979 resultados para Ernest Thompson
Resumo:
This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.
Resumo:
The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the Modbus protocol is vulnerable to flooding attacks. These attacks involve injection of commands that result in disrupting the normal operation of the control system. This paper describes a set of experiments that shows that an anomaly-based change detection algorithm and signature-based Snort threshold module are capable of detecting Modbus flooding attacks. In comparing these intrusion detection techniques, we find that the signature-based detection requires a carefully selected threshold value, and that the anomaly-based change detection algorithm may have a short delay before detecting the attacks depending on the parameters used. In addition, we also generate a network traffic dataset of flooding attacks on the Modbus control system protocol.
Resumo:
For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.
Resumo:
The vast majority of research in the psychology of reproduction and infancy ultimately aims to improve the health and well-being of individuals in meaningful ways. Despite diversity in topics of study, research in our field can support improved planning of health and social services and the development and implementation of policy, practice guidelines and programmes to enhance the experiences of women, men and children. Research published in the current issue demonstrates this practical utility. In this issue of the journal Chin, Hall and Daiches’ meta-synthesis of fathers’ experiences of the transition to parenthood and Bradley and Slade’s review of fathers’ mental health problems following the birth of a child legitimate men’s role in the maternity care system and provide a robust basis for the development of health policies and programmes that can address their needs. Together, their findings highlight the importance of improved tailoring of antenatal education (practical accessibility and content relevance) for fathers, and opportunities for postnatal reflection, debriefing, and support...
Resumo:
This paper focuses on Australian development firms in the console and mobile games industry in order to understand how small firms in a geographically remote and marginal position in the global industry are able to relate to global firms and capture revenue share. This paper shows that, while technological change in the games industry has resulted in the emergence of new industry segments based on transactional rather than relational forms of economic coordination, in which we might therefore expect less asymmetrical power relations, lead firms retain a position of power in the global games entertainment industry relative to remote developers. This has been possible because lead firms in the emerging mobile devices market have developed and sustained bottlenecks in their segment of the industry through platform competition and the development of an intensely competitive ecosystem of developers. Our research shows the critical role of platform competition and bottlenecks in influencing power asymmetries within global markets.
Resumo:
Compromised angiogenesis appears to be a major limitation in various suboptimal bone healing situations. Appropriate mechanical stimuli support blood vessel formation in vivo and improve healing outcomes. However, the mechanisms responsible for this association are unclear. To address this question, the paracrine angiogenic potential of early human fracture haematoma and its responsiveness to mechanical loading, as well as angiogenic growth factors involved, were investigated in vitro. Human haematomas were collected from healthy patients undergoing surgery within 72. h after bone fracture. The haematomas were embedded in a fibrin matrix, and cultured in a bioreactor resembling the in vivo conditions of the early phase of bone healing (20 compression, 1. Hz) over 3. days. Conditioned medium (CM) from the bioreactor was then analyzed. The matrices were also incubated in fresh medium for a further 24. h to evaluate the persistence of the effects. Growth factor (GF) concentrations were measured in the CM by ELISAs. In vitro tube formation assays were conducted on Matrigel with the HMEC-1 cell line, with or without inhibition of vascular endothelial growth factor receptor 2 (VEGFR2). Cell numbers were quantified using an MTS test. In vitro endothelial tube formation was enhanced by CM from haematomas, compared to fibrin controls. The angiogenesis regulators, vascular endothelial growth factor (VEGF) and transforming growth factor β1 (TGF-β1), were released into the haematoma CM, but not angiopoietins 1 or 2 (Ang1, 2), basic fibroblast growth factor (bFGF) or platelet-derived growth factor (PDGF). Mechanical stimulation of haematomas, but not fibrin controls, further increased the induction of tube formation by their CM. The mechanically stimulated haematoma matrices retained their elevated pro-angiogenic capacity for 24. h. The pro-angiogenic effect was cancelled by inhibition of VEGFR2 signalling. VEGF concentrations in CM tended to be elevated by mechanical stimulation; this was significant in haematomas from younger, but not from older patients. Other GFs were not mechanically regulated. In conclusion, the paracrine pro-angiogenic capacity of early human haematomas is enhanced by mechanical stimulation. This effect lasts even after removing the mechanical stimulus and appears to be VEGFR2-dependent.
