473 resultados para Personal Security.
Resumo:
Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.
Resumo:
Introduction. The Brisbane City Council holds a biannual Homeless Connect event which brings together business and community groups on one day to provide free services to people experiencing or at risk of homelessness. Pharmacists were involved in this initiative and provided health services in a multidisciplinary healthcare environment building on the lessons of previous Homeless Connect events (Chan et al, 2015) Aims. To explore pharmacists reflections on their role in a multidisciplinary healthcare team providing services at a community outreach event for those experiencing homelessness. Methods. The pharmacists (n=2) documented the types of services provided during the Homeless Connect event. A semi-structured interview was conducted post-event to investigate barriers, facilitators and changes that would be recommended for future events. Their perceptions of their role in the multidisciplinary healthcare team were also explored. Results. Primarily, the services provided included delivery of primary healthcare, advice on accessing cost effective pharmacy services and addressing medication enquiries. The pharmacists also provided moisturiser samples and health information leaflets. Interdisciplinary referrals were primarily between the pharmacists and podiatrists; no pharmacist-medical practitioner referrals occurred. The pharmacists did believe they had a positive role in this health initiative but improvements could be implemented to improve the delivery of these services in future events. Discussion. Pharmacists can play an important role in providing services to people experiencing or at risk of homelessness and the overall experience was positive for the pharmacists. They were able to integrate into a multidisciplinary healthcare team in this setting but strategies for further collaboration were identified. The possibility of involving pharmacy students in future events was identified.
Resumo:
Jock Young intellectually, politically, and personally touched the lives of many people. Thus, it is not surprising that his departure from this world on November 16, 2013 generated much shock, disbelief, and sadness. This article offers some personal and sociological reflections on Jock’s many contributions to critical criminology.
Resumo:
Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.
Resumo:
Exposure assessment studies conducted in developing countries have been based on fixed-site monitoring to date. This is a major deficiency, leading to errors in estimating the actual exposures, which are a function of time spent and pollutant concentrations in different microenvironments. This study quantified school children’s daily personal exposure to ultrafine particles (UFP) using real-time monitoring, as well as volatile organic compounds (VOCs) and NO2 using passive sampling in rural Bhutan in order to determine the factors driving the exposures. An activity diary was used to track children’s time activity patterns, and difference in mean exposure levels across sex and indoor/outdoor were investigated with ANOVA. 82 children, attending three primary schools participated in this study; S1 and S2 during the wet season and S3 during the dry season. Mean daily UFP exposure (cm-3) was 1.08 × 104 for children attending S1, 9.81 × 103 for S2, and 4.19 × 104 for S3. The mean daily NO2 exposure (µg m-3) was 4.27 for S1, 3.33 for S2 and 5.38 for S3 children. Likewise, children attending S3 also experienced higher daily exposure to a majority of the VOCs than those attending S1 and S2. Time-series of UFP personal exposures provided detailed information on identifying sources of these particles and quantifying their contributions to the total daily exposures for each microenvironment. The highest UFP exposure resulted from cooking/eating, contributing to 64% of the daily exposure, due to firewood combustion in houses using traditional mud cookstoves. The lowest UFP exposures were during the hours that children spent outdoors at school. The outcomes of this study highlight the significant contributions of lifestyle and socio-economic factors in personal exposures and have applications in environmental risk assessment and household air pollution mitigation in Bhutan.
Resumo:
The concept of food security is often anchored in popular understandings of the challenge to produce and supply enough food. However, decades of policies for intensive agriculture have not alleviated hunger and malnutrition, with an absence of food security featuring in both economically developing and developed nations. Despite perceptions that the economic growth in advanced, capitalist societies will ensure freedom from hunger, this is not universal across so-called ‘wealthy nations’. To explore the dynamics of food security in economically developed countries, this paper considers institutional approaches to domestic food security primarily through responses to poverty and welfare entitlements, and, secondarily, through food relief. Through the lens of social entitlements to food and their formation under various expressions of welfare capitalism, we highlight how the specific institutional settings of two economically developed nations, Australia and Norway, respond to uncertain or insufficient access to food. Whilst Norway's political agenda on agricultural support, food pricing regulation and universal social security support offers a robust, although indirect, safety net in ensuring entitlements to food, Australia's neoliberal trajectory means that approaches to food security are ad hoc and rely on a combination of self-help, charitable and market responses. Despite its extensive food production Australia appears less capable of ensuring food security for all its inhabitants compared to the highly import-dependent Norway.
