935 resultados para least privilege
Resumo:
Client puzzles are moderately-hard cryptographic problems neither easy nor impossible to solve that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity. We propose an efficient client puzzle based on modular exponentiation. Our puzzle requires only a few modular multiplications for puzzle generation and verification. For a server under denial of service attack, this is a significant improvement as the best known non-parallelisable puzzle proposed by Karame and Capkun (ESORICS 2010) requires at least 2k-bit modular exponentiation, where k is a security parameter. We show that our puzzle satisfies the unforgeability and difficulty properties defined by Chen et al. (Asiacrypt 2009). We present experimental results which show that, for 1024-bit moduli, our proposed puzzle can be up to 30 times faster to verify than the Karame-Capkun puzzle and 99 times faster than the Rivest et al.'s time-lock puzzle.
Resumo:
To examine socioeconomic differences in the frequency and types of takeaway foods consumed. Cross-sectional postal survey. Participants were asked about their usual consumption of overall takeaway food (< four times a month, or ≥ four times a month) and 22 specific takeaway food items (< once a month, or ≥ once a month): these latter foods were grouped into “healthy” and “less healthy” choices. Socioeconomic position was measured using education and equivalised household income and differences in takeaway food consumption were assessed by calculating prevalence ratios using log binomial regression. Adults aged 25–64 years from Brisbane, Australia were randomly selected from the electoral roll (N = 903, 63.7% response rate). Compared with their more educated counterparts, the least educated were more regular consumers of overall takeaway food, fruit/vegetable juice, and less regular consumers of sushi. For the “less healthy” items, the least educated more regularly consumed potato chips, savoury pies, fried chicken, and non-diet soft drinks; however, the least educated were less likely to consume curry. Household income was not associated with overall takeaway consumption. The lowest income group were more regular consumers of fruit/vegetable juice compared with the highest income group. Among the “less healthy” items, the lowest income group were more regular consumers of fried fish, ice-cream, and milk shakes, while curry was consumed less regularly. The frequency and types of takeaway foods consumed by socioeconomically disadvantaged groups may contribute to inequalities in overweight/obesity and chronic disease.
Resumo:
This chapter argues that evolutionary economics should be founded upon complex systems theory rather than neo-Darwinian analogies concerning natural selection, which focus on supply side considerations and competition amongst firms and technologies. It suggests that conceptions such as production and consumption functions should be replaced by network representations, in which the preferences or, more correctly, the aspirations of consumers are fundamental and, as such, the primary drivers of economic growth. Technological innovation is viewed as a process that is intermediate between these aspirational networks, and the organizational networks in which goods and services are produced. Consumer knowledge becomes at least as important as producer knowledge in determining how economic value is generated. It becomes clear that the stability afforded by connective systems of rules is essential for economic flexibility to exist, but that too many rules result in inert and structurally unstable states. In contrast, too few rules result in a more stable state, but at a low level of ordered complexity. Economic evolution from this perspective is explored using random and scale free network representations of complex systems.
Resumo:
The formation of hypertrophic scars is a frequent outcome of wound repair and often requires further therapy with treatments such as silicone gel sheets (SGS; Perkins et al., 1983). Although widely used, knowledge regarding SGS and their mechanism of action on hypertrophic scars is limited. Furthermore, SGS require consistent application for at least twelve hours a day for up to twelve consecutive months, beginning as soon as wound reepithelialisation has occurred. Preliminary research at QUT has shown that some species of silicone present in SGS have the ability to permeate into collagen gel skin mimetics upon exposure. An analogue of these species, GP226, was found to decrease both collagen synthesis and the total amount of collagen present following exposure to cultures of cells derived from hypertrophic scars. This silicone of interest was a crude mixture of silicone species, which resolved into five fractions of different molecular weight. These five fractions were found to have differing effects on collagen synthesis and cell viability following exposure to fibroblasts derived from hypertrophic scars (HSF), keloid scars (KF) and normal skin (nHSF and nKF). The research performed herein continues to further assess the potential of GP226 and its fractions for scar remediation by determining in more detail its effects on HSF, KF, nHSF, nKF and human keratinocytes (HK) in terms of cell viability and proliferation at various time points. Through these studies it was revealed that Fraction IV was the most active fraction as it induced a reduction in cell viability and proliferation most similar to that observed with GP226. Cells undergoing apoptosis were also detected in HSF cultures exposed to GP226 and Fraction IV using the Tunel assay (Roche). These investigations were difficult