992 resultados para Thus spoke Zarathustra
Resumo:
The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.
Resumo:
The Chaser’s War on Everything is a night time entertainment program which screened on Australia’s public broadcaster, the ABC in 2006 and 2007. This enormously successful comedy show managed to generate a lot of controversy in its short lifespan (see, for example, Dennehy, 2007; Dubecki, 2007; McLean, 2007; Wright, 2007), but also drew much praise for its satirising of, and commentary on, topical issues. Through interviews with the program’s producers, qualitative audience research and textual analysis, this paper will focus on this show’s media satire, and the segment ‘What Have We Learned From Current Affairs This Week?’ in particular. Viewed as a form of ‘Critical Intertextuality’ (Gray, 2006), this segment (which offered a humorous critique of the ways in which news and current affairs are presented elsewhere on television) may equip citizens with a better understanding of the new genre’s production methods, thus producing a higher level of public media literacy. This paper argues that through its media satire, The Chaser acts not as a traditional news program would in informing the public with new information, but as a text which can inform and shape our understanding of news that already exists within the public sphere. Humorous analyses and critiques of the media (like those analysed in this paper), are in fact very important forms of infotainment, because they can provide “other, ‘improper,’ and yet more media literate and savvy interpretations” (Gray, 2006, p. 4) of the news.
Resumo:
Objectives. Considerable evidence suggests that enforcement efforts cannot fully explain the high degree of tax compliance. To resolve this puzzle of tax compliance, several researchers have argued that citizens' attitudes toward paying taxes, defined as tax morale, helps to explain the high degree of tax compliance. However, most studies have treated tax morale as a black box, without discussing which factors shape it. Additionally, the tax compliance literature provides little empirical research that investigates attitudes toward paying taxes in Europe. Methods. Thus, this article is unique in its examination of citizen tax morale within three multicultural European countries, Switzerland, Belgium, and Spain, a choice that allows far more detailed examination of the impact of culture and institutions using data sets from the World Values Survey and the European Values Survey. Results. The results indicate the tendency that cultural and regional differences affect tax morale. Conclusion. The findings suggest that higher legitimacy for political institutions leads to higher tax morale.
Resumo:
This dissertation by publication which focuses on gender and the Australian federal parliament has resulted in the submission of three refereed journal articles. Data for the study were obtained from 30 semi-structured interviews undertaken in 2006 with fifteen (15) male and fifteen (15) female members of the Australian parliament. The first of the articles is methodological and has been accepted for publication in the Australian Journal of Political Science. The paper argues that feminist political science is guided by five important principles. These are placing gender at the centre of the research, giving emphasis to women’s voice, challenging the public/private divide, using research to transform society and taking a reflexive approach to positionality. It is the latter principle, that of the importance of taking a reflexive approach to research which I explore in the paper. Through drawing on my own experiences as a member of the House of Representatives (Forde 1987-1996) I reflexively investigate the intersections between my background and my identity as a researcher. The second of the articles views the data through the lens of Acker’s (1990) notion of the ‘gendered organization’ which posits that there are four dimensions by which organizations are gendered. These are via the division of labour, through symbols, images and ideologies, by workplace interactions and through the gendered components of individual identity. In this paper which has been submitted to the British Journal of Political Science, each of Acker’s (1990) dimensions is examined in terms of the data from interviews with male and female politicians. The central question investigated is thus to what extent does the Australian parliament conform to Acker’s (1990) concept of the ‘gendered organization’? The third of the papers focuses specifically on data from interviews with the 15 male politicians and investigates how they view gender equality and the Australian parliament. The article, which has been submitted to the European Journal of Political Science asks to what extent contemporary male politicians view the Australian parliament as gendered? Discourse analysis that is ‘ways of viewing’ (Bacchi, 1999, p. 40) is used as an approach to analyse the data. Three discursive frameworks by which male politicians view gender in the Australian parliament are identified. These are: that the parliament is gendered as masculine but this is unavoidable; that the parliament is gendered as feminine and women are actually advantaged; and that the parliament is gender neutral and gender is irrelevant. It is argued that collectively these framing devices operate to mask the many constraints which exist to marginalise women from political participation and undermine attempts to address women’s political disadvantage as political participants. The article concludes by highlighting the significance of the paper beyond the Australian context and calling for further research which names and critiques political men and their discourses on gender and parliamentary practices and processes.
