998 resultados para private broadcast encryption


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates the characteristics and attributes that private equity investors prefer when selecting target acquisitions. These characteristics are examined against a matched sample of firms subject to corporate acquisitions via tender/merger offer during 2000-2009, across seven countries: Australia, Canada, the United Kingdom, the USA, France, Germany and Sweden. We show that firm-specific characteristics are more influential in target selection than external or institutional variables. In particular, private equity targets exhibit lower stock volatility and long-term growth prospects, are larger, and have greater abnormal operating income relative to tender/merger offer target firms. Further, private equity bidders exhibit 'home bias', implying that familiarity motivates target selection. Institutional factors remain largely insignificant across all tests.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the compelling case for moving towards cloud computing, the upstream oil & gas industry faces several technical challenges—most notably, a pronounced emphasis on data security, a reliance on extremely large data sets, and significant legacy investments in information technology (IT) infrastructure—that make a full migration to the public cloud difficult at present. Private and hybrid cloud solutions have consequently emerged within the industry to yield as much benefit from cloud-based technologies as possible while working within these constraints. This paper argues, however, that the move to private and hybrid clouds will very likely prove only to be a temporary stepping stone in the industry’s technological evolution. By presenting evidence from other market sectors that have faced similar challenges in their journey to the cloud, we propose that enabling technologies and conditions will probably fall into place in a way that makes the public cloud a far more attractive option for the upstream oil & gas industry in the years ahead. The paper concludes with a discussion about the implications of this projected shift towards the public cloud, and calls for more of the industry’s services to be offered through cloud-based “apps.”

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article focuses on the relationship between private insurance status and dental service utilisation in Australia using data between 1995 and 2001. This article employs joint maximum likelihood to estimate models of time since last dental visit treating private ancillary health insurance (PAHI) as endogenous. The sensitivity of results to the choice between two different but related types of instrumental variables is examined. We find robust evidence in both 1995 and 2001 that individuals with a PAHI policy make significantly more frequent dental consultations relative to those without such coverage. A comparison of the 1995 and 2001 results, however, suggests that there has been an increasing role of PAHI in terms of the frequency of dental consultations over time. This seems intuitive given the trends in the price of unsubsidised private dental consultations. In terms of policy, our results suggest that while government measures to increase private health insurance coverage in Australia has been successful to a significant degree, it may have come at some cost in terms of socio-economic inequality as the privately insured are provided much better access to care and financial protection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper will compare and evaluate the effectiveness of commercial media lobbying and advocacy against public service media in two countries, the United Kingdom and Australia. The paper will focus empirically on the commercial media coverage of public service media issues in these countries (relating to the BBC and ABC respectively) over the period since the election of the Conservative-led Coalition in Britain in June 2010, and the election of the Gillard government in Australia in August 2010. Reference will be made to preceding periods as relevant to an understanding of the current environment. In both countries the main commercial media rival to public service media is News Corp and its associated organisations – News Ltd and Sky News in Australia, and News International and BSkyB in the UK. The paper will examine with analysis of print and online news and commentary content how News Corp outlets have reported and commented on the activities and plans of public service media as the latter have developed and extended their presence on digital TV and online platforms. It will also consider the responses of the ABC and BBC to these interventions. It will consider, thirdly, the responses of Australian and British governments to these debates, and the policy outcomes. This section of the paper will seek to evaluate the trajectory of the policy-public-private dynamic in recent years, and to draw conclusions as to the future direction of policy. Particular attention will be devoted to recent key moments in this unfolding dialogue. In Britain, debates around the efforts of News Corp to take over 100% of BSkyB, both before and after the breaking of the phone-hacking scandal in July 2011; in Australia, the debate around the National Broadband Network and the competitive tender process for ABC World, that country’s public service transnational broadcaster; and other key moments where rivalry between News Corp companies and public service media became mainstream news stories provoking wider public debate. The paper will conclude with recommendations as to how public service media organisations might engage constructively with commercial organisations in the future, including News Corp, and taking into account emerging technological and financial challenges to traditional rationales for public service provision.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the introduction of Medicare in 1984, the proportion of the Australian population with private health insurance has declined considerably. Insurance for health care consumption is compulsory for the public health sector but optional for the private health sector. In this paper, we explore a number of important issues in the demand for private health insurance in Australia. The socio-economic variables which influence demand are examined using a binary logic model. A number of simulations are performed to highlight the influence and relative importance of various characteristics such as age, income, health status and geographical location on demand. A number of important policy issues in the private health insurance market are highlighted. First, evidence is provided of adverse selection in the private health insurance pool, second, the notion of the wealthy uninsured is refuted, and finally it is confirmed that there are significant interstate differences in the demand for private health insurance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates escalation of intra-familial conflicts in family top management teams. Using a Critical Incident Technique approach, this study uses interviews to collect data from 23 family and non-family individuals and groups within six large-scale privately-held family businesses in Indonesia. The study develops a theoretical model to explain why family business conflicts escalate and become destructive. An inductive content analysis found that the use of a dominating strategy by both parties in dealing with conflict, the expression of negative emotions, and the involvement of non-family employees are more likely to cause escalation. This study contributes to the theory of family business conflict to help family business more satisfying and productive.