997 resultados para Sim authentication messaggistica online
Resumo:
Public Health undergraduate students studying the unit Women’s Health undertook a teaching and learning exercise which required them to learn to create and use a wiki website for reflective learning purposes. The Women’s Health wiki provided an online shared, collaborative, and creative space wherein the students’ perceptions of women's health issues could be discussed, reflected upon, and debated. We analysed the content developed on the Women’s Health wiki using a social constructivist theoretical framework and provided a theoretical model for how the wiki worked to aid reflective and critical thinking, as well as developing technological and communicative skills amongst students.
Resumo:
Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.
Resumo:
The majority of research examining massively multiplayer online game (MMOG)-based social relationships has used quantitative methodologies. The present study used qualitative semi-structured interviews with 22 Australian World of Warcraft (WoW) players to examine their experiences of MMOG-based social relationships. Interview transcripts underwent thematic analysis and revealed that participants reported experiencing an MMOG-based sense of community (a sense of belonging within the gaming or WoW community), discussed a number of different MMOG-based social identities (such as gamer, WoW player and guild or group member) and stated that they derived social support (a perception that one is cared for and may access resources from others within a group) from their relationships with other players. The findings of this study confirm that MMOG players can form gaming communities. Almost all participants accessed or provided in-game social support, and some gave or received broader emotional support. Players also identified as gamers and guild members. Fewer participants identified as WoW players. Findings indicated that changes to the game environment influence these relationships and further exploration of players' experiences could determine the optimal game features to enhance positive connections with fellow players.
Resumo:
We argue that safeguards are necessary to ensure human rights are adequately protected. All systems of blocking access to online content necessarily raise difficult and problematic issues of infringement of freedom of speech and access to information. Given the importance of access to information across the breadth of modern life, great care must be taken to ensure that any measures designed to protect copyright by blocking access to online locations are proportionate. Any measures to block access to online content must be carefully tailored to avoid serious and disproportionate impact on human rights. This means first that the measures must be effective and adapted to achieve a legitimate purpose. The experience of foreign jurisdictions suggests that this legislation is unlikely to be effective. Unless and until there is clear evidence that the proposed scheme is likely to increase effective returns to Australian creators, this legislation should not be introduced. Second, the principle of proportionality requires ensuring that the proposed legislation does not unnecessarily burden legitimate speech or access to information. As currently worded, the draft legislation may result in online locations being blocked even though they would, if operated in Australia, not contravene Australian law. This is unacceptable, and if introduced, the law should be drafted so that it is clearly limited only to foreign locations where there is clear and compelling evidence that the location would authorise copyright infringement if it were in Australia. Third, proportionality requires that measures are reasonable and strike an appropriate balance between competing interests. This draft legislation provides few safeguards for the public interest or the interests of private actors who would access legitimate information. New safeguards should be introduced to ensure that the public interest is well represented at both the stage of the primary application and at any applications to rescind or vary injunctions. We recommend that: The legislation not be introduced unless and until there is compelling evidence that it will have a real and significant positive impact on the effective incomes of Australian creators. The ‘facilitates an infringement’ test in s 115A(1)(b) should be replaced with ‘authorises infringement’. The ‘primary purpose’ test in s 115A(1)(c) should be replaced with: “the online location has no substantial non-infringing uses”. An explicit role for public interest groups as amici curiae should be introduced. Costs of successful applications should be borne by applicants. Injunctions should be valid only for renewable two year terms. Section 115A(5) should be clarified, and cl (b) and (c) be removed. The effectiveness of the scheme should be evaluated in two years.
