376,040 research outputs found

    A developmental model for the design and implementation of Web-based psychological interventions

    Get PDF
    D.Litt. et Phil.This study aims at constructing a developmental model which can serve as a guide for the design and development of Web-based psychological interventions. It should be kept in mind that this study is grounded methodologically in a developmental research design but also uses this developmental research design as a basis for intervention design. Psychology has already made use of the Internet in terms of different applications but no formalised structure exists for the development of Web-based interventions. Due to this gap in knowledge the model needs to be developed by utilising existing models for intervention design and integrating them with existing models for the design of instructional and Web-based training. Due to the unique, adaptive nature of Web-based psychological interventions, it is necessary to also move beyond these models and focus on user and environmental characteristics which can be addressed during the development and design phases. In order to develop and refine the proposed model, a Web-based career guidance intervention will be developed and implemented. Users‟ feedback from their experience of this intervention will provide indications of the feasibility of the model and also suggest any modifications that should be made

    A closer look at Intrusion Detection System for web applications

    Full text link
    Intrusion Detection System (IDS) is one of the security measures being used as an additional defence mechanism to prevent the security breaches on web. It has been well known methodology for detecting network-based attacks but still immature in the domain of securing web application. The objective of the paper is to thoroughly understand the design methodology of the detection system in respect to web applications. In this paper, we discuss several specific aspects of a web application in detail that makes challenging for a developer to build an efficient web IDS. The paper also provides a comprehensive overview of the existing detection systems exclusively designed to observe web traffic. Furthermore, we identify various dimensions for comparing the IDS from different perspectives based on their design and functionalities. We also provide a conceptual framework of an IDS with prevention mechanism to offer a systematic guidance for the implementation of the system specific to the web applications. We compare its features with five existing detection systems, namely AppSensor, PHPIDS, ModSecurity, Shadow Daemon and AQTRONIX WebKnight. The paper will highly facilitate the interest groups with the cutting edge information to understand the stronger and weaker sections of the web IDS and provide a firm foundation for developing an intelligent and efficient system

    An Overview of Flow Theory in Ecommerce

    Get PDF
    The present study examined flow theory in the literature and especially in ecommerce contexts: computer and online games,virtual environments, online shopping, interface design, marketing, and management. Designing for a positive userexperience has become an equally important goal of interface design in addition to usability. Thus, studying user’s flowexperience is a valuable undertaken, which will provide insights for human computer interaction and guidance to interfacedesign, including online and mobile applications. An exploratory factor analysis was conducted using Webster et al. (1993)instrument, which was administered to 310 subjects, following their experience navigating an apparel commercial web site.Based on the results of the factor analysis, three dimensions of flow emerged: control, attention focus, and cognitiveenjoyment. Implications for contributions and future research are discussed

    Design and Implementation Multimedia Learning Success for Vocational Schools

    Get PDF
    This research aims to design a web-based multimedia applications, interactive learning, in order to improve the learning outcomes of students, especially students of Vocational High School. Multimedia Learning has been designed with some additional content in the form of applications: decision support system for multimedia usage based on Model of Multimedia Learning Success. The population obtained from respondents vocational school in Central Java, which is already implementing multimedia learning. The method used is qualitative analysis in the form of: the development of multimedia learning integrated with decision support systems. Design and implementation of multimedia learning success system that is abbreviated "Sikemuning". Sikemuning can be used to measure or provide guidance for teachers in the use of multimedia. Interviews with several respondents teachers from vocational schools in Central Java showed that: the system success multimedia learning developed in this study can be used as feedback to assess the success and effectiveness of the implementation of learning activities, multimedia learning can improve the performance and intelligence of vocational school students

    Envisioning Tool Support for Designing Privacy-Aware Internet of Thing Applications

    Get PDF
    The design and development process for Internet of Things (IoT) applications is more complicated than for desktop, mobile, or web applications. IoT applications require both software and hardware to work together across multiple different types of nodes (e.g., microcontrollers, system-on-chips, mobile phones, miniaturised single-board computers, and cloud platforms) with different capabilities under different conditions. IoT applications typically collect and analyse personal data that can be used to derive sensitive information about individuals. Without proper privacy protections in place, IoT applications could lead to serious privacy violations. Thus far, privacy concerns have not been explicitly considered in software engineering processes when designing and developing IoT applications, partly due to a lack of tools, technologies, and guidance. This paper presents a research vision that argues the importance of developing a privacy-aware IoT application design tool to address the challenges mentioned above. This tool should not only transform IoT application designs into privacy-aware application designs but also validate and verify them. First, we outline how this proposed tool should work in practice and its core functionalities. Then, we identify research challenges and potential directions towards developing the proposed tool. We anticipate that this proposed tool will save many engineering hours which engineers would otherwise need to spend on developing privacy expertise and applying it. We also highlight the usefulness of this tool towards privacy education and privacy compliance

    VSA Universal Design Access Guide: Every Thing Benefits Every One

    Get PDF
    The intent of this publication is to provide guidance and resources to VSA staff, contractors, and volunteers regarding implementation of universal design principles in presentations, meeting and conference planning, accessibility services, and web content. The objective of universal design is for everyone to access the same things at the same time, in the same place, and in as close to the same manner as possible. No checklist can produce universal design. In achieving universal design, precision with accessibility standards is only as important as the commitment to embracing inclusion. Universal design manifests only when an understanding of basic accessibility is coupled with a flexible and open mind. Creativity and basic respect make up its foundation. Preparing your organization to embrace self-determination to the fullest extent will foster an atmosphere of universal design. This document briefly describes the Seven Principles of Universal Design. However, Universal Design is more of an ongoing process than a prescription. We hope that you will use this document to foster the habit of using Universal Design principles to guide decision-making. More in-depth information on its history, current applications, and potential can be found by utilizing the resources section of this document

    Applying control theories and ABM to improve resilience-based design of systems

    Get PDF
    Applying optimal control theories and agent base modeling to improve resilience assessment of systems is a new field which has not been explored yet. A resilience decision support system should include some critical elements: (i) Assess risk, (ii) identify choices (Identify choices for reducing vulnerability that focus on joint solutions across social, economic, and ecological systems; provide decision support, including Web-based guidance and scenarios to assess options) and (iii) take actions (Help communities develop and implement solutions). The field of structural control provides loops which are able to approach the problem in a more rational way and provide practical solutions to the resilience design strategies. The paper describes the concept and provides some promising applications of the proposed interdisciplinary approach

    Form Design in Web Application Using the Three-Layer Model (TLM) : A Checklist Development

    Get PDF
    The objectives of end users visiting web site are generally for information retrieval whereas for web application, users have specific goals, which are to complete tasks successfully. Nevertheless, some online job applications do not meet task-based orientation design and this resulted in users’ frustration. Therefore, for the purpose of reducing the frustration and providing guidelines, a form design checklist was developed. In addition, an investigation of the current state of web form design among Malaysian developers was also conducted. A four-step methodology was followed; understand Three-Layer Model (TLM) concept, develop checklist based on guidelines, collect and identify existing Malaysian web forms, and finally, validate checklist and compare the collected web forms with the Three-Layer Model. In validating the checklist, 15 respondents performed three sets of tasks: pre-test, post-test and comparing three pre-selected online forms. Findings indicated that students designed better web forms after learning about the TLM and this suggests that the checklist provided guidance in designing better web form. Results also pointed out that the current state of web forms designed by Malaysian does not meet task-based orientation design
    • …
    corecore