877 resultados para Insider trading


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper introduces an energy-efficient Rate Adaptive MAC (RA-MAC) protocol for long-lived Wireless Sensor Networks (WSN). Previous research shows that the dynamic and lossy nature of wireless communication is one of the major challenges to reliable data delivery in a WSN. RA-MAC achieves high link reliability in such situations by dynamically trading off radio bit rate for signal processing gain. This extra gain reduces the packet loss rate which results in lower energy expenditure by reducing the number of retransmissions. RA-MAC selects the optimal data rate based on channel conditions with the aim of minimizing energy consumption. We have implemented RA-MAC in TinyOS on an off-the-shelf sensor platform (TinyNode), and evaluated its performance by comparing RA-MAC with state-ofthe- art WSN MAC protocol (SCP-MAC) by experiments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis examines the advanced North American environmental mitigation schemes for their applicability to Queensland. Compensatory wetland mitigation banking, in particular, is concerned with in-perpetuity management and protection - the basic concerns of the Queensland public about its unique environment. The process has actively engaged the North American market and become a thriving industry that (for the most part) effectively designs, creates and builds (or enhances) environmental habitat. A methodology was designed to undertake a comprehensive review of the history, evolution and concepts of the North American wetland mitigation banking system - before and after the implementation of a significant new compensatory wetland mitigation banking regulation in 2008. The Delphi technique was then used to determine the principles and working components of wetland mitigation banking. Results were then applied to formulate a questionnaire to review Australian marketbased instruments (including offsetting policies) against these North American principles. Following this, two case studies established guiding principles for implementation based on two components of the North American wetland mitigation banking program. The subsequent outcomes confirmed that environmental banking is a workable concept in North America and that it is worth applying in Queensland. The majority of offsetting policies in Australia have adopted some principles of the North American mitigation programs. Examination reveals that however, they fail to provide adequate incentives for private landowners to participate because the essential trading mechanisms are not employed. Much can thus be learnt from the North American situation - where private enterprise has devised appropriate free market concepts. The consequent environmental banking process (as adapted from the North American programs) should be implemented in Queensland. It can then focus here on engaging the private sector, where the majority of naturally productive lands are managed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increase of buyer-driven supply chains, outsourcing and other forms of non-traditional employment has resulted in challenges for labour market regulation. One business model which has created substantial regulatory challenges is supply chains. The supply chain model involves retailers purchasing products from brand corporations who then outsource the manufacturing of the work to traders who contract with factories or outworkers who actually manufacture the clothing and textiles. This business model results in time and cost pressures being pushed down the supply chain which has resulted in sweatshops where workers systematically have their labour rights violated. Literally millions of workers work in dangerous workplaces where thousands are killed or permanently disabled every year. This thesis has analysed possible regulatory responses to provide workers a right to safety and health in supply chains which provide products for Australian retailers. This thesis will use a human rights standard to determine whether Australia is discharging its human rights obligations in its approach to combating domestic and foreign labour abuses. It is beyond this thesis to analyse Occupational Health and Safety (OHS) laws in every jurisdiction. Accordingly, this thesis will focus upon Australian domestic laws and laws in one of Australia’s major trading partners, the Peoples’ Republic of China (China). It is hypothesised that Australia is currently breaching its human rights obligations through failing to adequately regulate employees’ safety at work in Australian-based supply chains. To prove this hypothesis, this thesis will adopt a three- phase approach to analysing Australia’s regulatory responses. Phase 1 will identify the standard by which Australia’s regulatory approach to employees’ health and safety in supply chains can be judged. This phase will focus on analysing how workers’ rights to safety as a human right imposes a moral obligation on Australia to take reasonablely practicable steps regulate Australian-based supply chains. This will form a human rights standard against which Australia’s conduct can be judged. Phase 2 focuses upon the current regulatory environment. If existing regulatory vehicles adequately protect the health and safety of employees, then Australia will have discharged its obligations through simply maintaining the status quo. Australia currently regulates OHS through a combination of ‘hard law’ and ‘soft law’ regulatory vehicles. The first part of phase 2 analyses the effectiveness of traditional OHS laws in Australia and in China. The final part of phase 2 then analyses the effectiveness of the major soft law vehicle ‘Corporate Social Responsibility’ (CSR). The fact that employees are working in unsafe working conditions does not mean Australia is breaching its human rights obligations. Australia is only required to take reasonably practicable steps to ensure human rights are realized. Phase 3 identifies four regulatory vehicles to determine whether they would assist Australia in discharging its human rights obligations. Phase 3 then analyses whether Australia could unilaterally introduce supply chain regulation to regulate domestic and extraterritorial supply chains. Phase 3 also analyses three public international law regulatory vehicles. This chapter considers the ability of the United Nations Global Compact, the ILO’s Better Factory Project and a bilateral agreement to improve the detection and enforcement of workers’ right to safety and health.