to pursue further as the fractionation process used for GP226 was labour-intensive and time inefficient. Therefore a number of silicones with similar structure to Fraction IV were synthesised and screened for their effect following application to HSF and nHSF. PDMS7-g-PEG7, a silicone-PEG copolymer of low molecular weight and low hydrophilic-lipophilic balance factor, was found to be the most effective at reducing cell proliferation and inducing apoptosis in cultures of HSF, nHSF and HK. Further studies investigated gene expression through microarray and superarray techniques and demonstrated that many genes are differentially expressed in HSF following treatment with GP226, Fraction IV and PDMS7-g-PEG7. In brief, it was demonstrated that genes for TGFβ1 and TNF are not differentially regulated while genes for AIFM2, IL8, NSMAF, SMAD7, TRAF3 and IGF2R show increased expression (>1.8 fold change) following treatment with PDMS7-g-PEG7. In addition, genes for αSMA, TRAF2, COL1A1 and COL3A1 have decreased expression (>-1.8 fold change) following treatment with GP226, Fraction IV and PDMS7-g-PEG7. The data obtained suggest that many different pathways related to apoptosis and collagen synthesis are affected in HSF following exposure to PDMS7-g-PEG7. The significance is that silicone-PEG copolymers, such as GP226, Fraction IV and PDMS7-g-PEG7, could potentially be a non-invasive substitute to apoptosis-inducing chemical agents that are currently used as scar treatments. It is anticipated that these findings will ultimately contribute to the development of a novel scar therapy with faster action and improved outcomes for patients suffering from hypertrophic scars.
Resumo:
Physical activity is important following breast cancer. Trials of non-face-to-face interventions are needed to assist in reaching women living outside major metropolitan areas. This study seeks to evaluate the feasibility and effectiveness of a telephone-delivered, mixed aerobic and resistance exercise intervention for non-urban Australian women with breast cancer. A randomized controlled trial comparing an 8-month intervention delivered by exercise physiologists (n = 73) to usual care (n = 70). Sixty-one percent recruitment rate and 96% retention at 12 months; 79% of women in the intervention group received at least 75% of calls; odds (OR, 95% CI) of meeting intervention targets favored the intervention group for resistance training (OR 3.2; 1.2, 8.9) and aerobic (OR 2.1; 0.8, 5.5) activity. Given the limited availability of physical activity programs for non-urban women with breast cancer, results provide strong support for feasibility and modest support for the efficacy of telephone-delivered interventions.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
This research is one of several ongoing studies conducted within the IT Professional Services (ITPS) research programme at Queensland University of Technology (QUT). In 2003, ITPS introduced the IS-Impact model, a measurement model for measuring information systems success from the viewpoint of multiple stakeholders. The model, along with its instrument, is robust, simple, yet generalisable, and yields results that are comparable across time, stakeholders, different systems and system contexts. The IS-Impact model is defined as “a measure at a point in time, of the stream of net benefits from the Information System (IS), to date and anticipated, as perceived by all key-user-groups”. The model represents four dimensions, which are ‘Individual Impact’, ‘Organizational Impact’, ‘Information Quality’ and ‘System Quality’. The two Impact dimensions measure the up-to-date impact of the evaluated system, while the remaining two Quality dimensions act as proxies for probable future impacts (Gable, Sedera & Chan, 2008). To fulfil the goal of ITPS, “to develop the most widely employed model” this research re-validates and extends the IS-Impact model in a new context. This method/context-extension research aims to test the generalisability of the model by addressing known limitations of the model. One of the limitations of the model relates to the extent of external validity of the model. In order to gain wide acceptance, a model should be consistent and work well in different contexts. The IS-Impact model, however, was only validated in the Australian context, and packaged software was chosen as the IS understudy. Thus, this study is concerned with whether the model can be applied in another different context. Aiming for a robust and standardised measurement model that can be used across different contexts, this research re-validates and extends the IS-Impact model and its instrument to public sector organisations in Malaysia. The overarching research question (managerial question) of this research is “How can public sector organisations in Malaysia measure the impact of information systems systematically and effectively?” With two main objectives, the managerial question is broken down into two specific research questions. The first research question addresses the applicability (relevance) of the dimensions and measures of the IS-Impact model in the Malaysian context. Moreover, this research question addresses the completeness of the model in the new context. Initially, this research assumes that the dimensions and measures of the IS-Impact model are sufficient for the new context. However, some IS researchers suggest that the selection of measures needs to be done purposely for different contextual settings (DeLone & McLean, 1992, Rai, Lang & Welker, 2002). Thus, the first research question is as follows, “Is the IS-Impact model complete for measuring