Academic literature on the topic 'USER'S AWARENESS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'USER'S AWARENESS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "USER'S AWARENESS"

1

Pinheiro, Manuele Kirsch, and Carine Souveyet. "Is Group-Awareness Context-Awareness?" International Journal of e-Collaboration 15, no. 3 (July 2019): 1–19. http://dx.doi.org/10.4018/ijec.2019070101.

Full text
Abstract:
This article discusses the interest of emerging a unified view for group awareness and context information on groupware and context-aware systems. Group awareness corresponds to an important concept on Groupware applications, allowing individual users to be kept aware of group's activities and status. Context is defined by ubiquitous computing as any relevant information that can be used to characterize the situation of an entity. We assume that group awareness information should be considered as context information and handled as such. Group awareness information is often employed for decision making, contributing to users' activities and decisions, but it gives also an important clue about user's context, characterizing individual's actions regarding the group. As such, group awareness may be used for adaptation purposes, adapting the system behavior, the supplied content or its services. Besides, architectural concerns adopted on context-aware system should also be considered when developing new groupware applications that are more and more designed as context-aware systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Rahman, Dr Akim M., and Saadi Islam. "Social-Costs Perspective Impacts of Cybercrime in World-Economy, Country-Wise: Policy-Guidance under Piecemeal Approach." Information Management and Business Review 13, no. 2(I) (November 3, 2021): 43–55. http://dx.doi.org/10.22610/imbr.v13i2(i).3229.

Full text
Abstract:
Today’s technology-driven human-society(s) country-wise are counted more than ever before where UAE-society is no exception. Tech-users here compete for comparative time-saving options for marginalizing operating costs. It has resulted in huge data usages, a high number of users & devices, which has attracted criminals for taking advantage, which is called cybercrime. Addressing cybercrime, the UAE, like many countries, is not out of control by-laws. However, laws like cybercrime for its society are not always for absolutely eliminating the crime. Thus, besides cybercrime law in place, UAE needs a piecemeal approach in practice where one department may vary from approaches of other-department. With awareness about risky online behaviors & options, tech-users as defenders are needed to invest their efforts. This study has laid out the foundation of the proposal, Akim’s Model-2021, using the Theory of Consumer Choice & Behaviors and Welfare Analysis. Tech-user’s actual utility-received is the sum of utility-received from awareness & own-effort and utility-received from cybercrime-law. Any changes to services received from joint efforts may risk tech-user, to be a victim. Welfare analysis shows tech user's actions - awareness & own-effort, besides cybercrime-law can create, Net Social-gain, which largely depends on tech user's actions. Tech-user’s economic surplus is greater than government expenses for implementation of cybercrime law in UAE. Net-loss to the UAE is the sum of deadweight loss and net-loss to tech producers for underutilized resources.
APA, Harvard, Vancouver, ISO, and other styles
3

Noh, Younghee. "A study on next‐generation digital library using context‐awareness technology." Library Hi Tech 31, no. 2 (June 7, 2013): 236–53. http://dx.doi.org/10.1108/07378831311329031.

Full text
Abstract:
PurposeThis study seeks to examine the concepts of context, context‐awareness, and context‐awareness technology needed for applying context‐awareness technology to the next‐generation of digital libraries, and proposed context‐aware services that can be applied to any situation by illustrating some library contexts.Design/methodology/approachThe paper investigated both theoretical research and case analysis studies before suggesting a service model for context‐awareness‐based libraries by examining the context, context‐awareness, and context‐awareness technology in depth.FindingsThis paper derived possible library services which could be provided if context‐awareness services are implemented by examining and analyzing case studies and systems constructed in other fields. A library‐applied context‐aware system could recognize users entering the library and provide optimal services tailored to each situation for both new and existing users. In addition, the context‐awareness‐based library could provide context‐awareness‐based reference services, context‐awareness‐based loan services, and cater to other user needs in the stacks, research space, and a variety of other information spaces. The context‐awareness‐based library could also recognize users in need of emergency assistance by detecting the user's behavior, movement path, and temperature, etc. Comfort or climate‐control services could provide the user with control of the temperature, humidity, illumination and other environmental elements to fit the circumstances of users, books, and instruments through context‐aware technology.Practical implicationsNext‐generation digital libraries apply new concepts such as semantic retrieval, real‐time web, cloud computing, mobile web, linked data, and context‐awareness. Context‐awareness‐based libraries can provide applied context‐awareness access service, reactive space according to the user's access, applied context‐awareness lobbies, applied context‐awareness reference services, and applied context‐awareness safety services, context‐awareness‐based comfort services and so on.Originality/valueReal instances of libraries applying context‐aware technology are few, according to the investigative results of this study. The study finds that the next‐generation digital library using context‐awareness technology can provide the best possible service for the convenience of its users.
APA, Harvard, Vancouver, ISO, and other styles
4

Mijuskovic, Adriana, and Mexhid Ferati. "Cloud Storage Privacy and Security User Awareness." International Journal of Human Capital and Information Technology Professionals 7, no. 3 (July 2016): 1–18. http://dx.doi.org/10.4018/ijhcitp.2016070101.

Full text
Abstract:
There are many factors influencing the user awareness level of privacy and security concerns when storing data on the cloud. One such factor is the users' cultural background, which has been an inspiration to many studies comparing various cultures. Along those lines, this paper compares the user awareness level between Dutch and Macedonian users, which has not been investigated before. An online study was conducted to measure users' attitude towards privacy and security of data in the cloud-based systems. The research process was conducted by delivering an online survey to Computer Science students and employees working in different software companies in the Netherlands and Macedonia. The comparative analysis indicates that there are differences in user's attitude towards storing private data in the cloud. The results of this paper demonstrate that Dutch compared to Macedonian users in general have higher level of awareness regarding the privacy and security of cloud storage.
APA, Harvard, Vancouver, ISO, and other styles
5

Martínez Reyes, Fernando, and Chris Greenhalgh. "The User's Touch." International Journal of Advanced Pervasive and Ubiquitous Computing 1, no. 4 (October 2009): 14–28. http://dx.doi.org/10.4018/japuc.2009100102.

