108 resultados para Card catalogs


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study explores people's risk taking behaviour after having suffered large real-world losses following a natural disaster. Using the margins of the 2011 Australian floods (Brisbane) as a natural experimental setting, we find that homeowners who were victims of the floods and face large losses in property values are 50% more likely to opt for a risky gamble -- a scratch card giving a small chance of a large gain ($500,000) -- than for a sure amount of comparable value ($10). This finding is consistent with prospect theory predictions regarding the adoption of a risk-seeking attitude after a loss.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nontechnical skills relating to team functioning are vital to the effective delivery of patient care and safety. In this study, we develop a reliable behavioral marker tool for assessing nontechnical skills that are critical to the success of ward-based multidisciplinary healthcare teams. The Team Functioning Assessment Tool (TFAT) was developed and refined using a literature review, focus groups, card-sorting exercise, field observations, and final questionnaire evaluation and refinement process. Results demonstrated that Clinical Planning, Executive Tasks, and Team Relations are important facets of effective multidisciplinary healthcare team functioning. The TFAT was also shown to yield acceptable inter-rater agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. Stream ecosystem health monitoring and reporting need to be developed in the context of an adaptive process that is clearly linked to identified values and objectives, is informed by rigorous science, guides management actions and is responsive to changing perceptions and values of stakeholders. To be effective, monitoring programmes also need to be underpinned by an understanding of the probable causal factors that influence the condition or health of important environmental assets and values. This is often difficult in stream and river ecosystems where multiple stressors, acting at different spatial and temporal scales, interact to affect water quality, biodiversity and ecosystem processes. 2. In this article, we describe the development of a freshwater monitoring programme in South East Queensland, Australia, and how this has been used to report on ecosystem health at a regional scale and to guide investments in catchment protection and rehabilitation. We also discuss some of the emerging science needs to identify the appropriate scale and spatial arrangement of rehabilitation to maximise river ecosystem health outcomes and, at the same time, derive other benefits downstream. 3. An objective process was used to identify potential indicators of stream ecosystem health and then test these across a known catchment land-use disturbance gradient. From the 75 indicators initially tested, 22 from five indicator groups (water quality, ecosystem metabolism, nutrient cycling, invertebrates and fish) responded strongly to the disturbance gradient, and 16 were subsequently recommended for inclusion in the monitoring programme. The freshwater monitoring programme was implemented in 2002, funded by local and State government authorities, and currently involves the assessment of over 120 sites, twice per year. This information, together with data from a similar programme on the region's estuarine and coastal marine waters, forms the basis of an annual report card that is presented in a public ceremony to local politicians and the broader community. 4. Several key lessons from the SEQ Healthy Waterways Programme are likely to be transferable to other regional programmes aimed at improving aquatic ecosystem health, including the importance of a shared common vision, the involvement of committed individuals, a cooperative approach, the need for defensible science and effective communication. 5. Thematic implications: this study highlights the use of conceptual models and objective testing of potential indicators against a known disturbance gradient to develop a freshwater ecosystem health monitoring programme that can diagnose the probable causes of degradation from multiple stressors and identify the appropriate spatial scale for rehabilitation or protection. This approach can lead to more targeted management investments in catchment protection and rehabilitation, greater public confidence that limited funds are being well spent and better outcomes for stream and river ecosystem health.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose Ethnographic studies of cyber attacks typically aim to explain a particular profile of attackers in qualitative terms. The purpose of this paper is to formalise some of the approaches to build a Cyber Attacker Model Profile (CAMP) that can be used to characterise and predict cyber attacks. Design/methodology/approach The paper builds a model using social and economic independent or predictive variables from several eastern European countries and benchmarks indicators of cybercrime within the Australian financial services system. Findings The paper found a very strong link between perceived corruption and GDP in two distinct groups of countries – corruption in Russia was closely linked to the GDP of Belarus, Moldova and Russia, while corruption in Lithuania was linked to GDP in Estonia, Latvia, Lithuania and Ukraine. At the same time corruption in Russia and Ukraine were also closely linked. These results support previous research that indicates a strong link between been legitimate economy and the black economy in many countries of Eastern Europe and the Baltic states. The results of the regression analysis suggest that a highly skilled workforce which is mobile and working in an environment of high perceived corruption in the target countries is related to increases in cybercrime even within Australia. It is important to note that the data used for the dependent and independent variables were gathered over a seven year time period, which included large economic shocks such as the global financial crisis. Originality/value This is the first paper to use a modelling approach to directly show the relationship between various social, economic and demographic factors in the Baltic states and Eastern Europe, and the level of card skimming and card not present fraud in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"The 3rd edition of this classic book offers practitioners, researchers and students a comprehensive introduction to, and overview of, career theory; introduces the Systems Theory Framework of career development; and demonstrates its considerable contemporary and innovative application to practice. A number of authors have identified the framework as one of a small number of significant innovations in the career development literature. The Systems Theory Framework of career development was developed to provide coherence to the career development field by providing a comprehensive conceptualisation of the many existing theories and concepts relevant to understanding career development. It is not designed to be a theory of career development; rather systems theory is introduced as the basis for an overarching, or metatheoretical, framework within which all concepts of career development, described in the plethora of career theories, can be usefully positioned and utilised in both theory and practice. It has been applied to the career development of children, adolescents and women. Since its first publication, the Systems Theory Framework has been the basis of numerous publications focusing on theoretical application and integration, practice and research, with a growing number of these by authors other than the framework developers. Its application across cultures also has been emphasised. The theoretical and practical unity of the Systems Theory Framework makes this book a worthy addition to the professional libraries of practitioners, researchers and students, new to, or experienced in, the field of career development."--PUBLISHER WEBSITE

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Social Public Display to Facilitate Shared Encounters in Coworking Spaces The idea behind ‘Gelatine’ is a system that facilitates shared encounters between coworkers and library users by allowing them to digitally ‘check in’ at a work space. Gelatine displays skills, areas of interest, and needs of currently present coworkers on a public screen. The system provides an online / mobile website for users to create a personal profile with keywords (‘tags’) that describe their skills, areas of interests, as well as areas that they have a problem in or want to learn more about. This profile information is linked to their RFID membership card, which they can swipe at one of the ‘checkin-points’ at the entrance or specific sub locations such as individual desks or coffee kiosk to confirm their presence in the space.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cubit is a public installation developed for QUT's Cube. It allows QUT staff and students to upload and exhibit media content on the Cube's display surfaces. Interact with the work of QUT's Science, Technology, Engineering and Mathematics (STEM) research projects with CubIT, a unique system at the Cube that allows the general public to collaborate with and access research content shared by QUT's students and academics. QUT students and staff can easily present and share their work at The Cube on a set of large multi-touch displays. To access The Cube, all they need to do is swipe their staff or student card at the CubIT system. They will then be able to instantly upload presentations, videos or visualisation of their work. CubIT boasts a host of collaborative features that allows users to share content across user accounts, annotate content and create shared presentations. Interactive features allow the public to engage and collaborate with content hands-on. In addition to being accessible through The Cube, CubIT allows users to interact with their work through alternative mediums and devices, including mobile phones, tablets and Dropbox. Please note you must be on the QUT network to access CubIT. CubIT can be booked to appear on the Cube Level 5 at specfic times for student and staff purposes. Please email booking requests

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. Shoppers Profiles- Are Grocery Shoppers any different to Pharmacy Shoppers? 2. Awaking the Sleeping Giants- Supermarkets push into OTC Medicines 3. Price versus Value for Money- What’s the Difference? Value and Perceived Quality 4. Consumer Decision Making Process- The Pharmacists ‘Trump’ Card

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"…one should try to locate power at the extreme points of its exercise, where it is always less legal in character." (Foucault, 1980, p.97) Studies of schooling practices as techniques deriving from a particular art of governing that Foucault (2003b) called ‘governmentality’ have shown how psychopathologising discourses work to construct particular student-subjects and legitimise various practices of exclusion (Gram, 2007b). Here I extend this work to consider the use of alternative-site placement as an intensification in response to governmentality being put ‘at risk’. Governing ‘at a distance’ conjures an illusion of individual freedom which relies on the production of subjects who ‘choose’ to make choices that are consistent with the aspirations of government. In this chapter, it is argued that the designation of a child as ‘disorderly’ legitimises the intrusion of state into the private domain of the family via the Trojan horse of early intervention. This is enabled by the psy-sciences, whose technologies and aims amount to the moral retraining of ‘improper’ future-citizens who, in choosing to choose otherwise, threaten to make visible invisible relations of power. Alternative-site placement in special schools running intensive behaviour modification programs allows for a ‘redoubled insistence’ (Ewald, 1992) of these norms and limits that a ‘disorderly’ child threatens to transgress.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present study investigated the behavioral and neuropsychological characteristics of decision-making behavior during a gambling task as well as how these characteristics may relate to the Somatic Marker Hypothesis and the Frequency of Gain model. The applicability to intertemporal choice was also discussed. Patterns of card selection during a computerized interpretation of the Iowa Gambling Task were assessed for 10 men and 10 women. Steady State Topography was employed to assess cortical processing throughout this task. Results supported the hypothesis that patterns of card selection were in line with both theories. As hypothesized, these 2 patterns of card selection were also associated with distinct patterns of cortical activity, suggesting that intertemporal choice may involve the recruitment of right dorsolateral prefrontal cortex for somatic labeling, left fusiform gyrus for object representations, and the left dorsolateral prefrontal cortex for an analysis of the associated frequency of gain or loss. It is suggested that processes contributing to intertemporal choice may include inhibition of negatively valenced options, guiding decisions away from those options, as well as computations favoring frequently rewarded options.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

J.W.Lindt’s Colonial man and Aborigine image from the GRAFTON ALBUM: “On chemistry and optics all does not depend, art must with these in triple union blend” (text from J.W. Lindt’s photographic backing card)...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.