266 resultados para unauthorised disclosure


Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are two key ways in which the Australian Uniform Consumer Credit Code seeks to protect consumers in relation to consumer credit transactions. The first is by means of disclosure regulation where information is required to be disclosed to the consumer before the credit contract is entered into and the second is by way of “safety net” provisions, where contracts can be varied or set aside in the event of hardship, a finding that the transaction was unjust, or a finding of unconscionable fees or charges. This article explores the limitations of both of these means of protection, particularly in the case of vulnerable, low-income consumers. In order to highlight the inadequacies of these forms of consumer protection and the need for regulatory reform, we draw on interviews conducted with 30 low-income consumers who had recently signed a credit contract, focusing on their understanding of information disclosed in the contract, as well as their responses to hypothetical unfair terms and their understanding of their rights, for example in the event of an unjust transaction. These interviews were conducted as part of a joint research project between Brotherhood of St Laurence and Griffith University’s Centre for Credit and Consumer Law, funded by Consumer Affairs Victoria.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Children and adolescents now communicate online to form and/or maintain relationships with friends, family, and strangers. Relationships in “real life” are important for children’s and adolescents’ psychosocial development; however, they can be difficult for those who experience feelings of loneliness and/or social anxiety. The aim of this study was to investigate differences in usage of online communication patterns between children and adolescents with and without self-reported loneliness and social anxiety. Six hundred and twenty-six students aged between 10-16 years completed a survey on the amount of time they spent communicating online, the topics they discussed, the partners they engaged with, and their purposes for communicating over the Internet. Participants were administered a shortened version of the UCLA Loneliness Scale and an abbreviated sub-scale of the Social Anxiety Scale for Adolescents (SAS-A). Additionally, age and gender differences in usage of the aforementioned online communication patterns were examined across the entire sample. Findings revealed that children and adolescents who self-reported being lonely communicated online significantly more frequently about personal things and intimate topics than did those who did not self-report being lonely. The former were motivated to use online communication significantly more frequently to compensate for their weaker social skills to meet new people. Results suggest that Internet usage allows them to fulfill critical needs of social interactions, self-disclosure, and identity exploration. Future research, however, should explore whether or not the benefits derived from online communication may also facilitate lonely children’s and adolescents’ offline social relationships.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Children and adolescents are now using online communication to form and/or maintain relationships with strangers and/or friends. Relationships in real life are important for children and adolescents in identity formation and general development. However, social relationships can be difficult for those who experience feelings of loneliness and social anxiety. The current study aimed to replicate and extend research conducted by Valkenburg and Peter (2007b), by investigating differences in online communication patterns between children and adolescents with and without selfreported loneliness and social anxiety. Six hundred and twenty-six students aged 10-16 years completed a questionnaire survey about the amount of time they engaged in online communication, the topics they discussed, who they communicated with, and their purposes of online communication. Following Valkenburg and Peter (2007b), loneliness was measured with a shortened version of the UCLA Loneliness Scale (Version 3) developed by Russell (1996), whereas social anxiety was assessed with a sub-scale of the Social Anxiety Scale for Adolescents (La Greca & Lopez, 1998). The sample was divided into four groups of children and adolescents: 220 were “non-socially anxious and non-lonely”, 139 were “socially anxious but not lonely”, 107 were “lonely but not socially anxious”, and 159 were “lonely and socially anxious”. A one-way ANOVA and chi-square tests were conducted to evaluate the aforementioned differences between these groups. The results indicated that children and adolescents who reported being lonely used online communication differently from those who did not report being lonely. Essentially, the former communicated online more frequently about personal things and intimate topics, but also to compensate for their weak social skills and to meet new people. Further analyses on gender differences within lonely children and adolescents revealed that boys and girls communicated online more frequently with different partners. It was concluded that for these vulnerable individuals online communication may fulfil needs of self-disclosure, identity exploration, and social interactions. However, future longitudinal studies combining a quantitative with a qualitative approach would better address the relationship between Internet use and psychosocial well-being. The findings also suggested the need for further exploration of how such troubled children and adolescents can use the Internet beneficially.