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The term ‘partnership’ is increasingly used by governments, industry, community organisations and schools in supporting their daily businesses. Similar to the terms ‘ICT’ and ‘learning’, ‘partnerships’ are now ubiquitous in policy discourse. Yet, the term remains ill-defined and ambiguous. This study reviews and reflects on a government led industry-school partnership initiative in the state of Queensland, Australia, to understand how the term is used in this initiative. Given the frequent use of Public Private Partnership (PPP) language, PPP was used as a framework to review this initiative. The methodology of this qualitative case study involved consultations with stakeholders and an analysis of Gateway schools documents, policy documents, and literature. The review suggests that despite the use of terminology akin to PPP projects in Gateway school and policy documents, the implicit suggestion that this initiative is a public-private partnership is untenable. The majority of principles shaping a PPP have not been considered to a significant extent in the Gateway project. Although the review recognises the legitimate and sincere purpose of the Gateway schools initiative, the adoption of a PPP framework during the design, monitoring, or evaluation stages could have strengthened the initiative in terms of outcomes, benefits, and sustainability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Volunteering is a very important part of life in Australia with an estimated 36% of the adult population volunteering in 2010. Voluntary work generates economic benefits, addresses community needs and develops the social networks that form the backbone of civil society. Without volunteers, many essential services would either cease to exist or become too expensive for many people to afford. These volunteers, who by definition are not in receipt of any remuneration for their work and services, are exposed to personal injury and to legal liability in the discharge of their functions. It is therefore appropriate that statutory protection is extended to volunteers and that volunteer organisations procure public liability and personal accident cover where possible. However, given the patchwork quilt of circumstances where statutory or institutional cover is available to volunteers and the existence of many and diverse exclusions, it is important to have regard also to what scope a volunteer may have to avail themselves of protection against liability for volunteering activity by relying upon their own personal insurance cover. This article considers the extent of private insurance cover and its availability to volunteers under home and contents insurance and under comprehensive motor vehicle insurance. The most common policies in the Australian market are examined and the uncertain nature of protection against liability afforded by these policies is discussed. This uncertainty could be reduced should the Federal Government through amendments to the Insurance Contracts Regulations standardise the circumstances and extent to which liability protection was afforded to an insured holding home and contents insurance and comprehensive motor vehicle insurance cover.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monitoring foodservice satisfaction is a risk management strategy for malnutrition in the acute care sector, as low satisfaction may be associated with poor intake. This study aimed to investigate the relationship between age and foodservice satisfaction in the private acute care setting. Patient satisfaction was assessed using a validated tool, the Acute Care Hospital Foodservice Patient Satisfaction Questionnaire for data collected 2008–2010 (n = 779) at a private hospital, Brisbane. Age was grouped into three categories; <50 years, 51–70 years and >70 years. Fisher’s exact test assessed independence of categorical responses and age group; ANOVA or Kruskal–Wallis test was used for continuous variables. Dichotomised responses were analysed using logistic regression and odds ratios (95% confidence interval, p < 0.05). Overall foodservice satisfaction (5 point scale) was high (≥4 out of 5) and was independent of age group (p = 0.377). There was an increasing trend with age in mean satisfaction scores for individual dimensions of foodservice; food quality (p < 0.001), meal service quality (p < 0.001), staff service issues (p < 0.001) and physical environment (p < 0.001). A preference for being able to choose different sized meals (59.8% > 70 years vs 40.6% ≤50 years; p < 0.001) and response to ‘the foods are just the right temperature’ (55.3% >70 years vs 35.9% ≤50 years; p < 0.001) was dependent on age. For the food quality dimension, based on dichotomised responses (satisfied or not), the odds of satisfaction was higher for >70 years (OR = 5.0, 95% CI: 1.8–13.8; <50 years referent). These results suggest that dimensions of foodservice satisfaction are associated with age and can assist foodservices to meet varying generational expectations of clients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Property in an elusive concept. In many respects it has been regarded as a source of authority to use, develop and make decisions about whatever is the subject matter of this right of ownership. This is true whether the holder of this right of ownership is a private entity or a public entity. Increasingly a right of ownership of this kind has been recognised not only as a source of authority but also as a mechanism for restricting or limiting and perhaps even prohibiting existing or proposed activities that impact upon the environment. It is increasingly therefore an instrument of regulation as much as an instrument of authorisation. The protection and conservation of the environment are ultimately a matter of the public interest. This is not to suggest that the individual holders of rights of ownership are not interested in protecting the environment. It is open to them to do so in the exercise of a right of ownership as a source of authorisation. However a right of ownership – whether private or public – has become increasingly the mechanism according to which the environment is protected and conserved through the use of rights of ownership as a means of regulation. This paper addressed these issues from a doctrinal as well as a practical perspective in how the environment is managed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the construction industry, contractors have to improve the efficiency of markup decision-making to survive from fierce business competition. The effect of client type on markup decision has been aware in previous studies and contractors are advocated to take account of decision factors properly when they are confronted with different types of projects. Nevertheless, the rationales behind the inclusion of different factors in markup decision-making for different projects sustain unknown. In this study, fifty-three factors were identified after extensive literature review and interviews with professionals. The identified factors were afterwards grouped under the headings of nine attributes and compiled in a questionnaire for survey in China. Using the Hotelling’s T-square test, it is found that three attributes (i.e., project characteristic, client characteristic, and macro condition) can explain the effect of client type on contractors’ markup decision. The research findings provide useful insights into the cognition of bid pricing as well as the improvement of bidding efficiency. While the research works were situated in China, contractors in other countries could benefit from the research findings in a similar vein.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Admission to practice law in Australia falls under the general supervisory power of supreme court judges in the various jurisdictions. The degree of supervision varies among jurisdictions, but the judiciary generally is responsible for setting the educational requirements for admission. A variety of admission boards perform a number of administrative and supervisory functions; for example, determining whether a particular law school's degree satisfies educational requirements for admission...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.