922 resultados para secure protocal


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research has established that firms' IT-related capabilities at a point in time explain IT-related performance differences across firms. IT resources, however, are dynamic, and evolve at an exponential rate. This means we need to understand how to sustain firms' existing capabilities to leverage opportunities offered by new IT resources. Wet suggests a higher-level resource that can sustain firms' existing IT-related capabilities. Second, we report on the development of a valid and reliable measurement instrument for measuring this higher-level resource in four stages, which includes expert feedback and a field test. The validated instrument would be useful in extending the IT business value studies to investigate how firms can sustain their IT-related capabilities. This effort will provide a deeper understanding of how firms can secure sustainable IT-related business value from their acquired IT resources.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Work integrated learning (WIL) or professional practice units are recognised as providing learning experiences that help students make successful transitions to professional practice. These units require students to engage in learning in the workplace; to reflect on this learning; and to integrate it with learning at university. However, an analysis of a recent cohort of property economics students at a large urban university provides evidence that there is great variation in work based learning experiences undertaken and that this impacts on students’capacity to respond to assessment tasks which involve critiquing these experiences in the form of reflective reports. This paper highlights the need to recognise the diversity of work based experiences; the impact this has on learning outcomes; and to find more effective and equitable ways of measuring these outcomes. The paper briefly discusses assessing learning outcomes in WIL and then describes the model of WIL in the Faculty of Built Environment and Engineering at the Queensland University of Technology (QUT). The paper elaborates on the diversity of students’ experiences and backgrounds including variations in the length of work experience, placement opportunities and conditions of employment.For example, the analysis shows that students with limited work experience often have difficulty critiquing this work experience and producing high level reflective reports. On the other hand students with extensive, discipline relevant work experience can be frustrated by assessment requirements that do not take their experience into account. Added to this the Global Financial Crisis (GFC) has restricted both part time and full time placement opportunities for some students. These factors affect students’ capacity to a) secure a relevant work experience, b) reflect critically on the work experiences and c) appreciate the impact the overall experience can have on their learning outcomes and future professional opportunities. Our investigation highlights some of the challenges faced in implementing effective and equitable approaches across diverse student cohorts. We suggest that increased flexibility in assessment requirements and increased feedback from industry may help address these challenges.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive medical data should be encrypted in databases. There are many encryption/ decryption techniques and algorithms with regard to preserving privacy and security. Currently their performance is an important factor while the medical data is being managed in databases. Another important factor is that the stakeholders should decide more cost-effective ways to reduce the total cost of ownership. As an alternative, DAS (Data as Service) is a popular outsourcing model to satisfy the cost-effectiveness but it takes a consideration that the encryption/ decryption modules needs to be handled by trustworthy stakeholders. This research project is focusing on the query response times in a DAS model (AES-DAS) and analyses the comparison between the outsourcing model and the in-house model which incorporates Microsoft built-in encryption scheme in a SQL Server. This research project includes building a prototype of medical database schemas. There are 2 types of simulations to carry out the project. The first stage includes 6 databases in order to carry out simulations to measure the performance between plain-text, Microsoft built-in encryption and AES-DAS (Data as Service). Particularly, the AES-DAS incorporates implementations of symmetric key encryption such as AES (Advanced Encryption Standard) and a Bucket indexing processor using Bloom filter. The results are categorised such as character type, numeric type, range queries, range queries using Bucket Index and aggregate queries. The second stage takes the scalability test from 5K to 2560K records. The main result of these simulations is that particularly as an outsourcing model, AES-DAS using the Bucket index shows around 3.32 times faster than a normal AES-DAS under the 70 partitions and 10K record-sized databases. Retrieving Numeric typed data takes shorter time than Character typed data in AES-DAS. The aggregation query response time in AES-DAS is not as consistent as that in MS built-in encryption scheme. The scalability test shows that the DBMS reaches in a certain threshold; the query response time becomes rapidly slower. However, there is more to investigate in order to bring about other outcomes and to construct a secured EMR (Electronic Medical Record) more efficiently from these simulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A deeper understanding on two aspects of use of IT resources in organisations is important to ensure sustainable investment in these IT resources. The first is how to leverage the IT resources to attain its maximum value. We discussed this aspect of use of IT resources in part 1 of this series. This discussion suggested a complementary approach as a first stage of IT business value creation, and dynamic capabilities approach to secure sustainable IT-related business value from the IT resources. The second important aspect of IT business value is where to evaluate IT-related business value in the organisations value chains. This understanding is important for organisations to ensure appropriate accountability of the investment and management of IT resources. We address this issue in this second part of the two part series.