931 resultados para Internet Security
Resumo:
In this final chapter we will raise a number of issues that we have encountered as we have put this collection of papers together. In doing this, we also reflect upon the seven challenges for video game theory that Bernard Perron and Mark Wolf(2009)put forward in the introduction to the second video game theory reader given it is probably one of the most recent assessments in the area at the time of writing. These challenges are concerned with Terminology and Accuracy, History, Methodology, Technology, Interactivity, Play and the Integration of Interdisciplinary Approaches. These issues will be brought up throughout this chapter, but not necessarily in mutually exclusive fashion...
Resumo:
Previous studies show that the Internet positively influences firms’ export activities from developed markets. However, the literature is vague as to whether the Internet has an impact on the export performance of firms from emerging markets. This study tests a conceptual model that includes the effect of Internet marketing capabilities on export market growth in an emerging market. Drawing on a cross-national sample of 204 export firms from a Latin American country (Chile), findings indicate that Internet marketing capabilities positively influence the availability of export information, which in turn impacts the development of business network relationships and export market growth.
Resumo:
Background Chronic respiratory illnesses are the most common group of childhood chronic health conditions and are overrepresented in socially isolated groups. Objective To conduct a randomized controlled pilot trial to evaluate the efficacy of Breathe Easier Online (BEO), an Internet-based problem-solving program with minimal facilitator involvement to improve psychosocial well-being in children and adolescents with a chronic respiratory condition. Methods We randomly assigned 42 socially isolated children and adolescents (18 males), aged between 10 and 17 years to either a BEO (final n = 19) or a wait-list control (final n = 20) condition. In total, 3 participants (2 from BEO and 1 from control) did not complete the intervention. Psychosocial well-being was operationalized through self-reported scores on depression symptoms and social problem solving. Secondary outcome measures included self-reported attitudes toward their illness and spirometry results. Paper-and-pencil questionnaires were completed at the hospital when participants attended a briefing session at baseline (time 1) and in their homes after the intervention for the BEO group or a matched 9-week time period for the wait-list group (time 2). Results The two groups were comparable at baseline across all demographic measures (all F < 1). For the primary outcome measures, there were no significant group differences on depression (P = .17) or social problem solving (P = .61). However, following the online intervention, those in the BEO group reported significantly lower depression (P = .04), less impulsive/careless problem solving (P = .01), and an improvement in positive attitude toward their illness (P = .04) compared with baseline. The wait-list group did not show these differences. Children in the BEO group and their parents rated the online modules very favorably. Conclusions Although there were no significant group differences on primary outcome measures, our pilot data provide tentative support for the feasibility (acceptability and user satisfaction) and initial efficacy of an Internet-based intervention for improving well-being in children and adolescents with a chronic respiratory condition. Trial registration Australian New Zealand Clinical Trials Registry number: ACTRN12610000214033;
Resumo:
We present CHURNs, a method for providing freshness and authentication assurances to human users. In computer-to-computer protocols, it has long been accepted that assurances of freshness such as random nonces are required to prevent replay attacks. Typically, no such assurance of freshness is presented to a human in a human-and-computer protocol. A Computer–HUman Recognisable Nonce (CHURN) is a computer-aided random sequence that the human has a measure of control over and input into. Our approach overcomes limitations such as ‘humans cannot do random’ and that humans will follow the easiest path. Our findings show that CHURNs are significantly more random than values produced by unaided humans; that humans may be used as a second source of randomness, and we give measurements as to how much randomness can be gained from humans using our approach; and that our CHURN-generator makes the user feel more in control, thus removing the need for complete trust in devices and underlying protocols. We give an example of how a CHURN may be used to provide assurances of freshness and authentication for humans in a widely used protocol.
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
We have previously suggested that three proof requirements are essential for a sustainable land registration system. These were proof of identity, proof of ownership and authority to deal. Our attention in this article is drawn to the security framework that surrounds these requirements. We will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to them. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years. We also canvass some more incremental suggestions that evolve out of what we currently do, as well as outlining some comparative externally sourced ideas as to how the transfer and ownership of land can be made safer for all citizens. Such a goal is imperative when land transfer and secure property ownership is a critical component of the economic infrastructure of a modern society.
