875 resultados para Epistolary exchange
Resumo:
The Guide includes research findings from the Australian Centre for Philanthropy and Non Profit Studies at the Queensland University of Technology (QUT). This research probed the experiences of fourteen Indigenous people who have had different degrees of success in seeking funding from philanthropic organisations. This research shows how grantmakers can make a significant difference in the lives of Aboriginal and Torres Strait Islander people.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
This study was conducted within the context of a flexible education institution where conventional educational assessment practices and tests fail to recognise and assess the creativity and cultural capital of a cohort of marginalised young people. A new assessment model which included an electronic-portfolio-social-networking system (EPS) was developed and trialled to identify and exhibit evidence of students' learning. The study aimed to discern unique forms of cultural capital (Bourdieu, 1986) possessed by students who attend the Edmund Rice Education Australia Flexible Learning Centre Network (EREAFLCN). The EPS was trialled at the case study schools in an intervention and developed a space where students could make evident culturally specific forms of capital and funds of knowledge (Gonzalez, Moll, & Amanti, 2005). These resources were evaluated, modified and developed through dialogic processes utilising assessment for learning approaches (Qualifications and Curriculum Development Agency, 2009) in online and classroom settings. Students, peers and staff engaged in the recognition, judgement, revision and evaluation of students' cultural capital in a subfield of exchange (Bourdieu, 1990). The study developed the theory of assessment for learning as a field of exchange incorporating an online system as a teaching and assessment model. The term efield has been coined to describe this particular capital exchange model. A quasi-ethnographic approach was used to develop a collective case study (Stake, 1995). This case study involved an in-depth exploration of five students' forms of cultural capital and the ways in which this capital could be assessed and exchanged using the efield model. A comparative analysis of the five cases was conducted to identify the emergent issues of students' recognisable cultural capital resources and the processes of exchange that can be facilitated to acquire legitimate credentials for these students in the Australian field of education. The participants in the study were young people at two EREAFLC schools aged between 12 and 18 years. Data was collected through interviews, observations and examination of documents made available by the EREAFLCN. The data was coded and analysed using a theoretical framework based on Bourdieu's analytical tools and a sociocultural psychology theoretical perspective. Findings suggest that processes based on dialogic relationships can identify and recognise students' forms of cultural capital that are frequently misrecognised in mainstream school environments. The theory of assessment for learning as a field of exchange was developed into praxis and integrated in an intervention. The efield model was found to be an effective sociocultural tool in converting and exchanging students' capital resources for legitimated cultural and symbolic capital in the field of education.
Resumo:
Road traffic injuries are one of the major public health burdens worldwide. The United Nations Decade of Action for Road Safety (2011-2020) implores all nations to work to reduce this burden. This decade represents a unique and historic period of time in the field of road safety. Information exchange and co-operation between nations is an important step in achieving the goal. The burden of road crashes, fatalities and injuries is not equally distributed. We know that low and middle-income countries experience the majority of the road trauma burden. Therefore it is imperative that these countries learn from the successes of others that have developed and implemented road safety laws, public education campaigns and countermeasures over many years and have achieved significant road trauma reductions as a result. China is one of the countries experiencing a large road trauma burden. Vulnerable road users such as pedestrians and cyclists make up a large proportion of fatalities and injuries in China. Speeding, impaired/drug driving, distracted driving, vehicle overloading, inadequate road infrastructure, limited use of safety restraints and helmets, and limited road safety training have all been identified as contributing to the problem. Some important steps have been taken to strengthen China’s approach, including increased penalties for drunk driving in May 2011 and increased attention to school bus safety in 2011/12. However, there is still a large amount of work needed to improve the current road safety position in China. This paper provides details of a program to assist with road safety knowledge exchange between China and Australia that was funded by the Australian Government which was undertaken in the latter part of 2012. The four month program provided the opportunity for the first author to work closely with key agencies in Australia that are responsible for policy development and implementation of a broad range of road safety initiatives. In doing so, an in-depth understanding was gained about key road safety strategies in Australia and processes for developing and implementing them. Insights were also gained into the mechanisms used for road safety policy development, implementation and evaluation in several Australian jurisdictions. Road traffic law and enforcement issues were explored with the relevant jurisdictional transport and police agencies to provide a greater understanding of how Chinese laws and practices could be enhanced. Working with agencies responsible for public education and awareness campaigns about road safety in Australia also provided relevant information about how to promote road safety at the broader community level in China. Finally, the program provided opportunities to work closely with several world-renowned Australian research centres and key expert researchers to enhance opportunities for ongoing road safety research in China. The overall program provided the opportunity for the first author to develop knowledge in key areas of road safety strategy development, implementation and management which are directly relevant to the current situation in China. This paper describes some main observations and findings from participation in the program.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.