Full text
Abstract:
The home of the future will be able to offer comfortable, safe and supportive home spaces. Smart systems and artefacts will know users’ routines and anticipate their needs. While the vision of the home of the future is promissory, it is the user who supports UbiComp systems, but certain technical and social challenges must be addressed before the smart home can become a reality. Unexpected human behavior makes it difficult to identify and predict domestic activity. Thus, if a system is not reliable or trusted enough to take actions on behalf of users, context-aware designs must allow for user participation to support the systems’ performance. In this article, the authors use their experience designing a context-aware system to illustrate how the users’ “touch”, that is, their active involvement, is still a requirement for today’s UbiComp designs. The configurable system described supports parents awareness of their children’s activity. Responses from a user study indicate that parents engaged positively with this kind of mediated, rather than proactive, computing-based support.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Jing, and Da Wei Chu. "Survey on Collaborative Awareness Model for CSCW and Trends of the New Age." Applied Mechanics and Materials 155-156 (February 2012): 357–62. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.357.

Full text
Abstract:
Currently Computer Supported Cooperative Work (CSCW) has become an important area of research in computer science. The main purpose of CSCW system is to support people interact cooperation, and collaborative awareness between users must be the basis for multi-user collaborative work, and each user's behavior or the operation of the shared object should be immediately perceived by other users. Therefore, collaborative awareness is one of the key issues to be resolved in CSCW system. In this paper, collaborative awareness models are the object of study, and we discussed the collaborative awareness models respectively based on space, role and event, and a lot of critical theories and techniques about them. The analysis of existing theory helped us to further understand various collaborative awareness models, to study the development trend of them, and establish the appropriate framework for collaborative awareness.
APA, Harvard, Vancouver, ISO, and other styles
7

Naga Malleswari, D., A. Dhavalya, V. Divya Sai, and K. Srikanth. "A detailed study on risk assessment of mobile app permissions." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 297. http://dx.doi.org/10.14419/ijet.v7i1.1.9706.

Full text
Abstract:
Mobile phone have user’s personal and private information. When mobile applications have the permission to access to this information they may leak it to third parties without user’s consent for their own benefits. As users are not aware of how their personal information would be used once applications are installed and permissions are granted, this raises a potential privacy concern. Therefore, there is a need for a risk assessment model that can intimate the users about the threats the mobile application poses to the user's private information. We propose an approach that helps in increasing user’s awareness of the privacy risk involved with granting permissions to Android applications. The proposed model focuses on the requested permissions of the application and determines the risk based on the permission set asked and gives a risk score.
APA, Harvard, Vancouver, ISO, and other styles
8

Russell, I. "Registered designs: prior art and the informed user's 'design awareness'." Journal of Intellectual Property Law & Practice 8, no. 2 (January 24, 2013): 111–12. http://dx.doi.org/10.1093/jiplp/jps195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ha, Sang-Won, and Hyoung-Joong Kim. "The Effects of User's Security Awareness on Password Security Behavior." Journal of Digital Contents Society 14, no. 2 (June 30, 2013): 179–89. http://dx.doi.org/10.9728/dcs.2013.14.2.179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Morrison-Smith, Sarah, Lydia B. Chilton, and Jaime Ruiz. "AmbiTeam." XRDS: Crossroads, The ACM Magazine for Students 28, no. 2 (December 2021): 60–65. http://dx.doi.org/10.1145/3495265.

Full text
Abstract:
AmbiTeam is an ambient display designed to communicate contextual or background information in the periphery of the user's awareness and only requires the user's attention when it is appropriate or desired.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "USER'S AWARENESS"

1

Guyon, David. "Supporting energy-awareness for cloud users." Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S037/document.

Full text
Abstract:
Les centres de calcul cloud consomment d'importantes quantités d'énergie et il devient nécessaire de réduire leur consommation en raison des changements climatiques actuels. Bien que des propositions d'optimisations énergétiques existent, elles ne tiennent pas compte des utilisateurs finaux. Cette thèse propose d'inclure les utilisateurs cloud dans l'optimisation énergétique afin de réduire la consommation d'énergie des centres de calcul. L'inclusion se fait, dans un premier temps, en délivrant une information énergétique pour sensibiliser, puis dans un second temps, en fournissant des moyens d'action. Les contributions portent sur les couches cloud IaaS et PaaS. Nos résultats montrent que les utilisateurs tolérants à la variation des performances (e.g. retarder l'obtention de résultats) permettent de réduire la consommation d'énergie des centres de calcul
Cloud datacenters consume large amounts of energy and it becomes necessary to reduce their consumption due to current climate changes. Although energy optimization propositions exist, they do not take into account end-users. This thesis proposes to include cloud users in the energy optimization as a means to reduce datacenters energy consumption. The inclusion is done, first, by delivering energy related information to raise awareness, and second, by providing means of actions. Contributions are located at IaaS and PaaS cloud layers. Our results show that users tolerant to performance variation (e.g. delay in obtaining execution results) allow to reduce datacenters energy consumption
APA, Harvard, Vancouver, ISO, and other styles
2

Slonka, Kevin J. "Awareness of malicious social engineering among facebook users." Thesis, Robert Morris University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3620246.

Full text
Abstract:

With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The research examined differences in awareness among multiple generational groups; secondary research questions focused on how factors such as age, gender, education, Internet usage, and trust affected users' awareness of malicious activity. Results suggest that the Baby Boomer generation is the least aware of malicious social engineering tactics on Facebook, specifically in regard to the Donation scam category. In addition, education level and educational background are significantly associated with awareness. These findings indicate a need for future work to gain a deeper understanding of Facebook users' awareness of malicious social engineering and generate targeted training in order to increase said awareness.

APA, Harvard, Vancouver, ISO, and other styles
3

Chihani, Bachir. "Enterprise context-awareness : empowering service users and developers." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-01048688.

