303 resultados para signing


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Australia, there is only one, newly established, dedicated mental health service catering specifically for the signing *Deaf community. It is staffed by four part-time hearing professionals and based in Brisbane. There are currently no Deaf psychologists or psychiatrists and there is no valid or reliable empirical evidence on outcomes for Deaf people accessing specialised or mainstream mental health services. Further compounding these issues, is the fact that there are no sign language versions of the most common standardised mental health or psychological instruments available to clinicians in Australia. Contemporary counselling literature is acknowledging the role of the therapeutic alliance and the impact of 'common factors' on therapeutic outcomes. However, these issues are complicated by the relationship between the Deaf client and the hearing therapist being a cross-cultural exchange. The disability model of deafness is contentious and few professionals in Australia have the requisite knowledge and understanding of deafness from a cultural perspective to attend to the therapeutic relationship with this in mind. Consequently, Deaf people are severely disadvantaged by the current lack of services, resources and skilled professionals in the field of deafness and psychology in this country. The primary aim of the following program of research has been to propose a model for culturally affirmative service delivery and to provide clinicians with tools to evaluate the effect of their therapeutic work with Deaf people seeking mental health treatment. The research document is presented as a thesis by publication and comprises four specific objectives formulated in response to the lack of existing services and resources. The first objective was to explore the use of social constructionist counselling techniques and a reflecting team with Deaf clients, hearing therapists and an interpreter. Following the establishment of a pilot counselling clinic, indepth semi-structured interviews were conducted with two long-term clients following the one year pilot of this service. These interviews generated recommendations for the development of a new 'enriched' model of counselling to be implemented and evaluated in later stages of the research program. The second objective was to identify appropriate psychometric measures that could be translated into Australian Sign Language (Auslan) for research into efficacy, effectiveness and counselling outcomes. Two instruments were identified as potentially suitable; the Outcome Rating Scale (ORS), a measure of global functioning, and the Session Rating Scale (SRS), a measure of therapeutic alliance. A specialised team of bi-lingual and bi-cultural interpreters, native signers and the primary researcher for this thesis, produced the ORS-Auslan and the SRS-Auslan in DVD format, using the translation and back-translation process. The third objective was to establish the validity and reliability of these new Auslan measures based on normative data from the Deaf community. Data from the ORS-Auslan was collected from one clinical and one non-clinical sample of Deaf people. Statistical analyses revealed that the ORS-Auslan is reliable, valid and adequately distinguishes between clinical and non-clinical presentations. Furthermore, construct validity has been established using a yet to be validated sign language version of the Depression, Anxiety and Stress Scale-21 items (DASS-21), providing a platform for further research using the DASS-21 with Deaf people. The fourth objective was to evaluate counselling outcomes following the implementation of an enriched counselling service, based on the findings generated by the first objective, and using the newly translated Auslan measures. A second university counselling clinic was established and implemented over the course of one year. Practice-based evidence guided the research and the ORS-Auslan and the SRS-Auslan were administered at every session and provided outcome data on Deaf clients' global functioning. Data from six clients over the course of ten months indicated that this culturally affirmative model was an effective approach for these six clients. This is the first time that outcome data have been collected in Australia using valid and reliable Auslan measures to establish preliminary evidence for the effectiveness of any therapeutic intervention for clinical work with adult, signing Deaf clients. The research generated by this thesis contributes theoretical knowledge, professional development and practical resources that can be used by a variety of mental health clinicians in the context of mental health service delivery to Deaf clients in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sustainability is an issue for everyone. For instance, the higher education sector is being asked to take an active part in creating a sustainable future, due to their moral responsibility, social obligation, and their own need to adapt to the changing higher education environment. By either signing declarations or making public statements, many universities are expressing their desire to become role models for enhancing sustainability. However, too often they have not delivered as much as they had intended. This is particularly evident in the lack of physical implementation of sustainable practices in the campus environment. Real projects such as green technologies on campus have the potential to rectify the problem in addition to improving building performance. Despite being relatively recent innovations, Green Roof and Living Wall have been widely recognized because of their substantial benefits, such as runoff water reduction, noise insulation, and the promotion of biodiversity. While they can be found in commercial and residential buildings, they only appear infrequently on campuses as universities have been very slow to implement sustainability innovations. There has been very little research examining the fundamental problems from the organizational perspective. To address this deficiency, the researchers designed and carried out 24 semi-structured interviews to investigate the general organizational environment of Australian universities with the intention