895 resultados para sicurezza, exploit, XSS, Beef, browser


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggregate experimentation that correlate responses to sites with and without indicators. We report on a laboratory experiment using eye-tracking to follow the behavior of self-identified computer experts as they share information across popular social media websites. The use of eye-tracking equipment allows us to explore possible behavioral differences in the way experts perceive web browser security cues, as opposed to non-experts. Unfortunately, due to the use of self-identified experts, technological issues with the setup, and demographic anomalies, our results are inconclusive. We describe our initial experimental design, lessons learned in our experimentation, and provide a set of steps for others to follow in implementing experiments using unfamiliar technologies, eye-tracking specifically, subjects with different experience with the laboratory tasks, as well as individuals with varying security expertise. We also discuss recruitment and how our design will address the inherent uncertainties in recruitment, as opposed to design for an ideal population. Some of these modifications are generalizable, together they will allow us to run a larger 2x2 study, rather than a study of only experts using two different single sign-on systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Traditionally, Science education has stressed the importance of teaching students to conduct ‘scientific inquiry’, with the main focus being the experimental model of inquiry used by real world scientists. Current educational approaches using constructivist pedagogy recognise the value of inquiry as a method for promoting the development of deep understanding of discipline content. A recent Information Learning Activity undertaken by a Grade Eight Science class was observed to discover how inquiry based learning is implemented in contemporary Science education. By analysing student responses to questionnaires and assessment task outcomes, the author was able to determine the level of inquiry inherent in the activity and how well the model supported student learning and the development of students’ information literacy skills. Although students achieved well overall, some recommendations are offered that may enable teachers to better exploit the learning opportunities provided by inquiry based learning. Planning interventions at key stages of the inquiry process can assist students to learn more effective strategies for dealing with cognitive and affective challenges. Allowing students greater input into the selection of topic or focus of the activity may encourage students to engage more deeply with the learning task. Students are likely to experience greater learning benefit from access to developmentally appropriate resources, increased time to explore topics and multiple opportunities to undertake information searches throughout the learning activity. Finally, increasing the cognitive challenge can enhance both the depth of students’ learning and their information literacy skills.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vehicular Ad-hoc Networks (VANET) have different characteristics compared to other mobile ad-hoc networks. The dynamic nature of the vehicles which act as routers and clients are connected with unreliable radio links and Routing becomes a complex problem. First we propose CO-GPSR (Cooperative GPSR), an extension of the traditional GPSR (Greedy Perimeter Stateless Routing) which uses relay nodes which exploit radio path diversity in a vehicular network to increase routing performance. Next we formulate a Multi-objective decision making problem to select optimum packet relaying nodes to increase the routing performance further. We use cross layer information for the optimization process. We evaluate the routing performance more comprehensively using realistic vehicular traces and a Nakagami fading propagation model optimized for highway scenarios in VANETs. Our results show that when Multi-objective decision making is used for cross layer optimization of routing a 70% performance increment can be obtained for low vehicle densities on average, which is a two fold increase compared to the single criteria maximization approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although the drivers of innovation have been studied extensively in construction, greater attention is required on how innovation diffusion can be effectively assessed within this complex and interdependent project-based industry. The authors draw on a highly cited innovation diffusion model by Rogers (2006) and develop a tailored conceptual framework to guide future empirical work aimed at assessing innovation diffusion in construction. The conceptual framework developed and discussed in this paper supports a five-stage process model of innovation diffusion namely: 1) knowledge and idea generation, 2) persuasion and evaluation; 3) decision to adopt, 4) integration and implementation, and 5) confirmation. As its theoretical contribution, this paper proposes three critical measurements constructs which can be used to assess the effectiveness of the diffusion process. These measurement constructs comprise: 1) nature and introduction of an innovative idea, 2) organizational capacity to acquire, assimilate, transform and exploit an innovation, and 3) rates of innovation facilitation and adoption. The constructs are interpreted in the project-based context of the construction industry, extending the contribution of general management theorists. Research planned by the authors will test the validity and reliability of the constructs developed in this paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern applications comprise multiple components, such as browser plug-ins, often of unknown provenance and quality. Statistics show that failure of such components accounts for a high percentage of software faults. Enabling isolation of such fine-grained components is therefore necessary to increase the robustness and resilience of security-critical and safety-critical computer systems. In this paper, we evaluate whether such fine-grained components can be sandboxed through the use of the hardware virtualization support available in modern Intel and AMD processors. We compare the performance and functionality of such an approach to two previous software based approaches. The results demonstrate that hardware isolation minimizes the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution's correctness. We also show that our relatively simple implementation has equivalent run-time performance, with overheads of less than 34%, does not require custom tool chains and provides enhanced functionality over software-only approaches, confirming that hardware virtualization technology is a viable mechanism for fine-grained component