441 resultados para privacy violations
Resumo:
SIMON is a family of 10 lightweight block ciphers published by Beaulieu et al. from the United States National Security Agency (NSA). A cipher in this family with K -bit key and N -bit block is called SIMON N/K . We present several linear characteristics for reduced-round SIMON32/64 that can be used for a key-recovery attack and extend them further to attack other variants of SIMON. Moreover, we provide results of key recovery analysis using several impossible differential characteristics starting from 14 out of 32 rounds for SIMON32/64 to 22 out of 72 rounds for SIMON128/256. In some cases the presented observations do not directly yield an attack, but provide a basis for further analysis for the specific SIMON variant. Finally, we exploit a connection between linear and differential characteristics for SIMON to construct linear characteristics for different variants of reduced-round SIMON. Our attacks extend to all variants of SIMON covering more rounds compared to any known results using linear cryptanalysis. We present a key recovery attack against SIMON128/256 which covers 35 out of 72 rounds with data complexity 2123 . We have implemented our attacks for small scale variants of SIMON and our experiments confirm the theoretical bias presented in this work.
Resumo:
We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST’s SHA3 competition. First we improve Aumasson and Phans’ integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16.5 rounds. Next we improve the designers’ meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Finally, we comment on possible methods to obtain free-start distinguishers and free-start collisions for Fugue-256.
Resumo:
Although seeking help for mental ill-health is beneficial, the majority of persons afflicted do not access available help services. Young adults (16-24 years old) in particular have the highest prevalence of mental health problems and the lowest rate of help-seeking behaviour. Key barriers to help-seeking for young adults, including cost, privacy concerns, inconvenience, access to health professionals and interpersonal interaction, appear to derive from the face-to-face method of service delivery traditionally used to distribute mental health services. Social marketing employs the principle of value exchange, whereby consumers will choose a behaviour in exchange for receiving valued benefits and/or a reduction in key barriers, to achieve behavioural goals for social good. The appropriation of mobile digital technology to deliver self-help mental health services may reduce the current barriers to help seeking, however, extant literature offers no empirical support for this proposition. Our research addresses this gap by examining the perceptions of young adults regarding M-mental health services. Depth interviews were undertaken with 15 young adults (18-24 years old), who had self-reported mild-moderate stress, anxiety or depression. The data were thematically analysed with the assistance of Nvivo. The findings reveal M-mental health services reduce the barriers to accessing face-to-face help services to a large extent. However, they also present their own barriers to help-seeking that must be considered by social marketers, including negligible cost expectations and service efficacy concerns. Overall, this study highlights the potential of M-mental health services to encourage early intervention and help-seeking behaviour as part of a social marketing strategy to address mental illness in young adults.
Resumo:
Over the last two decades, "green criminology" has emerged as a unique area of study, bringing together criminologists and sociologists from a wide range of research backgrounds and varying theoretical orientations. It spans the micro to the macro—from individual-level environmental crimes and victimization to business/corporate violations and state transgressions. There have been few attempts, however, to explicitly or implicitly integrate cultural criminology into green criminology (or vice versa). This book moves towards articulating a green cultural criminological perspective. Brisman and South examine existing overlapping research and offer a platform to support future excursions by green criminologists into cultural criminology’s concern with media images and representations, consumerism and consumption, and resistance. At the same time, they offer an invitation to cultural criminologists to adopt a green view of the consumption landscape and the growth (and depictions) of environmental harms.
Resumo:
The literature on humour in teaching frequently defaults to a series of maxims about how it can be used most appropriately: ‘Never tease students', ‘Don't joke about sensitive issues', ‘Never use laughter for disciplinary purposes'. This paper outlines recent research into the boundaries of humour-use within teacher education, which itself forms one part of a large scale, broadly-based study into the use of humour within tertiary teaching. This particular part of the research involves semi-structured, in-depth interviews with university academics. Following the ‘benign violations' theory of humour - wherein, to be funny, a situation/statement must be some kind of a social violation, that violation must be regarded as relatively benign, and the two ideas must be held simultaneously - this paper suggests that the willingness of academics to use particular types of humour in their teaching revolves around the complexities of determining the margins of ‘the benign'. These margins are shaped in part by pedagogic limitations, but also by professional delimitations. In terms of limitations, the boundaries of humour are set by the academic environment of the university, by the characteristics of different cohorts of students, and by what those students are prepare to laugh at. In terms of delimitations, most academics are prepared to tease their student, and many are prepared to use laughter as a form of discipline, however their own humour orientation, academic seniority, and employment security play a large role in determining what kinds of humour will be used, and where boundaries will be set. The central conclusion here is that formal maxims of humour provide little more than vague strategic guidelines, largely failing to account for the complexity of teaching relationships, for the differences between student cohorts, and for the talents and standing of particular teachers.
Resumo:
XACML has become the defacto standard for enterprise- wide, policy-based access control. It is a structured, extensible language that can express and enforce complex access control policies. There have been several efforts to extend XACML to support specific authorisation models, such as the OASIS RBAC profile to support Role Based Access Control. A number of proposals for authorisation models that support business processes and workflow systems have also appeared in the literature. However, there is no published work describing an extension to allow XACML to be used as a policy language with these models. This paper analyses the specific requirements of a policy language to express and enforce business process authorisation policies. It then introduces BP-XACML, a new profile that extends the RBAC profile for XACML so it can support business process authorisation policies. In particular, BP-XACML supports the notion of tasks, and constraints at the level of a task instance, which are important requirements in enforcing business process authorisation policies.
Resumo:
Decision-making is such an integral aspect in health care routine that the ability to make the right decisions at crucial moments can lead to patient health improvements. Evidence-based practice, the paradigm used to make those informed decisions, relies on the use of current best evidence from systematic research such as randomized controlled trials. Limitations of the outcomes from randomized controlled trials (RCT), such as “quantity” and “quality” of evidence generated, has lowered healthcare professionals’ confidence in using EBP. An alternate paradigm of Practice-Based Evidence has evolved with the key being evidence drawn from practice settings. Through the use of health information technology, electronic health records (EHR) capture relevant clinical practice “evidence”. A data-driven approach is proposed to capitalize on the benefits of EHR. The issues of data privacy, security and integrity are diminished by an information accountability concept. Data warehouse architecture completes the data-driven approach by integrating health data from multi-source systems, unique within the healthcare environment.
Resumo:
The workshop is an activity of the IMIA Working Group ‘Security in Health Information Systems’ (SiHIS). It is focused to the growing global problem: how to protect personal health data in today’s global eHealth and digital health environment. It will review available trust building mechanisms, security measures and privacy policies. Technology alone does not solve this complex problem and current protection policies and legislation are considered woefully inadequate. Among other trust building tools, certification and accreditation mechanisms are dis-cussed in detail and the workshop will determine their acceptance and quality. The need for further research and international collective action are discussed. This workshop provides an opportunity to address a critical growing problem and make pragmatic proposals for sustainable and effective solutions for global eHealth and digital health.
Resumo:
Crashes at level crossings are a major issue worldwide. In Australia, as well as in other countries, the number of crashes with vehicles has declined in the past years, while the number of crashes involving pedestrians seems to have remained unchanged. A systematic review of research related to pedestrian behaviour highlighted a number of important scientific gaps in current knowledge. The complexity of such intersections imposes particular constraints to the understanding of pedestrians’ crossing behaviour. A new systems-based framework, called Pedestrian Unsafe Level Crossing framework (PULC) was developed. The PULC organises contributing factors to crossing behaviour on different system levels as per the hierarchical classification of Jens Rasmussen’s Framework for Risk Management. In addition, the framework adapts James Reason’s classification to distinguish between different types of unsafe behaviour. The framework was developed as a tool for collection of generalizable data that could be used to predict current or future system failures or to identify aspects of the system that require further safety improvement. To give it an initial support, the PULC was applied to the analysis of qualitative data from focus groups discussions. A total number of 12 pedestrians who regularly crossed the same level crossing were asked about their daily experience and their observations of others’ behaviour which allowed the extraction and classification of factors associated with errors and violations. Two case studies using Rasmussen’s AcciMap technique are presented as an example of potential application of the framework. A discussion on the identified multiple risk contributing factors and their interactions is provided, in light of the benefits of applying a systems approach to the understanding of the origins of individual’s behaviour. Potential actions towards safety improvement are discussed.
