930 resultados para Energy security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mainstream discourse on the revolving around food security is often portrayed by macro level indicators on nutrition, consumption and food production. While these indicators may prove significant in addressing food security in the national and regional levels, it falls short in addressing it among the indigenous peoples’ (IP) communities in the Philippines. Reflecting through the experiences in agricultural production, indigenous knowledge and socio-political institutions are relevant factors that must be seriously considered when food security among IPs are concerned. It is argued that disregarding micro level interactions over macro development policies will not address the issue of food security among marginalized sectors. The paper presents policy recommendations in taking cultural systems seriously in addressing food security among indigenous peoples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research investigated airborne particle characteristics and their dynamics inside and around the envelope of mechanically ventilated office buildings, together with building thermal conditions and energy consumption. Based on these, a comprehensive model was developed to facilitate the optimisation of building heating, ventilation and air conditioning systems, in order to protect the health of their occupants and minimise the energy requirements of these buildings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ability of metals to store or trap considerable amounts of energy, and thus exist in a non-equilibrium or metastable state, is very well known in metallurgy; however, such behaviour, which is intimately connected with the defect character of metals, has been largely ignored in noble metal surface electrochemistry. Techniques for generating unusually high energy surface states for gold, and the unusual voltammetric responses of such states, are outlined. The surprisingly high (and complex) electrocatalytic activity of gold in aqueous media is attributed to the presence of a range of such non-equilibrium states as the vital entities at active sites on conventional gold surfaces. The possible relevance of these ideas to account for the remarkable catalytic activity of oxide-supported gold microparticles is briefly outlined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Clean Energy Package has been introduced to respond to the global challenge of climate change and reduce Australia’s greenhouse gas emissions. It includes legislation to establish an emissions trading scheme. In support of the entities that are liable under this Package, there are a number of assistance measures offered to alleviate the financial burden that the Package imposes. This paper considers whether these assistance measures are subsidies within the context of the law of the World Trade Organization. In order to do this, the rules of the Agreement on Subsidies and Countervailing Measures are examined. This examination enables an understanding of when a subsidy exists and in what circumstances those subsidies occasion the use of remedies under the law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this study was to examine whether maternal-report of child eating behaviour at two years predicted self-regulation of energy intake and weight status at four years. Using an ‘eating in the absence of hunger’ paradigm, children’s energy intake (kJ) from a semi-standardized lunch meal and a standardized selection of snacks were measured. Participants were 37 mother-child dyads (16 boys, Median child age = 4.4 years, Inter-quartile range = 3.7-4.5 years) recruited from an existing longitudinal study (NOURISH randomised controlled trial). All participants were tested in their own home. Details of maternal characteristics, child eating behaviours (at age two years) reported by mothers on a validated questionnaire, and measured child height and weight (at age 3.5-4 years) were sourced from existing NOURISH trial data. Correlation and partial correlation analyses were used to examine longitudinal relationships. Satiety responsiveness and Slowness in eating were inversely associated with energy intake of the lunch meal (partial r = -.40, p =.023, and partial r = -.40, p = .023) and the former was also negatively associated with BMI-for-age Z score (partial r = -.42, p = .015). Food responsiveness and Enjoyment of food were not related to energy intake or BMI Z score. None of the eating behaviours were significantly associated with energy intake of the snacks (i.e., eating in the absence of hunger). The small and predominantly ‘healthy weight’ sample of children may have limited the ability to detect some hypothesized effects. Nevertheless, the study provides evidence for the predictive validity of two eating behaviours and future research with a larger and more diverse sample should be able to better evaluate the predictive validity of other children’s early eating behaviour styles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although there is an increasing recognition of the impacts of climate change on communities, residents often resist changing their lifestyle to reduce the effects of the problem. By using a landscape architectural design medium, this paper argues that public space, when designed as an ecological system, has the capacity to create social and environmental change and to increase the quality of the human environment. At the same time, this ecological system can engage residents, enrich the local economy, and increase the social network. Through methods of design, research and case study analysis, an alternative master plan is proposed for a sustainable tourism development in Alacati, Turkey. Our master plan uses local geographical, economic and social information within a sustainable landscape architectural design scheme that addresses the key issues of ecology, employment, public space and community cohesion. A preliminary community empowerment model (CEM) is proposed to manage the designs. The designs address: the coexistence of local agricultural and sustainable energy generation; state of the art water management; and the functional and sustainable social and economic interrelationship of inhabitants, NGOs, and local government.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses findings made during a study of energy use feedback in the home (eco-feedback), well after the novelty has worn off. Contributing towards four important knowledge gaps in the research, we explore eco-feedback over longer time scales, focusing on instances where the feedback was not of lasting benefit to users rather than when it was. Drawing from 23 semi-structured interviews with Australian householders, we found that an initially high level of engagement gave way over time to disinterest, neglect and in certain cases, technical malfunction. Additionally, preconceptions concerned with the “purpose” of the feedback were found to affect use. We propose expanding the scope of enquiry for eco-feedback in several ways, and describe how eco-feedback that better supports decision-making in the “maintenance phase”, i.e. once the initial novelty has worn off, may be key to longer term engagement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main aim was to expand existing knowledge on the influence of physical activity on gastric emptying and appetite control. Through a series of three complementary research studies interactions between exercise, gastric emptying, appetite and energy intake were investigated in males. Relationships with body composition and energy expenditure were also addressed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.