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: To investigate the effect of orthokeratology on peripheral aberrations in two myopic volunteers. Methods: The subjects wore reverse geometry orthokeratology lenses overnight and were monitored for 2 weeks of wear. They underwent corneal topography, peripheral refraction (out to ±34° along the horizontal visual field) and peripheral aberration measurements across the 42° × 32° central visual field using a modified Hartmann-Shack aberrometer. Results: Spherical equivalent refraction was corrected for the central 25° of the visual fields beyond which it gradually returned to its preorthokeratology values. There were increases in axial coma, spherical aberration, higher order root mean square aberrations, and total root-mean-squared aberrations (excluding defocus). The rates of change of vertical and horizontal coma across the field changed in sign. Total root mean square aberrations showed a quadratic rate of change across the visual field which was greater subsequent to orthokeratology. Conclusion: Although orthokeratology can correct peripheral relative hypermetropia it induces dramatic increases in higher-order aberrations across the field

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Manuscript Type: Empirical Research Issue: We propose that high levels of monitoring are not always in the best interests of minority shareholders. In family-owned companies the optimal level of board monitoring required by minority shareholders is expected to be lower than that of other companies. This is because the relative benefits and costs of monitoring are different in family-owned companies. Research Findings: At moderate levels of board monitoring, we find concave relationships between board monitoring variables and firm performance for family-owned companies but not for other companies. The optimal level of board monitoring for our sample of Asian family-owned companies equates to board independence of 38%, separation of the Chairman and CEO positions and establishment of audit and remuneration committees. Additional testing shows that the optimal level of board monitoring is sensitive to the magnitude of the agency conflict between the family group and minority shareholders and the presence of substitute monitoring. Practitioner/Policy Implications: For policymakers, the results show that more monitoring is not always in the best interests of minority shareholders. Therefore, it may be inappropriate for regulators to advise all companies to follow the same set of corporate governance guidelines. However, our results also indicate that the board governance practices of family-owned companies are still well below the identified optimal levels. Keywords: Corporate Governance, Board Independence, Board of Directors, Family Firms, Monitoring.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Protection of “critical infrastructure” has become a major issue for govern- ments worldwide. Yet in Australia, as in many other countries, including the United States, an estimated 90% of critical infrastructure is privately owned or operated commercially – in other words, critical infrastructure protection is not the exclusive domain of government. As a result, information sharing between government and the private sector has become a vitally important component of effective risk management. However, establishing effective arrangements of this kind between the public and private sector needs to take account of existing regimes of access and public disclosure which relate to government-held documents; in particular, that which is established by freedom of information (FOI) legislation. This article examines the extent to which the current Commonwealth FOI regime is likely to act as an impediment to the private sector operators of critical infrastructure participat- ing in government-operated information sharing arrangements. By examining developments in other jurisdictions, principally the United States, the article considers whether amendments to the current Australian FOI regime are necessary to ensure effective participation, consistent with the underlying object and purpose of FOI.