634 resultados para Key Block Theory

em Queensland University of Technology - ePrints Archive


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Purpose The purpose of this work was to explore how men and women construct their experiences living with lymphoedema following treatment for any cancer in the context of everyday life. Methods The design and conduct of this qualitative study was guided by Charmaz’ social constructivist grounded theory. To collect data, focus groups and telephone interviews were conducted. Audiotapes were transcribed verbatim and imported into NVivo8 to organise data and codes. Data were analysed using key grounded theory principles of constant comparison, data saturation and initial, focused and theoretical coding. Results Participants were 3 men and 26 women who had developed upper- or lower-limb lymphoedema following cancer treatment. Three conceptual categories were developed during data analysis and were labelled ‘accidental journey’, ‘altered normalcy’ and ‘ebb and flow of control’. ‘Altered normalcy’ reflects the physical and psychosocial consequences of lymphoedema and its relationship to everyday life. ‘Accidental journey’ explains the participants’ experiences with the health care system, including the prevention, treatment and management of their lymphoedema. ‘Ebb and flow of control’ draws upon a range of individual and social elements that influenced the participants’ perceived control over lymphoedema. These conceptual categories were inter-related and contributed to the core category of ‘sense of self’, which describes their perceptions of their identity and roles. Conclusions Results highlight the need for greater clinical and public awareness of lymphoedema as a chronic condition requiring prevention and treatment, and one that has far-reaching effects on physical and psychosocial well-being as well as overall quality of life.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Purpose: The purpose of this paper is to explain variations in discretionary information shared between buyers and key suppliers. The paper also aims to examine how the extent of information shared affects buyers’ performance in terms of resource usage, output, and flexibility. ----- ----- Design/methodology/approach: The data for the paper comprise 221 Finnish and Swedish non-service companies obtained through a mail survey. The hypothesized relationships were tested using partial least squares modelling with reflective and formative constructs.----- ----- Findings: The results of the study suggest that (environmental and demand) uncertainty and interdependency can to some degree explain the extent of information shared between a buyer and key supplier. Furthermore, information sharing improves buyers’ performance with respect to resource usage, output, and flexibility.----- ----- Research limitations/implications: A limitation to the paper relates to the data, which only included buyers.Abetter approach would have been to collect data from both, buyers and key suppliers. Practical implications – Companies face a wide range of supply chain solutions that enable and encourage collaboration across organizations. This paper suggests a more selective and balanced approach toward adopting the solutions offered as the benefits are contingent on a number of factors such as uncertainty. Also, the risks of information sharing are far too high for a one size fits all approach.----- ----- Originality/value: The paper illustrates the applicability of transaction cost theory to the contemporary era of e-commerce. With this finding, transaction cost economics can provide a valuable lens with which to view and interpret interorganizational information sharing, a topic that has received much attention in the recent years.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Business Process Management (BPM) is a topic that continues to grow in significance as organisations seek to gain and sustain competitive advantage in an increasingly global environment. Despite anecdotal evidence of organisations improving performance by pursuing a BPM approach, there is little theory that explains and substantiates this relationship. This study provides the first theory on the progression and maturity of BPM Initiatives within organisations and provides a vital starting block upon which future research in this area can build. The Researcher starts by clearly defining three key terms (BPM Initiative, BPM Progression and BPM Maturity), showing the relationship between these three concepts and proposing their relationship with Organisational Performance. The Researcher then combines extant literature and use of the Delphi Technique and the case study method to explore the progression and measurement of the BPM Initiatives within organisations. The study builds upon the principles of general theories including the Punctuated Equilibrium Model and Dynamic Capabilities to present theory on BPM Progression and BPM Maturity. Using the BPM Capability Framework developed through an international Delphi study series, the Researcher shows how the specific organisational context influences which capability areas an organisation chooses to progress. By comparing five separate organisations over an extended time the Researcher is able to show that, despite this disparity, there is some evidence of consistency with regard to the capability areas progressed. This suggests that subsequent identification of progression paths may be possible. The study also shows that the approach and scope taken to BPM within each organisation is a likely predictor of such paths. These outcomes result in the proposal of a formative model for measuring BPM Maturity.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks for various hash function constructions based on block ciphers. Further, we prove the lower bound for finding a pair that follows some truncated differential in case of a random permutation. Then we present open-key differential distinguishers for some well known round-reduced block ciphers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Principal Topic: It is well known that most new ventures suffer from a significant lack of resources, which increases the risk of failure (Shepherd, Douglas and Shanley, 2000) and makes it difficult to attract stakeholders and financing for the venture (Bhide & Stevenson, 1999). The Resource-Based View (RBV) (Barney, 1991; Wernerfelt, 1984) is a dominant theoretical base increasingly drawn on within Strategic Management. While theoretical contributions applying RBV in the domain of entrepreneurship can arguably be traced back to Penrose (1959), there has been renewed attention recently (e.g. Alvarez & Busenitz, 2001; Alvarez & Barney, 2004). This said, empirical work is in its infancy. In part, this may be due to a lack of well developed measuring instruments for testing ideas derived from RBV. The purpose of this study is to develop a measurement scales