64 resultados para Conference on Security and Cooperation in Europe (1972-1975 : Helsinki, Finland)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Governments around the world are increasingly investing in information and communications technology (ICT) as a means of improving service delivery to citizens. Government ICT adoption is also being driven by a desire to streamline information accessibility and information flows within government - both between different levels of government and between different departments at the same level. Increasing the availability of information internally and to citizens has clear and compelling benefits but it also carries risks that must be carefully managed. This talk will examine the implications of such E-government initiatives for a range of compliance obligations, with a focus on information privacy. It will review recent developments in the area of systems-based enforcement of privacy policies and the particular privacy challenges presented by the aggregation of geospatial information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Role play approaches have been used in online environments in an effort to create a mix of contested ideas and to promote participant engagement. While it is recognised that there is an aspect of ‘fun’ associated with role play there is a need to understand role assignment more rigorously than simply levels of reported participation and enjoyment. It is the contention of this paper that individuals are unlikely to be able to authentically play a role and, that in fact, there may be little purpose to contrived roles. Additionally, the literature has widely reported that personality factors, such as introversion and extroversion continue to be of significance in the way that individuals contribute in online contexts. The findings in the study reported in this paper confirm that introversion and extroversion do, indeed, play a role in the way individuals contribute in online environments. Thus, this paper argues that an active consideration needs to be given to individuals preferred (or natural) way of working even where use is made of online role play.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Organizations seeking improvements in their performance are increasingly exploring alternative models and approaches for providing support services; one such approach being Shared Services. Because of the possible consequential impact of Shared Services on organizations, and given that information systems (IS) is both an enabler of Shared Services (for other functional areas) as well as a promising area for Shared Services application, Shared Services is an important area for research in the IS field. Though Shared Services has been extensively adopted on the promise of economies of scale and scope, factors of Shared Services success (or failure) have received little research attention. This paper reports the distillation of success and failure factors of Shared Services from an IS perspective. Employing NVIVO and content analysis of 158 selected articles, 9 key success factors and 5 failure factors are identified, suggesting important implications for practice and further research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter discusses design thinking and design as a process which spans all spheres of everyday life.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistringuishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the receipient in the private domain. "Non-trivial filtering" can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicaly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The promotion of educational equity and improvement of educational quality in China are contextualised in tenets of Confucianism and policy directives, inspiring educational research and practice. In this paper, we first explore the historical and cultural roots of educational equity and quality through Confucianism and elaborate on the current policy priority that aims to address educational equity and quality. We then present an overview of research on equity and quality in Chinese education. Informed by Confucianism, policy, and research, we pose a framework to structure our investigation and analysis of three illustrative examples, namely the Special Post Teacher Plan, amalgamation of rural schools, and schooling of floating children. Drawing insights from Confucianism, policy, research, and practice, we conclude that the promotion of educational equity through high quality provision of education for disadvantaged groups can help to narrow the gap in educational quality currently existing in China.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

FTIR spectra are reported of methanol adsorbed at 295 K on ZnO/SiO 2, on reduced Cu/ZnO/SiO2 and on Cu/ZnO/SiO2 which had been preoxidised by exposure to nitrous oxide. Methanol on ZnO/SiO2 gave methoxy species on ZnO and SiO, in addition to both strongly and weakly physisorbed methanol on SiO2. The corresponding adsorption of methanol on reduced Cu/ZnO/SiO2 also gave methoxy species on Cu and a small amount of bridging formate. Reaction of methanol with a reoxidised Cu/ZnO/SiO2 catalyst resulted in an enhanced quantity of methoxy species on Cu. Heating adsorbed species on Cu/ZnO/SiO2 at 393 K led to the loss of methoxy groups on Cu and the concomitant formation of formate species on both ZnO and Cu. The comparable reaction on a reoxidised Cu/ZnO/SiO2 catalyst gave an increased amount of formate species on ZnO and this correlated with an increased quantity of methoxy groups lost from Cu. An explanation is given in terms of adsorption of formate and formaldehyde species at special sites located at the copper/zinc oxide interface.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Quantum Probability Ranking Principle (QPRP) has been recently proposed, and accounts for interdependent document relevance when ranking. However, to be instantiated, the QPRP requires a method to approximate the interference" between two documents. In this poster, we empirically evaluate a number of different methods of approximation on two TREC test collections for subtopic retrieval. It is shown that these approximations can lead to significantly better retrieval performance over the state of the art.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study documents and theorises the consequences of the 2003 Australian Government Reform Package focussed on learning and teaching in Higher Education during the period 2002 to 2008. This is achieved through the perspective of program evaluation and the methodology of illuminative evaluation. The findings suggest that the three national initiatives of that time, Learning and Teaching Performance Fund (LTPF), Australian Learning and Teaching Council (ALTC), and Australian Universities Quality Agency (AUQA), were successful in repositioning learning and teaching as a core activity in universities. However, there were unintended consequences brought about by international policy borrowing, when the short-lived nature of LTPF suggests a legacy of quality compliance rather than one of quality enrichment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Giving and Volunteering in Australia: literature review summarises the findings of a comprehensive literature search that identifies relevant research on giving and volunteering in Australia. The report comments on the strengths and weaknesses of the methods used and the lessons that can be learned for the development of a future research agenda. The report arranges the findings in separate sections under the headings government sources, industry sources, university/peer-reviewed sources and international comparative sources. We learned that in the last 25 years there has been a growing body of knowledge about the dimensions of giving and volunteering in Australia, but much of the available data is not easily comparable or collected at regular intervals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Any government deciding to invoke widespread change in its higher education sector through implementation of new policies impacts on every institution and all staff and students, often in both the time taken up and the heightened emotions caused. The central phenomenon that this study addresses is the process and consequences of policy changes in higher education in Australia. The aim of this article is to record the research design through the perspective (evaluation research), theoretical framework (program evaluation) and methods (content analysis, descriptive statistical analysis and bibliometric analysis) applied to the investigation of the 2003 federal government higher education reform package. This approach allows both the intended and unintended consequences arising from the policy implementation of three national initiatives focused on learning and teaching in higher education in Australia to surface. As a result, this program evaluation, also known in some disciplines as policy implementation analysis, will demonstrate the applicability of illuminative evaluation as a methodology and reinforce how program evaluation will assist and advise future government reform and policy implementation, and will serve as a legacy for future evaluative research.Any government deciding to invoke widespread change in its higher education sector through implementation of new policies impacts on every institution and all staff and students, often in both the time taken up and the heightened emotions caused. The central phenomenon that this study addresses is the process and consequences of policy changes in higher education in Australia. The aim of this article is to record the research design through the perspective (evaluation research), theoretical framework (program evaluation) and methods (content analysis, descriptive statistical analysis and bibliometric analysis) applied to the investigation of the 2003 federal government higher education reform package. This approach allows both the intended and unintended consequences arising from the policy implementation of three national initiatives focused on learning and teaching in higher education in Australia to surface. As a result, this program evaluation, also known in some disciplines as policy implementation analysis, will demonstrate the applicability of illuminative evaluation as a methodology and reinforce how program evaluation will assist and advise future government reform and policy implementation, and will serve as a legacy for future evaluative research.