48 resultados para MAC address
Resumo:
The need to address on-road motorcycle safety in Australia is important due to the disproportionately high percentage of riders and pillions killed and injured each year. One approach to preventing motorcycle-related injury is through training and education. However, motorcycle rider training lacks empirical support as an effective road safety countermeasure to reduce crash involvement. Previous reviews have highlighted that risk-taking is a contributing factor in many motorcycle crashes, rather than merely a lack of vehicle-control skills (Haworth & Mulvihill, 2005; Jonah, Dawson & Bragg, 1982; Watson et al, 1996). Hence, though the basic vehicle-handling skills and knowledge of road rules that are taught in most traditional motorcycle licence training programs may be seen as an essential condition of safe riding, they do not appear to be sufficient in terms of crash reduction. With this in mind there is considerable scope for the improvement of program focus and content for rider training and education. This program of research examined an existing traditional pre-licence motorcycle rider training program and formatively evaluated the addition of a new classroom-based module to address risky riding; the Three Steps to Safer Riding program. The pilot program was delivered in the real world context of the Q-Ride motorcycle licensing system in the state of Queensland, Australia. Three studies were conducted as part of the program of research: Study 1, a qualitative investigation of delivery practices and student learning needs in an existing rider training course; Study 2, an investigation of the extent to which an existing motorcycle rider training course addressed risky riding attitudes and motives; and Study 3, a formative evaluation of the new program. A literature review as well as the investigation of learning needs for motorcyclists in Study 1 aimed to inform the initial planning and development of the Three Steps to Safer Riding program. Findings from Study 1 suggested that the training delivery protocols used by the industry partner training organisation were consistent with a learner-centred approach and largely met the learning needs of trainee riders. However, it also found that information from the course needs to be reinforced by on-road experiences for some riders once licensed and that personal meaning for training information was not fully gained until some riding experience had been obtained. While this research informed the planning and development of the new program, a project team of academics and industry experts were responsible for the formulation of the final program. Study 2 and Study 3 were conducted for the purpose of formative evaluation and program refinement. Study 2 served primarily as a trial to test research protocols and data collection methods with the industry partner organisation and, importantly, also served to gather comparison data for the pilot program which was implemented with the same rider training organisation. Findings from Study 2 suggested that the existing training program of the partner organisation generally had a positive (albeit small) effect on safety in terms of influencing attitudes to risk taking, the propensity for thrill seeking, and intentions to engage in future risky riding. However, maintenance of these effects over time and the effects on riding behaviour remain unclear due to a low response rate upon follow-up 24 months after licensing. Study 3 was a formative evaluation of the new pilot program to establish program effects and possible areas for improvement. Study 3a examined the short term effects of the intervention pilot on psychosocial factors underpinning risky riding compared to the effects of the standard traditional training program (examined in Study 2). It showed that the course which included the Three Steps to Safer Riding program elicited significantly greater positive attitude change towards road safety than the existing standard licensing course. This effect was found immediately following training, and mean scores for attitudes towards safety were also maintained at the 12 month follow-up. The pilot program also had an immediate effect on other key variables such as risky riding intentions and the propensity for thrill seeking, although not significantly greater than the traditional standard training. A low response rate at the 12 month follow-up unfortunately prevented any firm conclusions being drawn regarding the impact of the pilot program on self-reported risky riding once licensed. Study 3a further showed that the use of intermediate outcomes such as self-reported attitudes and intentions for evaluation purposes provides insights into the mechanisms underpinning risky riding that can be changed by education and training. A multifaceted process evaluation conducted in Study 3b confirmed that the intervention pilot was largely delivered as designed, with course participants also rating most aspects of training delivery highly. The complete program of research contributed to the overall body of knowledge relating to motorcycle rider training, with some potential implications for policy in the area of motorcycle rider licensing. A key finding of the research was that psychosocial influences on risky riding can be shaped by structured education that focuses on awareness raising at a personal level and provides strategies to manage future riding situations. However, the formative evaluation was mainly designed to identify areas of improvement for the Three Steps to Safer Riding program and found several areas of potential refinement to improve future efficacy of the program. This included aspects of program content, program delivery, resource development, and measurement tools. The planned future follow-up of program participants' official crash and traffic offence records over time may lend further support for the application of the program within licensing systems. The findings reported in this thesis offer an initial indication that the Three Steps to Safer Riding is a useful resource to accompany skills-based training programs.
Resumo:
This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.
Resumo:
This paper presents the results of task 3 of the ShARe/CLEF eHealth Evaluation Lab 2013. This evaluation lab focuses on improving access to medical information on the web. The task objective was to investigate the effect of using additional information such as the discharge summaries and external resources such as medical ontologies on the IR effectiveness. The participants were allowed to submit up to seven runs, one mandatory run using no additional information or external resources, and three each using or not using discharge summaries.