to identify organizational obstacles to the delivery of Green Roof and Living Wall projects. This research revealed that the organizational environment of Australian universities still has a lot of room to be improved in order to accommodate sustainability practices. Some of the main organizational barriers to the adoption of sustainable innovations were identified including lack of awareness and knowledge, the absence of strong supportive leadership, a weak sustainability-rooted culture and several management challenges. This led to the development of a set of strategies to help optimize the organizational environment for the purpose of better decision making for Green Roof and Living Wall implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A range of risk management initiatives have been introduced in organisations in attempt to reduce occupational road incidents. However a discrepancy exists between the initiatives that are frequently implemented in organisations and the initiatives that have demonstrated scientific merit in improving occupational road safety. Given that employees’ beliefs may facilitate or act as a barrier to implementing initiatives, it is important to understand whether initiatives with scientific merit are perceived to be effective by employees. To explore employee perceptions pertaining to occupational road safety initiatives, a questionnaire was administered to 679 employees sourced from four Australian organisations. Participants ranged in age from 18 years to 65 years (M = 42, SD = 11). Participants rated 35 initiatives based on how effective they thought they would be in improving road safety in their organisation. The initiatives perceived by employees to be most effective in managing occupational road risks comprised: making vehicle safety features standard e.g. passenger airbags; practical driver skills training; and investigation of serious vehicle incidents. The initiatives perceived to be least effective in managing occupational road risks comprised: signing a promise card commitment to drive safely; advertising the organisation’s phone number on vehicles for complaints and compliments; and consideration of driving competency in staff selection process. Employee perceptions were analysed at a factor level and at an initiative level. The mean scores for the three extracted factors revealed that employees believed occupational road risks could best be managed by the employer implementing engineering and human resource methods to enhance road safety. Initiatives relating to employer management of identified risk factors were perceived to be more effective than feedback or motivational methods that required employees to accept responsibility for their driving safety. Practitioners can use the findings from this study to make informed decisions about how they select, manage and market occupational safety initiatives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To protect the health information security, cryptography plays an important role to establish confidentiality, authentication, integrity and non-repudiation. Keys used for encryption/decryption and digital signing must be managed in a safe, secure, effective and efficient fashion. The certificate-based Public Key Infrastructure (PKI) scheme may seem to be a common way to support information security; however, so far, there is still a lack of successful large-scale certificate-based PKI deployment in the world. In addressing the limitations of the certificate-based PKI scheme, this paper proposes a non-certificate-based key management scheme for a national e-health implementation. The proposed scheme eliminates certificate management and complex certificate validation procedures while still maintaining security. It is also believed that this study will create a new dimension to the provision of security for the protection of health information in a national e-health environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most of them still target Symbian OS. In the case of Symbian OS, application signing seemed to be an appropriate measure for slowing down malware appearance. Unfortunately, latest examples showed that signing can be bypassed resulting in new malware outbreak. In this paper, we present a novel approach to static malware detection in resource-limited mobile environments. This approach can be used to extend currently used third-party application signing mechanisms for increasing malware detection capabilities. In our work, we extract function calls from binaries in order to apply our clustering mechanism, called centroid. This method is capable of detecting unknown malwares. Our results are promising where the employed mechanism might find application at distribution channels, like online application stores. Additionally, it seems suitable for directly being used on smartphones for (pre-)checking installed applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a mandatory application signing mechanism for Symbian OS in 2006. From this point on, only few news could be read on this topic. Even despite of new emerging smartphone platforms, e.g. android and iPhone, malware writers seemed to lose interest in writing malware for smartphones giving users an unappropriate feeling of safety. In this paper, we revisit smartphone malware evolution for completing the appearance list until end of 2008. For contributing to smartphone malware research, we continue this list by adding descriptions on possible techniques for creating the first malware(s) for Android platform. Our approach involves usage of undocumented Android functions enabling us to execute native Linux application even on retail Android devices. This can be exploited to create malicious Linux applications and daemons using various methods to attack a device. In this manner, we also show that it is possible to bypass the Android permission system by using native Linux applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The term post-war violence has been with us for much of the twentieth century but the issue itself has existed for centuries. The study of violence in post-war societies has been explored by philosophers (Erasmus), statesmen (Sir Thomas More) and sociologists (Emile Durkheim). In many cases the cessation of war and the signing of peace accords do not always mean an end to the violence. This book examines in considerable detail the causes and purposes of post-conflict violence and argues that features which constrain or encourage violence accumulate in such a manner as to create distinct and different types of post-war environments...