Full text
Abstract:
Context-aware applications must manage a continuous stream of context according to dedicated business logic. Research was limited on proposing frameworks and platforms that have predefined behavior toward applications. This thesis attempts to extend background works by proposing new concepts serving as foundation for a flexible approach for building context-aware applications. The thesis examines the state of the art of context-aware computing, then adopts well-established software design principles and a functional decomposition for designing a reference model for context management enabling seamless integration of context-awareness into applications. Also, the thesis studies the use of context in common applications and proposes a context-centric modeling approach which allows the creation of a graph-based representation where entities are connected to each other through links representing context. Furthermore, the context graph decouples the presentation and the semantics of context, leaving each application to manage the appropriate semantic for their context data. Case studies are conducted for the evaluation of the proposed system in terms of its support for the creation of applications enhanced with context-awareness. A simulation study is performed to analyze the performance properties of the proposed system. The result of this thesis is the introduction of a novel approach for supporting the creation of context-aware applications that supports the integration of context-awareness to existing applications. It empowers developers as well as users to participate in the creation process, thereby reducing usability issues
APA, Harvard, Vancouver, ISO, and other styles
4

Clarke, Lynne, Toufue Chang, Andrea Roderick, Walter Reel, Kimberly Alvarez, Galen Kennedy, Robert Ritchey, and Cop Le. "Extending Comprehensive Maritime Awareness to Disconnected Vessels and Users." Thesis, Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/6932.

Full text
Abstract:
After the attacks of 9/11, increased security became a national priority that resulted in a focus on National Maritime Security. Maritime Domain Awareness (MDA) is an initiative developed by the Coast Guard, in partnership with the U.S. Navy and other agencies to increase awareness in the maritime domain in support of maritime security [Morgan and Wimmer, 2005]. The purpose of MDA is to generate actionable intelligence obtained via the collection, fusion and dissemination of information from U.S. joint forces, U.S. government agencies, international coalition partners and commercial entities. This actionable intelligence is the cornerstone of successful counterterrorist and maritime law enforcement operations and is critical to Maritime Security [Morgan and Wimmer, 2005]. The U.S. Navy, as a partner in the development and creation of MDA, has tasked its subordinate commands to identify and define capabilities to support this program. One effort sponsored is the Comprehensive Maritime Awareness (CMA) Joint Capabilities Technology Demonstration (JCTD) [CMA Architecture Team, 2007]. This project supports the CMA JCTD efforts by proposing a deployable system to enable a disconnected vessel to connect to the CMA network. A disconnected user can be seen as a merchant ship, hospital ship or any vessel that is not currently connected to the CMA network. This project's proposed deployable system, as a subset to the CMA network, facilitates information sharing in support of humanitarian efforts worldwide.
APA, Harvard, Vancouver, ISO, and other styles
5

Gamagedara, Arachchilage Nalin Asanka. "Security awareness of computer users : a game based learning approach." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7620.

Full text
Abstract:
The research reported in this thesis focuses on developing a framework for game design to protect computer users against phishing attacks. A comprehensive literature review was conducted to understand the research domain, support the proposed research work and identify the research gap to fulfil the contribution to knowledge. Two studies and one theoretical design were carried out to achieve the aim of this research reported in this thesis. A quantitative approach was used in the first study while engaging both quantitative and qualitative approaches in the second study. The first study reported in this thesis was focused to investigate the key elements that should be addressed in the game design framework to avoid phishing attacks. The proposed game design framework was aimed to enhance the user avoidance behaviour through motivation to thwart phishing attack. The results of this study revealed that perceived threat, safeguard effectiveness, safeguard cost, self-efficacy, perceived severity and perceived susceptibility elements should be incorporated into the game design framework for computer users to avoid phishing attacks through their motivation. The theoretical design approach was focused on designing a mobile game to educate computer users against phishing attacks. The elements of the framework were addressed in the mobile game design context. The main objective of the proposed mobile game design was to teach users how to identify phishing website addresses (URLs), which is one of many ways of identifying a phishing attack. The mobile game prototype was developed using MIT App inventor emulator. In the second study, the formulated game design framework was evaluated through the deployed mobile game prototype on a HTC One X touch screen smart phone. Then a discussion is reported in this thesis investigating the effectiveness of the developed mobile game prototype compared to traditional online learning to thwart phishing threats. Finally, the research reported in this thesis found that the mobile game is somewhat effective in enhancing the user’s phishing awareness. It also revealed that the participants who played the mobile game were better able to identify fraudulent websites compared to the participants who read the website without any training. Therefore, the research reported in this thesis determined that perceived threat, safeguard effectiveness, safeguard cost, self-efficacy, perceived threat and perceived susceptibility elements have a significant impact on avoidance behaviour through motivation to thwart phishing attacks as addressed in the game design framework.
APA, Harvard, Vancouver, ISO, and other styles
6

Shepherd, Lynsay A. "Enhancing security risk awareness in end-users via affective feedback." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/e5af92fb-4936-43d2-878e-fbc16711e36d.

Full text
Abstract:
Background: Risky security behaviour displayed by end-users has the potential to leave devices vulnerable to compromise, despite the availability of security tools designed to aid users in defending themselves against potential online threats. This indicates a need to modify the behaviour of end-users, allowing them to consider the security implications of their actions online. Previous research has indicated affective feedback may serve as a successful method of educating users about risky security behaviours. Thus, by influencing end-users via affective feedback it may be possible to engage users, improving their security awareness. Aims: Develop and apply knowledge of monitoring techniques and affective feedback, establishing if this changes users’ awareness of risky security behaviour in the context of a browser-based environment. Methodology: The methodology employs the use of log files derived from the monitoring solution, and information provided by users during the experiments. Questionnaire data was compared against log files and information provided during experiments, providing an overall quantitative approach. Results: In the case of the log files and questionnaires, participants were found to have engaged in instances of risky security behaviours, which they were unaware of, and this indicated a low-level of awareness of risky security behaviour. Whilst the results indicate the affective feedback did not make a difference to behaviour during the course of the experiments, participants felt that the affective feedback delivered had an impact, raising their security awareness, encouraging them to learn about online security. Conclusions: This body of research has made a novel contribution to the field of affective feedback and usable security. Whilst the results indicate the affective feedback made no difference to behaviour, users felt it had an impact on them, persuading them to consider their security behaviours online, and encouraging them to increase their knowledge of risky security behaviours. The research highlights the potential application of affective feedback in the field of usable security. Future work seeks to explore different ways in which affective feedback can be positioned on-screen, and how feedback can be tailored to target specific groups, such as children, or elderly people, with the aim of raising security awareness.
APA, Harvard, Vancouver, ISO, and other styles
7

Brace, Dhimitris. "Users Awareness of Cyber threats and Consequences in Social Media." Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-434979.