Resumo:
Background The use of the internet to access information is rapidly increasing; however, the quality of health information provided on various online sites is questionable. We aimed to examine the underlying factors that guide parents' decisions to use online information to manage their child's health care, a behaviour which has not yet been explored systematically. Methods Parents (N=391) completed a questionnaire assessing the standard theory of planned behaviour (TPB) measures of attitude, subjective norm, perceived behavioural control (PBC), and intention as well as the underlying TPB belief-based items (i.e., behavioural, normative, and control beliefs) in addition to a measure of perceived risk and demographic variables. Two months later, consenting parents completed a follow-up telephone questionnaire which assessed the decisions they had made regarding their use of online information to manage their child's health care during the previous 2 months. Results We found support for the TPB constructs of attitude, subjective norm, and PBC as well as the additional construct of perceived risk in predicting parents' intentions to use online information to manage their child's health care, with further support found for intentions, but not PBC, in predicting parents' behaviour. The results of the TPB belief-based analyses also revealed important information about the critical beliefs that guide parents' decisions to engage in this child health management behaviour. Conclusions This theory-based investigation to understand parents' motivations and online information-seeking behaviour is key to developing recommendations and policies to guide more appropriate help-seeking actions among parents.
Resumo:
This chapter is based on a qualitative case study that researched the perceptions of nine male and female pre-service English teachers’ in regards to their preparedness to mentor positive digital conduct in Social network sites (SNS). These sites enable individuals to perform public representations of identity, consumed by virtual audiences, with various degrees of perceived privacy. The chapter frames what we call “identity curation” through three theoretical lenses; of performativity, customisation and critical literacy. This chapter discusses one of the themes that emerged from the research, which is the way in which “normalised” and naturalised representations of femineity on SNS were judged more harshly than masculine representations.
Resumo:
We propose an architecture for a rule-based online management systems (RuleOMS). Typically, many domain areas face the problem that stakeholders maintain databases of their business core information and they have to take decisions or create reports according to guidelines, policies or regulations. To address this issue we propose the integration of databases, in particular relational databases, with a logic reasoner and rule engine. We argue that defeasible logic is an appropriate formalism to model rules, in particular when the rules are meant to model regulations. The resulting RuleOMS provides an efficient and flexible solution to the problem at hand using defeasible inference. A case study of an online child care management system is used to illustrate the proposed architecture.
Resumo:
It’s the stuff of nightmares: your intimate images are leaked and posted online by somebody you thought you could trust. But in Australia, victims often have no real legal remedy for this kind of abuse. This is the key problem of regulating the internet. Often, speech we might consider abusive or offensive isn’t actually illegal. And even when the law technically prohibits something, enforcing it directly against offenders can be difficult. It is a slow and expensive process, and where the offender or the content is overseas, there is virtually nothing victims can do. Ultimately, punishing intermediaries for content posted by third parties isn’t helpful. But we do need to have a meaningful conversation about how we want our shared online spaces to feel. The providers of these spaces have a moral, if not legal, obligation to facilitate this conversation.
Resumo:
Christmas has come early for copyright owners in Australia. The film company, Roadshow, the pay television company Foxtel, and Rupert Murdoch's News Corp and News Limited--as well as copyright industries--have been clamoring for new copyright powers and remedies. In the summer break, the Coalition Government has responded to such entreaties from its industry supporters and donors, with a new package of copyright laws and policies. There has been significant debate over the proposals between the odd couple of Attorney-General George Brandis and the Minister for Communications, Malcolm Turnbull. There have been deep, philosophical differences between the two Ministers over the copyright agenda. The Attorney-General George Brandis has supported a model of copyright maximalism, with strong rights and remedies for the copyright empires in film, television, and publishing. He has shown little empathy for the information technology companies of the digital economy. The Attorney-General has been impatient to press ahead with a copyright regime. The Minister for Communications, Malcolm Turnbull, has been somewhat more circumspect, recognizing that there is a need to ensure that copyright laws do not adversely impact upon competition in the digital economy. The final proposal is a somewhat awkward compromise between the discipline-and-punish regime preferred by Brandis, and the responsive regulation model favored by Turnbull. In his new book, Information Doesn't Want to Be Free: Laws for the Internet Age, Cory Doctorow has some sage advice for copyright owners: Things that don't make money: Complaining about piracy. Calling your customers thieves. Treating your customers like thieves. In this context, the push by copyright owners and the Coalition Government to have a copyright crackdown may well be counter-productive to their interests.
