50 resultados para secret shopping


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although consumer perception of the health claims and nutrition information has been studied widely there is relatively little understanding about the motivational factors underpinning claim perception. The objective of this study is to investigate how levels of perceived relevance influence consumers’ responses to health claims that either promise to reduce a targeted disease risk or improve well-being in comparison to other types of health-related messages, and how attitudes towards nutritionally healthy eating, functional food and previous experience relating to products with health claims affect the consumers’ perceptions of nutrition and health claims. The data (N=2385) were collected by paper and pencil surveys in Finland, the UK, Germany and Italy on a target group of consumers over 35 year old, solely or jointly responsible for the family’s food shopping. The results showed that relevance has a strong influence on perceptions of personal benefit and willingness to buy products with health claims. However the impact of relevance is much stronger when the health risks are relevant to self than when it is relevant to those close to oneself, especially when the claim promises a targeted risk reduction with detailed information about function and health outcome. Previous experience with products with health claims and interest in nutritionally healthy eating promoted the utility of all claims, regardless of whether they were health or nutrition claims. However, to be influenced by health claims consumers also need to have a positive attitude towards functional food products.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A rapidly increasing number of Web databases are now become accessible via
their HTML form-based query interfaces. Query result pages are dynamically generated
in response to user queries, which encode structured data and are displayed for human
use. Query result pages usually contain other types of information in addition to query
results, e.g., advertisements, navigation bar etc. The problem of extracting structured data
from query result pages is critical for web data integration applications, such as comparison
shopping, meta-search engines etc, and has been intensively studied. A number of approaches
have been proposed. As the structures of Web pages become more and more complex, the
existing approaches start to fail, and most of them do not remove irrelevant contents which
may a®ect the accuracy of data record extraction. We propose an automated approach for
Web data extraction. First, it makes use of visual features and query terms to identify data
sections and extracts data records in these sections. We also represent several content and
visual features of visual blocks in a data section, and use them to ¯lter out noisy blocks.
Second, it measures similarity between data items in di®erent data records based on their
visual and content features, and aligns them into di®erent groups so that the data in the
same group have the same semantics. The results of our experiments with a large set of
Web query result pages in di®erent domains show that our proposed approaches are highly
e®ective.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cities are constantly changing, and city centres are the pinnacle of that change. In the last hundred years these changes have been dramatic, transforming city centres from a complex combination of uses into exclusively retail and leisure areas. Meanwhile, most residents of city centres fled to the suburbs, removing much of the livelihood of central areas. These transformations has been stronger in Northern Europe and especially in English speaking countries, where zoning policies were instrumental in urban development since the 1960s. This process along with the rise of shopping malls left many city centre streets lifeless, which in turn caused the dereliction and demolition of significant heritage areas and buildings. Belfast is no exception, where the broad process of suburbanization and zoning since the 1970s produced a city centre for either retail or dereliction, where much built heritage has been lost or is at risk of being lost.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rationale, aims and objectives: This study aims to examine the public's knowledge and perceptions of connected health (CH).

Methods: A structured questionnaire was administered by face-to-face interview to an opportunistic sample of 1003 members of the public in 11 shopping centres across Northern Ireland (NI). Topics included public knowledge of CH, opinions about who should provide CH and views about the use of computers in health care. Multivariable analyses were conducted to assess respondents' willingness to use CH in the future.

Results: Sixty-seven per cent of respondents were female, 31% were less than 30 years old and 22% were over 60 years. Most respondents had never heard of CH (92%). Following a standard definition, the majority felt CH was a good idea (≈90%) and that general practitioners were in the best position to provide CH; however, respondents were equivocal about reductions in health care professionals' workload and had some concerns about the ease of device use. Factors positively influencing willingness to use CH in the future included knowledge of someone who has a chronic disease, residence in NI since birth and less concern about the use of information technology (IT) in health care. Those over 60 years old or who felt threatened by the use of IT to store personal health information were less willing to use CH in the future.