Full text
Abstract:
Year 2013, the year that the world faced one of the most critical whistleblower cases in the last decades. A government that was accused that intercepted personal information of many users. Nowadays people are using the internet, and many provided services such as emailing and social media. There are security principles and standards that are supposed to support users with information security and data safety, are based in human rights provided by law. The level of the security and safety provided is a case that every single user must be aware of it. Plenty of users’ awareness in the internet and the services that they are using is not what it should be. Internet and services such as social media or emailing have instant interaction with Information security of individuals and their personal security as well. The users that are using these services are facing threats and risks, and the business field as well. The law has defined a specific regulation in order to protect the human rights in information privacy and data protection. Social media usage has become a daily communication routine between users who are not informed about the consequences of their usage and what that might bring up. The overall purpose of this study was to warn the users of the internet and social media to be aware of the risk and threats, and to introduce the meaning and the importance of information security by increasing user awareness.
APA, Harvard, Vancouver, ISO, and other styles
8

Bauer, Stefan, Edward Bernroider, and Katharina Chudzikowski. "Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks." Elsevier, 2017. http://dx.doi.org/10.1016/j.cose.2017.04.009.

Full text
Abstract:
In organizations, users' compliance with information security policies (ISP) is crucial for minimizing information security (IS) incidents. To improve users' compliance, IS managers have implemented IS awareness (ISA) programs, which are systematically planned interventions to continuously transport security information to a target audience. The underlying research analyzes IS managers' efforts to design effective ISA programs by comparing current design recommendations suggested by scientific literature with actual design practices of ISA programs in three banks. Moreover, this study addresses how users perceive ISA programs and related implications for compliant IS behavior. Empirically, we utilize a multiple case design to investigate three banks from Central and Eastern Europe. In total, 33 semi-structured interviews with IS managers and users were conducted and internal materials of ISA programs such as intranet messages and posters were also considered. The paper contributes to IS compliance research by offering a comparative and holistic view on ISA program design practices. Moreover, we identified influences on users' perceptions centering on IS risks, responsibilities, ISP importance and knowledge, and neutralization behaviors. Finally, the study raises propositions regarding the relationship of ISA program designs and factors, which are likely to influence users' ISP compliance.
APA, Harvard, Vancouver, ISO, and other styles
9

Du, Tiantian, and Amro Agami. "Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking." Thesis, Umeå universitet, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655.

Full text
Abstract:
The advancement of mobile technology and banking services enabled users to use the mobile banking for a variety of tasks with their smartphones, bringing increased flexibility and value-added services to the customers. However, users still have still concerns regarding the security of mobile banking services. The lack of knowledge of the user about different security threats and mechanisms to improve their security represent a major opportunity for hackers and cyberattacks. Despite the fact that the younger students are more knowledgeable about technologies yet awareness is still a concern. Perceived security in the context of young users has not been examined before, although it is considered important in building customer trust. Therefore, this thesis aims to form a good understanding of this topic. On analyzing prior research, the subjects of trust and perceived security in mobile banking is approached by the literature review and an exploratory study that was conducted through qualitative semi-structured interviews. The information collected was carefully analyzed with proper tools. After analyzing the information an analysis of the literature findings and study finds was presented. This thesis examined and revealed that perceived security in mobile banking is important for young users. However, it was noticed that users would not leave the service due to their reliance on the bank assurances to cover their security losses, which means that most of the mobile banking young users trust their bank and technology given the security threats. In addition, this study revealed that the majority of users are unaware of security threats surrounding the mobile banking environment. It was found also that the most important mechanism for the user is authentication mechanisms. This thesis provides a general understanding of the security in mobile banking. It highlights that perceived security is a complex concept and is affected by various factors such as device, information quality, user experience and type of network connections. These factors should be carefully considered by users when using the technology. In conclusion, this thesis also implies banks to communicate effectively security information to users in order to avoid mobile banking users’ errors.
APA, Harvard, Vancouver, ISO, and other styles
10

Narayana, Chaithanya Kumar. "Awareness and trust of web users on information sharing in social logins." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99038.

Full text
Abstract:
Accessing websites using social networking credentials, also known as social login, is becoming increasingly popular as users do not need to create and maintain accounts on each and every website they access. During these social logins, the private information of users is shared with third-party websites from their social profile, and much of this happens behind the scenes which is abstracted from the user. However, as social logins are widespread, it is essential to understand the users’ views and appreciation towards the information being shared in the background. There is also a possibility of data leak or misuse when information is exchanged between a website and social networking site. Accordingly, the purpose of this study is to explore the perception of users towards their awareness and trust in social login. In addition, based on users’ needs and desires, the study aims to formulate suggestions for improving the awareness and trust of social login. Semi-structured interviews were conducted with 6 students from Linnaeus University of Sweden to collect data. These interviews were transcribed and analyzed using thematic analysis. The findings revealed that users are conscious of their personal attributes being shared but are not aware that they can control, revise and revoke information sharing permissions. It was also found that users trust third parties to some extent but not the social networking sites. The study also suggested some improvement ideas for enhancing the awareness and trust of web users in social logins. In addition to contributing to the field of social login, the outcomes of this study also benefit users and web companies by helping to understand and increase the awareness and trust of web users on social logins.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "USER'S AWARENESS"

1

Mason, John M. Civil engineering careers: A user's guide for awareness, retention, and curriculum programs. Washington, DC: Transportation Research Board, National Research Council, National Academy Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eamonn, O'Neill, and SpringerLink (Online service), eds. Mobile Context Awareness. London: Springer London, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Minding the body: Clinical uses of somatic awareness. New York: Guilford Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

L, Boomgaarden Wesley, Darling Pamela W, and Association of Research Libraries, eds. Staff training and user awareness in preservation management. Washington, DC: Association of Research Libraries, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

NHS Executive. Information Management Group. Integrated Clinical Workstation Computer Based Awareness Personal Presentation: User guide. Leeds: NHS Executive, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Army War College (U.S.). Strategic Studies Institute, ed. On the uses of cultural knowledge. Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The uses of culture: Education and the limits of ethnic affiliation. New York: Routledge, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Campus, Mauro, Stefano Dorigo, Veronica Federico, and Nicole Lazzerini, eds. Pago, dunque sono (cittadino europeo). Florence: Firenze University Press, 2022. http://dx.doi.org/10.36253/978-88-5518-591-2.

