242,359 research outputs found

    Why Do People Adopt, or Reject, Smartphone Password Managers?

    Get PDF
    People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time consuming and arduous on small devices. Many of the memory- and inconvenience-related issues can be ameliorated by using a password manager app. Such an app can generate, remember and automatically supply passwords to websites and other apps on the phone. Given this potential, it is unfortunate that these applications have not enjoyed widespread adoption. We carried out a study to find out why this was so, to investigate factors that impeded or encouraged password manager adoption. We found that a number of factors mediated during all three phases of adoption: searching, deciding and trialling. The study’s findings will help us to market these tools more effectively in order to encourage future adoption of password managers

    Cloud based testing of business applications and web services

    Get PDF
    This paper deals with testing of applications based on the principles of cloud computing. It is aimed to describe options of testing business software in clouds (cloud testing). It identifies the needs for cloud testing tools including multi-layer testing; service level agreement (SLA) based testing, large scale simulation, and on-demand test environment. In a cloud-based model, ICT services are distributed and accessed over networks such as intranet or internet, which offer large data centers deliver on demand, resources as a service, eliminating the need for investments in specific hardware, software, or on data center infrastructure. Businesses can apply those new technologies in the contest of intellectual capital management to lower the cost and increase competitiveness and also earnings. Based on comparison of the testing tools and techniques, the paper further investigates future trend of cloud based testing tools research and development. It is also important to say that this comparison and classification of testing tools describes a new area and it has not yet been done

    Security Code Smells in Android ICC

    Get PDF
    Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps. To promote secure programming practices, we have reviewed related research, and identified avoidable ICC vulnerabilities in Android-run devices and the security code smells that indicate their presence. We explain the vulnerabilities and their corresponding smells, and we discuss how they can be eliminated or mitigated during development. We present a lightweight static analysis tool on top of Android Lint that analyzes the code under development and provides just-in-time feedback within the IDE about the presence of such smells in the code. Moreover, with the help of this tool we study the prevalence of security code smells in more than 700 open-source apps, and manually inspect around 15% of the apps to assess the extent to which identifying such smells uncovers ICC security vulnerabilities.Comment: Accepted on 28 Nov 2018, Empirical Software Engineering Journal (EMSE), 201

    Electronic Reverse Auctions: Spawning Procurement Innovation in the Context of Arab Culture

    Get PDF
    Government e-procurement initiatives have the potential to transform local institutions, but few studies have been published of strategies for implementing specific e-procurement tools, particularly involving procurement by a foreign government adapting to local culture in the Middle East/North Africa (MENA). This case describes procurement at a forward operating base (FOB) in Kuwait in support of operations in Iraq. The government procurers had to deal with a phenomenon unique to the MENA region: wasta. Wasta is a form of social capital that bestows power, influence, and connection to those who possess it, similar to guanxi in China. This study explores the value proposition and limitations of electronic reverse auctions (eRA) with the purpose of sharing best practices and lessons learned for government procurement in a MENA country. The public value framework provides valuable theoretical insights for the implementation of a new government e-procurement tool in a foreign country. In a culture dominated by wasta, the suppliers enjoyed the transparency and merit-based virtues of eRA’s that transferred successfully into the new cultural milieu: potential to increase transparency, competition, efficiency, and taxpayer savings. The practices provided herein are designed specifically to help buyers overcome structural barriers including training, organizational inertia, and a lack of eRA policy and guidance while implementing a new e-procurement tool in a foreign country

    If you build it, will they come? How researchers perceive and use web 2.0

    Get PDF
    Over the past 15 years, the web has transformed the way we seek and use information. In the last 5 years in particular a set of innovative techniques – collectively termed ‘web 2.0’ – have enabled people to become producers as well as consumers of information. It has been suggested that these relatively easy-to-use tools, and the behaviours which underpin their use, have enormous potential for scholarly researchers, enabling them to communicate their research and its findings more rapidly, broadly and effectively than ever before. This report is based on a study commissioned by the Research Information Network to investigate whether such aspirations are being realised. It seeks to improve our currently limited understanding of whether, and if so how, researchers are making use of various web 2.0 tools in the course of their work, the factors that encourage or inhibit adoption, and researchers’ attitudes towards web 2.0 and other forms of communication. Context: How researchers communicate their work and their findings varies in different subjects or disciplines, and in different institutional settings. Such differences have a strong influence on how researchers approach the adoption – or not – of new information and communications technologies. It is also important to stress that ‘web 2.0’ encompasses a wide range of interactions between technologies and social practices which allow web users to generate, repurpose and share content with each other. We focus in this study on a range of generic tools – wikis, blogs and some social networking systems – as well as those designed specifically by and for people within the scholarly community. Method: Our study was designed not only to capture current attitudes and patterns of adoption but also to identify researchers’ needs and aspirations, and problems that they encounter. We began with an online survey, which collected information about researchers’ information gathering and dissemination habits and their attitudes towards web 2.0. This was followed by in-depth, semi-structured interviews with a stratified sample of survey respondents to explore in more depth their experience of web 2.0, including perceived barriers as well as drivers to adoption. Finally, we undertook five case studies of web 2.0 services to investigate their development and adoption across different communities and business models. Key findings: Our study indicates that a majority of researchers are making at least occasional use of one or more web 2.0 tools or services for purposes related to their research: for communicating their work; for developing and sustaining networks and collaborations; or for finding out about what others are doing. But frequent or intensive use is rare, and some researchers regard blogs, wikis and other novel forms of communication as a waste of time or even dangerous. In deciding if they will make web 2.0 tools and services part of their everyday practice, the key questions for researchers are the benefits they may secure from doing so, and how it fits with their use of established services. Researchers who use web 2.0 tools and services do not see them as comparable to or substitutes for other channels and means of communication, but as having their own distinctive role for specific purposes and at particular stages of research. And frequent use of one kind of tool does not imply frequent use of others as well

    Report of the user requirements and web based access for eResearch workshops

    Get PDF
    The User Requirements and Web Based Access for eResearch Workshop, organized jointly by NeSC and NCeSS, was held on 19 May 2006. The aim was to identify lessons learned from e-Science projects that would contribute to our capacity to make Grid infrastructures and tools usable and accessible for diverse user communities. Its focus was on providing an opportunity for a pragmatic discussion between e-Science end users and tool builders in order to understand usability challenges, technological options, community-specific content and needs, and methodologies for design and development. We invited members of six UK e-Science projects and one US project, trying as far as possible to pair a user and developer from each project in order to discuss their contrasting perspectives and experiences. Three breakout group sessions covered the topics of user-developer relations, commodification, and functionality. There was also extensive post-meeting discussion, summarized here. Additional information on the workshop, including the agenda, participant list, and talk slides, can be found online at http://www.nesc.ac.uk/esi/events/685/ Reference: NeSC report UKeS-2006-07 available from http://www.nesc.ac.uk/technical_papers/UKeS-2006-07.pd
    • 

    corecore