956 resultados para Involuntary clients
Resumo:
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.
Resumo:
Plant and machinery valuation is important to every company.s annual financial reporting. It is reported under the non-current assets section, and the valuers are generally employed to provide the up to date valuation of the non-current assets valuation such as property, plant and equipment that can make up to 80% of the total assets of a company. The valuation of plant and machinery is also important for other purposes such as securing loan facilities, sales, takeover, insurance and auction. The application of 2005 International Financial Reporting Standard (IFRS) has a subsequent impact on the financial sector, as a whole. The accountants have to choose between the Historical Cost approach and Market Value approach in determining the value of the client.s assets. In Malaysia, the implementation of IFRS has a domino effect on the financial system, especially for plant and machinery valuation for financial reporting. The comparison data for plant and machinery valuation is limited unlike land and building valuation. The question of Malaysian valuer.s ability to comply with the IFRS standard keeps rising every day, not just to the accountants, but also other related parties such as financial institutions, government agencies and the clients. This is happening because of different interpretations of premise of value for plant and machinery, as well as methods been used and differences in standards of reporting among the valuers conducting plant and machinery valuation. The root of the problem lies in the lack of practical guidelines governing plant and machinery valuation practices and different schools of thought among the valuers. Some follow the United Kingdom.s RICS guidelines, whilst some valuers are more comfortable with the United State.s USPAP rules, especially on the premise of value. This research is to investigate the international best practices of plant and machinery valuation and to establish the common valuation concept, awareness and application of valuation methodology and valuation process for plant and machinery valuation in Malaysia. This research uses a combination of the qualitative and quantitative research approach. In the qualitative approach, the content analyses were conducted from the international practices and current Malaysian implementation of plant and machinery valuation. A survey (quantitative approach) via questionnaire was implemented among the registered and probationary valuers in Malaysia to investigate their understanding and opinion relating to plant and machinery valuation based on the current practices. The significance of this research is the identification of international plant and machinery practices and the understanding of current practices of plant and machinery valuation in Malaysia. It is found that issues embedding plant and machinery valuation practices are limited numbers of resources available either from scholars or practitioner. This is supported by the general finding from the research survey that indicates that there are immediate needs for practical notes or guidelines to be developed and implemented to support the Malaysian valuers practising plant and machinery valuation. This move will lead to a better understanding of plant and machinery valuation, reducing discrepancies in valuation of plant and machinery and increased accuracy among practising valuers.
Resumo:
Corporate business and management are embracing design thinking for its potential to deliver competitive advantage through helping them be more innovative, differentiate their brands, and bring more customer centric products and services to market (Brown, 2008). As consumers continue to expect more personalisation and customisation from their service providers, the use of design thinking for innovation within organisations is a logical progression. To date however, there is little empirical literature discussing how organisations are setting about integrating design thinking into their culture and innovation practices. This paper is a first step in initiating a scholarly discussion on the integration of design thinking within organisational culture. Deloitte Australia is a large professional services firm employing over 5700 staff in 12 offices across Australia. The company provides a range of services to clients in the areas of audit, tax, financial advisory and consulting. In early 2011 the company made a strategic commitment to introducing design thinking into the organisation’s practices. While it already maintains a strong innovation culture, to date it had largely been operating within an analytical business environment. For Deloitte, design thinking is an opportunity to create better outcomes for the people they serve – both internal and external stakeholders (Brown and Wyatt, 2010). Research was conducted using case study methodology and ethnographic methods from June to September 2011 at the Melbourne Deloitte office. It involved three methods of data collection: semi structured interviews, participant observation and artifact analysis. This paper presents preliminary case study findings of Deloitte’s approach to building awareness and a consistent understanding of design thinking, as well as large scale capability, across the firm. Deloitte’s commitment to transforming its culture to one of design thinking poses significant potential for understanding how design thinking is comprehended, enabled and integrated within a complex organisational environment.
Resumo:
Sense making through conversation plays a key role in channelling and furthering participatory business model innovation. The designer as facilitator, with conversation as a core tool, is an emerging area of interest within the design research literature. This paper will discuss preliminary findings of a case study of Second Road, a strategy and innovation consultancy that employed a design thinking approach and conversational methods to redesign a client’s business development model. Through this study conversation based co-creation emerged as the primary method for participatory innovation.