Full text
Abstract:
The book collects the contributions of a group of scholars, with different scientific backgrounds, on the issue of the relationship between taxation, solidarity and citizenship within the EU. The common thread linking them is the inescapability of the tax duty in a community of rights and the incompleteness of the European system, which performs important functions of collective interest without claiming any cost for those who use it. What emerges is the need for a genuine EU own tax, which, without the intermediary of the Member States, would burden the users of European public goods, increasing awareness of the social value of the EU, amplifying its solidarity dimension, and outlining a new concept of citizenship. In short, I pay, therefore I am (European citizen).
APA, Harvard, Vancouver, ISO, and other styles
9

Hawke, Anthea. Shaping the multisensory room and its uses to enhance the development of visual skills and body awareness for students with complex learning difficulties. Birmingham: University of Birmingham, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manarini, Edoardo. Struggles for Power in the Kingdom of Italy. NL Amsterdam: Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463725828.

Full text
Abstract:
This book presents a detailed study which focuses upon the Hucpoldings, an elite group in Carolingian and post-Carolingian Italy. Though the Hucpoldings have not received extensive treatment in previous Anglophone scholarship, they are a key clan in this period. Manarini’s ground-breaking study uses this kinship group to highlight and pinpoint the dramatic geopolitical changes in the kingdom of Italy across three crucial centuries. The research deals with the reconstruction of the political events of every identifiable member of the kinship, as well as the inquiry into their patrimony and their networks of relations and patronage throughout the kingdom of Italy. Finally, it examines the particular elements of the group, from which emerges a clearer picture of the nature of their power, their memory strategies and the shared perceptions and self-awareness among the group members.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "USER'S AWARENESS"

1

von Buchwald, Esben, Jakob Eg Larsen, and Roderick Murray-Smith. "Mobile Context-Aware Support for Public Transportation Users." In Mobile Context Awareness, 133–42. London: Springer London, 2012. http://dx.doi.org/10.1007/978-0-85729-625-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frà, Cristina, Massimo Valla, Alessio Agneessens, Igor Bisio, and Fabio Lavagetto. "Mobile Sensing of User’s Motion and Position Context for Automatic Check-in Suggestion and Validation." In Mobile Context Awareness, 87–96. London: Springer London, 2012. http://dx.doi.org/10.1007/978-0-85729-625-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lange, Kathrin, Armin Janß, Siyamak Farjoudi Manjili, Miriam Nowak, Wolfgang Lauer, and Klaus Radermacher. "Users’ Awareness of Alarm Settings." In Advances in Intelligent Systems and Computing, 453–64. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96098-2_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Minkyong, and David Kotz. "Classifying the Mobility of Users and the Popularity of Access Points." In Location- and Context-Awareness, 198–210. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11426646_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kraft, Christian. "Innovating Around Context Awareness." In User Experience Innovation, 157–64. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4150-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Faria, Salvador, and Vassilis Kostakos. "A Scalable Sensor Middleware for Social End-User Programming." In Mobile Context Awareness, 115–31. London: Springer London, 2012. http://dx.doi.org/10.1007/978-0-85729-625-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Annie. "Context-Aware Collaborative Filtering System: Predicting the User’s Preference in the Ubiquitous Computing Environment." In Location- and Context-Awareness, 244–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11426646_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ruppel, Peter, Georg Treu, Axel Küpper, and Claudia Linnhoff-Popien. "Anonymous User Tracking for Location-Based Community Services." In Location- and Context-Awareness, 116–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11752967_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mahajan, Aman, and Tomayess Issa. "Australian Users’ Perspective of Green Blockchain Technology Adoption in Businesses." In Sustainability Awareness and Green Information Technologies, 375–408. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47975-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mortensen, Ditte Hvas. "User Aware Technology: From Inter-human Awareness to Technology-User Awareness." In Human-Computer Interaction – INTERACT 2009, 884–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03658-3_102.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "USER'S AWARENESS"

1

Zhang, Xiaohui. "A user's perspective of design for context-awareness." In the 13th international conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2030112.2030199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yokochi, Airi, and Shohei Kato. "Awareness motion and it's timing to induce user's action." In 2016 IEEE 5th Global Conference on Consumer Electronics. IEEE, 2016. http://dx.doi.org/10.1109/gcce.2016.7800360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jarusriboonchai, Pradthana, Aris Malapaschas, Thomas Olsson, and Kaisa Väänänen. "Increasing Collocated People's Awareness of the Mobile User's Activities." In CSCW '16: Computer Supported Cooperative Work and Social Computing. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2818048.2819990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheng, Wen-Chang, and Yan-Zhi Wu. "A user's intention detection method for smart walker." In 2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST). IEEE, 2017. http://dx.doi.org/10.1109/icawst.2017.8256477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Weiyi, Sha Liu, and Zichen Zhang. "The Influence Factors of Standby Sign on User Shutdown Behavior." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002187.

Full text
Abstract:
We observe that many users often don’t turn off their laptops after using it, so that the device stays in standby for a long time, which not only causes damage to the battery, but also causes energy waste. We tried to find a simple and effective way to prompt users to shut down timely. Therefore, we conducted following research:(1) Find the reasons why users don’t shut down timely; (2) Find cost-effective ways to let them to shut down in time. First, through a questionnaire survey of 50 users, we found that the main reasons for users not to shut down timely include forgetting to shut down, the second reason is unawareness of disadvantages of not shutting down, and the third reason is they think keeping laptop standby can improve work efficiency (return to work faster). Therefore, we suppose that a prominent standby sign may solve these problems.Then, we study the main factors of standby sign affecting user shutdown behavior through experiments, and then design standby sign according to experimental results to test its effect on user shutdown behavior. We first investigated about 50 college students through a hierarchical scale, analyzed the influence of sign shape, size, position, flashing and text prompt on users' shutdown behavior, and conducted data analysis, and came to the following conclusions:1. In terms of shape, triangle, ring, circle, diamond and square were taken as independent variables, and user awareness of signs was taken as dependent variables(p<0.05). Triangle has the highest awareness degree, followed by ring.2. In terms of size, we conducted a curve fitting between sign size and the user's awareness of sign, and found user's awareness of sign was the best when the proportion of the triangle sign size was 1/1200-1/600 of laptop screen size.3. In terms of position, when the sign is placed in different locations of the laptop computer, including the bottom center of the screen, the center of the keyboard and the left side of the keyboard, it is found that there is a significant difference in user awareness (p<0.05), the effect is best in the bottom center of the screen, and in the subjective question, most users suggest adding another sign on laptop’s back.4. We compared the user awareness of the flashing sign with a text prompt with that of the sign only(p<0.05), significant difference was found between two signs, and the flashing sign with text prompt had higher awareness.Finally, we designed according to these results the standby sign, and no standby sign laptop sample awareness of contrast experiment, found that 90% of users when there is the sign can be timely shutdown, far higher than situation without sign, prove the validity of results of the study, the standby sign, can effectively reduce users untimely shutdown behavior. The result of this experiment is beneficial to reduce the energy consumption and equipment damage caused by users untimely shutdown behavior.
APA, Harvard, Vancouver, ISO, and other styles
6