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project is an account of one teacher's journey with her students, across cultural boundaries in search of creating authentic Asian/Australian Drama experiences. The project explores the notion of establishing a shared cultural context. The early chapters focus on the background influences that determine where and how the project is set. Subsequent chapters provide an account of the innovative use of dramatic forms used in preparation for the fieldwork, then account of the fieldwork and post classwork. The study ends with a series of recommendations for any teacher intending to undertake a similar project.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: This paper aims to show that identification of expectations and software functional requirements via consultation with potential users is an integral component of the development of an emergency department patient admissions prediction tool. ---------- Design/methodology/approach: Thematic analysis of semi-structured interviews with 14 key health staff delivered rich data regarding existing practice and future needs. Participants included emergency department staff, bed managers, nurse unit managers, directors of nursing, and personnel from health administration. ---------- Findings: Participants contributed contextual insights on the current system of admissions, revealing a culture of crisis, imbued with misplayed communication. Their expectations and requirements of a potential predictive tool provided strategic data that moderated the development of the Emergency Department Patient Admissions Prediction Tool, based on their insistence that it feature availability, reliability and relevance. In order to deliver these stipulations, participants stressed that it should be incorporated, validated, defined and timely. ---------- Research limitations/implications: Participants were envisaging a concept and use of a tool that was somewhat hypothetical. However, further research will evaluate the tool in practice. ---------- Practical implications: Participants' unsolicited recommendations regarding implementation will not only inform a subsequent phase of the tool evaluation, but are eminently applicable to any process of implementation in a healthcare setting. ---------- Originality/value: The consultative process engaged clinicians and the paper delivers an insider view of an overburdened system, rather than an outsider's observations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we follow Jegadeesh and Titman's (1993, Journal of Finance) approach to examine 25 momentum/contrarian trading strategies using monthly stock returns in China for the period from 1994 to 2007. Our results suggest that there is no momentum profitability in any of the 25 strategies. In contrast, there is some evidence of reversal effects where the past winners become losers and past losers become winners afterward. The contrarian profit is statistically significant for the strategies using short formation and holding periods, especially for the formation periods of 1 to 3 months and the holding periods of 1 to 3 months. The contrarian strategies can generate about 12% per annum on average. Moreover, we follow Heston and Sadka (2008, Journal of Financial Economics) to investigate where there is any seasonal pattern in the cross-sectional variation of average stock returns in our momentum/contrarian strategies. There is no evidence of any seasonal pattern, and the results are robust to different formation and holding periods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The focus of this paper is the role of Australian parents in early childhood education and care (ECEC), in particular, their role in shaping ECEC public policy. The paper reports the findings of a study investigating the different ways in which a group of parents viewed and experienced this role. Set against a policy backdrop where parents are positioned as 'consumers' and 'participants' in ECEC, the study employed a phenomenographic research approach to describe this role as viewed and experienced by parents. The study identified four logically related, qualitatively different ways of constituting this role among this group of parents, ranging from 'no role in shaping public policy' (the no role conception) to 'participating in policy decision-making, particularly where policy was likely to affect their child and family (the participating in policy decision-making conception). The study provides an insider-perspective on the role of parents in shaping policy and highlights variation in how this role is constituted by parents. The study also identifies factors perceived by parents as influencing their participation and discusses their implications for both policy and practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The challenges of climate change pose problems requiring new and innovative legal responses by legal practitioners, government officials and corporate officers. This book addresses a broad range of topic areas where climate change has impact and systematically analyses the key legal responses to climate change, both at the international level and within Australia at federal, State and local levels. In particular, it critically examines: •the rights, duties and market mechanisms established under the international climate change regime •the effect of climate change policies on the implementation of environmental and planning laws •new regimes for the implementation of renewable energy and energy efficiency initiatives •legal frameworks for the implementation of biological and geological sequestration projects (including forest projects and carbon rights); and •legal principles for the design of an effective carbon trading scheme for Australia It also considers the role of the common law including: •the likely response of the law of torts to emerging forms of climate change harm; and •potential liabilities for professionals who must take climate change into account in their decision-making and advice

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Through international agreement to the United Nations Framework Convention on Climate Change and the Kyoto Protocol the global community has acknowledged that climate change is a global problem and sought to achieve reductions in global emissions, within a sufficient timeframe, to avoid dangerous anthropogenic interference with the climate system. The sheer magnitude of emissions reductions required within such an urgent timeframe presents a challenge to conventional regulatory approaches both internationally and within Australia. The phenomenon of climate change is temporally and geographically challenging and it is scientifically complex and uncertain. The purpose of this paper is to analyse the current Australian legal response to climate change and to examine the legal measures which have been proposed to promote carbon trading, energy efficiency, renewable energy, and carbon sequestration initiatives across Australia. As this paper illustrates, the current Australian approach is clearly ineffective and the law as it stands overwhelmingly inadequate to address Australia’s emissions and meet the enormity of the challenges posed by climate change. Consequently, the government should look towards a more effective legal framework to achieve rapid and urgent transformations in the selection of energy sources, energy use and sequestration initiatives across the Australian community.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe research into the identification of anomalous events and event patterns as manifested in computer system logs. Prototype software has been developed with a capability that identifies anomalous events based on usage patterns or user profiles, and alerts administrators when such events are identified. To reduce the number of false positive alerts we have investigated the use of different user profile training techniques and introduce the use of abstractions to group together applications which are related. Our results suggest that the number of false alerts that are generated is significantly reduced when a growing time window is used for user profile training and when abstraction into groups of applications is used.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reviews the status of alcohol, drugs and traffic safety in Australia, with particular emphasis on developments in the period 2008-2010. Australian jurisdictions have made impressive improvements in road safety since the early 1970s. Enforcement and public education campaigns that specifically target drink driving have been successful, with resultant long-term reduction in alcohol-related fatalities. There is a high level of community disapproval of drink driving and strong support for countermeasures. Many best-practice countermeasures targeting impaired driving are in place, including general prevention/ deterrence programs such as random breath testing (RBT), random roadside drug testing legal alcohol limits, responsible service of alcohol programs, public education and advertising campaigns and designated driver programs, and offender management programs such as driver licensing penalties and fines, alcohol ignition interlocks and vehicle impoundment for high risk drink drivers, and offender education programs. There continue to be enhancements occurring, particularly in the areas of drug-impaired driving and offender management, but also in addressing the fundamental policy and legislative framework to address impaired driving (e.g., a current national debate about lowering the permissible blood alcohol for all drivers from 0.05 to 0.02 or 0.00 gm/100 ml BAC). However, there are major challenges that may be impacting on programs targeting impaired driving, including the rapid development of a binge drinking culture among young Australians, the extension of trading hours of licensed premises, continued problems with secondary supply of alcohol to minors, and increases in the marketing of alcopops and ready-to-drink spirit-based beverages. This paper addresses the question: Are impaired driving countermeasures in Australia continuing to achieve reductions in road traumas and rates of offending, or are they plateauing? If they are plateauing, is this due to declining effectiveness of countermeasures or the need to ‘hold the line’ against societal influences encouraging impaired driving?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A method of selecting land in any region of Queensland for offsetting purposes is devised, employing uniform standards. The procedure first requires that any core natural asset lands, Crown environmental lands, prime urban and agricultural lands, and highly contentious sites in the region be eliminated from consideration. Other land is then sought that is located between existing large reservations and the centre of greatest potential regional development/disturbance. Using the criteria of rehabilitation (rather than preservation) plus proximity to those officially defined Regional Ecosystems that are most threatened, adjacent sites that are described as ‘Cleared’ are identified in terms of agricultural land capability. Class IV lands – defined as those ‘which may be safely used for occasional cultivation with careful management’,2 ‘where it is favourably located for special usage’,3 and where it is ‘helpful to those who are interested in industry or regional planning or in reconstruction’4 – are examined for their appropriate area, for current tenure and for any conditions such as Mining Leases that may exist. The positive impacts from offsets on adjoining lands can then be designed to be significant; examples are also offered in respect of riparian areas and of Marine Parks. Criteria against which to measure performance for trading purposes include functional lift, with other case studies about this matter reported separately in this issue. The procedure takes no account of demand side economics (financial additionality), which requires commercial rather than environmental analysis.