724 resultados para Security, usability, digital signature


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whilst the dynamics informing processes have taken time to become clear, civic resistance initiated by young people using new media began in Egypt in 2010 against the Mubarak regime, soon widened to Tunisia, Yemen and Libya. Known as the 'Arab Spring', this phenomenon re-ignited discussion about the political role of digital space and its democratic potential. While parallels between authoritarian regimes and universities and educational institutions might seem overdrawn to some readers, I suggest there is value in considering the 'Digital Spring' (apropos the 'Arab Spring') as a metaphor to suggest the possibility that similar processes are taking place in schools and universities. This invites discussion about the political significance of digital space and its democratic potential in those institutions. To assess how some young people engage in digitally mediated politics within schools and universities, I identify five propositions which amalgamate descriptive and normative elements derived from Habermas and Dahlgren. These propositions offer an ideal taxonomy of normative and descriptive elements to establish whether digital technology promotes participation and debate in ways that sustain democratic practice.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article establishes whether there is a case for revising traditional accounts of politics and the public sphere given the ways in which digital technology is now being used in Western and non-Western settings to engage people politically. The article presents a case for framing this inquiry in terms of imaginaries. It then argues for a new political imaginary which helps to specify what is required for deliberative democratic practice in a way that shifts us away from the dominant liberal-utilitarian political imaginary that currently informs the political value systems of most Western nations. Drawing on the work of key political theorists such as Habermas and Dahlgren, five propositions or conditions for deliberative practice are identified that can be used in empirical investigation to help determine the democratic capacity and potential of new political communication and civic spaces being opened by means of digital media.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Children's Literature Digital Resources is a full text digital repository of Australian children’s literature from 1830 to 1945. Users can read online the complete texts of a selection of early Australian children’s literature, both popular and rare. Digitised items include children’s and young adult fiction, poetry, short stories, and picture books. Users can also read related full text critical articles that were digitised as part of the project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital Storytelling is a powerful means for enabling communication and social participation. Ordinary people work with expert creative practitioners to create first person narratives for a wide and growing range of purposes, including community building, cultural engagement, brand identification and public communication. A digital story usually combines 15-30 still images and a recorded script of 100-250 words to create an original personal digital story in the form of a 2-3 minute digital video. This form of co-creative media takes advantage of newly accessible technologies but is based in the ancient and universal tradition of storytelling. Digital storytelling is being adopted internationally in a variety of institutional contexts. It was introduced at QUT by Distinguished Professor John Hartley in 2004 when he brought well known UK based digital storytelling expert Daniel Meadows to the Creative Industries Faculty to trainer researchers and Faculty in the technique. Since 2005 Creative Industries Faculty researchers have adapted digital storytelling for use in a variety of research contexts including heritage, youth welfare, health, and international development, in collaboration with a range of external partner organisations. More than 300 digital stories have been produced by QUT researchers, staff and students. These have been presented on the World Wide Web, broadcast on community media, released on DVD and exhibited in various forms. In addition CIF researchers have produced numerous journal articles, conference papers and books reporting the outcomes of research projects utilising digital storytelling in research. As a result of research activity the Creative Industries Faculty is now well positioned as a leading site for teaching and learning in digital storytelling. Faculty research activity in digital storytelling has generated interest in adapting the form for use in undergraduate and postgraduate Creative Industries curriculum and in service teaching, including short courses for external clients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the 2000s, teachers in an increasing number of Australian schools have been learning how to support students with refugee backgrounds. For some of these students, entry into the Australian school system is not easy. English literacy is integral to some of the challenges confronting the students. In response, educators have been developing and researching ways of engaging with the students’ language and literacy learning. Much of the focus has been on traditional print-based school literacies. In contrast, I look here at student engagement in digital literacies in an after-school media club. Several concepts from the theory of French sociologist, Pierre Bourdieu are useful for understanding the position of students of refugee background in the Australian school system. Like other conflict theories, Bourdieusian theory has sometimes been criticised as ‘pessimistic’, that is, for suggesting that schools necessarily reproduce social disadvantage. However, others have used Bourdieusian theory to analyse and critique the reproductive work