448 resultados para Sim authentication messaggistica online
Resumo:
Objective. To evaluate the effectiveness of a single-session online theory of planned behaviour (TPB)-based intervention to improve sun-protective attitudes and behaviour among Australian adults. Methods. Australian adults (N = 534; 38.7% males; Mage = 39.3 years) from major cities (80.9%), regional (17.6%) and remote areas (1.5%)were recruited and randomly allocated to an intervention (N=265) and information only group (N = 267). The online intervention focused on fostering positive attitudes, perceptions of normative support, and control perceptions for sun protection. Participants completed questionnaires assessing standard TPB measures (attitude, subjective norm, perceived behavioural control, intention, behaviour) and extended TPB constructs of group norm (friends, family), personal norm, and image norm, pre-intervention (Time 1) and one week (Time 2) and one month post-intervention (Time 3). Repeated Measures Multivariate Analysis of Variance tested intervention effects across time. Results. Intervention participants reported more positive attitudes towards sun protection and used sunprotective measures more often in the subsequent month than participants receiving information only. The intervention effects on control perceptions and norms were non-significant. Conclusions. A theory-based online intervention fostering more favourable attitudes towards sun safety can increase sun protection attitudes and self-reported behaviour among Australian adults in the short term.
Resumo:
Online fraud poses a significant problem to society in terms of its monetary losses and the devastating impact on victims. It also poses significant challenges to law enforcement agencies, regarding their ability to investigate crimes which are complex, occur in a virtual environment, incorporate multiple (often international) jurisdictions, and have a very low reporting rate. This paper examines the police response to online fraud. It argues that traditionally, fraud has received little attention and priority from police agencies and this is exacerbated in the online context. In contrast to this, the paper presents the example of Project Sunbird, a partnership between the West Australian Police and the West Australian Department of Commerce which has embraced the use of financial intelligence to proactively contact suspected victims of online fraud. This paper argues that a proactive approach to policing online fraud can have substantial positive effects for police and victims alike.
Resumo:
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
We study the rates of growth of the regret in online convex optimization. First, we show that a simple extension of the algorithm of Hazan et al eliminates the need for a priori knowledge of the lower bound on the second derivatives of the observed functions. We then provide an algorithm, Adaptive Online Gradient Descent, which interpolates between the results of Zinkevich for linear functions and of Hazan et al for strongly convex functions, achieving intermediate rates between [square root T] and [log T]. Furthermore, we show strong optimality of the algorithm. Finally, we provide an extension of our results to general norms.
Resumo:
The research introduces a promising technique for monitoring the degradation status of oil-paper insulation systems of large power transformers in an online mode and innovative enhancements are also made on the existing offline measurements, which afford more direct understanding of the insulation degradation process. Further, these techniques benefit from a quick measurement owing to the chirp waveform signal application. The techniques are improved and developed on the basis of measuring the impedance response of insulation systems. The feasibility and validity of the techniques was supported by the extensive simulation works as well as experimental investigations.
Resumo:
This paper examines the issue of face, speaker and bi-modal authentication in mobile environments when there is significant condition mismatch. We introduce this mismatch by enrolling client models on high quality biometric samples obtained on a laptop computer and authenticating them on lower quality biometric samples acquired with a mobile phone. To perform these experiments we develop three novel authentication protocols for the large publicly available MOBIO database. We evaluate state-of-the-art face, speaker and bi-modal authentication techniques and show that inter-session variability modelling using Gaussian mixture models provides a consistently robust system for face, speaker and bi-modal authentication. It is also shown that multi-algorithm fusion provides a consistent performance improvement for face, speaker and bi-modal authentication. Using this bi-modal multi-algorithm system we derive a state-of-the-art authentication system that obtains a half total error rate of 6.3% and 1.9% for Female and Male trials, respectively.
Resumo:
Online dating and romance scams continue to lure in Australians with figures this week showing people have lost more than A$23 million this year alone, with average individual losses at A$21,000 – three times higher than other types of fraud. The Australian Competition and Consumer Commission (ACCC) set up the Scam Disruption Project in August to help target those it believes have been caught in such scams. Over three months it sent 1,500 letters to potential victims in New South Wales and the Australian Capital Territory. The figures released this week show that 50 people have been scammed, losing a total A$1.7 million – that’s an average of A$34,000 per victim. Almost three quarters of the scams were dating and romance related, which saw it evolve into the number one category of fraud victimisation. Romance scams continue to pose a problem – despite the efforts of the police and ACCC – so why is it that people continue to fall for them?
Resumo:
A national online survey of private and public will drafters distributed through State/public trustee offices in seven states/territories and law societies and community legal centres across all states/territories yielded 257 responses. The survey, using questions, scales and case scenarios sought to canvas perceptions of difficulties facing will drafters and the strategies used to address them.
Resumo:
Online interactions are becoming commonplace for a multitude of educational purposes. Each context presents a unique and dynamic mix of variables that combine to shape the practice and the identities of those involved. In this article, sociocultural theories of learning and sociocultural theories of technology are explored as a way to view and to map the complex interactions that can occur. The case of synchronous online moderation meetings are used as an example of the combination of variables that can impact on the development of shared understandings of a practice. Online moderation can involve teachers from geographically diverse areas discussing and negotiating their judgement decisions. These discussions represent an intersection of a national curriculum, standards-referenced assessment, moderation protocols, site-specific practices and understandings, and individual teachers’ knowledges and histories. It is suggested that the proposed theoretical combination addresses some of the limitations of each of the theories when investigating such a dynamic context. As higher education moves into increasing use of online modes of communication and a higher level of accountability the relevance of this discussion to higher education is evident.
Resumo:
Access to the right information at the right time is a challenge facing health professionals across the globe. HEART Online (www.heartonline.org.au) is a website designed to support the delivery of evidence based care for the prevention and rehabilitation of heart disease. It was developed by the Queensland Government and the National Heart Foundation of Australia and launched May 2013.
Resumo:
Students in secondary schools experience problems that can impact on their well-being and educational outcomes. Although face-to-face counselling is available in most Australian secondary schools, many students, particularly boys, do not seek appropriate help. Research suggests that online counselling can be effective and increase engagement. This study of 215 secondary school students sought to assess students' intention to use online counselling if it was made available in schools. The results found no gender difference in the likely intentions to seek online help though year level was significant and students experiencing psychological distress had a preference for online counselling. If students did use online counselling it was more likely they would discuss sensitive topics rather than for career issues. Implications for school counselling are discussed.
Resumo:
This paper details the development of an online adaptive control system, designed to learn from the actions of an instructing pilot. Three learning architectures, single layer neural networks (SLNN), multi-layer neural networks (MLNN), and fuzzy associative memories (FAM) are considerd. Each method has been tested in simulation. While the SLNN and MLNN provided adequate control under some simulation conditions, the addition of pilot noise and pilot variation during simulation training caused these methods to fail.