931 resultados para Internet Security
Resumo:
Earlier this week, the New York Police Department in partnership with Homeland Security arrested seven people and seized a number of documents pertaining to the website Rentboy.com. Although the website purports to help men connect for companionship only, authorities allege that it has been used to “facilitate the promotion, management, establishment, and carrying on of an unlawful activity, namely an enterprise involving prostitution”. Unlike Australia, which started the decriminalisation of sex work as early as 1979, sex work is illegal across all of the USA, save a few counties in Nevada where it is subject to heavy regulation. The raid on Rentboy.com raises important questions about sex work, including its visibility, consumer demand for such services, and the ongoing marginalisation of those who buy and sell sexual services...
Resumo:
The Trans-Pacific Partnership (TPP) is a highly secretive trade agreement being negotiated between the US and eleven Pacific Rim countries, including Australia. Having obtained a fast-track authority from the United States Congress, US President Barack Obama is keen to finalise the deal. However, he was unable to achieve a resolution of the deal at recent talks in Hawaii on the TPP. A number of chapters of the TPP will affect the creative artists, cultural industries and internet freedom — including the intellectual property chapter, the investment chapter, and the electronic commerce chapter. Legacy copyright industries have pushed for longer and stronger copyright protection throughout the Pacific Rim. In the wake of the Hawaii talks, Knowledge Ecology International leaked the latest version of the intellectual property chapter of the TPP. Jamie Love of Knowledge Ecology International commented upon the leaked text about copyright law: ‘In many sections of the text, the TPP would change global norms, restrict access to knowledge, create significant financial risks for persons using and sharing information, and, in some cases, impose new costs on persons producing new knowledge goods.’ The recent leaked text reveals a philosophical debate about the nature of intellectual property law. There are mixed messages in respect of the treatment of the public domain under copyright law. In one part of the agreement on internet service providers, there is text that says that the parties recognise the need for ‘promoting innovation and creativity,’ ‘facilitating the diffusion of information, knowledge, technology, culture, and the arts’, and ‘foster competition and open and efficient markets.’ A number of countries suggested ‘acknowledging the importance of the public domain.’ The United States and Japan opposed the recognition of the public domain in this text.
Resumo:
An exploratory qualitative study was conducted to examine the perceptions and attitudes of both school counsellors and students to online counselling. Focus groups were conducted with two groups of school counsellors and six groups of secondary students. It was found that counsellors were hesitant to use online counselling because they were not convinced that it was effective and without the necessary online skills, they were concerned they would not be competent to deal with potential litigious and security pitfalls. Students were generally positive about the opportunity to access the school counsellor online. Implications for practice and future research are discussed.
Resumo:
This submission covers the following terms of reference: • the current levels of financial literacy of seniors and how that can be improved, for example by education programs; • what support and advice is available to assist seniors with their independent financial decision-making; • online and internet based vulnerabilities and the prevalence and vulnerability of seniors to scams; • agencies and organisations that provide advice and support to seniors requiring financial protection; and • the role of the financial sector in ensuring adequate safeguards for seniors in relation to financial decision-making.
Resumo:
Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to the adoption of IT services in the cloud. This study set up a cloud system via VMware suite to emulate hosting unified communications (UC), the integration of two or more real time communication systems, services in the cloud in a laboratory environment. An Internet Protocol Security (IPSec) gateway was also set up to support network-level security for UCaaS against possible security exposures. This study was aimed at analysis of an implementation of UCaaS over IPSec and evaluation of the latency of encrypted UC traffic while protecting that traffic. Our test results show no latency while IPSec is implemented with a G.711 audio codec. However, the performance of the G.722 audio codec with an IPSec implementation affects the overall performance of the UC server. These results give technical advice and guidance to those involved in security controls in UC security on premises as well as in the cloud.
Resumo:
Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.
Resumo:
Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.
