250 resultados para secret shopping


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rivers and water are valuable natural resources for human life, environment and national development. Recognition of water resources as national heritage will contribute towards more long term sustainable property development. Waterfront development is already a well-established phenomenon internationally. In Malaysia, as the economy began to change in 1980s, so did the land uses along many of the river and waterfront locations. The pressures of new technology coupled with an urban population growth and urbanization began to force a transition from water dependent industry to a variety of non-water dependent developments such as apartments, offices, and retail shopping areas. Residential waterfront development has taken advantage of available land and water amenities and incorporated as a feature or “selling point” of the development. It has been found that wide views of water add an average of 59% to the value of waterfront property, as well as providing attractive landscaping and better property neighborhoods respectively. Development of waterfront lands in Malaysia occurred with limited federal, state, or municipal planning guidance; resulting in cost aspects like flooding and pollution. Although some waterfront development projects continue to remain profitable with a maintained successful public access component, many have not. This paper provides a brief introduction to the research project to address this issue, which is currently on-going.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Orissa state, India, the DakNet system supports asynchronous Internet communication between an urban hub and rural nodes. DakNet is noteworthy in many respects, not least in how the system leverages existing transport infrastructure. Wi-Fi transceivers mounted on local buses send and receive user data from roadside kiosks, for later transfer to/from the Internet via wireless protocols. This store-and-forward system allows DakNet to offer asynchronous communication capacity to rural users at low cost. The original ambition of the DakNet system was to provide email and SMS facilities to rural communities. Our 2008 study of the communicative ecology surrounding the DakNet system revealed that this ambition has now evolved – in response to market demand – to the extent that e-shopping (rather than email) has become the primary driver behind the DakNet offer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thousands of Australian children are sexually abused every year, and the effects can be severe and long lasting. Not only is child sexual abuse a public health problem, but the acts inflicted are criminal offences. Child sexual abuse usually occurs in private, typically involving relationships featuring a massive imbalance in power and an abuse of that power. Those who inflict child sexual abuse seek to keep it secret, whether by threats or more subtle persuasion. As a method of responding to this phenomenon and in an effort to uncover cases of sexual abuse that otherwise would not come to light, governments in Australian States and Territories have enacted legislation requiring designated persons to report suspected child sexual abuse. With Western Australia’s new legislation having commenced on 1 January 2009, every Australian State and Territory government has now passed these laws, so that there is now, for the first time, an almost harmonious legislative approach across Australia to the reporting of child sexual abuse. Yet there remain differences in the State and Territory laws regarding who has to make reports, which cases of sexual abuse are required to be reported, and whether suspected future abuse must be reported. These differences indicate that further refinement of the laws is required

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract With the phenomenal growth of electronic data and information, there are many demands for the development of efficient and effective systems (tools) to perform the issue of data mining tasks on multidimensional databases. Association rules describe associations between items in the same transactions (intra) or in different transactions (inter). Association mining attempts to find interesting or useful association rules in databases: this is the crucial issue for the application of data mining in the real world. Association mining can be used in many application areas, such as the discovery of associations between customers’ locations and shopping behaviours in market basket analysis. Association mining includes two phases. The first phase, called pattern mining, is the discovery of frequent patterns. The second phase, called rule generation, is the discovery of interesting and useful association rules in the discovered patterns. The first phase, however, often takes a long time to find all frequent patterns; these also include much noise. The second phase is also a time consuming activity that can generate many redundant rules. To improve the quality of association mining in databases, this thesis provides an alternative technique, granule-based association mining, for knowledge discovery in databases, where a granule refers to a predicate that describes common features of a group of transactions. The new technique first transfers transaction databases into basic decision tables, then uses multi-tier structures to integrate pattern mining and rule generation in one phase for both intra and inter transaction association rule mining. To evaluate the proposed new technique, this research defines the concept of meaningless rules by considering the co-relations between data-dimensions for intratransaction-association rule mining. It also uses precision to evaluate the effectiveness of intertransaction association rules. The experimental results show that the proposed technique is promising.