Spelling suggestions: "subject:"computer users"" "subject:"coomputer users""
1 |
The principled design of speech-based interfacesPitt, Ian Jeffrey January 1996 (has links)
No description available.
|
2 |
Individual differences in user performance on command line and direct manipulation computer interfacesMorgan, Konrad January 1989 (has links)
No description available.
|
3 |
Reinforcing the weakest link in cyber security: securing systems and software against attacks targeting unwary usersLu, Long 20 September 2013 (has links)
Unwary computer users are often blamed as the weakest link on the security chain, for unknowingly facilitating incoming cyber attacks and jeopardizing the efforts to secure systems and networks. However, in my opinion, average users should not bear the blame because of their lack of expertise to predict the security consequence of every action they perform, such as browsing a webpage, downloading software to their computers, or installing an application to their mobile devices.
My thesis work aims to secure software and systems by reducing or eliminating the chances where users’ mere action can unintentionally enable external exploits and attacks. In achieving this goal, I follow two complementary paths: (i) building runtime monitors to identify and interrupt the attack-triggering user actions; (ii) designing offline detectors for the software vulnerabilities that allow for such actions. To maximize the impact, I focus on securing software that either serve the largest number of users (e.g. web browsers) or experience the fastest user growth (e.g. smartphone apps), despite the platform distinctions.
I have addressed the two dominant attacks through which most malicious software (a.k.a. malware) infections happen on the web: drive-by download and rogue websites. BLADE, an OS kernel extension, infers user intent through OS-level events and prevents the execution of download files that cannot be attributed to any user intent. Operating as a browser extension and identifying malicious post-search redirections, SURF protects search engine users from falling into the trap of poisoned search results that lead to fraudulent websites. In the infancy of security problems on mobile
devices, I built Dalysis, the first comprehensive static program analysis framework for vetting Android apps in bytecode form. Based on Dalysis, CHEX detects the component hijacking vulnerability in large volumes of apps.
My thesis as a whole explores, realizes, and evaluates a new perspective of securing software and system, which limits or avoids the unwanted security consequences caused by unwary users. It shows that, with the proposed approaches, software can be reasonably well protected against attacks targeting its unwary users. The knowledge and insights gained throughout the course of developing the thesis have advanced the community’s awareness of the threats and the increasing importance of considering unwary users when designing and securing systems. Each work included in this thesis has yielded at least one practical threat mitigation system. Evaluated by the large-scale real-world experiments, these systems have demonstrated the effectiveness at thwarting the security threats faced by most unwary users today. The threats addressed by this thesis have span multiple computing platforms, such as desktop operating systems, the Web, and smartphone devices, which highlight the broad impact of the thesis.
|
4 |
Computer anxiety and intrinsic motivation to learn among beginning computer usersGillon, Stephen John January 1997 (has links)
Thesis (Ed.D.)--Boston University / PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you. / This study examined computer anxiety and motivation to learn in a computer class, using Csikszentmihalyi's Flow Theory, and Heinssen, Glass and Knight's Computer Anxiety Rating Scale (CARS), to explore the root causes of computer anxiety, and to determine anxiety's relationship to the motivation students have to participate in training. The study considered whether computer anxiety was more appropriately a form of trait anxiety, similar to Spielberger's State/Trait Anxiety, or a transitory state of anxiety independent of personality traits.
The researcher assessed initial computer anxiety using the CARS, then sampled students' experience in the computer course during every class period using Csikszentmihalyi's Experience Sampling Form. Possible changes in computer anxiety were measured by mid-semester and end of semester administrations of the CARS, and regression analysis of the incidence of the Flow States. Achievement was measured by course grade, then correlated with incidence of the Flow States, and with pre-course CARS score.
