41,850 research outputs found
Recommended from our members
Argument maps as policy memories for informed deliberation: A research note
This is an eGISE network paper. A significant area within eGovernment is concerned with systems to
support democratic policy formation and decision making processes. In modern government, both
local and national, consultation with interested parties is an important element in maintaining the
democratic process. To date online consultation tools have has used existing software tools, which are
simple text based tools that were not tailored to the process. This project proposes to develop an
online tool that will visualise the issues and arguments graphically as the consultation process
proceeds. Using Discourse Analysis and Ontological Engineering it will create Argument Maps that
will server not only to inform participants but also the archive record of the consultation – the Policy
Memory. We hypothesise that such a tool would allow citizens to be come more engaged with policy
formation and enhance democratic participation
Knowledge Cartography for Controversies: The Iraq Debate
In analysing controversies and debates—which would include reviewing a literature in order to plan research, or assessing intelligence to formulate policy—there is no one worldview which can be mapped, for instance as a single, coherent concept map. The cartographic challenge is to show which facts are agreed and contested, and the different kinds of narrative links that use facts as evidence to define the nature of the problem, what to do about it, and why. We will use the debate around the invasion of Iraq to demonstrate the methodology of using a knowledge mapping tool to extract key ideas from source materials, in order to classify and connect them within and across a set of perspectives of interest to the analyst. We reflect on the value that this approach adds, and how it relates to other argument mapping approaches
Finding and Resolving Security Misusability with Misusability Cases
Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice- versa. One way of using scenarios to bridge security and usability involves explicitly describing how design deci- sions can lead to users inadvertently exploiting vulnera- bilities to carry out their production tasks. This paper describes how misusability cases, scenarios that describe how design decisions may lead to usability problems sub- sequently leading to system misuse, address this problem. We describe the related work upon which misusability cases are based before presenting the approach, and illus- trating its application using a case study example. Finally, we describe some findings from this approach that further inform the design of usable and secure systems
Recommended from our members
A debate dashboard to enhance on-line knowledge sharing
Purpose – Web 2.0 technologies have radically modified the way in which knowledge is created, managed and shared, improving productivity and accelerating innovation processes for the enterprises. These technologies have allowed enterprises to produce knowledge, leverage collective intelligence and build social capital on a scale that was unimaginable a few years ago. In this paper we focus on a particular kind of web-based collaborative platforms known as argument mapping tools and we discuss the main barriers to the adoption of them. Literature has proved that these argument mapping tools provide large and small and medium enterprise with several advantages, but nevertheless, they have low level adoption. In this paper we explore new technological solutions to support the adoption of argument mapping tools. In particular, we propose the design of a Debate Dashboard to provide visual feedback to support online deliberation. These visual feedback aims at compensating the loss of information due to the mediation of the technology. The Debate Dashboard is composed of a set of suitable visualization tools that have been selected on the basis of a literature review of the visualization tools.
Design/methodology/approach - We propose a literature review of existing visualization tools. Building on the literature review we selected thirty visualization tools, which have been classified on the basis of the kind of feedback they are able to provide. We identify three classes of feedback: Community feedback (identikit of users), Interaction feedback (about how users interact) and Absorption feedback (about generated content and its organization). We distilled the Debate Dashboard features by building on results of a literature review on Web 2.0 tools for data visualization. As output of literature review we selected six visualization tools. We consider these selected tools as a sort of starting point. Indeed, our aim is the improvement of them through the addition of further features and functions in order to make them more effective in providing feedback.
Originality/value – Our paper enriches the debate about computer mediated conversation and visualization tools. We propose a Dashboard prototype to augment collaborative
knowledge mapping tools by providing visual feedback on conversations. The Dashboard will provide at the same time three different kinds of feedback about: details of the
participants to the conversation, interaction processes and generated content. This will allow the improvement of the benefits and reduce the costs deriving from the use of
mapping tools. Moreover, another important novelty is that visualization tools will be integrated to mapping tools, as until now they have been used only to visualize data contained in forums (as Usenet or Slash.dot), chat or email archives
Practical implications – The Dashboard provides feedback about participants, interaction processes and generated contents, thus supporting the adoption of mapping tools as
technologies able to foster knowledge sharing among remote workers or/and customers and supplier.
