956 resultados para Content Authentication
Resumo:
This article outlines the key recommendations of the Australian Law Reform Commission’s review of the National Classification Scheme, as outlined in its report Classification – Content Regulation and Convergent Media (ALRC, 2012). It identifies key contextual factors that underpin the need for reform of media classification laws and policies, including the fragmentation of regulatory responsibilities and the convergence of media platforms, content and services, as well as discussing the ALRC’s approach to law reform.
Resumo:
The addition of lime into soils has been widely used to stabilize the expansive sub-grade soils when the road pavements are constructed on them. It is common practice to apply a half of the required lime amount and allow a certain time period for lime to react with soils (Amelioration period) before applying the rest of lime and compacting the sub-grade. The optimum amelioration period is essential to minimize the construction delay and to gain the higher strength. In this study, two different expansive soils procured from two different locations in the state of Queensland in Australia were first mixed with different lime contents. A soil mixed with a particular lime content was compacted at different amelioration periods (e.g.: 0, 6, 12, 18, 24 hrs) to obtain soil samples to measure the Unconfined Compressive Strength (UCS). The results suggested that for a given amelioration period, UCS increased with the increase in lime content. The optimum amelioration period could be within 14~17 hours for most of the lime contents in tested soils. This could suggest that the current 24-48 hour amelioration period specified by the Queensland Department of Transport and Main roads could be reduced.
Resumo:
Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session.
Resumo:
The aim of the Hearts and Minds Project: A curriculum intervention (2005-2010) was to determine the effectiveness of curriculum interventions relating to breastfeeding introduced into a four year dietetic course based at Queensland University of Technology (QUT), Queensland, Australia. This five year project included interventions based on a needs assessment in 2005 that identified deficits in breastfeeding knowledge of students, concerns regarding their attitudes and beliefs, and little interest in working in an area that involves breastfeeding in the future. The interventions sought to address these issues and to equip students to support and promote breastfeeding in their role as health professionals in the future. The project was developed in partnership between QUT and the Nutrition Promotion Unit, Metro South Health Service District (Queensland Health) with support from the South East Queensland Breastfeeding Coalition.
Resumo:
This paper examines the history of the IRGEE Journal in terms of its sustainable future. The development of geographical and environmental education is evaluated, as reflected from the articles published in the Journal “International Research in Geographical and Environmental Education” (IRGEE). A content analysis of all papers and forum sections which have appeared in the journal since Volume 1 Number 1 was published in 1992 has been conducted, examining the content of as many as 526 articles. The method was a content analysis, and revealed themes which have experienced an increasing or declining interest over the 18 years of publication of IRGEE (1992-2009), while other themes have remained current during this period. The main findings of this analysis are: a) the total number of articles has increased more than threefold, b) articles related to geographical education (sensu stricto) outweighed those related to environmental education, c) the themes “syllabi, textbooks, curricula” and “values, attitudes” attract the attention of researchers with increasing strength and d) emerging subjects, such as GIS and sustainability have appeared dynamically in the last years.
Resumo:
This proposal combines ethnographic techniques and discourse studies to investigating a collective of people engaged with audiovisual productions who collaborate in Curta Favela’s workshops in Rio de Janeiro’s favelas. ‘Favela’ is often translated simply as ‘slum’ or ‘shantytown’, but these terms connote negative characteristics such as shortage, poverty, and deprivation referring to favelas which end up stigmatizing these low income suburbs. Curta Favela (Favela Shorts) is an independent project which all participants join to use photography and participatory audiovisual production as a tool for social change and raising consciousness. As cameras are not affordable for favelas dwellers, Curta Favela’s volunteers teach favela residents how they can use their mobile phones and compact cameras to take pictures and make movies, and afterwards, how they can edit the data using free editing video software programs and publish it on the Internet. To record audio, they use their mp3 or mobile phones. The main aim of this study is to shed light not only on how this project operates, but also to highlight how collective intelligence can be used as a way of fighting against the lack of basic resources.
Resumo:
This proposal combines ethnographic techniques and discourse studies to investigate a collective of people engaged with audiovisual productions who collaborate in Curta Favela’s workshops in Rio de Janeiro’s favelas. ‘Favela’ is often translated simply as ‘slum’ or ‘shantytown’, but these terms connote negative characteristics such as shortage, poverty, and deprivation which end up stigmatizing these low income suburbs. Curta Favela (Favela Shorts) is an independent project in which all participants join to use photography and participatory audiovisual production as tools for social change and to raise consciousness. As cameras are not affordable for favela dwellers, Curta Favela’s volunteers teach favela residents how they can use their mobile phones and compact cameras to take pictures and make movies, and afterwards, how they can edit the data using free editing video software programs and publish it on the Internet. To record audio, they use their mp3 or mobile phones. The main aim of this study is to shed light not only on how this project operates, but also to highlight how collective intelligence can be used as a way of fighting against a lack of basic resources.
