Search results for "SWORD"
showing 10 items of 51 documents
Disseminating scientific research: a double-edged sword?
2017
Practitioners rarely have the time or propensity to read scientific research, and scholarly researchers seldom write for non-academic audiences. Nevertheless, both groups would probably agree that researchers could solve many problems faced by practitioners and that research is important to guide practice. This article acknowledges scientists’ failure to communicate successfully with practitioners, and discusses the main differences between academic and practitioner-oriented journals in management and business related disciplines. Author guidelines of the most prominent journals that appeal to both academics and practitioners are reviewed and discussed. A thorough literature review is also …
Were Bronze Age metalworkers skilled?: Perspectives from the study of the making of Bronze Age swords
2019
International audience; Beyond the provocation of the title, the question of ancient metalworkers’ skills, that has been recently discussed by Maikel Kuijpers for Bronze Age axes, makes perfect sense concerning Bronze Age swords, especially when equipped with a metallic hilt. These weapons are indeed almost always described as masterpieces of metalwork made by skilled and specialized craftsmen. This does not take into account the breakthroughs made since the 1960s in the study of the fabrication techniques of bronze artefacts. Even if it is true that most Bronze Age swords are looking flawless on the surface, imaging techniques such as X-ray or CT-scan enable archaeologists to have a glimps…
Exposure to mercury among 9-year-old Spanish children: Associated factors and trend throughout childhood
2019
Mercury is considered a neurotoxicant and human exposure occurs mainly from the consumption of marine species. We aimed to describe total mercury concentrations (THg) and associated factors in 9-year old children, as well as to explore the trend in THg from 4 to 9 years of age. The study population consisted of 9-year-old children participating in the INMA (Environment and Childhood) birth cohort study in Valencia, Spain (n = 405, 2013–2014). THg in hair samples was measured by atomic absorption spectrometry at the age of 4 and 9 years. Sociodemographic and dietary data was obtained through questionnaires. Multiple linear regression was used to explore the association between THg and covari…
The Bronze Age in France
2013
An Embedded Biometric Sensor for Ubiquitous Authentication
2013
Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…
Improving the security of multiple passwords through a greater understanding of the human memory
2016
Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its failures. Through studying memory elements that influence users’ password memorability, we may increase our understanding of the user and therefore make proposals to increase the security of the password authentication mechanism. This dissertation examines the human memory to understand password security behaviors; and moreover, develops new theories and revises prominent memory theories for the password context. This research employs memory theories to not only increase the me…
Secure integration of multiprotocol instant messenger
2017
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…
SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager
2018
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
The double-edge sword effect of interorganizational trust on involvement in interorganizational networks: The mediator role of affective commitment
2020
Abstract Some organizations collaborate with other partner organizations to reach common goals, establishing interorganizational networks. The governance of the network is often enacted by an interorganizational governing team composed of the directors or top managers of the partner firms. This team plans, manages, and supervises the advancement of the network’s common goals. The success of the network depends, to a large extent, on the involvement of the members of the governing team. In this study, we tested a multilevel model of the antecedents of the involvement of governing team members in the management activities of interorganizational networks. We examined whether the relationship b…