Resumo:
Habitat fragmentation can have an impact on a wide variety of biological processes including abundance, life history strategies, mating system, inbreeding and genetic diversity levels of individual species. Although fragmented populations have received much attention, ecological and genetic responses of species to fragmentation have still not been fully resolved. The current study investigated the ecological factors that may influence the demographic and genetic structure of the giant white-tailed rat (Uromys caudimaculatus) within fragmented tropical rainforests. It is the first study to examine relationships between food resources, vegetation attributes and Uromys demography in a quantitative manner. Giant white-tailed rat densities were strongly correlated with specific suites of food resources rather than forest structure or other factors linked to fragmentation (i.e. fragment size). Several demographic parameters including the density of resident adults and juvenile recruitment showed similar patterns. Although data were limited, high quality food resources appear to initiate breeding in female Uromys. Where data were sufficient, influx of juveniles was significantly related to the density of high quality food resources that had fallen in the previous three months. Thus, availability of high quality food resources appear to be more important than either vegetation structure or fragment size in influencing giant white-tailed rat demography. These results support the suggestion that a species’ response to fragmentation can be related to their specific habitat requirements and can vary in response to local ecological conditions. In contrast to demographic data, genetic data revealed a significant negative effect of habitat fragmentation on genetic diversity and effective population size in U. caudimaculatus. All three fragments showed lower levels of allelic richness, number of private alleles and expected heterozygosity compared with the unfragmented continuous rainforest site. Populations at all sites were significantly differentiated, suggesting restricted among population gene flow. The combined effects of reduced genetic diversity, lower effective population size and restricted gene flow suggest that long-term viability of small fragmented populations may be at risk, unless effective management is employed in the future. A diverse range of genetic reproductive behaviours and sex-biased dispersal patterns were evident within U. caudimaculatus populations. Genetic paternity analyses revealed that the major mating system in U. caudimaculatus appeared to be polygyny at sites P1, P3 and C1. Evidence of genetic monogamy, however, was also found in the three fragmented sites, and was the dominant mating system in the remaining low density, small fragment (P2). High variability in reproductive skew and reproductive success was also found but was less pronounced when only resident Uromys were considered. Male body condition predicted which males sired offspring, however, neither body condition nor heterozygosity levels were accurate predictors of the number of offspring assigned to individual males or females. Genetic spatial autocorrelation analyses provided evidence for increased philopatry among females at site P1, but increased philopatry among males at site P3. This suggests that male-biased dispersal occurs at site P1 and female-biased dispersal at site P3, implying that in addition to mating systems, Uromys may also be able to adjust their dispersal behaviour to suit local ecological conditions. This study highlights the importance of examining the mechanisms that underlie population-level responses to habitat fragmentation using a combined ecological and genetic approach. The ecological data suggested that habitat quality (i.e. high quality food resources) rather than habitat quantity (i.e. fragment size) was relatively more important in influencing giant white-tailed rat demographics, at least for the populations studied here . Conversely, genetic data showed strong evidence that Uromys populations were affected adversely by habitat fragmentation and that management of isolated populations may be required for long-term viability of populations within isolated rainforest fragments.
