809 resultados para Privacy typology
Resumo:
SIMON is a family of 10 lightweight block ciphers published by Beaulieu et al. from the United States National Security Agency (NSA). A cipher in this family with K -bit key and N -bit block is called SIMON N/K . We present several linear characteristics for reduced-round SIMON32/64 that can be used for a key-recovery attack and extend them further to attack other variants of SIMON. Moreover, we provide results of key recovery analysis using several impossible differential characteristics starting from 14 out of 32 rounds for SIMON32/64 to 22 out of 72 rounds for SIMON128/256. In some cases the presented observations do not directly yield an attack, but provide a basis for further analysis for the specific SIMON variant. Finally, we exploit a connection between linear and differential characteristics for SIMON to construct linear characteristics for different variants of reduced-round SIMON. Our attacks extend to all variants of SIMON covering more rounds compared to any known results using linear cryptanalysis. We present a key recovery attack against SIMON128/256 which covers 35 out of 72 rounds with data complexity 2123 . We have implemented our attacks for small scale variants of SIMON and our experiments confirm the theoretical bias presented in this work.
Resumo:
We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST’s SHA3 competition. First we improve Aumasson and Phans’ integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16.5 rounds. Next we improve the designers’ meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Finally, we comment on possible methods to obtain free-start distinguishers and free-start collisions for Fugue-256.
Resumo:
Although seeking help for mental ill-health is beneficial, the majority of persons afflicted do not access available help services. Young adults (16-24 years old) in particular have the highest prevalence of mental health problems and the lowest rate of help-seeking behaviour. Key barriers to help-seeking for young adults, including cost, privacy concerns, inconvenience, access to health professionals and interpersonal interaction, appear to derive from the face-to-face method of service delivery traditionally used to distribute mental health services. Social marketing employs the principle of value exchange, whereby consumers will choose a behaviour in exchange for receiving valued benefits and/or a reduction in key barriers, to achieve behavioural goals for social good. The appropriation of mobile digital technology to deliver self-help mental health services may reduce the current barriers to help seeking, however, extant literature offers no empirical support for this proposition. Our research addresses this gap by examining the perceptions of young adults regarding M-mental health services. Depth interviews were undertaken with 15 young adults (18-24 years old), who had self-reported mild-moderate stress, anxiety or depression. The data were thematically analysed with the assistance of Nvivo. The findings reveal M-mental health services reduce the barriers to accessing face-to-face help services to a large extent. However, they also present their own barriers to help-seeking that must be considered by social marketers, including negligible cost expectations and service efficacy concerns. Overall, this study highlights the potential of M-mental health services to encourage early intervention and help-seeking behaviour as part of a social marketing strategy to address mental illness in young adults.
Resumo:
Criminology has long sought to define and understand criminal motivations. There has, however, been less attention paid to the motivations involved in “everyday” thought and behaviour that may place someone in harm’s way. This doesn’t mean that victims are somehow motivated to become victims, but they may behave in such a way that victimisation happens as a matter of course. In the parlance of victimity, victim behaviour has often been referred to as either “victim facilitated” or “victim precipitated”. However, while some use these terms to explain the role of victim behaviour in relation to harm or loss, they actually do little to further our knowledge about the cognitive and behavioural milieu in which victimisation occurs. For example, a victim of homicide may precipitate the attack by violently confronting a partner (in retaliation for real or imagined wrongs). Another victim may facilitate domestic violence by not leaving their partner for financial reasons (“cannot afford to go out on my own”). Far from blaming the victim, understanding the motivational nature of victim behaviour can be accomplished by juxtaposing motivations for offender behaviour. This presentation applies offender motivations to victim behaviours, and presents anecdotal and research support for this approach.