isolation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Automated airborne collision-detection systems are a key enabling technology for facilitat- ing the integration of unmanned aerial vehicles (UAVs) into the national airspace. These safety-critical systems must be sensitive enough to provide timely warnings of genuine air- borne collision threats, but not so sensitive as to cause excessive false-alarms. Hence, an accurate characterisation of detection and false alarm sensitivity is essential for understand- ing performance trade-offs, and system designers can exploit this characterisation to help achieve a desired balance in system performance. In this paper we experimentally evaluate a sky-region, image based, aircraft collision detection system that is based on morphologi- cal and temporal processing techniques. (Note that the examined detection approaches are not suitable for the detection of potential collision threats against a ground clutter back- ground). A novel collection methodology for collecting realistic airborne collision-course target footage in both head-on and tail-chase engagement geometries is described. Under (hazy) blue sky conditions, our proposed system achieved detection ranges greater than 1540m in 3 flight test cases with no false alarm events in 14.14 hours of non-target data (under cloudy conditions, the system achieved detection ranges greater than 1170m in 4 flight test cases with no false alarm events in 6.63 hours of non-target data). Importantly, this paper is the first documented presentation of detection range versus false alarm curves generated from airborne target and non-target image data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Effective management of chronic diseases such as prostate cancer is important. Research suggests a tendency to use self-care treatment options such as over-the-counter (OTC) complementary medications among prostate cancer patients. The current trend in patient-driven recording of health data in an online Personal Health Record (PHR) presents an opportunity to develop new data-driven approaches for improving prostate cancer patient care. However, the ability of current online solutions to share patients' data for better decision support is limited. An informatics approach may improve online sharing of self-care interventions among these patients. It can also provide better evidence to support decisions made during their self-managed care. AIMS: To identify requirements for an online system and describe a new case-based reasoning (CBR) method for improving self-care of advanced prostate cancer patients in an online PHR environment. METHOD: A non-identifying online survey was conducted to understand self-care patterns among prostate cancer patients and to identify requirements for an online information system. The pilot study was carried out between August 2010 and December 2010. A case-base of 52 patients was developed. RESULTS: The data analysis showed self-care patterns among the prostate cancer patients. Selenium (55%) was the common complementary supplement used by the patients. Paracetamol (about 45%) was the commonly used OTC by the patients. CONCLUSION: The results of this study specified requirements for an online case-based reasoning information system. The outcomes of this study are being incorporated in design of the proposed Artificial Intelligence (Al) driven patient journey browser system. A basic version of the proposed system is currently being considered for implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What is the contribution of innovation brokers in leveraging research and development (R&D) investment to enhance industry-wide capabilities? The case of the Australian Cooperative Research Centre for Construction Innovation (CRC CI) is considered in the context of motivating supply chain firms to improve their organizational capabilities in order to acquire, assimilate, transfer and exploit R&D outcomes to their advantage, and to create broader industry and national benefits. A previous audit and analysis has shown an increase in business R&D investment since 2001. The role of the CRC CI in contributing to growth in the absorptive capacity of the Australian construction industry as a whole is illustrated through two programmes: digital modelling building information modelling (BIM) and construction site safety. Numerous positive outcomes in productivity, quality, improved safety and competitiveness were achieved between 2001 and 2009.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article considers the implications for Queensland practitioners of the decision of the New South Wales Court of Appeal in Branson v Tucker [2012] NSWCA 310. That decision involved the question whether the court retained a jurisdiction to examine the reasonableness of costs charged by a barrister, who had entered a costs agreement with solicitors, in circumstances where where had been no application under the Legal Profession Act 2004 (NSW) for an assessment of the costs the subject of the bill and it was no longer possible for such an application to be made.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes an architecture for robotic telepresence and teleoperation based on the well known tools ROS and Skype. We discuss how Skype can be used as a framework for robotic communication and can be integrated into a ROS/Linux framework to allow a remote user to not only interact with people near the robot, but to view maps, sensory data, robot pose and to issue commands to the robot’s navigation stack. This allows the remote user to exploit the robot’s autonomy, providing a much more convenient navigation interface than simple remote joysticking.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Changing environments present a number of challenges to mobile robots, one of the most significant being mapping and localisation. This problem is particularly significant in vision-based systems where illumination and weather changes can cause feature-based techniques to fail. In many applications only sections of an environment undergo extreme perceptual change. Some range-based sensor mapping approaches exploit this property by combining occasional place recognition with the assumption that odometry is accurate over short periods of time. In this paper, we develop this idea in the visual domain, by using occasional vision-driven loop closures to infer loop closures in nearby locations where visual recognition is difficult due to extreme change. We demonstrate successful map creation in an environment in which change is significant but constrained to one area, where both the vanilla CAT-Graph and a Sum of Absolute Differences matcher fails, use the described techniques to link dissimilar images from matching locations, and test the robustness of the system against false inferences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driving on an approach to a signalized intersection