973 resultados para Personal Security.
Resumo:
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.
Resumo:
Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web-based applications, such as Google Maps, is ensuring that mapping based applications are becoming commonplace amongst Internet users which has facilitated the rapid growth of geo-mashups. These user generated creations enable Internet users to aggregate and publish information over specific geographical points. This article identifies privacy invasive geo-mashups that involve the unauthorized use of personal information, the inadvertent disclosure of personal information and invasion of privacy issues. Building on Zittrain’s Privacy 2.0, the author contends that first generation information privacy laws, founded on the notions of fair information practices or information privacy principles, may have a limited impact regarding the resolution of privacy problems arising from privacy invasive geo-mashups. Principally because geo-mashups have different patterns of personal information provision, collection, storage and use that reflect fundamental changes in the Web 2.0 environment. The author concludes by recommending embedded technical and social solutions to minimize the risks arising from privacy invasive geo-mashups that could lead to the establishment of guidelines for the general protection of privacy in geo-mashups.
Resumo:
We surveyed 506 Australian high school students on career development (exploration, planning, job-knowledge, decision-making, indecision), personal functioning (well-being, self-esteem, life satisfaction, school satisfaction) and control variables (parents’ education, school achievement), and tested differences among work-bound, college-bound and university-bound students. The work-bound students had the poorest career development and personal functioning, the university-bound students the highest, with the college-bound students falling in-between the other two groups. Work-bound students did poorest, even after controlling for parental education and school achievement. The results suggest a relationship between career development and personal functioning in high school students.
Resumo:
The rapid uptake of mobile devices has created the capacity to provide services to consumers while they are on the move, and new mobile services (m-services) are constantly emerging. In past research, personal attributes have been found to be import ant in the adoption and use of information and communication technology. However, little research has been conducted in the area of m-services. To explore factors influencing the use of these services, this paper examines personal attributes in terms of motivational, attitudinal and demographic characteristics. Specifically, it investigates the influence of innovativeness, self- efficacy, involvement and impulsiveness, as well as age and gender on m-services use . Data were collected from a convenience sample of 250 respondents using an online survey and a modified snowball procedure. Age and gender were quite well balanced in the sample. The multiple regression model was significant and the hypotheses relating to the positive relationship between impulsiveness, involvement and gender and m-services were supported. Findings are discussed, further implications for managers are suggested and directions for future research are proposed.
Resumo:
The Queensland Department of Public Works (QDPW) and the Queensland Department of Main Roads (QDMR) have identified a need for industry e-contracting guidelines in the short to medium term. Each of these organisations conducts tenders and contracts for over $600 million annually. This report considers the security and legal issues relating to the shift from a paper-based tendering system to an electronic tendering system. The research objectives derived from the industry partners include: • a review of current standards and e-tendering systems; • a summary of legal requirements impacting upon e-tendering; • an analysis of the threats and requirements for any e-tendering system; • the identification of outstanding issues; • an evaluation of possible e-tendering architectures; • recommendations for e-tendering systems.
Resumo:
Resolving insurance disputes can focus only on quantum. Where insurers adopt integrative solutions they can enjoy cost savings and higher customer satisfaction. An integratively managed process can expand the negotiation options. The potential inherent in plaintiff’s emotions to resolve matters on an emotional basis, rather than an economic one, is explored. Using research, the author demonstrates how mediations are more likely to obtain integrative outcomes than unmediated conferences. Using a combination of governmental reports, published studies and academic publications, the paper demonstrates how mediation is more likely to foster an environment where the parties communicate and cooperate. Research is employed to demonstrate where mediators can reduce hostilities, in circumstances where negotiating parties alone would likely fail. Generally the paper constructs an argument to support the proposition that mediation can offer insurers an effective mechanism to reduce costs and increase customer satisfaction. INTRODUCTION Mediation can offer insurers an effective mechanism to reduce costs and increase customer satisfaction. This paper will first demonstrate the differences between distributive and integrative outcomes. It is argued insurer’s interest can be far better served through obtaining an integrative solution. The paper explains how the mediator can assist both parties to obtain an integrative outcome. Simultaneously the paper explores the extreme difficulties conference participants face in obtaining an integrative outcome without a mediator in an adversarial climate. The mediator’s ability to assist in the facilitation of integrative information exchange, defuse hostilities and reality check expectations is discussed. The mediator’s ability to facilitate in this area is compared to the inability of conference participants to achieve similar results. This paper concludes, the potential financial benefit offered by integrative solutions, combined with the ability of mediation to deliver such outcomes where unmediated conferences cannot deliver, leads to the recommendation that insurers opt for a mediation to best serve their commercial interests.
Resumo:
Manual calibration of large and dynamic networks of cameras is labour intensive and time consuming. This is a strong motivator for the development of automatic calibration methods. Automatic calibration relies on the ability to find correspondences between multiple views of the same scene. If the cameras are sparsely placed, this can be a very difficult task. This PhD project focuses on the further development of uncalibrated wide baseline matching techniques.
Resumo:
Security-critical communications devices must be evaluated to the highest possible standards before they can be deployed. This process includes tracing potential information flow through the device's electronic circuitry, for each of the device's operating modes. Increasingly, however, security functionality is being entrusted to embedded software running on microprocessors within such devices, so new strategies are needed for integrating information flow analyses of embedded program code with hardware analyses. Here we show how standard compiler principles can augment high-integrity security evaluations to allow seamless tracing of information flow through both the hardware and software of embedded systems. This is done by unifying input/output statements in embedded program execution paths with the hardware pins they access, and by associating significant software states with corresponding operating modes of the surrounding electronic circuitry.
Resumo:
We present a new penalty-based genetic algorithm for the multi-source and multi-sink minimum vertex cut problem, and illustrate the algorithm’s usefulness with two real-world applications. It is proved in this paper that the genetic algorithm always produces a feasible solution by exploiting some domain-specific knowledge. The genetic algorithm has been implemented on the example applications and evaluated to show how well it scales as the problem size increases.