980 resultados para Security interest
Resumo:
A new approach was taken to delivering a challenging "stewarship of land" unit to over 350 predominantly first year built environment students stewardship. The new approach involved incorporating environmental and planning law into the syllabus, exposing students to a wide range of statutes, selecting legal cases according to a et of criteria and revisiting the material using different modes of delivery and teaching resources. To evaluate the effectiveness of the new approach, the students were surveyed to elicit their learning experience and preferences. The survey found that most students perceived learning about environmental and planning law, including legal cases, worthwhile.----- Areas identified by the surcey for improvement included the perception by some students that: environmenatl and planning law is irrelevant to their discipline and future caree; studying law is dull and sometimes daunting; and the prescribed reading could be omitted.----- To address student perceptions, it is proposed to reorder the topics commencing with local, charismatic topics, while explanding international content and cases, to enlarge and enhance the repertoire of video clips to include sites of legal cawses and development projects, and to reformat the online weekly quizzes to promote reading of primary material.----- Overall, the approach to teaching environmental and planning law to built environment students, including the criteria for selecting legal cases, described in this paper, was found to be effective.
Resumo:
This study used the Sport Interest Inventory (SII) to examine the motivation of fans attending a game in the Australian Football League. This is the first study to use the SII for professional men’s team sport outside the United States. Confirmatory factor analysis showed the model provided a good fit for the data collected in Australia, and regression analysis revealed that team interest, vicarious achievement, excitement and player interest were the significant factors in predicting and explaining the level of attitudinal loyalty of fans toward their favourite team.
Resumo:
The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.
Resumo:
The Queensland Department of Public Works (QDPW) and the Queensland Department of Main Roads (QDMR) have identified a need for industry e-contracting guidelines in the short to medium term. Each of these organisations conducts tenders and contracts for over $600 million annually. This report considers the security and legal issues relating to the shift from a paper-based tendering system to an electronic tendering system. The research objectives derived from the industry partners include: • a review of current standards and e-tendering systems; • a summary of legal requirements impacting upon e-tendering; • an analysis of the threats and requirements for any e-tendering system; • the identification of outstanding issues; • an evaluation of possible e-tendering architectures; • recommendations for e-tendering systems.
Resumo:
This paper presents efficient formulas for computing cryptographic pairings on the curve y 2 = c x 3 + 1 over fields of large characteristic. We provide examples of pairing-friendly elliptic curves of this form which are of interest for efficient pairing implementations.
Resumo:
Measuring quality attributes of object-oriented designs (e.g. maintainability and performance) has been covered by a number of studies. However, these studies have not considered security as much as other quality attributes. Also, most security studies focus at the level of individual program statements. This approach makes it hard and expensive to discover and fix vulnerabilities caused by design errors. In this work, we focus on the security design of an object oriented application and define a number of security metrics. These metrics allow designers to discover and fix security vulnerabilities at an early stage, and help compare the security of various alternative designs. In particular, we propose seven security metrics to measure Data Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented class from the point of view of potential information flow.
Resumo:
The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.
Resumo:
Australia is going through a major reform of consumer credit regulation, with the implementation of a proposal to transfer regulatory responsibility from the State and Territory Governments to the Commonwealth Government. While the broad policy approach is supported, the reform process has missed a significant opportunity to engage directly with issues of financial exclusion and with the potential role of regulation to reduce financial exclusion. The imposition of an interest rate cap can limit the impact of financial exclusion. However, the future of the existing interest rate caps is uncertain, given the diversity of approaches, and the heated debate that surrounds this issue. In the absence of support for regulatory initiatives to increase the availability of low cost, small loans, permitting regulatory diversity on this issue of interest rate caps, within an otherwise centralised regulatory framework., can minimise the impact of financial exclusion on consumers.
Resumo:
This paper presents the findings of a survey that investigates the biotechnology topics of interest according to students and teachers for inclusion in biology lessons and reports on the similarities and differences in teachers’ and students’ biotechnology topics of interest. The study is of significance as biotechnology has been identified as a key area of technological and economic importance worldwide yet there is scant literature relating to teachers’ and students’ interests concerning biotechnology education topics. 500 students and their 15 teachers completed the survey. Interviews were conducted with 3 teachers and 60 students. Responses indicate there is a mismatch in the interests of students and teachers, and what they perceive as being possible topics for inclusion in biology and biotechnology lessons. Where teachers are provided with the freedom to design and assess their own units of work, this mismatch of interests causes problems. The study found students withdrawing from biology courses in post compulsory settings due to lack of interest, and perceived lack of relevance of the course. It is possible that this lack of agreement on topics of interest is a factor in the world wide decline of enrolments in the sciences.
Resumo:
An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to investigate whether security culture has emerged into practices in Saudi Arabian organizations.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
A method of improving the security of biometric templates which satisfies desirable properties such as (a) irreversibility of the template, (b) revocability and assignment of a new template to the same biometric input, (c) matching in the secure transformed domain is presented. It makes use of an iterative procedure based on the bispectrum that serves as an irreversible transformation for biometric features because signal phase is discarded each iteration. Unlike the usual hash function, this transformation preserves closeness in the transformed domain for similar biometric inputs. A number of such templates can be generated from the same input. These properties are illustrated using synthetic data and applied to images from the FRGC 3D database with Gabor features. Verification can be successfully performed using these secure templates with an EER of 5.85%