|
|
|
Franco Frattolillo
Watermarking protocols, in conjunction with digital watermarking technologies, make it possible to trace back digital copyright infringers by identifying who has legitimately purchased digital content and then illegally shared it on the Internet. Althoug...
ver más
|
|
|
|
|
|
|
Joshua H. Tyler, Mohamed K. M. Fadul and Donald R. Reising
Initially introduced almost thirty years ago for the express purpose of providing electronic warfare systems the capabilities to detect, characterize, and identify radar emitters, Specific Emitter Identification (SEI) has recently received a lot of atten...
ver más
|
|
|
|
|
|
|
Rajiv Paudel and Arika Ligmann-Zielinska
Agent-based model (ABM) development needs information on system components and interactions. Qualitative narratives contain contextually rich system information beneficial for ABM conceptualization. Traditional qualitative data extraction is manual, comp...
ver más
|
|
|
|
|
|
|
Anastasija Collen, Ioan-Cosmin Szanto, Meriem Benyahya, Bela Genge and Niels Alexander Nijdam
Modern technology and the digitisation era accelerated the pace of data generation and collection for various purposes. The orchestration of such data is a daily challenge faced by even experienced professional users in the context of Internet of Things ...
ver más
|
|
|
|
|
|
|
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical...
ver más
|
|
|
|
|
|
|
Luke Balcombe and Diego De Leo
Human-computer interaction (HCI) has contributed to the design and development of some efficient, user-friendly, cost-effective, and adaptable digital mental health solutions. But HCI has not been well-combined into technological developments resulting i...
ver más
|
|
|
|
|
|
|
Muhammad Ali Nasir,Junjie Wu,Milton Yago,Haohong Li
Pág. 461 - 468
This paper investigates the factors which determinate internet banking decisions among UK internet banking customers based on a survey which resulted into 191 usable questionnaire respondents randomly collected from a UK city. A Linear Regression techniq...
ver más
|
|
|
|
|
|
|
Lynsay A. Shepherd, Jacqueline Archibald and Robert Ian Ferguson
Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behav...
ver más
|
|
|
|
|
|
|
Tess Russo, Katherine Alfredo and Joshua Fisher
Sustainable water management (SWM) requires allocating between competing water sector demands, and balancing the financial and social resources required to support necessary water systems. The objective of this review is to assess SWM in three sectors: u...
ver más
|
|
|
|
|
|
|
Morten Hertzum,Niels Jørgensen,Mie Nørgaard
Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requ...
ver más
|
|
|
|