Search results for "Formations"
showing 10 items of 680 documents
Examining Business Models of Software-as-a-Service Firms
2013
The paper focuses the attention to different business models and intended strategic aims of the firms providing Software-as-a-Service (SaaS). SaaS vendors have been said to challenge the business practices of the existing vendors providing proprietary or customer-specific solutions. The current studies on the topic have shown that SaaS is different from preceding software business models, but consider and emphasize SaaS business model as an invariable configuration. This case study compares two SaaS firms with different backgrounds and reveals characteristics of two very different SaaS business models. The findings indicate that along with SaaS vendors providing only standard software appli…
PyCellBase
2019
Python package for easy retrieval of biological data from heterogeneous sources.
Honeypot Utilization for Network Intrusion Detection
2018
For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…
“Facebocrastination”? Predictors of using Facebook for procrastination and its effects on students’ well-being
2016
Procrastinating with popular online media such as Facebook has been suggested to impair users well-being, particularly among students. Building on recent procrastination, self-control, and communication literature, we conducted two studies (total N=699) that examined the predictors of procrastination with Facebook as well as its effects on students academic and overall well-being. Results from both studies consistently indicate that low trait self-control, habitual Facebook checking, and high enjoyment of Facebook use predict almost 40 percent of the variance of using Facebook for procrastination. Moreover, results from Study 2 underline that using Facebook for the irrational delay of impor…
Too many passwords? How understanding our memory can increase password memorability
2018
Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …
Improving Password Memorability, While Not Inconveniencing the User
2019
Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…
Improving the security of multiple passwords through a greater understanding of the human memory
2016
Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its failures. Through studying memory elements that influence users’ password memorability, we may increase our understanding of the user and therefore make proposals to increase the security of the password authentication mechanism. This dissertation examines the human memory to understand password security behaviors; and moreover, develops new theories and revises prominent memory theories for the password context. This research employs memory theories to not only increase the me…
Development of the BCI Device Controlling C++ Software, Based on Existing Open Source Projects
2021
The possibility of using the BCI open source code for building BCI controlled device, based on small AVR or ARM microcontrollers was considered. Some techniques to extract code snippets from other BCI projects were presented in the case of OpenViBE as the code donor. Problem with obtaining driver source codes for factory BCI devices has been pointed out.
What we look at in paintings: A comparison between experienced and inexperienced art viewers
2016
How do people look at art? Are there any differences between how experienced and inexperienced art viewers look at a painting? We approach these questions by analyzing and modeling eye movement data from a cognitive art research experiment, where the eye movements of twenty test subjects, ten experienced and ten inexperienced art viewers, were recorded while they were looking at paintings. Eye movements consist of stops of the gaze as well as jumps between the stops. Hence, the observed gaze stop locations can be thought as a spatial point pattern, which can be modeled by a spatio-temporal point process. We introduce some statistical tools to analyze the spatio-temporal eye movement data, a…
Design-based estimation for geometric quantiles with application to outlier detection
2010
Geometric quantiles are investigated using data collected from a complex survey. Geometric quantiles are an extension of univariate quantiles in a multivariate set-up that uses the geometry of multivariate data clouds. A very important application of geometric quantiles is the detection of outliers in multivariate data by means of quantile contours. A design-based estimator of geometric quantiles is constructed and used to compute quantile contours in order to detect outliers in both multivariate data and survey sampling set-ups. An algorithm for computing geometric quantile estimates is also developed. Under broad assumptions, the asymptotic variance of the quantile estimator is derived an…