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The globalized nature of modern society has generated a number of pressures that impact internationally on countries’ policies and practices of science education. Among these pressures are key issues of health and environment confronting global science, global economic control through multinational capitalism, comparative and competitive international testing of student science achievement, and the desire for more humane and secure international society. These are not all one-way pressures and there is evidence of both more conformity in the intentions and practices of science education and of a greater appreciation of how cultural differences, and the needs of students as future citizens can be met. Hence while a case for economic and competitive subservience of science education can be made, the evidence for such narrowing is countered by new initiatives that seek to broaden its vision and practices. The research community of science education has certainly widened internationally and this generates many healthy exchanges, although cultural styles of education other than Western ones are still insufficiently recognized. The dominance of English language within these research exchanges is, however, causing as many problems as it solves. Science education, like education as a whole, is a strongly cultural phenomenon, and this provides a healthy and robust buffer to the more negative effects of globalization

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the continued development of renewable energy generation technologies and increasing pressure to combat the global effects of greenhouse warming, plug-in hybrid electric vehicles (PHEVs) have received worldwide attention, finding applications in North America and Europe. When a large number of PHEVs are introduced into a power system, there will be extensive impacts on power system planning and operation, as well as on electricity market development. It is therefore necessary to properly control PHEV charging and discharging behaviors. Given this background, a new unit commitment model and its solution method that takes into account the optimal PHEV charging and discharging controls is presented in this paper. A 10-unit and 24-hour unit commitment (UC) problem is employed to demonstrate the feasibility and efficiency of the developed method, and the impacts of the wide applications of PHEVs on the operating costs and the emission of the power system are studied. Case studies are also carried out to investigate the impacts of different PHEV penetration levels and different PHEV charging modes on the results of the UC problem. A 100-unit system is employed for further analysis on the impacts of PHEVs on the UC problem in a larger system application. Simulation results demonstrate that the employment of optimized PHEV charging and discharging modes is very helpful for smoothing the load curve profile and enhancing the ability of the power system to accommodate more PHEVs. Furthermore, an optimal Vehicle to Grid (V2G) discharging control provides economic and efficient backups and spinning reserves for the secure and economic operation of the power system

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This publication consists of a volume of papers presented at the workshop of the CIB Task Group 58: Clients and Construction Innovation, held on May 18- 19, 2009 at the University of Alberta in Edmonton, Canada. The workshop theme, “Leveraging Innovation for Sustainable Construction”, reflects a growing concern among clients for perspectives, approaches, and tools that will secure the practice of construction economically, socially, and environmentally. This collection encompasses some of the most incisive assessments of the challenges facing the construction industry today from a range of researchers and industry practitioners who are leading the way for tomorrow’s innovations. It provides a useful documentation of the ongoing conversation regarding innovation and sustainability issues and a foundation of knowledge for future research and development. The papers contained in this volume explore the workshop’s overarching theme of how to leverage innovation to increase the sustainability of the construction process and product. Participants sought to generate discussion on the topics of innovation and sustainability within the construction field, to share international examples of innovation from the research community and from industry, and to establish a point of reference for ongoing enquiry. In particular, our contributors have noted the value of learning through practice in order to orient research based on real-world industry experience. Chapters two and three present complementary models of sustainable research programs through the three parts collaboration of government, industry, and academia. Chapters four and five explore new tools and forms of technological innovation as they are deployed to improve construction project management and set the direction for advances in research. Chapters six, seven, and eight closely study practical examples of innovation in large-scale construction projects, showing with concrete results the impact of applying creative methods and best practices to the field. Innovation and sustainability in construction are truly global efforts; these papers illustrate how we can draw on international examples and cooperative organizations to address these important issues