996 resultados para Engineering law


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Community-based protests against major construction and engineering projects are becoming increasingly common as concerns over issues such as corporate social accountability, climate change and corruption become more prominent in the public's mind. Public perceptions of risk associated with these projects can have a contagious effect, which mismanaged can escalate into long-term and sometimes acrimonious protest stand-offs that have negative implications for the community, firms involved and the construction industry as a whole. This paper investigates the role of core group members in sustaining community-based protest against construction and engineering projects. Using a thematic story telling approach which draws on ethnographic method and social contagion theories, it presents an in-depth analysis of a single case study - one of Australia's longest standing community protests against a construction project. It concludes that core group members play a critical role, within anarchic structures which provide a high degree of spontaneity and improvisation, in sustaining movement continuity by building collective identity, mobilising resources and a moving interface which developers find hard to communicate with.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article describes the first steps toward comprehensive characterization of molecular transport within scaffolds for tissue engineering. The scaffolds were fabricated using a novel melt electrospinning technique capable of constructing 3D lattices of layered polymer fibers with well - defined internal microarchitectures. The general morphology and structure order was then determined using T 2 - weighted magnetic resonance imaging and X - ray microcomputed tomography. Diffusion tensor microimaging was used to measure the time - dependent diffusivity and diffusion anisotropy within the scaffolds. The measured diffusion tensors were anisotropic and consistent with the cross - hatched geometry of the scaffolds: diffusion was least restricted in the direction perpendicular to the fiber layers. The results demonstrate that the cross - hatched scaffold structure preferentially promotes molecular transport vertically through the layers ( z - axis), with more restricted diffusion in the directions of the fiber layers ( x – y plane). Diffusivity in the x – y plane was observed to be invariant to the fiber thickness. The characteristic pore size of the fiber scaffolds can be probed by sampling the diffusion tensor at multiple diffusion times. Prospective application of diffusion tensor imaging for the real - time monitoring of tissue maturation and nutrient transport pathways within tissue engineering scaffolds is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 1951 Convention Relating to the Status of Refugees and the 1967 Protocol Relating to the Status of Refugees are the two primary international legal instruments that states use to process asylum seekers' claim to refugee status. However, in Southeast Asia only two states have acceded to these instruments. This is seemingly paradoxical for a region that has been host to a large number of asylum seekers who, as a result, are forced to live as ‘illegal migrants’. This book examines the region's continued rejection of international refugee law through extensive archival analysis and argues that this rejection was shaped by the region’s response to its largest refugee crisis in the post-1945 era: the Indochinese refugee crisis from 1975 to 1996. The result is a seminal study into Southeast Asian's relationship with international refugee law and the impact that this has had on states surrounding the region, the UNHCR and the asylum seekers themselves.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this Letter a hydrodynamic theory of liquid slippage on a solid substrate near a moving contact line is proposed. A family of spatially varying slip lengths in the Navier slip law recovers the results of past formulations for slip in continuum theories and molecular dynamics simulations and is consistent with well-established experimental observations of complete wetting. This formulation gives a general approach for continuum hydrodynamic theories. New fluid flow behaviors are also predicted yet to be seen in experiment. © 2013 American Physical Society.