that can serve to assist such empirical investigations. In so doing we will try to overcome three deficiencies in current empirical measures used for the application of RBV to the entrepreneurship arena. First, measures for resource characteristics and configurations associated with typical competitive advantages found in entrepreneurial firms need to be developed. These include such things as alertness and industry knowledge (Kirzner, 1973), flexibility (Ebben & Johnson, 2005), strong networks (Lee et al., 2001) and within knowledge intensive contexts, unique technical expertise (Wiklund and Shepard, 2003). Second, the RBV has the important limitations of being relatively static and modelled on large, established firms. In that context, traditional RBV focuses on competitive advantages. However, newly established firms often face disadvantages, especially those associated with the liabilities of newness (Aldrich & Auster, 1986). It is therefore important in entrepreneurial contexts to expand to an investigation of responses to competitive disadvantage through an RBV lens. Conversely, recent research has suggested that resource constraints actually have a positive effect on firm growth and performance under some circumstances (e.g., George, 2005; Katila & Shane, 2005; Mishina et al., 2004; Mosakowski, 2002; cf. also Baker & Nelson, 2005). Third, current empirical applications of RBV measured levels or amounts of particular resources available to a firm. They infer that these resources deliver firms competitive advantage by establishing a relationship between these resource levels and performance (e.g. via regression on profitability). However, there is the opportunity to directly measure the characteristics of resource configurations that deliver competitive advantage, such as Barney´s well known VRIO (Valuable, Rare, Inimitable and Organized) framework (Barney, 1997). Key Propositions and Methods: The aim of our study is to develop and test scales for measuring resource advantages (and disadvantages) and inimitability for entrepreneurial firms. The study proceeds in three stages. The first stage developed our initial scales based on earlier literature. Where possible, we adapt scales based on previous work. The first block of the scales related to the level of resource advantages and disadvantages. Respondents were asked the degree to which each resource category represented an advantage or disadvantage relative to other businesses in their industry on a 5 point response scale: Major Disadvantage, Slight Disadvantage, No Advantage or Disadvantage, Slight Advantage and Major Advantage. Items were developed as follows. Network capabilities (3 items) were adapted from (Madsen, Alsos, Borch, Ljunggren & Brastad, 2006). Knowledge resources marketing expertise / customer service (3 items) and technical expertise (3 items) were adapted from Wiklund and Shepard (2003). flexibility (2 items), costs (4 items) were adapted from JIBS B97. New scales were developed for industry knowledge / alertness (3 items) and product / service advantages. The second block asked the respondent to nominate the most important resource advantage (and disadvantage) of the firm. For the advantage, they were then asked four questions to determine how easy it would be for other firms to imitate and/or substitute this resource on a 5 point likert scale. For the disadvantage, they were asked corresponding questions related to overcoming this disadvantage. The second stage involved two pre-tests of the instrument to refine the scales. The first was an on-line convenience sample of 38 respondents. The second pre-test was a telephone interview with a random sample of 31 Nascent firms and 47 Young firms (< 3 years in operation) generated using a PSED method of randomly calling households (Gartner et al. 2004). Several items were dropped or reworded based on the pre-tests. The third stage (currently in progress) is part of Wave 1 of CAUSEE (Nascent Firms) and FEDP (Young Firms), a PSED type study being conducted in Australia. The scales will be tested and analysed with a random sample of approximately 700 Nascent and Young firms respectively. In addition, a judgement sample of approximately 100 high potential businesses in each category will be included. Findings and Implications: The paper will report the results of the main study (stage 3 – currently data collection is in progress) will allow comparison of the level of resource advantage / disadvantage across various sub-groups of the population. Of particular interest will be a comparison of the high potential firms with the random sample. Based on the smaller pre-tests (N=38 and N=78) the factor structure of the items confirmed the distinctiveness of the constructs. The reliabilities are within an acceptable range: Cronbach alpha ranged from 0.701 to 0.927. The study will provide an opportunity for researchers to better operationalize RBV theory in studies within the domain of entrepreneurship. This is a fundamental requirement for the ability to test hypotheses derived from RBV in systematic, large scale research studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we respond to calls for an institution-based perspective on strategy. With its emphasis upon mimetic, coercive, and normative isomorphism, institutional theory has earned a deterministic reputation and seems an unlikely foundation on which to construct a theory of strategy. However, a second movement in institutional theory is emerging that gives greater emphasis to creativity and agency. We develop this approach by highlighting co-evolutionary processes that are shaping the varieties of capitalism (VoC) in Asia. To do so, we examine the extent to which the VoC model can be fruitfully applied in the Asian context. In the spirit of the second movement of institutional theory, we describe three processes in which firm strategy collectively and intentionally feeds back to shape institutions: (1) filling institutional voids, (2) retarding institutional innovation, and (3) deploying institutional escape. We outline the key contributions contained in the articles of this Special Issue and discuss a research agenda generated by the VoC perspective.