917 resultados para Not-for-Profit
Resumo:
It is apparent that IT resources are important for organisations. It is also clear that organisations unique competencies, their IT-related capabilities, leverage the IT resources uniquely to create and sustain competitive advantage. However, IT resources are dynamic, and evolve at an exponential rate. This means that organisations will need to sustain their competencies to leverage opportunities offered by new IT resources. Research on ways to sustain IT-related capabilities is limited and a deeper understanding of this situation is important. Amongst other factors, a possible reason for this lack of progress in this area could be due to the lack of validated measurement items of the theoretical constructs to conduct such studies. We suggest an environment in which organisations could build new and sustain their existing IT-related capabilities. We then report on the development of valid and reliable measures for this environment. The validated measures would be useful in extending our understanding on how firms could sustain their IT-related capabilities. This effort will provide a deeper understanding of how firms can secure sustainable IT-related business value from their acquired IT resources.
Resumo:
The purpose of this study is to identify the extent to which NFP organisations disclose information on volunteer contributions of services. Design/methodology/approach – The study relies on information disclosed in the websites of NFP organisations. Findings - We find that disclosure was more prevalent on NFP websites compared to digital annual report disclosures. We find that more NFPs provided disclosure on the activities of their volunteers than other items pertaining to volunteers and the quantification and valuation of volunteer contributions were the least likely to be disclosed. Importantly, the findings illustrate an accountability deficiency in the comprehensiveness of disclosure which results in an under-representation of the contribution volunteers provide to organisational sustainability and impact on mission fulfilment. Research limitations/implications – The convenience sample size restricts further interrogation to tease out organisational characteristics that may influence current disclosure practices. Practical implications - The findings contribute to international debate over the inclusion of volunteer contributions in the assessment of a NFP’s accountability over its resources and ultimately the enhancement of its sustainability.
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
Previous research has questioned the role of altruism in charitable donation and suggests that such behaviour is also motivated by self-interest, such as public recognition or emotional satisfaction. Recognising this, not-for-profit organisations have developed strategies that allow individuals to donate conspicuously, and are at an embryonic stage of turning to social media to provide such recognition. Under investigation in this paper, is the relationship between conspicuous donation behaviour (CDB) on social media and customer value, in blood donation. Online survey results, from a sample of 186 Australian blood donors, support the proposed framework. Significant relationships between self-orientated CDB and emotional value, and other-orientated CDB and social value are demonstrated. The findings provide valuable insights into the use of conspicuous donation strategies on social media as a means to add value to the donation experience, and contribute to our understanding into the under-researched areas of CDB and customer value.
Resumo:
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.
Resumo:
Retired business professionals represent an unexplored source of skill support for struggling rural communities. This research examined the feasibility of drawing on this valuable pool of knowledge and experience by engaging retirees in short term, project based volunteering roles in rural, not for profit agencies. Using the theory of planned behaviour and the functional approach to volunteering, the program of study generated a model comprising the key psychological and contextual factors determining the volunteers' decision to provide skill assistance in rural settings. The model provides a useful resource for creating suitable volunteering opportunities and for informing volunteer recruitment strategies.
Resumo:
This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.
Resumo:
The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the Modbus protocol is vulnerable to flooding attacks. These attacks involve injection of commands that result in disrupting the normal operation of the control system. This paper describes a set of experiments that shows that an anomaly-based change detection algorithm and signature-based Snort threshold module are capable of detecting Modbus flooding attacks. In comparing these intrusion detection techniques, we find that the signature-based detection requires a carefully selected threshold value, and that the anomaly-based change detection algorithm may have a short delay before detecting the attacks depending on the parameters used. In addition, we also generate a network traffic dataset of flooding attacks on the Modbus control system protocol.
Resumo:
In this research paper, we study a simple programming problem that only requires knowledge of variables and assignment statements, and yet we found that some early novice programmers had difficulty solving the problem. We also present data from think aloud studies which demonstrate the nature of those difficulties. We interpret our data within a neo-Piagetian framework which describes cognitive developmental stages through which students pass as they learn to program. We describe in detail think aloud sessions with novices who reason at the neo-Piagetian preoperational level. Those students exhibit two problems. First, they focus on very small parts of the code and lose sight of the "big picture". Second, they are prone to focus on superficial aspects of the task that are not functionally central to the solution. It is not until the transition into the concrete operational stage that decentration of focus occurs, and they have the cognitive ability to reason about abstract quantities that are conserved, and are equipped to adapt skills to closely related tasks. Our results, and the neo-Piagetian framework on which they are based, suggest that changes are necessary in teaching practice to better support novices who have not reached the concrete operational stage.