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sustainability is becoming a guiding paradigm to industries, businesses and our societies. Higher education institutions have the potential to take an active part in creating a sustainable future, due to their moral responsibility, social obligation, and their own needs to adapt to new circumstances. By either signing declarations or making public statements, many universities in Australia have expressed their desires to become role models for enhancing sustainability. However, universities in general have been slow to implement sustainability innovations, sometimes even lagging behind private sectors. Accordingly, there is pressing need to promote innovations on campus in order to drive universities’ sustainability goals. Existing seminal literature tend to focus on technological issues. There has been very little research examining the fundamental problems from an organizational perspective. To address the deficiency, the authors designed and carried out 24 semi-structured interviews to investigate the general organizational environment of Australian universities and to identify organizational resistance to sustainability innovations. Based on the data analysis, a set of strategies to reduce or overcome organizational resistance are explored and developed. The expected outcome of this research is to develop a genetic framework to facilitate supportive decision making for promoting sustainability innovations on campus, as a vital step towards achieving sustainability in universities on a practical level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many important cryptographic problems, and at the same time offer substantial efficiency advantage over ordinary digital signature schemes like RSA. Multiple-time signature schemes have found numerous applications, in ordinary, on-line/off-line, forward-secure signatures, and multicast/stream authentication. We propose a multiple-time signature scheme with very efficient signing and verifying. Our construction is based on a combination of one-way functions and cover-free families, and it is secure against the adaptive chosen-message attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The primary motivation for signcryption was the gain in efficiency when both encryption and signing need to be performed. These two cryptographic operations may be done sequentially either by first encrypt and then sign (EtS) or alternatively, by first sign and then encrypt (StE). Further gains in efficiency can be achieved if encryption and signature are carried out in parallel (E&S). More importantly, however, is that these efficiency gains are complemented by gains in security, i.e., we may use relative weak encryption and signature schemes in order to obtain a “stronger” signcryption scheme. The reader is referred to Chaps. 2 and 3 for a discussion of the different “strengths” of security model (e.g., outsider vs. insider adversaries, two-user vs. multi-user setting).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Medics “Foundations” is a full-length album of popular music completed over a 13-month period and released in 2012, with work taking place in Byron Bay’s 301 studios and Brisbane’s Airlock studios. “Foundations” contributes to studies in the field of music production, as well as furthering research into the place of Indigenous youth culture within contemporary rock music. The music draws on elements of folk, post rock and hardcore to create a dynamic and cinematic sound, framed by lyrics that focus on spirituality, nature and a connection to the land. Artists such as At the Drive In and Mars Volta were referenced in the production of the record. Scholars such as Joe Bennett have argued that the relationship between songwriting practice and song product is an under-explored area in popular musicology, and, by using a practice-led research methodology, the production of “Foundations” extends these creative inquiries. “Foundations” was produced with the assistance of a competitive grant, the Cultural Minister’s Council Breakthrough initiative, which assists emerging Indigenous contemporary musicians. The album was well received and positively reviewed, resulting in the band signing a record deal with Warner Music and a publishing deal with Albert’s Music. It was album of the week on Triple J and several singles were placed on high rotation. A review on Themusic.com.au highlighted the production work: “Producer Yanto Browning has captured the impassioned live intent the band have built their reputation on and bottled it into 11 impeccable tracks, the album maintaining their onstage vigour while polishing it just enough to allow it to burn brightly through the speakers.” As a result of the record, The Medics were invited to play Splendour in the Grass, the national Big Day Out tour and a series of shows in South America.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One-time proxy signatures are one-time signatures for which a primary signer can delegate his or her signing capability to a proxy signer. In this work we propose two one-time proxy signature schemes with different security properties. Unlike other existing one-time proxy signatures that are constructed from public key cryptography, our proposed schemes are based one-way functions without trapdoors and so they inherit the communication and computation efficiency from the traditional one-time signatures. Although from a verifier point of view, signatures generated by the proxy are indistinguishable from those created by the primary signer, a trusted authority can be equipped with an algorithm that allows the authority to settle disputes between the signers. In our constructions, we use a combination of one-time signatures, oblivious transfer protocols and certain combinatorial objects. We characterise these new combinatorial objects and present constructions for them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.