525 research outputs found
Resist, comply or workaround? An examination of different facets of user engagement with information systems
This paper provides a summary of studies of user resistance to Information Technology (IT) and identifies workaround activity as an understudied and distinct, but related, phenomenon. Previous categorizations of resistance have largely failed to address the relationships between the motivations for divergences from procedure and the associated workaround activity. This paper develops a composite model of resistance/workaround derived from two case study sites. We find four key antecedent conditions derived from both positive and negative resistance rationales and identify associations and links to various resultant workaround behaviours and provide supporting Chains of Evidence from two case studies
Research on the Architecture Model of Volatile Data Forensics
AbstractThis paper proposed a new architecture model of volatile data forensic. The model applied to all the volatile data sources is a general model. It can rebuild the evidence data fragment to chains of evidence which contains the behavior characteristics, so as to assist investigators to do case analysis. With the accumulated experience, the model can help judicial officers to intelligently analyze the same type of computer crimes, and based on currently available information to predict the impending crimes
Anthropologists behaving badly? Impact and the politics of evaluation in an era of accountability
This paper discusses the move within UK social science funding to use non-academic ‘impact’ as a measure of quality and success for social research. It suggests that behind this move are a set of unspoken assumptions about what constitutes ‘good’ and ‘bad’ impact, and the paper seeks to problematize these. By way of provocation, it presents three classic cases of anthropological research, in which the impact of anthropologists on the societies in which they worked was at worst reprehensible, and at best controversial. These controversies – Darkness in El Dorado, the Human Terrain System and Fields of Wheat, Hills of Blood – are used to demonstrate the difficulty with which we can assess impacts as ‘good’ or ‘bad’, and the problems with attempting to do so
Establishing the digital chain of evidence in biometric systems
Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses
Investigating information systems with mixed-methods research
Mixed-methods research, which comprises both quantitative and qualitative components, is widely perceived as a means to resolve the inherent limitations of traditional single method designs and is thus expected to yield richer and more holistic findings. Despite such distinctive benefits and continuous advocacy from Information Systems (IS) researchers, the use of mixed-methods approach in the IS field has not been high. This paper discusses some of the key reasons that led to this low application rate of mixed-methods design in the IS field, ranging from misunderstanding the term with multiple-methods research to practical difficulties for design and implementation. Two previous IS studies are used as examples to illustrate the discussion. The paper concludes by recommending that in order to apply mixed-methods design successfully, IS researchers need to plan and consider thoroughly how the quantitative and qualitative components (i.e. from data collection to data analysis to reporting of findings) can be genuinely integrated together and supplement one another, in relation to the predefined research questions and the specific research contexts
Non-verbal aspects of collaboration in virtual worlds: a CSCW taxonomy-development proposal integrating the presence dimension
Virtual worlds, particularly those able to provide a three-dimensional physical space,
have features that make them suitable to support collaborative activities. These features
distinguish virtual worlds from other collaboration tools, but current taxonomies of the field of
Computer-Supported Cooperative Work do not account for several distinctive features of virtual
worlds, namely those related with non-verbal communication. We intended to find out how the
use of an avatar, gestures, spatial sounds, etc., influence collaboration in order to be able to
include non-verbal communication in taxonomies of the field Computer-Supported Cooperative
Work. Several cases of collaboration in virtual worlds are analysed, to find the impact of these
non-verbal characteristics of virtual worlds. We proposed adding the concept of Presence to
taxonomies of Computer-Supported Cooperative Work and contribute with guidance for future
taxonomy development that includes it as a new dimension. This new dimension of Presence is
subdivided into "avatar" and "physical space" subdimensions. In turn, these are divided into
"physical appearance", "gestures, sounds and animations" and "focus, nimbus and aura";
"environment" and "objects / artefacts". This new taxonomy-development proposal may
contribute to inform better design of virtual worlds in support of cooperative work.info:eu-repo/semantics/publishedVersio
The use of animated agents in e‐learning environments: an exploratory, interpretive case study
There is increasing interest in the use of animated agents in e‐learning environments. However, empirical investigations of their use in online education are limited. Our aim is to provide an empirically based framework for the development and evaluation of animated agents in e‐learning environments. Findings suggest a number of challenges, including the multiple dialogue models that animated agents will need to accommodate, the diverse range of roles that pedagogical animated agents can usefully support, the dichotomous relationship that emerges between these roles and that of the lecturer, and student perception of the degree of autonomy that can be afforded to animated agents
Unsupervised Alignment-based Iterative Evidence Retrieval for Multi-hop Question Answering
Evidence retrieval is a critical stage of question answering (QA), necessary
not only to improve performance, but also to explain the decisions of the
corresponding QA method. We introduce a simple, fast, and unsupervised
iterative evidence retrieval method, which relies on three ideas: (a) an
unsupervised alignment approach to soft-align questions and answers with
justification sentences using only GloVe embeddings, (b) an iterative process
that reformulates queries focusing on terms that are not covered by existing
justifications, which (c) a stopping criterion that terminates retrieval when
the terms in the given question and candidate answers are covered by the
retrieved justifications. Despite its simplicity, our approach outperforms all
the previous methods (including supervised methods) on the evidence selection
task on two datasets: MultiRC and QASC. When these evidence sentences are fed
into a RoBERTa answer classification component, we achieve state-of-the-art QA
performance on these two datasets.Comment: Accepted at ACL 2020 as a long conference pape
- …