Resumo:
Purpose The purpose of this paper is to examine equal employment policies in Australia’s male-dominated construction industry and categorise the types of activities undertaken against an equal employment typology to identify links to outcomes for women in the form of increased participation and management. Design/methodology/approach To explore the issue of low representation of women in construction through the content analysis of 83 construction organisations’ equal employment opportunity (EEO) reports. Findings This industry is not engaging with equal employment issues and the numbers of women working in the industry and/or management are based on individual decision rather than an institutional commitment to equality in diversity. Research limitations/implications Australian legislation mandates organisational reporting of relevant data and offers public access to this information offering a unique data set. Practical implications An ageing population means that the predominately older male workforce is leaving construction in greater numbers with fewer potential replacements making new labour markets a vital consideration. Social implications Legislation and organisational policies designed to promote EEO for women have existed in numerous countries for decades. One objective of this legislation was to reduce male domination in senior positions and industries/occupations where women were under-represented. Despite this, few women are employed in construction in operational or management roles worldwide. Originality/value This study offers a comprehensive analysis of a male-dominated industry in one jurisdiction rather than a few selected cases and uses a broader rigorous typology for analysis that acknowledges both equal and different treatment options.
Resumo:
Parody accounts are prevalent on Twitter, offering irreverent interpretations of public figures, fictional characters and more. These accounts post comments framed within the context of their fictional universes or stereotypes of their subjects, responding in-character to topical events. This article positions parody accounts as a ritualised social media practice, an extension of fan practices and irreverent Internet culture. By providing a typology of parody accounts and analysing the topicality of selected parody accounts’ tweets, the research examines how these accounts contribute to topical discussions. In-character framing of topical comments allows parody accounts to offer original interpretations of breaking news that receive more attention than their other tweets. The presence and longevity of parody accounts underline the importance of humour on social media, including within news and topical coverage.
Resumo:
XACML has become the defacto standard for enterprise- wide, policy-based access control. It is a structured, extensible language that can express and enforce complex access control policies. There have been several efforts to extend XACML to support specific authorisation models, such as the OASIS RBAC profile to support Role Based Access Control. A number of proposals for authorisation models that support business processes and workflow systems have also appeared in the literature. However, there is no published work describing an extension to allow XACML to be used as a policy language with these models. This paper analyses the specific requirements of a policy language to express and enforce business process authorisation policies. It then introduces BP-XACML, a new profile that extends the RBAC profile for XACML so it can support business process authorisation policies. In particular, BP-XACML supports the notion of tasks, and constraints at the level of a task instance, which are important requirements in enforcing business process authorisation policies.
Resumo:
Decision-making is such an integral aspect in health care routine that the ability to make the right decisions at crucial moments can lead to patient health improvements. Evidence-based practice, the paradigm used to make those informed decisions, relies on the use of current best evidence from systematic research such as randomized controlled trials. Limitations of the outcomes from randomized controlled trials (RCT), such as “quantity” and “quality” of evidence generated, has lowered healthcare professionals’ confidence in using EBP. An alternate paradigm of Practice-Based Evidence has evolved with the key being evidence drawn from practice settings. Through the use of health information technology, electronic health records (EHR) capture relevant clinical practice “evidence”. A data-driven approach is proposed to capitalize on the benefits of EHR. The issues of data privacy, security and integrity are diminished by an information accountability concept. Data warehouse architecture completes the data-driven approach by integrating health data from multi-source systems, unique within the healthcare environment.
Resumo:
The workshop is an activity of the IMIA Working Group ‘Security in Health Information Systems’ (SiHIS). It is focused to the growing global problem: how to protect personal health data in today’s global eHealth and digital health environment. It will review available trust building mechanisms, security measures and privacy policies. Technology alone does not solve this complex problem and current protection policies and legislation are considered woefully inadequate. Among other trust building tools, certification and accreditation mechanisms are dis-cussed in detail and the workshop will determine their acceptance and quality. The need for further research and international collective action are discussed. This workshop provides an opportunity to address a critical growing problem and make pragmatic proposals for sustainable and effective solutions for global eHealth and digital health.
Resumo:
A promising approach to the persistent problem of workplace sexual harassment (SH) is encouraging interventions by bystanders. Adopting a typology developed by Bowes-Sperry and O'Leary-Kelly that considers the level of immediacy and involvement of bystander interventions, this study explored 74 detailed descriptions of SH events that occurred in Australian workplaces. The findings reveal that despite the hidden nature of SH, there is significant involvement of actors who are not direct targets but their actions are frequently delayed, temporary or ineffective. The study makes two contributions to the study and practice of HRM. First, it provides important evidence of the different ways that bystanders respond to SH in real workplaces and the relative likelihood of these actions. Second, the study points to relevant contextual features evident in the scenarios described which determine if and how bystanders intervene. We discuss the utility of the bystander framework for future research and practice, including the development of bystander interventions as a potentially innovative response to the persistent and damaging problem of workplace SH.
