8,227 research outputs found

    Not Seeing the Crime for the Cameras?

    Get PDF

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Theticity

    Get PDF
    The subject matter of this chapter is the semantic, syntactic and discoursepragmatic background as well as the cross-linguistic behavior of types of utterance exemplified by the following English sentences […]: (1) My NECK hurts. […] (2) The PHONE's ringing. [...] Sentences such as […] are usually held to stand in opposition to sentences with a topical subject. The difference is said to be formally marked, for example, by VS order vs. topical SV order (as in Albanian po bie telefoni 'the PHONE is ringing' vs. telefoni po bie 'the PHONE is RINGING'), or by accent on the subject only vs. accent on both the subject and the verb (as in the English translations). The term theticity will be used in the following to label the specific phenomenological domain to which the sentences in (1) and (2) belong. It has long been commonplace that these and similar expressions occur at particular points in the discourse where "a new situation is presented as a whole". We will try to depict and classify the various discourse situations in which these expressions have been found in the different languages, and we will try to trace out areas of cross-linguistic comparability. Finally, we will raise the question whether or not there is a common denominator which would justify a unified treatment of all these expressions in functional/semantic terms

    Incidental Captures of Plains Spotted Skunks (Spilogale putorius interrupta) By Arkansas Trappers, 2012-2017

    Get PDF
    Arkansas trappers were surveyed following the 2012 and four subsequent trapping seasons regarding accidental captures of spotted skunks while attempting to trap other species. A total of 132 trappers reported capturing spotted skunks although further investigation confirmed the validity of only 42 reports from trappers that caught a total of 60 spotted skunks. Incidental captures were rare; only 0.35-1.29% of trappers each year caught spotted skunks and came primarily from the Ozark and Ouachita regions of the state

    Primeness in Early Season Arkansas Raccoon Pelts

    Get PDF
    Trapping seasons in the United States are generally set around the time of the year when pelts are in “prime” condition and are in their most valuable state. In order to assess whether the start of the Arkansas trapping season is at an appropriate date 122 raccoons were captured during the month of November in 2014 and 2015. Based on the evaluation of experienced fur dealers, the percentage of pelts in prime condition was then assessed on weekly and half-monthly basis. This study indicates that starting the trapping season in the last half of the month may maximize the percentage of pelts that are in prime condition early in the season, especially in the southern region of the state

    Catalysts for the decomposition of hydrazine and its derivatives and a method for its production

    Get PDF
    Catalysts of various types are used to decompose hydrazine and its derivatives. One type of catalyst is made as follows: the aluminum is dissolved out of an alloy of cobalt or nickel/aluminum so that a structure is produced that is chemically active for the monergol and that has a large active surface. The objective was to avoid difficulties and to create a catalyst that not only has a short start time but that can also be manufactured easily and relatively inexpensively. The solution to this task is to coat the base structure of the catalyst with oxides of copper, cobalt and cerium or oxides of copper, cobalt and cerite earth

    Ignore These At Your Peril: Ten principles for trust design

    Get PDF
    Online trust has been discussed for more than 10 years, yet little practical guidance has emerged that has proven to be applicable across contexts or useful in the long run. 'Trustworthy UI design guidelines' created in the late 90ies to address the then big question of online trust: how to get shoppers online, are now happily employed by people preparing phishing scams. In this paper we summarize, in practical terms, a conceptual framework for online trust we've established in 2005. Because of its abstract nature it is still useful as a lens through which to view the current big questions of the online trust debate - large focused on usable security and phishing attacks. We then deduct practical 10 rules for providing effective trust support to help practitioners and researchers of usable security

    Situating the transient user: overcoming challenges in the design of e-government systems

    Get PDF
    e-Government systems present new challenges for user involvement in the design process. Existing user-centred and participatory design methodologies were mainly developed for situations where a user is in the workplace. In e-government applications the user population is heterogeneous and numerous; the increasing ubiquity of e-government systems also questions the concept of “the interface”. This paper presents the results of a study of discourses of e-government users in two cases studies of interaction with new information systems in transport, which illuminate usability problems arising from a failure to prioritise users’ needs at all stages. An approach is proposed which accounts for the values as well as the goals of users, appropriating stakeholder analysis and ideas from Soft Systems Methodology while recognising that the routine actions of users in the real world are situated and contingent

    "Not the Usual Suspects": A Study of Factors Reducing the Effectiveness of CCTV

    Get PDF
    Previous research on the effectiveness of Closed Circuit Television (CCTV) has focused on critically assessing police and government claims that CCTV is effective in reducing crime. This paper presents a field study that investigates the relationship between CCTV system design and the performance of operator tasks. We carried out structured observations and interviews with 13 managers and 38 operators at 13 CCTV control rooms. A number of failures were identified, including the poor configuration of technology, poor quality video recordings, and a lack of system integration. Stakeholder communication was poor, and there were too many cameras and too few operators. These failures have been previously identified by researchers; however, no design improvements have been made to control rooms in the last decade. We identify a number of measures to improve operator performance, and contribute a set of recommendations for security managers and practitioners. Security Journal (2010) 23, 134-154. doi:10.1057/sj.2008.2; published online 6 October 200

    Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science

    Get PDF
    e-Science projects face a difficult challenge in providing access to valuable computational resources, data and software to large communities of distributed users. Oil the one hand, the raison d'etre of the projects is to encourage members of their research communities to use the resources provided. Oil the other hand, the threats to these resources from online attacks require robust and effective Security to mitigate the risks faced. This raises two issues: ensuring that (I) the security mechanisms put in place are usable by the different users of the system, and (2) the security of the overall system satisfies the security needs of all its different stakeholders. A failure to address either of these issues call seriously jeopardise the success of e-Science projects.The aim of this paper is to firstly provide a detailed understanding of how these challenges call present themselves in practice in the development of e-Science applications. Secondly, this paper examines the steps that projects can undertake to ensure that security requirements are correctly identified, and security measures are usable by the intended research community. The research presented in this paper is based Oil four case studies of c-Science projects. Security design traditionally uses expert analysis of risks to the technology and deploys appropriate countermeasures to deal with them. However, these case studies highlight the importance of involving all stakeholders in the process of identifying security needs and designing secure and usable systems.For each case study, transcripts of the security analysis and design sessions were analysed to gain insight into the issues and factors that surround the design of usable security. The analysis concludes with a model explaining the relationships between the most important factors identified. This includes a detailed examination of the roles of responsibility, motivation and communication of stakeholders in the ongoing process of designing usable secure socio-technical systems such as e-Science. (C) 2007 Elsevier Ltd. All rights reserved
    corecore