while distracted is particularly dangerous, as potential vehicular conflicts and resulting angle collisions tend to be severe. Given the prevalence and importance of this particular scenario, the decisions and actions of distracted drivers during the onset of yellow lights are the focus of this study. Driving simulator data were obtained from a sample of 58 drivers under baseline and handheld mobile phone conditions at the University of Iowa - National Advanced Driving Simulator. Explanatory variables included age, gender, cell phone use, distance to stop-line, and speed. Although there is extensive research on drivers’ responses to yellow traffic signals, the examination has been conducted from a traditional regression-based approach, which does not necessary provide the underlying relations and patterns among the sampled data. In this paper, we exploit the benefits of both classical statistical inference and data mining techniques to identify the a priori relationships among main effects, non-linearities, and interaction effects. Results suggest that novice (16-17 years) and young drivers’ (18-25 years) have heightened yellow light running risk while distracted by a cell phone conversation. Driver experience captured by age has a multiplicative effect with distraction, making the combined effect of being inexperienced and distracted particularly risky. Overall, distracted drivers across most tested groups tend to reduce the propensity of yellow light running as the distance to stop line increases, exhibiting risk compensation on a critical driving situation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many older people have difficulties using modern consumer products due to increased product complexity both in terms of functionality and interface design. Previous research has shown that older people have more difficulty in using complex devices intuitively when compared to the younger. Furthermore, increased life expectancy and a falling birth rate have been catalysts for changes in world demographics over the past two decades. This trend also suggests a proportional increase of older people in the work-force. This realisation has led to research on the effective use of technology by older populations in an effort to engage them more productively and to assist them in leading independent lives. Ironically, not enough attention has been paid to the development of interaction design strategies that would actually enable older users to better exploit new technologies. Previous research suggests that if products are designed to reflect people's prior knowledge, they will appear intuitive to use. Since intuitive interfaces utilise domain-specific prior knowledge of users, they require minimal learning for effective interaction. However, older people are very diverse in their capabilities and domain-specific prior knowledge. In addition, ageing also slows down the process of acquiring new knowledge. Keeping these suggestions and limitations in view, the aim of this study was set to investigate possible approaches to developing interfaces that facilitate their intuitive use by older people. In this quest to develop intuitive interfaces for older people, two experiments were conducted that systematically investigated redundancy (the use of both text and icons) in interface design, complexity of interface structure (nested versus flat), and personal user factors such as cognitive abilities, perceived self-efficacy and technology anxiety. All of these factors could interfere with intuitive use. The results from the first experiment suggest that, contrary to what was hypothesised, older people (65+ years) completed the tasks on the text only based interface design faster than on the redundant interface design. The outcome of the second experiment showed that, as expected, older people took more time on a nested interface. However, they did not make significantly more errors compared with younger age groups. Contrary to what was expected, older age groups also did better under anxious conditions. The findings of this study also suggest that older age groups are more heterogeneous in their capabilities and their intuitive use of contemporary technological devices is mediated more by domain-specific technology prior knowledge and by their cognitive abilities, than chronological age. This makes it extremely difficult to develop product interfaces that are entirely intuitive to use. However, by keeping in view the cognitive limitations of older people when interfaces are developed, and using simple text-based interfaces with flat interface structure, would help them intuitively learn and use complex technological products successfully during early encounter with a product. These findings indicate that it might be more pragmatic if interfaces are designed for intuitive learning rather than for intuitive use. Based on this research and the existing literature, a model for adaptable interface design as a strategy for developing intuitively learnable product interfaces was proposed. An adaptable interface can initially use a simple text only interface to help older users to learn and successfully use the new system. Over time, this can be progressively changed to a symbols-based nested interface for more efficient and intuitive use.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigated the influence of interpersonal coordination tendencies on performance outcomes of 1-vs-1 subphases in youth soccer. Eight male developing soccer players (age: 11.8+0.4 years; training experience: 3.6+1.1 years) performed an in situ simulation of a 1-vs-1 sub-phase of soccer. Data from 82 trials were obtained with motion-analysis techniques, and relative phase used to measure the space-time coordination tendencies of attacker-defender dyads. Approximate entropy (ApEn) was then used to quantify the unpredictability of interpersonal interactions over trials. Results revealed how different modes of interpersonal coordination emerging from attacker-defender dyads influenced the 1-vs-1 performance outcomes. High levels of space-time synchronisation (47%) and unpredictability in interpersonal coordination processes (ApEn: 0.91+0.34) were identified as key features of an attacking player’s success. A lead-lag relation attributed to a defending player (34% around 7308 values) and a more predictable coordination mode (ApEn: 0.65+0.27, P50.001), demonstrated the coordination tendencies underlying the success of defending players in 1-vs-1 sub-phases. These findings revealed how the mutual influence of each player on the behaviour of dyadic systems shaped emergent performance outcomes. More specifically, the findings showed that attacking players should be constrained to exploit the space-time synchrony with defenders in an unpredictable and creative way, while defenders should be encouraged to adopt postures and behaviours that actively constrain the attacker’s actions.