306 research outputs found

    Security and Online learning: to protect or prohibit

    Get PDF
    The rapid development of online learning is opening up many new learning opportunities. Yet, with this increased potential come a myriad of risks. Usable security systems are essential as poor usability in security can result in excluding intended users while allowing sensitive data to be released to unacceptable recipients. This chapter presents findings concerned with usability for two security issues: authentication mechanisms and privacy. Usability issues such as memorability, feedback, guidance, context of use and concepts of information ownership are reviewed within various environments. This chapter also reviews the roots of these usability difficulties in the culture clash between the non-user-oriented perspective of security and the information exchange culture of the education domain. Finally an account is provided of how future systems can be developed which maintain security and yet are still usable

    Dust Echos from Gamma Ray Bursts

    Get PDF
    The deviation from the power-law decline of the optical flux observed in GRB 970228 and GRB 980326 has been used recently to argue in favor of the connection between GRBs and supernovae. We consider an alternative explanation for this phenomenon, based on the scattering of a prompt optical burst by 0.1 solar masses of dust located beyond its sublimation radius 0.1-1 pc from the burst. In both cases, the optical energy observed at the time of the first detection of the afterglow suffices to produce an echo after 20-30 days, as observed. Prompt optical monitoring of future bursts and multiband photometry of the afterglows will enable quantitative tests of simple models of dust reprocessing and a prediction of the source redshift.Comment: 4 pages including 3 postscript figures, LaTeX (emulateapj.sty; newapa.sty for bibliography definitions); accepted for publication in ApJ

    On The Synchrotron Self-Compton Emission from Relativistic Shocks and Its Implications for Gamma-Ray Burst Afterglows

    Get PDF
    We consider the effects of inverse Compton scattering of synchrotron photons from relativistic electrons in GRB afterglows. We compute the spectrum of the inverse Compton emission and find that it can dominate the total cooling rate of the afterglow for several months or even years after the initial explosion. We demonstrate that the presence of strong inverse Compton cooling can be deduced from the effect it has on the time-evolution of the cooling break in the synchrotron spectral component, and therefore on the optical and X-ray afterglow lightcurves. We then show how the physical interpretation of the observed characteristics of the synchrotron spectrum must be modified to take into consideration this extra source of cooling, and give a revised prescription for computing physical parameters characterizing the expanding shock wave from the observed quantities. We find that for a given set of observables (synchrotron break frequencies and fluxes) there is either no consistent physical interpretation or two of them. Finally we discuss the prospects of directly detecting the inverse Compton emission with Chandra. We argue that such a detection is possible for GRBs exploding in a reasonably dense (n>1 cm^-3) medium.Comment: 21 pages, ApJ submitte

    Understanding infusion administration in the ICU through Distributed Cognition

    Get PDF
    AbstractTo understand how healthcare technologies are used in practice and evaluate them, researchers have argued for adopting the theoretical framework of Distributed Cognition (DC). This paper describes the methods and results of a study in which a DC methodology, Distributed Cognition for Teamwork (DiCoT), was applied to study the use of infusion pumps by nurses in an Intensive Care Unit (ICU). Data was gathered through ethnographic observations and interviews. Data analysis consisted of constructing the representational models of DiCoT, focusing on information flows, physical layouts, social structures and artefacts. The findings show that there is significant distribution of cognition in the ICU: socially, among nurses; physically, through the material environment; and through technological artefacts. The DiCoT methodology facilitated the identification of potential improvements that could increase the safety and efficiency of nurses’ interactions with infusion technology

    Digital libraries' support for the user's information journey

    Get PDF
    The temporal elements of users' information requirements are a continually confounding aspect of digital library design. No sooner have users' needs been identified and supported than they change. This paper evaluates the changing information requirements of users through their 'information journey' in two different domains (health and academia). In-depth analysis of findings from interviews, focus groups and observations of 150 users have identified three stages to this journey: information initiation, facilitation (or gathering) and interpretation. The study shows that, although digital libraries are supporting aspects of users' information facilitation, there are still requirements for them to better support users' overall information work in context. Users are poorly supported in the initiation phase, as they recognize their information needs, especially with regard to resource awareness; in this context, interactive press-alerts are discussed. Some users (especially clinicians and patients) also require support in the interpretation of information, both satisfying themselves that the information is trustworthy and understanding what it means for a particular individua

    Usability for digital libraries

    Get PDF

    Evaluating system utility and conceptual fit using CASSM

    Get PDF
    There is a wealth of user-centred evaluation methods (UEMs) to support the analyst in assessing interactive systems. Many of these support detailed aspects of use – for example: Is the feedback helpful? Are labels appropriate? Is the task structure optimal? Few UEMs encourage the analyst to step back and consider how well a system supports users’ conceptual understandings and system utility. In this paper, we present CASSM, a method which focuses on the quality of ‘fit’ between users and an interactive system. We describe the methodology of conducting a CASSM analysis and illustrate the approach with three contrasting worked examples (a robotic arm, a digital library system and a drawing tool) that demonstrate different depths of analysis. We show how CASSM can help identify re-design possibilities to improve system utility. CASSM complements established evaluation methods by focusing on conceptual structures rather than procedures. Prototype tool support for completing a CASSM analysis is provided by Cassata, an open source development
    • …
    corecore