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We introduce multiple-control fuzzy vaults allowing generalised threshold, compartmented and multilevel access structure. The presented schemes enable many useful applications employing multiple users and/or multiple locking sets. Introducing the original single control fuzzy vault of Juels and Sudan we identify several similarities and differences between their vault and secret sharing schemes which influence how best to obtain working generalisations. We design multiple-control fuzzy vaults suggesting applications using biometric credentials as locking and unlocking values. Furthermore we assess the security of our obtained generalisations for insider/ outsider attacks and examine the access-complexity for legitimate vault owners.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"Know How" protection varies enormously from country to country and is a complex equation of legal, political, cultural and economic factors. A contrast between Japan and Australia serves to highlight some of these factors. For the purposes of this article, a working definition of "know how" is required. In Australia and other common law systems, no statutory definition of "know how" exists, "confidential information" proving the closest comparative term in Australia ('trade secret law' in the United States).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project is the result of a collaborative design process involving QUT School of Design, and AREN Consulting and ZIAD (Zheijiang Provincial Institute of Architectural Design and Research). This major urban initiative explores new standards for multi-function urban centres. The sophisticated integration of transit interchange with retail, commercial and residential functions provides a dramatic mix of social activities. The large site is formed into a raised and terraced urban garden, with the transit centre and retail shopping precinct housed below this landscaped roof. Towering above this ‘hill’ are five building blocks housing the commercial and residential accommodations. These environmentally low-impact buildings are topped with a high-tech greenhouse roof or photovoltaic cells.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For most of the 20th Century a ‘closed’ system of adoption was practised throughout Australia and other modern Western societies. This ‘closed’ system was characterised by sealed records; amended birth certificates to conceal the adoption, and prohibited contact with all biological family. Despite claims that these measures protected these children from the taint of illegitimacy the central motivations were far more complex, involving a desire to protect couples from the stigma of infertility and to provide a socially acceptable family structure (Triseliotis, Feast, & Kyle, 2005; Marshall & McDonald, 2001). From the 1960s significant evidence began to emerge that many adopted children and adults were experiencing higher incidences of psychological difficulties, characterised by problems with psychological adjustment, building self-esteem and forming a secure personal identity. These difficulties became grouped under the term ‘genealogical bewilderment’. As a result, new policies and practices were introduced to try to place the best interests of the child at the forefront. These changes reflected new understandings of adoption; as not only an individual process but also as a social and relational process that continues throughout life. Secrecy and the withholding of birth information are now prohibited in the overwhelming majority of all domestic adoptions processed in Australia (Marshall & McDonald, 2001). One little known consequence of this ‘closed’ system of adoption was the significant number of children who were never told of their adoptive status. As a consequence, some have discovered or had this information disclosed to them, as adults. The first study that looked at the late discovery of genetic origins experiences was conducted by the Post Adoption Resource Centre in New South Wales in 1999. This report found that the participants in their study expressed feelings of disbelief, confusion, anger, sorrow and loss. Further, the majority of participants continued to struggle with issues arising from this intentional concealment of their genetic origins (Perl & Markham, 1999). A second and more recent study (Passmore, Feeney & Foulstone, 2007) looked at the issue of secrecy in adoptive families as part of a broader study of 144 adult adoptees. This study found that secrecy and/or lies or misinformation on the part of adoptive parents had negative effects on both personal identity and relationships with others. The authors noted that those adoptees who found out about their adoption as adults were ‘especially likely to feel a sense of betrayal’ (p.4). Over recent years, stories of secrecy and late discovery have also started to emerge from sperm donor conceived adults (Spencer, 2007; Turner & Coyle, 2000). Current research evidence shows that although a majority of couples during the donor assisted conception process indicate that they intend to tell the offspring about their origins, as many as two-thirds or more of couples continue to withhold this information from their children (Akker, 2006; Gottlieb, A. McWhinnie, 2001; Salter-Ling, Hunter, & Glover, 2001). Why do they keep this secret? Infertility involves a range of complex factors that are often left unresolved or poorly understood by those choosing insemination by donor as a form of family building (Schaffer, J. A., & Diamond, R., 1993). These factors may only impact after the child is born, when resemblance talk becomes most pronounced. Resemblance talk is an accepted form of public discourse and a social convention that legitimises the child as part of the family and is part of the process of constructing the child’s identity within the family. Couples tend to become focused on resemblance as this is where they feel most vulnerable, and the lack of resemblance to the parenting father may trigger his sense of loss (Becker, Butler, & Nachtigall, 2005).