Resumo:
In this article I outline and demonstrate a synthesis of the methods developed by Lemke (1998) and Martin (2000) for analyzing evaluations in English. I demonstrate the synthesis using examples from a 1.3-million-word technology policy corpus drawn from institutions at the local, state, national, and supranational levels. Lemke's (1998) critical model is organized around the broad 'evaluative dimensions' that are deployed to evaluate propositions and proposals in English. Martin's (2000) model is organized with a more overtly systemic-functional orientation around the concept of 'encoded feeling'. In applying both these models at different times, whilst recognizing their individual usefulness and complementarity, I found specific limitations that led me to work towards a synthesis of the two approaches. I also argue for the need to consider genre, media, and institutional aspects more explicitly when claiming intertextual and heteroglossic relations as the basis for inferred evaluations. A basic assertion made in this article is that the perceived Desirability of a process, person, circumstance, or thing is identical to its 'value'. But the Desirability of anything is a socially and thus historically conditioned attribution that requires significant amounts of institutional inculcation of other 'types' of value-appropriateness, importance, beauty, power, and so on. I therefore propose a method informed by critical discourse analysis (CDA) that sees evaluation as happening on at least four interdependent levels of abstraction.
Resumo:
Principal topic: Is habitual entrepreneurship different? Answering this is important to the field, however there is little systematic evidence, thus far. We addresses this by examining the role experience plays at three possible points of difference: motivations, actions and expectations; and by comparing those currently in the process of starting a business with those who have recent success in business creation. Firstly, we assess the balance of opportunity versus necessity motivation, internally versus externally stimulated decision processes and future growth aspirations. Literature suggests novices are more likely motivated to nascency out of necessity, and favour a manageable business size, while habitual entrepreneurs are more likely motivated by internally stimulated or idea driven processes. Secondly, we examine actions undertaken by successful experienced founders during gestation, contrasting ‘information collection’ and ‘opportunity definition’. Drawing on prior research we expect novices more likely to have enacted ‘information search’ while habitual entrepreneurs enact ‘opportunity definition’. Thirdly, we examine perceptions of venture success, where findings on overconfidence suggest that habitual entrepreneurs expect a higher chance of success for their ventures, while inexperience leads novices to underestimate the difficulty of entrepreneurial survival. Method: Empirical evidence to test these conjectures was drawn from a screened random sample of over 1100 Australian nascent and newly started business ventures. This information was collected during 2007/8 using a telephone survey. Results and Implications: Why do habitual entrepreneurs keep coming back? Findings suggest that while the pursuit of opportunity is shared by novice and experienced entrepreneur alike, consideration of repeat entrepreneurship may be motivated by a desire for growth. While idea driven motivations might not delineate a distinction during nascency, it does seem to be a factor contributing to the success of young firms. This warrants further research. How do habitual entrepreneurs behave differently? It seems they act to clearly define market opportunities as a matter of priority during venture gestation. What effect does entrepreneurial experience have on future expectations? Clearly a sense of realism is drawn over the difficulties that might be faced, and accords more circumspect judgements of venture survival. This finding informs practitioners considering entrepreneurship for the first time.
