• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 33
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 49
  • 49
  • 10
  • 9
  • 8
  • 7
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The principled design of speech-based interfaces

Pitt, Ian Jeffrey January 1996 (has links)
No description available.
2

Individual differences in user performance on command line and direct manipulation computer interfaces

Morgan, Konrad January 1989 (has links)
No description available.
3

Reinforcing the weakest link in cyber security: securing systems and software against attacks targeting unwary users

Lu, Long 20 September 2013 (has links)
Unwary computer users are often blamed as the weakest link on the security chain, for unknowingly facilitating incoming cyber attacks and jeopardizing the efforts to secure systems and networks. However, in my opinion, average users should not bear the blame because of their lack of expertise to predict the security consequence of every action they perform, such as browsing a webpage, downloading software to their computers, or installing an application to their mobile devices. My thesis work aims to secure software and systems by reducing or eliminating the chances where users’ mere action can unintentionally enable external exploits and attacks. In achieving this goal, I follow two complementary paths: (i) building runtime monitors to identify and interrupt the attack-triggering user actions; (ii) designing offline detectors for the software vulnerabilities that allow for such actions. To maximize the impact, I focus on securing software that either serve the largest number of users (e.g. web browsers) or experience the fastest user growth (e.g. smartphone apps), despite the platform distinctions. I have addressed the two dominant attacks through which most malicious software (a.k.a. malware) infections happen on the web: drive-by download and rogue websites. BLADE, an OS kernel extension, infers user intent through OS-level events and prevents the execution of download files that cannot be attributed to any user intent. Operating as a browser extension and identifying malicious post-search redirections, SURF protects search engine users from falling into the trap of poisoned search results that lead to fraudulent websites. In the infancy of security problems on mobile devices, I built Dalysis, the first comprehensive static program analysis framework for vetting Android apps in bytecode form. Based on Dalysis, CHEX detects the component hijacking vulnerability in large volumes of apps. My thesis as a whole explores, realizes, and evaluates a new perspective of securing software and system, which limits or avoids the unwanted security consequences caused by unwary users. It shows that, with the proposed approaches, software can be reasonably well protected against attacks targeting its unwary users. The knowledge and insights gained throughout the course of developing the thesis have advanced the community’s awareness of the threats and the increasing importance of considering unwary users when designing and securing systems. Each work included in this thesis has yielded at least one practical threat mitigation system. Evaluated by the large-scale real-world experiments, these systems have demonstrated the effectiveness at thwarting the security threats faced by most unwary users today. The threats addressed by this thesis have span multiple computing platforms, such as desktop operating systems, the Web, and smartphone devices, which highlight the broad impact of the thesis.
4

Computer anxiety and intrinsic motivation to learn among beginning computer users

Gillon, Stephen John January 1997 (has links)
Thesis (Ed.D.)--Boston University / PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you. / This study examined computer anxiety and motivation to learn in a computer class, using Csikszentmihalyi's Flow Theory, and Heinssen, Glass and Knight's Computer Anxiety Rating Scale (CARS), to explore the root causes of computer anxiety, and to determine anxiety's relationship to the motivation students have to participate in training. The study considered whether computer anxiety was more appropriately a form of trait anxiety, similar to Spielberger's State/Trait Anxiety, or a transitory state of anxiety independent of personality traits. The researcher assessed initial computer anxiety using the CARS, then sampled students' experience in the computer course during every class period using Csikszentmihalyi's Experience Sampling Form. Possible changes in computer anxiety were measured by mid-semester and end of semester administrations of the CARS, and regression analysis of the incidence of the Flow States. Achievement was measured by course grade, then correlated with incidence of the Flow States, and with pre-course CARS score. Csikszentmihalyi's conceptualization described the anxious state actually experienced in the computer laboratory class. The measurement of trait type of anxiety had no correlation with the students' actual experience of anxiety in the course. It was also determined that Csikszentmihalyi's Flow Theory described the psychological states of the students, and the relationship between students' motivation and their experience of anxiety. There was no correlation between the measurement of the students' trait type computer anxiety and their performance in the classroom, but the students' performance was significantly correlated with both the incidence of the Flow state and the Anxiety state. Student interviews complemented the data collection, and provided additional insight into the interactions between the students, their computers, and the computer laboratory environment. The researcher discussed the theoretical implications of the study, which demonstrated the validity of Csikszentmihalyi's Flow Theory, demonstrated the distinction between state and trait anxiety, and added to the growing body of research concerning Flow Theory. The researcher also discussed implications for educational practice, including careful pre-course screening, attention to intermediate educational objectives, and greater student control over the pace of learning. / 2031-01-02
5

