12 resultados para user relations
em WestminsterResearch - UK
Resumo:
Adequate user authentication is a persistent problem, particularly with mobile devices, which tend to be highly personal and at the fringes of an organisation's influence. Yet these devices are being used increasingly in various business settings, where they pose a risk to security and privacy, not only from sensitive information they may contain, but also from the means they typically offer to access such information over wireless networks. User authentication is the first line of defence for a mobile device that falls into the hands of an unauthorised user. However, motivating users to enable simple password mechanisms and periodically update their authentication information is difficult at best. This paper examines some of the issues relating to the use of biometrics as a viable method of authentication on mobile wireless devices. It is also a critical analysis of some of the techniques currently employed and where appropriate, suggests novel hybrid ways in which they could be improved or modified. Both biometric technology and wireless setting based constraints that determine the feasibility and the performance of the authentication feature are specified. Some well known biometric technologies are briefly reviewed and their feasibility for wireless and mobile use is reviewed. Furthermore, a number of quantitative and qualitative parameters for evaluation are also presented. Biometric technologies are continuously advancing toward commercial implementation in wireless devices. When carefully designed and implemented, the advantage of biometric authentication arises mainly from increased convenience and coexistent improved security.
Resumo:
In democratic polities, constitutional equilibria or balances of power between the executive and the legislature shift over time. Normative and empirical political theorists have long recognised that war, civil unrest, economic and political crises, terrorist attacks, and other events strengthen the power of the executive, disrupt and threaten constitutional politics, and damage democratic institutions: crises require swift action and executives are thought to be more capable than parliaments and legislatures of taking such actions. The terrorist attacks on New York and Washington on 11 September 2001 and the ensuing so-called 'war on terror' declared by President Bush clearly constituted a crisis, not only in the United States but also in other political systems, in part because of the US's hegemonic position in defining and shaping many other states' foreign and domestic policies. Dicey, Schmitt, and Rossiter suggest that critical events and political crises inevitably trigger the concentration of (emergency) powers in the hands of the executive. Aristotle and Machiavelli questioned the inevitability of this process. This article and the articles that follow in this Special Issue utilise empirical evidence, through the use of case studies of the United States, the United Kingdom, Russia, Australia, Israel, Italy and Indonesia, to address this debate. Specifically, the issue explores to what extent the external shock or crisis of 9/11 (and other terrorist attacks) and the ensuing 'war on terror' significantly changed the balance of executive-legislative relations from t (before the crisis) to t+1 (after the crisis) in these political systems, all of which were the targets of actual or foiled terrorist attacks. The most significant findings are that the shock of 9/11 and the 'war on terror' elicited varied responses by national executives and legislatures/parliaments and thus the balance of executive-legislative relations in different political systems; that, therefore, executive-legislative relations are positive rather than zero-sum; and that domestic political contexts conditioned these institutional responses.
Resumo:
This paper describes the impact of cloud computing and the use of GPUs on the performance of Autodock and Gromacs respectively. Cloud computing was applicable to reducing the ‘‘tail’’ seen in running Autodock on desktop grids and the GPU version of Gromacs showed significant improvement over the CPU version. A large (200,000 compounds) library of small molecules, seven sialic acid analogues of the putative substrate and 8000 sugar molecules were converted into pdbqt format and used to interrogate the Trichomonas vaginalis neuraminidase using Autodock Vina. Good binding energy was noted for some of the small molecules (~-9 kcal/mol), but the sugars bound with affinity of less than -7.6 kcal/mol. The screening of the sugar library resulted in a ‘‘top hit’’ with a-2,3-sialyllacto-N-fucopentaose III, a derivative of the sialyl Lewisx structure and a known substrate of the enzyme. Indeed in the top 100 hits 8 were related to this structure. A comparison of Autodock Vina and Autodock 4.2 was made for the high affinity small molecules and in some cases the results were superimposable whereas in others, the match was less good. The validation of this work will require extensive ‘‘wet lab’’ work to determine the utility of the workflow in the prediction of potential enzyme inhibitors.
Resumo:
Tracing children’s values and value-expressive behavior over a sixth-month period, we examined stability and change of values and behavior and the reciprocal relations between them. Three hundred and ten sixth-grade students in Italy completed value and value-expressive behavior questionnaires three times in three-month intervals during the scholastic year. We assessed Schwartz's (1992) higher-order values of conservation, openness to change, self-enhancement, and self-transcendence, as well as their respective expressive behaviors. Reciprocal relations over time between values and behaviors were examined using a cross-lagged longitudinal design. Results showed that values and behaviors had reciprocal longitudinal effects on one another, after the stability of the variables was taken into account (i.e., values predicted change in behaviors, but also behaviors predicted change in values). Our findings also revealed that: (1) values were more stable over time than behaviors, and (2) the longitudinal effect of values on behaviors tended to be stronger than the longitudinal effect of behaviors on values. Findings are discussed in light of the recent developmental literature on value change.
Resumo:
The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants - insulated from the minutiae of hardware maintenance - rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating operations to IaaS platforms due to security concerns. In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. We continue with an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.
Resumo:
In this paper we argue that Niccolò Machiavelli has little to do with Realism in International Relations theory. By concentrating, as Machaivelli did, on the walls that define political relations—both inside and outside the polity—we find his insights deeply rooted in the specific political contexts of Sixteenth century Italy. Others may wish to generalize from them, but Machiavelli did not. In fact, as we show, Machiavelli was mindful of the difficulties of generalizing about walls and acknowledged the dangers political actors faced in navigating between the internal and external walls of the polity. We examine the geopolitical contours of Machiavelli’s walls and seek to demonstrate how morality is present in these historical spaces. In contrast to Realists, Machiavelli was ready and willing to make ethical judgments. We argue that theorists of international politics should exercise care in reaching for Machiavelli as the iconic thinker for making sense of anarchy in world politics. This article concludes by suggesting that the ideology of Machiavellianism has obscured deeper understanding of the particular contexts of Machiavelli’s own world.
Resumo:
The use of perceptual inputs is an emerging area within HCI that suggests a developing Perceptual User Interface (PUI) that may prove advantageous for those involved in mobile serious games and immersive social network environments. Since there are a large variety of input devices, software platforms, possible interactions, and myriad ways to combine all of the above elements in pursuit of a PUI, we propose in this paper a basic experimental framework that will be able to standardize study of the wide range of interactive applications for testing efficacy in learning or information retrieval and also suggest improvements to emerging PUIs by enabling quick iteration. This rapid iteration will start to define a targeted range of interactions that will be intuitive and comfortable as perceptual inputs, and enhance learning and information retention in comparison to traditional GUI systems. The work focuses on the planning of the technical development of two scenarios, and the first steps in developing a framework to evaluate these and other PUIs for efficacy and pedagogy.
Resumo:
This paper explores responses to the exposure of blacklisting in the UK construction industry in the period following the closure of the Consulting Association (CA) in 2009. It asks whether employer collusion to blacklist in this way has been terminated and concludes that it is now largely of historical interest although other forms of anti-union activity continue. It highlights particularly the historic and continuing importance of ‘double breasting’ and reports on divergent employer paths in the aftermath of the exposure and subsequent closure of the activities of the CA.