563 resultados para Web Security
Resumo:
With the rapid growth of information on the Web, the study of information searching has let to an increased interest. Information behaviour (IB) researchers and information systems (IS) developers are continuously exploring user - Web search interactions to understand and to help users to provide assistance with their information searching. In attempting to develop models of IB, several studies have identified various factors that govern user's information searching and information retrieval (IR), such as age, gender, prior knowledge and task complexity. However, how users' contextual factors, such as cognitive styles, affect Web search interactions has not been clearly explained by the current models of Web Searching and IR. This study explores the influence of users' cognitive styles on their Web search behaviour. The main goal of the study is to enhance Web search models with a better understanding of how these cognitive styles affect Web searching. Modelling Web search behaviour with a greater understanding of user's cognitive styles can help information science researchers and IS designers to bridge the semantic gap between the user and the IS. To achieve the aims of the study, a user study with 50 participants was conducted. The study adopted a mixed method approach incorporating several data collection strategies to gather a range of qualitative and quantitative data. The study utilised pre-search and post-search questionnaires to collect the participants' demographic information and their level of satisfaction about the search interactions. Riding's (1991) Cognitive Style Analysis (CSA) test was used to assess the participants' cognitive styles. Participants completed three predesigned search tasks and the whole user - web search interactions, including thinkaloud, were captured using a monitoring program. Data analysis involved several qualitative and quantitative techniques: the quantitative data gave raise to detailed findings about users' Web searching and cognitive styles, the qualitative data enriched the findings with illustrative examples. The study results provide valuable insights into Web searching behaviour among different cognitive style users. The findings of the study extend our understanding of Web search behaviour and how users search information on the Web. Three key study findings emerged: • Users' Web search behaviour was demonstrated through information searching strategies, Web navigation styles, query reformulation behaviour and information processing approaches while performing Web searches. The manner in which these Web search patterns were demonstrated varied among the users with different cognitive style groups. • Users' cognitive styles influenced their information searching strategies, query reformulation behaviour, Web navigational styles and information processing approaches. Users with particular cognitive styles followed certain Web search patterns. • Fundamental relationships were evident between users' cognitive styles and their Web search behaviours; and these relationships can be illustrated through modelling Web search behaviour. Two models that depict the associations between Web search interactions, user characteristics and users' cognitive styles were developed. These models provide a greater understanding of Web search behaviour from the user perspective, particularly how users' cognitive styles influence their Web search behaviour. The significance of this research is twofold: it will provide insights for information science researchers, information system designers, academics, educators, trainers and librarians who want to better understand how users with different cognitive styles perform information searching on the Web; at the same time, it will provide assistance and support to the users. The major outcomes of this study are 1) a comprehensive analysis of how users search the Web; 2) extensive discussion on the implications of the models developed in this study for future work; and 3) a theoretical framework to bridge high-level search models and cognitive models.
Resumo:
The economics of supporting learning has seen institutional encouragement of a wide range of blended learning initiatives in face to face and online teaching and learning. This has become one of the key drivers for the adoption of technology in teaching, in a manner occassionally guilty of putting the cart before the horse. Learning spaces are increasingly equipped with a dizzying array of technological options testifying to institutional and governmental investment and commitment in supporting face to face blended learning (QUT, 2011, C/4.2). Yet innovation within traditional learning and teaching models faces a number of challenges both at an institutional level and at the teaching coal face. Web 2.0 technologies present a vast array of opportunities to harness and capture the attention of students in engaging learning opportunitites. This presentation will explore technologies supportive of active learning pedagogies.
Resumo:
The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.
Resumo:
Collecting regular personal reflections from first year teachers in rural and remote schools is challenging as they are busily absorbed in their practice, and separated from each other and the researchers by thousands of kilometres. In response, an innovative web-based solution was designed to both collect data and be a responsive support system for early career teachers as they came to terms with their new professional identities within rural and remote school settings. Using an emailed link to a web-based application named goingok.com, the participants are charting their first year plotlines using a sliding scale from ‘distressed’, ‘ok’ to ‘soaring’ and describing their self-assessment in short descriptive posts. These reflections are visible to the participants as a developing online journal, while the collections of de-identified developing plotlines are visible to the research team, alongside numerical data. This paper explores important aspects of the design process, together with the challenges and opportunities encountered in its implementation. A number of the key considerations for choosing to develop a web application for data collection are initially identified, and the resultant application features and scope are then examined. Examples are then provided about how a responsive software development approach can be part of a supportive feedback loop for participants while being an effective data collection process. Opportunities for further development are also suggested with projected implications for future research.
Resumo:
A new cold-formed and resistance welded section known as the Hollow Flange Beam (HFB) has been developed recently in Australia. In contrast to the common lateral torsional buckling mode of I-beams, this unique section comprising two stiff triangular flanges and a slender web is susceptible to a lateral distortional buckling mode of failure involving lateral deflection, twist, and cross-section change due to web distortion. This lateral distortional buckling behavior has been shown to cause significant reduction of the available flexural capacity of HFBs. An investigation using finite element analyses and large scale experiments was carried out into the use of transverse web plate stiffeners to improve the lateral buckling capacity of HFBs. This paper presents the details of the finite element model and analytical results. The experimental procedure and results are outlined in a companion paper at this conference.
