7,102 research outputs found

    You never surf alone. Ubiquitous tracking of users' browsing habits

    Get PDF
    In the early age of the internet users enjoyed a large level of anonymity. At the time web pages were just hypertext documents; almost no personalisation of the user experience was o ered. The Web today has evolved as a world wide distributed system following specific architectural paradigms. On the web now, an enormous quantity of user generated data is shared and consumed by a network of applications and services, reasoning upon users expressed preferences and their social and physical connections. Advertising networks follow users' browsing habits while they surf the web, continuously collecting their traces and surfing patterns. We analyse how users tracking happens on the web by measuring their online footprint and estimating how quickly advertising networks are able to pro le users by their browsing habits

    Web log file analysis: backlinks and queries

    Get PDF
    As has been described else where, web log files are a useful source of information about visitor site use, navigation behaviour, and, to some extent, demographics. But log files can also reveal the existence of both web pages and search engine queries that are sources of new visitors.This study extracts such information from a single web log files and uses it to illustrate its value, not only to th site owner but also to those interested in investigating the online behaviour of web users

    Integration of Multimedia Interactive Web Tools with In-Class Active Learning

    Get PDF
    In this paper, we present our experience with an introduction to engineering course in which we used a combination of active and collaborative teaching methods, multimedia web-based material, and web-based interactive tools. The students were engaged in active learning in class with methods such as demonstrations, hands-on work, and group work. After class, the students used the web-based material that we developed, such as multiple choice quizzes, interactive applets, and animations. We have also developed a number of web-based course management tools that were used by the course instructors. We conclude that both the students and instructors had a very positive experience from using this combination of methods

    Lex Informatica: The Formulation of Information Policy Rules through Technology

    Get PDF
    Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a “Lex Informatica” that policymakers must understand, consciously recognize, and encourage

    New generation E-learning technology by Web Services.

    Get PDF
    This paper discusses a new approach to build infrastructures for E-Learning systems for Learning Software Organizations on the basis of Web Services. A requirements context is developed to determine which type of E-Learning applications that can be Web Service Enabled. This is illustrated with a case study on an Encapsulated Software Teaching Environment. Additional facilities, such as didactical agents and deep personalization to facilitate Learning Software Organizations are discussed at the end.

    Oceanographic Considerations for the Management and Protection of Surfing Breaks

    Get PDF
    Although the physical characteristics of surfing breaks are well described in the literature, there is little specific research on surfing and coastal management. Such research is required because coastal engineering has had significant impacts to surfing breaks, both positive and negative. Strategic planning and environmental impact assessment methods, a central tenet of integrated coastal zone management (ICZM), are recommended by this thesis to maximise surfing amenities. The research reported here identifies key oceanographic considerations required for ICZM around surfing breaks including: surfing wave parameters; surfing break components; relationship between surfer skill, surfing manoeuvre type and wave parameters; wind effects on waves; currents; geomorphic surfing break categorisation; beach-state and morphology; and offshore wave transformations. Key coastal activities that can have impacts to surfing breaks are identified. Environmental data types to consider during coastal studies around surfing breaks are presented and geographic information systems (GIS) are used to manage and interpret such information. To monitor surfing breaks, a shallow water multibeam echo sounding system was utilised and a RTK GPS water level correction and hydrographic GIS methodology developed. Including surfing in coastal management requires coastal engineering solutions that incorporate surfing. As an example, the efficacy of the artificial surfing reef (ASR) at Mount Maunganui, New Zealand, was evaluated. GIS, multibeam echo soundings, oceanographic measurements, photography, and wave modelling were all applied to monitor sea floor morphology around the reef. Results showed that the beach-state has more cellular circulation since the reef was installed, and a groin effect on the offshore bar was caused by the structure within the monitoring period, trapping sediment updrift and eroding sediment downdrift. No identifiable shoreline salient was observed. Landward of the reef, a scour hole ~3 times the surface area of the reef has formed. The current literature on ASRs has primarily focused on reef shape and its role in creating surfing waves. However, this study suggests that impacts to the offshore bar, beach-state, scour hole and surf zone hydrodynamics should all be included in future surfing reef designs. More real world reef studies, including ongoing monitoring of existing surfing reefs are required to validate theoretical concepts in the published literature

    Handling Human Hacking: Creating a Comprehensive Defensive Strategy Against Modern Social Engineering

    Get PDF
    Social engineering is one of the most devastating threats to any company or business. Rather than relying upon technical flaws in order to break into computer networks, social engineers utilize a suave personality in order to deceive individuals through clever conversation. These devious conversations frequently provide the attacker with sufficient information to compromise the company’s computer network. Unlike common technical attacks, social engineering attacks cannot be prevented by security tools and software. Instead of attacking a network directly, a social engineer exploits human psychology in order to coerce the victim to inadvertently divulge sensitive information. Further complicating the issue, the rise in popularity of social media has vastly increased the arsenal of information available to the social engineer to utilize when targeting individuals. Ultimately, this paper will describe the danger posed by social engineering attacks before detailing a comprehensive strategy to defend against the threat, accounting specifically for the dangers posed by social media and psychology
    corecore