Resumo:
The power system network is assumed to be in steady-state even during low frequency transients. However, depending on generator dynamics, and toad and control characteristics, the system model and the nature of power flow equations can vary The nature of power flow equations describing the system during a contingency is investigated in detail. It is shown that under some mild assumptions on load-voltage characteristics, the power flow equations can be decoupled in an exact manner. When the generator dynamics are considered, the solutions for the load voltages are exact if load nodes are not directly connected to each other
Resumo:
The range of consumer health and medicines information sources has diversified along with the increased use of the Internet. This has led to a drive to develop medicines information services and to better incorporate the Internet and e-mail into routine practice in health care and in community pharmacies. To support the development of such services more information is needed about the use of online information by consumers, particularly of those who may be the most likely to use and to benefit from the new sources and modes of medicines communication. This study explored the role and utilization of the Internet-based medicines information and information services in the context of a wider network of information sources accessible to the public in Finland. The overall aim was to gather information to develop better and more accessible sources of information for consumers and services to better meet the needs of consumers. Special focus was on the needs and information behavior among people with depression and using antidepressant medicines. This study applied both qualitative and quantitative methods. Consumer medicines information needs and sources were identified by analyzing the utilization of the University Pharmacy operated national drug information call center (Study I) and surveying Finnish adults (n=2348) use of the different medicines information sources (Study II). The utilization of the Internet as a source of antidepressant information among people with depression was explored by focus group discussions among people with depression and with current or past use of the antidepressant(s) (n=29, Studies III & IV). Pharmacy response to the needs of consumers in term of providing e-mail counseling was assessed by conducting a virtual pseudo customer study among the Finnish community pharmacies (n=161, Study V). Physicians and pharmacists were the primary sources of medicines information. People with mental disorders were more frequent users of telephone- and Internet-based medicines information sources and patient information leaflets than people without mental disorders. These sources were used to complement rather than replace information provided face-to-face by health professionals. People with depression used the Internet to seek facts about antidepressants, to share experiences with peers, and for the curiosity. They described that the access to online drug information was empowering. Some people reported lacking the skills necessary to assess the quality of online information. E-mail medication counseling services provided by community pharmacies were rare and varied in quality. Study results suggest that rather than discouraging the use of the Internet, health professionals should direct patients to use accurate and reliable sources of online medicines information. Health care providers, including community pharmacies should also seek to develop new ways of communicating information about medicines with consumers. This study determined that people with depression and using antidepressants need services enabling interactive communication not only with health care professionals, but also with peers. Further research should be focused on developing medicines information service facilitating communication among different patient and consumer groups.
Resumo:
