989 resultados para Ernest Hemingway


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The US Securities and Exchange Comission requires registered management investment companies to disclose how they vote proxies relating to portfolio securities they hold. The primary purpose of this rule is to enable fund investors to monitor the role of institutional shareholders in the corporate governance practices of public companies. In Australia, despite reform proposals, there are no regulations requiring institutional investors to report proxy voting procedures and practises. There is little evidence of voluntary disclosure of proxy voting by Australian managed investment schemes in equities, indicating that there are costs involved in such disclosure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IT Governance (ITG) adoption remains a relevant topic of study. While extensive research has been done looking into the drivers and critical success factors of ITG practice, there seems to be a lack of interest in identifying the barriers to its adoption. This study reports on a survey conducted to first: provide some primary data that suggest ITG adoption and maturity levels are still low, especially in a developing country like Malaysia; and second: to provide initial empirical support for model development. Results obtained supported our assumptions that: (1) ITG adoption and maturity levels are still relatively low in Malaysia, therefore justifying Malaysia as a suitable case; (2) organizational factors, environmental factors and characteristics of the innovation as identified from the literature may serve as possible barriers to adoption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To test the importance of the dopamine D2 receptor (DRD2) region in nicotine dependence, 150 smokers and 228 controls were genotyped for the DRD2 C957T, -141delC and ANKK1 TaqIA polymorphisms (rs6277, rs1799732 and rs1800497, respectively). The -141delC SNP did not show any association but both the C957T and TaqIA SNPs showed association at the allele, genotype, haplotype and combined genotype levels. The 957C/TaqI A1 haplotype was more than 3.5 times as likely to be associated with nicotine dependence compared with the 957T/TaqI A1 haplotype (P = 0.003). Analysis of the combined genotypes of both SNPs revealed that individuals who were homozygous for the 957C-allele (CC) and had either one or two copies of the TaqI A1-allele were 3.3 times as likely to have nicotine dependence compared to all other genotype combinations (P = 0.0003) and that these genotypes accounted for approximately 13% of the susceptibility to nicotine addiction in our population. Our findings suggest that the DRD2 C957T polymorphism and the ANKK1 TaqIA polymorphism are key contributors to the genetic susceptibility to nicotine dependence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Emergence has the potential to effect complex, creative or open-ended interactions and novel game-play. We report on research into an emergent interactive system. This investigates emergent user behaviors and experience through the creation and evaluation of an interactive system. The system is +-NOW, an augmented reality, tangible, interactive art system. The paper briefly describes the qualities of emergence and +-NOW before focusing on its evaluation. This was a qualitative study with 30 participants conducted in context. Data analysis followed Grounded Theory Methods. Coding schemes, induced from data and external literature are presented. Findings show that emergence occurred in over half of the participants. The nature of these emergent behaviors is discussed along with examples from the data. Other findings indicate that participants found interaction with the work satisfactory. Design strategies for facilitating satisfactory experience despite the often unpredictable character of emergence, are briefly reviewed and potential application areas for emergence are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The interactive art system +-now is modelled on the openness of the natural world. Emergent shapes constitute a novel method for facilitating this openness. With the art system as an example, the relationship between openness and emergence is discussed. Lastly, artist reflections from the creation of the work are presented. These describe the nature of open systems and how they may be created.