scholarly journals A New Approach for Textual Password Hardening Using Keystroke Latency Times

Author(s):  
Khalid Mansour ◽  
Khaled Mahmoud

Textual passwords are still widely used as an authentication mechanism. This paper addresses the problem of textual password hardening and proposes a mechanism to make textual passwords harder to be used by unauthorized persons. The mechanismintroduces time gaps between keystrokes (latency times) that would add a second protection line to the password. Latency times are converted into discrete representation (symbols) where the sequence of these symbols is added to the password. For accessing system, an authorized person needs to type his/her password with a certain rhythm. This rhythm is recorded at the sign-up time.This work is an extension to a previous work that elaborates more on the local approach of discretizing time gaps between every two consecutive keystrokes. In addition, more experimental settings and results are provided and analyzed. The local approach considers the keying pattern of each user to discretize latency times. The average, median and min-max are tested thoroughly.Two experimental settings are considered here: laboratory and real-world. The lab setting includes students studying information technology while the other group are not. On the other hand, information technology professional individuals participated in the real-world experiment. The results recommend using the local threshold approach over the global one. In addition, the average method performs better than the other methods. Finally, the experimental results of the real-world setting support using the proposed password hardening mechanism.

Robotics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 68
Author(s):  
Lei Shi ◽  
Cosmin Copot ◽  
Steve Vanlanduit

In gaze-based Human-Robot Interaction (HRI), it is important to determine human visual intention for interacting with robots. One typical HRI interaction scenario is that a human selects an object by gaze and a robotic manipulator will pick up the object. In this work, we propose an approach, GazeEMD, that can be used to detect whether a human is looking at an object for HRI application. We use Earth Mover’s Distance (EMD) to measure the similarity between the hypothetical gazes at objects and the actual gazes. Then, the similarity score is used to determine if the human visual intention is on the object. We compare our approach with a fixation-based method and HitScan with a run length in the scenario of selecting daily objects by gaze. Our experimental results indicate that the GazeEMD approach has higher accuracy and is more robust to noises than the other approaches. Hence, the users can lessen cognitive load by using our approach in the real-world HRI scenario.


2010 ◽  
Vol 36 (S1) ◽  
pp. 25-46 ◽  
Author(s):  
WILLIAM BAIN

AbstractThis article takes up Louise Arbour's claim that the doctrine of the ‘Responsibility to Protect’ is grounded in existing obligations of international law, specifically those pertaining to the prevention and punishment of genocide. In doing so, it argues that the aspirations of the R2P project cannot be sustained by the idea of ‘responsibility’ alone. The article proceeds in arguing that the coherence of R2P depends on an unacknowledged and unarticulated theory of obligation that connects notions of culpability, blame, and accountability with the kind of preventive, punitive, and restorative action that Arbour and others advocate. Two theories of obligation are then offered, one natural the other conventional, which make this connection explicit. But the ensuing clarity comes at a cost: the naturalist account escapes the ‘real’ world to redeem the intrinsic dignity of all men and women, while the conventionalist account remains firmly tethered to the ‘real’ world in redeeming whatever dignity can be had by way of an agreement. The article concludes by arguing that the advocate of the responsibility to protect can have one or the other, but not both.


First Monday ◽  
2019 ◽  
Author(s):  
James Brusseau

Compartmentalizing our distinct personal identities is increasingly difficult in big data reality. Pictures of the person we were on past vacations resurface in employers’ Google searches; LinkedIn which exhibits our income level is increasingly used as a dating web site. Whether on vacation, at work, or seeking romance, our digital selves stream together. One result is that a perennial ethical question about personal identity has spilled out of philosophy departments and into the real world. Ought we possess one, unified identity that coherently integrates the various aspects of our lives, or, incarnate deeply distinct selves suited to different occasions and contexts? At bottom, are we one, or many? The question is not only palpable today, but also urgent because if a decision is not made by us, the forces of big data and surveillance capitalism will make it for us by compelling unity. Speaking in favor of the big data tendency, Facebook’s Mark Zuckerberg promotes the ethics of an integrated identity, a single version of selfhood maintained across diverse contexts and human relationships. This essay goes in the other direction by sketching two ethical frameworks arranged to defend our compartmentalized identities, which amounts to promoting the dis-integration of our selves. One framework connects with natural law, the other with language, and both aim to create a sense of selfhood that breaks away from its own past, and from the unifying powers of big data technology.


