323,000 research outputs found
Secure webs and buying intention: the moderating role of usability
El presente trabajo ha planteado un modelo conceptual a fin de mostrar como los antecedentes de la intención de
compra se ven reforzados en contextos de Webs altamente usables. Específicamente, el trabajo analiza en
profundidad el rol moderador de la usabilidad en la explicación de la conexión entre seguridad de una Web e
intención de compra. Entre ambos extremos (seguridad e intención de compra), se han incluido diversas
variables para explicar mejor su conexión. Para ello, ha sido diseñada una Web ficticia de ropa dirigida al
segmento joven de clase media. A fin de alterar la usabilidad de la Web se han realizado dos tipos de
manipulaciones: la velocidad y la facilidad de uso de la Web. Las dos Webs creadas (alta usabilidad y baja
usabilidad) fueron visitadas por un total de 170 encuestados que fueron compensados con un USB valorado en
15 euros. Los resultados muestran que la seguridad percibida en la Web acarrea tres interesantes efectos
(especialmente para la Web altamente usable): (i) mejora las actitudes agrado, (ii) reduce el nivel de riesgo
percibido; (iii) aumenta la confianza. Los dos últimos efectos, a su vez, acaban aumentando la intención de
compra.. Por último, se ha demostrado que la usabilidad, efectivamente, refuerza las relaciones consideradas en
el modelo propuesto para explicar la intención de compra.A conceptual model has been proposed to show how buying intention antecedents are reinforced in highly usable
contexts. Specifically, this paper deeply analyses the moderator role of system variables (usability) on explaining
the relationship between Web security and buying intention. Between both extremes (security and buying
intention), several relationships have also been stated to better explain this effect. An “ideal” fictitious Website
was designed for a non existent clothing company directed at the segment of middle class consumers. In order to
alter Web usability, two blocks of changes were made, one concerning Website speed and the other related to
ease of use. Our experiment sample consisted of 170 respondents who participated in exchange for a pen-drive
(USB) valued at 15 euros. The results show that improving website security has three interesting effects
(especially in high usable contexts): (i) it improves pleasure attitudes, (ii) reduces the level of perceived risk and
(iii) increases trust. Secondly, it has been found that to increase buying intention, two actions must be taken: (i)
to diminish perceived risk and (ii) to improve users’ pleasure attitudes towards the Website. Finally, usability has
been found to have a moderating role in all the relationships considered (reinforcing them)
Connecting Beyond The Circle: A Restorative Approach in Co-Creating a Safe Space for Social Justice Education at UTEC
“Social justice is both a process and a goal. The goal of social justice education is full and equal participation of all groups in a community that is [co-created] to meet the members’ needs. Social justice includes a vision of a community that is equitable and all members are physically and psychologically safe and secure” (Adams, Bell, & Griffin, 2007, p. 1). In the process, one is used to going straight to issues of social justice before connecting by building trusts and relationships. This Course-Linked Capstone in Training focuses on SIT Graduate Institute coursework from Training Design in Experiential Learning and Training of Trainers: Ethics & Intercultural Design, presenting challenges in designing and facilitating social justice education workshops for young adults impacted by the criminal justice system and trauma, as well as the adults who want to support them. Workshops occurred bi-monthly over a 20-month period at UTEC in Lowell, Massachusetts. The non-profit organization’s population and staff are diverse in race but not in structural power. This impact in implementing social justice education workshops within the organization is examined. Methods include data of target participants, observational research, and reflective analysis of theory-to-practice experiences through storytelling to portray use of needs assessments, power dynamics, and triggers and bias from identities as a social justice educator. A restorative process model connected by circle processes and experiential learning towards the goal of social justice education is presented. Conclusions include ethical implications, lessons learned, and competency building as a reflective training and social justice practitioner.
Keywords: training, facilitation, design, experiential learning, social justice, restorative, education, ethics, power, bias, identity, race, trauma, young adult
Assessing overall network structure in regional innovation policies: a case study of cluster policy in the West Midlands in the UK
Revisiting the theoretical roots of the key concepts of “embeddedness” and “networks” that underpin many recent regional innovation polices, this paper strives to achieve a more systematic understanding of the overall network structure of geographic agglomerations, which helps to form a more convincing model of regional development based on learning. This also helps to establish an analytical framework with indicators to assess the overall network structure in regional innovation policies. Employing the framework, the examination of cluster policy in the West Midlands highlights its weakness in addressing the overall cluster network structure and the contingent factors influencing the structure. The analysis suggests that there may be similar weaknesses in other regional innovation policies and the theories underpinning them as they share a common weakness in addressing the structural characteristics of overall networks
On Properties of Policy-Based Specifications
The advent of large-scale, complex computing systems has dramatically
increased the difficulties of securing accesses to systems' resources. To
ensure confidentiality and integrity, the exploitation of access control
mechanisms has thus become a crucial issue in the design of modern computing
systems. Among the different access control approaches proposed in the last
decades, the policy-based one permits to capture, by resorting to the concept
of attribute, all systems' security-relevant information and to be, at the same
time, sufficiently flexible and expressive to represent the other approaches.
In this paper, we move a step further to understand the effectiveness of
policy-based specifications by studying how they permit to enforce traditional
security properties. To support system designers in developing and maintaining
policy-based specifications, we formalise also some relevant properties
regarding the structure of policies. By means of a case study from the banking
domain, we present real instances of such properties and outline an approach
towards their automatised verification.Comment: In Proceedings WWV 2015, arXiv:1508.0338
Combined automotive safety and security pattern engineering approach
Automotive systems will exhibit increased levels of automation as well as ever tighter integration with other vehicles, traffic infrastructure, and cloud services. From safety perspective, this can be perceived as boon or bane - it greatly increases complexity and uncertainty, but at the same time opens up new opportunities for realizing innovative safety functions. Moreover, cybersecurity becomes important as additional concern because attacks are now much more likely and severe. However, there is a lack of experience with security concerns in context of safety engineering in general and in automotive safety departments in particular. To address this problem, we propose a systematic pattern-based approach that interlinks safety and security patterns and provides guidance with respect to selection and combination of both types of patterns in context of system engineering. A combined safety and security pattern engineering workflow is proposed to provide systematic guidance to support non-expert engineers based on best practices. The application of the approach is shown and demonstrated by an automotive case study and different use case scenarios.EC/H2020/692474/EU/Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems/AMASSEC/H2020/737422/EU/Secure COnnected Trustable Things/SCOTTEC/H2020/732242/EU/Dependability Engineering Innovation for CPS - DEIS/DEISBMBF, 01IS16043, Collaborative Embedded Systems (CrESt
- …