1,389 research outputs found

    Developing and evaluating a five minute phishing awareness video

    Get PDF
    Confidence tricksters have always defrauded the unwary. The computer era has merely extended their range and made it possible for them to target anyone in the world who has an email address. Nowadays, they send phishing messages that are specially crafted to deceive. Improving user awareness has the potential to reduce their effectiveness. We have previously developed and empirically-validated phishing awareness programmes. Our programmes are specifically designed to neutralize common phish-related misconceptions and teach people how to detect phishes. Many companies and individuals are already using our programmes, but a persistent niggle has been the amount of time required to complete the awareness programme. This paper reports on how we responded by developing and evaluating a condensed phishing awareness video that delivered phishing awareness more efficiently. Having watched our video, participants in our evaluation were able to detect phishing messages significantly more reliably right after watching the video (compared to before watching the video). This ability was also demonstrated after a retention period of eight weeks after first watching the video

    Gamification techniques for raising cyber security awareness

    Get PDF
    Due to the prevalence of online services in modern society, such as internet banking and social media, it is important for users to have an understanding of basic security measures in order to keep themselves safe online. However, users often do not know how to make their online interactions secure, which demonstrates an educational need in this area. Gamification has grown in popularity in recent years and has been used to teach people about a range of subjects. This paper presents an exploratory study investigating the use of gamification techniques to educate average users about password security, with the aim of raising overall security awareness. To explore the impact of such techniques, a role-playing quiz application (RPG) was developed for the Android platform to educate users about password security. Results gained from the work highlightedthat users enjoyed learning via the use of the password application, and felt they benefitted from the inclusion of gamification techniques. Future work seeks to expand the prototype into a full solution, covering a range of security awareness issues

    Electromagnetic shielding properties of LPBF produced Fe2.9wt.%Si alloy

    Get PDF
    Ferromagnetic materials are used in various applications such as rotating electrical machines, wind turbines, electromagnetic shielding, transformers, and electromagnets. Compared to hard magnetic materials, their hysteresis cycles are featured by low values of coercive magnetic field and high permeability. The application of additive manufacturing to ferromagnetic materials is gaining more and more attraction. Indeed, thanks to a wider geometrical freedom, new topological optimized shapes for stator/rotor shapes can be addressed to enhance electric machines performances. However, the properties of the laser powder bed fusion (LPBF) processed alloy compared to conventionally produced counterpart must be still addressed. Accordingly, this paper presents for the first time the use of the LPBF for the manufacturing of Fe2.9wt.%Si electromagnetic shields. The process parameter selection material microstructure and the magnetic shielding factor are characterized

    Learn to Spot Phishing URLs with the Android NoPhish App

    Get PDF
    Part 3: Tools and Applications for TeachingInternational audiencePhishing is a münich issue in today’s Internet. It can have financial or personal consequences. Attacks continue to become more and more sophisticated and the advanced ones (including spear phishing) can only be detected if people carefully check URLs – be it in messages or in the address bar of the web browser. We developed a game-based smartphone app – NoPhish – to educate people in accessing, parsing and checking URLs; i.e. enabling them to distinguish between trustworthy and non-trustworthy messages and websites. Throughout several levels of the game information is provided and phishing detection is exercised in a playful manner. Several learning principles were applied and the interfaces and texts were developed in a user-centered design

    Efficient aberrations pre-compensation and wavefront correction with a deformable mirror in the middle of a petawatt-class CPA laser system

    Get PDF
    AbstractIn this paper, we describe the experimental validation of the technique of correction of wavefront aberration in the middle of the laser amplifying chain. This technique allows the correction of the aberrations from the first part of the laser system, and the pre-compensation of the aberrations built in the second part. This approach will allow an effective aberration management in the laser chain, to protect the optical surfaces and optimize performances, and is the only possible approach for multi-petawatt laser system from the technical and economical point of view. This approach is now possible after the introduction of new deformable mirrors with lower static aberrations and higher dynamic than the standard devices

    The comparison of latero-medial versus dorso-palmar/plantar drilling for cartilage removal in the proximal interphalangeal joint

    Get PDF
    The aims of the present study were to compare the percentages of articular cartilage removed using a lateral drilling approach of the proximal interphalangeal joint (PIPJ) and a dorsal drilling approach, and to assess the usefulness of digital fluoroscopy when performing a lateral drilling approach. Sixty cadaveric PIPJs were drilled using a surgical drill bit to remove the articular cartilage. The limbs were divided into three groups containing 10 forelimbs and 10 hindlimbs each. One group received the dorsal drilling approach, the second one received the lateral drilling approach and the last one received the lateral drilling approach under digital fluoroscopy guidance. The percentage of articular cartilage removed from each articular surface was assessed using Adobe Photoshop® software. The percentages of removed cartilage turned out to be significantly higher with lateral approach, especially under fluoroscopic guidance, both in the forelimbs (p = 0.00712) and hindlimbs (p = 0.00962). In conclusion, the lateral drilling approach seems to be a minimally invasive technique with which to perform PIPJ arthrodesis, even more efficient than the previously reported dorsal approach

    Characterization of LPBF Produced Fe2.9wt.%Si for Electromagnetic Actuator

    Get PDF
    This study aims to produce Fe2.9wt.%Si ferromagnetic material via laser powder bed fusion (L-PBF) for the realization of electromagnetic actuators (EMA). This study is necessary as there are no documents in scientific literature regarding the manufacturing of Iron-Silicon plungers using the L-PBF additive manufacturing (AM) technique. The microstructure, and magnetic properties were characterized using various techniques. The results indicate that the samples produced via L-PBF process exhibit good magnetic properties (μ = 748, H C= 87.7 [A/m] ) especially after annealing treatment at 1200° C for 1h (μ = 3224, H C= 69.1 [A/m]), making it a promising material for use in electromagnetic actuators

    Fifty years of business confidence surveys on manufacturing sector

    Get PDF
    In this work the evolution of the Italian Business Confidence Survey on manufacturing sector is presented starting from the preliminary European project for harmonized statistics launched in the late fifties of the last century. Survey changes are described, focusing in particular on the so-called confidence indicator. The continuing increase of statistical accuracy in sampling is recalled, from the initial purposive sample and controls, up to the present state of the art. Specific attention is devoted to the role of administrative archives in the sampling plan. Emphasis is also given to the increasing use of computer simulation in assessing the validity of the estimates. The role of cyclical analysis is finally highlighted with regard to two aspects: (1) the business confidence has not a corresponding variable in the economic system\u2014the validation can only be performed in comparison with correlated variables (e.g. IP, GDP); (2) confidence shows forecasting capability for the economic system
    • …
    corecore