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Glass Pond is an interactive artwork designed to engender exploration and reflection through an intuitive, tangible interface and a simulation agent. It is being developed using iterative methods. A study has been conducted with the aim of illuminating user experience, interface, design, and performance issues.The paper describes the study methodology and process of data analysis including coding schemes for cognitive states and movements. Analysis reveals that exploration and reflection occurred as well as composing behaviours (unexpected). Results also show that participants interacted to varying degrees. Design discussion includes the artwork's (novel) interface and configuration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Emergence is discussed in the context of a practice-based study of interactive art and a new taxonomy of emergence is proposed. The interactive art system ‘plus minus now’ is described and its relationship to emergence is discussed. ‘Plus minus now’ uses a novel method for instantiating emergent shapes. A preliminary investigation of this art system has been conducted and reveals the creation of temporal compositions by a participant. These temporal compositions and the emergent shapes are described using the taxonomy of emergence. Characteristics of emergent interactions and the implications of designing for them are discussed.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure industrial control systems. Our curriculum is unique in that it provides security awareness but also the advanced skills required for security specialists in this area. We are aware that in the Australian context there is a cultural gap between the thinking of control system engineers who are responsible for maintaining and designing critical infrastructure and information technology professionals who are responsible for protecting these systems from cyber attacks. Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing emails cause enormous losses to both users and organisations. The goal of this study is to determine which individuals are more vulnerable to phishing emails. To gain this information an experiment has been developed which involves sending phishing email to users and collecting information about users. The detection deception model has been applied to identify users’ detection behaviour. We find that users who have less email experience and high levels of submissiveness have increased susceptibility. Among those, users who have high susceptibility levels and high openness and extraversion are more likely to carry on the harmful action embedded in phishing emails.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To identify multiple sclerosis (MS) susceptibility loci, we conducted a genome-wide association study (GWAS) in 1,618 cases and used shared data for 3,413 controls. We performed replication in an independent set of 2,256 cases and 2,310 controls, for a total of 3,874 cases and 5,723 controls. We identified risk-associated SNPs on chromosome 12q13-14 (rs703842, P = 5.4 x 10(-11); rs10876994, P = 2.7 x 10(-10); rs12368653, P = 1.0 x 10(-7)) and upstream of CD40 on chromosome 20q13 (rs6074022, P = 1.3 x 10(-7); rs1569723, P = 2.9 x 10(-7)). Both loci are also associated with other autoimmune diseases. We also replicated several known MS associations (HLA-DR15, P = 7.0 x 10(-184); CD58, P = 9.6 x 10(-8); EVI5-RPL5, P = 2.5 x 10(-6); IL2RA, P = 7.4 x 10(-6); CLEC16A, P = 1.1 x 10(-4); IL7R, P = 1.3 x 10(-3); TYK2, P = 3.5 x 10(-3)) and observed a statistical interaction between SNPs in EVI5-RPL5 and HLA-DR15 (P = 0.001).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Endothelin-1 (ET-1) is a potent vasoactive peptide and a hypoxia-inducible angiogenic growth factor associated with the development and growth of solid tumours. This study evaluated the expression of big endothelin-1 (big ET-1), a stable precursor of ET-1, and ET-1 in non-small cell lung cancer (NSCLC). Big ET-1 expression was evaluated in paraffin-embedded tissue sections from 10 NSCLC tumours using immunohistochemistry and in situ hybridisation. The production of big ET-1 and ET-1 was studied in six established NSCLC cell lines. The plasma concentrations of big ET-1 were measured in 30 patients with proven NSCLC prior to chemotherapy by means of a sandwich enzyme-linked immunoassay and compared to levels in 20 normal controls. Big ET-1 immunostaining was detected in the cancer cells of all tumours studied. Using in situ hybridisation, tumour cell big ET-1 mRNA expression was demonstrated in all samples. All six NSCLC cell lines expressed ET-1, with big ET-1 being detected in three. The median big ET-1 plasma level in patients with NSCLC was 5.4 pg/mL (range 0-22.7 pg/mL) and was significantly elevated compared to median big ET-1 plasma levels in controls, 2.1 pg/mL (1.2-13.4 pg/mL) (p=0.0001). Furthermore, patients with plasma big ET-1 levels above the normal range (upper tertile) had a worse outcome (p=0.01). In conclusion, big ET-1/ET-1 is expressed by resected NSCLC specimens and tumour cell lines. Plasma big ET-1 levels are elevated in NSCLC patients compared to controls with levels >7.8 pg/mL being associated with a worse outcome. The development of selective ET-1 antagonists such as Atrasentan indicates that ET-1 may be a therapeutic target in NSCLC. © 2004 Wichtig Editore.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.