979 resultados para messages


Relevância:

10.00% 10.00%

Publicador:

Resumo:

RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2 13. In addition, we show the hashing algorithm can be distinguishable from a truly random sequence with probability close to one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This case study was conducted to explore the perceptions of health risk messages sent by the Japanese Government following the Fukushima nuclear power plant disaster. The content of health risk messages from the Japanese Government and the Japanese national broadcaster (NHK) were analysed and semi-structured interviews were conducted with a sample of Tokyo residents. Initially, participants trusted these messages but as the crisis unfolded they became sceptical about the messages. Participants felt the messages did not communicate health risk information effectively because the messages were; not supported by evidence, inconsistent, delayed and changed over time. Despite widespread access to the internet, social media and mobile telephones, most participants relied on television news for information about the health risks. The Japanese Government urgently needs to re-build trust by engaging the community in the planning and development phases of health risk communication strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social media have become crucial tools for political activists and protest movements, providing another channel for promoting messages and garnering support. Twitter, in particular, has been identified as a noteworthy medium for protests in countries including Iran and Egypt to receive global attention. The Occupy movement, originating with protests in, and the physical occupation of, Wall Street, and inspiring similar demonstrations in other U.S. cities and around the world, has been intrinsically linked with social media through location-specific hashtags: #ows for Occupy Wall Street, #occupysf for San Francisco, and so on. While the individual protests have a specific geographical focus-highlighted by the physical occupation of parks, buildings, and other urban areas-Twitter provides a means for these different movements to be linked and promoted through tweets containing multiple hashtags. It also serves as a channel for tactical communications during actions and as a space in which movement debates take place. This paper examines Twitter's use within the Occupy Oakland movement. We use a mixture of ethnographic research through interviews with activists and participant observation of the movements' activities, and a dataset of public tweets containing the #oo hashtag from early 2012. This research methodology allows us to develop a more accurate and nuanced understanding of how movement activists use Twitter by cross-checking trends in the online data with observations and activists' own reported use of Twitter. We also study the connections between a geographically focused movement such as Occupy Oakland and related, but physically distant, protests taking place concurrently in other cities. This study forms part of a wider research project, Mapping Movements, exploring the politics of place, investigating how social movements are composed and sustained, and the uses of online communication within these movements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we provide the results of a field study of a Ubicomp system called CAM (Cooperative Artefact Memory) in a Product Design studio. CAM is a mobile-tagging based messaging system that allows designers to store relevant information onto their design artefacts in the form of messages, annotations and external web links. From our field study results, we observe that the use of CAM adds another shared ‘space’ onto these design artefacts – that are in their natural settings boundary objects themselves. In the paper, we provide several examples from the field illustrating how CAM helps in the design process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose a new blind steganalytic method to detect the presence of secret messages embedded in black and white images using the steganographic techniques. We start by extracting several sets of matrix, such as run length matrix, gap length matrix and pixel difference. We also apply characteristic function on these matrices to enhance their discriminative capabilities. Then we calculate the statistics which include mean, variance, kurtosis and skewness to form our feature sets. The presented empirical works demonstrate our proposed method can effectively detect three different types of steganography. This proves the universality of our proposed method as a blind steganalysis. In addition, the experimental results show our proposed method is capable of detecting small amount of the embedded message.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Providing culturally appropriate health communication tools at a community level, whilst meeting funding objectives set by Government led initiatives, can be challenging. Literature states that a translational research framework fostering community communication can encourage the development of appropriate communication tools to facilitate transfer of health information between community and researchers. Reflections from initial Need for Feed cooking and nutrition education program trials in remote Indigenous communities across Cape York indicated program resources were neither meeting community nor researchers needs. In response, a translational research framework was modelled with collaborative partnerships formed between researchers and community with the aim of modifying current resources. Local working groups were established to facilitate communication and guide continual remodelling