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This approach to sustainable design explores the possibility of creating an architectural design process which can iteratively produce optimised and sustainable design solutions. Driven by an evolution process based on genetic algorithms, the system allows the designer to “design the building design generator” rather than to “designs the building”. The design concept is abstracted into a digital design schema, which allows transfer of the human creative vision into the rational language of a computer. The schema is then elaborated into the use of genetic algorithms to evolve innovative, performative and sustainable design solutions. The prioritisation of the project’s constraints and the subsequent design solutions synthesised during design generation are expected to resolve most of the major conflicts in the evaluation and optimisation phases. Mosques are used as the example building typology to ground the research activity. The spatial organisations of various mosque typologies are graphically represented by adjacency constraints between spaces. Each configuration is represented by a planar graph which is then translated into a non-orthogonal dual graph and fed into the genetic algorithm system with fixed constraints and expected performance criteria set to govern evolution. The resultant Hierarchical Evolutionary Algorithmic Design System is developed by linking the evaluation process with environmental assessment tools to rank the candidate designs. The proposed system generates the concept, the seed, and the schema, and has environmental performance as one of the main criteria in driving optimisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate whether characteristics of the home country capital environment, such as information disclosure and investor rights protection continue to affect ADRs cross-listed in the U.S. Using microstructure measures as proxies for adverse selection, we find that characteristics of the home markets continue to be relevant, especially for emerging market firms. Less transparent disclosure, poorer protection of investor rights and weaker legal institutions are associated with higher levels of information asymmetry. Developed market firms appear to be affected by whether or not home business laws are common law or civil law legal origin. Our finding contributes to the bonding literature. It suggests that cross-listing in the U.S. should not be viewed as a substitute for improvement in the quality of local institutions, and attention must be paid to improve investor protection in order to achieve the full benefits of improved disclosure. Improvement in the domestic capital market environment can attract more investors even for U.S. cross-listed firms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on the use of email as a means to access the self-constructions of gifted young adolescents. Australian research shows that gifted young adolescents may feel more lonely and misunderstood than their same-age counterparts, yet they are seldom asked about their lives. Emerging use of online methods as a means of access to individual lives and perceptions has demonstrated the potential offered by the creation of digital texts as narrative data. Details are given of a qualitative study that engaged twelve children aged between 10 and 14 years, who were screened for giftedness, in a project involving the generation of emailed journal entries sent over a period of 6 months. With emphasis on participatory principles, individual young adolescents produced self-managed journal entries that were written and sent to the researcher from personal computers outside the school setting. Drawing from a theoretical understanding of self as constructed within dialogic relationships, the digital setting of email is proposed as a narrative space that fosters healthy self-disclosure. This paper outlines the benefits of using email as a means to explore emotions, promote reflective accounts of self and support the development of a personal language for self-expression. Individual excerpts will be presented to show that the harnessing of personal narratives within an email context has potential to yield valuable insights into the emotions, personal realities and experiences of gifted young adolescents. Findings will be presented to show that the co-construction of self-expressive and explanatory narratives supported by a facilitative adult listener promoted healthy self-awareness amongst participants. This paper contributes to appreciative conversations about using online methods as a flexible and practical avenue for conducting educational research. Furthermore, digital writing in email form will be presented as having distinct advantages over face-to-face methods when utilised with gifted young adolescents who may be unwilling to disclose information within school-based settings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis consists of a confessional narrative, What My Mother Doesn’t Know, and an accompanying exegesis, And Why I Should (Maybe) Tell Her. The creative piece employs the confessional mode as a subversive device in three separate narratives, each of which situates the bed as a site of resistance. The exegesis investigates how this self-disclosure in a domestic space flouts the governing rules of self-representation, specifically: telling the truth, respecting privacy and displaying normalcy. The female confession, I argue, creates an alternative space in women’s autobiography where notions of truth-telling can be undermined, the political dimensions of personal experience can be uncovered and the discourse of normality can be negotiated. In particular, women’s confessions told in, on or about the bed, dismantle the genre’s illusion of self and confirm the representative aspects of women’s experience. Framed within these parameters of power and powerlessness, the exegesis includes textual analyses of Charlotte Perkins Gilman’s The Yellow Wallpaper (1892), Tracey Emin’s My Bed (1999) and Lauren Slater’s Lying (2000), each of which exposes in a bedroom space, the author’s most obscure, intimate and traumatic experiences. Situated firmly within and against the genre’s traditional masculine domain, the exegesis also includes mediations on the creative work that validate the bed as my fabric for confession.