Search results for "Cybernetics"
showing 10 items of 331 documents
Decomposing issue patterns in crisis communication: the case of the lost airliner
2018
This research explores the relation between a crisis and public discussion on related issues. In organisational crisis communication, a singleissue strategy is often proposed. Such a strategy, however, may not be adequate in more complex crises where the crisis lifecycle is likely to encompass shorter lifecycles of issues that generate media attention. Decomposing the online crisis debate into a pattern of issues supports understanding of public perceptions, and hence of crisis response and communication. This is investigated through an analysis of Facebook posts prompted by the loss of Malaysia Airlines flight MH370 in 2014. The analysis shows that during the life of the crisis a variety o…
Remote Attestation of Software and Execution-Environment in Modern Machines
2015
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…
A Network-Based Framework for Mobile Threat Detection
2018
Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…
Human-technology choreographies
2014
Bodily movements have traditionally had mostly instrumental value in interaction design. However, movements can also be given a central role in understanding behaviour and in designing technology for humans. This workshop is aiming at taking a fresh, movement-oriented look at the design and evaluation of technology in a wide variety of contexts.
SaaS architecture and pricing models
2014
In the new era of computing, SaaS software with different architectural characteristics might be priced in different ways. Even though both pricing and architectural characteristics are responsible for the success of the offering; the relationship between architectural and pricing characteristics has not been studied before. The present study fills this gap by employing a multi-case research. The findings accentuate that flexible and well-designed architecture enables different pricing models; however, poorly designed architecture limits also the pricing. Scalability and high level of modularity are the major enablers of a great variety of pricing models. Using public cloud services may lea…
Critical Analysis on the NHTSA Acceptance Criteria for In-Vehicle Electronic Devices
2014
We tested a commercial in-car navigation system prototype against the NHTSA criteria for acceptance testing of in-vehicle electronic devices, in order to see what types of in-car tasks fail the acceptance test and why. In addition, we studied the visual demands of the driving scenario recommended by NHTSA for task acceptance testing. In the light of the results, NHTSA guidelines and acceptance criteria need to be further developed. In particular visual demands of the driving scenario and for different simulators need to be standardized in order to enable fair testing and comparable test results. We suggest the visual occlusion method for finding a driving scenario that corresponds better wi…
Orientamento e inclusione: uno studio di caso nelle scuole secondarie palermitane di primo grado
2017
This paper presents the main results of the research work that promoted the design and implementation of training and guidance played in the territory of Palermo during the school years 2013/2014 and 2014/2015 in three secondary schools, with operating procedures, capable of promoting inclusive paths, based on the involvement of students, teachers and parents. The assumption from which we started is that the problems of dispersion and social marginalization can be addressed not only through direct guidance interventions with young people at risk, but also involving adults of reference because we are convinced that this will have, even at a distance of time a significant impact on students. …
Utility of Alternative Effect Size Statistics and the Development of a Web-Based Calculator: Shiny-AESC
2018
Alternative displays of effect size statistics can enhance the understandability and impact of validity evidence in a variety of applied settings. Arguably, the proliferation of alternative effect size statistics has been limited due to the lack of user-friendly tools to create them. Common statistical packages do not readily produce these alternative effect sizes and existing tools are outdated and inaccessible. In this paper, I introduce a free-to-use web-based calculator (https://dczhang.shinyapps.io/expectancyApp/) for generating alternative effect size displays from empirical data. This calculator requires no mathematical or programming expertise, and therefore, is ideal for academics …
Methodological Guidelines Designed to Improve the Quality of Research on Cross-Country Skiing
2021
AbstractCross-country (XC) ski races involve a variety of formats, two different techniques and tracks with highly variable topography and environmental conditions. In addition, XC skiing is a major component of both Nordic combined and biathlon competitions. Research in this area, both in the laboratory and field, encounters certain difficulties that may reduce the reliability and validity of the data obtained, as well as complicate comparisons between studies. Here, 13 international experts propose specific guidelines designed to enhance the quality of research and publications on XC skiing, as well as on the biathlon and Nordic combined skiing. We consider biomechanical (kinematic, kinet…
When more is less: The other side of artificial intelligence recommendation
2022
Based on consumers' preferences, AI (artificial intelligence) recommendation automatically filters information, which provokes scholars' debate. Supporters believe that by analyzing the consumers' preferences, AI recommendation enables consumers to choose products more quickly and with lower cost. Critics deem that consumers are more easily trapped in information cocoons because of the use of AI recommendation. This reduces the possibility of consumers contacting with a variety of commodities, thus lowering the consumer decision quality. Based on experiments, this paper discusses the moderating role of AI recommendation on the relationship of consumers' preferences and information cocoons. …