scholarly journals The Analysis of the Properties and Characteristics of Passwords for a Hardware Manager Based on Arduino Microcontroller

2019 ◽  
pp. 16-20
Author(s):  
Alexey Lebedenko ◽  
Evgeny Vasilyev

The use of passwords is one of the most popular ways to authenticate users on the Internet. Because of the specificity of storing passwords, developers are forced to impose restrictions on which passwords are safer to use. For example, most often a password must contain at least 8 characters, have letters of different registers, contain special characters, etc. It can be stated that over time, these restrictions only increase, and this in turn complicates the choice of a secure and at the same time easy-to-remember password. For example, the most secure password will contain 128 characters with maximum entropy. The article is devoted to user authentication, password entropy and valid passwords for websites, methods for improving authentication by developing a hardware password manager based on Arduino microcontroller. Thus, a password generated randomly has more entropy than a password generated by the user. The algorithm of the device includes functions of generating a password from the permissible characteristics and maximum entropy, storing the password on the device, improving security by confirming actions, reading the password from the device to the input line, and using the pin-code protection.

Author(s):  
Matthew Hindman

The Internet was supposed to fragment audiences and make media monopolies impossible. Instead, behemoths like Google and Facebook now dominate the time we spend online—and grab all the profits from the attention economy. This book explains how this happened. It sheds light on the stunning rise of the digital giants and the online struggles of nearly everyone else—and reveals what small players can do to survive in a game that is rigged against them. The book shows how seemingly tiny advantages in attracting users can snowball over time. The Internet has not reduced the cost of reaching audiences—it has merely shifted who pays and how. Challenging some of the most enduring myths of digital life, the book explains why the Internet is not the postindustrial technology that has been sold to the public, how it has become mathematically impossible for grad students in a garage to beat Google, and why net neutrality alone is no guarantee of an open Internet. It also explains why the challenges for local digital news outlets and other small players are worse than they appear and demonstrates what it really takes to grow a digital audience and stay alive in today's online economy. The book shows why, even on the Internet, there is still no such thing as a free audience.


Author(s):  
Ben Epstein

This chapter shifts the focus to the third and final stabilization phase of the political communication cycle (PCC). During the stabilization phase, a new political communication order (PCO) takes shape through the building of norms, institutions, and regulations that serve to fix the newly established status quo in place. This status quo occurs when formerly innovative political communication activities become mundane, yet remain powerful. Much of the chapter details the pattern of communication regulation and institution construction over time. In particular, this chapter explores the instructive similarities and key differences between the regulation of radio and the internet, which offers important perspectives on the significance of our current place in the PCC and the consequences of choices that will be made over the next few years.


2002 ◽  
Vol 3 (2) ◽  
pp. 45-52
Author(s):  
Jorian Clarke

Describes a six‐year study of children’s Internet usage which shows how preferences and habits have changed over time; this was conducted by SpectraCom Inc and Circle 1 network. Explains the research methodology and the objectives, which were to identify trends in the amount of time spent by children online now and in future, their opinions about the future role of the Internet in society and the future of e‐commerce, and parents’ roles in children’s online activities. Concludes that there is need for a more child‐friendly content in Internet sites and for more parental involvement, that children will be influential in the market for alternative devices like mobile phones, that online shopping is likely to flourish, and that children have a growing interest in online banking.


2020 ◽  
Author(s):  
Anbiao Huang ◽  
Shuo Gao ◽  
Arokia Nathan

In Internet of Things (IoT) applications, among various authentication techniques, keystroke authentication methods based on a user’s touch behavior have received increasing attention, due to their unique benefits. In this paper, we present a technique for obtaining high user authentication accuracy by utilizing a user’s touch time and force information, which are obtained from an assembled piezoelectric touch panel. After combining artificial neural networks with the user’s touch features, an equal error rate (EER) of 1.09% is achieved, and hence advancing the development of security techniques in the field of IoT.


Author(s):  
Ya-Wen Lei

This introductory chapter reveals that a nationwide contentious public sphere has emerged in China. It is an unruly sphere capable of generating issues and agendas not set by the Chinese state, as opposed to a sphere mostly orchestrated and constrained by said state. Over time, China's contentious public sphere has been increasingly recognized by the Chinese state as a force to be reckoned and negotiated with. Starting around 2010, official media of the Chinese Communist Party (CCP), such as the People's Daily, began to warn of a threatening public sphere mediated by cell phones, the Internet, and even some unruly voices within state-controlled media. The state's awareness of these developments, however, means that one must not overstate the stability or permanence of the newly emerged contentious public sphere. Indeed, this provocative public arena has encountered serious opposition and setbacks, particularly since 2013. Seeing the rise of such a sphere as a threat to national security and an indication of ideological struggle between the West and China, the Chinese state has taken comprehensive and combative measures to contain it.


Author(s):  
Hayri Abar ◽  
Ömer Alkan

The concept of trade has emerged with the inter-business division of labor. The internet, which is a much more recent concept than trade, has begun to get closer over time. The reason why trade is to see the internet as a commercial tool lies in the fact that the internet is spread over a wide mass network. The aim of this study is to determine socio-economic and demographic factors that are effective in purchasing or ordering goods and services by internet in Turkey. It was found that the number of information equipment, income, being male, working, and education increased the probability of shopping over the internet. It was determined that household size and age decreased. Females shop for clothing and sports goods more than males. The highest correlation with the purchase of other product groups over the internet is through holiday accommodation and other travel-related transactions.


Author(s):  
Paola Peretti ◽  
Valentina Chiaudano ◽  
Mohanbir Sawhney

“The internet dilemma” was the concept used to describe luxury brand companies' initial reluctance to integrate online technologies into their business model. However, over time, luxury brand companies have understood that moving towards digital transformation is the only way to survive on the market and appeal to the new luxury brand consumers. In a few years, digitalisation has become a priority for all luxury brand companies that started to integrate digital and physical platforms to engage consumers through all touchpoints of their shopping journey. In light of the topic's relevance and considering the primary focus of research on consumers, this chapter aims to deepen the digitalisation phenomenon in the luxury market involving the little-explored luxury brand managers' perspective. The authors conducted a longitudinal study to compare the main changes in integrating digital and physical platforms from the managers' perspective between 2014 and 2020. In this endeavour, they also considered how the COVID-19 pandemic had affected luxury brand companies' digitalisation.


2020 ◽  
pp. 239-254
Author(s):  
David W. Dorsey

With the rise of the internet and the related explosion in the amount of data that are available, the field of data science has expanded rapidly, and analytic techniques designed for use in “big data” contexts have become popular. These include techniques for analyzing both structured and unstructured data. This chapter explores the application of these techniques to the development and evaluation of career pathways. For example, data scientists can analyze online job listings and resumes to examine changes in skill requirements and careers over time and to examine job progressions across an enormous number of people. Similarly, analysts can evaluate whether information on career pathways accurately captures realistic job progressions. Within organizations, the increasing amount of data make it possible to pinpoint the specific skills, behaviors, and attributes that maximize performance in specific roles. The chapter concludes with ideas for the future application of big data to career pathways.


Sign in / Sign up

Export Citation Format

Share Document