956 resultados para Let me in


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This book is designed with undergraduate university students in mind, with the aim of teaching you the importance of being an effective communicator.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

LIKE much of the work that David Williamson is known for, Let the Sunshine concentrates on tensions between characters who operate mainly as mouthpieces for opposing ideologies. Left-wing documentary-maker Toby and his wife Ros have moved to Noosa to escape the rat race in Sydney and some bad press surrounding one of Toby's projects. Trying to make social connections in town, Ros has reconnected with high school classmate Natasha, now the cosmetically-enhanced wife of wealthy right-wing property developer Ron. The posturing and conflict between Toby and Ron come to a head when the women invite their grown children -- struggling songwriter Rick and stressed corporate lawyer Emma -- to dinner to celebrate Toby's birthday, and the results of this encounter drive the rest of the plot. The scenario of Let the Sunshine is contrived, the characters are stereotyped, and their conflicts are little more than an old clash of ideologies cast loosely across the mainstream news media's characterisation of the sides in debates about development, climate change and the economic crisis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Statement: Jams, Jelly Beans and the Fruits of Passion Let us search, instead, for an epistemology of practice implicit in the artistic, intuitive processes which some practitioners do bring to situations of uncertainty, instability, uniqueness, and value conflict. (Schön 1983, p40) Game On was born out of the idea of creative community; finding, networking, supporting and inspiring the people behind the face of an industry, those in the mist of the machine and those intending to join. We understood this moment to be a pivotal opportunity to nurture a new emerging form of game making, in an era of change, where the old industry models were proving to be unsustainable. As soon as we started putting people into a room under pressure, to make something in 48hrs, a whole pile of evolutionary creative responses emerged. People refashioned their craft in a moment of intense creativity that demanded different ways of working, an adaptive approach to the craft of making games – small – fast – indie. An event like the 48hrs forces participants’ attention on the process as much as the outcome. As one game industry professional taking part in a challenge for the first time observed: there are three paths in the genesis from idea to finished work: the path that focuses on mechanics; the path that focuses on team structure and roles and the path that focuses on the idea, the spirit – and the more successful teams need to put the spirit of the work first and foremost. The spirit drives the adaptation, it becomes improvisation. As Schön says: “Improvisation consists on varying, combining and recombining a set of figures within the schema which bounds and gives coherence to the performance.” (1983, p55). This improvisational approach is all about those making the games: the people and the principles of their creative process. This documentation evidences the intensity of their passion, determination and the shit that they are prepared to put themselves through to achieve their goal – to win a cup full of jellybeans and make a working game in 48hrs. 48hr is a project where, on all levels, analogue meets digital. This concept was further explored through the documentation process. This set of four videos were created by Cameron Owen on the fly during the challenge using both the iphone video camera and editing software in order to be available with immediacy and allow the event audience to share the experience - and perhaps to give some insights into the creative process exposed by the 48 hour challenge. ____________________________ Schön, D. A. 1983, The Reflective Practitioner: How Professionals Think in Action, Basic Books, New York

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Professional standards have been adopted by many Western countries, including Australia, as a mechanism for improving teacher quality and enhancing 'professionalism’. But what does the term 'professionalism' actually mean? This article briefly outlines different definitions of professionalism that have been advanced through many decades, and concludes with a 'new’ type of professionalism coined by the authors -'compliance professionalism’. They see this type of professionalism as a means for teachers to maintain a degree of professional autonomy, whilst at the same time allowing them to deal with ever increasing accountability regimes. The authors ask the question: What can principals do to make their teachers aware of 'professionalism’ in education?