Resumo:
Principal Topic In this paper we seek to highlight the important intermediate role that the gestation process plays in entrepreneurship by examining its key antecedents and its consequences for new venture emergence. In doing so we take a behavioural perspective and argue that it is not only what a nascent venture is, but what it does (Katz & Gartner, 1988; Shane & Delmar, 2004; Reynolds, 2007) and when it does it during start-up (Reynolds & Miller, 1992; Lichtenstein, Carter, Dooley & Gartner, 2007) that is important. To extend an analogy from biological development, what we suggest is that the way a new venture is nurtured is just as fundamental as its nature. Much prior research has focused on the nature of new ventures and attempted to attribute variations in outcomes directly to the impact resource endowments and investments have. While there is little doubt that venture resource attributes such as human capital, and specifically prior entrepreneurial experience (Alsos & Kolvereid, 1998), access to social (Davidsson & Honig, 2003) and financial capital have an influence. Resource attributes themselves are distal from successful start-up endeavours and remain inanimate if not for the actions of the nascent venture. The key contribution we make is to shift focus from whether or not actions are taken, but when these actions happen and how that is situated in the overall gestation process. Thus, we suggest that it is gestation process dynamics, or when gestation actions occur, that is more proximal to venture outcomes and we focus on this. Recently scholars have highlighted the complexity that exists in the start-up or gestation process, be it temporal or contextual (Liao, Welsch & Tan, 2005; Lichtenstein et al. 2007). There is great variation in how long a start-up process might take (Reynolds & Miller, 1992), some processes require less action than others (Carter, Gartner & Reynolds, 1996), and the overall intensity of the start-up effort is also deemed important (Reynolds, 2007). And, despite some evidence that particular activities are more influential than others (Delmar & Shane, 2003), the order in which events may happen is, until now, largely indeterminate as regard its influence on success (Liao & Welsch, 2008). We suggest that it is this complexity of the intervening gestation process that attenuates the effect of resource endowment and has resulted in mixed findings in previous research. Thus, in order to reduce complexity we shall take a holistic view of the gestation process and argue that it is its’ dynamic properties that determine nascent venture attempt outcomes. Importantly, we acknowledge that particular gestation processes of themselves would not guarantee successful start-up, but it is more correctly the fit between the process dynamics and the ventures attributes (Davidsson, 2005) that is influential. So we aim to examine process dynamics by comparing sub-groups of venture types by resource attributes. Thus, as an initial step toward unpacking the complexity of the gestation process, this paper aims to establish the importance of its role as an intermediary between attributes of the nascent venture and the emergence of that venture. Here, we make a contribution by empirically examining gestation process dynamics and their fit with venture attributes. We do this by firstly, examining that nature of the influence that venture attributes such as human and social capital have on the dynamics of the gestation process, and secondly by investigating the effect that gestation process dynamics have on venture creation outcomes. Methodology and Propositions In order to explore the importance that gestation processes dynamics have in nascent entrepreneurship we conduct an empirical study of ventures start-ups. Data is drawn from a screened random sample of 625 Australian nascent business ventures prior to them achieving consistent outcomes in the market. This data was collected during 2007/8 and 2008/9 as part of the Comprehensive Australian Study of Entrepreneurial Emergence (CAUSEE) project (Davidsson et al., 2008). CAUSEE is a longitudinal panel study conducted over four years, sourcing information from annually administered telephone surveys. Importantly for our study, this methodology allows for the capture and tracking of active nascent venture creation as it happens, thus reducing hindsight and selection biases. In addition, improved tests of causality may be made given that outcome measures are temporally removed from preceding events. The data analysed in this paper represents the first two of these four years, and for the first time has access to follow-up outcome measures for these venture attempts: where 260 were successful, 126 were abandoned, and 191 are still in progress. With regards to venture attributes as gestation process antecedents, we examine specific human capital measured as successful prior experience in entrepreneurship, and direct social capital of the venture as ‘team start-ups’. In assessing gestation process dynamics we follow Lichtenstein et al. (2007) to suggest that the rate, concentration and timing of gestation activities may be used to summarise the complexity dynamics of that process. In addition, we extend this set of measures to include the interaction of discovery and exploitation by way of changes made to the venture idea. Those ventures with successful prior experience or those who conduct symbiotic parallel start-up attempts may be able to, or be forced to, leave their gestation action until later and still derive a successful outcome. In addition access to direct social capital may provide the support upon which the venture may draw in order to persevere in the face of adversity, turning a seemingly futile start-up attempt into a success. On the other hand prior experience may engender the foresight to terminate a venture attempt early should it be seen to be going nowhere. The temporal nature of these conjectures highlight the importance that process dynamics play and will be examined in this research Statistical models are developed to examine gestation process dynamics. We use multivariate general linear modelling to analyse how human and social capital factors influence gestation process dynamics. In turn, we use event history models and stratified Cox regression to assess the influence that gestation process dynamics have on venture outcomes. Results and Implications What entrepreneurs do is of interest to both scholars and practitioners’ alike. Thus the results of this research are important since they focus on nascent behaviour and its outcomes. While venture attributes themselves may be influential this is of little actionable assistance to practitioners. For example it is unhelpful to say to the prospective first time entrepreneur “you’ll be more successful if you have lots of prior experience in firm start-ups”. This research attempts to close this relevance gap by addressing what gestation behaviours might be appropriate, when actions best be focused, and most importantly in what circumstances. Further, we make a contribution to the entrepreneurship literature, examining the role that gestation process dynamics play in outcomes, by specifically attributing these to the nature of the venture itself. This extension is to the best of our knowledge new to the research field.
