938 resultados para Security, usability, digital signature
Resumo:
The nature of services and service delivery has been changing rapidly since the 1980’s when many seminal papers in services research were published. Services are increasingly digital, or have a digital component. Further, a large and heterogeneous literature, with competing and overlapping definitions, many of which are dated and inappropriate to contemporary digital services offerings is impeding progress in digital services research. In this conceptual paper, we offer a critical review of some existing conceptualizations of services and digital services. We argue that an inductive approach to understanding cognition about digital services is required to develop a taxonomy of digital services and a new vocabulary. We argue that this is a pre-requisite to theorizing about digital services, including understanding quality drivers, value propositions, and quality determinants for different digital service types. We propose a research approach for reconceptualising digital services and service quality, and outline methodological approaches and outcomes.
Resumo:
This chapter addresses children’s development of digital media literacies with iPads in preschool settings. The authors argue that children living in post-industrial societies participate in ‘transmedia’ experiences that call for new understandings of media literacy that recognise children’s ability to successfully participate in complex media ecologies. The chapter outlines a model for digital media literacies that includes the application of digital materials and media concepts through the processes of media production and media analysis. This model is then used as a framework to interpret children’s media production work across the preschools in our project.
Resumo:
Much has been written about transferring class materials and teaching techniques to digital platforms, but less has been written about applying heuristic organizing constructs in the same manner. With the transformation of learning ecologies over the past decades as well as requirements to adjust to constantly shifting digital tools and environments, the challenges for learning facilitators are to readily adapt and change, as well as to engage a changing learner demographic. However, most importantly is to engage most effectively with learners in these online environments. This article reviews the existing literature in the heuristic construct of academagogy [1] and applies a case study methodology to discussion of the first application of academagogy to the online delivery of an undergraduate design unit. Through a focus on effective teaching and learning techniques, the transfer from face-to-face (f2f) to the digital realm is explored through four main focal points: Tools for teaching, teaching and learning, communicating with students, and effective teaching methods. These four focal points are then used to discuss ways to meet the challenges of teaching online including how they create new dimensions in teaching practice and how the digital experience changes learning experiences. The article concludes with reflection and consolidation of the similarities and differences between the face-to-face and digital deliveries, and by suggesting changes to the academagogic heuristic to enable its use more easily in a digital space.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.
Resumo:
Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced.
Resumo:
Three proof requirements as essential for a sustainable land registration system. These were proof of identity, proof of ownership, and authority to deal. Our attention in this paper is drawn to the latter two requirements and will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to proof of ownership and authority to deal. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years.
Resumo:
This tutorial primarily focuses on the technical challenges surrounding the design and implementation of Accountable-eHealth (AeH) systems. The potential benefits of shared eHealth records systems are promising for the future of improved healthcare; however, their uptake is hindered by concerns over the privacy and security of patient information. In the current eHealth environment, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well informed decisions. This conflict is evident in the review of Australia's PCEHR system. Accountable-eHealth systems aim to balance these concerns by implementing Information Accountability (IA) mechanisms. AeH systems create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency, thus, enabling the creation of shared eHealth records that can be useful to both patients and HCPs. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of AeH systems and the solutions we have devised. A prototype AeH system will be used to demonstrate the functionality of AeH systems, and illustrate some of the proposed solutions. The topics that will be covered include: designing for usability in AeH systems, the privacy and security of audit mechanisms, providing for diversity of users, the scalability of AeH systems, and finally the challenges of enabling research and Big Data Analytics on shared eHealth Records while ensuring accountability and privacy are maintained.
Resumo:
The digital era is proving to be one of disruption, where new technologies matched with innovative business models can be harnessed to attack even the most established of companies. For businesses with the relative certainty of captive customer bases, such as airports, the ability to digitally diversify offers the opportunity to venture into new modes of operation. For an airport, this opportunity can also be leveraged to sustain superior customer support regardless of a customer’s location in the world. This research paper presents a case study of the development of an Australian Airport Corporation’s mobile application as part of a greater digital strategy initiative using a design-led approach to innovate. An action research method provides the platform for an intensive embedded practice and study of design-led innovation within the major Australian Airport Corporation. The findings reveal design-led innovation to be a crucial in-house idea generation and concept development capability enabling the bridging of distinct corporate domains associated with commercialisation, operations and customer experience. A Digital Innovation Checklist is presented as an output of this research which structures an organizational approach toward digital channel innovation. The practitioner’s checklist is designed to aid in the future development of digital channels within the broader spectrum of strategy by addressing business assumptions.
