945 resultados para interests
Resumo:
Australia should introduce a transformative use exception. Transformative use is an important part of the copyright balance: it provides a mechanism through which to balance the rights of past authors against the interests of future authors. In the interests of promoting creativity and innovation, the impact of copyright law on the ability of Australians to create new works should be minimised. The scope of a transformative use exception should be based primarily on demonstrable harm to the direct licensing interests of copyright owners – the core of copyright. Importantly, however, there are unresolved questions about fairness that need to be more clearly addressed before the appropriate scope of a transformative use exception can be determined. This submission does not directly address the desirability of introducing a broader fair use right. It is likely that an open ended fair use exception is required to provide a more adequate balance between copyright owners and non-transformative users of copyright. If a broad fair use style exception is introduced, it would likely be desirable to include transformative uses within that exception. This submission, however, takes the more limited position that regardless of whether a fair use exception is introduced, an exception that permits unlicensed transformative uses is required in Australian copyright law.
Resumo:
Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.
Resumo:
Recently the use of the carbon fibre reinforced polymer(CFRP) composites appears to be an excellent solution for retrofitting and strengthening of concrete and steel structures because of its superior physical and mechanical properties through the integration of other materials. However, the overall functionality and durability under various environmental conditions of the system has not yet been well documented. This paper reviews the environmental durability of CFRP strengthened system that has received only small coverage in previous review articles. Future research topics have also been indentified, such as durability of steel circular hollow section under various environmental conditions subjected to bending. Environment of interests are moisture/solution, alkalinity, creep/relaxation, fatigue, fire, thermal effects (including freeze-thaw), and ultraviolet exposure.
Resumo:
The Internet is one of the most significant information and communication technologies to emerge during the end of the last century. It created new and effective means by which individuals and groups communicate. These advances led to marked institutional changes most notably in the realm of commercial exchange: it did not only provide the high-speed communication infrastructure to business enterprises; it also opened them to the global consumer base where they could market their products and services. Commercial interests gradually dominated Internet technology over the past several years and have been a factor in the increase of its user population and enhancement of infrastructure. Such commercial interests fitted comfortably within the structures of the Philippine government. As revealed in the study, state policies and programs make use of Internet technology as an enabler of commercial institutional reforms using traditional economic measures. Yet, despite efforts to maximize the Internet as an enabler for market-driven economic growth, the accrued benefits are yet to come about; it is largely present only in major urban areas and accessible to a small number of social groups. The failure of the Internet’s developmental capability can be traced back to the government’s wholesale adoption of commercial-centered discourse. The Internet’s developmental gains (i.e. instrumental, communicative and emancipatory) and features, which were always there since its inception, have been visibly left out in favor of its commercial value. By employing synchronic and diachronic analysis, it can be shown that the Internet can be a vital technology in promoting genuine social development in the Philippines. In general, the object is to realize a social environment of towards a more inclusive and participatory application of Internet technology, equally aware of the caveats or risks the technology may pose. It is argued further that there is a need for continued social scientific research regarding the social as and developmental implications of Internet technology at local level structures, such social sectors, specific communities and organizations. On the meta-level, such approach employed in this research can be a modest attempt in increasing the calculus of hope especially among the marginalized Filipino sectors, with the use of information and communications technologies. This emerging field of study—tentatively called Progressive Informatics—must emanate from the more enlightened social sectors, namely: the non-government, academic and locally-based organizations.
Resumo:
This chapter considers to what degree the careers of women with young families, both in and out of paid employment, are lived as contingent, intersubjective projects pursued across time and space, in the social condition of growing biographical possibilities and uneven social/ideological change. Their resolutions of competing priorities by engaging in various permutations of home-work and paid work are termed ‘workable solutions’, with an intentional play on the double sense of ‘work’ – firstly as labour, thus being able to perform work, whether paid or not; secondly as in being able to make things work or function in the family unit’s best interests, however defined.
