scholarly journals Usable comprehensive-factor authentication for a secure time attendance system

2021 ◽  
Vol 7 ◽  
pp. e678
Author(s):  
Chalee Vorakulpipat ◽  
Sasakorn Pichetjamroen ◽  
Ekkachan Rattanalerdnusorn

In information security, it is widely accepted that the more authentication factors are used, the higher the security level. However, more factors cannot guarantee usability in real usage because human and other non-technical factors are involved. This paper proposes the use of all possible authentication factors, called comprehensive-factor authentication, which can maintain the required security level and usability in real-world implementation. A case study of an implementation of a secure time attendance system that applies this approach is presented. The contribution of this paper is therefore to provide a security scheme seamlessly integrating all classical authentication factors plus a location factor into one single system in a real environment with a security and usability focus. Usability factors emerging from the study are related to a seamless process including the least number of actions required, the lowest amount of time taken, health safety during the pandemic, and data privacy compliance.

2015 ◽  
Vol 25 (1) ◽  
pp. 39-45 ◽  
Author(s):  
Jennifer Tetnowski

Qualitative case study research can be a valuable tool for answering complex, real-world questions. This method is often misunderstood or neglected due to a lack of understanding by researchers and reviewers. This tutorial defines the characteristics of qualitative case study research and its application to a broader understanding of stuttering that cannot be defined through other methodologies. This article will describe ways that data can be collected and analyzed.


Water ◽  
2021 ◽  
Vol 13 (6) ◽  
pp. 818
Author(s):  
Markus Reisenbüchler ◽  
Minh Duc Bui ◽  
Peter Rutschmann

Reservoir sedimentation is a critical issue worldwide, resulting in reduced storage volumes and, thus, reservoir efficiency. Moreover, sedimentation can also increase the flood risk at related facilities. In some cases, drawdown flushing of the reservoir is an appropriate management tool. However, there are various options as to how and when to perform such flushing, which should be optimized in order to maximize its efficiency and effectiveness. This paper proposes an innovative concept, based on an artificial neural network (ANN), to predict the volume of sediment flushed from the reservoir given distinct input parameters. The results obtained from a real-world study area indicate that there is a close correlation between the inputs—including peak discharge and duration of flushing—and the output (i.e., the volume of sediment). The developed ANN can readily be applied at the real-world study site, as a decision-support system for hydropower operators.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Pen Lister

AbstractThis paper discusses the uses and applications of the Pedagogy of Experience Complexity for Smart Learning (PECSL), a four-tier model of considerations for the design and development of smart learning activities. Using existing mobile apps and relevant activities as illustrative examples, the PECSL is applied to indicate concepts and mechanisms by which useful pedagogical considerations can work alongside user-centred design principles for the design and development of smart learning in urban hyper-localities. Practical application of the model is discussed using real world examples of activities as a basis to demonstrate the potential for manifold opportunities to learn, and plan for experience complexity in a smart learning activity. Case study approaches reflect on aspects of the PECSL in how it might be a useful and pragmatic guide to some of the issues faced when designing digital citizen learning activities in complex urban environments.


2021 ◽  
Vol 11 (10) ◽  
pp. 4617
Author(s):  
Daehee Park ◽  
Cheoljun Lee

Because smartphones support various functions, they are carried by users everywhere. Whenever a user believes that a moment is interesting, important, or meaningful to them, they can record a video to preserve such memories. The main problem with video recording an important moment is the fact that the user needs to look at the scene through the mobile phone screen rather than seeing the actual real-world event. This occurs owing to uncertainty the user might feel when recording the video. For example, the user might not be sure if the recording is of high-quality and might worry about missing the target object. To overcome this, we developed a new camera application that utilizes two main algorithms, the minimum output sum of squared error and the histograms of oriented gradient algorithms, to track the target object and recognize the direction of the user’s head. We assumed that the functions of the new camera application can solve the user’s anxiety while recording a video. To test the effectiveness of the proposed application, we conducted a case study and measured the emotional responses of users and the error rates based on a comparison with the use of a regular camera application. The results indicate that the new camera application induces greater feelings of pleasure, excitement, and independence than a regular camera application. Furthermore, it effectively reduces the error rates during video recording.


2020 ◽  
Vol 35 (3) ◽  
pp. 214-231
Author(s):  
Daniel Pienta ◽  
Jason Bennett Thatcher ◽  
Allen Johnston

Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message to a whale (i.e. a high-value target in an organization), it can result in large payoffs for cybercriminals, in terms of money or data stolen from organizations. While a legitimate cybersecurity threat, little information security research has directed attention toward whaling. In this study, we begin to provide an initial understanding of what makes whaling such a pernicious problem for organizations, executives, or celebrities (e.g. whales), and those charged with protecting them. We do this by defining whaling, delineating it from general phishing and spear phishing, presenting real-world cases of whaling, and provide guidance on future information security research on whaling. We find that whaling is far more complex than general phishing and spear phishing, spans multiple domains (e.g. work and personal), and potentially results in spillover effects that ripple across the organization. We conclude with a discussion of promising future directions for whaling and information security research.


2019 ◽  
Vol 8 (6) ◽  
pp. 272 ◽  
Author(s):  
Iq Reviessay Pulshashi ◽  
Hyerim Bae ◽  
Hyunsuk Choi ◽  
Seunghwan Mun ◽  
Riska Asriana Sutrisnowati

Analysis of trajectory such as detection of an outlying trajectory can produce inaccurate results due to the existence of noise, an outlying point-locations that can change statistical properties of the trajectory. Some trajectories with noise are repairable by noise filtering or by trajectory-simplification. We herein propose the application of a trajectory-simplification approach in both batch and streaming environments, followed by benchmarking of various outlier-detection algorithms for detection of outlying trajectories from among simplified trajectories. Experimental evaluation in a case study using real-world trajectories from a shipyard in South Korea shows the benefit of the new approach.


2017 ◽  
Vol 22 (8) ◽  
pp. 391-396 ◽  
Author(s):  
Sylvia Riding ◽  
Nikki Glendening ◽  
Vanessa Heaslip
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document