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using a feminist reflexive approach this paper reports on interviews with single mother’s in the Brisbane area about their experiences with food shopping and household food security. Preliminary findings suggest that most experience significant stress around the amount of money they have available for food. As the price of food and other costs of living increase, the only budget item that is flexible – groceries - is squeezed tighter. All women expressed a reluctance to ask for help from strangers at agencies instead relying on the support of family and friends to keep them food secure. Sometimes family and friends had no spare resources to help or were not aware of the extent their friend or relative might be struggling. The increased risks of poverty and food insecurity mean many go without as feeding the children takes precedence. The quality of their diets is variable with many reporting on aiming for quantity rather than being concerned with nutritional balance. Exhaustion and stress from being over-committed doing three roles, mother, father and housekeeper was self-identified as a key factor leading to mental health conditions such as depression, burnout and break down. Female single parent households are vulnerable to reducing welfare benefits as children grow or child support changes. Current policy forces single parents out to work but many can only manage part-time work for lower wages and are barely able to cope with this extra burden often resenting the reduction in benefits it brings. Public perceptions, derision and the notions of choice surrounding single parenting leave the cohort divided and silent for fear of reprisals. In my investigation issues arise about welfare policy that keep benefits low and workplace patriarchal power that can contribute to systemic poverty and the widening of the gender gap in poverty. So far analysis suggests a better support system around community food security including some hands on home help services, nutritional information, cooking classes, community gardening and other social capital building activities are needed for these women in order to avoid long-term health problems and help them better care for the next generation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An important trend in Chilean retailing industry is the increase in channel blurring. This investigation attempts to identify the relevant store attributes for different retail formats (grocery, department store, drug store, and home improvement). Do consumer store attribute saliency vary for different retail formats? Interviews identified twelve salient store attributes for the different retail formats. Survey results showed differences in store attribute saliencies for consumers when shopping at different formats. Seven of the twelve variables showed significant differences across formats. However, two attributes were relatively important for all four retail formats: product quality and responsiveness of employees.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is a need in industry for a commodity polyethylene film with controllable degradation properties that will degrade in an environmentally neutral way, for applications such as shopping bags and packaging film. Additives such as starch have been shown to accelerate the degradation of plastic films, however control of degradation is required so that the film will retain its mechanical properties during storage and use, and then degrade when no longer required. By the addition of a photocatalyst it is hoped that polymer film will breakdown with exposure to sunlight. Furthermore, it is desired that the polymer film will degrade in the dark, after a short initial exposure to sunlight. Research has been undertaken into the photo- and thermo-oxidative degradation processes of 25 ìm thick LLDPE (linear low density polyethylene) film containing titania from different manufacturers. Films were aged in a suntest or in an oven at 50 °C, and the oxidation product formation was followed using IR spectroscopy. Degussa P25, Kronos 1002, and various organic-modified and doped titanias of the types Satchleben Hombitan and Hunstsman Tioxide incorporated into LLDPE films were assessed for photoactivity. Degussa P25 was found to be the most photoactive with UVA and UVC exposure. Surface modification of titania was found to reduce photoactivity. Crystal phase is thought to be among the most important factors when assessing the photoactivity of titania as a photocatalyst for degradation. Pre-irradiation with UVA or UVC for 24 hours of the film containing 3% Degussa P25 titania prior to aging in an oven resulted in embrittlement in ca. 200 days. The multivariate data analysis technique PCA (principal component analysis) was used as an exploratory tool to investigate the IR spectral data. Oxidation products formed in similar relative concentrations across all samples, confirming that titania was catalysing the oxidation of the LLDPE film without changing the oxidation pathway. PCA was also employed to compare rates of degradation in different films. PCA enabled the discovery of water vapour trapped inside cavities formed by oxidation by titania particles. Imaging ATR/FTIR spectroscopy with high lateral resolution was used in a novel experiment to examine the heterogeneous nature of oxidation of a model polymer compound caused by the presence of titania particles. A model polymer containing Degussa P25 titania was solvent cast onto the internal reflection element of the imaging ATR/FTIR and the oxidation under UVC was examined over time. Sensitisation of 5 ìm domains by titania resulted in areas of relatively high oxidation product concentration. The suitability of transmission IR with a synchrotron light source to the study of polymer film oxidation was assessed as the Australian Synchrotron in Melbourne, Australia. Challenges such as interference fringes and poor signal-to-noise ratio need to be addressed before this can become a routine technique.