36,649 Hits in 16.7 sec

Open Educational Resources: What they are and why do they matter Report prepared for the OECD

Ilkka Tuomi
2006 unpublished
ADL Registry is an instance of CORDRA. Anyone will be allowed to search the ADL Registry through a portal, but the access to find content may require local access privileges or authentication.  ...  What, then, do we mean by "openness" in open source, and why does it matter?  ...  What things a URI can not point to?  ... 

More Is Not the Answer

Cormac Herley
2014 IEEE Security and Privacy  
Not only are more people using computers, but they are using computers more.  ...  Yet, the security advice offered to users by security experts, service providers and government agencies is filled with advice that we know has no possibility of being followed.  ... 
doi:10.1109/msp.2013.134 fatcat:y3vhp5ddqfclnfb7r5frmwbbdy

Do not be fooled by photographs

Richard A Rosin
2006 BMJ (Clinical Research Edition)  
confusion and undermined the prospect of a constructive approach to road safety.  ...  Using mobile phones and not using seatbelts have opposing consequences for other road users.  ...  The paper did not report why three different modes of investigation were used, nor the rationale for choosing between the three.  ... 
doi:10.1136/bmj.333.7560.202-b pmid:16858066 pmcid:PMC1513436 fatcat:c6r42dnooraz5nq4b63erc24d4

Cyber Security Awareness Campaigns: Why do they fail to change behaviour? [article]

Maria Bada and Angela M. Sasse and Jason R. C. Nurse
2019 arXiv   pre-print
Past and current efforts to improve information-security practices and promote a sustainable society have not had the desired impact.  ...  Changing behaviour requires more than providing information about risks and reactive behaviours - firstly, people must be able to understand and apply the advice, and secondly, they must be motivated and  ...  Influence strategies People do not usually simply follow advice or instructions on how to behave online even if they come from an expert or a person of authority.  ... 
arXiv:1901.02672v1 fatcat:zsty4oypl5c6vmr2n4fvrq2d2i

Users are not the enemy

Anne Adams, Martina Angela Sasse
1999 Communications of the ACM  
In a recent study, we found that users may indeed compromise computer security mechanisms, such as password authentication, both knowing and unknowingly.  ...  We argue that to change this state of affairs, security departments need to communicate more with users, and adopt a usercentered design approach.  ...  Acknowledgements Thanks are due to the users who participated in the questionnaire and interview studies.  ... 
doi:10.1145/322796.322806 fatcat:onzy4c2ynneotbavtmtpbzcecu

To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising

Omer Tene, Jules Polonetsky
2011 Social Science Research Network  
the potential value of this economic exchange; they do not know what will be done with the information and do not grasp the full implications of consenting to release of information. 286 And yet the  ...  WHAT DOES "DO NOT TRACK" MEAN?  ...  a third party for processing. 371 An organization must use contractual or other means to provide a comparable level of protection while the information is being processed by a third party. 372 Given that  ... 
doi:10.2139/ssrn.1920505 fatcat:fifrwdkqbzhxtfm3ykupwecjkm

Building Confidence not to be Phished through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour [article]

Gitanjali Baral, Nalin Asanka Gamagedara Arachchilage
2018 arXiv   pre-print
A theoretical framework is then developed depicting the mechanism that links knowledge attributes, self-efficacy, threat avoidance motivation that leads to users' threat avoidance behavior.  ...  One can argue self-efficacy is one of the most important determinants of individual's motivation in phishing threat avoidance behavior, which has co-relation with knowledge.  ...  The advice option is basically the caution to the player and will show a set of guidelines on how to avoid the mistakes and try not doing the same mistake again in future.  ... 
arXiv:1811.09024v1 fatcat:gekvz7bkkvdebeqlqw6lczqp44

Why Do Developers Get Password Storage Wrong?

Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
However, end-users are not the only ones who have usability problems with passwords! Developers who are tasked with writing the code by which passwords are stored must do so securely.  ...  For end-users, many of these issues have been studied extensively, highlighting problems and informing design decisions for better policies and motivating research into alternatives.  ...  ACKNOWLEDGEMENTS This work was partially funded by the ERC Grant 678341: Frontiers of Usable Security.  ... 
doi:10.1145/3133956.3134082 dblp:conf/ccs/NaiakshinaDTHD017 fatcat:52h6yaecbjckbovqrncq2gdc6m

Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [article]

Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán
2022 arXiv   pre-print
For interviewed device users, QSnatch infections lasted longer, so are apparently more difficult to get rid of, yet participants did not report experiencing difficulty in following notification instructions  ...  There is evidence that generic advice to device owners to address IoT malware can be successful, but this does not account for emerging forms of persistent IoT malware.  ...  Acknowledgments The authors would like to thank our anonymous reviewers for their feedback and suggestions to improve the quality of our manuscript.  ... 
arXiv:2203.01683v1 fatcat:nldja52yqzdyji6tgx36do5b7a

OWASP Top 10 - Do Startups Care?