Resumo:
Background: Health policy, guidelines, and standards advocate giving patients comprehensive information and facilitating their involvement in health-related decision-making. Routine assessment of patient reports of these processes is needed. Our objective was to examine decision-making processes, specifically information provision and consumer involvement in decision-making, for nine pregnancy, labour, and birth procedures, as reported by maternity care consumers in Queensland, Australia. Methods: Participants were women who had a live birth in Queensland in a specified time period and were not found to have had a baby that died since birth, who completed the extended Having a Baby in Queensland Survey, 2010 about their maternity care experiences, and who reported at least one of the nine procedures of interest. For each procedure, women answered two questions that measured perceived (i) receipt of information about the benefits and risks of the procedure and (ii) role in decision-making about the procedure. Results: In all, 3,542 eligible women (34.2%) completed the survey. Between 4% (for pre-labour caesarean section) and 60% (for vaginal examination) of women reported not being informed of the benefits and risks of the procedure they experienced. Between 2% (epidural) and 34% (episiotomy) of women reported being unconsulted in decision-making. Over one quarter (26%) of the women who experienced episiotomy reported being neither informed nor consulted. Conclusions: There is an urgent need for interventions that facilitate information provision and consumer involvement in decision-making about several perinatal procedures, especially those performed within the time-limited intrapartum care episode.
Resumo:
Having a best friend or close friend is closely connected to children’s health and well being in the early years. Having friends safeguards children from social isolation and is associated with academic attainment and social success. In early childhood, children often make friends through play or other shared activities. This chapter investigates friendships and children’s well being in the early years of schooling. Drawing on direct accounts and representations from interviews with young children about friendships, the chapter outlines characteristics of friendship and strategies children use to make friends and manage disputes as they negotiate roles in play and shared spaces. Three key dimensions of friendship are evident in the children’s accounts: friendship is enduring, friendship is mutual and friendship involves an emotional investment. This chapter provides educators with an understanding of the important role that friendships have for happiness and wellbeing in the early years.
Resumo:
Purpose The purpose of this article is to explore the experience of senior leaders who move into the public sector from other sectors of the economy, a process we refer to as inter-sector senior leader transitions. This is a little researched area of public sector leadership yet has significant implications for fundamental public sector reform. Design/methodology/approach We employed an interview design to elicit senior leaders' stories of their transition into the public sector. Findings The data suggest that successful senior leader transitions are more likely when a set of conditions is met; (1) the leader transitions into CEO role, rather than levels below CEO, (2) Ministers provide inter-sector transition support, (3) senior leaders develop responses to stress, (4) senior leaders reject high formalization, (5) their change processes focus on building capacity, and (6) senior leaders confront dysfunctional organizational relationships directly. Research limitations/implications The research relies on a relatively small sample. However, access to senior managers at this level can be difficult. Nevertheless, those senior managers who participated were very willing to share their stories. Practical implications If public sector organizations are to realize the value of successful leaders from other sectors, they need to invest in structured processes that facilitate the transition. A laissez-faire approach is not viable given the cost of such transitions. Originality/value The paper focuses on a little researched area of leadership experience which has significant implications for the development and change of the public sector.
