91,255 research outputs found

    Why do People Adopt, or Reject, Smartphone Security Tools?

    Get PDF
    A large variety of security tools exist for Smartphones, to help their owners to secure the phones and prevent unauthorised others from accessing their data and services. These range from screen locks to antivirus software to password managers. Yet many Smartphone owners do not use these tools despite their being free and easy to use. We were interested in exploring this apparent anomaly. A number of researchers have applied existing models of behaviour from other disciplines to try to understand these kinds of behaviours in a security context, and a great deal of research has examined adoption of screen locking mechanisms. We review the proposed models and consider how they might fail to describe adoption behaviours. We then present the Integrated Model of Behaviour Prediction (IMBP), a richer model than the ones tested thus far. We consider the kinds of factors that could be incorporated into this model in order to understand Smartphone owner adoption, or rejection, of security tools. The model seems promising, based on existing literature, and we plan to test its efficacy in future studies

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    M-health review: joining up healthcare in a wireless world

    Get PDF
    In recent years, there has been a huge increase in the use of information and communication technologies (ICT) to deliver health and social care. This trend is bound to continue as providers (whether public or private) strive to deliver better care to more people under conditions of severe budgetary constraint

    Modelling the User: How design for sustainable behaviour can reveal different stakeholder perspectives on human nature

    Get PDF
    Copyright @ 2010 TU DelftInfluencing more environmentally friendly and sustainable behaviour is a current focus of many projects, ranging from government social marketing campaigns, education and tax structures to designers’ work on interactive products, services and environments. There is a wide variety of techniques and methods used—we have identified over 100 design patterns in our Design with Intent toolkit—each intended to work via a particular set of cognitive and environmental principles. These approaches make different assumptions about ‘what people are like’: how users will respond to behavioural interventions, and why, and in the process reveal some of the assumptions that designers and other stakeholders, such as clients commissioning a project, make about human nature. In this paper, we discuss three simple models of user behaviour—the Pinball, the Shortcut and the Thoughtful—which emerge from user experience designers’ statements about users while focused on designing for behaviour change. We characterise these models using systems terminology and examine the application of each model to design for sustainable behaviour via a series of examples

    Valuing capabilities in later life

    Get PDF
    This research report examines, from the perspective of the Brotherhood’s aged service users, what they value in life, what enables them to live fulfilled and meaningful lives, and what Brotherhood aged services can contribute to this. With its accent on freedoms, opportunities and human rights, the capability approach provides a conceptual framework in which to consider a new model of aged services in which will enhance older adults’ human rights and capabilities, especially for those who have been disadvantaged, and ensure that their views continue to inform and shape ageing policies, services and models of practice. The central concern of the capability approach, first articulated by Amartya Sen (1979) and developed by Martha Nussbaum within a social justice and human rights framework, is the opportunities people have for being and doing what, for them, constitutes a good life. Taking this as the starting point, this research represents the first part of a larger study which will examine what users of Brotherhood aged services value in life, what capabilities they aspire to, how current services enhance capabilities and how the capability approach might be integrated into service provision. Image: Report Cove

    Scottish subject benchmark statement: nursing

    Get PDF

    The Scaling Mindset – Shifting from Problems to Solutions. Insights from the Review of CCAFS Scaling Activities, 2019

    Get PDF
    In the frame of the review of CCAFS scaling activities in 2019, 21 project leaders and –implementers were interviewed about their scaling processes, touching a series of aspects that had been identified as crucial and/or critical by earlier research. Results were analysed with a systemic approach, to draw organisational learnings. The findings were validated with CCAFS core team during their Scaling Workshop in Madrid, May 2019, in which the Core Team also prioritized its programmatic areas of response. This working paper captures the main insights and learnings from both the interviews on project level, followed by the results’ analysis. It then summarized the Core Team workshop’s main discussion points and shortly outlines the programmatic areas of response that CCAFS identified. The learnings and insights on the realities of scaling agricultural innovations presented in this working paper can provide a rich basis for further synthesis and/or deeper research on the different aspects of innovation development and scaling
    corecore