Jia, Fusheng, Xinyu Chen, and Renke He. "Conversational Interaction Design for shopping apps: Situational awareness theory." In Intelligent Human Systems Integration (IHSI 2023) Integrating People and Intelligent Systems. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002918.

Full text
Abstract:
Conversational interaction is crucial to the development of e-commerce. In order to meet the needs of users, more and more enterprises begin to build chatbots based on conversational interaction. Conversational chatbots are becoming more and more popular, gradually becoming the preferred way for users to communicate with enterprises. Chatbots can provide users with personalized experience and high-quality services. However, there is no complete and systematic design principle to guide the design of its new conversational interface interaction. Many designers have borrowed the methods of social chat software for their design, which is lack of pertinence and difficult to ensure the rationality of interaction. The academic research on the shopping behavior of chatbots is relatively few. Even the Taobao APP, which is frequently used at present, has not formed a good user experience in the design of conversational interaction. How to improve the experience of conversational interaction is an urgent research topic. From the perspective of user experience, the behavior mode, information expression and thinking mode displayed by conversational chatbots should conform to the thinking and behavior characteristics of users. The design of conversational interaction should pay special attention to user experience in addition to technical competition. The social shortcomings of e-commerce sites are a major obstacle to the growth of companies' online businesses, and there is a lot of distrust among users of such technologies. With the disappearance of the structure and formality of the session, the difficulty of maintaining a good user experience increases and the system loses control of the human-computer interaction experience. In most studies, the focus is on the usability of conversational interactions and the ability to identify user queries.This paper mainly discusses the application of context awareness theory in conversational interaction of shopping APP, proposes a conversational interaction design process of shopping APP based on context awareness model and KANO-AHP model, and explores and summarizes the user experience-oriented conversational interaction design strategy of shopping APP by obtaining user needs qualitatively and quantitatively. On the basis of the context awareness theory, the user's experience demand set of four dimensions of conversational interaction vision, interaction, function and emotion of shopping APP is obtained based on the context awareness model from three aspects of user context factors, product context factors and environmental context factors. The KANO model is used to screen and classify the obtained demand set. The hierarchical structure of conversational interactive user needs of shopping APP is obtained. Then combined with the analytic hierarchy process (AHP) to calculate the weight of each demand and order the importance, finally put forward the design strategy. Based on the situation perception theory and KANO-AHP model to analyze user needs, the design strategies and suggestions of conversational interactive experience of shopping APP are proposed from four aspects of user visual interface experience, functional experience, interactive experience and emotional experience. In particular, some strategies such as personality characteristics, high-context conversation mechanism and the same emotional feedback mechanism are proposed to improve the user experience and satisfaction of conversational interaction of shopping APP. However, this paper only conducts in-depth research on the user side of conversational interaction of shopping APP, and obtains various experience design principles based on users. However, in the process of shopping, it is usually the transaction between merchants and users, and the subsequent research should be carried out in combination with the experience needs of merchants, so as to balance users and merchants in terms of experience.
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Yoga, Ya-Han Lee, Yaliang Chuang, Rung-Huei Liang, and Lin-Lin Chen. "Designing the Expressive Point Lights to Enhance User's Situated Awareness of Smart Systems." In DIS '17: Designing Interactive Systems Conference 2017. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3064857.3079187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Shifeng, Shi Feng, Daling Wang, Kaisong Song, Yifei Zhang, and Weichao Wang. "EmoElicitor: An Open Domain Response Generation Model with User Emotional Reaction Awareness." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/503.

Full text
Abstract:
Generating emotional responses is crucial for building human-like dialogue systems. However, existing studies have focused only on generating responses by controlling the agents' emotions, while the feelings of the users, which are the ultimate concern of a dialogue system, have been neglected. In this paper, we propose a novel variational model named EmoElicitor to generate appropriate responses that can elicit user's specific emotion. We incorporate the next-round utterance after the response into the posterior network to enrich the context, and we decompose single latent variable into several sequential ones to guide response generation with the help of a pre-trained language model. Extensive experiments conducted on real-world dataset show that EmoElicitor not only performs better than the baselines in term of diversity and semantic similarity, but also can elicit emotion with higher accuracy.
APA, Harvard, Vancouver, ISO, and other styles
9

Turner, Loren L., David Wald, and Kuo-Wan Lin. "A ShakeCast User's Observations on the Benefits of Situational Awareness for Seismic Risk Management." In ATC and SEI Conference on Improving the Seismic Performance of Existing Buildings and Other Structures. Reston, VA: American Society of Civil Engineers, 2009. http://dx.doi.org/10.1061/41084(364)113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hamdard, Javid, Abdurauf Khamosh, and Jonathan H. Chan. "A Survey for User's Awareness and Practices Regarding Smartphone Security and Privacy in Afghanistan." In 2020 5th International Conference on Information Technology (InCIT). IEEE, 2020. http://dx.doi.org/10.1109/incit50588.2020.9310935.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "USER'S AWARENESS"

1

Hoy, Andreas, Åsa Gerger Swartling, and Elin Leander. Adopting a user-oriented approach to make climate information more accessible across Europe. Stockholm Environment Institute, March 2022. http://dx.doi.org/10.51414/sei2022.009.

