114 resultados para Illegal armed groups
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
We report on the use of the hydrogen bond acceptor properties of some phosphorus-containing functional groups for the assembly of a series of [2]rotaxanes. Phosphinamides, and the homologous thio– and selenophosphinamides, act as hydrogen bond acceptors that, in conjunction with an appropriately positioned amide group on the thread, direct the assembly of amide-based macrocycles around the axle to form rotaxanes in up to 60% yields. Employing solely phosphorus-based functional groups as the hydrogen bond accepting groups on the thread, a bis(phosphinamide) template and a phosphine oxide-phosphinamide template afforded the corresponding rotaxanes in 18 and 15 % yields, respectively. X-Ray crystallography of the rotaxanes shows the presence of up to four intercomponent hydrogen bonds between the amide groups of the macrocycle and various hydrogen bond accepting groups on the thread, including rare examples of amide-to-phosphonamide, -thiophosphinamide and -selenophosphinamide groups. With a phosphine oxide-phosphinamide thread, the solid state structure of the rotaxane is remarkable, featuring no direct intercomponent hydrogen bonds but rather a hydrogen bond network involving water molecules that bridge the H-bonding groups of the macrocycle and thread through bifurcated hydrogen bonds. The incorporation of phosphorus-based functional groups into rotaxanes may prove useful for the development of molecular shuttles in which the macrocycle can be used to hinder or expose binding ligating sites for metal-based catalysts.
Resumo:
Objective To examine the relationship between sports participation and health-related behaviors among high school students. Design Cross-sectional design using data from the 1997 Centers for Disease Control and Prevention Youth Risk Behavior Survey. Participants A nationally representative sample of 14221 US high school students. Main Outcome Measures Prevalence of sports participation among males and females from 3 ethnic groups and its associations with other health behaviors, including diet, tobacco use, alcohol and illegal drug use, sexual activity, violence, and weight loss practices. Results Approximately 70% of male students and 53% of female students reported participating on 1 or more spores teams in school and/or nonschool settings; rates varied substantially by age, sex, and ethnicity. Male sports participants were more likely than male nonparticipants to report fruit and vegetable consumption on the previous day and less likely to report cigarette smelting, cocaine and other illegal drug use, and trying to lose weight. Compared with female nonparticipants, female sports participants were more likely to report consumption of vegetables on the previous day and less likely to report having sexual intercourse in the past 3 months. Among white males and females, several other beneficial health behaviors were associated with sports participation. A few associations with. negative health behaviors were observed in African American and Hispanic subgroups. Conclusion Sports participation is highly prevalent among US high school students, and is associated with numerous positive health behaviors and few negative health behaviors.
Resumo:
This study examined the formation and operation of women's microfinance self-help groups in southern India and investigated whether or not the poorest of the poor women were accepted as members of those groups. The study found that caste was used as a selection criterion. Many eligible women excluded themselves from joining the self-help group due to their own lack of education, age, poor health, poverty and lack of trust in the system. The research revealed that self-help groups enhanced women's income and education, improved village infrastructure, and reduced household conflict. Factors that might prevent inclusion of the poorest of the poor in future microfinance programs were identified.
Resumo:
We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.
Resumo:
Our objective is to analyze the effectiveness, against the illegal disposal of waste, of a licensing system that has been introduced in a waste management policy. We theoretically find enforcement leverage in the licensing system, and then examine the theoretical result empirically. The results suggest that extending liability to disposers, which forms the basis of the enforcement leverage, deters illegal disposal more effectively than increasing penalties for illegal disposal. We also obtain evidence of transboundary movement of illegal disposal, and find how the court determines penalties for illegal disposal.
Resumo:
It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.
Resumo:
Australian households currently pay the second highest “honesty tax” in the world at $290 per household per year, levied by retailers to offset the $AU1.86 billion in losses they incur from customer theft. Theft is only one type of consumer deviance, which can include behaviours that are against the law, an organisation’s policy, or behaviours that violate normally accepted conduct. An individual’s “deviant behaviour” can vary from one person to the next. My research exploring consumer definitions of right and wrong has found a number of things can inform what an individual thinks is “deviant behaviour”, beyond what the law or organisational policy states as right or wrong. Consumers then use their own justifications to excuse their actions...
Resumo:
Collisions between different types of road users at intersections form a substantial component of the road toll. This paper presents an analysis of driver, cyclist, motorcyclist and pedestrian behaviour at intersections that involved the application of an integrated suite of ergonomics methods, the Event Analysis of Systemic Teamwork (EAST) framework, to on-road study data. EAST was used to analyse behaviour at three intersections using data derived from an on-road study of driver, cyclist, motorcyclist and pedestrian behaviour. The analysis shows the differences in behaviour and cognition across the different road user groups and pinpoints instances where this may be creating conflicts between different road users. The role of intersection design in creating these differences in behaviour and resulting conflicts is discussed. It is concluded that currently intersections are not designed in a way that supports behaviour across the four forms of road user studied. Interventions designed to improve intersection safety are discussed.
