928 resultados para malicious users


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public transportation is an environment with great potential for applying location-based services through mobile devices. This paper provides the underpinning rationale for research that will be looking at how the real-time passenger information system deployed by the Translink Transit Authority across all of South East Queensland in Australia can provide a core platform to improve commuters’ user experiences. This system relies on mobile computing and GPS technology to provide accurate information on transport vehicle locations. The proposal builds on this platform to inform the design and development of innovative social media, mobile computing and geospatial information applications. The core aim is to digitally augment the public transport environment to enhance the user experience of commuters for a more enjoyable journey.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public transport is one of the key promoters of sustainable urban transport. To encourage and increase public transport patronage it is important to investigate the route choice behaviours of urban public transit users. This chapter reviews the main developments of modelling urban public transit users’ route choice behaviours in a historical perspective, from the 1960s to the present time. The approaches re- viewed for this study include the early heuristic studies on finding the least-cost transit route and all-or- nothing transit assignment, the bus common lines problem, the disaggregate discrete choice models, the deterministic and stochastic user equilibrium transit assignment models, and the recent dynamic transit assignment models. This chapter also provides an outlook for the future directions of modelling transit users’ route choice behaviours. Through the comparison with the development of models for motorists’ route choice and traffic assignment problems, this chapter advocates that transit route choice research should draw inspiration from the research outcomes from the road area, and that the modelling practice of transit users’ route choice should further explore the behavioural complexities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In place of, or alongside paradigms such as "the net generation", we suggest that the full implications of the Internet might be productively analysed using a broader framework, that of social imaginaries. First used by Cornelius Castoriadis and more recently by Charles Taylor, the social imaginary, as applied here, is the loosely co-ordinated body of significations that enable our social acts and practices by making sense of them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reviews the main studies on transit users’ route choice in thecontext of transit assignment. The studies are categorized into three groups: static transit assignment, within-day dynamic transit assignment, and emerging approaches. The motivations and behavioural assumptions of these approaches are re-examined. The first group includes shortest-path heuristics in all-or-nothing assignment, random utility maximization route-choice models in stochastic assignment, and user equilibrium based assignment. The second group covers within-day dynamics in transit users’ route choice, transit network formulations, and dynamic transit assignment. The third group introduces the emerging studies on behavioural complexities, day-to-day dynamics, and real-time dynamics in transit users’ route choice. Future research directions are also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

User-Web interactions have emerged as an important area of research in the field of information science. In this study, we investigate the effects of users’ cognitive styles on their Web navigational styles and information processing strategies. We report results from the analyses of 594 minutes recorded Web search sessions of 18 participants engaged in 54 scenario-based search tasks. We use questionnaires, cognitive style test, Web session logs and think-aloud as the data collection instruments. We classify users’ cognitive styles as verbalisers and imagers based on Riding’s (1991) Cognitive Style Analysis test. Two classifications of navigational styles and three categories of information processing strategies are identified. Our study findings show that there exist relationships between users’ cognitive style, and their navigational styles and information processing strategies. Verbal users seem to display sporadic navigational styles, and adopt a scanning strategy to understand the content of the search result page, while imagery users follow a structured navigational style and reading approach. We develop a matrix and a model that depicts the relationships between users’ cognitive styles, and their navigational style and information processing strategies. We discuss how the findings from this study could help search engine designers to provide an adaptive navigation support to users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

