180,780 research outputs found
What Drives Students' Loyalty-Formation in Social Media Learning Within a Personal Learning Environment Approach? The Moderating Role of Need for Cognition
Our study analyzes an educational experience based on the integrated use of social media within a higher education course under a personal learning environment approach and investigates the factors that determine students' loyalty to social media learning. We examined the moderating role of need for cognition (NFC) in students' formation of attitudes, satisfaction, and loyalty toward this learning experience. The results indicate that NFC has an influence on these variables, significantly moderating how loyalty toward social media learning is formed. For high-NFC students, satisfaction with the learning experience is the most important variable to explain loyalty; whereas for low-NFC students, attitudes have a stronger effect. Different strategies are suggested, according to the learners' NFC levels, for increasing the use of social media in personal learning environments. Practical implications for improving the integration of such informal resources into formal education are discussed.Junta de AndalucÃa – Programa Andaluz de I + D P12 SEJ 259
“This is the way ‘I’ create my passwords ...":does the endowment effect deter people from changing the way they create their passwords?
The endowment effect is the term used to describe a phenomenon that manifests as a reluctance to relinquish owned artifacts, even when a viable or better substitute is offered. It has been confirmed by multiple studies when it comes to ownership of physical artifacts. If computer users also "own", and are attached to, their personal security routines, such feelings could conceivably activate the same endowment effect. This would, in turn, lead to their over-estimating the \value" of their existing routines, in terms of the protection they afford, and the risks they mitigate. They might well, as a consequence, not countenance any efforts to persuade them to adopt a more secure routine, because their comparison of pre-existing and proposed new routine is skewed by the activation of the endowment effect.In this paper, we report on an investigation into the possibility that the endowment effect activates when people adopt personal password creation routines. We did indeed find evidence that the endowment effect is likely to be triggered in this context. This constitutes one explanation for the failure of many security awareness drives to improve password strength. We conclude by suggesting directions for future research to confirm our findings, and to investigate the activation of the effect for other security routines
Recommended from our members
On Birthing Dancing Stars: The Need for Bounded Chaos in Information Interaction
While computers causing chaos is acommon social trope, nearly the entirety of the history of computing is dedicated to generating order. Typical interactive information retrieval tasks ask computers to support the traversal and exploration of large, complex information spaces. The implicit assumption is that they are to support users in simplifying the complexity (i.e. in creating order from chaos). But for some types of task, particularly those that involve the creative application or synthesis of knowledge or the creation of new knowledge, this assumption may be incorrect. It is increasingly evident that perfect order—and the systems we create with it—support highly-structured information tasks well, but provide poor support for less-structured tasks.We need digital information environments that help create a little more chaos from order to spark creative thinking and knowledge creation. This paper argues for the need for information systems that offerwhat we term ‘bounded chaos’, and offers research directions that may support the creation of such interface
Information Behavior in the Mobile Environment: An Overview
As smartphones become ubiquitous, they increasingly influence the way in which students seek and use information. It is important to understand emerging information behavior as a result of wide spread use of smartphones. This paper provides an overview of information behavior in the mobile environment. Gender differences in mobile information seeking are discussed. People interact with mobile information in varied and unpredictable locations or while in transit. The mobility of information engagement is an important issue that human information theory should embrace
Adolescent internet abuse. A study on the role of attachment to parents and peers in a large community sample
Adolescents are the main users of new technologies and theirmain purpose of use is social interaction. Although new technologies are useful to teenagers, in addressing their developmental tasks, recent studies have shown that they may be an obstacle in their growth. Research shows that teenagers with Internet addiction experience lower quality in their relationships with parents and more individual difficulties. However, limited research is available on the role played by adolescents' attachment to parents and peers, considering their psychological profiles.We evaluated in a large community sample of adolescents (N= 1105) the Internet use/abuse, the adolescents' attachment to parents and peers, and their psychological profiles. Hierarchical regression analyses were conducted to verify the influence of parental and peer attachment on Internet use/abuse, considering the moderating effect of adolescents' psychopathological risk. Results showed that adolescents' attachment to parents had a significant effect on Internet use. Adolescents' psychopathological risk had a moderating effect on the relationship between attachment to mothers and Internet use. Our study shows that further research is needed, taking into account both individual and family variables
Discriminative models for multi-instance problems with tree-structure
Modeling network traffic is gaining importance in order to counter modern
threats of ever increasing sophistication. It is though surprisingly difficult
and costly to construct reliable classifiers on top of telemetry data due to
the variety and complexity of signals that no human can manage to interpret in
full. Obtaining training data with sufficiently large and variable body of
labels can thus be seen as prohibitive problem. The goal of this work is to
detect infected computers by observing their HTTP(S) traffic collected from
network sensors, which are typically proxy servers or network firewalls, while
relying on only minimal human input in model training phase. We propose a
discriminative model that makes decisions based on all computer's traffic
observed during predefined time window (5 minutes in our case). The model is
trained on collected traffic samples over equally sized time window per large
number of computers, where the only labels needed are human verdicts about the
computer as a whole (presumed infected vs. presumed clean). As part of training
the model itself recognizes discriminative patterns in traffic targeted to
individual servers and constructs the final high-level classifier on top of
them. We show the classifier to perform with very high precision, while the
learned traffic patterns can be interpreted as Indicators of Compromise. In the
following we implement the discriminative model as a neural network with
special structure reflecting two stacked multi-instance problems. The main
advantages of the proposed configuration include not only improved accuracy and
ability to learn from gross labels, but also automatic learning of server types
(together with their detectors) which are typically visited by infected
computers
Case study:exploring children’s password knowledge and practices
Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous password, and this might well be a suboptimal choice. Designing authentication for children requires acknowledgement of child-specific developmental challenges related to literacy, cognitive abilities and differing developmental stages. Understanding the current state of play is essential, to deliver insights that can inform the development of child-centred authentication mechanisms and processes. We carried out a systematic literature review of all research related to children and authentication since 2000. A distinct research gap emerged from the analysis. Thus, we designed and administered a survey to school children in the United States (US), so as to gain insights into their current password usage and behaviors. This paper reports preliminary results from a case study of 189 children (part of a much larger research effort). The findings highlight age-related differences in children’s password understanding and practices. We also discovered that children confuse concepts of safety and security. We conclude by suggesting directions for future research. This paper reports on work in progress.<br/
- …