987 resultados para Boyd, Mike
Resumo:
The first of three articles in this issue addressing the public space topic considers public space and young people in the light of a range of papers delivered at the 27th International Conference on 'Making Cities Livable', held in Vienna, Austria, in July 2000. Under the overarching concept of the "liveable city" the conference themes of 'Rediscovery of public space' and 'Cities for the wellbeing of children' attracted a broad mix of those interested in the planning, design and management of urban space. A number of themes percolated through the conference which stimulated the writers to examine the nexus between urban development, young people and public space. There is an ongoing need to examine the meaning of public space in the face of powerful urban development trends. A model of public space practice is required which incorporates a vision of inclusive public spaces, fosters the interactivity of design, planning, social policy and management, and resources for greater communication and strategic action between stake holders from the most local of levels to those at state and international levels. The speed and magnitude of contemporary urban development makes community input and influence difficult, particularly for those impacted on by the exclusionary tendencies of much urban development. It is critical that a range of meaningful and sustainable mechanisms are developed which allow young people’s conceptions of what constitutes youth-friendly space to be directly made and taken account of.
Resumo:
The emergence of shopping malls in Europe, the UK and Australia over the last thirty years or so, raises questions about the disruptive effects of such capital intensive developments on local area shopping facilities, transport and other infrastructures and the maintenance of artificially high prices for goods, whereby the promised greater choice of shops and prices is rarely a genuine free market of competition leading to lower prices. A central question to be addressed is whom these centres represent and belong to. While many claim to exist to ‘serve the community’ almost all malls and centres are private property and the community of shoppers has few, if any rights compared with the conventional high street, which is a public thoroughfare. This permits the management of the centres through their own private security staff, to observe, follow, eject and refuse further admission to anyone considered to be ‘undesirable’. What is different about the newest shopping centres is the routine use of increasingly sophisticated CCTV surveillance equipment to observe and record, for later evidential and entry restriction use, the movements of centre visitors.
Resumo:
Predicate encryption is a new primitive that supports flexible control over access to encrypted data. We study predicate encryption systems, evaluating a wide class of predicates. Our systems are more expressive than the existing attribute-hiding systems in the sense that the proposed constructions support not only all existing predicate evaluations but also arbitrary conjunctions and disjunctions of comparison and subset queries. Toward our goal, we propose encryption schemes supporting multi-inner-product predicate and provide formal security analysis. We show how to apply the proposed schemes to achieve all those predicate evaluations.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked %(medical or other digital) images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.
Resumo:
The count-min sketch is a useful data structure for recording and estimating the frequency of string occurrences, such as passwords, in sub-linear space with high accuracy. However, it cannot be used to draw conclusions on groups of strings that are similar, for example close in Hamming distance. This paper introduces a variant of the count-min sketch which allows for estimating counts within a specified Hamming distance of the queried string. This variant can be used to prevent users from choosing popular passwords, like the original sketch, but it also allows for a more efficient method of analysing password statistics.
Resumo:
This presentation discusses topics and issues that connect closely with the Conference Themes and themes in the ARACY Report Card. For example, developing models of public space that are safe, welcoming and relevant to children and young people will impact on their overall wellbeing and may help to prevent many of the tensions occurring in Australia and elsewhere around the world. This area is the subject of ongoing international debate, research and policy formation, relevant to concerns in the ARACY Report Card about children and young people’s health and safety, participation, behaviours and risks and peer and family relationships.
Resumo:
This paper explores the concept of social exclusion as it impacts on young people within their local communities and the wider British, European and Australian context in terms of surveillance and other control measures.
Resumo:
The use of public space by young people and children is a major issue in a number of countries and a range of measures are deployed to to control public space which restrict their social and spatial citizenship rights.
Resumo:
This paper reports on current research work with children and young people on the importance of public and private space for good health, wellbeing, social, educational and developmental outcomes. In many urban locations in Australia and elsewhere, public space is under attack from developers and attempts by authorities to control public space (Watson 2006). Private space in the home and garden-backyard is also under attack from development densification and trends towards bigger houses on smaller plots of land where gardens disappear altogether or a postage stamp remains (Gleeson and Sipe 2006). At the same time public policy advocates the benefits of outdoor exercise, set alongside fears about using public space exacerbated by notions of ‘stranger danger’ and control measures such as child and youth ‘curfews’. In this increasingly complex context, it is important to discover what children and young people value and need most in using private (home) and public space. In conjunction with the University of Otago, New Zealand, children and young people are consulted to discover how they use public space in parks and shopping centres and home space and the issues encountered and their proposals for improvement, to better inform policy debate, planning and formulation (ARACY 2009).
Resumo:
This paper discusses the situation of welfare claimants, constructed as faulty citizens and flawed welfare subjects at the receiving end of complex and multi-layered, private and public, forms of monitoring and surveillance aimed at securing socially responsible, consuming and compliant behaviours. In Australia as in many other western countries, the rise of neoliberal economic regimes with their harsh and often repressive treatment of welfare claimants operates in tandem with a growing arsenal of CCTV and assorted urban governance measures (Monahan 2008, Maki 2011). The capacity for all forms of surveillance to intensify social inequalities through the lens of CCTV and other modes and methods of electronic monitoring is amply demonstrated in the surveillance studies literature, raising fundamental questions around issues of social justice, equity and the expenditure of societal resources (Norris and Armstrong 1999, Lyon 1994, 2001, Loader 1996).
Resumo:
We propose a computationally efficient image border pixel based watermark embedding scheme for medical images. We considered the border pixels of a medical image as RONI (region of non-interest), since those pixels have no or little interest to doctors and medical professionals irrespective of the image modalities. Although RONI is used for embedding, our proposed scheme still keeps distortion at a minimum level in the embedding region using the optimum number of least significant bit-planes for the border pixels. All these not only ensure that a watermarked image is safe for diagnosis, but also help minimize the legal and ethical concerns of altering all pixels of medical images in any manner (e.g, reversible or irreversible). The proposed scheme avoids the need for RONI segmentation, which incurs capacity and computational overheads. The performance of the proposed scheme has been compared with a relevant scheme in terms of embedding capacity, image perceptual quality (measured by SSIM and PSNR), and computational efficiency. Our experimental results show that the proposed scheme is computationally efficient, offers an image-content-independent embedding capacity, and maintains a good image quality
Resumo:
A recent issue of Young People Now (November 1995) mentioned the new (UK) television soap opera Hollyoaks by Phil Redmond, which raises the issue of the role of ‘soap operas’ (hereafter referred to as soaps) in the daily lives of young people. The term ‘soap’ originates with the sponsorship of radio and television programmes by companies such as Proctor and Gamble who in America in 1932 used a daytime radio domestic comedy, The Puddle Family to advertise Oxydol, a washing powder. The first British television soap was The Grove Family (BBC 1954-7) was followed by Emergency Ward Ten (ATV 1957-67), Coronation Street (Granada Television 1960-present) and Eastenders (BBC 1985-present). Australian soaps are especially popular in Britain and of potential interest to those who work with young people, because they have a high proportion of youthful looking actors and actresses and frequently depict scenes involving young people and apparent ‘real’ teenage dilemmas. On one level it may be commendable that actors who are young(ish) somewhere between the ages of 14 and 25 play roles that are ostensibly about young people and their alleged problems. However, the casting of young, largely unknown, actors reflects more the political economy of soaps in their relative cheapness and dispensability, rather than any genuine attempt to create an oppositional text for, about and by young people (Paterson 1986).