6,308 research outputs found

    Future bathroom: A study of user-centred design principles affecting usability, safety and satisfaction in bathrooms for people living with disabilities

    Get PDF
    Research and development work relating to assistive technology 2010-11 (Department of Health) Presented to Parliament pursuant to Section 22 of the Chronically Sick and Disabled Persons Act 197

    Aiding information security decisions with human factors using quantitative and qualitative techniques

    Get PDF
    Phd ThesisThe Information Security Decision Making Process is comprised of an extremely complex and dynamic set of sub-tasks, sub-goals and inter-disciplinary practices. In order to be effective and appropriate, this process must balance both the requirements of the stakeholder as well as the users within the system. Without careful consideration of users’ behaviours and preferences, interventions are often seen as obstacles towards productivity and subsequently circumvented or simply not adhered to. The approach detailed herein requires an intimate knowledge of both Information Security and Human Behaviour. An effective security policy must adequately protect a given set of assets (human and non-human) or systems as well as preserve maximal productivity. Companies rely on their Intellectual Property Rights which are often stored in a digital format. This presents a plethora of issues regarding security, access management and locality (whether on or off the premises). Furthermore, there is the added complexity of employees and how they operate within this environment (a subset of compliance, competence and policy). With the continued increase in consumerisation, more specifically the rise of Bring Your Own Device, there is a significant threat towards data security that persists outside of the typical working environment. This trend enables employees to access and transfer corporate assets remotely but in doing so creates a conflict over identity, ownership and data management. The governance of these activities creates an extremely complex problem space which requires the need to balance these requirements relying on an accurate assessment of risk, identification of security vulnerabilities and knowledge pertaining to the behaviour of employees. The risks to company assets can be estimated by the analysis of the following issues: • Threats to your assets. These are unwanted events that could cause the deliberate or accidental loss, damage or misuse of the assets. • Vulnerabilities. How susceptible your assets are to attack. • Impact. The magnitude of the potential loss or the seriousness of the event. The ability to quantify and accurately represent these variables is critical in developing, implementing and supporting a successful security policy. The dissertation is structured as follows. Chapter 1 provides an abstract overview of the problem space and highlights our aims, objectives and publications. Chapter 2 details an in-depth literature review of the cross-disciplinary problem space. This involves both the analysis of industry standards, practices and reports as well as a summary of academic literature pertaining to theoretical frameworks and simulations for discussion. Chapter 3 introduces our problem space and documents the rationale for designing our methodology. Each successive chapter (4, 5, & 6) documents a separate investigative strategy for populating specific data sets with respect to the behaviours and practices highlighted from our pilot study and CISO interaction. This provides the rationale behind each approach as well as a documented implementation and evaluation of our experimental design with reference to publications in the field. Chapter 7 documents our modelling strategy and highlights the extensions we propose to the BPMN 2.0 formalism. Chapter 8 concludes our work with reference to our contributions, limitations and the direction of future study

    Supporting community engagement through teaching, student projects and research

    Get PDF
    The Education Acts statutory obligations for ITPs are not supported by the Crown funding model. Part of the statutory role of an ITP is “... promotes community learning and by research, particularly applied and technological research ...” [The education act 1989]. In relation to this a 2017 TEC report highlighted impaired business models and an excessive administrative burden as restrictive and impeding success. Further restrictions are seen when considering ITPs attract < 3 % of the available TEC funding for research, and ~ 20 % available TEC funding for teaching, despite having overall student efts of ~ 26 % nationally. An attempt to improve performance and engage through collaboration (community, industry, tertiary) at our institution is proving successful. The cross-disciplinary approach provides students high level experience and the technical stretch needed to be successful engineers, technologists and technicians. This study presents one of the methods we use to collaborate externally through teaching, student projects and research

    Adoption and Non-Adoption: Profiling Internet Usage among Tourists to New Zealand