for long-term benefit of the industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Client puzzles are cryptographic problems that are neither easy nor hard to solve. Most puzzles are based on either number theoretic or hash inversions problems. Hash-based puzzles are very efficient but so far have been shown secure only in the random oracle model; number theoretic puzzles, while secure in the standard model, tend to be inefficient. In this paper, we solve the problem of constucting cryptographic puzzles that are secure int he standard model and are very efficient. We present an efficient number theoretic puzzle that satisfies the puzzle security definition of Chen et al. (ASIACRYPT 2009). To prove the security of our puzzle, we introduce a new variant of the interval discrete logarithm assumption which may be of independent interest, and show this new problem to be hard under reasonable assumptions. Our experimental results show that, for 512-bit modulus, the solution verification time of our proposed puzzle can be up to 50x and 89x faster than the Karame-Capkum puzzle and the Rivest et al.'s time-lock puzzle respectively. In particular, the solution verification tiem of our puzzle is only 1.4x slower than that of Chen et al.'s efficient hash based puzzle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As a growing number of nations embark on a path to democracy, criminologists have become increasingly interested and engaged in the challenges, concerns, and questions connecting democracy with both crime and criminal justice. Rising levels of violence and street crime, white collar crime and corruption both in countries where democracy is securely in place and where it is struggling, have fuelled a deepening skepticism as to the capacity of democracy to deliver on its promise of security and justice for all citizens. What role does crime and criminal justice play in the future of democracy and for democratic political development on a global level? The editors of this special volume of The Annals realized the importance of collecting research from a broad spectrum of countries and covering a range of problems that affect citizens, politicians, and criminal justice officials. The articles here represent a solid balance between mature democracies like the U.S. and U.K. as well as emerging democracies around the globe – specifically in Latin America, Africa and Eastern Europe. They are based on large and small cross-national samples, regional comparisons, and case studies. Each contribution addresses a seminal question for the future of democratic political development across the globe. What is the role of criminal justice in the process of building democracy and instilling confidence in its institutions? Is there a role for unions in democratizing police forces? What is the impact of widespread disenfranchisement of felons on democratic citizenship and the life of democratic institutions? Under what circumstances do mature democracies adopt punitive sentencing regimes? Addressing sensitive topics such as relations between police and the Muslim communities of Western Europe in the wake of terrorist attacks, this volume also sheds light on the effects of terrorism on mature democracies under increasing pressure to provide security for their citizens. By taking a broad vantage point, this collection of research delves into complex topics such as the relationship between the process of democratization and violent crime waves; the impact of rising crime rates on newly established as well as secure democracies; how crime may endanger the transition to democracy; and how existing practices of criminal justice in mature democracies affect their core values and institutions. The collection of these insightful articles not only begins to fill a gap in criminological research but also addresses issues of critical interest to political scientists as well as other social and behavioral scientists and scholars. Taking a fresh approach to the intersection of crime, criminal justice, and democracy, this volume of The Annals is a must-read for criminologists and political scientists and provides a solid foundation for further interdisciplinary research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Despite its efficacy and cost-effectiveness, exercise-based cardiac rehabilitation is undertaken by less than one-third of clinically eligible cardiac patients in every country for which data is available. Reasons for non-participation include the unavailability of hospital-based rehabilitation programs, or excessive travel time and distance. For this reason, there have been calls for the development of more flexible alternatives. Methodology and Principal Findings We developed a system to enable walking-based cardiac rehabilitation in which the patient's single-lead ECG, heart rate, GPS-based speed and location are transmitted by a programmed smartphone to a secure server for real-time monitoring by a qualified exercise scientist. The feasibility of this approach was evaluated in 134 remotely-monitored exercise assessment and exercise sessions in cardiac patients unable to undertake hospital-based rehabilitation. Completion rates, rates of technical problems, detection of ECG changes, pre- and post-intervention six minute walk test (6 MWT), cardiac depression and Quality of Life (QOL) were key measures. The system was rated as easy and quick to use. It allowed participants to complete six weeks of exercise-based rehabilitation near their homes, worksites, or when travelling. The majority of sessions were completed without any technical problems, although periodic signal loss in areas of poor coverage was an occasional limitation. Several exercise and post-exercise ECG changes were detected. Participants showed improvements comparable to those reported for hospital-based programs, walking significantly further on the post-intervention 6 MWT, 637 m (95% CI: 565–726), than on the pre-test, 524 m (95% CI: 420–655), and reporting significantly