79,423 research outputs found
Web-Based Student Processes at Community Colleges: Removing Barriers to Access
Colleges and universities are making extensive use of the Internet for collecting admission and financial aid applications. Benefits from online application services are enjoyed by both the educational institution and the prospec¬tive student who applies online. It is vital that web sites offering these services be made accessible so that students with disabilities are afforded the same benefits of online applications as their non-disabled peers.
Cornell University’s Employment and Disability Institute was funded by the U.S. Department of Education’s National Institute on Disability and Rehabilitation Research (NIDRR) to conduct a project with the following three objectives: 1) survey student services professionals at community colleges to examine the extent of use of the internet for providing services and the awareness of internet accessibility issues, 2) evaluate a sample of community college websites for accessibility and usability by students with and without disabilities, and 3) develop a toolkit for improving access to internet-based services at community colleges
Survey of Web Developers in Academic Libraries
A survey was sent to library web designers from randomly selected institutions to determine the background, tools, and methods used by those designers. Results, grouped by Carnegie Classification type, indicated that larger schools were not necessarily working with more resources or more advanced levels of technology than other institutions
Recommended from our members
Towards successful e-Payment systems: An empirical identification and analysis of critical factors
This research aims to explore the factors relating to e-payment system to be implemented where electronic processes enable the facilitation of online transactions. A secondary analysis revealed six factors which are argued to be ‘critical’ for customer adoption of these systems. The findings were further augmented by an online survey of 155 respondents where the perceived importance of the critical factors were correlated through: security, trust, perceived advantage, assurance seals, perceived risk and usability. The results demonstrate that three of the critical factors were necessary (security, advantage, web assurance seals) and three were relatively sufficient (perceived risk, trust and usability) through customer intentions to adopt an e-payment system. The study provides a valid overall awareness that these critical factors are important in designing a successful e-payment system
Why Do People Adopt, or Reject, Smartphone Password Managers?
People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time consuming and arduous on small devices. Many of the memory- and inconvenience-related issues can be ameliorated by using a password manager app. Such an app can generate, remember and automatically supply passwords to websites and other apps on the phone. Given this potential, it is unfortunate that these applications have not enjoyed widespread adoption. We carried out a study to find out why this was so, to investigate factors that impeded or encouraged password manager adoption. We found that a number of factors mediated during all three phases of adoption: searching, deciding and trialling. The study’s findings will help us to market these tools more effectively in order to encourage future adoption of password managers
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
In this work we present and formally analyze CHAT-SRP (CHAos based
Tickets-Secure Registration Protocol), a protocol to provide interactive and
collaborative platforms with a cryptographically robust solution to classical
security issues. Namely, we focus on the secrecy and authenticity properties
while keeping a high usability. In this sense, users are forced to blindly
trust the system administrators and developers. Moreover, as far as we know,
the use of formal methodologies for the verification of security properties of
communication protocols isn't yet a common practice. We propose here a
methodology to fill this gap, i.e., to analyse both the security of the
proposed protocol and the pertinence of the underlying premises. In this
concern, we propose the definition and formal evaluation of a protocol for the
distribution of digital identities. Once distributed, these identities can be
used to verify integrity and source of information. We base our security
analysis on tools for automatic verification of security protocols widely
accepted by the scientific community, and on the principles they are based
upon. In addition, it is assumed perfect cryptographic primitives in order to
focus the analysis on the exchange of protocol messages. The main property of
our protocol is the incorporation of tickets, created using digests of chaos
based nonces (numbers used only once) and users' personal data. Combined with a
multichannel authentication scheme with some previous knowledge, these tickets
provide security during the whole protocol by univocally linking each
registering user with a single request. [..]Comment: 32 pages, 7 figures, 8 listings, 1 tabl
Just design
Inclusive design prescribes addressing the needs of the widest possible audience in order to consider human differences. Taking differences seriously, however, may imply severely restricting “the widest possible audience”. In confronting this paradox, we investigate to what extent Rawls’ theory of justice as fairness applies to design. By converting the paradox into the question of how design can be fair, we show that the demand for equitability shifts from the design output to the design process. We conclude that the two main questions about justice find application in design: the question about the standards of justice and the question about its metrics. We endorse a Rawlsian approach to the former, while some revision may be due regarding the latter
- …