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this study is to investigate how secondary school media educators might best meet the needs of students who prefer practical production work to ‘theory’ work in media studies classrooms. This is a significant problem for a curriculum area that claims to develop students’ media literacies by providing them with critical frameworks and a metalanguage for thinking about the media. It is a problem that seems to have become more urgent with the availability of new media technologies and forms like video games. The study is located in the field of media education, which tends to draw on structuralist understandings of the relationships between young people and media and suggests that students can be empowered to resist media’s persuasive discourses. Recent theoretical developments suggest too little emphasis has been placed on the participatory aspects of young people playing with, creating and gaining pleasure from media. This study contributes to this ‘participatory’ approach by bringing post structuralist perspectives to the field, which have been absent from studies of secondary school media education. I suggest theories of media learning must take account of the ongoing formation of students’ subjectivities as they negotiate social, cultural and educational norms. Michel Foucault’s theory of ‘technologies of the self’ and Judith Butler’s theories of performativity and recognition are used to develop an argument that media learning occurs in the context of students negotiating various ‘ethical systems’ as they establish their social viability through achieving recognition within communities of practice. The concept of ‘ethical systems’ has been developed for this study by drawing on Foucault’s theories of discourse and ‘truth regimes’ and Butler’s updating of Althusser’s theory of interpellation. This post structuralist approach makes it possible to investigate the ways in which students productively repeat and vary norms to creatively ‘do’ and ‘undo’ the various media learning activities with which they are required to engage. The study focuses on a group of year ten students in an all boys’ Catholic urban school in Australia who undertook learning about video games in a three-week intensive ‘immersion’ program. The analysis examines the ethical systems operating in the classroom, including formal systems of schooling, informal systems of popular cultural practice and systems of masculinity. It also examines the students’ use of semiotic resources to repeat and/or vary norms while reflecting on, discussing, designing and producing video games. The key findings of the study are that students are motivated to learn technology skills and production processes rather than ‘theory’ work. This motivation stems from the students’ desire to become recognisable in communities of technological and masculine practice. However, student agency is not only possible through critical responses to media, but through performative variation of norms through creative ethical practices as students participate with new media technologies. Therefore, the opportunities exist for media educators to create the conditions for variation of norms through production activities. The study offers several implications for media education theory and practice including: the productive possibilities of post structuralism for informing ways of doing media education; the importance of media teachers having the autonomy to creatively plan curriculum; the advantages of media and technology teachers collaborating to draw on a broad range of resources to develop curriculum; the benefits of placing more emphasis on students’ creative uses of media; and the advantages of blending formal classroom approaches to media education with less formal out of school experiences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This chapter will address psychodynamic, cognitive-behavioural, and developmental models in supervision by initially considering the historical underpinnings of each and then examining in turn some of the key processes that are evident in the supervisory relationships. Case studies are included where appropriate to highlight the application of theory to practice and several processes are fully elaborated over all models to enable a contemporary view of style and substance in the supervision context.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper argues that media and communications theory, as with cultural and creative industries analysis, can benefit from a deeper understanding of economic growth theory. Economic growth theory is elucidated in the context of both cultural and media studies and with respect to modern Chinese economic development. Economic growth is a complex evolutionary process that is tightly integrated with socio-cultural and political processes. This paper seeks to explore this mechanism and to advance cultural theory from an erstwhile political economy perspective to one centred about the co-evolutionary dynamics of economic and socio-political systems. A generic model is presented in which economic and social systems co-evolve through the origination, adoption and retention of new ideas, and in which the creative industries are a key part of this process. The paper concludes that digital media capabilities are a primary source of economic development.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the increasing growth of cultural events both in Australia and internationally, there has also been an increase in event management studies; in theory and in practice. Although a series of related knowledge and skills required specifically by event managers has already been identified by many researchers (Perry et al., 1996; Getz, 2002 & Silvers et al., 2006) and generic event management models proposed, including ‘project management’ strategies in an event context (Getz, 2007), knowledge gaps still exist in relation to identifying specific types of events, especially for not-for-profit arts events. For events of a largely voluntary nature, insufficient resources are recognised as the most challenging; including finance, human resources and infrastructure. Therefore, the concepts and principles which are adopted by large scale commercial events may not be suitable for not-for-profit arts events aiming at providing professional network opportunities for artists. Building partnerships are identified as a key strategy in developing an effective event management model for this type of event. Using the 2008 World Dance Alliance Global Summit (WDAGS) in Brisbane 13-18 July, as a case study, the level, nature and relationship of key partners are investigated. Data is triangulated from interviews with organisers of the 2008 WDAGS, on-line and email surveys of delegates, participant observation and analysis of formal and informal documents, to produce a management model suited to this kind of event.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Up front I am impelled to acknowledge an intellectual debt to Raewyn Connell as one of my PhD supervisors about 20 years ago and as having a lasting influence on my own sociological approach to research. One of key themes of this book is that southern theorists are rarely read in the northern hemisphere. This is not the case for Connell, however, one of Australia’s most internationally renowned scholars. The tome reads as the creative outpouring of her lifelong thirst for social science. Its main claim is that southern theory ‘has as much intellectual power as metropolitan social thought, and more political relevance’ (p. xii). A big but compelling claim, as I will explain.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.