the impact of IS in Malaysian public sector organisations?” [RQ1]. The IS-Impact model is a multidimensional model that consists of four dimensions or constructs. Each dimension is represented by formative measures or indicators. Formative measures are known as composite variables because these measures make up or form the construct, or, in this case, the dimension in the IS-Impact model. These formative measures define different aspects of the dimension, thus, a measurement model of this kind needs to be tested not just on the structural relationship between the constructs but also the validity of each measure. In a previous study, the IS-Impact model was validated using formative validation techniques, as proposed in the literature (i.e., Diamantopoulos and Winklhofer, 2001, Diamantopoulos and Siguaw, 2006, Petter, Straub and Rai, 2007). However, there is potential for improving the validation testing of the model by adding more criterion or dependent variables. This includes identifying a consequence of the IS-Impact construct for the purpose of validation. Moreover, a different approach is employed in this research, whereby the validity of the model is tested using the Partial Least Squares (PLS) method, a component-based structural equation modelling (SEM) technique. Thus, the second research question addresses the construct validation of the IS-Impact model; “Is the IS-Impact model valid as a multidimensional formative construct?” [RQ2]. This study employs two rounds of surveys, each having a different and specific aim. The first is qualitative and exploratory, aiming to investigate the applicability and sufficiency of the IS-Impact dimensions and measures in the new context. This survey was conducted in a state government in Malaysia. A total of 77 valid responses were received, yielding 278 impact statements. The results from the qualitative analysis demonstrate the applicability of most of the IS-Impact measures. The analysis also shows a significant new measure having emerged from the context. This new measure was added as one of the System Quality measures. The second survey is a quantitative survey that aims to operationalise the measures identified from the qualitative analysis and rigorously validate the model. This survey was conducted in four state governments (including the state government that was involved in the first survey). A total of 254 valid responses were used in the data analysis. Data was analysed using structural equation modelling techniques, following the guidelines for formative construct validation, to test the validity and reliability of the constructs in the model. This study is the first research that extends the complete IS-Impact model in a new context that is different in terms of nationality, language and the type of information system (IS). The main contribution of this research is to present a comprehensive, up-to-date IS-Impact model, which has been validated in the new context. The study has accomplished its purpose of testing the generalisability of the IS-Impact model and continuing the IS evaluation research by extending it in the Malaysian context. A further contribution is a validated Malaysian language IS-Impact measurement instrument. It is hoped that the validated Malaysian IS-Impact instrument will encourage related IS research in Malaysia, and that the demonstrated model validity and generalisability will encourage a cumulative tradition of research previously not possible. The study entailed several methodological improvements on prior work, including: (1) new criterion measures for the overall IS-Impact construct employed in ‘identification through measurement relations’; (2) a stronger, multi-item ‘Satisfaction’ construct, employed in ‘identification through structural relations’; (3) an alternative version of the main survey instrument in which items are randomized (rather than blocked) for comparison with the main survey data, in attention to possible common method variance (no significant differences between these two survey instruments were observed); (4) demonstrates a validation process of formative indexes of a multidimensional, second-order construct (existing examples mostly involved unidimensional constructs); (5) testing the presence of suppressor effects that influence the significance of some measures and dimensions in the model; and (6) demonstrates the effect of an imbalanced number of measures within a construct to the contribution power of each dimension in a multidimensional model.
Resumo:
Nowadays, everyone can effortlessly access a range of information on the World Wide Web (WWW). As information resources on the web continue to grow tremendously, it becomes progressively more difficult to meet high expectations of users and find relevant information. Although existing search engine technologies can find valuable information, however, they suffer from the problems of information overload and information mismatch. This paper presents a hybrid Web Information Retrieval approach allowing personalised search using ontology, user profile and collaborative filtering. This approach finds the context of user query with least user’s involvement, using ontology. Simultaneously, this approach uses time-based automatic user profile updating with user’s changing behaviour. Subsequently, this approach uses recommendations from similar users using collaborative filtering technique. The proposed method is evaluated with the FIRE 2010 dataset and manually generated dataset. Empirical analysis reveals that Precision, Recall and F-Score of most of the queries for many users are improved with proposed method.