Full text
Abstract:
Research from the ClimVis Europe project shows that climate information must be presented in more effective ways to reduce climate risks and support adaptation. Users need information that is easy to access, in their own language, and designed to help them make connections between real-time weather events and long-term climate developments. Users of weather and climate data in Europe are aware of only a few (if any) relevant, available tools that provide them with the insights into current, future and long-term meteorological trends that they seek. However, efforts to boost awareness of available tools, while important, will not be enough to meet user demands. Providers of climate information need to consult with stakeholders to co-develop new tools to meet needs and support the uptake of information. Existing European tools have two key shortcomings: limited language and insufficient context. The provision of climate information exclusively in English excludes many users (especially at local and regional levels and in Eastern Europe and Russia). Tools do not link real-time extreme weather with long-term past or future climate trends; such connections are essential to assess climate change-related impacts and adaptation needs. We interpret the results as a call to action, to enhance related communication that is fundamental to the need to reduce climate risks and support adaptation.
APA, Harvard, Vancouver, ISO, and other styles
2

Steinmann, Peter. Is peer education an effective method for HIV prevention in low- and middle-income countries? SUPPORT, 2016. http://dx.doi.org/10.30846/1608092.

Full text
Abstract:
Peer education uses individuals to convey specific information to members of a peer or target group with the aim of improving awareness or behaviours. Peer educators must share common key characteristics with those being targeted, but may either come from inside or outside the targeted group.
APA, Harvard, Vancouver, ISO, and other styles
3

Hunt, Will, and Jacqueline O'Reilly. Rapid Recruitment in Retail: Leveraging AI in the hiring of hourly paid frontline associates during the Covid-19 Pandemic. Digital Futures at Work Research Centre, March 2022. http://dx.doi.org/10.20919/alnb9606.

Full text
Abstract:
Increased demand due to the Coronavirus pandemic created the need for Walmart to onboard tens of thousands of workers in a short period. This acted as a catalyst for Walmart to bring forward existing plans to update the hiring system for store-level hourly paid associates in its US stores. The Rapid Recruitment project sought to make hiring safer, faster, fairer and more effective by removing in-person interviews and leveraging machine learning and predictive analytics. This working paper reports on a case study of the Rapid Recruitment project involving semi-structured qualitative interviews with members of the project team and hiring staff at five US stores. The research finds that while implementation of the changes had been successful and the changes were largely valued by hiring staff, lack of awareness and confidence in some changes threatened to undermine some of the objectives of the changes. Reservations about the pre-employment assessment and the algorithm’s ability to predict quality hires led someusers reviewing more applications than perhaps necessary and potentially undermining prediction of 90-day turnover. Concerns about the ability to assess candidates over the phone meant that some users had reverted to in-person interviews, raising the riskof Covid transmission and potentially undermining the objective of removing the influence of human bias linked to appearance and other factors unrelated to performance. The impact of awareness and confidence in the changes to the hiring system are discussed in relation to the project objectives
APA, Harvard, Vancouver, ISO, and other styles
4

Megersa, Kelbesa, Fabrizio Santoro, Adrienne Lees, Marco Carreras, Theonille Mukamana, Naphtal Hakizimana, and Yves Nsengiyumva. Technology and Tax: Adoption and Impacts of E-services in Rwanda. Institute of Development Studies, May 2023. http://dx.doi.org/10.19088/ictd.2023.029.

Full text
Abstract:
Many low-income countries are increasingly digitising their tax services, which can bring a range of benefits, from reducing compliance costs and improving record-keeping, to limiting opportunities for corruption and increasing fairness in the tax system. However, the success of these benefits depends on adequate levels of awareness and adoption of e-services among taxpayers; where these levels are suboptimal, tax e-services may produce only partial benefits. This paper examines the extent of awareness and uptake of tax e-services in Rwanda from a pre-pandemic situation up to two years into the COVID-19 crisis. The country has increasingly digitalised its tax administration, even more so during the pandemic. Electronic filing and payment of taxes have been mandatory since 2015, and two different e-services are available: E-tax, a free web-based platform designed to be used on computers and smartphones, and M-declaration, a feature phone-based application which enables mobile money payments and a simpler process for filing a return. This allows us to run a comparative analysis of the two solutions. We apply a mixed methods approach, using a nationally representative panel survey of 2,000 corporate (CIT) and personal (PIT) income taxpayers, with baseline information collected pre-COVID-19 and four follow-up rounds carried out after the pandemic hit, and focus group discussions (FGDs) with 24 e-services users. Summary of Working Paper 153.
APA, Harvard, Vancouver, ISO, and other styles
5

Baader, Franz, Stefan Borgwardt, and Marcel Lippmann. Temporal Conjunctive Queries in Expressive DLs with Non-simple Roles. Technische Universität Dresden, 2015. http://dx.doi.org/10.25368/2022.222.

Full text
Abstract:
In Ontology-Based Data Access (OBDA), user queries are evaluated over a set of facts under the open world assumption, while taking into account background knowledge given in the form of a Description Logic (DL) ontology. Motivated by situation awareness applications, temporal conjunctive queries (TCQs) have recently been proposed as a useful extension of traditional OBDA to support the processing of temporal information. This paper extends the existing complexity analysis of TCQ entailment to very expressive DLs underlying the OWL 2 standard, and in contrast to previous work also allows for queries containing transitive roles.
APA, Harvard, Vancouver, ISO, and other styles
6

Pinto, Ana María, Claudia Díaz, Edgard Zamora, Eduardo Café, Marisela Ponce de León, Martín Sosa, and René Cortés, eds. Road safety in Latin America and the Caribbean: after a decade of action prospects for safer mobility. Inter-American Development Bank, April 2023. http://dx.doi.org/10.18235/0004843.

Full text
Abstract:
The first Decade of Action for Road Safety has ended, but not without demonstrating the importance that systemic work on road safety offers towards protecting life. At the same time, it is clear that real progress in road safety requires a significant commitment of time, resources and political effort. In the Latin American and Caribbean region (LAC), over the past ten years, the growth in the rate of vehicle deaths has slowed. Unfortunately, in the last two years this trend has reversed due to the expansion of the motorcycle fleet in the region. Although it has been possible to raise awareness, create institutions, plan and implement important actions to reduce fatalities, LAC has not obtained the same results as high-income countries, which have entirely reversed the trend in road deaths. In accordance with the above, it is possible to conceive of a second decade of action as an opportunity for LAC countries to finalize the processes initiated over the past decade and to introduce successful lessons experiences from other countries in the region. With this study, the IDB intends to guide this process of continuous improvement, highlighting the best practices and offering an overview of how to move from theory to practice, following the principles that mobility must be safe, sustainable and inclusive, while reducing the risk to all road users, especially the most vulnerable, and maintain the focus on users with special needs (people with disabilities, children and the elderly).
APA, Harvard, Vancouver, ISO, and other styles
7

Atwood and Franklin-Alderman. PR-339-093702-R01 Human Factors Influences on Pipeline Damage - Phase II Final Report. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), July 2012. http://dx.doi.org/10.55274/r0010790.