reduced levels of cardiac depression and significantly improved physical health-related QOL. Conclusions and Significance The system provided a feasible and very flexible alternative form of supervised cardiac rehabilitation for those unable to access hospital-based programs, with the potential to address a well-recognised deficiency in health care provision in many countries. Future research should assess its longer-term efficacy, cost-effectiveness and safety in larger samples representing the spectrum of cardiac morbidity and severity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A substantial group of young people experience mental health problems which impact on their educational development and subsequent wellbeing. Of those who do suffer from mental health issues, a minority of these seek appropriate professional assistance. This paucity of help seeking behaviours among young people is a challenge for counsellors. Whereas adults who suffer mental health issues have increasingly turned to the internet for assistance, it is interesting that when young people whose social lives are increasingly dependent on the communication technologies, are not catered for as much as adults by online counselling. One small online counselling pilot program conducted at a Queensland secondary school for three years from 2005-2007 (Glasheen & Campbell, 2009) offered anonymous live-time counselling from the school counsellor (via a secure chat room) to students through the school’s website. Findings indicated that boys were more likely to use the service than girls. All participants transitioned to face-to-face counselling, and all reported it was beneficial. This pilot study attested to the potential of an online counselling. However, school counsellors as a professional group have been hesitant to utilise online counselling as part of their service delivery to young people in schools. This chapter concludes by identifying reasons for this reluctance and the possible initiatives to increase online support for young people in schools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The birth of a baby is a significant event for women and their families, with the event being influenced by the prevailing social and cultural context. Historically, women throughout the world have given birth at home assisted by other women who helped them cope with the stress of labour and birth. In the middle of the twentieth century, the togetherness, caring and support that were provided within the social and cultural context of childbirth began to change; women in most developed countries, and to some extent in developing countries, laboured and gave birth in institutions that isolated them from the support of family and friends. This practice is referred to as the medical model of childbirth and, over time, birthing within this model has come to be viewed by women as a dehumanising experience. In an attempt to secure a more supportive experience, women began to demand the presence of a supportive companion; namely their partner. This event became the catalyst for a number of studies focusing on different types of support providers and their contribution to the phenomenon of social support during labour. More recently, it has become a common practice for some women to be supported during labour by a number of people from their social network. However, research on the influence of such supportive people on women’s experience of labour and birth and on birth outcomes is scarce. The aim of this study is to examine the influence of various support arrangements from a woman’s family and social network on her experience of labour and birth and on birth outcomes. The mixed-method study was conducted to answer three research questions: 1. Do women with more than one support person present during labour and birth have similar perceptions and experiences of support compared to women with one support person? 2. Do women with more than one support person present during labour and birth have similar birth outcomes compared to women with one support person? 3. Do women with different types of support providers during labour and birth have similar birth outcomes? Methods Phase one of this study developed, pilot tested and administered a newly developed instrument designed to measure women’s perceptions of supportive behaviours provided during labour. Specific birth outcome data were extracted from the medical records. Phase two consisted of in-depth interviews with a sample of women who had completed the survey. Results: The results identified a statistically significant relationship between women’s perceptions of social support and the number of support providers: women supported by one person only rated the supportive behaviours of that person more highly compared to women who were supported by a number of people. The results also identified that women supported by one person used less analgesia. An additional qualitative finding was that some women sacrificed the support of female relatives at the request of their partners. Conclusion: By using a mixed-method approach, this study found that women were selective in their choice of support providers, as they chose individuals with whom they had an enduring affectionate attachment. Women place more emphasis on a support person’s ability to fulfil their attachment needs of close proximity and a sense of security and safety, rather than their ability to provide the expected functional supportive behaviours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate existing cloud storage schemes and identify limitations in each one based on the security services that they provide. We then propose a new cloud storage architecture that extends CloudProof of Popa et al. to provide availability assurance. This is accomplished by incorporating a proof of storage protocol. As a result, we obtain the first secure storage cloud computing scheme that furnishes all three properties of availability, fairness and freshness.