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the essential qualities of a good classroom teacher. The analogy of a caring gardener who understands the individual growing needs of a vast variety of plants is used. The paper argues for the freedom to have differing non-sectarian curricula and for trust to be placed in the teaching profession.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this video, a male voice recites a teenage love poem. Words flash on screen in time with the spoken words. Sometimes the two sets of words match, and sometimes they differ. This work examines processes of signification. It emphasizes disruption and disconnection as fundamental and generative operations in making meaning. Extending on post-structural and deconstructionist ideas, this work questions the relationship between written and spoken words. By actively disrupting the sincerity of a teenage love poem, it questions the sites and mechanisms of comprehension, poetry and signification.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Bronwyn Fredericks on Let's Talk with Tiga Bayles. Let's Talk is on 9.00am - 10.00am Monday to Friday on 98.9fm. This interview in one hour in length.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We support Shane and Venkataraman’s (2000) basic idea of an “entrepreneurship nexus” where characteristics of the actor as well as those of the “opportunity” they work on influence action and outcomes in the creation of new economic activities. However, a review of the literature reveals that minimal progress has been made on the core issues pertaining to the nexus idea. We argue that this is rooted in fundamental and insurmountable problems with the “opportunity” construct itself, and demonstrate the state of confusion in the literature caused by inconsistent use of the construct within and across works and authors. As an alternative, we suggest the admittedly subjective notion of New Venture as a more workable alternative. We provide a comprehensive definition and explanation of this construct, and take steps towards improved conceptualization and operationalization of its subdimensions. With some further work on these conceptualizations and operationalizations it will be possible to implement a comprehensive research program that can finally deliver on the promise outlined by Shane and Venkataraman (2000).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Biological validation of new radiotherapy modalities is essential to understand their therapeutic potential. Antiprotons have been proposed for cancer therapy due to enhanced dose deposition provided by antiproton-nucleon annihilation. We assessed cellular DNA damage and relative biological effectiveness (RBE) of a clinically relevant antiproton beam. Despite a modest LET (~19 keV/μm), antiproton spread out Bragg peak (SOBP) irradiation caused significant residual γ-H2AX foci compared to X-ray, proton and antiproton plateau irradiation. RBE of ~1.48 in the SOBP and ~1 in the plateau were measured and used for a qualitative effective dose curve comparison with proton and carbon-ions. Foci in the antiproton SOBP were larger and more structured compared to X-rays, protons and carbon-ions. This is likely due to overlapping particle tracks near the annihilation vertex, creating spatially correlated DNA lesions. No biological effects were observed at 28–42 mm away from the primary beam suggesting minimal risk from long-range secondary particles.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A significant proportion of research in the field of human-computer interaction has been devoted to game design. Yet, a multitude of good ideas and enthusiastic game design initiatives exist, where the games never see the light of day. Unfortunately, the causes of these failures remain often unexplored and unpublished. The challenges faced by researchers and practitioners are particularly complex when designing games for special target groups, such as children, or for a serious purpose. The HCI community would benefit from a discussion on these issues in order to avoid researchers and practitioners to repeat mistakes. We want to learn from projects that started with a promising idea, but failed or faced severe challenges. This workshop will be the first at CHI focusing on 'failed game projects'. In particular, workshop participants are encouraged to discuss issues that typically received little attention in publications and hereby contribute to the discussion on failures in the design, development and evaluation of games for and or with children. As a result, the community will benefit from these insights and lessons-learned, which will enhance the design of future (serious) games with/for children.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The function of environmental governance and the principle of the rule of law are both controversial and challenging. To apply the principle of the rule of law to the function of environmental governance is perhaps even more controversial and challenging. A system of environmental governance seeks to bring together the range of competitive and potentially conflicting interests in how the environment and its resources are managed. Increasingly it is the need for economic, social and ecological sustainability that brings these interests – both public and private – together. Then there is the relevance of the principle of the rule of law. Economic, social and ecological sustainability will be achieved – if at all – by a complex series of rules of law that are capable of enforcement so as to ensure compliance with them. To what extent do these rules of law reflect the principle of the rule of law? Is the principle of the rule of law the formally unstated value that is expected to underpin the legal system or is it the normative predicate that directs the legal system both vertically and horizontally? Is sustainability an aspirational value or a normative predicate according to which the environment and its resources are managed? Let us deal sequentially with these issues by reviewing a number of examples that demonstrate the relationship between environmental governance and the rule of law.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Queensland University of Technology [QUT] Caboolture campus is a satellite campus co-located with Brisbane North Institute of TAFE. Building a sense of belonging on-campus continues to be challenging, with anecdotal evidence suggesting that QUT Caboolture students feel like second-class students, isolated from the prestige and excitement of the city campuses. A student identity and fostering a sense of belonging are fundamental to on-campus engagement and have been linked to retention (Field & Morgan-Klein, 2010). A formal welcome ceremony, including an academic procession in full regalia, was a new inclusion for QUT Caboolture’s 2013 Orientation Day. The ritual was intended to be a temporal mark for students to recognise their personal transition and emerging identity as a university student. Cultural capital is one ingredient in a complex mix of interactions and relationships to build a sense of identity. (Ecclestone, Biesta & Hughes, 2010). Fostering a sense of belonging and a connection to the campus and its staff was also anticipated. Students responded positively to the event, reporting feelings of excitement, inspiration and being welcomed into the university culture. The ceremony marked the beginning of the students’ journey together as QUT Caboolture students.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The experiences of people affected by cancer are at the very heart of nursing research efforts. Because much of our work is focused on understanding how to improve experiences and outcomes for people with cancer, it is easy for us to believe that our research is inherently "person centered" and thus collaborative. Let's reflect on what truly collaborative approaches to cancer nursing research could be like, and how we measure up to such goals. Collaboration between people affected by cancer (consumers) and nurses in research is much more than providing a voice for individuals as participants in a research study. Today, research governing bodies in many countries require us to seek a different kind of consumer participation, where consumers and researchers work in partnership with one another to shape decisions about research priorities, policies, and practices.1 Most granting bodies now require explanations of how consumer and community participation will occur within a study. Ethical imperatives and the concept of patient advocacy also require that we give more considered attention to what is meant by consumer involvement.2 Consumers provide perspective on what will be relevant, acceptable, feasible, and sensitive research, having lived the experience of cancer. As a result, they offer practical insights that can ensure the successful conduct and better outcomes from research. Some granting bodies now even allocate a proportion of final score or assign a "public value" weighting for a grant, to recognize the importance of consumer involvement and reflect the quality of patient involvement in all stages of the research process.3

