91,602 research outputs found

    Users are not the enemy

    Get PDF
    Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security. In a recent study, we found that users may indeed compromise computer security mechanisms, such as password authentication, both knowing and unknowingly. A closer analysis, however, revealed that such behavior is often caused by the way in which security mechanisms are implemented, and users ’ lack of knowledge. We argue that to change this state of affairs, security departments need to communicate more with users, and adopt a user-centered design approach

    Perancangan Game Shoot Enemy Planes Menggunakan Adobe Flash Cs3

    Full text link
    Currently, computers are not only used as a tool for the job, but also as a medium to entertain, one of the most popular entertainment is gaming computer users. So that computer users will not be bored and tired to linger - long in front of the computer.This game can be played by childrens and adults with ease, because it uses the directional keys located on the keyboard to move. At the left side of the computer screen will be described as a plane that will shoot enemies coming, aircraft played by players must be protected from enemy attack that will attack from the right computer screen, the player enough to come shoot the enemy planes, players can play up to 3 times if life were available there. Every shot that hit the enemy plane will get a point. This game also has a level of difficulty based on the level, the higher the level is played the more difficult hurdles to be faced. Level will rise if the level of the previous missions successfully passed or completed. The mission is considered successful if the player manages to defeat bosses and fighter planes are not destroyed by the attacks of the enemy.In PERANCANGAN GAME SHOOT ENEMY PLANES using Adobe Flash CS3, Adobe Photoshop, Adobe Audition, and other supporting applications. The game is expected to entertain users

    Chinese Wall Security Policy

    Get PDF
    This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world. Though the policy was well accepted, but the model was incorrect. A decade later, Dr. Lin provided a model in 2003 that meets Brewer & Nash’s Policy. One of the important components in Cloud computing is data center. In order for any company to store data in the center, a trustable security policy model is a must; Chinese wall security policy model will provide this assurance. The heart of the Chinese Wall Security Policy Model is the concept of Conflict of Interest (COI). The concept can be modeled by an anti-reflexive, symmetric and transitive binary relation. In this project, by extending Dr. Lin’s Model, we explore the security issues in the environment of cloud computing and develop a small system of the Chinese Wall Security Model

    A Model of Consistent Node Types in Signed Directed Social Networks

    Full text link
    Signed directed social networks, in which the relationships between users can be either positive (indicating relations such as trust) or negative (indicating relations such as distrust), are increasingly common. Thus the interplay between positive and negative relationships in such networks has become an important research topic. Most recent investigations focus upon edge sign inference using structural balance theory or social status theory. Neither of these two theories, however, can explain an observed edge sign well when the two nodes connected by this edge do not share a common neighbor (e.g., common friend). In this paper we develop a novel approach to handle this situation by applying a new model for node types. Initially, we analyze the local node structure in a fully observed signed directed network, inferring underlying node types. The sign of an edge between two nodes must be consistent with their types; this explains edge signs well even when there are no common neighbors. We show, moreover, that our approach can be extended to incorporate directed triads, when they exist, just as in models based upon structural balance or social status theory. We compute Bayesian node types within empirical studies based upon partially observed Wikipedia, Slashdot, and Epinions networks in which the largest network (Epinions) has 119K nodes and 841K edges. Our approach yields better performance than state-of-the-art approaches for these three signed directed networks.Comment: To appear in the IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM), 201

    Prisoners of War as Library Users

    Get PDF
    One does not usually associate libraries and study classes with amenities provided for internees in Prisoner of War camps in the First World War. It was surprising then for me, as Librarian/Archivist of the Canadian War Museum, to find evidence in our Library/Archives of well-organized libraries in the First World War internment camps in Germany. My introduction to POW library users in this war came about as I was undertaking a preliminary inventory of the rich resources of the Canadian War Museum (CWM) Archives. In the CWM Archives are two files related to libraries in POW camps in Germany. One file (Accession 19800077) holds letters from 2nd Lieutenant Archibald Campbell, a Canadian, sent to his parents from his POW camp in Germany. The other file (Accession 19710056) contains information on officially sanctioned libraries in German POW camps. These discoveries provoked the initial interest and prompted me to see as an experiment what else could be found to flesh out this theme amongst the resources contained in the CWM’s archives and library. The results were sufficiently interesting, not only for demonstrating the potential of our archives/library but in elucidating this hitherto neglected theme in First World War history, as to merit being brought to the attention of the readership of this journal
    • 

    corecore