Resumo:
‘Create a Better Online You’ (CBOY) is an emerging initiative from QUT Library. CBOY focusses on developing the social media skills of undergraduates at QUT. While many students will have encountered ‘cybersafety’ training in primary or secondary school, a comprehensive environmental scan revealed little in the way of social media resources targeted at undergraduates. In particular, there was little to no focus on the ways in which social media could be used strategically to develop a positive online reputation and enhance chances of employability post tertiary education. The resources created as part of CBOY are the result of a literature review, environmental scan, and discussions with staff and students at QUT. Following the comprehensive environmental scan, it appears that CBOY represents one of the first free, openly accessible, interactive resources targeting the social media skills of undergraduates.
Resumo:
The aim of this study was to develop an Internet-based self-directed training program for Australian healthcare workers to facilitate learning and competence in delivery of a proven intervention for caregivers of people with dementia: The New York University Caregiver Intervention (NYUCI). The NYUCI is a nonpharmacological, multicomponent intervention for spousal caregivers. It is aimed at maintaining well-being by increasing social support and decreasing family discord, thereby delaying or avoiding nursing home placement of the person with dementia. Training in the NYUCI in the United States has, until now, been conducted in person to trainee practitioners. The Internet-based intervention was developed simultaneously for trainees in the U.S. and Australia. In Australia, due to population geography, community healthcare workers, who provide support to older adult caregivers of people with dementia, live and work in many regional and rural areas. Therefore, it was especially important to have online training available to make it possible to realize the health and economic benefits of using an existing evidence-based intervention. This study aimed to transfer knowledge of training in, and delivery of, the NYUCI for an Australian context and consumers. This article details the considerations given to contextual differences and to learners’ skillset differences in translating the NYUCI for Australia.
Resumo:
This report describes the Year One Pilot Study processes, and articulates findings from the major project components designed to address these challenges noted above (See Figure 1). Specifically, the pilot study tested the campaign research and development process involving participatory design with young people and sector partners, and the efficacy and practicality of conducting a longitudinal, randomised control trial online with minors, including ways oflinking survey data to campaign data. Each sub-study comprehensively considered the ethical requirements of conducting online research with minors in school settings. The theoretical and methodological framework for measuring campaign engagement and efficacy (Sub-studies 3, 4 and 5) drew on the Model of Goal-Directed Behaviour (MGB) (Perugini & Bagozzi 2001) and Nudge Theory (Thaler & Sunstein, 2008).
Resumo:
This report describes the Year Two/Campaign Two processes, and articulates findings from the major project components designed to address the challenges noted above (see Figure 1). Three major components comprise the Safe and Well Online project: 1) A participatory design (PD) process involving young people and sector partners (UWS) for; 2) campaign development (Zuni & Digital Arts Network); and 3) a cohort study (University of South Australia) to evaluate campaign effectiveness and attitude and behaviour change. Each sub-study comprehensively considered the ethical requirements of conducting online research with minors. The theoretical and methodological framework for measuring campaign engagement and efficacy (Sub-studies 3, 4 and 5) drew on the Model of Goal Directed Behaviour (MGB) (Perugini & Bagozzi 2001) and Nudge Theory (Thaler & Sunstein, 2008). This report extends the findings and conclusions of the Year One Pilot Study ‘‘Keep it Tame’’ (Spears et.al, 2015), and details the development and evaluation of the second of four Safe and Well Online Campaigns—‘‘Appreciate A Mate’: Helping others feel good about themselves’.
