978 resultados para 662


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports the results of a mixed method approach to answer: To what extent do cultural values impact on e-service use in Saudi Arabia, and if so how? This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used and present the questionnaire findings related to the role of nepotism. The review of the literature on nepotism indicates there is still much to be studied and learned. The legal aspects of nepotism, in addition to its impact on human resource management appear to be the more reported issues. However, nepotism’s impact on Information and Communication Technologies (ICT) has not been studied. This research aims to cover this gap by investigating to what extent nepotism, as one of Saudi Arabia’s cultural values, impacts on e-service use in Saudi Arabia. The tested hypothesis was found consistent with its predicted outcome: nepotism is a negative predictor of intention to use e- services in Saudi Arabia. It is evidenced that consideration of the impact of the cultural values will mainly contribute to the enhancement of social and organisational aspects of e-society research and practices, by deeply understanding them as of the influntials to e-service implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

International Relations’ engagement with global health governance has proliferated in the last decade. There are a number of excellent works that seek to understand how the relationship between politics and health shapes and informs people’s lives and governments’ policies. However, the overt securitization of health by the IR field has, Biosecurity interventions argues, remained relatively unproblematized...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper evaluates the suitability of sequence classification techniques for analyzing deviant business process executions based on event logs. Deviant process executions are those that deviate in a negative or positive way with respect to normative or desirable outcomes, such as non-compliant executions or executions that undershoot or exceed performance targets. We evaluate a range of feature types and classification methods in terms of their ability to accurately discriminate between normal and deviant executions both when deviances are infrequent (unbalanced) and when deviances are as frequent as normal executions (balanced). We also analyze the ability of the discovered rules to explain potential causes and contributing factors of observed deviances. The evaluation results show that feature types extracted using pattern mining techniques only slightly outperform those based on individual activity frequency. The results also suggest that more complex feature types ought to be explored to achieve higher levels of accuracy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Accurate process model elicitation continues to be a time consuming task, requiring skill on the part of the interviewer to extract explicit and tacit process information from the interviewee. Many errors occur in this elicitation stage that would be avoided by better activity recall, more consistent specification methods and greater engagement in the elicitation process by interviewees. Theories of situated cognition indicate that interactive 3D representations of real work environments engage and prime the cognitive state of the viewer. In this paper, our major contribution is to augment a previous process elicitation methodology with virtual world context metadata, drawn from a 3D simulation of the workplace. We present a conceptual and formal approach for representing this contextual metadata, integrated into a process similarity measure that provides hints for the business analyst to use in later modelling steps. Finally, we conclude with examples from two use cases to illustrate the potential abilities of this approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes a design framework intended to conceptually map the influence that game design has on the creative activity people engage in during gameplay. The framework builds on behavioral and verbal analysis of people playing puzzle games. The analysis was designed to better understand the extent to which gameplay activities within different games facilitate creative problem solving. We have used an expert review process to evaluate these games in terms of their game design elements and have taken a cognitive action approach to this process to investigate how particular elements produce the potential for creative activity. This paper proposes guidelines that build upon our understanding of the relationship between the creative processes that players undertake during a game and the components of the game that allow these processes to occur. These guidelines may be used in the game design process to better facilitate creative gameplay activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim Large-scale patterns linking energy availability, biological productivity and diversity form a central focus of ecology. Despite evidence that the activity and abundance of animals may be limited by climatic variables associated with regional biological productivity (e.g. mean annual precipitation and annual actual evapotranspiration), it is unclear whether plant–granivore interactions are themselves influenced by these climatic factors across broad spatial extents. We evaluated whether climatic conditions that are known to alter the abundance and activity of granivorous animals also affect rates of seed removal. Location Eleven sites across temperate North America. Methods We used a common protocol to assess the removal of the same seed species (Avena sativa) over a 2-day period. Model selection via the Akaike information criterion was used to determine a set of candidate binomial generalized linear mixed models that evaluated the relationship between local climatic data and post-dispersal seed predation. Results Annual actual evapotranspiration was the single best predictor of the proportion of seeds removed. Annual actual evapotranspiration and mean annual precipitation were both positively related to mean seed removal and were included in four and three of the top five models, respectively. Annual temperature range was also positively related to seed removal and was an explanatory variable in three of the top four models. Main conclusions Our work provides the first evidence that energy and precipitation, which are known to affect consumer abundance and activity, also translate to strong, predictable patterns of seed predation across a continent. More generally, these findings suggest that future changes in temperature and precipitation could have widespread consequences for plant species composition in grasslands, through impacts on plant recruitment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter examines what Parpart and Zalewski (2008) label 'the man question' in terms of the rural. That is, 'how masculinity comes to be "made" as a continuing process within the social context' of rural places and spaces (Kerfoot and Knights 1993: 662). Our understanding of masculinities as discursively produced, relational, multiple and changing is given empirical force through a case study of the annual resource conference, Diggers and Dealers. The conference, held in the remote mining town of Kalgoorlie in Western Australia since 1992, is today the largest international meeting for the resource sector, attracting over 2000 attendees. Through an analysis of 120 texts related to the conference from 2006 to the present, including media repotis, blogs and conference programs and speeches, we demonstrate how, what is essentially a corporate event, is imported into the rural and constructed through the intersecting discourses of rurality, masculinity and heterosexuality. That is, though the first such meeting may have taken place spontaneously in Kalgoorlie, the delegates, and the 'skimpy' barmaids who serve patrons in their underwear or sometimes topless and are seen as central to the event, are flown into town for the conference. Kalgoorlie, as a working mining community on the edge of the deseti, provides both spectacle and conditions for the enactment of frontier masculinity not possible in the metropole.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Business Process Management describes a holistic management approach for the systematic design, modeling, execution, validation, monitoring and improvement of organizational business processes. Traditionally, most attention within this community has been given to control-flow aspects, i.e., the ordering and sequencing of business activities, oftentimes in isolation with regards to the context in which these activities occur. In this paper, we propose an approach that allows executable process models to be integrated with Geographic Information Systems. This approach enables process models to take geospatial and other geographic aspects into account in an explicit manner both during the modeling phase and the execution phase. We contribute a structured modeling methodology, based on the well-known Business Process Model and Notation standard, which is formalized by means of a mapping to executable Colored Petri nets. We illustrate the feasibility of our approach by means of a sustainability-focused case example of a process with important ecological concerns.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on the development of a playful digital experience, Anim-action, designed for young children with developmental disabilities. This experience was built using the Stomp platform, a technology designed specifically to meet the needs of people with intellectual disability through facilitating whole body interaction. We provide detail on how knowledge gained from key stakeholders informed the design of the application and describe the design guidelines used in the development process. A study involving 13 young children with developmental disabilities was conducted to evaluate the extent to which Anim-action facilitates cognitive, social and physical activity. Results demonstrated that Anim-action effectively supports cognitive and physical activity. In particular, it promoted autonomy and encouraged problem solving and motor planning. Conversely, there were limitations in the system’s ability to support social interaction, in particular, cooperation. Results have been analyzed to determine how design guidelines might be refined to address these limitations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