Resumo:
Recent research from within a neo-Piagetian perspective proposes that novice programmers pass through the sensorimotor and preoperational stages before being able to reason at the concrete operational stage. However, academics traditionally teach and assess introductory programming as if students commence at the concrete operational stage. In this paper, we present results from a series of think aloud sessions with a single student, known by the pseudonym “Donald”. We conducted the sessions mainly over one semester, with an additional session three semesters later. Donald first manifested predominately sensorimotor reasoning, followed by preoperational reasoning, and finally concrete operational reasoning. This longitudinal think aloud study of Donald is the first direct observational evidence of a novice programmer progressing through the neo-Piagetian stages.
Resumo:
This case study examines the way in which Knowledge Unlatched is combining collective action and open access licenses to encourage innovation in markets for specialist academic books. Knowledge Unlatched is a not for profit organisation that has been established to help a global community of libraries coordinate their book purchasing activities more effectively and, in so doing, to ensure that books librarians select for their own collections become available for free for anyone in the world to read. The Knowledge Unlatched model is an attempt to re-coordinate a market in order to facilitate a transition to digitally appropriate publishing models that include open access. It offers librarians an opportunity to facilitate the open access publication of books that their own readers would value access to. It provides publishers with a stable income stream on titles selected by libraries, as well as an ability to continue selling books to a wider market on their own terms. Knowledge Unlatched provides a rich case study for researchers and practitioners interested in understanding how innovations in procurement practices can be used to stimulate more effective, equitable markets for socially valuable products.
Resumo:
This three-hour workshop tackles the crucial question of whether globally coordinated, market based approaches to funding open access monographs can support the unique needs of Australian research communities. The workshop takes place in the context of the release in August 2013 of the Book Industry Collaborative Council (BICC) report and especially the recommendations included in the chapter on scholarly book publishing in the humanities and social sciences. This workshop, with expert speakers from the BICC Committee and from across the scholarly publishing industry, will discuss the policy issues most likely to ensure that Australian scholarly communities and audiences are best served in an era of digital technology and globalisation. Australia must think globally and support developments that enhance the accessibility of publicly-funded research. Speakers will outline recent developments in scholarly monograph publishing including new Open Access initiatives and developments. Knowledge Unlatched, is one example of an attempt to create an internationally coordinated, market-based route to open access for Humanities, Arts and Social Sciences (HASS) monographs. Knowledge Unlatched, a not-for-profit London-based company is piloting a global library consortium approach to funding open access monographs and released its pilot program in early October with 28 titles from 13 publishers. The workshop invites discussion and debate from librarians, publishers, researchers and research funders on the role of international coordination and markets in securing a more open future for Australian HASS scholarship.
Resumo:
With a focus on intention and motivation, this paper describes a study involving three organisational communities and their collective effort to develop and provide more inclusive housing for people with disabilities and their families. While many studies, such as that by Rocha & Miles (2009), focus on commercial organisations, and sustainability from an economic perspective, this study involves a not-for-profit organisation (the accommodation and service provider) as well as a research organisation and a design action group volunteering their services free of charge. From this pro-bono context, the paper describes a case study that explores the nature of the collective as a basis for creative practice and political activism and the theoretical implications and wider application in terms of emerging research in the area of collaborative entrepreneurship and design activism.
Resumo:
Aim Facilities in retirement villages form a supportive environment for older residents. The purpose of this paper is to investigate the provision of these facilities in retirement villages, which are regarded as a viable accommodation option for the ever-increasing ageing population in Australia. Method A content analysis of 124 retirement villages operated by 22 developers in Queensland and South Australia was conducted for the research purpose. Results The most widely provided facilities are community centres, libraries, barbeque facilities, hairdressers/salons and billiards/snooker/pool tables. Commercial operators provide more facilities than not-for-profit organisations and larger retirement villages normally have more facilities due to the economics of scale involved. Conclusions The results of the study provide a useful reference for providing facilities within retirement villages that may support the quality lifestyles for the older residents.