2021 ◽  
Author(s):  
Edward Yourdon

A t the beginning of this paper, the decentralized world (DW) and decentralized world economy (DeWe) were defined. And the blockchain industry was pointed out to be at the initial stage of the decentralized world parallel to the real world. Then a set of systematicsolutions, named Electronical Material Information Technology (EMIT), was proposed, after which the development direction and path of the decentralized world economy was put forward, from its limitations, by arguing how to provide sufficient and necessary basic conditions for the decentralized world development. In the end, the EMIT was proved to be an effective reference for building the decentralized world from the basic level to the application level and enabling its sustainable development.


Pomorstvo ◽  
2020 ◽  
Vol 34 (2) ◽  
pp. 354-362
Author(s):  
Dino Županović ◽  
Luka Grbić ◽  
Marijan Cukrov

This paper proposes a model for optimizing the ferry traffic and the traffic demand at the macroscopic level by using information technology (IT) and the existing tourist amenities as a key element for achieving harmonization of supply and demand, i.e. optimization of the assessed system. Proposed approach differs from the other/present models because it includes the application of the macroscopic, instead of the microscopic (local) approach, i.e. harmonization of the ferry infrastructure demand from the place of its origin (road border crossings) to the place of its operation, i.e. the ferry infrastructure, and not solely in particular segments of the ferry infrastructure.


Author(s):  
Seokha Koh ◽  
Sooun Lee ◽  
David C. Yen ◽  
Douglas Havelka

No industry seems to change as much or as quickly as the information technology (IT) marketplace. The skills necessary to be a successful professional in this industry change as the technology changes and as one advances through a career. The results of prior research are used to develop a field study of IT professionals’ skill sets throughout their careers. Our findings suggest that IT professionals need to have different technical skills as their careers progress, and that; in fact, they do have different technical skills at different stages in their careers.


Author(s):  
Xiaotong Li

Many information resource managers have learned to be proactive in today’s highly competitive business environment. However, limited financial resources and many uncertainties require them to maximize their shareholders’ equity while controlling the risks incurred at an acceptable level. As the unprecedented development in information technology continuously produces great opportunities that are usually associated with significant uncertainties, technology adoption and planning become more and more crucial to companies in the information era. In this study, we attempt to evaluate IT investment opportunities from a new perspective, namely, the real options theory. Its advantage over other capital budgeting methods like static discounted cash flow analysis has been widely recognized in analyzing the strategic investment decision under uncertainties (Amram & Kulatilaka, 1999; Luehrman, 1998a, 1998b). Smith and McCardle (1998, 1999) further show that option pricing approach can be integrated into standard decision analysis framework to get the best of the both worlds. In fact, some previous IS researches have recognized the fact that many IT investment projects in the uncertain world possess some option-like characteristics (Clemsons, 1991; Dos Santos, 1991; Kumar, 1996). Recently, Benaroth and Kauffman (1999) and Taudes, Feurstein and Mild (2000) have applied the real options theory to real-world business cases and evaluated this approach’s merits as a tool for IT investment planning. As all real options models inevitably depend on some specific assumptions, their appropriateness should be scrutinized under different scenarios. This study aims to provide a framework that will help IS researchers to better understand the real options models and to apply them more rigorously in IT investment evaluation. As the technology changes, the basic economic principles underlying the real options theory do not change. We do need to integrate the IT dimension into the real options based investment decision-making process. Using electronic brokerage’s investment decision in wireless technology as a real-world example, we show the importance of adopting appropriate real options models in IT investment planning. By specifically focusing on the uncertainties caused by IT innovation and competition, our study also gives some intriguing results about the dynamics between IT adoption and the technology standard setting process.


Sign in / Sign up

Export Citation Format

Share Document