Resumo:
Putnam's “constrict theory” suggests that ethnic diversity creates challenges for developing and sustaining social capital in urban settings. He argues that diversity decreases social cohesion and reduces social interactions among community residents. While Putnam's thesis is the subject of much debate in North America, the United Kingdom, and Europe, there is a limited focus on how ethnic diversity impacts upon social cohesion and neighborly exchange behaviors in Australia. Employing multilevel modeling and utilizing administrative and survey data from 4,000 residents living in 148 Brisbane suburbs, we assess whether ethnic diversity lowers social cohesion and increases “hunkering.” Our findings indicate that social cohesion and neighborly exchange are attenuated in ethnically diverse suburbs. However, diversity is less consequential for neighborly exchange among immigrants when compared to the general population. Our results provide at least partial support for Putnam's thesis.
Resumo:
This paper reports a study of ion exchange (IX) as an alternative CSG water treatment to the widely used reverse osmosis (RO) desalination process. An IX pilot plant facility has been constructed and operated using both synthetic and real CSG water samples. Application of appropriate synthetic resin technology has proved the effectiveness of IX processes.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.
Resumo:
Drawing on principles of social exchange this thesis employs mediated regression to investigate the relationship between internal communication and employee engagement in the Australian workforce. Findings suggest organisations and supervisors should focus internal communication efforts toward building greater perceptions of support and stronger identification among employees in order to foster optimal engagement. This research contributes to public relations and management scholarship through understanding how perceived support and identification act as mediating mechanisms in the relationship between internal communication and employee engagement at the organisational and supervisory level.
Resumo:
Employee engagement is linked to higher productivity, lower attrition, and improved organizational reputations resulting in increased focus and resourcing by managers to foster an engaged workforce. While drivers of employee engagement have been identified as perceived support, job characteristics, and value congruence, internal communication is theoretically suggested to be a key influence in both the process and maintenance of employee engagement efforts. However, understanding the mechanisms by which internal communication influences employee engagement has emerged as a key question in the literature. The purpose of this research is to investigate whether social factors, namely perceived support and identification, play a mediating role in the relationship between internal communication and engagement. To test the theoretical model, data are collected from 200 non-executive employees using an online self-administered survey. The study applies linear and mediated regression to the model and finds that organizations and supervisors should focus internal communication efforts toward building greater perceptions of support and stronger identification among employees in order to foster optimal levels of engagement.
Resumo:
An investigation of the construction data management needs of the Florida Department of Transportation (FDOT) with regard to XML standards including development of data dictionary and data mapping. The review of existing XML schemas indicated the need for development of specific XML schemas. XML schemas were developed for all FDOT construction data management processes. Additionally, data entry, approval and data retrieval applications were developed for payroll compliance reporting and pile quantity payment development.
Resumo:
A generic approach towards tailoring of ion species composition in reactive plasmas used for nanofabrication of various functional nanofilms and nanoassemblies, based on a simplified model of a parallel-plate rf discharge, is proposed. The model includes an idealized reactive plasma containing two neutral and two ionic species interacting via charge exchange collisions in the presence of a microdispersed solid component. It is shown that the number densities of the desired ionic species can be efficiently managed by adjusting the dilution of the working gas in a buffer gas, rates of electron impact ionization, losses of plasma species on the discharge walls, and surfaces of fine particles, charge exchange rates, and efficiency of three-body recombination processes in the plasma bulk. The results are relevant to the plasma-aided nanomanufacturing of ordered patterns of carbon nanotip and nanopyramid microemitters.
Resumo:
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among n ≥2k+1 parties which simultaneously achieves all of the following properties: 1. Key Privacy (including forward security) against active attacks by group outsiders, 2. Non-malleability — meaning in particular that no subset of up to k corrupted group insiders can ‘fix’ the agreed key to a desired value, and 3. Robustness against denial of service attacks by up to k corrupted group insiders. Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.