Resumo:
Carbon will be the world's biggest market. Barclays was the first UK bank to set up a dedicated carbon trading desk to help clients, and Barclays Capital is the most active player in the emissions trading market having traded 300 million tonnes as at February 2007. (Barclays, 2007: 1)
Resumo:
This article traces the emergence of “the new advocacy” role for lawyers, that of “dispute resolution advocacy”, describing the role of legal practitioners when representing clients in negotiation, mediation and conciliation processes. The dispute resolution models they may encounter and the different types of assistance that lawyers can provide to their clients in such contexts will be discussed. Whether “dispute resolution advocacy” falls under the umbrella of “non-adversarial practice” or is a separate and distinct role will also be explored, in light of the professional obligations of lawyer representatives, particularly the duty of loyalty to their clients.
Resumo:
Purpose – The purpose of this paper is to look at auditor obligations to their clients and potentially to third parties such as investors, with a focus on the quality of financial disclosure in an evolving legal framework. Design/methodology/approach – The article outlines and compares established and emerging trends relative to information disclosure and contractual performance in parallel contexts where information asymmetry exists. In particular, this article considers the disclosure regime that has evolved in the insurance industry to address the substantial imbalance in the level of knowledge possessed by the insured in comparison to the prospective insurer. Abductive reasoning is used to identify causal constructs that explain the data pattern from which the theorised potential for judicial revision of the interpretation of “true and fair” in line with “good faith” in legal regulation is derived. Findings – The authors conclude that there is little doubt that a duty of good faith in relation to auditor-company contractual dealings and potentially a broader good faith duty to third parties such as investors in companies may be on the horizon. Originality/value – In the context of stated objectives by organisations such as the International Federation of Accountants to reconcile ethical and technical skills in the wake of the global financial crisis, there is an increased need to rebuild public and investor confidence in the underpinning integrity of financial reporting. This paper offers a perspective on one way to achieve this by recognising the similarities in the information asymmetry relationships in the insurance industry and how the notion of “good faith” in that relationship could be useful in the audit situation.
Resumo:
On 21 September 1999 Division 152 was inserted into the Income Tax Assessment Act (1997) (ITAA 1997). It was subsequently subject to amendments in 2006. Division 152 contains the small business CGT concessions, which enables eligible small business taxpayers to reduce the amount of tax payable on capital gains arising from certain CGT events (including the sale of the small business itself) that occur after 11:45 am on 21 September 1999. One of the stated principal objectives of the legislation was to provide a concessionary regime for small business owners who did not have the same ability to access the concessionary superannuation regime (particularly the superannuation guarantee charge) generally available to employees. The then Federal Treasurer, Mr Peter Costello, when announcing the introduction of the concessions, specifically stated that the object of Div 152 was to provide “small business people with access to funds for retirement or expansion”. The purpose of this project is to: one, assess the extent to which small business taxpayers understand the CGT small business concessions, particularly when considering sale of their business; two, determine which of the four small business CGT concessions are being adopted and/or recommended by tax advisors to clients; and three, determine whether the recent superannuation changes announced by the Federal Government in relation to the capping of the concessional superannuation thresholds have had an impact on the use of the small business retirement concession. It is anticipated that the results of this study will reveal that that small business owners are reliant on their tax advisors to explain the operation of Division 152. It is plausible that give the complexity of the CGT concessions, most small business owners are completely unaware of the four small business CGT concessions contained in Division 152 and do not understand how these concessions apply. Our study will also reveal the extent to which each CGT small business concession has been adopted (and reasons why). In particular, emphasis will be placed on the adoption of the small business retirement concession contained in Subdivision 152-D (and specific reasons for its adoption). This study also seeks to understand whether the recent (and impending) changes to the concessional superannuation cap has resulted in the retirement concession being more widely adopted (or recommended) by tax advisors. We would expect that the results of our study to confirm this to be the case, particularly coupled with the recent economic downturn, which has led to lower superannuation fund balances. By providing accounting firms with this information, small business owners will benefit from the information, becoming better placed to be long-term self funded retirees, providing not only financial benefits to the individuals and the country, but a significant increase in social self-assurance by these members of the community.
Resumo:
This paper aims to contribute to an understanding of what actually takes place during consulting engagements. It draws on data collected from a qualitative case study of eight engagements by a niche consultancy in Australia to describe how consultants actively engage boundary crossing processes to address knowledge boundaries encountered during formal interactions with clients. While consultants actively managed knowledge boundary processes during interactions, by applying techniques such as evoking an ‘ideal state’ for clients, the engagements also yielded many missed opportunities for knowledge transformation.
Resumo:
Reliability of the performance of biometric identity verification systems remains a significant challenge. Individual biometric samples of the same person (identity class) are not identical at each presentation and performance degradation arises from intra-class variability and inter-class similarity. These limitations lead to false accepts and false rejects that are dependent. It is therefore difficult to reduce the rate of one type of error without increasing the other. The focus of this dissertation is to investigate a method based on classifier fusion techniques to better control the trade-off between the verification errors using text-dependent speaker verification as the test platform. A sequential classifier fusion architecture that integrates multi-instance and multisample fusion schemes is proposed. This fusion method enables a controlled trade-off between false alarms and false rejects. For statistically independent classifier decisions, analytical expressions for each type of verification error are derived using base classifier performances. As this assumption may not be always valid, these expressions are modified to incorporate the correlation between statistically dependent decisions from clients and impostors. The architecture is empirically evaluated by applying the proposed architecture for text dependent speaker verification using the Hidden Markov Model based digit dependent speaker models in each stage with multiple attempts for each digit utterance. The trade-off between the verification errors is controlled using the parameters, number of decision stages (instances) and the number of attempts at each decision stage (samples), fine-tuned on evaluation/tune set. The statistical validation of the derived expressions for error estimates is evaluated on test data. The performance of the sequential method is further demonstrated to depend on the order of the combination of digits (instances) and the nature of repetitive attempts (samples). The false rejection and false acceptance rates for proposed fusion are estimated using the base classifier performances, the variance in correlation between classifier decisions and the sequence of classifiers with favourable dependence selected using the 'Sequential Error Ratio' criteria. The error rates are better estimated by incorporating user-dependent (such as speaker-dependent thresholds and speaker-specific digit combinations) and class-dependent (such as clientimpostor dependent favourable combinations and class-error based threshold estimation) information. The proposed architecture is desirable in most of the speaker verification applications such as remote authentication, telephone and internet shopping applications. The tuning of parameters - the number of instances and samples - serve both the security and user convenience requirements of speaker-specific verification. The architecture investigated here is applicable to verification using other biometric modalities such as handwriting, fingerprints and key strokes.
Resumo:
This research paper examines the potential of neighbourhood centres to generate and enhance social capital through their programs, activities, membership associations and community engagement. Social capital is a complex concept involving elements of norms, networks, and trust and is generally seen as enhancing community cohesion and the ability to attain common goals (outlined in more detail in Section 3). The aim of this research project is to describe the nature of social capital formation in terms of development and change in norms, networks and trust within the context of the operations of neighbourhood centres in three Queensland locations (i.e., Sherwood, Kingston/Slacks Creek, and Maleny). The study was prompted by surprisingly little research into how neighbourhood centres and their clients contribute to the development of social capital. Considering the large volume of research on the role of community organisations in building social capital, it is remarkable that perhaps the most obvious organisation with 'social capitalist' intentions has received so little attention (apart from Bullen and Onyx, 2005). Indeed, ostensibly, neighbourhood centres are all about social capital.
Resumo:
This article discusses the key concepts that underpin an elective subject, Dispute Resolution Practice, offered in the Queensland University of Technology undergraduate law curriculum. They were conceptualised during a Teaching Fellowship when research was conducted into how to assist future lawyers to conceptualise their dispute resolution advocacy role. The unit also contains the majority of content recommended in the recent National Alternative Dispute Resolution Advisory Council Report, “Teaching Alternative Dispute Resolution in Australian Law Schools”. The environments in which lawyers operate and the knowledge and skills they require to represent clients in negotiation, mediation and conciliation processes will be examined.
Resumo:
The aim of the study is to identify the latest trends in accounting forensic work in Australia by examining how accounting firms that specialise in forensic services meet the needs of their clients, and to inform universities on the appropriate curricula to ensure the knowledge and skills of future graduates meet industry expectations.