of schooling for groups of students who experience educational disadvantage. I align myself with this latter tradition. Specifically, I use Bourdieu’s triad of concepts to explain aspects of the literacy education experiences of some young people of refugee background: field, capital and habitus. In particular, I look at questions of the legitimation of students’ competences as capital in literate fields within and beyond the school context. Data are drawn from an Australian Research Council-funded project, Digital Learning and Print Literacy: A design experiment for the reform of low socio-economic, culturally diverse schools (2009-14). The data analysed in this chapter include interviews and observations relating to the participation of two Congolese girls in an after school media club. Implications are drawn for teachers of literacy in culturally and linguistically diverse contexts. Consideration is made of early childhood, primary and secondary settings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the Internet becomes deeply embedded into consumers’ daily life, the digital virtual world brings significant influence to consumers’ self and narrative. Prior studies look at consumer self from either from a certain online space or comparing consumers’ physical and digital virtual selves but not the integration of the physical/digital world. This paper aims to explore the meanings of the digital virtual space on consumers’ narrative as a whole (their interests, dreams, or subjectivity). We utilise a postmodern concept of the cyborg to understand the cultural complexity, subjective meanings of, and the extent to which the digital virtual space plays a role in consumers’ self-narrative. We conducted in-depth interviews and gathered three consumer narratives. Our findings indicate that consumers’ narrative contains important fragments from both physical and digital virtual worlds and their physical and digital virtual selves form a feedback loop that strengthen their overall narrative.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST’s SHA3 competition. First we improve Aumasson and Phans’ integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16.5 rounds. Next we improve the designers’ meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Finally, we comment on possible methods to obtain free-start distinguishers and free-start collisions for Fugue-256.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as birthday and dictionary attacks on the hash values of passwords to find passwords, it is usually recommended to apply hash function to the combination of both the salt and password, denoted salt||password, to prevent these attacks. In this paper, we present the first security analysis of salt||password hashing application. We show that when hash functions based on the compression functions with easily found fixed points are used to compute the salt||password hashes, these hashes are susceptible to precomputed offline birthday attacks. For example, this attack is applicable to the salt||password hashes computed using the standard hash functions such as MD5, SHA-1, SHA-256 and SHA-512 that are based on the popular Davies-Meyer compression function. This attack exposes a subtle property of this application that although the provision of salt prevents an attacker from finding passwords, salts prefixed to the passwords do not prevent an attacker from doing a precomputed birthday attack to forge an unknown password. In this forgery attack, we demonstrate the possibility of building multiple passwords for an unknown password for the same hash value and salt. Interestingly, password||salt (i.e. salts suffixed to the passwords) hashes computed using Davies-Meyer hash functions are not susceptible to this attack, showing the first security gap between the prefix-salt and suffix-salt methods of hashing passwords.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter we present data drawn from observations of kindergarten children using iPads and talk with the children, their parents/guardians and teachers. We identify a continuum of practices that extends from ‘educational apps’ teaching handwriting, sight words and so forth to uses of the iPad as a device for multimodal literacy development and substantive conversation around children’s creative work. At the current time high stakes testing and the implementation of the Australian Curriculum are prompting new public and professional conversations about literacy and digital technology. The iPad is construed as both cause of and solution to problems of traditional literacy education. In this context we describe the literacies enabled by educational software available on iPads. We higlight the time constraints which bore on teachers' capacity to enact their visions of literacy education through the iPad platform and suggest ways of reflecting on responses to this constraint.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the development of a playful digital experience, Anim-action, designed for young children with developmental disabilities. This experience was built using the Stomp platform, a technology designed specifically to meet the needs of people with intellectual disability through facilitating whole body interaction. We provide detail on how knowledge gained from key stakeholders informed the design of the application and describe the design guidelines used in the development process. A study involving 13 young children with developmental disabilities was conducted to evaluate the extent to which Anim-action facilitates cognitive, social and physical activity. Results demonstrated that Anim-action effectively supports cognitive and physical activity. In particular, it promoted autonomy and encouraged problem solving and motor planning. Conversely, there were limitations in the system’s ability to support social interaction, in particular, cooperation. Results have been analyzed to determine how design guidelines might be refined to address these limitations.