9 resultados para Referees

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper contributes to the recent debate about the role of referees in the home advantage phenomenon. Specifically, it aims to provide a convincing answer to the newly posed question of the existence of individual differences among referees in terms of the home advantage (Boyko, Boyko, & Boyko, 2007; Johnston, 2008). Using multilevel modelling on a large and representative dataset we find that (1) the home advantage effect differs significantly among referees, and (2) this relationship is moderated by the size of the crowd. These new results suggest that a part of the home advantage is due to the effect of the crowd on the referees, and that some referees are more prone to be influenced by the crowd than others. This provides strong evidence to indicate that referees are a significant contributing factor to the home advantage. The implications of these findings are discussed both in terms of the relevant social psychological research, and with respect to the selection, assessment, and training of referees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

How and why football referees made decisions was investigated. A constructivist grounded theory methodology was undertaken to tap into the experiential knowledge of referees. The participant cohort comprised 7 A-League referees (aged 23 to 35) and 8 local Brisbane league referees (aged 20 to 50), spanning the lowest to highest levels of competition in men’s football in Australia. Results found that referees used ‘four pillars’ to underpin their judgments, these were conceptual notions of: safety, fairness, accuracy and entertainment. A fifth pillar ‘consistency’ referred to the referee’s ‘contextual sensitivity’. Results were explained using an ecological dynamics framework that emphasises the individual-environment scale of analysis. It was concluded that interacting constraints shape emergent decision-making in referees which are nested in task goals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Drawing on the textual evidence of a number of referees’ reports, this article maps key differences between the humanities and social sciences approaches to the study of pornography, in order to facilitate better understanding and communication between the areas. 1. Social scientists avoid ‘vulgar’ language to describe sex. Humanities scholars need not do so. 2. Social scientists remain committed to the idea of ‘objectivity’ while humanities scholars reject the idea – although this may be a confusion in language, with the term in the social sciences used to mean something more like ‘falsifiability’. 3. Social science assumes that the primary effects of exposure to pornography must be negative. 4. More generally, social science resists paradigm changes, insisting that all new work agrees with research that has gone before. 5. Social science believes that casual sex and sadomasochism are negative; humanities research need not do so.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The expansion of economics to ‘non-market topics’ has received increased attention in recent years. The economics of sports (football) is such a sub-field. This paper reports empirical evidence of team and referee performances in the FIFA World Cup 2002. The results reveal that being a hosting nation has a significant impact on the probability of winning a game. Furthermore, the strength of a team measured with the FIFA World Ranking does not play the important role presumed, which indicates that the element of uncertainty is working. The findings also indicate that the influence of a referee on the game result should not be neglected. Finally, the previous World Cup experiences seem to have the strongest impact on referees' performances during the game.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evaluation, selection and finally decision making are all among important issues, which engineers face in long run of projects. Engineers implement mathematical and nonmathematical methods to make accurate and correct decisions, whenever needed. As extensive as these methods are, effects of any selected method on outputs achieved and decisions made are still suspicious. This is more controversial and challengeable, where evaluation is made among non-quantitative alternatives. In civil engineering and construction management problems, criteria include both quantitative and qualitative ones, such as aesthetic, construction duration, building and operation costs, and environmental considerations. As the result, decision making frequently takes place among non-quantitative alternatives. It should be noted that traditional comparison methods, including clear-cut and inflexible mathematics, have always been criticized. This paper demonstrates a brief review of traditional methods of evaluating alternatives. It also offers a new decision making method using, fuzzy calculations. The main focus of this research is some engineering issues, which have flexible nature and vague borders. Suggested method provides analyzability of evaluation for decision makers. It is also capable to overcome multi criteria and multi-referees problems. In order to ease calculations, a program named DeMA is introduced.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Undertaking a Cochrane systematic review can be an incredibly rewarding experience. It is however a challenging and time-consuming task. The Cochrane Handbook for Systematic Reviews of Interventions1 provides an essential resource to help reviewers navigate the often complex methodological issues of systematic review research. Additional guidelines have been developed for those undertaking reviews of public health topics,2 and Cochrane Centres throughout the world offer invaluable training opportunities. This emphasis on training and methodological rigour has helped Cochrane reviews become one of the most respected sources of synthesized research available. Even with the assistance available, however, many authors with good intentions register titles and prepare protocols but fail to publish the completed review. Data extracted from Cochrane’s Information Management System (Archie) in June 2010 showed that there were 1,301 titles registered more than two years ago that have not been published as a full review.3 Of these registered titles, 697 have had protocols published (25 are no longer active) while 604 have not even progressed to this stage (154 are no longer active). There are also 146 protocols that have been published for more than two years without being converted into completed reviews. These registered titles and protocols that have not yet progressed to a completed review represent a significant amount of time and energy invested by review authors, Cochrane editorial staff and, in some cases, external referees...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

By using information collected from numerous American Economic Review publications from the last 100 years, Torgler and Piatti examine the top publishing institutions to determine their most renowned AER papers based on citation success. Areas of interest include how often an individual can publish in the AER, how equally successful citations are distributed and who the top AER publishing authors are. The book explores what the level of cooperation is among authors and what drives systems such as the alphabetical name ordering. Torgler and Piatti critically examine the individual characteristics of AER authors, editors, editorial board members and referees and even tackle more intricate details such as the frequency of female publications in the AER. The authors observe and analyse the relationship between academic age and publication performance to see if there is any pattern on these factors and citation success. The book then goes on to analyse data concerning awards, and whether awards can increase the probability of publishing in the AER at a later stage

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.