525 research outputs found

    Resist, comply or workaround? An examination of different facets of user engagement with information systems

    Get PDF
    This paper provides a summary of studies of user resistance to Information Technology (IT) and identifies workaround activity as an understudied and distinct, but related, phenomenon. Previous categorizations of resistance have largely failed to address the relationships between the motivations for divergences from procedure and the associated workaround activity. This paper develops a composite model of resistance/workaround derived from two case study sites. We find four key antecedent conditions derived from both positive and negative resistance rationales and identify associations and links to various resultant workaround behaviours and provide supporting Chains of Evidence from two case studies

    Research on the Architecture Model of Volatile Data Forensics

    Get PDF
    AbstractThis paper proposed a new architecture model of volatile data forensic. The model applied to all the volatile data sources is a general model. It can rebuild the evidence data fragment to chains of evidence which contains the behavior characteristics, so as to assist investigators to do case analysis. With the accumulated experience, the model can help judicial officers to intelligently analyze the same type of computer crimes, and based on currently available information to predict the impending crimes

    Anthropologists behaving badly? Impact and the politics of evaluation in an era of accountability

    Get PDF
    This paper discusses the move within UK social science funding to use non-academic ‘impact’ as a measure of quality and success for social research. It suggests that behind this move are a set of unspoken assumptions about what constitutes ‘good’ and ‘bad’ impact, and the paper seeks to problematize these. By way of provocation, it presents three classic cases of anthropological research, in which the impact of anthropologists on the societies in which they worked was at worst reprehensible, and at best controversial. These controversies – Darkness in El Dorado, the Human Terrain System and Fields of Wheat, Hills of Blood – are used to demonstrate the difficulty with which we can assess impacts as ‘good’ or ‘bad’, and the problems with attempting to do so

    Establishing the digital chain of evidence in biometric systems

    Get PDF
    Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses

    Investigating information systems with mixed-methods research

    Get PDF
    Mixed-methods research, which comprises both quantitative and qualitative components, is widely perceived as a means to resolve the inherent limitations of traditional single method designs and is thus expected to yield richer and more holistic findings. Despite such distinctive benefits and continuous advocacy from Information Systems (IS) researchers, the use of mixed-methods approach in the IS field has not been high. This paper discusses some of the key reasons that led to this low application rate of mixed-methods design in the IS field, ranging from misunderstanding the term with multiple-methods research to practical difficulties for design and implementation. Two previous IS studies are used as examples to illustrate the discussion. The paper concludes by recommending that in order to apply mixed-methods design successfully, IS researchers need to plan and consider thoroughly how the quantitative and qualitative components (i.e. from data collection to data analysis to reporting of findings) can be genuinely integrated together and supplement one another, in relation to the predefined research questions and the specific research contexts

    Non-verbal aspects of collaboration in virtual worlds: a CSCW taxonomy-development proposal integrating the presence dimension

    Get PDF
    Virtual worlds, particularly those able to provide a three-dimensional physical space, have features that make them suitable to support collaborative activities. These features distinguish virtual worlds from other collaboration tools, but current taxonomies of the field of Computer-Supported Cooperative Work do not account for several distinctive features of virtual worlds, namely those related with non-verbal communication. We intended to find out how the use of an avatar, gestures, spatial sounds, etc., influence collaboration in order to be able to include non-verbal communication in taxonomies of the field Computer-Supported Cooperative Work. Several cases of collaboration in virtual worlds are analysed, to find the impact of these non-verbal characteristics of virtual worlds. We proposed adding the concept of Presence to taxonomies of Computer-Supported Cooperative Work and contribute with guidance for future taxonomy development that includes it as a new dimension. This new dimension of Presence is subdivided into "avatar" and "physical space" subdimensions. In turn, these are divided into "physical appearance", "gestures, sounds and animations" and "focus, nimbus and aura"; "environment" and "objects / artefacts". This new taxonomy-development proposal may contribute to inform better design of virtual worlds in support of cooperative work.info:eu-repo/semantics/publishedVersio

    The use of animated agents in e‐learning environments: an exploratory, interpretive case study

    Get PDF
    There is increasing interest in the use of animated agents in e‐learning environments. However, empirical investigations of their use in online education are limited. Our aim is to provide an empirically based framework for the development and evaluation of animated agents in e‐learning environments. Findings suggest a number of challenges, including the multiple dialogue models that animated agents will need to accommodate, the diverse range of roles that pedagogical animated agents can usefully support, the dichotomous relationship that emerges between these roles and that of the lecturer, and student perception of the degree of autonomy that can be afforded to animated agents

    Unsupervised Alignment-based Iterative Evidence Retrieval for Multi-hop Question Answering

    Full text link
    Evidence retrieval is a critical stage of question answering (QA), necessary not only to improve performance, but also to explain the decisions of the corresponding QA method. We introduce a simple, fast, and unsupervised iterative evidence retrieval method, which relies on three ideas: (a) an unsupervised alignment approach to soft-align questions and answers with justification sentences using only GloVe embeddings, (b) an iterative process that reformulates queries focusing on terms that are not covered by existing justifications, which (c) a stopping criterion that terminates retrieval when the terms in the given question and candidate answers are covered by the retrieved justifications. Despite its simplicity, our approach outperforms all the previous methods (including supervised methods) on the evidence selection task on two datasets: MultiRC and QASC. When these evidence sentences are fed into a RoBERTa answer classification component, we achieve state-of-the-art QA performance on these two datasets.Comment: Accepted at ACL 2020 as a long conference pape
    corecore