Resumo:
Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.
Resumo:
An Australian manufacturer has recently developed an innovative group of cold-formed steel hollow flange sections, one of them is LiteSteel Beams (LSBs). The LSB sections are produced from thin and high strength steels by a patented manufacturing process involving simultaneous cold-forming and dual electric resistance welding. They have a unique geometry consisting of rectangular hollow flanges and a relatively slender web. The LSB flexural members are subjected to lateral distortional buckling effects and hence their capacities are reduced for intermediate spans. The current design rules for lateral distortional buckling were developed based on the lower bound of numerical and experimental results. The effect of LSB section geometry was not considered although it could influence the lateral distortional buckling performance. Therefore an accurate finite element model of LSB flexural members was developed and validated using experimental and finite strip analysis results. It was then used to investigate the effect of LSB geometry. The extensive moment capacity data thus developed was used to develop improved design rules for LSBs with one of them considering the LSB geometry effects through a modified slenderness parameter. The use of the new design rules gave higher lateral distortional buckling capacities for LSB sections with intermediate slenderness. The new design rule is also able to accurately predict the lateral distortional buckling moment capacities of other hollow flange beams (HFBs).
Resumo:
Experience plays an important role in building management. “How often will this asset need repair?” or “How much time is this repair going to take?” are types of questions that project and facility managers face daily in planning activities. Failure or success in developing good schedules, budgets and other project management tasks depend on the project manager's ability to obtain reliable information to be able to answer these types of questions. Young practitioners tend to rely on information that is based on regional averages and provided by publishing companies. This is in contrast to experienced project managers who tend to rely heavily on personal experience. Another aspect of building management is that many practitioners are seeking to improve available scheduling algorithms, estimating spreadsheets and other project management tools. Such “micro-scale” levels of research are important in providing the required tools for the project manager's tasks. However, even with such tools, low quality input information will produce inaccurate schedules and budgets as output. Thus, it is also important to have a broad approach to research at a more “macro-scale.” Recent trends show that the Architectural, Engineering, Construction (AEC) industry is experiencing explosive growth in its capabilities to generate and collect data. There is a great deal of valuable knowledge that can be obtained from the appropriate use of this data and therefore the need has arisen to analyse this increasing amount of available data. Data Mining can be applied as a powerful tool to extract relevant and useful information from this sea of data. Knowledge Discovery in Databases (KDD) and Data Mining (DM) are tools that allow identification of valid, useful, and previously unknown patterns so large amounts of project data may be analysed. These technologies combine techniques from machine learning, artificial intelligence, pattern recognition, statistics, databases, and visualization to automatically extract concepts, interrelationships, and patterns of interest from large databases. The project involves the development of a prototype tool to support facility managers, building owners and designers. This final report presents the AIMMTM prototype system and documents how and what data mining techniques can be applied, the results of their application and the benefits gained from the system. The AIMMTM system is capable of searching for useful patterns of knowledge and correlations within the existing building maintenance data to support decision making about future maintenance operations. The application of the AIMMTM prototype system on building models and their maintenance data (supplied by industry partners) utilises various data mining algorithms and the maintenance data is analysed using interactive visual tools. The application of the AIMMTM prototype system to help in improving maintenance management and building life cycle includes: (i) data preparation and cleaning, (ii) integrating meaningful domain attributes, (iii) performing extensive data mining experiments in which visual analysis (using stacked histograms), classification and clustering techniques, associative rule mining algorithm such as “Apriori” and (iv) filtering and refining data mining results, including the potential implications of these results for improving maintenance management. Maintenance data of a variety of asset types were selected for demonstration with the aim of discovering meaningful patterns to assist facility managers in strategic planning and provide a knowledge base to help shape future requirements and design briefing. Utilising the prototype system developed here, positive and interesting results regarding patterns and structures of data have been obtained.
