1,990 research outputs found
Once IS Enough: Single Sign-On
For eons, passwords have been the gatekeepers to information and data located that is behind a ‘locked door’ or stored in a secret location. It is no different today, as passwords are a key to secrets, however, what is different today is the number of passwords that one needs to construct, recall and keep safe. This multiplicity has created a memory overload for the user, less secure passwords, and often, a strain on computer help-desk staff.
Password technologies that reduce the need for multiple passwords are evolving; their developers claim that the technologies lessen the security risk to a system due to a reduction in the number of passwords required to get through the day-to-day work of a 21st century citizen. Smart cards, biometric devices, and Single Sign-On (SSO) systems are the most promoted alternatives. Specifically, Single Sign-On password systems are of interest to the study presented here. Single Sign-On allows end users to access multiple services and systems with a single username and password, therefore reducing the cognitive load on the end user and thus supposedly, reducing end user frustration which is turn reduces password-related security risks.
This paper presents the results of a study conducted within two businesses that explored the influence SSO password systems have on system security
The History of the iPad
The purpose of this paper is to review the history of the iPad and its influence over contemporary computing. Although the iPad is relatively new, the tablet computer is having a long and lasting affect on how we communicate. With this essay, I attempt to review the technologies that emerged and converged to create the tablet computer. Of course, Apple and its iPad are at the center of this new computing movement
Denotation and connotation in the human-computer interface: The ‘Save as...’ command
This paper presents a semiotic technique as a means
of exploring meaning and understanding in interface design
and use. This is examined through a study of the interaction
between the ‘file’ metaphor and ‘save as’ command metaphor.
The behaviour of these (from a functional or computational
basis) do not exactly match, or map onto, the meaning of the
metaphor. We examine both the denotation of a term to the
user, i.e. its literal meaning to that person, and the term’s
connotations, i.e. any other meanings associated with the term.
We suggest that the technique applied is useful in predicting
future problems with understanding the use of metaphor at the
interface and with designing appropriate signification for
human-computer interaction. Variation in connotation was
expected but a more fundamental difference in denotation was
also uncovered. Moreover, the results clearly demonstrate that
consistency in the denotation of a term is critical in achieving a
good user understanding of the command
Models and methods for economic policy; 60 years of evolution at CPB
The Netherlands Bureau for Economic Policy Analysis (CPB) has been involved in econometric model building since its foundation in 1945. During the 60 years of model building and use reviewed in this Discussion Paper, CPB's models have evolved significantly. Over this period, a shift of emphasis can be observed from econometrics and empiricism to economic theory. New questions from policymakers and new features in the national economy have guided research, while new developments in econometrics and economic theory were taken on board wherever they helped to improve the quality and scope of the analysis. Although considerable progress has been achieved in several spheres, the models continue to be riddled with some long-standing limitations and weaknesses which the model users should take into account.
Spartan Daily, October 21, 2008
Volume 131, Issue 29https://scholarworks.sjsu.edu/spartandaily/10513/thumbnail.jp
- …