Csikszentmihalyi's conceptualization described the anxious state actually experienced in the computer laboratory class. The measurement of trait type of anxiety had no correlation with the students' actual experience of anxiety in the course. It was also determined that Csikszentmihalyi's Flow Theory described the psychological states of the students, and the relationship between students' motivation and their experience of anxiety. There was no correlation between the measurement of the students' trait type computer anxiety and their performance in the classroom, but the students' performance was significantly correlated with both the incidence of the Flow state and the Anxiety state. Student interviews complemented the data collection, and provided additional insight into the interactions between the students, their computers, and the computer laboratory environment. The researcher discussed the theoretical implications of the study, which demonstrated the validity of Csikszentmihalyi's Flow Theory, demonstrated the distinction between state and trait anxiety, and added to the growing body of research concerning Flow Theory. The researcher also discussed implications for educational practice, including careful pre-course screening, attention to intermediate educational objectives, and greater student control over the pace of learning. / 2031-01-02
|
5 |
Computer user satisfaction in organizationsLand, P. A., n/a January 1982 (has links)
The purpose of this study is to measure computer user
satisfaction in several organizational settings and to find
out if user, system or organizational variables affect the
level of user satisfaction. Data was collected from two
manufacturing companies and one Australian government
department by using a survey based on the semantic
differential technique for attitude measurement and open ended
interviews. The data was analysed for each
organization. The users completing the survey were then
treated as a random sample of all organizational users
of computer-based information systems and products. The
data was analysed to see if differences occurred among
groups.
The results indicate that for each organization
there are areas of high and low satisfaction. Some of
these are common to the three organizations, and some areas
where change is commonly requested by users are participation
in design, training, response time on interactive systems
and top management involvement. Differences among users are
also indicated and it is shown that users who design their own
systems have the highest level of satisfaction. Managerial
users appear to be among the users who are least satisfied
with their computer-based support.
|
6 |
The role of emotion in computer skill acquisitionCorley, John K., Rainer, R. Kelly January 2008 (has links)
Thesis (Ph. D.)--Auburn University. / Abstract. Vita. Includes bibliographical references (p. 82-90).
|
7 |
An application of machine learning techniques to interactive, constraint-based searchHarbert, Christopher W. Shang, Yi, January 2005 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2005. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (December 12, 2006) Includes bibliographical references.
|
8 |
The improvement of computer performance and self-efficacy among seniors citizens through training and virtual classroomsClanton, Kelley La rae. January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Vita. Includes bibliographical references (p. 45-47).
|
9 |
Computer and internet usage in rural clubs : are members digitally divided?Cassell, Christopher J. 29 July 2002 (has links)
Lower rates of computer adoption and usage in rural areas has
been called a "digital divide." This work explores the current state of
connectivity within a rural town of the Pacific Northwest with a
quantitative and qualitative overview of computer usage and access
within civic and activity clubs, ranging from town's Rotarians to its
bowling leagues. An Anthropological Rapid Appraisal Process (RAP)
leverages focus groups, mini-surveys and ethnographic methods within
the clubs to explore the topography of the digital divide. Civic clubs with
younger, higher-income, better-educated members have higher rates of
e-mail penetration (93%-56%) while activity clubs fare far worse on
average (28%). Research establishes a link between club demographics
and e-mail penetration rates, by showing that older clubs report less e-mail
usage.
This work explores the conditions that exacerbate the digital divide
as well as highlighting those which may mitigate it. Variables include the
presence or absence of technological leadership and the nature of ties to
corporate and/or national organizations. Additionally, research shows
that rural settings limit and structure the opportunities for computer skill acquisition. Civic clubs are increasingly reliant on computer-mediated
communication (CMC) and computer-mediated information (CMI)
sources and correspondingly, also upon the computer proficient members
who can manage websites, or create and distribute electronic bulletins.
"New media" is challenging traditional club norms and favors the
contributions of more technological literate members, while handicapping
the participation of non-computer using members. Beyond the hyped-up
prospects of increased efficiency and communication amongst
geographically dispersed members of such clubs, the technology is also
creating new forms of exclusion. Recommendations include: 1) a
technology decision-making process that ensures consensus among club
members by including non-users; 2) creative capacity-building to support
computer usage; and 3) by-laws which ensure that members are not
marginalized because of a current or chronic lack of computer usage.
This work grounds expectations of new technology, by providing a factual
account of computer usage within clubs and exploring how clubs are
using computers to facilitate their activities. / Graduation date: 2003
|
10 |
Information technology (IT) ethics : training and awareness materials for the Department of the Navy /Senter, Jasper W. Thornton, Cayetano S. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): Cynthia E. Irvine, Floyd Brock. Jasper W. Senter graduated in September, 2002; Cayetano S. Thornton graduated in June, 2002. Includes bibliographical references (p. 59-61). Also available online.
|
Page generated in 0.0675 seconds