Resumo:
Twin studies offer the opportunity to determine the relative contribution of genes versus environment in traits of interest. Here, we investigate the extent to which variance in brain structure is reduced in monozygous twins with identical genetic make-up. We investigate whether using twins as compared to a control population reduces variability in a number of common magnetic resonance (MR) structural measures, and we investigate the location of areas under major genetic influences. This is fundamental to understanding the benefit of using twins in studies where structure is the phenotype of interest. Twenty-three pairs of healthy MZ twins were compared to matched control pairs. Volume, T2 and diffusion MR imaging were performed as well as spectroscopy (MRS). Images were compared using (i) global measures of standard deviation and effect size, (ii) voxel-based analysis of similarity and (iii) intra-pair correlation. Global measures indicated a consistent increase in structural similarity in twins. The voxel-based and correlation analyses indicated a widespread pattern of increased similarity in twin pairs, particularly in frontal and temporal regions. The areas of increased similarity were most widespread for the diffusion trace and least widespread for T2. MRS showed consistent reduction in metabolite variation that was significant in the temporal lobe N-acetylaspartate (NAA). This study has shown the distribution and magnitude of reduced variability in brain volume, diffusion, T2 and metabolites in twins. The data suggest that evaluation of twins discordant for disease is indeed a valid way to attribute genetic or environmental influences to observed abnormalities in patients since evidence is provided for the underlying assumption of decreased variability in twins.
Resumo:
For many people, a relatively large proportion of daily exposure to a multitude of pollutants may occur inside an automobile. A key determinant of exposure is the amount of outdoor air entering the cabin (i.e. air change or flow rate). We have quantified this parameter in six passenger vehicles ranging in age from 18 years to <1 year, at three vehicle speeds and under four different ventilation settings. Average infiltration into the cabin with all operable air entry pathways closed was between 1 and 33.1 air changes per hour (ACH) at a vehicle speed of 60 km/h, and between 2.6 and 47.3 ACH at 110 km/h, with these results representing the most (2005 Volkswagen Golf) and least air-tight (1989 Mazda 121) vehicles, respectively. Average infiltration into stationary vehicles parked outdoors varied between ~0 and 1.4 ACH and was moderately related to wind speed. Measurements were also performed under an air recirculation setting with low fan speed, while airflow rate measurements were conducted under two non-recirculate ventilation settings with low and high fan speeds. The windows were closed in all cases, and over 200 measurements were performed. The results can be applied to estimate pollutant exposure inside vehicles.
Resumo:
China’s increasing participation in world affairs and the growing popularity of English as a lingua franca have made significant impact on Chinese society, culture and education. As such, considerable research topics in relation to English require TEFL researchers’ attentions. Additionally, higher education reform in China has created higher demand on academics by stressing research as an important element in academics’ assessment. Recurrent rhetoric in the field of TEFL also calls on practitioners to theorise their practice. All these practical needs and theoretical arguments point to the necessity and significance of TEFL academics’ engagement in research. To find out whether Chinese TEFL academics’ research meet the new demand on them, a survey of TEFL academics at three Chinese higher institutions was conducted. One hundred eighty two of them provided valid responses which were analysed using SPSS. It was found that TEFL academics’ research productivity in each category of research products was quite low. Large percentages of them did not produce any item in the investigated categories of research. They were least productive in conference papers and research products at the national level. However for these least productive categories, there were highly-productive TEFL academics. The categories of research where the TEFL academics were found relatively productive were non-core journal articles and provincial projects. The findings suggest that it is necessary and urgent for Chinese TEFL academics to enhance their research productivity to be able to meet the demand that new era has rendered.