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A common scenario in many pairing-based cryptographic protocols is that one argument in the pairing is fixed as a long term secret key or a constant parameter in the system. In these situations, the runtime of Miller's algorithm can be significantly reduced by storing precomputed values that depend on the fixed argument, prior to the input or existence of the second argument. In light of recent developments in pairing computation, we show that the computation of the Miller loop can be sped up by up to 37 if precomputation is employed, with our method being up to 19.5 faster than the previous precomputation techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding perception of wellness in older adults is a question to be understood against the backdrop of concerns about whether global ageing and the ‘bulge’ of ageing baby boomers will increase health care cost beyond what modern economies can deal with. Older adults who age in a healthy way and who take responsibility for their own health offer a positive alternative and change the perception that older adults are a burden on their society’s health system. The concept of successful ageing introduced by Rowe and Kahn (1987; 1997) suggested that older adults age successfully if they avoid disease and disability, maintain high cognitive and physical functioning and remain actively engaged with life. This concept, however, did not reflect older adults’ own perceptions of what constitutes successful ageing or how perceptions of wellness or health-related quality of life influenced the older adult’s understanding of his or her own health and ageing. A research project was designed to examine older adults’ perceptions of wellness in order to gain an understanding of the factors that influence perception of their own wellness. Specifically, the research wanted to explore two aspects: whether belonging to a unique organisation, in this instance a Returned Services Club, influenced perceptions of wellness; and whether there are significant gender differences for the perception of wellness. A mixed method project with two consecutive studies was designed to answer these questions: a quantitative survey of members of a Returned Services Club and of the surrounding community in Queensland, Australia, and a qualitative study conducting focus groups to explore findings of the survey. The results of the survey were used to determine the composition of the focus groups. The participants for the first study, (N=257), community living adults 65 years and older, were chosen from the membership role of a Returned Services Club or recruited by personal approach from the community surrounding the Services Club. Participants completed a survey that consisted of a perception of wellness instrument, a health-related quality of life instrument, and questions on morbidities, modifiable life style factors and demographics. Data analysis found that a number of individual factors influenced perception of wellness and health-related quality of life. Positive influences were independent mobility, exercise and gambling at non-hazardous levels, and negative influences were hearing loss, memory problems, chronic disease and being single. Membership of the Services Club did not contribute to perception of wellness beyond being a member of a social group. While there may have been an expectation that members of an organisation that is traditionally associated with high alcohol use and problematic gambling may have lower perceptions of wellness, this study suggested that the negative influences may have been counteracted by the positive effects of social interaction, thus having neither negative nor positive influences on perception of wellness. There were significant differences in perception of wellness and in health-related quality of life for women and men. The most significant difference was for women aged 85-90 who had significantly lower scores for perception of wellness than men or than any other age group. This result was the impetus for conducting focus groups with adults aged 85-90 years of age. Focus groups were conducted with 24 women and four men aged 85-90 to explore the survey findings for this age group. Results from the focus groups indicated that for older adults perception of wellness was a multidimensional construct of more complexity than indicated by the survey instrument. Elite older women (women over 85 years of age) related their perception of wellness to their ability to do what they wanted to do, and what they wanted to do significantly more than anything else, was to stay connected to family, friends and the community to which they belonged. From the focus group results it appeared that elite older women identified with the three elements of successful ageing – low incidence of disability and disease, high physical and cognitive functioning, and active engagement with life – but not in a flat structure. It appears that for elite older women good physical and mental health function to enable social connectedness. It is the elements of health that impact on the ability to do what they wanted to do that were identified as key factors: independent mobility, hearing and memory - factors that impact on the ability to interact socially. These elements were only identified when they impacted on the person’s ability to do what they wanted to do, for example mobility problems that were managed were not considered a problem. The study also revealed that older women use selection, optimisation and compensation to meet their goal of staying socially connected. The shopping centre was a key factor in this goal and older women used shopping centres to stay connected to the community and for exercise as well as shopping. Personal and public safety and other environmental concerns were viewed in the same context of enabling or disabling social connectedness. This suggested that for elite older women the model of successful ageing was hierarchical rather than flat, with social connectedness at the top, supported by cognitive functioning and good physical and mental health. In conclusion, this research revealed that perception of wellness in older adults is a complex, multidimensional construct. For older adults good health is related to social connectedness and is not a goal in itself. Health professionals and the community at large have a responsibility to take into account the ability of the older adult to stay socially connected to their community and to enable this, if the goal is to keep older adults healthy for as long as possible. Maintaining or improving perception of wellness in older adults will require a broad biopsychosocial approach that utilises findings such as older adults’ use of shopping centres for non-shopping purposes, concerns about personal and environmental safety and supporting older adults to maintain or improve their social connectedness to their communities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.