Resumo:
Topic recommendation can help users deal with the information overload issue in micro-blogging communities. This paper proposes to use the implicit information network formed by the multiple relationships among users, topics and micro-blogs, and the temporal information of micro-blogs to find semantically and temporally relevant topics of each topic, and to profile users' time-drifting topic interests. The Content based, Nearest Neighborhood based and Matrix Factorization models are used to make personalized recommendations. The effectiveness of the proposed approaches is demonstrated in the experiments conducted on a real world dataset that collected from Twitter.com.
Resumo:
With the explosion of Web 2.0 application such as blogs, social and professional networks, and various other types of social media, the rich online information and various new sources of knowledge flood users and hence pose a great challenge in terms of information overload. It is critical to use intelligent agent software systems to assist users in finding the right information from an abundance of Web data. Recommender systems can help users deal with information overload problem efficiently by suggesting items (e.g., information and products) that match users’ personal interests. The recommender technology has been successfully employed in many applications such as recommending films, music, books, etc. The purpose of this report is to give an overview of existing technologies for building personalized recommender systems in social networking environment, to propose a research direction for addressing user profiling and cold start problems by exploiting user-generated content newly available in Web 2.0.
Resumo:
The social tags in Web 2.0 are becoming another important information source to profile users' interests and preferences to make personalized recommendations. To solve the problem of low information sharing caused by the free-style vocabulary of tags and the long tails of the distribution of tags and items, this paper proposes an approach to integrate the social tags given by users and the item taxonomy with standard vocabulary and hierarchical structure provided by experts to make personalized recommendations. The experimental results show that the proposed approach can effectively improve the information sharing and recommendation accuracy.
Resumo:
One of the ways in which indigenous communities seek justice is through the formal recognition of their sovereign rights to land. Such recognition allows indigenous groups to maintain a physical and spiritual connection with their land and continue customary management of their land. Indigenous groups world over face significant hurdles in getting their customary rights to land recognized by legal systems. One of the main difficulties for indigenous groups in claiming customary land rights is the existence of a range of conflicting legal entitlements attaching to the land in question. In Australia, similar to New Zealand and Canada legal recognition to customary land is recognized through a grant of native title rights or through the establishment of land use agreement. In other jurisdictions such as Indonesia and Papua New Guinea a form of customary land title has been preserved and is recognized by the legal system. The implementation of REDD+ and other forms of forest carbon investment activities compounds the already complex arrangements surrounding legal recognition of customary land rights. Free, prior and informed consent of indigenous groups is essential for forest carbon investment on customary land. The attainment of such consent in practice remains challenging due to the number of conflicting interests often associated with forested land. This paper examines Australia’s experience in recongising indigenous land rights under its International Forest Carbon Initiative and under its domestic Carbon Credits (Carbon Farming Initiative) Act (Australia) 2011. Australia’s International Forest Carbon initiative has a budget of $273 million dollars. In 2008 the governments of Australia and Indonesia signed the Indonesia-Australia Forest Carbon Partnership Agreement. This paper will examine the indigenous land tenure and justice lessons learned from the implementation of the Kalimantan Forest and Climate Partnership (KFCP). The KFCP is $30 million dollar project taking place over 120,000 hectares of degraded and forested peatland in Central Kalimantan, Indonesia. The KFCP project site contains seven villages of the Dayak Ngdu indigenous people. In 2011 Australia established a domestic Forest Carbon Initiative, which seeks to provide new economic opportunities for farmers, forest growers and indigenous landholders while helping the environmental by reducing carbon pollution. This paper will explore the manner in which indigenous people are able to participate within these scheme noting the limits and opportunities in deriving co-benefits for indigenous people in Australia under this scheme.
Resumo:
The content for the school science curriculum has always been an interplay or contest between the interests of a number of stakeholders, who have an interest in establishing it at a new level of schooling or in changing its current form. For most of its history, the interplay was dominated by the interests of academic scientists, but in the 1980s the needs of both future scientists and future citizens began to be more evenly balanced as science educators promoted a wider sense of science. The contest changed again in the 1990s with a super-ordinate control being exerted by government bureaucrats at the expense of the subject experts. This change coincides with the rise in a number of countries of a market view of education, and of science education in particular, accompanied by demands for public accountability via simplistic auditing measures. This shift from expertise to bureaucratise and its consequences for the quality of science education is illustrated with five case studies of science curriculum reform in Australia.