Resumo:
The Association of South East Asian Nations (ASEAN) Secretariat and its member states have repeatedly professed their commitment to the protection and advancement of women’s economic and human rights. Such commitments have included the Declaration on the Advancement of Women in ASEAN in 1988, the ASEAN Declaration on the Elimination of Violence Against Women in 2004, and the ASEAN Declaration of Human Rights in 2012, as well as the establishment of the ASEAN Committee on Women in 2002 and the ASEAN Commission on the Promotion and Protection of Women and Children in 2009. However, none of these regional commitments or institutions expressly take up the core concern of the Women, Peace and Security (WPS) agenda set out in United Nations Security Council (UNSC) Resolution 1325 in 2000. ASEAN has no 1325 regional action plan and amongst the ASEAN membership, the Philippines is the only state that has adopted a 1325 National Action Plan (NAP). We explore the possible reasons for lack of ASEAN institutional engagement with 1325, outline the case for regional engagement, and suggest specific roles for ASEAN Secretariat, donor governments and individual member states to commit to UNSCR 1325 as a regional priority.
Resumo:
REASONS FOR PERFORMING STUDY An increased incidence of metabolic disease in horses has led to heightened recognition of the pathological consequences of insulin resistance (IR). Laminitis, failure of the weight-bearing digital lamellae, is an important consequence. Altered trafficking of specialised glucose transporters (GLUTs) responsible for glucose uptake, are central to the dysregulation of glucose metabolism and may play a role in laminitis pathophysiology. OBJECTIVES We hypothesised that prolonged hyperinsulinaemia alters the regulation of glucose transport in insulin-sensitive tissue and digital lamellae. Our objectives were to compare the relative protein expression of major GLUT isoforms in striated muscle and digital lamellae in healthy horses and during hyperinsulinaemia. STUDY DESIGN Randomised, controlled study. METHODS Prolonged hyperinsulinaemia and lamellar damage were induced by a prolonged-euglycaemic hyperinsulinaemic clamp (p-EHC) or a prolonged-glucose infusion (p-GI) and results were compared to electrolyte-treated controls. GLUT protein expression was examined with immunoblotting. RESULTS Lamellar tissue contained more GLUT1 protein than skeletal muscle (p = 0.002) and less GLUT4 than the heart (p = 0.037). During marked hyperinsulinaemia and acute laminitis (induced by the p-EHC), GLUT1 protein expression was decreased in skeletal muscle (p = 0.029) but unchanged in the lamellae, while novel GLUTs (8; 12) were increased in the lamellae (p = 0.03), but not skeletal muscle. However, moderate hyperinsulinaemia and subclinical laminitis (induced by the p-GI) did not cause differential GLUT protein expression in the lamellae vs. control horses. CONCLUSIONS The results suggest that lamellar tissue functions independently of insulin and that IR may not be an essential component of laminitis aetiology. Marked differences in GLUT expression exist between insulin-sensitive and insulin-independent tissues during metabolic dysfunction in horses. The different expression profiles of novel GLUTs during acute and subclinical laminitis may be important to disease pathophysiology and require further investigation.
Resumo:
The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. This volume addresses the issues that are at stake in this dual process of political closure, and therefore rethinks how states can respond to terrorist threats. The contributors range from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.
Resumo:
Pandemics are for the most part disease outbreaks that become widespread as a result of the spread of human-to-human infection. Beyond the debilitating, sometimes fatal, consequences for those directly affected, pandemics have a range of negative social, economic and political consequences. These tend to be greater where the pandemic is a novel pathogen, has a high mortality and/or hospitalization rate and is easily spread. According to Lee Jong-wook, former Director-General of the World Health Organization (WHO), pandemics do not respect international borders. Therefore, they have the potential to weaken many societies, political systems and economies simultaneously.
Resumo:
This chapter uses as a beginning point Walter Benjamin’s famous essay ‘The work of art in the age of technological reproducibility’(1935/2008) to discuss Media Arts education. It locates ‘Media Arts’ at the intersection of three key ideas: 1) media arts products as objects for popular and everyday consumption and intervention by individuals and broader audiences; 2) materiality and how individuals use their bodies and technologies to produce, combine and share digital materials and; 3) the construction of aesthetic knowledge and how this relates to critical and conceptual thinking. These ideas are discussed in the context of the development of curriculum for students at all ages of schooling, with specific attention given to the knowledge and skills students might develop within Media Arts education in primary schools. Examples from a Media Arts project in a primary school in Australia – where a new Media Arts national curriculum has been developed –are provided to illustrate the key ideas discussed in the chapter.
Resumo:
Theorists of multiliteracies, social semiotics, and the New Literacy Studies have drawn attention to the potential changing nature of writing and literacy in the context of networked communications. This article reports findings from a design-based research project in Year 4 classrooms (students aged 8.5-10 years) in a low socioeconomic status school. A new writing program taught students how to design multimodal and digital texts across a range of genres and text types, such as web pages, online comics, video documentaries, and blogs. The authors use Bernstein’s theory of the pedagogic device to theorize the pedagogic struggles and resolutions in remaking English through the specialization of time, space, and text. The changes created an ideological struggle as new writing practices were adapted from broader societal fields to meet the instructional and regulative discourses of a conventional writing curriculum.