailed numerical and experimental studies of simply supported LCBs under a mid-span load with aspect ratios of 1.0 and 1.5 were undertaken to investigate the shear behaviour and strength of LCBs with web openings. Experimental and numerical results showed that the current design rules in cold-formed steel structures design codes are very conservative. Improved design equations were therefore proposed for the shear strength of LCBs with web openings based on both experimental and numerical results. This research showed a significant reduction in shear capacities of LCBs when large web openings are included for the purpose of locating building services. A cost effective method of eliminating such detrimental effects of large circular web openings was also therefore investigated using experimental and numerical studies. For this purpose LCBS were reinforced using plate, stud, transverse and sleeve stiffeners with varying sizes and thicknesses that were welded and screw-fastened to the web of LCBs. These studies showed that plate stiffeners were the most suitable. Suitable screw-fastened plate stiffener arrangements with optimum thicknesses were then proposed for LCBs with web openings to restore their original shear capacities. This paper presents the details of finite element analyses and experiments of LCBs with web openings in shear, and the development of improved shear design rules. It then describes the experimental and numerical studies to determine the optimum plate stiffener arrangements and the results. The proposed shear design rules in this paper can be considered for inclusion in the future versions of cold-formed steel design codes.
Resumo:
The travel industry has come to rely heavily on information and communication technologies to facilitate relations with consumers. Compiling consumer data profiles has become easier and it is generally thought that this has led to an increase in consumers' privacy concerns, which may have an adverse impact on their willingness to purchase online. Three specific aspects of privacy that have received attention from researchers are unauthorized secondary use of data, invasion of privacy, and errors. A study was undertaken to examine the effects of these factors on prior purchase of travel services via the Internet and future purchase probability. No evidence was found to indicate that such privacy concerns affect online purchase behavior within the travel industry. Managerial implications are discussed.
Resumo:
To the Editor: The Victorian Health Records Act 2001 became operational on 1 July 2002. This legislation provides important protection for the individual against misuse of health information through the establishment of Health Privacy Principles. We support the spirit of this legislation, but would like to draw attention to its potential effects on multicentre research and disease surveillance...
Resumo:
TO THE EDITOR: In Australia, personal and health information that identifies an individual cannot be used or disclosed for research without specific requirements being met.1 Even if these requirements are met, data custodians may still refuse access if their views are discordant with those of the relevant human research ethics committee (HREC). It is now evident that there are adverse consequences of this well-meaning legislation...
Resumo:
Previous studies have shown that users’ cognitive styles play an important role during Web searching. However, only limited studies have showed the relationship between cognitive styles and Web search behavior. Most importantly, it is not clear which components of Web search behavior are influenced by cognitive styles. This paper examines the relationships between users’ cognitive styles and their Web searching and develops a model that portrays the relationship. The study uses qualitative and quantitative analyses to inform the study results based on data gathered from 50 participants. A questionnaire was utilised to collect participants’ demographic information, and Riding’s (1991) Cognitive Style Analysis (CSA) test to assess their cognitive styles. Results show that users’ cognitive styles influenced their information searching strategies, query reformulation behaviour, Web navigational styles and information processing approaches. The user model developed in this study depicts the fundamental relationships between users’ Web search behavior and their cognitive styles. Modeling Web search behavior with a greater understanding of user’s cognitive styles can help information science researchers and information systems designers to bridge the semantic gap between the user and the systems. Implications of the research for theory and practice, and future work are discussed.
Resumo:
This thesis considers how an information privacy system can and should develop in Libya. Currently, no information privacy system exists in Libya to protect individuals when their data is processed. This research reviews the main features of privacy law in several key jurisdictions in light of Libya's social, cultural, and economic context. The thesis identifies the basic principles that a Libyan privacy law must consider, including issues of scope, exceptions, principles, remedies, penalties, and the establishment of a legitimate data protection authority. This thesis concludes that Libya should adopt a strong information privacy law framework and highlights some of the considerations that will be relevant for the Libyan legislature.
Resumo:
Delirium is a significant problem for older hospitalized people and is associated with poor outcomes. It is poorly recognized and evidence suggests that a major reason is lack of education. Nurses, who are educated about delirium, can play a significant role in improving delirium recognition. This study evaluated the impact of a delirium specific educational website. A cluster randomized controlled trial, with a pretest/post-test time series design, was conducted to measure delirium knowledge (DK) and delirium recognition (DR) over three time-points. Statistically significant differences were found between the intervention and non-intervention group. The intervention groups' DK scores were higher and the change over time results were statistically significant [T3 and T1 (t=3.78 p=<0.001) and T2 and T1 baseline (t=5.83 p=<0.001)]. Statistically significant improvements were also seen for DR when comparing T2 and T1 results (t=2.56 p=0.011) between both groups but not for changes in DR scores between T3 and T1 (t=1.80 p=0.074). Participants rated the website highly on the visual, functional and content elements. This study supports the concept that web-based delirium learning is an effective and satisfying method of information delivery for registered nurses. Future research is required to investigate clinical outcomes as a result of this web-based education.