Resumo:
Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.
Resumo:
In a critical but sympathetic reading of Habermas’s work (1984, 1987a, 1987b, 2003), Luke Goode (2005) recently sought to rework his theory of deliberative democracy in an age of mediated and increasingly digital public spheres. Taking a different approach, Alan McKee (2005) challenged the culture- and class-bound strictures of Habermasian rationalism, instead pursuing a more radically pluralist account of postmodern public spheres. The editors of this special section of Media, Culture & Society invited us to discuss our differing approaches to the public sphere. Goode holds that the institutional bases of contemporary public spheres (political parties, educational institutions or public media) remain of critical importance, albeit in the context of a kaleidoscopic array of unofficial and informal micro-publics, both localized and de-territorialized. In contrast, McKee sustains a ‘hermeneutics of suspicion’ toward the official, hegemonic institutions of the public sphere since they tend to exclude and delegitimize discourses and practices that challenge their polite middle-class norms. McKee’s recent research has focused on sexual cultures, particularly among youth (McKee, 2011). Goode’s recent work has examined new social media spaces, particularly in relation to news and public debate (e.g. Goode, 2009; Goode et al., 2011). Consequently, our discussion turned to a domain which links our interests: after Goode discussed some of his recent research on (in)civility on YouTube as a new media public sphere, McKee challenged him to consider the case of pornographic websites modelled on social media sites.1 He identifies a greater degree of ‘civility’ in these pornographic sibling sites than on YouTube, requiring careful consideration of what constitutes a ‘public sphere’ in contemporary digital culture. Such sites represent an environment that shatters the opposition of public and private interest, affording public engagement on matters of the body, of intimacy, of gender politics, of pleasure and desire – said by many critics to be ruled out of court in Habermasian theory. Such environments also trouble traditional binaries between the cognitive and the affective, and between the performative and the deliberative. In what follows we explore the differences between our approaches in the form of a dialogue. As is often the case, our approaches seemed less at odds after engaging in conversation than may have initially appeared. But important differences of emphasis remain.
Resumo:
As e-commerce is becoming more and more popular, the number of customer reviews that a product receives grows rapidly. In order to enhance customer satisfaction and their shopping experiences, it has become important to analysis customers reviews to extract opinions on the products that they buy. Thus, Opinion Mining is getting more important than before especially in doing analysis and forecasting about customers’ behavior for businesses purpose. The right decision in producing new products or services based on data about customers’ characteristics means profit for organization/company. This paper proposes a new architecture for Opinion Mining, which uses a multidimensional model to integrate customers’ characteristics and their comments about products (or services). The key step to achieve this objective is to transfer comments (opinions) to a fact table that includes several dimensions, such as, customers, products, time and locations. This research presents a comprehensive way to calculate customers’ orientation for all possible products’ attributes.
Resumo:
We propose CIMD (Collaborative Intrusion and Malware Detection), a scheme for the realization of collaborative intrusion detection approaches. We argue that teams, respectively detection groups with a common purpose for intrusion detection and response, improve the measures against malware. CIMD provides a collaboration model, a decentralized group formation and an anonymous communication scheme. Participating agents can convey intrusion detection related objectives and associated interests for collaboration partners. These interests are based on intrusion objectives and associated interests for collaboration partners. These interests are based on intrusion detection related ontology, incorporating network and hardware configurations and detection capabilities. Anonymous Communication provided by CIMD allows communication beyond suspicion, i.e. the adversary can not perform better than guessing an IDS to be the source of a message at random. The evaluation takes place with the help of NeSSi² (www.nessi2.de), the Network Security Simulator, a dedicated environment for analysis of attacks and countermeasures in mid-scale and large-scale networks. A CIMD prototype is being built based on the JIAC agent framework(www.jiac.de).
Resumo:
This book examines the caveat from its inception to the present, exploring the practice in all the jurisdictions in Australia and New Zealand. Emphasis has been placed on providing numerous references to assist land law practitioners.