Resumo:
A new cold-formed and resistance welded section known as the Hollow Flange Beam (HFB) has been developed recently in Australia. In contrast to the common lateral torsional buckling mode of I-beams, this unique section comprising two stiff triangular flanges and a slender web is susceptible to a lateral distortional buckling mode of failure involving lateral deflection, twist and cross-section change due to web distortion. This lateral distortional buckling behaviour has been shown to cause significant reduction of the available flexural strength of HFBs. An investigation using finite element analyses and large scale experiments was carried out into the use of transverse web plate stiffeners to improve the lateral buckling capacity of HFBs. This paper presents the details of the experimental investigation, the results, and the final stiffener arrangement whereas the details of the finite element analyses are presented in a companion paper at this conference.
Resumo:
A new cold-formed and resistance-welded section known as the hollow flange beam (HFB) has been developed recently in Australia. In contrast to the common lateral-torsional buckling mode of I-beams, this unique section comprising two stiff triangular flanges and a slender web is susceptible to a lateral-distortional buckling mode of failure involving lateral deflection, twist, and cross-section change due to web distortion. This lateral-distortional buckling behavior has been shown to cause significant reduction of the available flexural capacity of HFBs. An investigation using finite-element analyses and large-scale experiments was carried out into the use of transverse web plate stiffeners to improve the lateral buckling capacity of HFBs. This paper presents the details of the finite-element model and analytical results. The experimental procedure and results are outlined in a companion paper.
Resumo:
The hollow flange beam (HFB) is a new cold-formed and resistance-welded section developed in Australia. Due to its unique geometry comprising two stiff triangular flanges and a slender web, the HFB is susceptible to a lateral-distortional buckling mode of failure involving web distortion. Investigation using finite-element analyses showed that the use of transverse web plate stiffeners effectively eliminated lateral-distortional buckling of HFBs and thus any associated reduction in flexural capacity. A detailed experimental investigation was then carried out to validate the results from the finite-element analysis and to improve the stiffener configuration further. This led to the development of a special stiffener that is screw-fastened to the flanges on alternate sides of the web. This paper presents the details of the experimental investigations, the results, and the final stiffener arrangement whereas the details of the finite-element analyses are presented in a companion paper.
Resumo:
Cold-formed steel Lipped Channel Beams (LCB) with web openings are commonly used as floor joists and bearers in building structures. Shear behaviour of these beams is more complicated and their shear capacities are considerably reduced by the presence of web openings. Hence detailed numerical and experimental studies of simply supported LCBs under a mid-span load with aspect ratios of 1.0 and 1.5 were undertaken to investigate the shear behaviour and strength of LCBs with web openings. Experimental and numerical results showed that the current design rules in cold-formed steel structures design codes are very conservative. Improved design equations were therefore proposed for the shear strength of LCBs with web openings based on both experimental and numerical results. This research showed a significant reduction in shear capacities of LCBs when large web openings are included for the purpose of locating building services. A cost effective method of eliminating such detrimental effects of large circular web openings was also therefore investigated using experimental and numerical studies. For this purpose LCBS were reinforced using plate, stud, transverse and sleeve stiffeners with varying sizes and thicknesses that were welded and screw-fastened to the web of LCBs. These studies showed that plate stiffeners were the most suitable. Suitable screw-fastened plate stiffener arrangements with optimum thicknesses were then proposed for LCBs with web openings to restore their original shear capacities. This paper presents the details of finite element analyses and experiments of LCBs with web openings in shear, and the development of improved shear design rules. It then describes the experimental and numerical studies to determine the optimum plate stiffener arrangements and the results. The proposed shear design rules in this paper can be considered for inclusion in the future versions of cold-formed steel design codes.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.
Resumo:
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.
Resumo:
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.
Resumo:
In this paper we will examine passenger actions and activities at the security screening points of Australian domestic and international airports. Our findings and analysis provide a more complete understanding of the current airport passenger security screening experience. Data in this paper is comprised of field studies conducted at two Australian airports, one domestic and one international. Video data was collected by cameras situated either side of the security screening point. A total of one hundred and ninety-six passengers were observed. Two methods of analysis are used. First, the activities of passengers are coded and analysed to reveal the common activities at domestic and international security regimes and between quiet and busy periods. Second, observation of passenger activities is used to reveal uncommon aspects. The results show that passengers do more at security screening that being passively scanned. Passengers queue, unpack the required items from their bags and from their pockets, walk through the metal-detector, re-pack and occasionally return to be re-screened. For each of these activities, passengers must understand the procedures at the security screening point and must co-ordinate various actions and objects in time and space. Through this coordination passengers are active participants in making the security checkpoint function – they are co-producers of the security screening process.