and retrial of resources for successive programs. Feedback from working groups indicated community members wanted resources with more pictures and less words. Partnership with Chronic Disease Resources Online (CDRO) led to the development of pictorial resources including 3 evaluation tools, 27 recipe sets and 10 education support materials. Between June to December 2012 resources were trialled across 4 Cape York communities with 69 school aged children and 4 community elders. Qualitative data has indicated high satisfaction with modified pictorial resources, proving pictorial resources to be an effective and culturally appropriate method to both communicate health messages to community and facilitate flow of evaluation data to researchers. A translational research framework fostering communication between community and researchers can potentially enhance the quality of health communication tools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper discusses the Townsville City Council Dry Tropics Water Smart (DTWS) initiative, developed by TCC Integrated Sustainability Services (ISS) and Townsville Water, and informed by The University of Adelaide. The program draws on many years of experience by the TCC team to blend key community-based research approaches in order to develop this residential outdoor water conservation program. Several community pilots have been conducted to test different behaviour change strategies and messages. This paper outlines recent steps taken to develop the community trials, as guided by a combination of behaviour change theories including community-based social marketing and thematic communications methods. Some preliminary results are outlined focused on community uptake of different strategies, community perceptions of communication materials, and some insights into the effectiveness of outdoor water hardware.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective To investigate how and when changes in workplace sitting time occurred following a workplace intervention to inform evaluation of intervention success. Method The 4-week Stand Up Comcare study (June–September 2011) aimed to reduce workplace sitting time via regularly interrupting and replacing sitting time throughout the day. Activity monitor (activPAL3) workplace data from control (n=22) and intervention participants (n=21) were analysed. Differences in the number and usual duration of sitting bouts were used to evaluate how change occurred. To examine when change occurred, intervention effects were compared by hour since starting work and hour of the workday. Change in workplace activity (sitting, standing, stepping) was examined to further inform alignment with intervention messages. Individual variability was examined in how and when the change occurred. Results Overall, behavioural changes aligned with intervention aims. All intervention participants reduced total workplace sitting time, though there was wide individual variability observed (range −29 to −262 min per 8 h workday). On average, intervention participants reduced number of sitting bouts (−4.6 bouts (95% CI −10.1 to 1.0), p=0.106) and usual sitting bout duration (−5.6 min (95% CI −9.8 to −1.4, p=0.011)) relative to controls. Sitting time reductions were observed across the workday, though intervention effects varied by hour of the day (p=0.015). The intervention group successfully adopted the Stand Up and Sit Less intervention messages across the day. Conclusion These analyses confirmed that this workplace intervention successfully modified sitting behaviour as intended (ie, fewer and shorter sitting bouts, with changes occurring throughout the day).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Up to 30% of young people drink at risky levels at least weekly. Yet, many do not view their alcohol use as problematic and focus only on its enjoyment and socialization benefits. Innovative, youth-friendly and highly accessible ways of delivering preventative health messages are required. This paper describes the design, development and prototype testing of ‘Ray’s Night Out’ a new iPhone application for promoting harm minimisation and controlled drinking strategies in young people. Two participatory design workshops were conducted with 5 young people to explore how technology could be used to enhance a good night out drinking. Four existing iPhone alcohol apps were reviewed. Five young people conducted initial prototype testing to refine app content and interface design. Final prototype testing was conducted with 10 young people. Prototype testing indicated young people had a very positive response to the Ray animated character and rated the app highly on aesthetics, engagement, content, functionality, usefulness and youth relevance. The Ray app provides a youth friendly approach to addressing alcohol misuse in young people. The impact of the Ray app on young people’s alcohol use knowledge, attitudes and behaviours is currently being evaluated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper presents a participatory design research framework as a primary method for structuring youth engagement, participation and contribution to the design, development and usability evaluation of three evidencebased e-tools for wellbeing, which include smart phone mobile apps as well as e-health websites. The three projects are part of a series of six e-tools part of Safe and Supportive program under Young and Well CRC. The participatory design method, developed by Zelenko (2012) for application in design of online health promoting technologies, was further piloted in partnership with Inspire USA for specific application within the CRC, deploying a combination of creative design workshops and speculative design activities in developing e-tool prototypes with young people. This paper presents the resulting participatory research framework as it was implemented across the e-tool projects to facilitate active youth participation in co-designing the e-tools and ensuring the final designs are relevant to young people and deliver health messages in engaging ways. The principles of Participatory Design (PD) that inform the new framework include a high degree of participant agency in creative decisionmaking and a commitment to the process of co-designing, with young people working alongside designers and developers. The paper will showcase how the PD framework was applied across three projects to increase young people’s contribution to final design outcome.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research Background: The proliferation of technologically-based interventions and mHealth in particular have led to a need for innovative, relevant and engaging ways of presenting health messages to young people using technology. ‘Ray’s Night Out’ is a mobile health application co-designed with young people by an interdisciplinary team of researchers at Queensland University of Technology. Research Questions: The design, research, development and evaluation of ‘Ray’s Night Out’ addressed a number of research questions from across the fields of Psychology and Interactive and Visual Design. The specific design research questions addressed were: How can a mobile intervention be best designed to promote young people’s safety and wellbeing and minimise harm when consuming alcohol on a typical night out? Specifically, how can principles of interactive and visual design be effectively applied to develop innovative digital health communication solutions that empower young people as active participants in improving their health and wellbeing? Research Contribution: Innovation The mobile app, as a digital artifact, represents a new way of engaging young people in the issue of alcohol consumption and the pacing and self-care behaviours through unique interaction, visual and interface designs which resulted from the participant-led and iterative design research process. The design of the specific interactive and visual features of the app informed by participatory design data and by health research present a novel approach to preventing young people in crossing the ‘stupid line’ on a typical night out. Research Significance: The significance of the design research component within the larger interdisciplinary practices that have informed ‘Ray’s Night Out’ (e.g. field of psychology, reported through journal articles and other related outcomes), is the unique visual and interactive presentation of participant data and health concepts within the app interface and interaction design which improves and increases young people’s engagement with the health messages it contains. The global quality standard is further demonstrated by the launch on Apple iTunes: https://itunes.apple.com/us/app/rays-night-out/id978589497?mt=8 This demonstrates the application meets the high professional requirements for global release and international standards set by Apple AppStore.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research Background Young people’s avid use of mobile technologies in daily life has led to an increase in the design and research on mHealth (mobile health) interventions targeting young people. ‘Music eScape’ is a mobile based mood regulation app that uses an innovative approach to promoting young people’s wellbeing using music. Research Question The design, research, development and evaluation of ‘Music eScape’ addressed a number of research questions from across the fields of Psychology and Interactive and Visual Design. The specific design research question addressed was: How can interaction and visual design be utilized to promote and enable young people to effectively regulate their mood using music and how can the new design further promote their experience of empowerment, control and agency over actively directing their mood journey? Research Contribution Innovation and New Knowledge Through its unique visual interface design and interactivity, the application presents a novel approach to promoting young people’s wellbeing using music and a specific function that allows users to ‘draw’ their mood journey in order to generate a playlist. The mobile app is the first to contain a function that enables users to plan their mood journey and exercise a sense of agency, intentional choice and control over the mood shift and by extension, their wellbeing. The feature ‘drawing’ interface was designed by Oksana Zelenko using participatory design research and Russell’s circumplex model of affect (1980) to inform the key visual design concept and underpinning interaction design. Research Significance The significance of the design research component within the larger interdisciplinary practices that have informed ‘Music eScape’ (e.g. field of psychology, reported through journal articles and other related outcomes), is the unique visual and interactive presentation of participant data and music therapy research within the app interface and interaction design which improves and increases young people’s engagement with the health messages it contains. The industry quality standard is further demonstrated by the launch on Apple iTunes. This demonstrates the application meets the high professional requirements for national release and meets international standards. The app also creates a new benchmark for the quality of health apps on the market as it marks the industry release of a trialled evidence-based mHealth intervention co-designed with young people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.