Resumo:
"What is Bluebird AR? Bluebird AR was the ABC's alternate reality drama set around the leak of Bluebird, a clandestine geoengineering initiative created by eco-billionaire Harrison Wyld. Proposing a fictional scenario set against a backdrop of real world possibilities, Bluebird AR took some of the conventions of the well-established alternate reality game (ARG) genre and pulled them into the relatively new area of online drama, to create a hybrid entertainment form best described as 'participatory drama'. With Bluebird AR's interactive narrative centred on the experimental science of geoengineering, the deliberate manipulation of the Earth's atmosphere to counteract global warming, the events and characters in the Bluebird story were entirely fictional but fused with reality online. Inhabiting a mixture of third party social media spaces and websites created by the ABC, the story incorporated real online articles, scientific journals, media and debate around geoengineering. In an Australian first, ABC Innovation launched Bluebird AR on 27 April 2010, with a 6 week live phase. Audience members were invited to play collectively to help 'unlock the drama' and push forward the emerging narrative, or passively watch the story unfold in real-time across the internet. Bluebird AR subverted ARG conventions with the high quality of its production and assets, and raised the stakes for online drama with its level of audience participation." © 2014 ABC "Introduction One of the most exciting creative challenges of producing Bluebird AR was formulating the broad array of visual styles and treatments required for the project's diverse range of content. Many assets also needed to translate well not only online but across other media, including television and print. With the project's producers keen to create a visually rich narrative with high production values from the outset, inspiration for the production design for various aspects of the Bluebird story began in the earliest pitching phase in September 2008. Particular visual treatments and styles for Bluebird's characters, their web spaces and real world possessions were formulated concurrently with the creation of their profiles. Ideas around how various clues and gameplay spaces might look and feel were also explored at this early stage. Bluebird AR's small but tight creative team produced 7 website designs and brands, motion graphics for title sequences and logo animations, rotoscope animation, 3D compositing and animation, 3D wireframes and schematics, countless Photoshop composites, and a vast array of character assets for the DC (including Kyle's Bluebird Labs security pass and resignation letter, Kruger's American and Russia passports and birth certificate, Harrison's divorce papers, and more)…" © 2014 ABC
Resumo:
Domestic food wastage is a growing problem for the environment and food security. Some causes of domestic food wastes are attributed to a consumer’s behaviours during food purchasing, storage and consumption, such as: excessive food purchases and stockpiling in storage. Recent efforts in human-computer interaction research have examined ways of influencing consumer behaviour. The outcomes have led to a number of interventions that assist users with performing everyday tasks. The Internet Fridge is an example of such an intervention. However, new pioneering technologies frequently confront barriers that restrict their future impact in the market place, which has prompted investigations into the effectiveness of behaviour changing interventions used to encourage more sustainable practices. In this paper, we investigate and compare the effectiveness of two interventions that encourage behaviour change: FridgeCam and the Colour Code Project. We use FridgeCam to examine how improving a consumer’s food supply knowledge can reduce food stockpiling. We use the Colour Code Project to examine how improving consumer awareness of food location can encourage consumption of forgotten foods. We explore opportunities to integrate these interventions into commercially available technologies, such as the Internet Fridge, to: (i) increase the technology’s benefit and value to users, and (ii) promote reduced domestic food wastage. We conclude that interventions improving consumer food supply and location knowledge can promote behaviours that reduce domestic food waste over a longer term. The implications of this research present new opportunities for existing and future technologies to play a key role in reducing domestic food waste.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
Purpose – The purpose of this paper is to examine empirically, an industry development paradox, using embryonic literature in the area of strategic supply chain management, together with innovation management literature. This study seeks to understand how, forming strategic supply chain relationships, and developing strategic supply chain capability, influences beneficial supply chain outcomes expected from utilizing industry-led innovation, in the form of electronic business solutions using the internet, in the Australian beef industry. Findings should add valuable insights to both academics and practitioners in the fields of supply chain innovation management and strategic supply chain management, and expand knowledge to current literature. Design/methodology/approach – This is a quantitative study comparing innovative and non-innovative supply chain operatives in the Australian beef industry, through factor analysis and structural equation modeling using PAWS Statistical V18 and AMOS V18 to analyze survey data from 412 respondents from the Australian beef supply chain. Findings – Key findings are that both innovative and non-innovative supply chain operators attribute supply chain synchronization as only a minor indicator of strategic supply chain capability, contrary to the literature; and they also indicate strategic supply chain capability has a minor influence in achieving beneficial outcomes from utilizing industry-led innovation. These results suggest a lack of coordination between supply chain operatives in the industry. They also suggest a lack of understanding of the benefits of developing a strategic supply chain management competence, particularly in relation to innovation agendas, and provides valuable insights as to why an industry paradox exists in terms of the level of investment in industry-led innovation, vs the level of corresponding benefit achieved. Research limitations/implications – Results are not generalized due to the single agribusiness industry studied and the single research method employed. However, this provides opportunity for further agribusiness studies in this area and also studies using alternate methods, such as qualitative, in-depth analysis of these factors and their relationships, which may confirm results or produce different results. Further, this study empirically extends existing theoretical contributions and insights into the roles of strategic supply chain management and innovation management in improving supply chain and ultimately industry performance while providing practical insights to supply chain practitioners in this and other similar agribusiness industries. Practical implications – These findings confirm results from a 2007 research (Ketchen et al., 2007) which suggests supply chain practice and teachings need to take a strategic direction in the twenty-first century. To date, competence in supply chain management has built up from functional and process orientations rather than from a strategic perspective. This study confirms that there is a need for more generalists that can integrate with various disciplines, particularly those who can understand and implement strategic supply chain management. Social implications – Possible social implications accrue through the development of responsible government policy in terms of industry supply chains. Strategic supply chain management and supply chain innovation management have impacts to the social fabric of nations through the sustainability of their industries, especially agribusiness industries which deal with food safety and security. If supply chains are now the competitive weapon of nations then funding innovation and managing their supply chain competitiveness in global markets requires a strategic approach from everyone, not just the industry participants. Originality/value – This is original empirical research, seeking to add value to embryonic and important developing literature concerned with adopting a strategic approach to supply chain management. It also seeks to add to existing literature in the area of innovation management, particularly through greater understanding of the implications of nations developing industry-wide, industry-led innovation agendas, and their ramifications to industry supply chains.