Search results for "Sword"
showing 10 items of 51 documents
An Embedded Biometric Sensor for Ubiquitous Authentication
2013
Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…
Empowerment – a Double Edged Sword?
2015
The concept of empowerment is a democratic tool and a logical next step in the evolution of public administration. In this article we explore the possibility of this concept to be used as a tool of unconventional warfare under a certain set of conditions. The carried out case study of the recent events in Ukraine, Crimea allows to conclude that empowerment can indeed be used to compromise the territorial integrity of a sovereign country.
New historical data for long-term swordfish ecological studies in the Mediterranean Sea
2021
Abstract. Management of marine fisheries and ecosystems is constrained by knowledge based on datasets with limited temporal coverage. Many populations and ecosystems were perturbed long before scientific investigations began. This situation is particularly acute for the largest and commercially most valuable species. We hypothesized that historical trap fishery records for bluefin tuna (Thunnus thynnus Linnaeus, 1758) could contain catch data and information for other, bycatch species, such as swordfish (Xiphias gladius Linnaeus, 1758). This species has a long history of exploitation and is presently overexploited, yet indicators of its status (biomass) used in fishery management only start…
Neglected fishery data sources as indicators of pre‐industrial ecological properties of Mediterranean swordfish ( Xiphias gladius , Xiphiidae)
2022
Management of fish populations and ecosystems suffers from data and knowledge gaps, particularly with respect to how humans and nature affect dynamics at multi-decadal and longer time scales. However, collection of new data which indicates population or ecosystem status is slow and expensive. Here we analyse c. 110 years of neglected fishery data for an overexploited top predator, swordfish, in the Mediterranean Sea. These data are available at scales of high time–space–biological resolution (i.e., sub-weekly, sub-regional sea; individual weights) and allow different ecological questions to be addressed than is possible with coarsely scaled data (e.g., annually resolved total catches aggreg…
Looking at the Nature of Ideas Through New Lenses
2006
What sets humans apart from other animals is not the use of technology: Many mammals are innovative in making simple tools to assist in life. But it is the sheer scale of technological development that distinguishes humans. Over the millennia, people have invented technologies, used them, and enhanced them. The once-innovative technologies become mundane elements of everyday contemporary life as human societies progress. The technological developments of the last decades have dramatically altered most humans’ way of life and perceptions of the myriad elements of the immediate and distant environment. It would not be an exaggeration to view humans as standing at the cusp of profound social c…
Too many passwords? How understanding our memory can increase password memorability
2018
Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …
Improving Password Memorability, While Not Inconveniencing the User
2019
Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…
Improving the security of multiple passwords through a greater understanding of the human memory
2016
Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its failures. Through studying memory elements that influence users’ password memorability, we may increase our understanding of the user and therefore make proposals to increase the security of the password authentication mechanism. This dissertation examines the human memory to understand password security behaviors; and moreover, develops new theories and revises prominent memory theories for the password context. This research employs memory theories to not only increase the me…
The double-edge sword effect of interorganizational trust on involvement in interorganizational networks: The mediator role of affective commitment
2020
Abstract Some organizations collaborate with other partner organizations to reach common goals, establishing interorganizational networks. The governance of the network is often enacted by an interorganizational governing team composed of the directors or top managers of the partner firms. This team plans, manages, and supervises the advancement of the network’s common goals. The success of the network depends, to a large extent, on the involvement of the members of the governing team. In this study, we tested a multilevel model of the antecedents of the involvement of governing team members in the management activities of interorganizational networks. We examined whether the relationship b…