Resumo:
One of the concerns about the use of Bluetooth MAC Scanner (BMS) data, especially from urban arterial, is the bias in the travel time estimates from multiple Bluetooth devices being transported by a vehicle. For instance, if a bus is transporting 20 passengers with Bluetooth equipped mobile phones, then the discovery of these mobile phones by BMS will be considered as 20 different vehicles, and the average travel time along the corridor estimated from the BMS data will be biased with the travel time from the bus. This paper integrates Bus Vehicle Identification system with BMS network to empirically evaluate such bias, if any. The paper also reports an interesting finding on the uniqueness of MAC IDs.
Resumo:
"Firstly, I thank you sincerely for your kind invitation and warm welcome to Sri Lanka and to this national HR conference, I particularly acknowledge the initiative of Chairman of the Technical Committee, Dr Asoka Jinadasa in making it possible for me to be here, and to offer this contribution to your conference. I congratulate you on assembling such an impressive array of talent to aid your discussions. I hope I can add usefully to your conversations. In particular I congratulate you on developing such a good definition of HRM: “A strategic and integrated approach in acquisition, development and engagement of talent using relevant tools, with proper policies, products and processes in creating a conducive climate towards achieving organizational excellence and societal well-being” To me, that means that HR has to add value to the organisation, through an integrated set of tools, competencies, and policies, which are all consistent with the business model..."
Resumo:
Over the past 20 years the labour market, workforce and work organisation of most if not all industrialised countries have been significantly refashioned by the increased use of more flexible work arrangements, variously labelled as precarious employment or contingent work. There is now a substantial and growing body of international evidence that many of these arrangements are associated with a significant deterioration in occupational health and safety (OHS), using a range of measures such as injury rates, disease, hazard exposures and work-related stress. Moreover, there is an emerging body of evidence that these arrangements pose particular problems for conventional regulatory regimes. Recognition of these problems has aroused the concern of policy makers - especially in Europe, North America and Australia - and a number of responses have been adopted in terms of modifying legislation, producing new guidance material and codes of practice and revised enforcement practices. This article describes one such in itiative in Australia with regard to home-based clothing workers. The regulatory strategy developed in one Australian jurisdiction (and now being ‘exported’ into others) seeks to counter this process via contractual tracking mechanisms to follow the work, tie in liability and shift overarching legal responsibility to the top of the supply chain. The process also entails the integration of minimum standards relating to wages, hours and working conditions; OHS and access to workers’ compensation. While home-based clothing manufacture represents a very old type of ‘flexible’ work arrangement, it is one that regulators have found especially difficult to address. Further, the elaborate multi-tiered subcont racting and diffuse work locations found in this industry are also characteristic of newer forms of contingent work in other industries (such as some telework) and the regulatory challenges they pose (such as the tendency of elaborate supply chains to attenuate and fracture statutory responsibilities, at least in terms of the attitudes and behaviour of those involved).
Resumo:
This study started with the aim to develop an approach that will help designers create interfaces that are more intuitive for older adults to use. Two objectives were set for this study: 1) to investigate one of the possible strategies for developing intuitive interfaces for older people, and; 2) to investigate factors that could interfere with intuitive use. This paper briefly presents the outcome of the two experiments and how it has lead to the development of an adaptable interface design model that will help designers develop interfaces that are intuitive to learn and, over time, intuitive to use for users with diverse technology prior experience and cognitive abilities.
Resumo:
In recent times a widespread consensus on the reality and gravity of anthropogenic climate change has emerged. Perceived inadequacies in the Australian government’s legal and policy responses to climate change issues have resulted in environmental activists increasingly turning to the courts as a strategy to promote greater action to address adverse climate impacts. The efficacy of this strategy for achieving climate goals is limited by the time and expense of litigating, the restrictions inherent in environmental law administrative challenges, and the possibility that judicial decisions may be overruled by the legislature. To date, climate change litigation in Australia has met with varied success, yet its significance extends beyond the court room as an important mechanism for raising public, political and commercial awareness about climate change issues. Ultimately, however, the types of far-reaching changes needed to mitigate and manage adverse climate impacts require strong regulatory backing. The most effective approach to addressing the complex challenges posed by climate change is a coordinated suite of regulatory measures spearheaded by the Federal Government.
Resumo:
The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.
Resumo:
Licence sanctions including suspension, disqualification, or revocation have been effective in reducing recidivism and crash rates among those convicted of driving while under the influence of alcohol and/or drugs. Nonetheless, studies have indicated that many offenders continue to drive while they are unlicensed. Consequently, more recent attention has been given to vehicle sanctions that separate the offender from their vehicle. Vehicle based interventions focus on incapacitating the vehicle or separating it from the offending driver rather than relying on the threat of further sanctions to encourage compliance. Following on from a previous review conducted by Dr. Ron Christie (2006) for VicRoads, which examined the effectiveness of vehicle based sanctions in deterring unlicensed driving, this report considers the effectiveness of the aforementioned vehicle based sanctions for addressing drink driving.