Conclusion: Increased public awareness and education about CH is required to alleviate concerns and increase the acceptability of this type of care.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"Land, Popular Politics and Agrarian Violence in Ireland" provides an original and insightful study of the highly formative Land War and Home Rule from a local and regional perspective. Lucey examines the emergence and development of the largest mass political mobilisation brought about in nineteenth-century Ireland in the form of the Land League, and subsequently the National League, in the south-western county of Kerry. Such an unprecedented level of local political activity was matched by an upsurge in agrarian violence and the outbreak of serious outrage, which was largely orchestrated by secret societies known as Moonlighters. In turn, this book provides an important exploration of the dynamics behind the mass political mobilisation and agrarian violence that dominated Kerry society during the 1880s. The role of Fenians, radical agrarian agitators and moderate constitutional nationalists are all examined within the county.This study has importance beyond the local and provides a range of insights into motivations behind political action and violence at an everyday level during one of the most seminal and transformative eras in the development of modern Irish history. This title is suitable for students and academics of nineteenth-century Irish history and general readers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Arguably, the myth of Shakespeare is a myth of universality. Much has been written about the dramatic, thematic and ‘humanistic’ transference of Shakespeare’s works: their permeability, transcendence of cultures and histories, geographies and temporalities. Located within this debate is a belief that this universality, among other dominating factors, is founded upon the power and poeticism of Shakespeare’s language. Subsequently, if we acknowledge Frank Kermode’s assertion that “the life of the plays is the language” and “the secret (of Shakespeare’s works) is in the detail,” what then becomes of this myth of universality, and how is Shakespeare’s language ‘transferred’ across cultures? In Asian intercultural adaptations, language becomes the primary site of confrontation as issues of semantic accuracy and poetic affiliation abound. Often, the language of the text is replaced with a cultural equivalent or reconceived with other languages of the stage – song and dance, movement and music; metaphor and imagery consequently find new voices. Yet if myth is, as Roland Barthes propounds, a second-order semiotic system that is predicated upon the already constituted sign, here being language, and myth is parasitical on language, what happens to the myth of Shakespeare in these cultural re-articulations? Wherein lies the ‘universality’? Or is ‘universality’ all that it is – an insubstantial (mythical) pageant? Using Ong Keng Sen’s Search Hamlet (2002), this paper would examine the transference of myth and / as language in intercultural Shakespeares. If, as Barthes argues, myths are to be understood as metalanguages that adumbrate social hegemonies, intercultural imaginings of Shakespeare can be said to expose the hollow myth of universality yet in a paradoxical double-bind reify and reinstate this self-same myth.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting secret keys. Template attacks assume a strong adversarial model, in that an attacker has an identical device with which to profile the power consumption of various operations. This can then be used to efficiently attack the target device. Inherent in this assumption is that the power consumption across the devices under test is somewhat similar. This central tenet of the attack is largely unexplored in the literature with the research community generally performing the profiling stage on the same device as being attacked. This is beneficial for evaluation or penetration testing as it is essentially the best case scenario for an attacker where the model built during the profiling stage matches exactly that of the target device, however it is not necessarily a reflection on how the attack will work in reality. In this work, a large scale evaluation of this assumption is performed, comparing the key recovery performance across 20 identical smart-cards when performing a profiling attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new niche of densely populated, unprotected networks is becoming more prevalent in public areas such as Shopping Malls, defined here as independent open-access networks, which have attributes that make attack detection more challenging than in typical enterprise networks. To address these challenges, new detection systems which do not rely on knowledge of internal device state are investigated here. This paper shows that this lack of state information requires an additional metric (The exchange timeout window) for detection of WLAN Denial of Service Probe Flood attacks. Variability in this metric has a significant influence on the ability of a detection system to reliably detect the presence of attacks. A parameter selection method is proposed which is shown to provide reliability and repeatability in attack detection in WLANs. Results obtained from ongoing live trials are presented that demonstrate the importance of accurately estimating probe request and probe response timeouts in future Independent Intrusion Detection Systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The preferences of users are important in route search and planning. For example, when a user plans a trip within a city, their preferences can be expressed as keywords shopping mall, restaurant, and museum, with weights 0.5, 0.4, and 0.1, respectively. The resulting route should best satisfy their weighted preferences. In this paper, we take into account the weighted user preferences in route search, and present a keyword coverage problem, which finds an optimal route from a source location to a target location such that the keyword coverage is optimized and that the budget score satisfies a specified constraint. We prove that this problem is NP-hard. To solve this complex problem, we pro- pose an optimal route search based on an A* variant for which we have defined an admissible heuristic function. The experiments conducted on real-world datasets demonstrate both the efficiency and accu- racy of our proposed algorithms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report summarizes our results from security analysis covering all 57 competitions for authenticated encryption: security, applicability, and robustness (CAESAR) first-round candidates and over 210 implementations. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers have been withdrawn from the competition. We have developed a testing framework, BRUTUS, to facilitate automatic detection of simple security lapses and susceptible statistical structures across all ciphers. From this testing, we have security usage notes on four submissions and statistical notes on a further four. We highlight that some of the CAESAR algorithms pose an elevated risk if employed in real-life protocols due to a class of adaptive-chosen-plaintext attacks. Although authenticated encryption with associated data are often defined (and are best used) as discrete primitives that authenticate and transmit only complete messages, in practice, these algorithms are easily implemented in a fashion that outputs observable ciphertext data when the algorithm has not received all of the (attacker-controlled) plaintext. For an implementor, this strategy appears to offer seemingly harmless and compliant storage and latency advantages. If the algorithm uses the same state for secret keying information, encryption, and integrity protection, and the internal mixing permutation is not cryptographically strong, an attacker can exploit the ciphertext–plaintext feedback loop to reveal secret state information or even keying material. We conclude that the main advantages of exhaustive, automated cryptanalysis are that it acts as a very necessary sanity check for implementations and gives the cryptanalyst insights that can be used to focus more specific attack methods on given candidates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The home visit is at the heart of social work practice with children and families; it is what children and families' social workers do more than any other single activity (except for recording), and it is through the home visit that assessments are made on a daily basis about risk, protection and welfare of children. And yet it is, more than any other activity, an example of what Pithouse has called an ‘invisible trade’: it happens behind closed doors, in the most secret and intimate spaces of family life. Drawing on conceptual tools associated with the work of Foucault, this article sets out to provide a critical, chronological review of research, policy and practice on home visiting. We aim to explain how and in what ways changing discourses have shaped the emergence, legitimacy, research and practice of the social work home visit to children and families at significant time periods and in a UK context. We end by highlighting the importance for the social work profession of engagement and critical reflection on the identified themes as part of their daily practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most cryptographic devices should inevitably have a resistance against the threat of side channel attacks. For this, masking and hiding schemes have been proposed since 1999. The security validation of these countermeasures is an ongoing research topic, as a wider range of new and existing attack techniques are tested against these countermeasures. This paper examines the side channel security of the balanced encoding countermeasure, whose aim is to process the secret key-related data under a constant Hamming weight and/or Hamming distance leakage. Unlike previous works, we assume that the leakage model coefficients conform to a normal distribution, producing a model with closer fidelity to real-world implementations. We perform analysis on the balanced encoded PRINCE block cipher with simulated leakage model and also an implementation on an AVR board. We consider both standard correlation power analysis (CPA) and bit-wise CPA. We confirm the resistance of the countermeasure against standard CPA, however, we find with a bit-wise CPA that we can reveal the key with only a few thousands traces.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Channel randomness can be exploited to generate secret keys. However, to ensure secrecy, it is necessary that the channel response of any eavesdropping party remain sufficiently de-correlated with that of the legitimate users'. In this paper, we investigate whether such de-correlation occurs for a body area network (BAN) operating in an indoor environment at 2.45 GHz. The hypothetical BAN configuration consisted of two legitimate transceivers, one situated on the user's left wrist and the other on the user's waist. The eavesdroppers were positioned in either a co-located or distributed manner in the area surrounding the BAN user. Using the simultaneous channel response measured at the legitimate BAN nodes and the eavesdropper positions for stationary and mobile scenarios, we analyze the localized correlation coefficient. This allows us to determine if it is possible to generate secret keys in the presence of multiple eavesdroppers in an indoor environment. Our experimental results show that although channel reciprocity was observed for both the stationary and the mobile scenarios, a higher de-correlation between the legitimate users' channels was observed for the stationary case. This indicates that mobile scenarios are better suited for secret key generation.