Resumo:
The purpose of this paper is to provide an evolutionary perspective of cloud computing (CC) by integrating two previously disparate literatures: CC and information technology outsourcing (ITO). We review the literature and develop a framework that highlights the demand for the CC service, benefits, risks, as well as risk mitigation strategies that are likely to influence the success of the service. CC success in organisations and as a technology overall is a function of (i) the outsourcing decision and supplier selection, (ii) contractual and relational governance, and (iii) industry standards and legal framework. Whereas CC clients have little control over standards and/or the legal framework, they are able to influence other factors to maximize the benefits while limiting the risks. This paper provides guidelines for (potential) cloud computing users with respect to the outsourcing decision, vendor selection, service-level-agreements, and other issues that need to be addressed when opting for CC services. We contribute to the literature by providing an evolutionary and holistic view of CC that draws on the extensive literature and theory of ITO. We conclude the paper with a number of research paths that future researchers can follow to advance the knowledge in this field.
Resumo:
Introduction: The delivery of health care in the 21st century will look like no other in the past. The fast paced technological advances that are being made will need to transition from the information age into clinical practice. The phenomenon of e-Health is the over-arching form of information technology and telehealth is one arm of that phenomenon. The uptake of telehealth both in Australia and overseas, has changed the face of health service delivery to many rural and remote communities for the better, removing what is known as the tyranny of distance. Many studies have evaluated the satisfaction and cost-benefit analysis of telehealth across the organisational aspects as well as the various adaptations of clinical pathways and this is the predominant focus of most studies published to date. However, whilst comments have been made by many researchers about the need to improve and attend to the communication and relationship building aspects of telehealth no studies have examined this further. The aim of this study was to identify the patient and clinician experiences, concerns, behaviours and perceptions of the telehealth interaction and develop a training tool to assist these clinicians to improve their interaction skills. Methods: A mixed methods design combining quantitative (survey analysis and data coding) and qualitative (interview analysis) approaches was adopted. This study utilised four phases to firstly qualitatively explore the needs of clients (patients) and clinicians within a telehealth consultation then designed, developed, piloted and quantitatively and qualitatively evaluated the telehealth communication training program. Qualitative data was collected and analysed during Phase 1 of this study to describe and define the missing 'communication and rapport building' aspects within telehealth. This data was then utilised to develop a self-paced communication training program that enhanced clinicians existing skills, which comprised of Phase 2 of this study to develop the interactive program. Phase 3 included evaluating the training program with 26 clinicians and results were recorded pre and post training, whilst phase 4 was the pilot for future recommendations of this training program using a patient group within a Queensland Health setting at two rural hospitals. Results: Comparisons of pre and post training data on 1) Effective communication styles, 2) Involvement in communication training package, 3) satisfaction pre and post training, and 4) health outcomes pre and post training indicated that there were differences between pre and post training in relation to effective communication style, increased satisfaction and no difference in health outcomes between pre and post training for this patient group. The post training results revealed over half of the participants (N= 17, 65%) were more responsive to non-verbal cues and were better able to reflect and respond to looks of anxiousness and confusion from a 'patient' within a telehealth consultation. It was also found that during post training evaluations, clinicians had enhanced their therapeutic communication with greater detail to their own body postures, eye contact and presentation. There was greater time spent looking at the 'patient' with an increase of 35 second intervals of direct eye contact and less time spent looking down at paperwork which decreased by 20 seconds. Overall 73% of the clinicians were satisfied with the training program and 61% strongly agreed that they recognised areas of their communication that needed improving during a telehealth consultation. For the patient group there was significant difference post training in rapport with a mean score from 42 (SD = 28, n = 27) to 48 (SD = 5.9, n = 24). For communication comfort of the patient group there was a significant difference between the pre and post training scores t(10) = 27.9, p = .002, which meant that overall the patients felt less inhibited whilst talking to the clinicians and more understood. Conclusion: The aim of this study was to explore the characteristics of good patient-clinician communication and unmet training needs for telehealth consultations. The study developed a training program that was specific for telehealth consultations and not dependent on a 'trainer' to deliver the content. In light of the existing literature this is a first of its kind and a valuable contribution to the research on this topic. It was found that the training program was effective in improving the clinician's communication style and increased the satisfaction of patient's within an e-health environment. This study has identified some historical myths that telehealth cannot be part of empathic patient centred care due to its technology tag.