Resumo:
Although many immigrants enter the United States with a healthy body weight, this health advantage disappears the longer they reside in the United States. To better understand the complexities of obesity change within a cultural framework, a community-based participatory research (CBPR) approach, PhotoVoice, was used, focusing on physical activity among Muslim Somali women. The CBPR partnership was formed to identify barriers and resources to engaging in physical activity with goals of advocacy and program development. Muslim Somali women (n = 8) were recruited to participate, trained and provided cameras, and engaged in group discussions about the scenes they photographed. Participants identified several barriers, including safety concerns, minimal culturally appropriate resources, and financial constraints. Strengths included public resources and a community support system. The CBPR process identified opportunities and challenges to collaboration and dissemination processes. The findings laid the framework for subsequent program development and community engagement.
Resumo:
While bullying is often researched in children and adolescents and in the workplace, there is limited research in the emerging adult population, especially in students at university. This is perhaps due to the fact that bullying generally declines as children and young people become older (e.g., Nansel et al., 2001; Wang, Iannotti, & Nansel, 2009). Although this may indeed be the case, it is apparent that bullying does not completely abate when students graduate from high school. The plethora of literature evidencing workplace bullying, clearly shows that bullying continues beyond the school years (e.g., Hoel, Cooper, & Faragher, 2001; Privitera & Campbell, 2009). With the advent of cyberbullying in the last decade it has been shown that this particular form of bullying may not decrease with age as does traditional bullying (Kowalski & Limber, 2007; Raskauskas & Stoltz, 2007). In addition, we know there is a spike in prevalence rates during the transition from primary to high school Pellegrini et al., 2010), so it is possible that new university students are at an increased risk of victimisation due to this being a transition period. This has led to some interest in examining the prevalence of bullying in the emerging adult population at universities (Chapell, Casey, & de la Cruz, 2004; Pontzer, 2010; Wensley & Campbell, 2009).
Resumo:
Prevention and management of childhood overweight and obesity is a health priority for governments and communities throughout the developed world. A conceptual model, Research around Practice in Childhood Obesity (RAPICO), has been developed to guide capacity building in a coordinated 'bench to fieldwork' initiative to address this public health problem. Translation of research findings into sustainable responses with optimal fit requires consideration of context-specific relevance, cost-effectiveness, feasibility and levels of available support. The RAPICO model uses program theory to describe a framework for progressing practitionercommunityresearch partnerships to address low, medium and high levels of risk for childhood overweight and obesity within community settings. A case study describing the development of a logic model to inform risk-linked responses to childhood overweight and obesity is presented for the Ipswich community in south-east Queensland.
Resumo:
Background The evidence base for the impact of social determinants of health has been strengthened considerably in the last decade. Increasingly, the public health field is using this as a foundation for arguments and actions to change government policies. The Health in All Policies (HiAP) approach, alongside recommendations from the 2010 Marmot Review into health inequalities in the UK (which we refer to as the ‘Fairness Agenda’), go beyond advocating for the redesign of individual policies, to shaping the government structures and processes that facilitate the implementation of these policies. In doing so, public health is drawing on recent trends in public policy towards ‘joined up government’, where greater integration is sought between government departments, agencies and actors outside of government. Methods In this paper we provide a meta-synthesis of the empirical public policy research into joined up government, drawing out characteristics associated with successful joined up initiatives. We use this thematic synthesis as a basis for comparing and contrasting emerging public health interventions concerned with joined-up action across government. Results We find that HiAP and the Fairness Agenda exhibit some of the characteristics associated with successful joined up initiatives, however they also utilise ‘change instruments’ that have been found to be ineffective. Moreover, we find that – like many joined up initiatives – there is room for improvement in the alignment between the goals of the interventions and their design. Conclusion Drawing on public policy studies, we recommend a number of strategies to increase the efficacy of current interventions. More broadly, we argue that up-stream interventions need to be ‘fit-for-purpose’, and cannot be easily replicated from one context to the next.
Resumo:
Project evaluation is a process of measuring costs, benefits, risks and uncertainties for the purpose of decision-making by estimating and assessing impacts of the project to the community. The effects of impacts of toll roads are similar but different from the general non-tolled roads. Project evaluation methodologies are extensively studied and applied to various transport infrastructure projects. However, there is no definitive methodology to evaluate toll roads. This review discusses the impacts of toll roads then reviews the limitations of existing project evaluation methodologies when evaluating toll road impacts. The review identified gaps of knowledge of toll evaluations. First, the treatment of toll in project evaluation, particularly in Cost-Benefit Analysis requires further study to explore the appropriate methodology. Secondly, the project evaluation methodology needs to place strong emphasis on empirically based risk and uncertainty assessment. Addressing the limitations of the existing project evaluation methodologies leads to improvements of the methodology in practical level as well as fills the gap of knowledge of project evaluation for toll roads with respect to net impacts to the community.