Resumo:
What do we know? • Customer Experience is increasingly becoming the new standard for differentiation in both offline and online retailing, and offers a sustainable competitive advantage. o The economic value of a company’s offering has been observed to increase when the customer has a fulfilling shopping experience (Pine & Gilmore, 1998) o Crafting engaging and customer experience is a known method of generating loyalty, advocacy and word of mouth (Tynan & McKechnie, 2009). o A good experience can entice consumers to shop for longer and spend more (Kim, 2001). • The customer’s experience is made up of diverse elements occurring before, during and after the purchase itself. (Discussed further on page 5). It is cumulative over time and can be influenced by touch points across multiple channels. What remains unclear? • How do Coles customers respond to the elements of online customer experience? • How does the online customer experience differ for frequent and infrequent purchasers? • Do differences between genders and age cohorts for online customer experience exist?
Resumo:
OBJECTIVE The effects of free fatty acids (FFA), leptin, tumour necrosis factor (TNF) alpha and body fat distribution on in vivo oxidation of a glucose load were studied in two South African ethnic groups. DESIGN AND MEASUREMENTS Anthropometric and various metabolic indices were measured at fasting and during a 7h oral glucose tolerance test (OGTT). Body composition was measured using bioelectrical impedance analysis and subcutaneous and visceral fat mass was assessed using a five- and two-level CT-scan respectively. Glucose oxidation was evaluated by measuring the ratio of (13)CO(2) to (12)CO(2) in breath following ingestion of 1-(13)C-labelled glucose. SUBJECTS Ten lean black women (LBW), ten obese black women (OBW), nine lean white women (LWW) and nine obese white women (OWW) were investigated after an overnight fast. RESULTS Visceral fat levels were significantly higher (P < 0.01) in obese white than black women, despite similar body mass indexes (BMIs). There were no ethnic differences in glucose oxidation however; in the lean subjects of both ethnic groups the area under the curve (AUC) was higher than in obese subjects (P < 0.05 for both) and was found to correlate negatively with weight (r = -0.69, P < 0.01) after correcting for age. Basal TNF alpha concentrations were similar in all groups. Percentage suppression of FFAs at 30 min of the OCTT was 24 +/- 12% in OWW and - 38 +/- 23% (P < 0.05) in OBW, ie the 30 min FFA level was higher than the fasting level in the latter group. AUC for FFAs during the late postprandial period (120 - 420 min) was significantly higher in OWW than OBW (P < 0.01) and LWW (P < 0.01) and correlated positively with visceral fat mass independent of age (r = 0.78, P < 0.05) in the OWW only. Leptin levels were higher (P < 0.01) both at fasting and during the course of the OCTT in obese women from both ethnic groups compared to the lean women. CONCLUSIONS Glucose oxidation is reduced in obese subjects of both ethnic groups; inter- and intra-ethnic differences were observed in visceral fat mass and FFA production and it is possible that such differences may play a role in the differing prevalences of obesity-related disorders that have been reported in these two populations.
Resumo:
There is a higher prevalence of ischemic heart disease (IHD) in South African white than black women. The objective of this study was to determine biochemical explanations for this prevalence. The study group contained 15 obese black women (OBW) and 14 obese white women (OWW), ah premenopausal, who were examined after an overnight fast. Anthropometric measurements and blood concentrations of glucose, non-esterified fatty acids (NEFAs), catecholamines, plasminogen activator inhibitor-1, C-peptide, proinsulin, lipograms, cortisol, growth hormone, and post-heparin Lipoprotein Lipase activity were measured during an oral glucose tolerance test (OGTT), Body composition was measured using bioelectrical impedance analysis, and subcutaneous and visceral fat mass were assessed with CT-scans. Visceral fat area was higher in OWW (139.7 +/- 10.7 cm(2)) than in OBW (72.3 +/- 3.9 cm(2)) (P < 0.01), as were fasting and 3 h triglyceride concentrations (P < 0.05 for all). OWW also had higher NEFA levels than OBW at 3 and 4 h compared, with OBW (P < 0.05 for both). Fasting cortisol (266 +/- 24 vs. 197 +/- 19 nmol/l; P < 0.05) was higher in OWW than in OBW. These data demonstrate that OWW have higher visceral fat mass than OBW, which may lead to a more atherogenic fasting and postprandial Lipid profile. The higher cortisol levels of the OWW may promote visceral fat deposition. - Punyadeera, C., M-T. van der Merwe, N.J. Crowther, M. Toman, C. P. Schlaphoff, and I. P. Gray. Ethnic differences in lipid metabolism in two groups of obese South African women.
Resumo:
This article examines the new model for corporate officer liability under section 144 of the Occupational Health and Safety Act 2004 (Vic), and explores the extent to which this might effectively extend responsibility for OHS offences to members of corporate groups, such as holding companies. In doing so, the authors canvass the failure of corporate law to impose such obligations on corporate officers in general, and on holding companies as shadow officers. It is argued that provisions such as section 144 of the Victorian Act should be included in all OHS legislation.