Tarkastelen kuntien esittelyteksteissä esiintyviä, adjektiiveihin ja adjektiiviryhmiin liittyviä kollokaatioita ja kolligaatioita, eli myötäilmauksia. Adjektiiveja käsittelen adjektiiviryhmittäin, joita on kuusi. Laskevassa kokojärjestyksessä aineistossani esiintyvät adjektiiviryhmät ovat seuraavat: suhteelliset, absoluuttiset, yksilöivät, taipumattomat, suhteutusadjektiivit sekä proadjektiivit. Kiinnitän huomiota erityisesti siihen, millaisia kollokaatiosuhteita (nousevat ja laskevat kollokaatiot) eri adjektiiveihin ja eri adjektiiviryhmiin liittyy. Käyttämäni tekstiaineisto on pienehkö sähköinen tekstikorpus, joka koostuu suomalaisten kuntien Internet-sivuilta kerätyistä esittelyteksteistä. Korpuksessa on yhteensä 119 tekstiä, ja niissä on kyse kunnan esittelystä Internet-sivustojen lukijoille, eli tavallisesti erilaisesta oman kunnan markkinoinnista. Aineistooni kuuluvien kuntien väkiluku on vähemmän kuin 3000 asukasta, eli tutkimuskunnissa kyse on kaikkein pienimmistä Suomen kunnista. Tutkimusaineistooni, eli sähköiseen korpukseen, kuuluvat tekstit on käsitelty Fintwol-ohjelmalla, jolloin niihin on tehty koneavusteinen morfologinen analyysi. Jokaiseen saneeseen on siis lisätty sille kuuluva morfologinen tulkinta. Tarkoitukseni onkin havainnoida myös tietokoneen mahdollistamia sähköisiä tutkimusmenetelmiä kvalitatiivisen kielentutkimuksen välineenä. Kollokaatioiden tutkimuksessa tekstikorpuksia on käytetty pitkään, mutta aiemmin morfologinen analyysi on tavallisesti tehty käsin ja analyysit perustuneet esimerkiksi tiettyjen lekseemien tarkasteluun. Tutkimuksessani selvitän, millaisia mahdollisuuksia tietokoneavusteinen analyysi tuo kvalitatiiviseen kielentutkimukseen sekä millaisia rajoituksia sillä on. Adjektiivi-kollokaatti-esiintymien avulla kuvaillaan esittelyteksteissä usein kuntaa joko suoraan tai välillisesti. Tietokoneavusteisesta analyysista saadut tulokset ovat lähinnä kvantitatiivisia, mutta käytän tarkastelun apuna konkordanssilistaa, eli niin kutsuttua KWIC-listaa (Key Word In Context), jonka tarkasteluvälin pituudeksi olen rajannut viisi sanaa. Tämä pituus sisältää tarkasteltavan lekseemin (adjektiivi) sekä kaksi sanaa sen edellä ja jäljessä. Havainnoin sähköisestä korpuksesta saamieni tilastollisten tulosten avulla myös sitä, millainen aineisto ja tekstilaji esittelytekstit ovat. Vertailen saamiani tuloksia muista korpuksista saatuihin tilastollisiin tuloksiin. Adjektiiviryhmiin liittyvät nousevat kollokaatiosuhteet, joissa kollokaatti on adjektiivia yleisempi, toistuvat läpi aineiston samanlaisina: Näissä kollokaatiosuhteissa adjektiivit kollokoivat useimmiten sellaisen sanaston kanssa, joka on varsin yleistä koko aineistossani. Esimerkiksi substantiivit kunta ja palvelu, jotka ovat koko aineiston yleisimpiä sanoja, esiintyvät kaikkien adjektiiviryhmien adjektiivien kollokaatteina toistuvasti. Ne myös ilmaisevat sellaisia esittelyteksteissä toistuvia aiheita, jotka ovat kunnille tärkeitä ja joita käsitellään monessa esittelytekstissä. Laskevat kollokaatiosuhteet taas ilmaisevat lähinnä esittelyteksteissä yleisiä, adjektiivien merkitystä määrittäviä leksikaalisia suhteita, kuten adjektiivi-kollokaatti-parit hyvät liikenneyhteydet tai kaunis maisema. Esittelytekstiaineistoni käsittelyyn tietokoneavusteinen analyysi soveltui vain osittain. Suurin ongelma aiheutui paikannimistä (esim.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
A 300-strong Angus-Brahman cattle herd near Springsure, central Queensland, was being fed Acacia shirleyi (lancewood) browse during drought and crossed a 5-hectare, previously burnt area with an almost pure growth of Dysphania glomulifera subspecies glomulifera (red crumbweed) on their way to drinking water. Forty cows died of cyanide poisoning over 2 days before further access to the plant was prevented. A digital image of a plant specimen made on a flat-bed scanner and transmitted by email was used to identify D glomulifera. Specific advice on the plant's poisonous properties and management of the case was then provided by email within 2 hours of an initial telephone call by the field veterinarian to the laboratory some 600 km away. The conventional method using physical transport of a pressed dried plant specimen to confirm the identification took 5 days. D glomulifera was identified in the rumen of one of two cows necropsied. The cyanogenic potential of D glomulifera measured 4 days after collection from the site of cattle deaths was 18,600 mg HCN/kg in dry matter. The lethal dose of D glomulifera for a 420 kg cow was estimated as 150 to 190 g wet weight. The plant also contained 4.8% KNO3 equivalent in dry matter, but nitrate-nitrite poisoning was not involved in the deaths.