Resumo:
Purpose: The purpose of this study is to investigate Latin American online purchase behaviour with a specific focus on the influence of perceived risk and trust. While studies of this nature have been conducted quite extensively in developed countries, their application in developing countries, such as Latin America is limited. Our study addresses this gap in the literature with an empirical study conducted in Chile. Design/methodology/approach: The authors develop and test a proposed model of the influence of consumer’s perceptions of risk and trust on their attitudes and intentions to purchase on the Internet. An online survey method is used. The sample consists of 176 Chilean consumers who have made at least one purchase online. The data is analysed using structural equation modelling technique (SEM). Findings: The analysis revealed that of the perceived risk and trust factors examined, trust in third party assurances and a cultural environment of trust had the strongest positive influence on intentions to continuing purchasing online. Perceived risk had an inverse relationship with attitude and consumers’ attitude has a positive influence on intentions to purchase online. Trust in online vendors and a propensity to trust were both insignificant. Practical implications: Practically, these results identity which risk and trust beliefs towards purchasing online have the most effect thereby providing insights into how companies should seek to mitigate perceptions of risk to encourage new and return purchasers. Additionally, this research shows that consumers in a Latin American country, recognised as a collectivist, high risk avoidance culture, are willing to make purchases online despite the risks involved. Originality/value: The study and its results is one of few available that consider a Latin American context. The value of the findings provides insights into the specific risk and trust factors that influence Chilean consumers when considering purchasing online. The tested model adds value not only to the literature on Latin American consumer behaviour but also provides guidance for companies offering online retailing facilities in these less developed countries.
Resumo:
Information Technology and its relationship to organisational performance has been a subject of continued interest to researchers and other stakeholders in developing countries. While there is concurrence that IT does contribute to performance, and we are efficiently expanding our knowledge on what factors cause better leveraging of IT resources in organisations, we have done little to understand how these factors interact with technology that results in improved performance. This paper suggests looking that the interaction between organisational resources and technology within the structurational lens, which recognises the recursive interaction between technology and people in the presence of social practices, and the norms that inform their ongoing practices. An ethnographic approach to understanding this interaction between technology and resources, as suggested by the structuration perspective, is suggested, aiming to provide richer insights on the nature of the environment that promotes better use of IT resources in developing countries. Such insights could provide the IT users in developing countries with at least an initial conception of the “IT usage platform” that they could promote in their organisations to leverage the most from their IT resources.
Resumo:
In this paper, spatially offset Raman spectroscopy (SORS) is demonstrated for non-invasively investigating the composition of drug mixtures inside an opaque plastic container. The mixtures consisted of three components including a target drug (acetaminophen or phenylephrine hydrochloride) and two diluents (glucose and caffeine). The target drug concentrations ranged from 5% to 100%. After conducting SORS analysis to ascertain the Raman spectra of the concealed mixtures, principal component analysis (PCA) was performed on the SORS spectra to reveal trends within the data. Partial least squares (PLS) regression was used to construct models that predicted the concentration of each target drug, in the presence of the other two diluents. The PLS models were able to predict the concentration of acetaminophen in the validation samples with a root-mean-square error of prediction (RMSEP) of 3.8% and the concentration of phenylephrine hydrochloride with an RMSEP of 4.6%. This work demonstrates the potential of SORS, used in conjunction with multivariate statistical techniques, to perform non-invasive, quantitative analysis on mixtures inside opaque containers. This has applications for pharmaceutical analysis, such as monitoring the degradation of pharmaceutical products on the shelf, in forensic investigations of counterfeit drugs, and for the analysis of illicit drug mixtures which may contain multiple components.
Resumo:
The emerging principle of a “responsibility to protect” (R2P) presents a direct challenge to China's traditional emphasis on the twin principles of non-intervention in the domestic affairs of other states and non-use of military force. This paper considers the evolution of China‟s relationship with R2P over the past ten years. In particular, it examines how China engaged with R2P during the recent Libyan crisis, and considers what impact this conflict may have first, on Chinese attitudes to R2P, and second, on the future development and implementation of the doctrine itself. This paper argues that China‟s decision to allow the passage of Security Council resolution 1973, authorising force in Libya, was shaped by an unusual set of pragmatic considerations, and should not be viewed as evidence of a dramatic shift in Chinese attitudes towards R2P. More broadly, controversy over the scope of NATO's military action in Libya has raised questions about R2P‟s legitimacy, which has contributed to a lack of timely international action in Syria and Yemen. In the short term at least, this post-Libya backlash against R2P is likely to constrain the Security Council‟s ability to respond decisively to other civilian protection situations.