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Multipotent mesenchymal stem cells (MSCs), first identified in the bone marrow, have subsequently been found in many other tissues, including fat, cartilage, muscle, and bone. Adipose tissue has been identified as an alternative to bone marrow as a source for the isolation of MSCs, as it is neither limited in volume nor as invasive in the harvesting. This study compares the multipotentiality of bone marrow-derived mesenchymal stem cells (BMSCs) with that of adipose-derived mesenchymal stem cells (AMSCs) from 12 age- and sex-matched donors. Phenotypically, the cells are very similar, with only three surface markers, CD106, CD146, and HLA-ABC, differentially expressed in the BMSCs. Although colony-forming units-fibroblastic numbers in BMSCs were higher than in AMSCs, the expression of multiple stem cell-related genes, like that of fibroblast growth factor 2 (FGF2), the Wnt pathway effectors FRAT1 and frizzled 1, and other self-renewal markers, was greater in AMSCs. Furthermore, AMSCs displayed enhanced osteogenic and adipogenic potential, whereas BMSCs formed chondrocytes more readily than AMSCs. However, by removing the effects of proliferation from the experiment, AMSCs no longer out-performed BMSCs in their ability to undergo osteogenic and adipogenic differentiation. Inhibition of the FGF2/fibroblast growth factor receptor 1 signaling pathway demonstrated that FGF2 is required for the proliferation of both AMSCs and BMSCs, yet blocking FGF2 signaling had no direct effect on osteogenic differentiation. Disclosure of potential conflicts of interest is found at the end of this article.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Multi-disciplinary approaches to complex problems are becoming more common – they enable criteria manifested in distinct (and potentially conflicting) domains to be jointly balanced and satisfied. In this paper we present airport terminals as a case study which requires multi-disciplinary knowledge in order to balance conflicting security, economic and passenger-driven needs and correspondingly enhance the design, management and operation of airport terminals. The need for a truly multi-disciplinary scientific approach which integrates information, process, people, technology and space domains is highlighted through a brief discussion of two challenges currently faced by airport operators. The paper outlines the approach taken by this project, detailing the aims and objectives of each of seven diverse research programs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Summary There are four interactions to consider between energy intake (EI) and energy expenditure (EE) in the development and treatment of obesity. (1) Does sedentariness alter levels of EI or subsequent EE? and (2) Do high levels of EI alter physical activity or exercise? (3) Do exercise-induced increases in EE drive EI upwards and undermine dietary approaches to weight management and (4) Do low levels of EI elevate or decrease EE? There is little evidence that sedentariness alters levels of EI. This lack of cross-talk between altered EE and EI appears to promote a positive EB. Lifestyle studies also suggest that a sedentary routine actually offers the opportunity for over-consumption. Substantive changes in non exercise activity thermogenesis are feasible, but not clearly demonstrated. Cross talk between elevated EE and EI is initially too weak and takes too long to activate, to seriously threaten dietary approaches to weight management. It appears that substantial fat loss is possible before intake begins to track a sustained elevation of EE. There is more evidence that low levels of EI does lower physical activity levels, in relatively lean men under conditions of acute or prolonged semi-starvation and in dieting obese subjects. During altered EB there are a number of small but significant changes in the components of EE, including (i) sleeping and basal metabolic rate, (ii) energy cost of weight change alters as weight is gained or lost, (iii) exercise efficiency, (iv) energy cost of weight bearing activities, (v) during substantive overfeeding diet composition (fat versus carbohydrate) will influence the energy cost of nutrient storage by ~ 15%. The responses (i-v) above are all “obligatory” responses. Altered EB can also stimulate facultative behavioural responses, as a consequence of cross-talk between EI and EE. Altered EB will lead to changes in the mode duration and intensity of physical activities. Feeding behaviour can also change. The degree of inter-individual variability in these responses will define the scope within which various mechanisms of EB compensation can operate. The relative importance of “obligatory” versus facultative, behavioural responses -as components of EB control- need to be defined.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.