    Get PDF
    Since the explosion of the internet as a business medium, one of its primary uses has been marketing. The advantages of using the internet for business-to-consumer transactions are clear. The openness of the internet is creating opportunities for virtually all companies across various industries. The words 'internet', 'World Wide Web', 'www' or the 'web' refer to the same thing and are used interchangeably within this research study. The tourism industry is also experiencing a rapid adoption of the internet technology for marketing travel products and services. As a destination New Zealand is a small country comprising two main land masses and smaller outlying islands, with a population of about 4 million people (Statistics New Zealand 2004). Tourism is promoted as an essential part of the national economy, particularly to earn foreign exchange and generate employment. The number of international tourists visiting New Zealand is 2.2 million (Tourism New Zealand, 2006). In New Zealand almost all regional tourism organizations (RTOs) have a web presence, thereby exposing potential tourists to an array of destinations to visit. However, there are few New Zealand based studies that profile tourists based on their internet adoption and the differences between internet users and non-users. The question that baffles every business manager is what predisposes consumers to use a website? This is the fundamental question that motivated the study. While usability does play a major role in the adoption and use of a particular website, it is outside the scope of this project, otherwise the scope would have been too large and complicated to permit a useable questionnaire given the other concerns about respondents' past experiences and attitudes toward use of the net for the specific purposes of holiday purchases. The study draws upon innovation diffusion theory (IDT) and more recent conceptualizations of IT adoption behaviour to examine differences among Rogers' (1995) adoption categories. Within this context, 'adoption' refers to the stage in which a technology is selected for use by an individual. 'Diffusion' refers to the stage in which the technology spreads to general use and application. For this study an attempt is made to create a behavioural profile of visitors based on a sample of 517 overseas visitors to New Zealand. Visitors were asked to complete a questionnaire and provide information on their demographics, travel related behaviour, internet usage patterns, perceptions of the internet and online shopping in general. The thesis thus describes the initiation and evolution of an empirical research project, which investigates the adoption and diffusion of internet technologies amongst international visitors to New Zealand. The study was launched in an attempt to: 1) learn more about internet usage by visitors to New Zealand; 2) create a psychographic profile of visitors; 3) attempt to empirically validate the technology acceptance model (TAM); and 4) fill a noticeable void so that future researchers on IT and internet adoption by tourists in New Zealand have a foundation and starting point. Most of the previous research related to TAM has been in workplace related situations while studies in tourism have used students as subjects, rather than actual visitors to a particular destination (Shang et al., 2005, Moon and Kim, 2001, Klopping and McKinney, 2004). Specific market studies undertaken by destination marketing organisations or regional tourism organisations were considered only inasmuch as they aided generalization as place specificity hindered conceptual development pertaining to themes of adoption and general usage patterns. The study seeks to build on Rogers' (1995) seminal work on the diffusion of innovations and make a unique contribution to existing diffusion studies by its focus on the individual visitors as the unit of analysis and by its test of the TAM model. This study presents descriptive results via standard statistical analysis, a cluster analysis of users and a structural equation modelling of the TAM applied within a context of international visitors to New Zealand. The data were collected at major locations - the viaduct basin in Auckland and the international departure lounge at the Christchurch International Airport. The two locations were chosen to enable faster data collection. Initially the data was gathered at the viaduct basin in Auckland but the number of respondents was not many. Since the data collection was slow, decided to collect from Christchurch International airport where departing passengers could be approached. Individual passengers/tourists were approached and a screening question to ascertain if they were visitors or not was asked. If they were visiting, then they were asked to participate in the survey. No prior specific screening was undertaken to determine if they had used internet or not for their trip/travel to New Zealand. However, subsequent analysis shows that only 2.3% of the sample had not used the internet, and 31% of the sample had not bought tourism products or services over the internet. Therefore, overall, experience and internet usage was not uncommon for the majority of the sample, but a large proportion of non-users existed to permit comparative analysis. While there is a bias towards males in the sample, the 19-35 years age group was slightly more numerous for both genders, than were other age groups. The results indicate that mean internet usage is comparatively high, as is familiarity with many electronic consumer durables. The sample possesses a bias toward English speaking countries, younger people and educationally higher qualified people. Internet search engines seem to be the most popular source of search. The socio-demographic variables such as age, gender and educational attainment appeared to be but a moderate influence on general internet usage and thus on the use of the internet for booking holidays. Factor analysis of the attitudinal statements revealed six factors, which accounted for about 60 % of the total variance. The clear emergence of factors enabled the development of clusters. The clusters appear to have significance with reference to usage rates of internet. The home ownership of electronics shows a high percentage of respondents had mobile phones. This implies that New Zealand Tourism has to look at options or possible services it can introduce to market to these people who could be using mobile devices not only in their country but also while travelling in New Zealand. Wireless is another important development in the field of technology and many of the tourism DMO in other developed countries in Europe and US are adapting approaches based on these technologies to market to potential customers

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains

    Get PDF
    Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a specific focus on the mitigation of cyber risks. An analytical framework is presented, based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies. This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning (AI/ML) and real-time intelligence for predictive cyber risk analytics. The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge. This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when AI/ML technologies are migrated to the periphery of IoT networks

    [Subject benchmark statement]: computing

    Get PDF

    A Conceptual Framework for Smartphone Security Among Arab Millennials

    Get PDF
    The rapid growth of smartphone adoption and use in the Middle East has led to some critical post-adoption issues, including ensuring that smartphones are used securely. Moreover, there is a gap in the existing literature on the perceptions and behaviour of individual consumers, especially millennials, in relation to mobile security and dealing with smartphone security threats. Little research on this subject has been carried out in developing countries, particularly in the Middle East, in a cross-national context. Therefore, this research aims to analyse the factors that can affect smartphone security behaviour among millennials in a cross-national context in the Middle East. The model developed in this research is based on a combination of the protection motivation theory (PMT) and the extended unified theory of acceptance and use of technology (UTAUT2), with additional factors specifically related to millennials’ smartphone security behaviour in the Middle East. The initial findings indicate that (1) there is a gap in research on the security behaviour of Arab millennials, despite the existence of serious security threats associated with their use of these technologies; and (2) there is a gap in research on similarities and differences in smartphone security behaviour among consumers in a cross-national context. A questionnaire will be distributed online to consumers who are 18–29 years old in Iraq, Jordan and the UAE. This is the first research to study millennial Arabs’ security behaviour around smartphones and mobile applications in a cross- national context. In addition, the conceptual framework proposed in this research combines the PMT and the UTAUT2, with a further extension via the inclusion of three additional factors: privacy concerns; security threats related to smartphone-specific characteristics; and cybersecurity acculturation. Furthermore, this research bridges the gap in knowledge in terms of addressing the lack of research on millennials smartphone users in the Middle East region as they form the largest segment of the population
    • …
    corecore