946 resultados para user-driven security adaptation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examined the effects of personal and social resources, coping strategies and appraised stress on employees' levels of anxiety and depression. In relation to the effects of resources and coping strategies, two different models were tested. The main effects model proposes that, irrespective of the level of stress, coping resources and coping strategies have direct effects on well-being. In contrast, the buffering model predicts that the buffering effects of coping resources and strategies are only evident at high levels of stress. One hundred lawyers completed a structured self-administered questionnaire that measured their personal and social resources, use of problem-focused and emotion-focused coping strategies, and appraisals of the stressfulness of the situation. Results revealed generally strong support for the main effects model in the prediction of employee levels of anxiety and depression. Lower levels of anxiety were linked to judgements of lower levels of organizational change, greater self-confidence, greater internality of control beliefs and less use of emotion-focused coping strategies. Lower levels of depression in employees were also linked to judgements of lower levels of organizational change, greater use of resources and less appraised stress. There was only limited support for the buffering effects model. Due to the small size of the sample, the findings need to be explored further in other contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Measures of semantic similarity between medical concepts are central to a number of techniques in medical informatics, including query expansion in medical information retrieval. Previous work has mainly considered thesaurus-based path measures of semantic similarity and has not compared different corpus-driven approaches in depth. We evaluate the effectiveness of eight common corpus-driven measures in capturing semantic relatedness and compare these against human judged concept pairs assessed by medical professionals. Our results show that certain corpus-driven measures correlate strongly (approx 0.8) with human judgements. An important finding is that performance was significantly affected by the choice of corpus used in priming the measure, i.e., used as evidence from which corpus-driven similarities are drawn. This paper provides guidelines for the implementation of semantic similarity measures for medical informatics and concludes with implications for medical information retrieval.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The security of industrial control systems in critical infrastructure is a concern for the Australian government and other nations. There is a need to provide local Australian training and education for both control system engineers and information technology professionals. This paper proposes a postgraduate curriculum of four courses to provide knowledge and skills to protect critical infrastructure industrial control systems. Our curriculum is unique in that it provides security awareness but also the advanced skills required for security specialists in this area. We are aware that in the Australian context there is a cultural gap between the thinking of control system engineers who are responsible for maintaining and designing critical infrastructure and information technology professionals who are responsible for protecting these systems from cyber attacks. Our curriculum aims to bridge this gap by providing theoretical and practical exercises that will raise the awareness and preparedness of both groups of professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extracting and aggregating the relevant event records relating to an identified security incident from the multitude of heterogeneous logs in an enterprise network is a difficult challenge. Presenting the information in a meaningful way is an additional challenge. This paper looks at solutions to this problem by first identifying three main transforms; log collection, correlation, and visual transformation. Having identified that the CEE project will address the first transform, this paper focuses on the second, while the third is left for future work. To aggregate by correlating event records we demonstrate the use of two correlation methods, simple and composite. These make use of a defined mapping schema and confidence values to dynamically query the normalised dataset and to constrain result events to within a time window. Doing so improves the quality of results, required for the iterative re-querying process being undertaken. Final results of the process are output as nodes and edges suitable for presentation as a network graph.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Climate change presents a range of challenges for animal agriculture in Australia. Livestock production will be affected by changes in temperature and water availability through impacts on pasture and forage crop quantity and quality, feed-grain production and price, and disease and pest distributions. This paper provides an overview of these impacts and the broader effects on landscape functionality, with a focus on recent research on effects of increasing temperature, changing rainfall patterns, and increased climate variability on animal health, growth, and reproduction, including through heat stress, and potential adaptation strategies. The rate of adoption of adaptation strategies by livestock producers will depend on perceptions of the uncertainty in projected climate and regional-scale impacts and associated risk. However, management changes adopted by farmers in parts of Australia during recent extended drought and associated heatwaves, trends consistent with long-term predicted climate patterns, provide some insights into the capacity for practical adaptation strategies. Animal production systems will also be significantly affected by climate change policy and national targets to address greenhouse gas emissions, since livestock are estimated to contribute ~10% of Australia’s total emissions and 8–11% of global emissions, with additional farm emissions associated with activities such as feed production. More than two-thirds of emissions are attributed to ruminant animals. This paper discusses the challenges and opportunities facing livestock industries in Australia in adapting to and mitigating climate change. It examines the research needed to better define practical options to reduce the emissions intensity of livestock products, enhance adaptation opportunities, and support the continued contribution of animal agriculture to Australia’s economy, environment, and regional communities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The common presupposition of Enterprise Systems (ES) is that they lead to significant efficiency gains. However, this is only the case for well-implemented ES that meet organisational requirements. The list of major ES implementation failures is as long as the list of success stories. We argue here that this arises from a more fundamental problem, the functionalist approach to ES development and provision. As long as vendors will continue to develop generic, difficult-to-adapt ES packages, this problem will prevail because organisations have a non-generic character. A solution to this problem can only consist in rethinking the way ES packages are provided. We propose a strict abstraction layer of ES functionalities and their representation as conceptual models. ES vendors must provide sufficient means for configuring these conceptual models. We discuss in this paper what generic situations can occur during process model configuration in order to understand process model configuration in depth.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

