5 resultados para Conspiracy

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un trusted third party (UTTP) was proposed. Based on the idea of all-o>nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol pro vided mechanisms to trace piracy and protect customer's right, fn addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conspiracy Theory (CT) endorsers believe in an omnipresent, malevolent, and highly coordinated group that wields secret influence for personal gain, and credit this group with the responsibility for many noteworthy events. Two explanations for the emergence of CTs are that they result from social marginalisation and a lack of agency, or that they are due to a need-to-explain-the-unexplained. Furthermore, representativeness heuristics may form reasoning biases that make such beliefs more likely. Two related studies (N = 107; N = 120) examined the relationships between these social marginalisation, intolerance of uncertainty, heuristics and CT belief using a correlational design. Overall, intolerance of uncertainty did not link strongly to CT belief, but worldview variables did - particularly a sense of the world as (socially) threatening, non-random, and with no fixed morality. The use of both representative heuristics that were examined was heightened in those participants more likely to endorse CTs. These factors seem to contribute to the likelihood of whether the individual will endorse CTs generally, relating similarly to common CTs, CTs generally historically accepted as "true", and to the endorsement of fictional CTs that the individual would find novel. Implications are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the World Cup for soccer draws to its conclusion, a look back on the standard of refereeing at this tournament. It's been the hot topic of the World Cup, with accusations and conspiracy theories flying thick and fast as powerful teams have fallen to lesser soccer countries. So has the refereeing been unjustifiably bad?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The pyjama girl was an unknown woman, found dumped by a road nesrl Albury in 1934. She had been brutally murdered. Who was she, and who killed her, become Australia's great unsolved crime for decades. The body was preserved in formalin, her image circulated around the world. The mystery fascinated the nation and, for some, became an obsession. Ten years later, the body was identified and a man was convicted of her manslaughter. The case, it seemed, was neatlty solved. But this 'solution', advanced by police, accepted by the courts and the media, and since repeated endlessly, was a lie. Behind the lie is a troubling story of murder and obsession, of a wild conspiracy theory, of police corruption and a miscarriage of justice, and of a real killing which floated free from reality and became a myth.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the existing watermarking protocols, a trusted third party (TTP) is introduced to guarantee that a protocol is fair to both the seller and buyer in a digital content transaction. However, the TTP decreases the security and affects the protocol implementation. To address this issue, in this article a secure buyer–seller watermarking protocol without the assistance of a TTP is proposed in which there are only two participants, a seller and a buyer. Based on the idea of sharing a secret, a watermark embedded in digital content to trace piracy is composed of two pieces of secret information, one produced by the seller and one by the buyer. Since neither knows the exact watermark, the buyer cannot remove the watermark from watermarked digital content, and at the same time the seller cannot fabricate piracy to frame an innocent buyer. In other words, the proposed protocol can trace piracy and protect the customer’s rights. In addition, because no third party is introduced into the proposed protocol, the problem of a seller (or a buyer) colluding with a third party to cheat the buyer (or the seller), namely, the conspiracy problem, can be avoided.