Resumo:
In this paper, we present WebPut, a prototype system that adopts a novel web-based approach to the data imputation problem. Towards this, Webput utilizes the available information in an incomplete database in conjunction with the data consistency principle. Moreover, WebPut extends effective Information Extraction (IE) methods for the purpose of formulating web search queries that are capable of effectively retrieving missing values with high accuracy. WebPut employs a confidence-based scheme that efficiently leverages our suite of data imputation queries to automatically select the most effective imputation query for each missing value. A greedy iterative algorithm is proposed to schedule the imputation order of the different missing values in a database, and in turn the issuing of their corresponding imputation queries, for improving the accuracy and efficiency of WebPut. Moreover, several optimization techniques are also proposed to reduce the cost of estimating the confidence of imputation queries at both the tuple-level and the database-level. Experiments based on several real-world data collections demonstrate not only the effectiveness of WebPut compared to existing approaches, but also the efficiency of our proposed algorithms and optimization techniques.
Resumo:
Using our porcine model of deep dermal partial thickness burn injury, various durations (10min, 20min, 30min or 1h) and delays (immediate, 10min, 1h, 3h) of 15 degrees C running water first aid were applied to burns and compared to untreated controls. The subdermal temperatures were monitored during the treatment and wounds observed weekly for 6 weeks, for re-epithelialisation, wound surface area and cosmetic appearance. At 6 weeks after the burn, tissue biopsies were taken of the scar for histological analysis. Results showed that immediate application of cold running water for 20min duration is associated with an improvement in re-epithelialisation over the first 2 weeks post-burn and decreased scar tissue at 6 weeks. First aid application of cold water for as little as 10min duration or up to 1h delay still provides benefit.
Resumo:
We developed a reproducible model of deep dermal partial thickness burn injury in juvenile Large White pigs. The contact burn is created using water at 92 degrees C for 15s in a bottle with the bottom replaced with plastic wrap. The depth of injury was determined by a histopathologist who examined tissue sections 2 and 6 days after injury in a blinded manner. Upon creation, the circular wound area developed white eschar and a hyperaemic zone around the wound border. Animals were kept for 6 weeks or 99 days to examine the wound healing process. The wounds took between 3 and 5 weeks for complete re-epithelialisation. Most wounds developed contracted, purple, hypertrophic scars. On measurement, the thickness of the burned skin was approximately 1.8 times that of the control skin at week 6 and approximately 2.2 times thicker than control skin at 99 days after injury. We have developed various methods to assess healing wounds, including digital photographic analysis, depth of organising granulation tissue, immunohistochemistry, electron microscopy and tensiometry. Immunohistochemistry and electron microscopy showed that our porcine hypertrophic scar appears similar to human hypertrophic scarring. The development of this model allows us to test and compare different treatments on burn wounds.
Resumo:
Early to mid-term fetuses heal cutaneous incisional wounds without scars; however, fetal response to burn injury has not been ascertained. We present a fetal model of thermal injury and subsequent analysis of fetal and lamb response to burn injury. A reproducible deep dermal burn injury was created in the fetus by application of water at 66 degrees C for 7 seconds, and at 82 degrees C for 10 seconds to the lamb. Macroscopically, the area of fetal scald was undetectable from day 7 post injury, while all lamb scalds were readily identified and eventually healed with scarring. Using a five-point histopathology scoring system for alteration in tissue morphology, differences were detected between control and scalded skin at all stages in lamb postburn, but no difference was detected in the fetal model after day 7. There were also large differences in content of alpha-smooth muscle actin and transforming growth factor-beta1 between control and scalded lamb and these differences were statistically significant at day 14 (P < 0.01). This novel model of fetal and lamb response to deep dermal injury indicates that the fetus heals a deep burn injury in a scarless fashion. Further elucidation of this specific fetal process of burn injury repair may lead to improved outcome for patients with burn injury.
Resumo:
Courts set guidelines for when genetic testing would be ordered - medical testing - life insurers - use of test results - confidentiality.
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
A home is an embodiment of human privacy, apart from providing shelter, security and several other functions. Achieving the desired level of privacy at home is very important in Muslim societies. Privacy is intended to protect the female members of the family from strangers, especially while entertaining guests at home. One way of controlling levels of exposure of the domestic domains to strangers is by controlling privacy levels. This research will investigate perceptions of privacy among Australian Muslims when entertaining guests at their homes. This research will also investigate the extent that modesty (achieved through both appearance and design) acts as the balancing factor in achieving a family’s desired levels of privacy while also affording them the capacity to be hospitable to guests. This research will use a qualitative approach to investigate Australian Muslim homes around Queensland, predominantly in the Brisbane area. A total number of 20 to 60 participants (10 to 30 males, 10 to 30 females) ranging from 25 to 55 years old will be interviewed. Ideally, participants will be those who have children or extended families (parents or siblings) living in the house. The data will be coded and analysed for the purpose of generating new knowledge for architects and designers when designing Muslim homes. It will also extend the current body of knowledge related to privacy mechanisms in housing designs, thereby benefitting architects and designers in the future.