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background and Objectives Obesity and some dietary related diseases are emerging health problems among Chinese immigrants and their children in developed countries. These health problems are closely linked to eating habits, which are established in the early years of life. Young children’s eating habits are likely to persist into later childhood and youth. Family environment and parental feeding practices have a strong effect on young children’s eating habits. Little information is available on the early feeding practices of Chinese mothers in Australia. The aim of this study was to understand the dietary beliefs, feeding attitudes and practices of Chinese mothers with young children who were recent immigrants to Australia. Methods Using a sequential explanatory design, this mixed methods study consisted of two distinct phases. Phase 1 (quantitative): 254 Chinese immigrant mothers of children aged 12 to 59 months completed a cross-sectional survey. The psychometric properties and factor structure of a Chinese version of the Child Feeding Questionnaire (CFQ, by Birch et al. 2001) were assessed and used to measure specific maternal feeding attitudes and controlling feeding practices. Other questions were developed from the literature and used to explore maternal traditional dietary beliefs and feeding practices related to their beliefs, perceptions of picky eating in children and a range of socioeconomic and acculturation factors. Phase 2 (qualitative): 21 mothers took part in a follow-up telephone interview to assist in explaining and interpreting some significant findings obtained in the first phase. Results Chinese mothers held strong traditional dietary beliefs and fed their children according to these beliefs. However, children’s consumption of non-core foods was high. Both traditional Chinese and Australian style foods were consumed by their children. Confirmatory factor analysis revealed that the original 7-factor model of the CFQ provided an acceptable fit to the data with minor modification. However, an alternative model with eight constructs in which two items related to using food rewards were separated from the original restriction construct, not only provided an acceptable fit to the data, but also improved the conceptual clarity of the constructs. The latter model included 24 items loading onto the following eight constructs: restriction, pressure to eat, monitoring, use of food rewards, perceived responsibility, perception of own weight, perception of child’s weight, and concern about child becoming overweight. The internal consistency of the constructs was acceptable or desirable (Cronbach’s α = .60 - .93). Mothers reported low levels of concern about their child overeating or becoming overweight, but high levels of controlling feeding practices: restriction, monitoring, pressure to eat and use of food rewards. More than one quarter of mothers misinterpreted their child’s weight status (based on mothers’ self-reported data). In addition, mothers’ controlling feeding practices independently predicted half of the variance and explained 16% of the variance in child weight status: pressuring the child to eat was negatively associated with child weight status (β = -0.30, p < .01) and using food rewards was positively associated with child weight status (β = 0.20, p < .05) after adjusting for maternal and child covariates. Monitoring and restriction were not associated with child weight status. Mothers’ perceptions of their child’s weight were positively associated with child weight status (β = 0.33, p < .01). Moreover, mothers reported that they mostly decided what (65%) and how much (80%) food their child ate. Mothers who decided what food their child ate were more likely to monitor (β = -0.17, p < .05) and restrict (β = -0.17, p < .05) their child’s food consumption. Mothers who let their child decide how much food their child ate were less likely to pressure their child to eat (β = -0.38, p < .01) and use food rewards (β = -0.24, p < .01). Mothers’ perceptions of picky eating behaviour were positively associated with their use of pressure (β = 0.21, p < .01) and negatively associated with monitoring (β = -0.16, p < .05) and perceptions of their child’s weight status (β = -0.13, p < .05). Qualitative data showed that pressuring to eat, monitoring and restriction of the child’s food consumption were common practices among these mothers. However, mothers stated that their motivation for monitoring and restricting was to ensure the child’s general health. Mothers’ understandings of picky eating behaviour in their children were consistent with the literature and they reported multiple feeding strategies to deal with it. Conclusion Chinese immigrant mothers demonstrated strong traditional dietary beliefs, a low level of concern for child weight, misperceptions of child weight status, and a high overall level of control in child feeding in this study. The Chinese version of the CFQ, which consists of eight constructs and distinguishes between the constructs using food rewards and restriction, is an appropriate instrument to assess feeding attitudes and controlling feeding practices among Chinese immigrant mothers of young children in Australia. Mothers’ feeding attitudes and practices were associated with children’s weight status and mothers’ perceptions of picky eating behaviour in children after adjusting for a range of socio-demographic maternal and child characteristics. Monitoring and restriction of children’s food consumption according to food selection may be positive feeding practices, whereas pressuring to eat and using food rewards appeared to be negative feeding practices in this study. In addition, the results suggest that these young children have high exposure to energy-dense, nutrient-poor food. There is a need to develop and implement nutrition interventions to improve maternal feeding practices and the dietary quality among children of Chinese immigrant mothers in Australia.