766 research outputs found

    Site Visitation: School Leaders\u27 Perceptions of a Diagnostic Tool for School Improvement

    Get PDF
    This case study explored the use of site-visitation as a diagnostic tool for school improvement. Nine charter schools in New Orleans were selected for the study. Based on qualitative research and systems theory, a within- and cross-case analysis of nine semi-structured interviews with school leaders were conducted. The school leaders’ experiences with the state-run site-visitation model and their use of the findings for school improvement was explored. The findings led to the development of a hybrid accountability model that encompasses the components school leaders believe will lead to school improvement. This study aims to assist educators, policy makers, and researchers to better understand site-visitation and its role in school improvement

    Site Visitation: School Leaders\u27 Perceptions of a Diagnostic Tool for School Improvement

    Get PDF
    This case study explored the use of site-visitation as a diagnostic tool for school improvement. Nine charter schools in New Orleans were selected for the study. Based on qualitative research and systems theory, a within- and cross-case analysis of nine semi-structured interviews with school leaders were conducted. The school leaders’ experiences with the state-run site-visitation model and their use of the findings for school improvement was explored. The findings led to the development of a hybrid accountability model that encompasses the components school leaders believe will lead to school improvement. This study aims to assist educators, policy makers, and researchers to better understand site-visitation and its role in school improvement

    "Sign in with ... Privacy'': Timely Disclosure of Privacy Differences among Web SSO Login Options

    Full text link
    The number of login options on web sites has increased since the introduction of web single sign-on (SSO) protocols. Web SSO services allow users to grant web sites or relying parties (RPs) access to their personal profile information from identity provider (IdP) accounts. Many RP sites do not provide sufficient privacy information that could help users make informed login decisions. Moreover, privacy differences in permission requests across login options are largely hidden from users and are time-consuming to manually extract and compare. In this paper, we present an empirical analysis of popular RP implementations supporting three major IdP login options (Facebook, Google, and Apple) and categorize RPs in the top 500 sites into four client-side code patterns. Informed by these RP patterns, we design and implement SSOPrivateEye (SPEye), a browser extension prototype that extracts and displays to users permission request information from SSO login options in RPs covering the three IdPs

    Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions

    Full text link
    Web users are increasingly presented with multiple login options, including password-based login and common web single sign-on (SSO) login options such as "Login with Google" and "Login with Facebook". There has been little focus in previous studies on how users choose from a list of login options and how to better inform users about privacy issues in web SSO systems. In this paper, we conducted a 200-participant study to understand factors that influence participants' login decisions, and how they are affected by displaying permission differences across login options; permissions in SSO result in release of user personal information to third-party web sites through SSO identity providers. We compare and report on login decisions made by participants before and after viewing permission-related information, examine self-reported responses for reasons related to their login decisions, and report on the factors that motivated their choices. We find that usability preferences and inertia causes (habituation) were among the dominant factors influencing login decisions. After participants viewed permission-related information, many prioritised privacy over other factors, changing their login decisions to more privacy-friendly alternatives. Displaying permission-related information also influenced some participants to make tradeoffs between privacy and usability preferences

    Breaking : password entry is fine

    Get PDF
    In our digital world, we have become well acquainted with the login form – username shown as plaintext, password shown as asterisks or dots. This design dates back to the early days of terminal computing, and despite huge changes in nearly every other area, the humble login form remains largely untouched. When coupled with the ubiquity of smartphones, this means we often find ourselves entering complex passwords on a tiny touchscreen keyboard with little or no visual feedback on what has been typed. This paper explores how password masking on mobile devices affects the error rate for password entry. We created an app where users entered selected passwords into masked and unmasked password fields, measuring things like typing speed, error rate, and number of backspaces. We then did an exploratory data analysis for the data, and our findings show that, perhaps unexpectedly, there is no significant difference between masked and unmasked passwords for any of these metrics
    • …
    corecore