Full text
Abstract:
Pipeline operators expend substantial efforts to develop, implement, and audit their Public Awareness and Pipeline Damage Prevention Programs. While the rate of pipeline damage incidents from third-party and outside force impacts has progressively declined over a period of several decades, these events remain a high priority for the pipeline industry and external stakeholders. One key focus area for Encroachment Detection and Damage Prevention is understanding and managing Human Factors influences in damage prevention programs. This document presents the findings of the Phase II study on the influences of human factors on pipeline damage and damage prevention efforts. The Phase II study builds on the prior literature review and site visits with pipeline operating companies to identify Human Factors issues in Encroachment Detection and Damage Prevention (Phase I). As a result of the Phase I study, over 200 Human Factors issues were identifed that pertain to Encroachment Detection and Damage Prevention. The Phase II study focused on the top 25 issues (as identified by the pipeline operating companies). The report presents the results of two-day workshops that were organized in five countries to develop interventions for each of the 25 high-priority Human Factors Issues. The Final Report includes a �Users Guide� that identifies practical Human Factors interventions to address Encroachment Detection and Pipeline Damage for the 25 high-priority issues. The Users Guide is included in this report as Appendix D. It is also published separately.
APA, Harvard, Vancouver, ISO, and other styles
8

Chiavassa, Nathalie, and Raphael Dewez. Technical Note on Road Safety in Haiti. Inter-American Development Bank, January 2021. http://dx.doi.org/10.18235/0003250.

Full text
Abstract:
The IDB has been a predominant partner supporting Haiti development efforts for many years. Nowadays, the IDB is the main source of investment for the country. Considering the vital weight of road transport sector in the socio-economy of the country, the IDB has concentrated a large part of investment efforts in rehabilitating and improving national road infrastructures. In the same time, a rapid increase of motorization and relatively higher speeds have contributed to increasing the number of traffic fatalities and injuries. In 2017, road injuries were the fifth cause of mortality in Haiti. The Road Safety situation of the country is preoccupying with many Vulnerable Road Users involved, in particular pedestrians and motorcyclists. The country is facing multi-sector challenges to address this Road Safety situation. Despite recent efforts, high political will has not been continuous in promoting a multi-sector coordination and the success of technical efforts remained mitigated over the last years. Road user awareness is still weak in the country. Risk factors include dangerous driving, bad safety conditions of vehicles, together with limited law enforcement and poor maintenance of safety devices on the roads. In this context, the Road Safety situation of the country may be getting worse in the coming years if no action is taken. However, the new Decade provides with a unique opportunity to achieve Sustainable Development Goals (SDGs) including significant progress in reducing the burden of traffic crashes. The IDB has already initiated vital investments in modernizing crash data collection, promoting institutional dialogue and supporting capacity building in the area of Road Safety. Future actions to address Road Safety challenges in Haiti in the framework of the five UN five pillars would require a range of investments in the area of political commitment, institutional coordination and technical efforts. A change of political paradigm from making roads for travelling faster to making roads safer for all users is highly needed at national level. This technical note on Road Safety in Haiti present the current situation of the country and provides with recommendations for future actions on Road Safety.
APA, Harvard, Vancouver, ISO, and other styles
9

Krhutová, Lenka, Petr Šaloun, Kamila Vondroušová, Marcela Dabrowská, Zdeněk Velart, David Andrešič, and Miroslav Paulíček. Výzkum a vývoj podpůrných sítí a informačních systémů pro neformální pečující o osoby po cévních mozkových příhodách. Ostravská univerzita, 2021. http://dx.doi.org/10.15452/vsouhrntacr.2021.

Full text
Abstract:
The summary research report describes and summarizes the goals, course and results of the TAČR–VISNEP project. The aim of the experimental development project was to create an information system (IS) for informal carers (ICs) for a person after stroke using modern information technologies in the technical and non-technical spheres of research. IS will allow users to obtain relevant, timely and interconnected information on support networks to prevent their possible social isolation and exclusion, physical and psychological exhaustion, health disorders and other risk factors in their difficult life situation. The purpose of IS is to contribute to improved awareness of ICs support systems across other long-term care providers, in particular public administration, general practitioners etc. The intent of the project was to create and verify a pilot model of IS in Moravian-Silesian Region, which can subsequently be applied in other regions and / or other target ICs groups. The presented results of the project are based on data obtained by research procedures of qualitative and quantitative methodology in the process of agile software development.
APA, Harvard, Vancouver, ISO, and other styles
10

Jefferson, Brian. Reviewing Information Technology, Surveillance, and Race in the US. Just Tech, Social Science Research Council, May 2022. http://dx.doi.org/10.35650/jt.3033.d.2022.

Full text
Abstract:
The past decade has been marked by a growing awareness of the potential harms of personal computing. This recent development was spurred by a surge of news reports, films, and studies on the unforeseen side effects of constantly using networked devices. As a result, the public has become increasingly aware of the cognitive, ideological, and psychological effects associated with the constant use of personal computing devices. Alongside these revelations, a growing chorus of activists, journalists, organizers, and scholars have turned attention to surveillance technology-related matters of a different kind—those related to the carceral state and border patrol. These efforts have sparked a shift in the public consciousness, from individual experiences of technology users to how technology is used to maintain social divisions. These studies show how the explosion of network devices not only changes society but also maintains longstanding divisions between social groups. This field review highlights key concepts and discussions on information technology, surveillance, carceral governance, and border patrol. Specifically, it explores the evolution of information communication technology and racial surveillance from the late nineteenth century until the present. The review concludes by exploring avenues for bringing these conversations into a transnational dialogue on surveillance, technology, and social inequality moving forward.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography