645 resultados para user-driven security adaptation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many commentators have treated the internet as a site of democratic freedom and as a new kind of public sphere. While there are good reasons for optimism, like any social space digital space also has its dark side. Citizens and governments alike have expressed anxiety about cybercrime and cyber-security. In August 2011, the Australian government introduced legislation to give effect to Australia becoming a signatory to the European Convention on Cybercrime (2001). At the time of writing, that legislation is still before the Parliament. In this article, attention is given to how the legal and policy-making process enabling Australia to be compliant with the European Convention on Cybercrime came about. Among the motivations that informed both the development of the Convention in Europe and then the Australian exercise of legislating for compliance with it was a range of legitimate concerns about the impact that cybercrime can have on individuals and communities. This article makes the case that equal attention also needs to be given to ensuring that legislators and policy makers differentiate between legitimate security imperatives and any over-reach evident in the implementation of this legislation that affects rule of law principles, our capacity to engage in democratic practices, and our civic and human rights.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the socio-economic and environmental impacts of battery driven Auto Rickshaw at Rajshahi city in Bangladesh. Unemployment problem is one of the major problems in Bangladesh. The number of unemployed people in Bangladesh is 7 lacks. Auto Rickshaw reduces this unemployment problem near about 2%.In this thesis work various questions were asked to the Auto Rickshaw driver in the different point in the Rajshahi city. Then those data were calculated to know their socio economic condition. The average number of passenger per Auto Rickshaw was determined at various places of Rajshahi city (Talaimari mor, Hadir mor, Alupotti, Shaheb bazar zero point, Shodor Hospital mor, Fire brigade mor, CNB mor, Lakshipur mor, Bondo gate, Bornali, Panir tank, Rail gate, Rail Station, Bhodrar mor, Adorsha School mor). Air pollution is a great threat for human health. One of the major causes of the air pollution is the emission from various vehicles, which are running by the burning of the fossil fuel in different internal combustion(IC) engines. All the data’s about emission from various power plants were collected from internet. Then the amounts of emission (CO2, NOX and PM) from different power plant were calculated in terms of kg/km. The energy required by the Auto Rickshaw per km was also calculated. Then the histogram of emission from different vehicles in terms of kg/km was drawn. By analyzing the data and chart, it was found that, battery driven Auto Rickshaw increases income, social status, comfort and decreases unemployment problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet is one of the most significant information and communication technologies to emerge during the end of the last century. It created new and effective means by which individuals and groups communicate. These advances led to marked institutional changes most notably in the realm of commercial exchange: it did not only provide the high-speed communication infrastructure to business enterprises; it also opened them to the global consumer base where they could market their products and services. Commercial interests gradually dominated Internet technology over the past several years and have been a factor in the increase of its user population and enhancement of infrastructure. Such commercial interests fitted comfortably within the structures of the Philippine government. As revealed in the study, state policies and programs make use of Internet technology as an enabler of commercial institutional reforms using traditional economic measures. Yet, despite efforts to maximize the Internet as an enabler for market-driven economic growth, the accrued benefits are yet to come about; it is largely present only in major urban areas and accessible to a small number of social groups. The failure of the Internet’s developmental capability can be traced back to the government’s wholesale adoption of commercial-centered discourse. The Internet’s developmental gains (i.e. instrumental, communicative and emancipatory) and features, which were always there since its inception, have been visibly left out in favor of its commercial value. By employing synchronic and diachronic analysis, it can be shown that the Internet can be a vital technology in promoting genuine social development in the Philippines. In general, the object is to realize a social environment of towards a more inclusive and participatory application of Internet technology, equally aware of the caveats or risks the technology may pose. It is argued further that there is a need for continued social scientific research regarding the social as and developmental implications of Internet technology at local level structures, such social sectors, specific communities and organizations. On the meta-level, such approach employed in this research can be a modest attempt in increasing the calculus of hope especially among the marginalized Filipino sectors, with the use of information and communications technologies. This emerging field of study—tentatively called Progressive Informatics—must emanate from the more enlightened social sectors, namely: the non-government, academic and locally-based organizations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid growth of services available on the Internet and exploited through ever globalizing business networks poses new challenges for service interoperability. New services, from consumer “apps”, enterprise suites, platform and infrastructure resources, are vying for demand with quickly evolving and overlapping capabilities, and shorter cycles of extending service access from user interfaces to software interfaces. Services, drawn from a wider global setting, are subject to greater change and heterogeneity, demanding new requirements for structural and behavioral interface adaptation. In this paper, we analyze service interoperability scenarios in global business networks, and propose new patterns for service interactions, above those proposed over the last 10 years through the development of Web service standards and process choreography languages. By contrast, we reduce assumptions of design-time knowledge required to adapt services, giving way to run-time mismatch resolutions, extend the focus from bilateral to multilateral messaging interactions, and propose declarative ways in which services and interactions take part in long-running conversations via the explicit use of state.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Changing environments present a number of challenges to mobile robots, one of the most significant being mapping and localisation. This problem is particularly significant in vision-based systems where illumination and weather changes can cause feature-based techniques to fail. In many applications only sections of an environment undergo extreme perceptual change. Some range-based sensor mapping approaches exploit this property by combining occasional place recognition with the assumption that odometry is accurate over short periods of time. In this paper, we develop this idea in the visual domain, by using occasional vision-driven loop closures to infer loop closures in nearby locations where visual recognition is difficult due to extreme change. We demonstrate successful map creation in an environment in which change is significant but constrained to one area, where both the vanilla CAT-Graph and a Sum of Absolute Differences matcher fails, use the described techniques to link dissimilar images from matching locations, and test the robustness of the system against false inferences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Living with substance users negatively impacts upon family members in many ways, and distress is common. Despite these deep and wide-ranging impacts, supportive interventions for family members in their own right are rarely available. Thailand has substantial and growing problems with substance use, and there is very little support or family members of drug users, especially in community setting. The Thai Family Support (TFS) program was designed for implementation in primary health care units (PCUs) in Thailand. TFS was based on two approaches with existing empirical support in Western contexts—the 5-step method and CRAFT—with adaptations to a Thai setting that included integration with Buddhist practices. Its aims were to increase well-being of family members, reduce mental distress, improve family relationships between family members, and engage substance users in behaviour change. A small-scale randomised controlled trial on TFS with a Delayed Treatment control was conducted, with assessments at 8 weeks (Post 1) and 20-24 weeks (Post 2). Structured interviews with participants and PCU staff and an examination of five case studies augmented the quantitative results. Mixed Model Analyses were applied to quantitative outcomes, and thematic analysis was used for qualitative data. Thirty-six participants (18 in each of Immediate and Delayed Conditions) were recruited. A significant difference at Baseline between the two conditions was observed on the Thai GHQ-28 and Gender, but it was not possible to statistically control for these effects. There was a significant Time by Condition interaction on the Thai GHQ-28, WHOQOL-BREF-THAI and FAS, reflecting greater improvements in the Immediate condition by Post 1, but with the Delayed condition meeting or exceeding that effect by Post 2. On FES Cohesion and Conflict, there were falls across conditions at Post 2, but only Cohesion also showed a Time by Condition interaction, and that effect was consistent with a delayed impact of treatment. Overall, TFS by PCU staff in the Delayed Condition gave similar results to TFS conducted by the researcher, supporting the viability of its dissemination to standard health services. Qualitative data also confirmed the quantitative results. Most participants reported physiological and psychological improvements even though their substance-using relative did not change their drug use behaviour. After completing TFS, participants reported increased knowledge, group support and sharing feeling, having positive patient-professional relationship, having greater knowledge of substance abuse and social support. In particular, they changed their behaviour towards the substance user, resulting in improvements to family relationships. PCU staff gave similar responses on the efficacy of TFS, and saw it as feasible for routine use, although some implementation challenges were identified. The cultural adaptation and in particular the religious activities, were recognised by participants and PCU staff as an important component of TFS to support psychological health and well-being. Findings from this study showed the impact of substance use on family members and difficulties that they experienced when living with the substance users, resulting distresses and burden that may develop severe mental health disease. Drug use policies should be modified to support family members and response to their needs effectively for early prevention. This study also gave preliminary support for application of the TFS program in rural primary care settings and identified some policies that will be required for it to be disseminated more broadly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer worms represent a serious threat for modern communication infrastructures. These epidemics can cause great damage such as financial losses or interruption of critical services which support lives of citizens. These worms can spread with a speed which prevents instant human intervention. Therefore automatic detection and mitigation techniques need to be developed. However, if these techniques are not designed and intensively tested in realistic environments, they may cause even more harm as they heavily interfere with high volume communication flows. We present a simulation model which allows studies of worm spread and counter measures in large scale multi-AS topologies with millions of IP addresses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modern mobile computing devices are versatile, but bring the burden of constant settings adjustment according to the current conditions of the environment. While until today, this task has to be accomplished by the human user, the variety of sensors usually deployed in such a handset provides enough data for autonomous self-configuration by a learning, adaptive system. However, this data is not fully available at certain points in time, or can contain false values. Handling potentially incomplete sensor data to detect context changes without a semantic layer represents a scientific challenge which we address with our approach. A novel machine learning technique is presented - the Missing-Values-SOM - which solves this problem by predicting setting adjustments based on context information. Our method is centered around a self-organizing map, extending it to provide a means of handling missing values. We demonstrate the performance of our approach on mobile context snapshots, as well as on classical machine learning datasets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The standard one-sector real business cycle model is unable to generate expectations-driven fluctuations. The addition of countercyclical mark-ups and modest investment adjustment costs offers an easy fix to this conundrum. The simulated model replicates the regular features of U.S. aggregate fluctuations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 2011 floods illustrated once again Queensland’s vulnerability to flooding and similar disasters. Climate change will increase the frequency and magnitude of such events and will have a variety of other impacts. To deal with these impacts governments at all levels need to be prepared and work together. Like the rest of the nation most of the population of the state is located in the coastal areas and these areas are more vulnerable to the impacts of climate change. This paper examines climate change adaptation efforts in coastal Queensland. The aim is increasing local disaster resilience of people and property through fostering coordination between local and state government planning activities in coastal high hazard areas. By increasing the ability of local governments and state agencies to coordinate planning activities, we can help adapt to impacts of climate change. Towards that end, we will look at the ways that these groups currently interact, especially with regard to issues involving uncertainty related to climate change impacts. Through an examination of climate change related activities by Queensland’s coastal local governments and state level planning agencies and how they coordinate their planning activities at different levels we aim to identify the weaknesses of the current planning system in responding to the challenges of climate change adaptation and opportunities for improving the ways we plan and coordinate planning, and make recommendations to improve resilience in advance of disasters so as to help speed up recovery when they occur.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2011 Queensland suffered both floods and cyclones, leaving residents without homes and their communities in ruins (2011). This paper presents how researchers from QUT, who are also members of the Oral History Association of Australia (OHAA) Queensland’s chapter, are using oral history, photographs, videography and digital storytelling to help heal and empower rural communities around the state and how evaluation has become a key element of our research. QUT researchers ran storytelling workshops in the capital city of Brisbane i early 2011, after the city suffered sever flooding. Cyclone Yasi then struck the town of Cardwell (in February 2011) destroying their historical museum and recording equipment. We delivered an 'emergency workshop', offering participants hands on use of the equipment, ethical and interviewing theory, so that the community could start to build a new collection. We included oral history workshops as well as sessions on how best to use a video camera, digital camera and creative writing sessions, so the community would also know how to make 'products' or exhibition pieces out of the interviews they were recording. We returned six months later to conduct follow-up workshops and the material produced by and with the community had been amazing. More funding has now been secured to replicate audio/visual/writing workshops in other remote rural Queensland communities including Townsville, Mackay and Cunnamulla and Toowoomba in 2012, highlighting the need for a multi media approach, to leverage the most out of OH interviews as a mechanism to restore and promote community resilience and pride.