14 research outputs found

    A Large-Scale Evaluation of High-Impact Password Strength Meters

    Get PDF
    Passwords are ubiquitous in our daily digital life. They protect various types of assets ranging from a simple account on an online newspaper website to our health information on government websites. However, due to the inherent value they protect, malicious people have developed insights into cracking them. Users are pushed to choose stronger passwords to comply with password policies, which they may not like much. Another solution is to put in place proactive password-strength meters/checkers to give feedbacks to users while they create new passwords. Millions of users are now exposed to these meters at highly popular web services that use user-chosen passwords for authentication, or more recently in password managers. Recent studies have found evidence that some meters actually guide users to choose better passwords -which is a rare bit of good news in password research. However, these meters are mostly based on ad-hoc design. At least, as we found, most vendors do not provide any explanation of their design choices, sometimes making them appear as a black-box. We analyze password meters deployed in selected popular websites and password managers. We document obfuscated open-source meters; infer the algorithm behind the closed-source ones; and measure the strength labels assigned to common passwords from several password dictionaries. From this empirical analysis with millions of passwords, we shed light on how the server-end of some web service meters functions, provide examples of highly inconsistent strength outcomes for the same password in different meters, along with examples of many weak passwords being labeled as strong or even excellent. These weaknesses and inconsistencies may confuse users in choosing a stronger password, and thus may weaken the purpose of these meters. On the other hand, we believe these findings may help improve existing meters, and possibly make them an effective tool in the long run

    Trinity Tripod, 1991-10-08

    Get PDF

    Got a Minute? Instruction Tune-Up for Time Pressed Librarians

    Get PDF
    This book contains 19 essays that have been written by current LIS Students who were enrolled in the LIS4330: Library Instruction class at the University of Denver, 2016. Designed to provide a short and pithy overview of a topic that is related to instruction, education, or information literacy, each essays aims to be accessible and approachable for time-pressed librarians who may not have time to catch up

    Bowdoin Orient v.131, no.1-24 (1999-2000)

    Get PDF
    https://digitalcommons.bowdoin.edu/bowdoinorient-2000s/1000/thumbnail.jp

    Conscionable consumption: a feminist grounded theory of porn consumer ethics

    Get PDF
    Much scholarship on pornography consumption has revolved around porn harms or porn empowerment discourses. Moving away from pro- and anti-porn agendas, the research presented in this thesis was designed as an exploratory, qualitative investigation of consumer experiences of pornography, using grounded theory in an effort to transcend the polarised porn debates. By means of a two-stage data collection process involving an online group activity and in-depth interviews, this research set out to extend our understanding of how feminists experience, understand and articulate their engagements with porn. Grounded theory’s focus on iterative data collection, structured analysis and inductive theory development lent itself to several key aims for this project: (a) eschewing, as far as possible, commonly-held assumptions about the research topic and research subjects; (b) resisting agenda-driven frameworks that seek to validate pro- or anti-porn stances; and (c) allowing for the voices of porn consumers themselves to be heard and taken seriously, in a way that hasn’t tended to be prioritised in pornography effects research or the public arena more widely (Mowlabocus and Wood 2015: 119). The iterative approach to data collection advocated by grounded theory also enabled participants to take a more agentive role in determining the direction of the research. As a result, certain elements of the project took unforeseen trajectories, shedding light on additional substantive areas for inquiry beyond those initially intended. Namely, the study provided key insights into the interaction between ethics and practice in porn consumption amongst London feminists. This gave rise to the development of the 'conscionable consumption' model; a theoretical framework for conceptualising the experiences and processes described. Results indicated that feminists’ experiences of porn consumption were heavily influenced by their beliefs about what constituted ‘ethical enough’ (conscionable). These were accompanied by contemplative moments, whose nature tended to correlate with the degree to which the individual felt they had strayed from their own conceptions of conscionable practice, and the degree to which these decisions could be justified or dismissed afterwards. Respondents described an interactive relationship between such reflections and future intentions and/or attitudes, illustrating a cycle of evolving and adapting behaviour complemented by fluctuating definitions of conscionability. In this way, rather than referring to an achieved or failed ‘ethical consumer’ status, the porn ethics project was conceptualised as an ongoing process of ‘conscionable’ negotiation. Such findings enhance our understanding of the ways in which ethics and porn use are woven together and navigated by feminist consumers of pornography, whilst simultaneously extending our knowledge of a demographic hitherto unexplored within both the fields of porn studies and consumer ethics research alike. Keywords: feminism, pornography, consumer ethics, conscionable consumptio

    Knudsen v. J.R. Simplot Company Clerk\u27s Record Dckt. 47020

    Get PDF
    https://digitalcommons.law.uidaho.edu/idaho_supreme_court_record_briefs/9059/thumbnail.jp
    corecore