Resumo:
Newly licenced drivers are disproportionately represented in traffic injuries and crash statistics. Despite the implementation of countermeasures designed to improve safety, such as graduated driver licencing (GDL) schemes, many young drivers do not comply with road rules. This study used a reconceptualised deterrence theory framework to investigate young drivers’ perceptions of the enforcement of road rules in general and those more specifically related to GDL. A total of 236 drivers aged 17–24 completed a questionnaire assessing their perceptions of various deterrence mechanisms (personal and vicarious) and their compliance with both GDL-specific and general road rules. Hierarchical multiple regressions conducted to explore noncompliant behaviour revealed that, contrary to theoretical expectations, neither personal nor vicarious punishment experiences affected compliance in the expected direction. Instead, the most influential factors contributing to noncompliance were licence type (P2) and, counterintuitively, having previously been exposed to enforcement. Parental enforcement was also significant in the prediction of transient rule violations, but not fixed rule violations or overall noncompliance. Findings are discussed in light of several possibilities, including an increase in violations due to more time spent on the road, an ‘emboldening effect’ noted in prior studies and possible conceptual constraints regarding the deterrence variables examined in this study.
Resumo:
This study examined the potential for apartment living to become more socially and environmentally acceptable in Australian society generally, and in subtropical cities particularly. Resolution of incongruities between residents' preferred attributes and other stakeholders' main interests has important implications for reshaping lifestyle expectations and design practice as society moves toward a post-carbon future.
Resumo:
This chapter is based on a qualitative case study that researched the perceptions of nine male and female pre-service English teachers’ in regards to their preparedness to mentor positive digital conduct in Social network sites (SNS). These sites enable individuals to perform public representations of identity, consumed by virtual audiences, with various degrees of perceived privacy. The chapter frames what we call “identity curation” through three theoretical lenses; of performativity, customisation and critical literacy. This chapter discusses one of the themes that emerged from the research, which is the way in which “normalised” and naturalised representations of femineity on SNS were judged more harshly than masculine representations.
Resumo:
Problem The Manchester Driver Behaviour Questionnaire (DBQ) is the most commonly used self-report tool in traffic safety research and applied settings. It has been claimed that the violation factor of this instrument predicts accident involvement, which was supported by a previous meta-analysis. However, that analysis did not test for methodological effects, or include contacting researchers to obtain unpublished results. Method The present study re-analysed studies on prediction of accident involvement from DBQ factors, including lapses, and many unpublished effects. Tests of various types of dissemination bias and common method variance were undertaken. Results Outlier analysis showed that some effects were probably not reliable data, but excluding them did not change the results. For correlations between violations and crashes, tendencies for published effects to be larger than unpublished ones and for effects to decrease over time were observed, but were not significant. Also, analysis using the proxy of the mean of accidents in studies indicated that studies where effects for violations are unknown have smaller effect sizes. These differences indicate dissemination bias. Studies using self-reported accidents as dependent variables had much larger effects than those using recorded accident data. Also, zero-order correlations were larger than partial correlations that controlled for exposure. Similarly, violations/accidents effects were strong only when there was also a strong correlation between accidents and exposure. Overall, the true effect is probably very close to zero (r<.07) for violations versus traffic accident involvement, depending upon which systematic tendencies in the data are controlled for. Conclusions: Methodological factors and dissemination bias have inflated the mean effect size of the DBQ in the published literature. Strong evidence of various artefactual effects is apparent. Practical Applications A greater level of care should be taken if the DBQ continues to be used in traffic safety research. Also, validation of self-reports should be more comprehensive in the future, taking into account the possibility of common method variance.
Resumo:
Drawing on two case studies, this article considers the allegation of a disgruntled author: ’Defamation was framed to protect the reputations of 19th century gentlemen hypocrites'. The first case study considers the litigation over Bob Ellis' unreliable political memoir, ’Goodbye Jerusalem', published by Random House. The second case study focuses upon the litigation over the allegation by Media Watch that Richard Carleton had plagarised a documentary entitled ’Cry from the Grave'. The article considers the meaning of defamatory imputations, the range of defences, and the available remedies. It highlights the competing arguments over the protection of reputation and privacy, artistic expression, and the freedom of speech. This article concludes that defamation law should foster ’gossip we can trust'.
Resumo:
This study compares Value-at-Risk (VaR) measures for Australian banks over a period that includes the Global Financial Crisis (GFC) to determine whether the methodology and parameter selection are important for capital adequacy holdings that will ultimately support a bank in a crisis period. VaR methodology promoted under Basel II was largely criticised during the GFC for its failure to capture downside risk. However, results from this study indicate that 1-year parametric and historical models produce better measures of VaR than models with longer time frames. VaR estimates produced using Monte Carlo simulations show a high percentage of violations but with lower average magnitude of a violation when they occur. VaR estimates produced by the ARMA GARCH model also show a relatively high percentage of violations, however, the average magnitude of a violation is quite low. Our findings support the design of the revised Basel II VaR methodology which has also been adopted under Basel III.