Search results for "Formations"

showing 10 items of 680 documents

Examining Business Models of Software-as-a-Service Firms

2013

The paper focuses the attention to different business models and intended strategic aims of the firms providing Software-as-a-Service (SaaS). SaaS vendors have been said to challenge the business practices of the existing vendors providing proprietary or customer-specific solutions. The current studies on the topic have shown that SaaS is different from preceding software business models, but consider and emphasize SaaS business model as an invariable configuration. This case study compares two SaaS firms with different backgrounds and reveals characteristics of two very different SaaS business models. The findings indicate that along with SaaS vendors providing only standard software appli…

SoftwareProcess managementCost efficiencybusiness.industryInformationSystems_INFORMATIONSYSTEMSAPPLICATIONSSoftware as a serviceSoftware businessBusinessMarketingBusiness model
researchProduct

PyCellBase

2019

Python package for easy retrieval of biological data from heterogeneous sources.

Software_GENERALHardware_GENERALComputer Science::Information RetrievalInformationSystems_INFORMATIONSTORAGEANDRETRIEVALTranscription factors and regulatory sitesComputer Science::Mathematical SoftwareComputingMethodologies_GENERAL
researchProduct

Honeypot Utilization for Network Intrusion Detection

2018

For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…

Software_OPERATINGSYSTEMSDictionary attackHoneypotComputer science020206 networking & telecommunications02 engineering and technology021001 nanoscience & nanotechnologycomputer.software_genreComputer securityLoginComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringMalwareNetwork intrusion detection0210 nano-technologycomputerSecurity system
researchProduct

“Facebocrastination”? Predictors of using Facebook for procrastination and its effects on students’ well-being

2016

Procrastinating with popular online media such as Facebook has been suggested to impair users well-being, particularly among students. Building on recent procrastination, self-control, and communication literature, we conducted two studies (total N=699) that examined the predictors of procrastination with Facebook as well as its effects on students academic and overall well-being. Results from both studies consistently indicate that low trait self-control, habitual Facebook checking, and high enjoyment of Facebook use predict almost 40 percent of the variance of using Facebook for procrastination. Moreover, results from Study 2 underline that using Facebook for the irrational delay of impor…

Software_OPERATINGSYSTEMSbusiness.industrymedia_common.quotation_subject05 social sciencesProcrastination050801 communication & media studies050109 social psychologyDysfunctional familySelf-controlDigital mediaHuman-Computer Interaction0508 media and communicationsArts and Humanities (miscellaneous)Media useWell-beingTrait0501 psychology and cognitive sciencesSocial mediaInformationSystems_MISCELLANEOUSbusinessPsychologySocial psychologyGeneral Psychologymedia_commonComputers in Human Behavior
researchProduct

Too many passwords? How understanding our memory can increase password memorability

2018

Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …

Software_OPERATINGSYSTEMSinformation securityComputer scienceInternet privacymetamemoryHuman Factors and ErgonomicsContext (language use)02 engineering and technologyEducationPassword strength020204 information systems0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencestietoturvaPassword psychology050107 human factorsmuisti (kognitio)human memoryta113PasswordAuthenticationmemorabilityCognitive passwordbusiness.industry05 social sciencesGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securitytodentaminenHardware and ArchitectureauthenticationbusinessSoftwareInternational Journal of Human-Computer Studies
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…

Software_OPERATINGSYSTEMSpassword security behaviorrepetitionComputer sciencepassword memorabilityHuman Factors and ErgonomicsComputer securitycomputer.software_genreEducationPassword strengthmuistaminenPasswordta113AuthenticationRepetition (rhetorical device)turvallisuusGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securityHardware and Architectureuser conveniencekäyttäjäkokemuscomputerpassword verificationSoftwareInternational Journal of Human-Computer Studies
researchProduct

Improving the security of multiple passwords through a greater understanding of the human memory

2016

Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its failures. Through studying memory elements that influence users’ password memorability, we may increase our understanding of the user and therefore make proposals to increase the security of the password authentication mechanism. This dissertation examines the human memory to understand password security behaviors; and moreover, develops new theories and revises prominent memory theories for the password context. This research employs memory theories to not only increase the me…

Software_OPERATINGSYSTEMSrepetitionkäytettävyysuser memorypassword memorabilitymuistiteoriatmetamemoryinterferencepassword reuseunohtaminenmuistisalasanatunique passwordsComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSmetamuistipassword securityuser conveniencemuistaminentietoturvamemory theories
researchProduct

Development of the BCI Device Controlling C++ Software, Based on Existing Open Source Projects

2021

The possibility of using the BCI open source code for building BCI controlled device, based on small AVR or ARM microcontrollers was considered. Some techniques to extract code snippets from other BCI projects were presented in the case of OpenViBE as the code donor. Problem with obtaining driver source codes for factory BCI devices has been pointed out.

Source codeOpenVibeInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Computer sciencebusiness.industrymedia_common.quotation_subjectBCI driversMicrocontrollerInformationSystems_MODELSANDPRINCIPLESSoftwareDevelopment (topology)BCI softwareEmbedded systemCode (cryptography)Factory (object-oriented programming)BCIbusinessBrain–computer interfacemedia_common
researchProduct

What we look at in paintings: A comparison between experienced and inexperienced art viewers

2016

How do people look at art? Are there any differences between how experienced and inexperienced art viewers look at a painting? We approach these questions by analyzing and modeling eye movement data from a cognitive art research experiment, where the eye movements of twenty test subjects, ten experienced and ten inexperienced art viewers, were recorded while they were looking at paintings. Eye movements consist of stops of the gaze as well as jumps between the stops. Hence, the observed gaze stop locations can be thought as a spatial point pattern, which can be modeled by a spatio-temporal point process. We introduce some statistical tools to analyze the spatio-temporal eye movement data, a…

Statistics and ProbabilityFOS: Computer and information sciencesCoverageComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION01 natural sciencesStatistics - Applications050105 experimental psychologyVisual arts010104 statistics & probabilitysilmänliikkeetInformationSystems_MODELSANDPRINCIPLES0501 psychology and cognitive sciencesApplications (stat.AP)0101 mathematicspoint processPaintingPoint (typography)05 social sciencesEye movementCognitioncognitive art researchtransition probabilityGazeTest (assessment)shift functionModeling and Simulationart viewersStatistics Probability and UncertaintyPsychologyintensity
researchProduct

Design-based estimation for geometric quantiles with application to outlier detection

2010

Geometric quantiles are investigated using data collected from a complex survey. Geometric quantiles are an extension of univariate quantiles in a multivariate set-up that uses the geometry of multivariate data clouds. A very important application of geometric quantiles is the detection of outliers in multivariate data by means of quantile contours. A design-based estimator of geometric quantiles is constructed and used to compute quantile contours in order to detect outliers in both multivariate data and survey sampling set-ups. An algorithm for computing geometric quantile estimates is also developed. Under broad assumptions, the asymptotic variance of the quantile estimator is derived an…

Statistics and ProbabilityStatistics::TheoryTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESStatistics::ApplicationsComputingMethodologies_SIMULATIONANDMODELINGApplied MathematicsMathematicsofComputing_NUMERICALANALYSISUnivariateInformationSystems_DATABASEMANAGEMENTEstimatorStatistics::ComputationQuantile regressionHorvitz–Thompson estimatorComputational MathematicsDelta methodComputational Theory and MathematicsTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYOutlierConsistent estimatorStatisticsStatistics::MethodologyMathematicsQuantileComputational Statistics & Data Analysis
researchProduct