16,260 research outputs found
Motivation, Design, and Ubiquity: A Discussion of Research Ethics and Computer Science
Modern society is permeated with computers, and the software that controls
them can have latent, long-term, and immediate effects that reach far beyond
the actual users of these systems. This places researchers in Computer Science
and Software Engineering in a critical position of influence and
responsibility, more than any other field because computer systems are vital
research tools for other disciplines. This essay presents several key ethical
concerns and responsibilities relating to research in computing. The goal is to
promote awareness and discussion of ethical issues among computer science
researchers. A hypothetical case study is provided, along with questions for
reflection and discussion.Comment: Written as central essay for the Computer Science module of the
LANGURE model curriculum in Research Ethic
Evaluating Security and Usability of Profile Based Challenge Questions Authentication in Online Examinations
© 2014 Ullah et al.; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.Student authentication in online learning environments is an increasingly challenging issue due to the inherent absence of physical interaction with online users and potential security threats to online examinations. This study is part of ongoing research on student authentication in online examinations evaluating the potential benefits of using challenge questions. The authors developed a Profile Based Authentication Framework (PBAF), which utilises challenge questions for students’ authentication in online examinations. This paper examines the findings of an empirical study in which 23 participants used the PBAF including an abuse case security analysis of the PBAF approach. The overall usability analysis suggests that the PBAF is efficient, effective and usable. However, specific questions need replacement with suitable alternatives due to usability challenges. The results of the current research study suggest that memorability, clarity of questions, syntactic variation and question relevance can cause usability issues leading to authentication failure. A configurable traffic light system was designed and implemented to improve the usability of challenge questions. The security analysis indicates that the PBAF is resistant to informed guessing in general, however, specific questions were identified with security issues. The security analysis identifies challenge questions with potential risks of informed guessing by friends and colleagues. The study was performed with a small number of participants in a simulation online course and the results need to be verified in a real educational context on a larger sample sizePeer reviewedFinal Published versio
Recommended from our members
Representation Effects and Loss Aversion in Analytical Behaviour: An Experimental Study into Decision Making Facilitated by Visual Analytics
This paper presents the results of an experiment into the relationship between the representation of data and decision-making. Three hundred participants online, were asked to choose between a series of financial investment opportunities using data presented in line charts. A single dependent variable of investment choice was examined over four levels of varying display conditions and randomised data. Three variations to line chart visualisations provided a controlled factor between subjects divided into three groups; -˜standard’ line charts, -˜tall’ line charts, and one dual-series line chart. The final results revealed a consistent main effect and two other interactions between certain display conditions and decision-making. The findings of this paper are significant to the study visualisation and to the field of visual analytics. This experiment was devised as part of a study into Analytical Behaviour, defined as decision-making facilitated by visual analytics - a new topic that encompasses existing research and real-world applications
Pedestrian Flow Simulation Validation and Verification Techniques
For the verification and validation of microscopic simulation models of
pedestrian flow, we have performed experiments for different kind of facilities
and sites where most conflicts and congestion happens e.g. corridors, narrow
passages, and crosswalks. The validity of the model should compare the
experimental conditions and simulation results with video recording carried out
in the same condition like in real life e.g. pedestrian flux and density
distributions. The strategy in this technique is to achieve a certain amount of
accuracy required in the simulation model. This method is good at detecting the
critical points in the pedestrians walking areas. For the calibration of
suitable models we use the results obtained from analyzing the video recordings
in Hajj 2009 and these results can be used to check the design sections of
pedestrian facilities and exits. As practical examples, we present the
simulation of pilgrim streams on the Jamarat bridge.
The objectives of this study are twofold: first, to show through verification
and validation that simulation tools can be used to reproduce realistic
scenarios, and second, gather data for accurate predictions for designers and
decision makers.Comment: 19 pages, 10 figure
- …