922 resultados para Security risk
Resumo:
It is a serious concern to health practitioners and policymakers that, in spite of substantial investment, there has been no meaningful decline in the prevalence of mental illness in Australia (Slade et al., 2009). It is now understood that a complex array of biopsychosocial factors confer varying degrees of risk of mental illness. Genetic predisposition, obstetric complications, environmental toxins, poverty, developmental delay, substance abuse, exposure to loss and trauma, chaotic family environments with accompanying abuse and neglect, chronic physical illness and maladaptive interpersonal interactions all contribute to an increased risk of developing mental disorders (Kieling et al., 2011). Bullying in childhood and adolescence is an identified risk factor for mental disorders, suicide attempts and drug and alcohol problems (Copeland et al., 2013; Moore et al., 2013)...
Resumo:
This report is one of a series of products resulting from a National Health and Medical Research Council (NHMRC) Urgent Research Grant – Pandemic Influenza [No 409973]. The research targeted two key aspects of planning and preparedness for a human influenza pandemic, namely:
Resumo:
Background Cancer itself can alter the metabolic and physiologic of the body's nutritional needs. As a result, some patients experience some degree of weight loss before the start of the treatment. Aim The aim of the study was to determine at which chemotherapy treatment cycle patients with cancer begin to exhibit signs and symptoms of malnutrition. Methods A prospective descriptive correlational design was used to assess the nutritional risk of 111 patients with cancer receiving chemotherapy in the ambulatory setting. The data were collected by using a nutritional screening tool. Findings The prevalence of malnutrition risk was 45% in patients undergoing the first cycle of chemotherapy. Patients who received the first three cycles of chemotherapy were 2.62 times more likely to develop malnutrition than those who received seven or more cycles. The risk of developing malnutrition varies depending on the type of cancer, the types of chemotherapy regime, the number of chemotherapy cycles, body mass index and the stage of cancer. Conclusion The study found about half of the patients had developed signs and symptoms of nutritional risk at cycle one. Hence, nutritional support may be required even before the start of chemotherapy.
Resumo:
10 page document containing expert assessment of shortcomings of Western Australian State Planning Policy SPP3.7- Planning for Bushfire Risk Management. Document produced on behalf of QUT and submitted to and published by the WAPC as part of their public consultation process for their draft policy.
Resumo:
Modern portfolio theory suggests that investors minimize risk for a given level of expected return by carefully choosing the proportions of various assets. This study sets out to determine the role of the institutional investor in monitoring risk and firm performance. Using a sample of Australian firms from 2006 to 2008, our empirical study shows a positive association between firm-specific risk, risk-management policy, and performance for firms with increasing institutional shareholdings. The study also finds that the significance of this association depends on the institutional investor's ability to influence management, which in turn depends on the size of ownership and whether the investee firm does not have potential business dealings with the investor. We also find that when firms are financially distressed, institutional investors engage in promoting short-term performance or exit rather than support long-term value creation. The results are robust while controlling the potential for endogeneity and using sensitivity tests to control for variants of performance and risk. These findings add to the growing body of literature examining institutional ownership and the importance of understanding the role of risk-management in the risk and return relation.
Resumo:
In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
Resumo:
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.