Resumo:
Purpose Following the perspective of frustration theory customer frustration incidents lead to frustration behavior such as protest (negative word‐of‐mouth). On the internet customers can express their emotions verbally and non‐verbally in numerous web‐based review platforms. The purpose of this study is to investigate online dysfunctional customer behavior, in particular negative “word‐of‐web” (WOW) in online feedback forums, among customers who participate in frequent‐flier programs in the airline industry. Design/methodology/approach The study employs a variation of the critical incident technique (CIT) referred to as the critical internet feedback technique (CIFT). Qualitative data of customer reviews of 13 different frequent‐flier programs posted on the internet were collected and analyzed with regard to frustration incidents, verbal and non‐verbal emotional effects and types of dysfunctional word‐of‐web customer behavior. The sample includes 141 negative customer reviews based on non‐recommendations and low program ratings. Findings Problems with loyalty programs evoke negative emotions that are expressed in a spectrum of verbal and non‐verbal negative electronic word‐of‐mouth. Online dysfunctional behavior can vary widely from low ratings and non‐recommendations to voicing switching intentions to even stronger forms such as manipulation of others and revenge intentions. Research limitations/implications Results have to be viewed carefully due to methodological challenges with regard to the measurement of emotions, in particular the accuracy of self‐report techniques and the quality of online data. Generalization of the results is limited because the study utilizes data from only one industry. Further research is needed with regard to the exact differentiation of frustration from related constructs. In addition, large‐scale quantitative studies are necessary to specify and test the relationships between frustration incidents and subsequent dysfunctional customer behavior expressed in negative word‐of‐web. Practical implications The study yields important implications for the monitoring of the perceived quality of loyalty programs. Management can obtain valuable information about program‐related and/or relationship‐related frustration incidents that lead to online dysfunctional customer behavior. A proactive response strategy should be developed to deal with severe cases, such as sabotage plans. Originality/value This study contributes to knowledge regarding the limited research of online dysfunctional customer behavior as well as frustration incidents of loyalty programs. Also, the article presents a theoretical “customer frustration‐defection” framework that describes different levels of online dysfunctional behavior in relation to the level of frustration sensation that customers have experienced. The framework extends the existing perspective of the “customer satisfaction‐loyalty” framework developed by Heskett et al.
Resumo:
The film company, Roadshow, the pay television company Foxtel, and Rupert Murdoch’s News Corp and News Limited — as well as copyright industries — have been clamouring for new copyright powers and remedies. In the summer break, the Coalition Government has responded to such entreaties from its industry supporters and donors, with a new package of copyright laws and policies. There has been significant debate over the proposals between the odd couple of Attorney-General George Brandis and the Minister for Communications, Malcolm Turnbull. There has been deep, philosophical differences between the two Ministers over the copyright agenda. The Attorney-General George Brandis has supported a model of copyright maximalism, with strong rights and remedies for the copyright empires in film, television, and publishing. He has shown little empathy for the information technology companies of the digital economy. The Attorney-General has been impatient to press ahead with a copyright regime. The Minister for Communications, Malcolm Turnbull, has been somewhat more circumspect,recognising that there is a need to ensure that copyright laws do not adversely impact upon competition in the digital economy. The final proposal is a somewhat awkward compromise between the discipline-and-punish regime preferred by Brandis, and the responsive regulation model favoured by Turnbull. In his new book, Information Doesn’t Want to Be Free: Laws for the Internet Age, Cory Doctorow has some sage advice for copyright owners: Things that don’t make money: * Complaining about piracy. * Calling your customers thieves. * Treating your customers like thieves. In this context, the push by copyright owners and the Coalition Government to have a copyright crackdown may well be counter-productive to their interests. This submission considers a number of key elements of the Coalition Government’s Copyright Crackdown. Part 1 examines the proposals in respect of the Copyright Amendment (Online Infringement) Bill 2015 (Cth). Part 2 focuses upon the proposed Copyright Code. Part 3 considers the question of safe harbours for intermediaries. Part 4 examines the question of copyright exceptions – particularly looking at the proposal of the Australian Law Reform Commission for the introduction of a defence of fair use. Part 5 highlights the recommendations of the IT Pricing Inquiry and the Harper Competition Policy Review in respect of copyright law, consumer rights, and competition law.