11 research outputs found

    Authentication Schemes\u27 Impact on Working Memory

    Get PDF
    Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication has on working memory. A recent exploratory study suggests that working memory can be disrupted during graphical authentication (Still & Cain, 2019). In this study, we take the next step by controlling for task difficulty and contrasting performance with conventional password-based authentication. Baddeley’s model was employed to examine the impact of authentication on verbal, visuospatial, and central executive working memory (Baddeley & Hitch, 1974). Our findings may help designers select authentication systems that minimize adverse effects on users’ critical primary task performance. For instance, we revealed that conventional passwords do not have a greater negative impact on verbal primary task information compared to graphical passcodes. We also replicated findings reported by Still and Cain (2019), where visuospatial was least impaired by authentication. These findings are not intuitive, highlighting the need for further investigation of how authentication impacts primary task information in working memory

    “You Come Back to the Same Ole Shit:” A Qualitative Study of Smoking Cessation Barriers among Women Living with HIV: Implications for Intervention Development

    Full text link
    Although tobacco use among women living with HIV (WLWH) is decreasing, the prevalence is more than double that of women in the general population and remains an important health behavior to target among WLWH. Few smoking cessation interventions specifically focus on the unique social and medical needs of women living with HIV (WLWH). Thus, the investigative team engaged WLWH (N=18) in qualitative focus groups to: 1) understand barriers and facilitators to smoking cessation; and 2) inform intervention structure and content priorities. Participants identified salient reasons for smoking and barriers to smoking cessation, which included coping mechanisms for life stressors, HIV-related stress, HIV-related stigma, and social isolation. Further, WLWH highlighted the importance of long-term smoking cessation support, peer support, mental health content, religion/spirituality, and targeted risk messaging in smoking cessation intervention development. Study findings provide concrete, operational strategies for future use in a theory-based smoking cessation intervention, and underscore the importance of formative research to inform smoking cessation interventions for WLWH

    Exploring interaction differences in Microblogging Word of Mouth between entrepreneurial and conventional service providers

    Get PDF
    In this study, we explore the interaction network properties of Microblogging Word of Mouth (MWOM), and how it is utilized by two different types of service providers, namely entrepreneurial and conventional. We use social network analysis, involving network metrics, sentiment, content and semantic analysis of real time data collected via Twitter, to compare two providers in terms of how they leverage MWOM in their social interactions. Results demonstrate that MWOM is utilized in an inherently different manner by an entrepreneurial provider, compared to a conventional one. Based on the findings, the study identifies distinctions between the entrepreneurial and conventional service providers in how they utilize MWOM on social media. Specifically, the entrepreneurial provider capitalizes on the interactive nature and dialogic capabilities of Twitter; whereas the conventional provider mostly relies on focal information sharing, thus neglecting the network members’ content creation and relationship building capability of social media networks. The study has significant implications as it provides key insights and lessons in terms of how companies should respond to emerging digital opportunities in their online social interactions

    The evaluation of information technology plan implementation in Rhode Island public schools

    No full text
    Since the current school reform movement began in the early 1980s, the use of information technology (IT) has been widely recommended to improve teaching and learning. As the use of technology increases, school districts are required to develop IT plans in order to receive funding from state and federal governments. (Cradler, 1996). Ironically, with the increased use of IT, there is little evidence that most school districts carry out any IT program evaluation to determine the effectiveness and quality of their practices. The purpose of this qualitative study was to determine the extent to which Rhode Island school districts evaluate the implementation of their district IT plans. The researcher employed descriptive statistics to gather data from various school districts. The triangulation of the data (surveys, interviews, and IT plan documents) provided a preponderance of evidence regarding the essential properties of an effective IT plan implementation program. The four properties that emerged from this study were: (a) technology planning and implementation, (b) evaluation of the technology plans, (c) utilization of the evaluation information and (d) impediments to conducting evaluation. This study demonstrates the importance of evaluating the implementation of IT plans and of using the information to support decisions about improving the uses of technology. A major implication is that districts will need to fully address all four properties of an effective IT plan to be successful in creating or improving their school district technology programs

    esh

    No full text
    چکیده این پژوهش با هدف بررسی جایگاه اشتغال دانشآموختگان مهارتی آمـوزش هـای فنـی و حرفـه ای و کـار و دانش در شهر شیراز انجام گرفت. روش تحقیق، روش توصیفی ـ پیمایشی بود . در این پژوهش نمونـه ای370 نفره با روش نمونهگیری طبقهای تصادفی و با بهرهگیـری از جـدول تعیـین حجـم نمونـه کرسـی و مورگـان انتخاب شد. برای گردآوری دادهها از پرسشنامۀ محقـق سـاخته اسـتفاده شـد کـه روایـی آن از طریـق روایـی محتوایی و پایایی آن از طریق آلفای کرونباخ برابر با 89 /0 برآورد شد. برای تحلیل دادهها از تکنیکهـای آمـار توصیفی (جدول توزیع فراوانی، نمودار و درصد) و آزمونهـای اسـتنباطی ( و کلمـوگروف اسـمیرنوف ) استفاده شد. نتایج پژوهش نشان میدهدکه فقط11.8 درصد از دانشآموختگان بـا مـدرک دیـپلم، در مشـاغل فردی، به صورت قراردادی و تمام وقت مشغول شدهاند. اکثر دانشآموختگان رضایت شغلی کمی دارند، بـین شغل و رشتۀ تحصیلی اکثر دانشآموختگان تناسبی وجود ندارد، درآمد اکثر دانشآموختگـان 201 هزارتومـان به بالاست، آموزشهای فنیو حرفهای و کار و دانش در حد کم به نیازهای شغلی افـراد پاسـخگو هسـتند و مهارتهای آموختهشده در هنرستانها کاربردی در شغل دانشآموختگان ندارد و برای انجـام وظـایف شـغلی اصلاً کافی نیستند. نتیجه اینکه، در شرایط فعلی ارتباطی بین آمـوزش هـای رسـمی فنـی و حرفـه ای و کـار و دانش با اشتغال وجود ندار

    Al-ta'likot al-bahyah

    No full text
    24,3 cm , 1-296hl

    Unsteady-State Heating and Cooling of Solid Objects

    No full text

    Unsteady-State Heating and Cooling of Solid Objects

    No full text
    corecore