User-Web interactions have emerged as an important research in the field of information science. In this study, we examine extensively the Web searching performed by general users. Our goal is to investigate the effects of users’ cognitive styles on their Web search behavior in relation to two broad components: Information Searching and Information Processing Approaches. We use questionnaires, a measure of cognitive style, Web session logs and think-aloud as the data collection instruments. Our study findings show wholistic Web users tend to adopt a top-down approach to Web searching, where the users searched for a generic topic, and then reformulate their queries to search for specific information. They tend to prefer reading to process information. Analytic users tend to prefer a bottom-up approach to information searching and they process information by scanning search result pages.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many researchers have investigated and modelled aspects of Web searching. A number of studies have explored the relationships between individual differences and Web searching. However, limited studies have explored the role of users’ cognitive styles in determining Web searching behaviour. Current models of Web searching have limited consideration of users’ cognitive styles. The impact of users’ cognitive style on Web searching and their relationships are little understood or represented. Individuals differ in their information processing approaches and the way they represent information, thus affecting their performance. To create better models of Web searching we need to understand more about user’s cognitive style and their Web search behaviour, and the relationship between them. More rigorous research is needed in using more complex and meaningful measures of relevance; across a range of different types of search tasks and different populations of Internet users. The project further explores the relationships between the users’ cognitive style and their Web searching. The project will develop a model depicting the relationships between a user’s cognitive style and their Web searching. The related literature, aims and objectives and research design are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information behavior studies in the field of Library and Information Science (LIS) generally focus on one of many aspects of information behavior: information finding, information organizing, and information using. Information seeking is further specialized into information searching, information seeking, information foraging or information sense making. Spink and Cole (2006) highlighted the lack of integration across these various approaches and models of information behavior within LIS. Often, each approach provides a different language for similar processes (Spink & Cole, 2004), and it is sometimes hard for practicing information professionals to parse the various theories and models to see how they shape and affect the provision of information resources, services, and products. An integrated model of information behaviors that explains the key dimensions of how peoples’ contextual and situational dimensions affect their information needs and behavior will help information providers and LIS researchers alike with a framework that can help “depict and explain a sequence of behaviors by referring to relevant variables, rather than merely indicating a sequence of events… while indicating something about information needs and sources” (Case, 2002). This presentation presents an integrated model of peoples’ information behaviors based on research that studied participants’ information behaviors through a detailed daily information journal maintained for two weeks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Outcome expectancies are a key cognitive construct in the etiology, assessment and treatment of Substance Use Disorders. There is a research and clinical need for a cannabis expectancy measure validated in a clinical sample of cannabis users. Method The Cannabis Expectancy Questionnaire (CEQ) was subjected to exploratory (n = 501, mean age 27.45, 78% male) and confirmatory (n = 505, mean age 27.69, 78% male) factor analysis in two separate samples of cannabis users attending an outpatient cannabis treatment program. Weekly cannabis consumption was clinically assessed and patients completed the Severity of Dependence Scale-Cannabis (SDS-C) and the General Health Questionnaire (GHQ-28). Results Two factors representing Negative Cannabis Expectancies and Positive Cannabis Expectancies were identified. These provided a robust statistical and conceptual fit for the data. Internal reliabilities were high. Negative expectancies were associated with greater dependence severity (as measured by the SDS) and positive expectancies with higher consumption. The interaction of positive and negative expectancies was consistently significantly associated with self-reported functioning across all four GHQ-28 scales (Somatic Concerns, Anxiety, Social Dysfunction and Depression). Specifically, within the context of high positive cannabis expectancy, higher negative expectancy was predictive of more impaired functioning. By contrast, within the context of low positive cannabis expectancy, higher negative expectancy was predictive of better functioning. Conclusions The CEQ is the first cannabis expectancy measure to be validated in a sample of cannabis users in treatment. Negative and positive cannabis expectancy domains were uniquely associated with consumption, dependence severity and self-reported mental health functioning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigated the phenomenon of prejudice among ISD project members. We presented a theoretical discussion followed by one qualitative and one quantitative study. In the qualitative study, we interviewed different members of the project teams to understand the different types of prejudice possessed by team members. Results of this interview study led to the development of prejudice scales for IT members and users, which was used in the quantitative study. We surveyed 128 ISD teams and found that prejudice was related task and relationship conflict, satisfaction and willingness to work together in the future. Furthermore, prejudice exerts stronger influences on users than IT members in terms of increasing task and relationship conflicts and decreasing goal commitment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Comparison are required to understand transport benefits of Transit Oriented Developments (TODs). Mode shares of TOD users need to be understood. Accurate travel demand models for TODs are needed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transit Oriented Developments (TODs) are often designed to promote the use of sustainable modes of transport and reduce car usage. This paper investigates the effect of personal and transit characteristics on travel choices of TOD users. Binary logistic regression models were developed to determine the probability of choosing sustainable modes of transport including walking, cycling and public transport. Kelvin Grove Urban Village (KGUV) located in Brisbane, Australia was chosen as case study TOD. The modal splits for employees, students, shoppers and residents showed that 47% of employees, 84% of students, 71% of shoppers and 56% of residents used sustainable modes of transport.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[Selection of papers from the Older Road User Safety Symposium, 26 November 2000, Brisbane, Australia.]----- This publication is a selection of papers on older road user safety which were presented at the Older Road User Safety Symposium on Sunday 26 November 2000 at the Sheraton Brisbane Hotel, Queensland, Australia. The Symposium was held on the day before Australia’s annual Road Safety Research, Policing and Education Conference, which provided an opportunity to garner both presenters and participants from the wider road safety community in Australia. Road safety is a large and diverse area of scholarship and practice, and many disciplines are drawn on in the processes of understanding and addressing road safety problems. The safety of older road users is no different. As this selection shows, work on older road user safety can be informed by demography, research on the mental and physical effects of ageing, social research on older people as road users, evaluation of educational and behavioural interventions, road crash analysis, engineering research and practice, and reviews of policy approaches within Australia and elsewhere. It is possible to summarise these into four constellations, which are reflected in the papers selected for this publication: social impacts and responses; physical and cognitive capability; specific road use performance; and environment/ecology. Though three years have passed since the Symposium, the issues raised in these papers remain current.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social tags are an important information source in Web 2.0. They can be used to describe users’ topic preferences as well as the content of items to make personalized recommendations. However, since tags are arbitrary words given by users, they contain a lot of noise such as tag synonyms, semantic ambiguities and personal tags. Such noise brings difficulties to improve the accuracy of item recommendations. To eliminate the noise of tags, in this paper we propose to use the multiple relationships among users, items and tags to find the semantic meaning of each tag for each user individually. With the proposed approach, the relevant tags of each item and the tag preferences of each user are determined. In addition, the user and item-based collaborative filtering combined with the content filtering approach are explored. The effectiveness of the proposed approaches is demonstrated in the experiments conducted on real world datasets collected from Amazon.com and citeULike website.