E-government is seen as a promising approach for governments to improve their service towards citizens and become more cost-efficient in service delivery. This is often combined with one-stop government, which is a citizen-oriented approach stressing integrated provision of services from multiple departments via a single access point, the one-stop government portal. While the portal concept is gaining prominence in practice, there is little know about its status in academic literature. This hinders academics in building an accumulated body of knowledge around the concept and makes it hard for practitioners to access relevant academic insights on the topic. The objective of this study is to identify and understand the key themes of the one-stop government portal concept in academic, e-government research. A holistic analysis is provided by addressing different viewpoints: social-political, legal, organizational, user, security, service, data & information, and technical. As overall finding we conclude that there are two different approaches: a more pragmatic approach focuses on quick wins in particular related to usability and navigation and a more ambitious, transformational approach having far reaching social-political, legal, organizational implications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The configuration of comprehensive enterprise systems to meet the specific requirements of an organisation up to today is consuming significant resources. The results of failing or delayed enterprise system implementation projects are severe and may even threaten the organisation’s existence. One of the main drivers for implementing comprehensive enterprise systems is to streamline business processes. However, an intuitive conceptual support for business process configuration is insufficiently addressed by enterprise system vendors and inadequately researched in academia. This paper presents a model-driven approach to target this problem and proposes several configuration patterns that describe generic patterns of configuration alternatives, in order to understand what situations can occur during business process configuration. Based on these configuration patterns, a configuration notation is introduced that allows for visually highlighting configuration alternatives. Finally, we will sketch how configurable Event Driven Process Chains and the configuration of business processes can be supported using relational databases.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Partington notes that clothing produced by individual consumers through adaptation of patterns is contextualised as a watered down version of original couture. In its most reductive form, this notion characterises fashion as commercial and exploitative. Descriptors such as appropriation, imitation, copy and so forth have restricted the opportunity to understand fashion as a major global cultural form and institution. Therefore exploring and understanding the concept of adaptation will shift the attention from a superficial assessment of original versus imitation or copy to adaptation as a practice that provides a better framework for the understanding of designers’ and couturiers’ innovative practices and creativity, describing also the active engagement of consumers with fashion at the micro level. Adaptation can also provide a way to understand different historical shifts in the fashion system, from individual creative agency with home dressmaking and re-making to the explosion of the mass market and the consequent abandonment of such practices. Home dressmaking has been replaced by fashion remix of mass produced garments, a practice that thrives in our environment of globalised fast fashion. Thus this chapter suggests the need for a contextual requalification of concepts such as original, copy, imitation and copyright, and argues that these categories have been played against each other, but they are in fact interdependent. Today, big labels and conglomerates try to control knowledge and innovation through copyright, but, fashion escapes copyright because, in fashion, creativity is contextual. The institutionalisation of couture from 1868 served as a way to control knowledge about production processes in fashion; on the other hand, adaptation practices, often subversive, have been fundamental to the democratisation of fashion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a multi-layer spectrum sensing optimisation algorithm to maximise sensing efficiency by computing the optimal sensing and transmission durations for a fast changing, dynamic primary user. Dynamic primary user traffic is modelled as a random process, where the primary user changes states during both the sensing period and transmission period to reflect a more realistic scenario. Furthermore, we formulate joint constraints to correctly reflect interference to the primary user and lost opportunity of the secondary user during the transmission period. Finally, we implement a novel duty cycle based detector that is optimised with respect to PU traffic to accurately detect primary user activity during the sensing period. Simulation results show that unlike currently used detection models, the proposed algorithm can jointly optimise the sensing and transmission durations to simultaneously satisfy the optimisation constraints for the considered primary user traffic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A numerical study is presented to examine the fingering instability of a gravity-driven thin liquid film flowing down the outer wall of a vertical cylinder. The lubrication approximation is employed to derive an evolution equation for the height of the film, which is dependent on a single parameter, the dimensionless cylinder radius. This equation is identified as a special case of that which describes thin film flow down an inclined plane. Fully three-dimensional simulations of the film depict a fingering pattern at the advancing contact line. We find the number of fingers observed in our simulations to be in excellent agreement with experimental observations and a linear stability analysis reported recently by Smolka & SeGall (Phys Fluids 23, 092103 (2011)). As the radius of the cylinder decreases, the modes of perturbation have an increased growth rate, thus increasing cylinder curvature partially acts to encourage the contact line instability. In direct competition with this behaviour, a decrease in cylinder radius means that fewer fingers are able to form around the circumference of the cylinder. Indeed, for a sufficiently small radius, a transition is observed, at which point the contact line is stable to transverse perturbations of all wavenumbers. In this regime, free surface instabilities lead to the development of wave patterns in the axial direction, and the flow features become perfectly analogous to the two-dimensional flow of a thin film down an inverted plane as studied by Lin & Kondic (Phys Fluids 22, 052105 (2010)). Finally, we simulate the flow of a single drop down the outside of the cylinder. Our results show that for drops with low volume, the cylinder curvature has the effect of increasing drop speed and hence promoting the phenomenon of pearling. On the other hand, drops with much larger volume evolve to form single long rivulets with a similar shape to a finger formed in the aforementioned simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Desalination processes to remove dissolved salts from seawater or brackish water includes common industrial scale processes such as reverse osmosis, thermal processes (i.e. multi-stage flash, multiple-effect distillation) and mechanical vapour compression. These processes are very energy intensive. The Institute for Future Environments (IFE) has evaluated various alternative processes to accomplish desalination using renewable or sustainable energy sources. A new process - a solar, thermally driven distillation system . based on the principles of a solar still – has been examined. This work presents an initial evaluation of the process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.

Relevância:

20.00% 20.00%

Publicador: