323,000 research outputs found

    Secure webs and buying intention: the moderating role of usability

    Get PDF
    El presente trabajo ha planteado un modelo conceptual a fin de mostrar como los antecedentes de la intención de compra se ven reforzados en contextos de Webs altamente usables. Específicamente, el trabajo analiza en profundidad el rol moderador de la usabilidad en la explicación de la conexión entre seguridad de una Web e intención de compra. Entre ambos extremos (seguridad e intención de compra), se han incluido diversas variables para explicar mejor su conexión. Para ello, ha sido diseñada una Web ficticia de ropa dirigida al segmento joven de clase media. A fin de alterar la usabilidad de la Web se han realizado dos tipos de manipulaciones: la velocidad y la facilidad de uso de la Web. Las dos Webs creadas (alta usabilidad y baja usabilidad) fueron visitadas por un total de 170 encuestados que fueron compensados con un USB valorado en 15 euros. Los resultados muestran que la seguridad percibida en la Web acarrea tres interesantes efectos (especialmente para la Web altamente usable): (i) mejora las actitudes agrado, (ii) reduce el nivel de riesgo percibido; (iii) aumenta la confianza. Los dos últimos efectos, a su vez, acaban aumentando la intención de compra.. Por último, se ha demostrado que la usabilidad, efectivamente, refuerza las relaciones consideradas en el modelo propuesto para explicar la intención de compra.A conceptual model has been proposed to show how buying intention antecedents are reinforced in highly usable contexts. Specifically, this paper deeply analyses the moderator role of system variables (usability) on explaining the relationship between Web security and buying intention. Between both extremes (security and buying intention), several relationships have also been stated to better explain this effect. An “ideal” fictitious Website was designed for a non existent clothing company directed at the segment of middle class consumers. In order to alter Web usability, two blocks of changes were made, one concerning Website speed and the other related to ease of use. Our experiment sample consisted of 170 respondents who participated in exchange for a pen-drive (USB) valued at 15 euros. The results show that improving website security has three interesting effects (especially in high usable contexts): (i) it improves pleasure attitudes, (ii) reduces the level of perceived risk and (iii) increases trust. Secondly, it has been found that to increase buying intention, two actions must be taken: (i) to diminish perceived risk and (ii) to improve users’ pleasure attitudes towards the Website. Finally, usability has been found to have a moderating role in all the relationships considered (reinforcing them)

    Connecting Beyond The Circle: A Restorative Approach in Co-Creating a Safe Space for Social Justice Education at UTEC

    Get PDF
    “Social justice is both a process and a goal. The goal of social justice education is full and equal participation of all groups in a community that is [co-created] to meet the members’ needs. Social justice includes a vision of a community that is equitable and all members are physically and psychologically safe and secure” (Adams, Bell, & Griffin, 2007, p. 1). In the process, one is used to going straight to issues of social justice before connecting by building trusts and relationships. This Course-Linked Capstone in Training focuses on SIT Graduate Institute coursework from Training Design in Experiential Learning and Training of Trainers: Ethics & Intercultural Design, presenting challenges in designing and facilitating social justice education workshops for young adults impacted by the criminal justice system and trauma, as well as the adults who want to support them. Workshops occurred bi-monthly over a 20-month period at UTEC in Lowell, Massachusetts. The non-profit organization’s population and staff are diverse in race but not in structural power. This impact in implementing social justice education workshops within the organization is examined. Methods include data of target participants, observational research, and reflective analysis of theory-to-practice experiences through storytelling to portray use of needs assessments, power dynamics, and triggers and bias from identities as a social justice educator. A restorative process model connected by circle processes and experiential learning towards the goal of social justice education is presented. Conclusions include ethical implications, lessons learned, and competency building as a reflective training and social justice practitioner. Keywords: training, facilitation, design, experiential learning, social justice, restorative, education, ethics, power, bias, identity, race, trauma, young adult

    Assessing overall network structure in regional innovation policies: a case study of cluster policy in the West Midlands in the UK

    Get PDF
    Revisiting the theoretical roots of the key concepts of “embeddedness” and “networks” that underpin many recent regional innovation polices, this paper strives to achieve a more systematic understanding of the overall network structure of geographic agglomerations, which helps to form a more convincing model of regional development based on learning. This also helps to establish an analytical framework with indicators to assess the overall network structure in regional innovation policies. Employing the framework, the examination of cluster policy in the West Midlands highlights its weakness in addressing the overall cluster network structure and the contingent factors influencing the structure. The analysis suggests that there may be similar weaknesses in other regional innovation policies and the theories underpinning them as they share a common weakness in addressing the structural characteristics of overall networks

    On Properties of Policy-Based Specifications

    Get PDF
    The advent of large-scale, complex computing systems has dramatically increased the difficulties of securing accesses to systems' resources. To ensure confidentiality and integrity, the exploitation of access control mechanisms has thus become a crucial issue in the design of modern computing systems. Among the different access control approaches proposed in the last decades, the policy-based one permits to capture, by resorting to the concept of attribute, all systems' security-relevant information and to be, at the same time, sufficiently flexible and expressive to represent the other approaches. In this paper, we move a step further to understand the effectiveness of policy-based specifications by studying how they permit to enforce traditional security properties. To support system designers in developing and maintaining policy-based specifications, we formalise also some relevant properties regarding the structure of policies. By means of a case study from the banking domain, we present real instances of such properties and outline an approach towards their automatised verification.Comment: In Proceedings WWV 2015, arXiv:1508.0338

    Combined automotive safety and security pattern engineering approach

    Get PDF
    Automotive systems will exhibit increased levels of automation as well as ever tighter integration with other vehicles, traffic infrastructure, and cloud services. From safety perspective, this can be perceived as boon or bane - it greatly increases complexity and uncertainty, but at the same time opens up new opportunities for realizing innovative safety functions. Moreover, cybersecurity becomes important as additional concern because attacks are now much more likely and severe. However, there is a lack of experience with security concerns in context of safety engineering in general and in automotive safety departments in particular. To address this problem, we propose a systematic pattern-based approach that interlinks safety and security patterns and provides guidance with respect to selection and combination of both types of patterns in context of system engineering. A combined safety and security pattern engineering workflow is proposed to provide systematic guidance to support non-expert engineers based on best practices. The application of the approach is shown and demonstrated by an automotive case study and different use case scenarios.EC/H2020/692474/EU/Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems/AMASSEC/H2020/737422/EU/Secure COnnected Trustable Things/SCOTTEC/H2020/732242/EU/Dependability Engineering Innovation for CPS - DEIS/DEISBMBF, 01IS16043, Collaborative Embedded Systems (CrESt
    corecore