Halldis Sohoel, Martin Gilje Jaatun, Colin Boyd
2018 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)  
This paper studies a small sample of 5 IT startups that offer services via the web, to determine to what extent they are aware of and can handle the OWASP top 10 threats.  ...  In a cut-throat world where time-to-market can be the difference between success and failure, it can be tempting for startups to think "let's get it to work first, and then we'll worry about security later  ...  The users are generating content in the form of Q/A, quizzes and discussions. What each user is allowed to do depends on the level of privileges.  ... 
doi:10.1109/cybersecpods.2018.8560666 dblp:conf/cybersecpods/SohoelJB18 fatcat:axp2k7ksz5c7xna247cphcooya

Software engineering is not enough

J.A. Whittaker, S. Atkin
2002 IEEE Software  
Much of the software engineering literature begins with an admonition that what practitioners are doing isn't enough-that the state-of-the-practice is creating bad software.  ...  This paper does not dispute this fact. However, we believe that what the software engineering literature offers as solutions is also not enough.  ...  The idea is that by breaking software, we learn about what it takes to fix it. Steve Atkin is a Software Engineer at IBM in Austin, Texas.  ... 
doi:10.1109/ms.2002.1020297 fatcat:2im5fuvtcncxtdw5nv7oplcccm

Users Really Do Plug in USB Drives They Find

Matthew Tischer, Zakir Durumeric, Sam Foster, Sunny Duan, Alec Mori, Elie Bursztein, Michael Bailey
2016 2016 IEEE Symposium on Security and Privacy (SP)  
We analyze the types of drives users connected and survey those users to understand their motivation and security profile. We find that a drive's appearance does not increase attack success.  ...  We investigate the anecdotal belief that end users will pick up and plug in USB flash drives they find by completing a controlled experiment in which we drop 297 flash drives on a large university campus  ...  ACKNOWLEDGEMENTS The authors thank the University of Illinois Technology Services, especially Wayland Morgan, as well as the members of the University of Illinois Police Department and the Office of  ... 
doi:10.1109/sp.2016.26 dblp:conf/sp/TischerDFDMBB16 fatcat:wtbyig5j3vh4zdpicovtb4dx5m

Weather Forecasts are for Wimps: Why Water Resource Managers Do Not Use Climate Forecasts

Steve Rayner, Denise Lach, Helen Ingram
2005 Climatic Change  
While managers usually cite "poor reliability" of the forecasts as the reason for this, they are seldom able to demonstrate knowledge of the actual performance of forecasts or to consistently articulate  ...  the level of reliability that they would require.  ...  Notes 1 Probabilistic ENSO forecasting is a recent addition to a fairly wide range of tools that have been proposed to introduce stochastic processes into many aspects of water resource engineering and  ... 
doi:10.1007/s10584-005-3148-z fatcat:zjsjlfijc5ai5ekasbd5vvegam

Doing Well and Doing Good

Thomas E. Patterson
2001 Social Science Research Network  
They do not read a daily paper regularly and do not closely follow the daily news on television, even though they may catch it from time to time. Why is this the case?  ...  In our survey, respondents who do not follow the news regularly were asked why they do not pay more attention. Negative perceptions of politics were a prominent factor.  ...  Is the material framed in a sensational way or not?  ... 
doi:10.2139/ssrn.257395 fatcat:dzot2ar2abfnrcfjsqsz5kyfka

Conducting Research: what do you want to know? what do others say? and how to do it. Some Personal Reflections

Nigel Jackson
2017 NSBM Journal of Management  
What aspect of social media do you want to look at, such as a marketing/persuasion tool, a means of motivating people, in terms of the impact of interaction/dialogue, why it is different from off-line  ...  This lack of a playbook to follow can make it feel daunting, but it gives us the freedom to try something different. What follows is a not a panacea for conducting research.  ... 
doi:10.4038/nsbmjm.v2i2.27 fatcat:kxbxphchvnbwxb3l355punmcbm
« Previous Showing results 1 — 15 out of 36,649 results