11,106 research outputs found
Embedding accessibility and usability: considerations for e-learning research and development projects
This paper makes the case that if eâlearning research and development projects are to be successfully adopted in realâworld teaching and learning contexts, then they must effectively address accessibility and usability issues; and that these need to be integrated throughout the project. As such, accessibility and usability issues need to be made explicit in project documentation, along with allocation of appropriate resources and time. We argue that accessibility and usability are intrinsically interâlinked. An integrated accessibility and usability evaluation methodology that we have developed is presented and discussed. The paper draws on a series of miniâcase studies from eâlearning projects undertaken over the past 10 years at the Open University
ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
Reliable authentication requires the devices and
channels involved in the process to be trustworthy; otherwise
authentication secrets can easily be compromised. Given the
unceasing efforts of attackers worldwide such trustworthiness
is increasingly not a given. A variety of technical solutions,
such as utilising multiple devices/channels and verification
protocols, has the potential to mitigate the threat of untrusted
communications to a certain extent. Yet such technical solutions
make two assumptions: (1) users have access to multiple
devices and (2) attackers will not resort to hacking the human,
using social engineering techniques. In this paper, we propose
and explore the potential of using human-based computation
instead of solely technical solutions to mitigate the threat of
untrusted devices and channels. ZeTA (Zero Trust Authentication
on untrusted channels) has the potential to allow people to
authenticate despite compromised channels or communications
and easily observed usage. Our contributions are threefold:
(1) We propose the ZeTA protocol with a formal definition
and security analysis that utilises semantics and human-based
computation to ameliorate the problem of untrusted devices
and channels. (2) We outline a security analysis to assess
the envisaged performance of the proposed authentication
protocol. (3) We report on a usability study that explores the
viability of relying on human computation in this context
Data-Driven User Behavior Evaluation
Automotive Original Equipment Manufacturers (OEMs) compete worldwide to stand out with new trends and technologies. Automated Driver Assistance Systems (ADAS) are an example of advanced solutions where a lot of effort is put into the development and utilization of vehicle data. ADAS systems range from different types of information/warning systems to adaptive functions designed to assist the driver in the driving tasks and ensure more efficient and comfortable driving. These types of systems have become standard at many OEMs, including Tesla, Cadillac, BMW, Mercedes, Volvo Cars, and others. Volvo Cars is well-known for the development of such ADAS functions as ACC (Adaptive Cruise Control) and PA (Pilot Assist). These functions offer lateral and/or longitudinal support, but leave the driver in full control and with responsibility for the driving task.The ADAS systems are not fully automated. These systems have a number of limitations related to the context where they can operate. Previous studies have demonstrated that the driversâ understanding and adoption of these systems is not definite and may vary from full technology acceptance to complete ignorance. Therefore, in-depth understanding and interpretation of driver behavior and needs regarding the use of ADAS can significantly help developers to reflect on and improve the systems to meet the usersâ expectations. Recently, the availability of data coming from the in-vehicle sensors network has increased significantly. The amount of received data potentially enables the in-depth quantitative driver behavior evaluation in a time-efficient and reliable way. Moreover, the ability of vehicle sensors and actuator data to synchronize the driver and system performance and assess the driving conditions in the moment of driver-system interaction can contribute to the comprehensive context-aware ADAS evaluation.\ua0 Developing methods for objective assessment of driver behavior is a task with a high level of complexity. This process requires (i) investigation of the driver behavior assessment area where vehicle data can be useful; (ii) identification of the influencing factors for evaluating ADAS functions; (iii) definition of the relevant data for the data-driven driver behavior evaluation; (iv) investigation of the ways to improve the feasibility of vehicle data. The research presented in this thesis focuses on the understanding of vehicle data applicability in user-related studies. The core of this research is the methodology for objective ADAS evaluation and a mixed-method approach that helps to integrate the quantitative methodologies into existing, mainly qualitative, evaluation practices.The conducted research revealed that vehicle data offers the possibility to determine individual user behavior, and to describe, categorize, and compare this to the average within a group. All of the above mentioned makes the applicability of vehicle data for user-related studies meaningful
- âŠ