8,151 research outputs found

    Not Seeing the Crime for the Cameras?

    Get PDF

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Theticity

    Get PDF
    The subject matter of this chapter is the semantic, syntactic and discoursepragmatic background as well as the cross-linguistic behavior of types of utterance exemplified by the following English sentences […]: (1) My NECK hurts. […] (2) The PHONE's ringing. [...] Sentences such as […] are usually held to stand in opposition to sentences with a topical subject. The difference is said to be formally marked, for example, by VS order vs. topical SV order (as in Albanian po bie telefoni 'the PHONE is ringing' vs. telefoni po bie 'the PHONE is RINGING'), or by accent on the subject only vs. accent on both the subject and the verb (as in the English translations). The term theticity will be used in the following to label the specific phenomenological domain to which the sentences in (1) and (2) belong. It has long been commonplace that these and similar expressions occur at particular points in the discourse where "a new situation is presented as a whole". We will try to depict and classify the various discourse situations in which these expressions have been found in the different languages, and we will try to trace out areas of cross-linguistic comparability. Finally, we will raise the question whether or not there is a common denominator which would justify a unified treatment of all these expressions in functional/semantic terms

    Incidental Captures of Plains Spotted Skunks (Spilogale putorius interrupta) By Arkansas Trappers, 2012-2017

    Get PDF
    Arkansas trappers were surveyed following the 2012 and four subsequent trapping seasons regarding accidental captures of spotted skunks while attempting to trap other species. A total of 132 trappers reported capturing spotted skunks although further investigation confirmed the validity of only 42 reports from trappers that caught a total of 60 spotted skunks. Incidental captures were rare; only 0.35-1.29% of trappers each year caught spotted skunks and came primarily from the Ozark and Ouachita regions of the state

    Catalysts for the decomposition of hydrazine and its derivatives and a method for its production

    Get PDF
    Catalysts of various types are used to decompose hydrazine and its derivatives. One type of catalyst is made as follows: the aluminum is dissolved out of an alloy of cobalt or nickel/aluminum so that a structure is produced that is chemically active for the monergol and that has a large active surface. The objective was to avoid difficulties and to create a catalyst that not only has a short start time but that can also be manufactured easily and relatively inexpensively. The solution to this task is to coat the base structure of the catalyst with oxides of copper, cobalt and cerium or oxides of copper, cobalt and cerite earth

    Primeness in Early Season Arkansas Raccoon Pelts

    Get PDF
    Trapping seasons in the United States are generally set around the time of the year when pelts are in “prime” condition and are in their most valuable state. In order to assess whether the start of the Arkansas trapping season is at an appropriate date 122 raccoons were captured during the month of November in 2014 and 2015. Based on the evaluation of experienced fur dealers, the percentage of pelts in prime condition was then assessed on weekly and half-monthly basis. This study indicates that starting the trapping season in the last half of the month may maximize the percentage of pelts that are in prime condition early in the season, especially in the southern region of the state

    Ignore These At Your Peril: Ten principles for trust design

    Get PDF
    Online trust has been discussed for more than 10 years, yet little practical guidance has emerged that has proven to be applicable across contexts or useful in the long run. 'Trustworthy UI design guidelines' created in the late 90ies to address the then big question of online trust: how to get shoppers online, are now happily employed by people preparing phishing scams. In this paper we summarize, in practical terms, a conceptual framework for online trust we've established in 2005. Because of its abstract nature it is still useful as a lens through which to view the current big questions of the online trust debate - large focused on usable security and phishing attacks. We then deduct practical 10 rules for providing effective trust support to help practitioners and researchers of usable security

    Situating the transient user: overcoming challenges in the design of e-government systems

    Get PDF
    e-Government systems present new challenges for user involvement in the design process. Existing user-centred and participatory design methodologies were mainly developed for situations where a user is in the workplace. In e-government applications the user population is heterogeneous and numerous; the increasing ubiquity of e-government systems also questions the concept of “the interface”. This paper presents the results of a study of discourses of e-government users in two cases studies of interaction with new information systems in transport, which illuminate usability problems arising from a failure to prioritise users’ needs at all stages. An approach is proposed which accounts for the values as well as the goals of users, appropriating stakeholder analysis and ideas from Soft Systems Methodology while recognising that the routine actions of users in the real world are situated and contingent

    The economics of user effort in information security

    Get PDF
    A significant number of security breaches result from employees' failures to comply with security policies. The cause is often an honest mistake, such as when an employee enters their password in a phishing website, believing it to be a legitimate one.1 It can also be a workaround when faced with an impossible task, such as when an employee has so many different passwords that they must be written down

    The sweet spot: How people trade off size and definition on mobile devices

    Get PDF
    Mobile TV can deliver up-to-date content to users on the move. But it is currently unclear how to best adapt higher resolution TV content. In this paper, we describe a laboratory study with 35 participants who watched short clips of different content and shot types on a 200ppi PDA display at a resolution of either 120x90 or 168x128. Participants selected their preferred size and rated the acceptability of the visual experience. The preferred viewing ratio depended on the resolution and had to be at least 9.8H. The minimal angular resolution people required and which limited the up-scaling factor was 14 pixels per degree. Extreme long shots were best when depicted actors were at least 0.7° high. A second study researched the ecological validity of previous lab results by comparing them to results from the field. Image size yielded more value for users in the field than was apparent from lab results. In conclusion, current prediction models based on preferred viewing distances for TV and large displays do not predict viewing preferences on mobile devices. Our results will help to further the understanding of multimedia perception and service designers to deliver both economically viable and enjoyable experiences
    corecore