The integration of Debate Dashboard with common online argument mapping tools aims at enabling the following advantages:
1. Reduction of misunderstanding;
2. Reduction of cognitive effort required to use argument mapping tools;
3. Improvement of the exploration and the analysis of the maps - the Debate Dashboard feedback improves the usability of the object (the map), thus allowing users to pitch into the conversation in the right place
Shining Light On Shadow Stacks
Control-Flow Hijacking attacks are the dominant attack vector against C/C++
programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the
forward edge,i.e., indirect calls through function pointers and virtual calls.
Protecting the backward edge is left to stack canaries, which are easily
bypassed through information leaks. Shadow Stacks are a fully precise mechanism
for protecting backwards edges, and should be deployed with CFI mitigations. We
present a comprehensive analysis of all possible shadow stack mechanisms along
three axes: performance, compatibility, and security. For performance
comparisons we use SPEC CPU2006, while security and compatibility are
qualitatively analyzed. Based on our study, we renew calls for a shadow stack
design that leverages a dedicated register, resulting in low performance
overhead, and minimal memory overhead, but sacrifices compatibility. We present
case studies of our implementation of such a design, Shadesmar, on Phoronix and
Apache to demonstrate the feasibility of dedicating a general purpose register
to a security monitor on modern architectures, and the deployability of
Shadesmar. Our comprehensive analysis, including detailed case studies for our
novel design, allows compiler designers and practitioners to select the correct
shadow stack design for different usage scenarios.Comment: To Appear in IEEE Security and Privacy 201
Exploiting Traffic Balancing and Multicast Efficiency in Distributed Video-on-Demand Architectures
Distributed Video-on-Demand (DVoD) systems are proposed as a
solution to the limited streaming capacity and null scalability of centralized
systems. In a previous work, we proposed a fully distributed large-scale VoD
architecture, called Double P-Tree, which has shown itself to be a good approach
to the design of flexible and scalable DVoD systems. In this paper, we
present relevant design aspects related to video mapping and traffic balancing in
order to improve Double P-Tree architecture performance. Our simulation results
demonstrate that these techniques yield a more efficient system and considerably
increase its streaming capacity. The results also show the crucial importance
of topology connectivity in improving multicasting performance in
DVoD systems. Finally, a comparison among several DVoD architectures was
performed using simulation, and the results show that the Double P-Tree architecture
incorporating mapping and load balancing policies outperforms similar
DVoD architectures.This work was supported by the MCyT-Spain under contract TIC 2001-2592 and partially supported by the Generalitat de Catalunya- Grup de Recerca Consolidat 2001SGR-00218
A Peer-to-Peer Middleware Framework for Resilient Persistent Programming
The persistent programming systems of the 1980s offered a programming model
that integrated computation and long-term storage. In these systems, reliable
applications could be engineered without requiring the programmer to write
translation code to manage the transfer of data to and from non-volatile
storage. More importantly, it simplified the programmer's conceptual model of
an application, and avoided the many coherency problems that result from
multiple cached copies of the same information. Although technically
innovative, persistent languages were not widely adopted, perhaps due in part
to their closed-world model. Each persistent store was located on a single
host, and there were no flexible mechanisms for communication or transfer of
data between separate stores. Here we re-open the work on persistence and
combine it with modern peer-to-peer techniques in order to provide support for
orthogonal persistence in resilient and potentially long-running distributed
applications. Our vision is of an infrastructure within which an application
can be developed and distributed with minimal modification, whereupon the
application becomes resilient to certain failure modes. If a node, or the
connection to it, fails during execution of the application, the objects are
re-instantiated from distributed replicas, without their reference holders
being aware of the failure. Furthermore, we believe that this can be achieved
within a spectrum of application programmer intervention, ranging from minimal
to totally prescriptive, as desired. The same mechanisms encompass an
orthogonally persistent programming model. We outline our approach to
implementing this vision, and describe current progress.Comment: Submitted to EuroSys 200
- …