399 resultados para Heyliger, Douglas
Resumo:
Before making a security or privacy decision, Internet users should evaluate several security indicators in their browser, such as the use of HTTPS (indicated via the lock icon), the domain name of the site, and information from extended validation certificates. However, studies have shown that human subjects infrequently employ these indicators, relying on other indicators that can be spoofed and convey no cryptographic assurances. We identify four simple security indicators that accurately represent security properties of the connection and then examine 125 popular websites to determine if the sites' designs result in correctly displayed security indicators during login. In the vast majority of cases, at least some security indicators are absent or suboptimal. This suggests users are becoming habituated to ignoring recommended security indicators.
Resumo:
This paper discusses an experiment investigating the effects of cognitive ageing and prior-experience with technology on using complex interfaces intuitively. Overall 37 participants, between the ages of 18 to 83, participated in this study. All participants were assessed for their cognitive abilities and prior-experience with technology. It was anticipated that the Central Executive function (a component of Working Memory) would emerge as one of the important cognitive functions in using complex interfaces. This was found to be the case with the strongest negative correlation occurring between sustained attention (one of the functions of the Central Executive), the time to complete the task and number of errors made by the participants.
Resumo:
This paper describes an experiment undertaken to investigate intuitive interaction, particularly in older adults. Previous work has shown that intuitive interaction relies on past experience, and has also suggested that older people demonstrate less intuitive uses and slower times when completing set tasks with various devices. Similarly, this experiment showed that past experience with relevant products allowed people to use the interfaces of two different microwaves more quickly and intuitively. It also revealed that certain aspects of cognitive decline related to aging, such as central executive function, have more impact on time, correct uses and intuitive uses than chronological age. Implications of these results are discussed.
Resumo:
This analysis of housing experiences and aspirations in three remote Indigenous settlements in Australia (Mimili, Maningrida and Palm Island) reveals extreme liveability problems directly related to the scale and form of housing provision. Based upon field visits to each of the settlements and extensive interviews with residents and local housing and community officers, the paper analyses two aspects of living in such housing conditions at two spatial scales, the layout of the settlement and the design of individual houses. The failings at both scales are shown to be the fault of a dysfunctional housing system that is only recently been addressed.
Resumo:
THE Little Dog Laughed. By Douglas Carter Beane. Queensland Theatre Company. Cremorne Theatre, Brisbane. February 11. DOUGLAS Carter Beane's The Little Dog Laughed is a comedy about truth and its consequences. Set mainly in New York, the story follows film star Mitchell Green's developing relationship with Alex, a rentboy he calls one night while drunk and lonely in a hotel room. Scenes in which Mitchell and Alex test the strength of something they seem to have found together are punctuated by monologues from Mitchell's agent Diane and Alex's ex-girlfriend Ellen. We start to see glimpses of their separate lives, what their shared life might look like and, eventually, a crisis that brings all four characters together in the pursuit of a somewhat conflicted set of ideas about what happiness is and what it takes to be happy.
Resumo:
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.
Resumo:
The airport city concept has been embraced by many airports of different scales and in varied ways around the world. Airports everywhere have diversified their landside revenues with non-aviation commercial and industrial development in order to increase revenues and spread risk in the notoriously volatile aviation market. As intermodal hubs in a connected, globalised world, airports have evolved from transportation nodes into multi-faceted business enterprises. They have assumed a critical role as ‘transactional’ spaces in the global economy (Gottdiener 2001).
Resumo:
The values of a leader set the culture of an organisation, determine the effectiveness of an organisation, and determine the success of an organisation. Understanding our values and being able to live our values adds significant emphasis to the leadership roles we perform in life. This book looks at where our values come from, and their role and impact in an organisational context. It offers a detailed conversation about values driven leadership - what it is and what it looks like.
Resumo:
X.509 public key certificates use a signature by a trusted certification authority to bind a given public key to a given digital identity. This document specifies how to use X.509 version 3 public key certificates in public key algorithms in the Secure Shell protocol.
Resumo:
Somatic embryogenesis and transformation systems are indispensable modern plant breeding components since they provide an alternative platform to develop control strategies against the plethora of pests and diseases affecting many agronomic crops. This review discusses some of the factors affecting somatic embryogenesis and transformation, highlights the advantages and limitations of these systems and explores these systems as breeding tools for the development of crops with improved agronomic traits. The regeneration of non-chimeric transgenic crops through somatic embryogenesis with introduced disease and pest-resistant genes for instance, would be of significant benefit to growers worldwide.
Resumo:
Gradual authentication is a principle proposed by Meadows as a way to tackle denial-of-service attacks on network protocols by gradually increasing the confidence in clients before the server commits resources. In this paper, we propose an efficient method that allows a defending server to authenticate its clients gradually with the help of some fast-to-verify measures. Our method integrates hash-based client puzzles along with a special class of digital signatures supporting fast verification. Our hash-based client puzzle provides finer granularity of difficulty and is proven secure in the puzzle difficulty model of Chen et al. (2009). We integrate this with the fast-verification digital signature scheme proposed by Bernstein (2000, 2008). These schemes can be up to 20 times faster for client authentication compared to RSA-based schemes. Our experimental results show that, in the Secure Sockets Layer (SSL) protocol, fast verification digital signatures can provide a 7% increase in connections per second compared to RSA signatures, and our integration of client puzzles with client authentication imposes no performance penalty on the server since puzzle verification is a part of signature verification.
Resumo:
Analytical and closed form solutions are presented in this paper for the vibration response of an L-shaped plate under a point force or a moment excitation. Inter-relationships between wave components of the source and the receiving plates are clearly defined. Explicit expressions are given for the quadratic quantities such as input power, energy flow and kinetic energy distributions of the L-shaped plate. Applications of statistical energy analysis (SEA) formulation in the prediction of the vibration response of finite coupled plate structures under a single deterministic forcing are examined and quantified. It is found that the SEA method can be employed to predict the frequency averaged vibration response and energy flow of coupled plate structures under a deterministic force or moment excitation when the structural system satisfies the following conditions: (1) the coupling loss factors of the coupled subsystems are known; (2) the source location is more than a quarter of the plate bending wavelength away from the source plate edges in the point force excitation case, or is more than a quarter wavelength away from the pair of source plate edges perpendicular to the moment axis in the moment excitation case due to the directional characteristic of moment excitations. SEA overestimates the response of the L-shaped plate when the source location is less than a quarter bending wavelength away from the respective plate edges owing to wave coherence effect at the plate boundary
Resumo:
This paper proposes a theoretical model for e-Government in Malaysia and addresses issues involved in its implementation. It presents three possible models including the Framework for Electronic Government (Grant & Chau, 2005), the Three Pillars Framework (Georgescu, 2007) and The Grid-Group Theory from cultural studies (Douglas, 1996) and integrates and adapts them to the specific needs of the Malaysian environment.