992 research outputs found

    Decodability Attack against the Fuzzy Commitment Scheme with Public Feature Transforms

    Full text link
    The fuzzy commitment scheme is a cryptographic primitive that can be used to store biometric templates being encoded as fixed-length feature vectors protected. If multiple related records generated from the same biometric instance can be intercepted, their correspondence can be determined using the decodability attack. In 2011, Kelkboom et al. proposed to pass the feature vectors through a record-specific but public permutation process in order to prevent this attack. In this paper, it is shown that this countermeasure enables another attack also analyzed by Simoens et al. in 2009 which can even ease an adversary to fully break two related records. The attack may only be feasible if the protected feature vectors have a reasonably small Hamming distance; yet, implementations and security analyses must account for this risk. This paper furthermore discusses that by means of a public transformation, the attack cannot be prevented in a binary fuzzy commitment scheme based on linear codes. Fortunately, such transformations can be generated for the non-binary case. In order to still be able to protect binary feature vectors, one may consider to use the improved fuzzy vault scheme by Dodis et al. which may be secured against linkability attacks using observations made by Merkle and Tams

    Three questions about “informal regulation”

    Get PDF
    In the grand debates of international law, the jus ad bellum is often proclaimed dead, and just as often praised as the “cornerstone” of the contemporary legal order. Both perspectives tend to ignore that the jus ad bellum is not static, but a body of law that states adjust over time. In an important contribution, Monica Hakimi proposes to look at one particular aspect of such adjustment, a concept she frames as “informal regulation” through Security Council action. This essay engages with Hakimi's approach. It inquires whether this approach is as “informal” as Hakimi suggests, and asks whether “informal regulation”—rather than constituting a new category of state activities to study—is not already part of conventional approaches to the jus ad bellum. Proceeding from Hakimi's analysis, the comment assesses whether there is room for “informal regulation” beyond the Security Council

    State succession to investment treaties: mapping the issues

    Get PDF
    Following recent decisions in Sanum v Laos and World Wide Minerals v Kazakhstan, investment lawyers have begun to engage with the legal rules governing State succession to treaties. As State succession is one of the more technical and controversial areas of general international law, this engagement can present challenges; however, the issues are too important to be ignored. This article maps out the most pressing questions of State succession that investment lawyers have faced, or are likely to face in the future. It identifies the three most salient problems — viz the succession of new States to ICSID membership and to old BITs, and the impact of cession of territory on investment protection. With respect to each of these three problems, the article analyses the general regime of State succession and its application to the investment law context, highlighting uncertainties in the law and proposing ways of dealing with them

    Cross-country Bookkeeping

    Get PDF

    Good management and software design can help older workers thrive with IT-based tasks

    Get PDF
    The capacity to perform work tasks that require using organisational IT tends to decline with age. Stefan Tams finds that this happens only because of lower information processing speed. He writes that managers and software designers can help older employees be more productive by simply reducing the relevance of information processing speed for job tasks. He suggests more training for older workers and the development of application interfaces that rely less on spatial metaphors

    The Role of Age in Technology-induced Workplace Stress

    Get PDF
    Recent research shows that such Information and Communication Technologies (ICTs) as instant messengers can cause workplace interruptions, which lead to stress for employees and substantial productivity losses for U.S. organizations. Since the introduction of ICTs, workplace interruptions have evolved in both frequency and nature from irregular phone calls to a continuous stream of e-mail notifications and other electronic interruptions, mediated through a large number of technological devices that constantly beep and buzz. This trend of an increasing frequency of workplace interruptions closely relates to another workplace trend: the graying of the workforce, implying that the U.S. workforce is aging at an increased rate. Since older people are particularly vulnerable to interruptions, the interdependencies inherent in these two workplace trends need to be better understood. Accordingly, this dissertation aims to understand whether, how, and why technology-mediated (T-M) interruptions impact stress and task performance differently for older compared to younger adults. To examine these questions, this research applies two complementary theoretical frames that explain interruptions\u27 influence on older and younger adults\u27 cognition. First, the Person-Environment Fit perspective suggests that T-M interruptions may lessen the fit between the mental resources available for performing a task and those required, thereby inducing workplace stress and, in turn, reducing individual task performance. Second, the Inhibitory Deficit Theory of Cognitive Aging holds that older peoples\u27 ability to actively disregard distracting stimuli is impaired. Thus, more T-M interruptions may \u27steal\u27 resources from the processing of task-related content in older adults. In combining these theories with user characteristics and technology features, this research develops an integrative model of ICTs, aging, stress, and task performance. We propose that older people are more distracted by T-M interruptions than younger, thereby experiencing greater mental workload and, in turn, more stress and lower performance. We test the model through a laboratory experiment that integrates the manipulation of ICT features with objective measures of stress and task performance, unlike the subjective measures commonly used. Experimental manipulations include the frequency with which interruptions appear as well as such interruption design characteristics as color codes. Outcome measures include actual performance in terms of the number of task elements solved, as well as the change in stress hormones found in saliva, a state-of-the art physiological measure of stress. In developing and testing the model, we help to clarify the role of age in technostress. This research also sheds more light on the mental processes that connect ICTs to stress and performance, and it has begun to open the black box of the ICT features linked to these outcomes. For managers, we provide guidance on assisting older employees in realizing their full potential for contributing to firm success. This research further advises systems designers on such issues as user involvement
    • …
    corecore