Resumo:
Purpose This study aims to gain a clearer understanding of digital channel design. The emergence of new technologies has revolutionised the way companies interact and engage with customers. The driver for this research was the suggestion that practitioners feel they do not possess the skills to understand and exploit new digital channel opportunities. To gain a clearer understanding of digital channel design, this paper addresses the research question: What digital channels do companies from a wide range of industries and sectors use? Design/methodology/approach A content analysis of 100 international companies was conducted with multiple data sources to form a typology of digital “touchpoints”. The appropriateness of a digital channel typology for this study was for developing rigorous and useful concepts for clarifying and refining the meaning of digital channels. Findings This study identifies what digital channels companies globally currently employ and explores the related needs across industries. A total of 34 digital touchpoints and 4 typologies of digital channels were identified across 16 industries. This research helps to identify the relationship between digital channels and enabling the connections with industry. Research limitations/implications The findings contribute to the growing research area of digital channels. The typology of digital channels is a useful starting point for developing a systematic, theory-based study for enabling the development of broader, comprehensive theories of digital channels. Practical implications Typologies and touchpoints are outlined in relation to industry, company objectives and customer needs to allow businesses to seize opportunities and optimise performance through individual touchpoints. A digital channel model as a key outcome of this research guides practitioners on what touchpoint to implement through an interrelated understanding of industry, company and customer needs. Originality/value This is the first paper to explore a range of industries in relation to their use of digital channels using a unique content analysis. Contributions include clarifying and refining digital channel meaning; identifying and refining the hierarchical relations among digital channels(typologies); and establishing typology and industry relationship model.
Resumo:
This study examined the potential for apartment living to become more socially and environmentally acceptable in Australian society generally, and in subtropical cities particularly. Resolution of incongruities between residents' preferred attributes and other stakeholders' main interests has important implications for reshaping lifestyle expectations and design practice as society moves toward a post-carbon future.
Resumo:
This chapter is based on a qualitative case study that researched the perceptions of nine male and female pre-service English teachers’ in regards to their preparedness to mentor positive digital conduct in Social network sites (SNS). These sites enable individuals to perform public representations of identity, consumed by virtual audiences, with various degrees of perceived privacy. The chapter frames what we call “identity curation” through three theoretical lenses; of performativity, customisation and critical literacy. This chapter discusses one of the themes that emerged from the research, which is the way in which “normalised” and naturalised representations of femineity on SNS were judged more harshly than masculine representations.
Resumo:
Drawing on two case studies, this article considers the allegation of a disgruntled author: ’Defamation was framed to protect the reputations of 19th century gentlemen hypocrites'. The first case study considers the litigation over Bob Ellis' unreliable political memoir, ’Goodbye Jerusalem', published by Random House. The second case study focuses upon the litigation over the allegation by Media Watch that Richard Carleton had plagarised a documentary entitled ’Cry from the Grave'. The article considers the meaning of defamatory imputations, the range of defences, and the available remedies. It highlights the competing arguments over the protection of reputation and privacy, artistic expression, and the freedom of speech. This article concludes that defamation law should foster ’gossip we can trust'.
Resumo:
Technological system evolution is marked by the uneven evolution of constituent sub-systems. Subsequently, system evolution is hampered by the resulting state of unevenness, or reverse salience, which results from the presence of the sub-system that delivers the lowest level of performance with respect to other sub-systems, namely, the reverse salient. In this paper, we develop absolute and proportional performance gap measures of reverse salience and, in turn, derive a typology of reverse salients that distinguishes alternative dynamics of change in the evolving system. We subsequently demonstrate the applicability of the measures and the typology through an illustrative empirical study of the PC (personal computer) technological system that functions as a gaming platform. Our empirical analysis demonstrates that patterns of temporal dynamics can be distinguished with the measurement of reverse salience, and that distinct paths of technological system evolution can be identified as different types of reverse salients emerge over time.