Computer user satisfaction in organizations

Land, P. A., n/a January 1982 (has links)
The purpose of this study is to measure computer user satisfaction in several organizational settings and to find out if user, system or organizational variables affect the level of user satisfaction. Data was collected from two manufacturing companies and one Australian government department by using a survey based on the semantic differential technique for attitude measurement and open ended interviews. The data was analysed for each organization. The users completing the survey were then treated as a random sample of all organizational users of computer-based information systems and products. The data was analysed to see if differences occurred among groups. The results indicate that for each organization there are areas of high and low satisfaction. Some of these are common to the three organizations, and some areas where change is commonly requested by users are participation in design, training, response time on interactive systems and top management involvement. Differences among users are also indicated and it is shown that users who design their own systems have the highest level of satisfaction. Managerial users appear to be among the users who are least satisfied with their computer-based support.
6

The role of emotion in computer skill acquisition

Corley, John K., Rainer, R. Kelly January 2008 (has links)
Thesis (Ph. D.)--Auburn University. / Abstract. Vita. Includes bibliographical references (p. 82-90).
7

An application of machine learning techniques to interactive, constraint-based search

Harbert, Christopher W. Shang, Yi, January 2005 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2005. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (December 12, 2006) Includes bibliographical references.
8

The improvement of computer performance and self-efficacy among seniors citizens through training and virtual classrooms

Clanton, Kelley La rae. January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Vita. Includes bibliographical references (p. 45-47).
9

Computer and internet usage in rural clubs : are members digitally divided?

Cassell, Christopher J. 29 July 2002 (has links)
Lower rates of computer adoption and usage in rural areas has been called a "digital divide." This work explores the current state of connectivity within a rural town of the Pacific Northwest with a quantitative and qualitative overview of computer usage and access within civic and activity clubs, ranging from town's Rotarians to its bowling leagues. An Anthropological Rapid Appraisal Process (RAP) leverages focus groups, mini-surveys and ethnographic methods within the clubs to explore the topography of the digital divide. Civic clubs with younger, higher-income, better-educated members have higher rates of e-mail penetration (93%-56%) while activity clubs fare far worse on average (28%). Research establishes a link between club demographics and e-mail penetration rates, by showing that older clubs report less e-mail usage. This work explores the conditions that exacerbate the digital divide as well as highlighting those which may mitigate it. Variables include the presence or absence of technological leadership and the nature of ties to corporate and/or national organizations. Additionally, research shows that rural settings limit and structure the opportunities for computer skill acquisition. Civic clubs are increasingly reliant on computer-mediated communication (CMC) and computer-mediated information (CMI) sources and correspondingly, also upon the computer proficient members who can manage websites, or create and distribute electronic bulletins. "New media" is challenging traditional club norms and favors the contributions of more technological literate members, while handicapping the participation of non-computer using members. Beyond the hyped-up prospects of increased efficiency and communication amongst geographically dispersed members of such clubs, the technology is also creating new forms of exclusion. Recommendations include: 1) a technology decision-making process that ensures consensus among club members by including non-users; 2) creative capacity-building to support computer usage; and 3) by-laws which ensure that members are not marginalized because of a current or chronic lack of computer usage. This work grounds expectations of new technology, by providing a factual account of computer usage within clubs and exploring how clubs are using computers to facilitate their activities. / Graduation date: 2003
10

Information technology (IT) ethics : training and awareness materials for the Department of the Navy /

Senter, Jasper W. Thornton, Cayetano S. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): Cynthia E. Irvine, Floyd Brock. Jasper W. Senter graduated in September, 2002; Cayetano S. Thornton graduated in June, 2002. Includes bibliographical references (p. 59-61). Also available online.

Page generated in 0.0769 seconds