822 resultados para Computer and network security
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Reprinted from Proceedings of the first annual Conference on Labor, 1948.
Resumo:
Thesis (D.M.A.)--University of Washington, 2016-06
Resumo:
This study extends previous media equation research, which showed that the effects of flattery from a computer can produce the same general effects as flattery from humans. Specifically, the study explored the potential moderating effect of experience on the impact of flattery from a computer. One hundred and fifty-eight students from the University of Queensland voluntarily participated in the study. Participants interacted with a computer and were exposed to one of three kinds of feedback: praise (sincere praise), flattery (insincere praise), or control (generic feedback). Questionnaire measures assessing participants' affective state. attitudes and opinions were taken. Participants of high experience, but not low experience, displayed a media equation pattern of results, reacting to flattery from a computer in a manner congruent with peoples' reactions to flattery from other humans. High experience participants tended to believe that the computer spoke the truth, experienced more positive affect as a result of flattery, and judged the computer's performance more favourably. These findings are interpreted in light of previous research and the implications for software design in fields such as entertainment and education are considered. (C) 2004 Elsevier Ltd. All rights reserved.
Resumo:
Background: jurisdictions are developing public drug insurance systems to improve access to pharmaceuticals, cost-effective prescribing, and patient health and well-being. We compared 2 Jurisdictions with different pharmaceutical policies to determine prescribing patterns for 3-hydroxy-3-methylglutaryl coenzyme A reductase inhibitors (le, statins). Objective: The aim of this work was to investigate the feasibility of using available prescription admimstrative databases to compare the use of statins in Queensland, Australia, and in Nova Scotia, Canada. Methods: Data from the Nova Scotia Pharmacare Program and the Health Insurance Commission in Australia were used to obtain dispensing data. Utilization was compared for the 5-year period from 1997 through 2001, using the World Health Organization anatomic therapeutic chemical/defined daily dose (DDD) system. Results: In the year 2001, there were 177,000 beneficiaries in the public drug plan in Nova Scotia (62% aged ≥ 65 years old) and 960,000 concession beneficiaries (pensioners and social security recipients, 61% aged ≥ 65 years) in Queensland. These 2 groups were comparable. The overall utilization of statin medications increased steadily in both areas over the study period, from 50 to 205 DDD/1000 beneficiaries per day. Comparison of the 2 growth lines showed no statistically significant differences in overall statin use despite differences in brand availabilities and policies about prescribing. In the year 2001, atorvastatin was the most commonly prescribed statin in both areas, comprising 46% of statin use in Nova Scotia and 51% in Queensland. Mean doses of each statin prescribed were slightly above the DDDs. Expenditure on statins per 1000 beneficiaries and per DDD were similar in each jurisdiction, being slightly higher in Nova Scotia. Conclusions: Despite differences in pharmaceutical reimbursement systems, use of the statins was similar in Nova Scotia and Queensland. The feasibility of the methodology was demonstrated. Future studies, including comparisons of drug utilization for other classes of drugs for which drug policies may be divergent (eg, different pricing structures or prior authorization requirements), or for which less evidence for appropriate use is available, may be useful. © 2005 Excerpta Medica, Inc.
Resumo:
One of the obstacles to improved security of the Internet is ad hoc development of technologies with different design goals and different security goals. This paper proposes reconceptualizing the Internet as a secure distributed system, focusing specifically on the application layer. The notion is to redesign specific functionality, based on principles discovered in research on distributed systems in the decades since the initial development of the Internet. Because of the problems in retrofitting new technology across millions of clients and servers, any options with prospects of success must support backward compatibility. This paper outlines a possible new architecture for internet-based mail which would replace existing protocols by a more secure framework. To maintain backward compatibility, initial implementation could offer a web browser-based front end but the longer-term approach would be to implement the system using appropriate models of replication. (C) 2005 Elsevier Ltd. All rights reserved.
Resumo:
This article compares the constitutive relationship between foreign policy and globalisation in Australia and New Zealand. Drawing upon insights from constructivist international relations theory we argue that foreign policy instantiates a state's social identity, its self-understanding of its role and moral purpose by projecting a distinctive image onto the global stage. We explore the differences and the similarities between Australia and New Zealand by examining how each country views international order, global trade, global governance and human rights and international security. Although both countries appear to be transforming themselves into more 'globalised' states, there are significant differences in the way each seeks to balance the competing strategic and normative demands. This diplomatic divergence, we argue, stems from different conceptions of state identity.
Resumo:
Despite global trends towards military reform characterized by processes of professionalization and democratization, militaries in Southeast Asia have continued to play prominent roles in domestic politics since 11 September. This suggests that wider patterns of global military reform have not had as great an impact on the control, capacity and cooperative functions of armed forces in Southeast Asia as they may have elsewhere. In order to explore why the security sector reform agenda has had so little impact in the region, we investigate recent patterns of civil-military relations in Southeast Asia by focusing on the experiences of four of the region's militaries: Malaysia, Thailand, the Philippines and Indonesia. We argue that the security sector reform agenda is informed by a predominantly North American approach to civil-military relations based on a number of core assumptions that do not reflect Southeast Asian experiences. Hence, we ask whether the reform agenda itself could be modified to better suit the Southeast Asian context. We suggest that although the regional military sector has not reformed along a 'Western' path it is nonetheless possible to see other types of, and potential for, reform.