Resumo:
Background The adoption of continuing professional development (CPD) in Australia is still relatively new [expand]. There is limited information on how Australian pharmacists have engaged with the CPD requirements for registration. Aim To explore Australian registered pharmacists’ understanding and engagement with the requirement for CPD credits for registration. Method The Pharmacy Board of Australia’s CPD requirements for registration was used as a guide to design an online survey to ascertain Australian pharmacists understanding and engagement in the acquisition of CPD credits for registration. Results A total of 278 pharmacists responded to the survey – 66% were female and 30% were male (4% did not disclose their gender). 63% of respondents felt that it would not be difficult to acquire 40 CPD credits annually; with pharmacists identifying that Group 1 activities were a preferred way of acquiring CPD credits. The majority of pharmacists (91%) believed that they knew what the current CPD requirements for general registration are and 77% felt that there has been enough guidance provided to assist them. Despite this, 26% of participants had never used self directed learning plans and 38% did not know how to undertake self-directed learning. 76% of participants were under the common misconception that CPD is synonymous with continuing education. Conclusion The majority of registered pharmacists believe they understand and can engage in the acquisition of CPD credits for registration. However, some aspects of the process was not understood. The key link of how this process aims to develop individual practice needs to be further developed within the profession.
Resumo:
The article offers information on the requirement of the continuing professional development (CPD) training and lifelong learning for the legal registration of the Australian practitioners and pharmacists. Topics discussed include reviewing the competitiveness and pharmacy practice benefits, strategic planning for getting the requirement of CPD, and improving and broadening of the knowledge and developing the personal and professional qualities of pharmacists.
Resumo:
David Brown takes a road trip to Canberra for the Roach fixture at the High Court where modernity is attempting a fight-back against the resurrection of civil death. With echoes of Hunter S Thompson as rugby league follower, the author recounts a trip to Canberra to observe a case in which Vickie Lee Roach, an Indigenous woman prisoner, challenged (successfully as it later turns out) the Howard government's 2006 legislation disenfranchising all serving prisoners.
Resumo:
BACKGROUND Experimental and epidemiologic evidence have suggested that chronic inflammation may play a critical role in endometrial carcinogenesis. METHODS To investigate this hypothesis, a two-stage study was carried out to evaluate single-nucleotide polymorphisms (SNP) in inflammatory pathway genes in association with endometrial cancer risk. In stage I, 64 candidate pathway genes were identified and 4,542 directly genotyped or imputed SNPs were analyzed among 832 endometrial cancer cases and 2,049 controls, using data from the Shanghai Endometrial Cancer Genetics Study. Linkage disequilibrium of stage I SNPs significantly associated with endometrial cancer (P < 0.05) indicated that the majority of associations could be linked to one of 24 distinct loci. One SNP from each of the 24 loci was then selected for follow-up genotyping. Of these, 21 SNPs were successfully designed and genotyped in stage II, which consisted of 10 additional studies including 6,604 endometrial cancer cases and 8,511 controls. RESULTS Five of the 21 SNPs had significant allelic odds ratios (ORs) and 95% confidence intervals (CI) as follows: FABP1, 0.92 (0.85-0.99); CXCL3, 1.16 (1.05-1.29); IL6, 1.08 (1.00-1.17); MSR1, 0.90 (0.82-0.98); and MMP9, 0.91 (0.87-0.97). Two of these polymorphisms were independently significant in the replication sample (rs352038 in CXCL3 and rs3918249 in MMP9). The association for the MMP9 polymorphism remained significant after Bonferroni correction and showed a significant association with endometrial cancer in both Asian- and European-ancestry samples. CONCLUSIONS These findings lend support to the hypothesis that genetic polymorphisms in genes involved in the inflammatory pathway may contribute to genetic susceptibility to endometrial cancer. Impact statement: This study adds to the growing evidence that inflammation plays an important role in endometrial carcinogenesis.
Resumo:
A victim of phishing emails could be subjected to money loss and identity theft. This paper investigates the different types of phishing email victims, with the goal of increasing such victims' defences. To obtain this kind of information, an experiment which involves sending a phishing email to participants is conducted. Quantitative and qualitative methods are also used to collect users' information. A model for detecting deception has been employed to understand victims' behaviour. This paper reports the qualitative results. The findings suggest that victims of phishing emails do not always exhibit the same vulnerability. The cause of being a victim is a result of three weaknesses in the detection process: (1) lack of knowledge; (2) weak confirmation channel, and; (3) victims' high propensity towards risk-taking. Therefore, it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishing emails.
Resumo:
A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.