Resumo:
Vendors provide reference process models as consolidated, off-the-shelf solutions to capture best practices in a given industry domain. Customers can then adapt these models to suit their specific requirements. Traditional process flexibility approaches facilitate this operation, but do not fully address it as they do not sufficiently take controlled change guided by vendors' reference models into account. This tension between the customer's freedom of adapting reference models, and the ability to incorporate with relatively low effort vendor-initiated reference model changes, thus needs to be carefully balanced. This paper introduces process extensibility as a new paradigm for customizing reference processes and managing their evolution over time. Process extensibility mandates a clear recognition of the different responsibilities and interests of reference model vendors and consumers, and is concerned with keeping the effort of customer-side reference model adaptations low while allowing sufficient room for model change.
Resumo:
Chronic wounds are a significant socioeconomic problem for governments worldwide. Approximately 15% of people who suffer from diabetes will experience a lower-limb ulcer at some stage of their lives, and 24% of these wounds will ultimately result in amputation of the lower limb. Hyperbaric Oxygen Therapy (HBOT) has been shown to aid the healing of chronic wounds; however, the causal reasons for the improved healing remain unclear and hence current HBOT protocols remain empirical. Here we develop a three-species mathematical model of wound healing that is used to simulate the application of hyperbaric oxygen therapy in the treatment of wounds. Based on our modelling, we predict that intermittent HBOT will assist chronic wound healing while normobaric oxygen is ineffective in treating such wounds. Furthermore, treatment should continue until healing is complete, and HBOT will not stimulate healing under all circumstances, leading us to conclude that finding the right protocol for an individual patient is crucial if HBOT is to be effective. We provide constraints that depend on the model parameters for the range of HBOT protocols that will stimulate healing. More specifically, we predict that patients with a poor arterial supply of oxygen, high consumption of oxygen by the wound tissue, chronically hypoxic wounds, and/or a dysfunctional endothelial cell response to oxygen are at risk of nonresponsiveness to HBOT. The work of this paper can, in some way, highlight which patients are most likely to respond well to HBOT (for example, those with a good arterial supply), and thus has the potential to assist in improving both the success rate and hence the costeffectiveness of this therapy.
Resumo:
This thesis examines the changing relationships between television, politics, audiences and the public sphere. Premised on the notion that mediated politics is now understood “in new ways by new voices” (Jones, 2005: 4), and appropriating what McNair (2003) calls a “chaos theory” of journalism sociology, this thesis explores how two different contemporary Australian political television programs (Sunrise and The Chaser’s War on Everything) are viewed, understood, and used by audiences. In analysing these programs from textual, industry and audience perspectives, this thesis argues that journalism has been largely thought about in overly simplistic binary terms which have failed to reflect the reality of audiences’ news consumption patterns. The findings of this thesis suggest that both ‘soft’ infotainment (Sunrise) and ‘frivolous’ satire (The Chaser’s War on Everything) are used by audiences in intricate ways as sources of political information, and thus these TV programs (and those like them) should be seen as legitimate and valuable forms of public knowledge production. It therefore might be more worthwhile for scholars to think about, research and teach journalism in the plural: as a series of complementary or antagonistic journalisms, rather than as a single coherent entity.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.