So far, low probability differentials for the key schedule of block ciphers have been used as a straightforward proof of security against related-key differential analysis. To achieve resistance, it is believed that for cipher with k-bit key it suffices the upper bound on the probability to be 2− k . Surprisingly, we show that this reasonable assumption is incorrect, and the probability should be (much) lower than 2− k . Our counter example is a related-key differential analysis of the well established block cipher CLEFIA-128. We show that although the key schedule of CLEFIA-128 prevents differentials with a probability higher than 2− 128, the linear part of the key schedule that produces the round keys, and the Feistel structure of the cipher, allow to exploit particularly chosen differentials with a probability as low as 2− 128. CLEFIA-128 has 214 such differentials, which translate to 214 pairs of weak keys. The probability of each differential is too low, but the weak keys have a special structure which allows with a divide-and-conquer approach to gain an advantage of 27 over generic analysis. We exploit the advantage and give a membership test for the weak-key class and provide analysis of the hashing modes. The proposed analysis has been tested with computer experiments on small-scale variants of CLEFIA-128. Our results do not threaten the practical use of CLEFIA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE is a high-speed hardware-oriented scheme, suitable for high-throughput network nodes or generally any environment where specialized hardware (such as FPGAs or ASICs) can be used to provide high data processing rates. ICEPOLE-128 (the primary ICEPOLE variant) is very fast. On the modern FPGA device Virtex 6, a basic iterative architecture of ICEPOLE reaches 41 Gbits/s, which is over 10 times faster than the equivalent implementation of AES-128-GCM. The throughput-to-area ratio is also substantially better when compared to AES-128-GCM. We have carefully examined the security of the algorithm through a range of cryptanalytic techniques and our findings indicate that ICEPOLE offers high security level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we attack round-reduced Keccak hash function with a technique called rotational cryptanalysis. We focus on Keccak variants proposed as SHA-3 candidates in the NIST’s contest for a new standard of cryptographic hash function. Our main result is a preimage attack on 4-round Keccak and a 5-round distinguisher on Keccak-f[1600] permutation — the main building block of Keccak hash function.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores the effects of PLM and BIM on professional practice. It draws on existing literature documenting the experiences of both communities of practice to explain shifts in professional boundaries. A review of case study based literature compares the nature of changes triggered by PLM and BIM relative to the new activities, roles/responsibilities and knowledge competencies, and supply chain relationships. The paper synthesises these changes and reflects PLM and BIM experiences against each other so as to contrast the continuing evolution of professional practice and lessons learned.