Resumo:
In recent decades, the meaning and value of formal state citizenship has shifted dramatically. In the same period, scholarship on citizenship has drawn attention to the proliferation of alternative forms of sub-, supra- and transnational citizenship, at times obscuring the ongoing importance of formal state citizenship. For refugees, however, formal state citizenship remains a critical and widely shared goal. Drawing on interviews with 51 young people from refugee backgrounds in Melbourne, Australia, this article explores the intersecting themes of mobility and security that were identified by participants as the most important benefits of acquiring formal state citizenship in the country of resettlement. In contrast to the insecurity of forced migration, formal state citizenship provides a privileged mobility that enables refugee-background youth to maintain and create transnational identities and attachments and to be protected while doing so, while also granting a secure status within the nation state and insurance against further displacement in an uncertain future. In offering these forms of mobility and security, formal state citizenship contributes to a sense of ontological security among refugee-background youth, providing an important foundation for building national and transnational futures.
Resumo:
The aim of this research was to identify the role of brand reputation in encouraging consumer willingness to provide personal data online, for the benefits of personalisation. This study extends on Malhotra, Kim and Agarwal’s (2004) Internet Users Information Privacy Concerns Model, and uses the theoretical underpinning of Social Contract Theory to assess how brand reputation moderates the relationship between trusting beliefs and perceived value (Privacy Calculus framework) with willingness to give personal information. The research is highly relevant as most privacy research undertaken to date focuses on consumer related concerns. Very little research exists examining the role of brand reputation and online privacy. Practical implications of this research include gaining knowledge as to how to minimise online privacy concerns; improve brand reputation; and provide insight on how to reduce consumer resistance to the collection of personal information and encourage consumer opt-in.
Resumo:
Business scholars have recently proposed that the virtue of personal wisdom may predict leadership behaviors and the quality of leader–follower relationships. This study investigated relationships among leaders’ personal wisdom—defined as the integration of advanced cognitive, reflective, and affective personality characteristics (Ardelt, Hum Dev 47:257–285, 2004)—transformational leadership behaviors, and leader–member exchange (LMX) quality. It was hypothesized that leaders’ personal wisdom positively predicts LMX quality and that intellectual stimulation and individualized consideration, two dimensions of transformational leadership, mediate this relationship. Data came from 75 religious leaders and 1–3 employees of each leader (N = 158). Results showed that leaders’ personal wisdom had a positive indirect effect on follower ratings of LMX quality through individualized consideration, even after controlling for Big Five personality traits, emotional intelligence, and narcissism. In contrast, intellectual stimulation and the other two dimensions of transformational leadership (idealized influence and inspirational motivation) did not mediate the positive relationship between leaders’ personal wisdom and LMX quality. Implications for future research on personal wisdom and leadership are discussed, and some tentative suggestions for leadership development are outlined.
Resumo:
Capturing data from various data repositories and integrating them for productivity improvements is common in modern business organisations. With the well-accepted concept of achieving positive gains through investment in employee health and wellness, organisations have started to capture both employee health and non-health data as Employer Sponsored electronic Personal Health Records (ESPHRs). However, non-health related data in ESPHRs has hardly been taken into consideration with outcomes such as employee productivity potentially being suited for further validation and stimulation of ESPHR usage. Here we analyse selected employee demographic information (age, gender, marital status, and job grade) and health-related outcomes (absenteeism and presenteeism) of employees for evidence-based decision making. Our study considered demographic and health-related outcomes of 700 employees. Surprisingly, the analysis shows that employees with high sick leave rates are also high performers. A factor analysis shows 92% of the variance in the data can be explained by three factors, with the job grade capable of explaining 62% of the variance. Work responsibilities may drive employees to maintain high work performance despite signs of sickness, so ESPHRs should focus attention on high performers. This finding suggests new ways of extracting value from ESPHRs to support organisational health and wellness management to help assure sustainability in organisational productivity.
Resumo:
This paper outlines the development of a reflective process through which student feelings are brought to the surface to advance their learning outcomes. A key notion in relation to the capacity of student development is the ability of students to alter their collective habits of thought and in turn the nature of the learning environment. The paper examines student reflection in the context of students' heightened awareness of self and their potential influence on their environment. The notion of 'surfacing feelings' is used to describe the outcome of individual and group reflection through which several parties become aware of the active reflections of individual students, thereby increasing the potential depth of overall reflection. Finally, the author considers the transferability of the ideas discussed to other educational contexts.
Resumo:
This special edition of the International Journal of Critical Indigenous Studies focuses upon the work scholars within the growing discipline of Aboriginal and Torres Strait Islander health studies. The lamentable state of Indigenous health in Australia is reflected in Indigenous populations elsewhere, especially where settler colonialism has left an indelible mark. This special edition therefore speaks to where Indigenous health outcomes and the efficacy of remedies are causing concern. Common to all is the demand that Indigenous people are placed front and centre of all attempts to improve health outcomes and that improvements are sought in culturally sensitive ways. Terry Dunbar presents findings from a research study that set out to investigate the Indigenous experiences of health and family services in the Northern Territory, Australia. The study asserts that cultural security is an integral and vital element of any policy that will impact upon Indigenous peoples. Dunbar concludes by arguing that in seeking positive change with regard to cultural security or otherwise, the most vociferous champions of that change are likely to be the Aboriginal communities affected. The article by Bronwyn Fredericks, Karen Adams, Sandra Angus and Melissa Walker also highlights the need to involve Aboriginal and Torres Strait Islander people, in this case women, in the design and development of strategies affecting their lives. Utilising routine communication methods such the ‘talking circle’ and the process referred to as ‘talkin’ up’, where women ‘talk back’ to one another about issues of personal importance, the article argues that the health strategy which emerged through these consultation approaches was more accurately informed by and responsive to women’s health need. Indeed, the resulting strategy reflected the women’s sense of themselves and the clear direction they felt their health services and polices should take.
Resumo:
While much has been written about the relationship between personal epistemologies and learning-teaching approaches, outcomes, and intentions, little has focused specifically on these relationships in the context of teacher education. This chapter addresses changes in preservice teachers’ personal epistemologies by overviewing this emerging body of research and arguing for a new approach to conceptualizing and supporting changes in personal epistemologies based on reflexivity. The overview includes definitions of key concepts and research traditions that have been used since the 1970s and a discussion of the emerging role of epistemic justification as a key mechanism of change in the process of belief development.
Resumo:
In this paper I conduct a Foucauldian discourse analysis of a political speech given by Brendon Nelson in 2006 when the Australian Minister for Defence in the Howard Coalition Government. The speech connects conceptualisations of terror, globalization, education and literacy as part of a whole of government security strategy. The analysis examines this speech as an example of a liberal way of governing the conduct of diverse and unpredictable populations. My analysis suggests that the apparatus of government has been strategically used in order to biopolitically contain the rise of complex social forces and protect a set of homogenous cultural values. The purposes of education and uses of literacy are seen as instruments for the inscription of a coded set of values understood to be synonymous with civil society.
Resumo:
Technologies that facilitate the collection and sharing of personal information can feed people's desire for enhanced self-knowledge and help them to change their behaviour, yet for various reasons people can also be reluctant to use such technologies. This paper explores this tension through an interview study in the context of smoking cessation. Our findings show that smokers and recent ex-smokers were ambivalent about their behaviour change as well as about collecting personal information through technology and sharing it with other users. We close with a summary of three challenges emerging from such ambivalence and directions to address them.