Resumo:
The official need for content teachers to teach the language features of their fields has never been greater in Australia than now. In 2012, the recently formed national curriculum board announced that all teachers are responsible for the English language development of students whose first language or dialect is not Standard Australian English (SAE). This formal endorsement is an important juncture regarding the way expertise might be developed, perceived and exchanged between content and language teachers through collaboration, in order for the goals of English language learners in content areas to be realised. To that end, we conducted an action research project to explore and extend the reading strategies pedagogy of one English language teacher who teaches English language learners in a parallel junior high school Geography program. Such pedagogy will be valuable for all teachers as they seek to contribute to English language development goals as outlined in national curricula.
Resumo:
What are the information practices of teen content creators? In the United States over two thirds of teens have participated in creating and sharing content in online communities that are developed for the purpose of allowing users to be producers of content. This study investigates how teens participating in digital participatory communities find and use information as well as how they experience the information. From this investigation emerged a model of their information practices while creating and sharing content such as film-making, visual art work, story telling, music, programming, and web site design in digital participatory communities. The research uses grounded theory methodology in a social constructionist framework to investigate the research problem: what are the information practices of teen content creators? Data was gathered through semi-structured interviews and observation of teen’s digital communities. Analysis occurred concurrently with data collection, and the principle of constant comparison was applied in analysis. As findings were constructed from the data, additional data was collected until a substantive theory was constructed and no new information emerged from data collection. The theory that was constructed from the data describes five information practices of teen content creators. The five information practices are learning community, negotiating aesthetic, negotiating control, negotiating capacity, and representing knowledge. In describing the five information practices there are three necessary descriptive components, the community of practice, the experiences of information and the information actions. The experiences of information include information as participation, inspiration, collaboration, process, and artifact. Information actions include activities that occur in the categories of gathering, thinking and creating. The experiences of information and information actions intersect in the information practices, which are situated within the specific community of practice, such as a digital participatory community. Finally, the information practices interact and build upon one another and this is represented in a graphic model and explanation.
Resumo:
This report presents the top-line findings of the Australian Screen Producer survey conducted in December 2011. The report was prepared by Bergent Research and commissioned by the ARC Centre of Excellence for Creative Industries and Innovation (CCI), Queensland University of Technology, with assistance from the Centre for Screen Business, Australian Film Television and Radio School (AFTRS). The 2011 producer survey was a national study of the demographics, motivations, sentiments and activities of screen producers across four industry segments: Film, Television, Commercial and Digital Media. This survey is the second Australian Screen Producer survey and builds upon research undertaken in the Australian Screen Content Producer Survey conducted in 2009. The 2011 study is referred to in this report as Wave 2 and the 2009 study is referred to as Wave 1.
Resumo:
We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.
Resumo:
Security of RFID authentication protocols has received considerable interest recently. However, an important aspect of such protocols that has not received as much attention is the efficiency of their communication. In this paper we investigate the efficiency benefits of pre-computation for time-constrained applications in small to medium RFID networks. We also outline a protocol utilizing this mechanism in order to demonstrate the benefits and drawbacks of using thisapproach. The proposed protocol shows promising results as it is able to offer the security of untraceableprotocols whilst only requiring the time comparable to that of more efficient but traceable protocols.
Resumo:
We introduce a lightweight biometric solution for user authentication over networks using online handwritten signatures. The algorithm proposed is based on a modified Hausdorff distance and has favorable characteristics such as low computational cost and minimal training requirements. Furthermore, we investigate an information theoretic model for capacity and performance analysis for biometric authentication which brings additional theoretical insights to the problem. A fully functional proof-of-concept prototype that relies on commonly available off-the-shelf hardware is developed as a client-server system that supports Web services. Initial experimental results show that the algorithm performs well despite its low computational requirements and is resilient against over-the-shoulder attacks.
Resumo:
Informal learning networks play a key role in the skill and professional development of professionals working in micro-businesses within Australia’s digital content industry as they do not necessarily have access to a learning and development or a human resources section that can assist in mapping their learning pathway. Professionals working in this environment would typically adopt an informal learning approach to their skill and professional development by utilising their social and business networks. The overall aim of this PhD research project is to study how these professionals manage their skill and professional development, and to explore what role informal learning networks play in this professional learning context. This paper will describe the theme of the research project and how it fits with previous research and other relevant studies. Secondly, it will present the study’s research focus, and the research questions. It will also present relevant theories and perspectives, and the methods for empirical data collection. Data collection will be through three distinct phases using a mixed methods research design: an online survey, interviews, and case studies. It should be noted the findings presented in this paper offer some early results of the research project.