Resumo:
The XSophe computer simulation software suite consisting of a daemon, the XSophe interface and the computational program Sophe is a state of the art package for the simulation of electron paramagnetic resonance spectra. The Sophe program performs the computer simulation and includes a number of new technologies including; the SOPHE partition and interpolation schemes, a field segmentation algorithm, homotopy, parallelisation and spectral optimisation. The SOPHE partition and interpolation scheme along with a field segmentation algorithm greatly increases the speed of simulations for most systems. Multidimensional homotopy provides an efficient method for accurately tracing energy levels and hence tracing transitions in the presence of energy level anticrossings and looping transitions and allowing computer simulations in frequency space. Recent enhancements to Sophe include the generalised treatment of distributions of orientational parameters, termed the mosaic misorientation linewidth model and a faster more efficient algorithm for the calculation of resonant field positions and transition probabilities. For complex systems the parallelisation enables the simulation of these systems on a parallel computer and the optimisation algorithms in the suite provide the experimentalist with the possibility of finding the spin Hamiltonian parameters in a systematic manner rather than a trial-and-error process. The XSophe software suite has been used to simulate multifrequency EPR spectra (200 MHz to 6 00 GHz) from isolated spin systems (S > ~½) and coupled centres (Si, Sj _> I/2). Griffin, M.; Muys, A.; Noble, C.; Wang, D.; Eldershaw, C.; Gates, K.E.; Burrage, K.; Hanson, G.R."XSophe, a Computer Simulation Software Suite for the Analysis of Electron Paramagnetic Resonance Spectra", 1999, Mol. Phys. Rep., 26, 60-84.
Resumo:
This paper proposes an architecture for pervasive computing which utilizes context information to provide adaptations based on vertical handovers (handovers between heterogeneous networks) while supporting application Quality of Service (QoS). The future of mobile computing will see an increase in ubiquitous network connectivity which allows users to roam freely between heterogeneous networks. One of the requirements for pervasive computing is to adapt computing applications or their environment if current applications can no longer be provided with the requested QoS. One of possible adaptations is a vertical handover to a different network. Vertical handover operations include changing network interfaces on a single device or changes between different devices. Such handovers should be performed with minimal user distraction and minimal violation of communication QoS for user applications. The solution utilises context information regarding user devices, user location, application requirements, and network environment. The paper shows how vertical handover adaptations are incorporated into the whole infrastructure of a pervasive system
Resumo:
Primarily targeted toward the network or MIS manager who wants to stay abreast of the latest networking technology, Enterprise Networking: Multilayer Switching and Applications offers up to date information relevant for the design of modern corporate networks and for the evaluation of new networking equipment. The book describes the architectures and standards of switching across the various protocol layers and will also address issues such as multicast quality of service, high-availability and network policies that are requirements of modern switched networks.
Resumo:
The topic of bioenergy, biofuels and bioproducts remains at the top of the current political and research agenda. Identification of the optimum processing routes for biomass, in terms of efficiency, cost, environment and socio-economics is vital as concern grows over the remaining fossil fuel resources, climate change and energy security. It is known that the only renewable way of producing conventional hydrocarbon fuels and organic chemicals is from biomass, but the problem remains of identifying the best product mix and the most efficient way of processing biomass to products. The aim is to move Europe towards a biobased economy and it is widely accepted that biorefineries are key to this development. A methodology was required for the generation and evaluation of biorefinery process chains for converting biomass into one or more valuable products that properly considers performance, cost, environment, socio-economics and other factors that influence the commercial viability of a process. In this thesis a methodology to achieve this objective is described. The completed methodology includes process chain generation, process modelling and subsequent analysis and comparison of results in order to evaluate alternative process routes. A modular structure was chosen to allow greater flexibility and allowing the user to generate a large number of different biorefinery configurations The significance of the approach is that the methodology is defined and is thus rigorous and consistent and may be readily re-examined if circumstances change. There was the requirement for consistency in structure and use, particularly for multiple analyses. It was important that analyses could be quickly and easily carried out to consider, for example, different scales, configurations and product portfolios and so that previous outcomes could be readily reconsidered. The result of the completed methodology is the identification of the most promising biorefinery chains from those considered as part of the European Biosynergy Project.
Resumo:
For the last several years, mobile devices and platform security threats, including wireless networking technology, have been top security issues. A departure has occurred from automatic anti-virus software based on traditional PC defense: risk management (authentication and encryption), compliance, and disaster recovery following polymorphic viruses and malware as the primary activities within many organizations and government services alike. This chapter covers research in Turkey as a reflection of the current market – e-government started officially in 2008. This situation in an emerging country presents the current situation and resistances encountered while engaging with mobile and e-government interfaces. The authors contend that research is needed to understand more precisely security threats and most of all potential solutions for sustainable future intention to use m-government services. Finally, beyond m-government initiatives' success or failure, the mechanisms related to public administration mobile technical capacity building and security issues are discussed.