Search results

1 – 10 of 53
Article
Publication date: 11 April 2019

Suliman A. Alsuhibany, Muna Almushyti, Noorah Alghasham and Fatimah Alkhudhayr

Nowadays, there is a high demand for online services and applications. However, there is a challenge to keep these applications secured by applying different methods rather than…

Abstract

Purpose

Nowadays, there is a high demand for online services and applications. However, there is a challenge to keep these applications secured by applying different methods rather than using the traditional approaches such as passwords and usernames. Keystroke dynamics is one of the alternative authentication methods that provide high level of security in which the used keyboard plays an important role in the recognition accuracy. To guarantee the robustness of a system in different practical situations, there is a need to examine how much the performance of the system is affected by changing the keyboard layout. This paper aims to investigate the impact of using different keyboards on the recognition accuracy for Arabic free-text typing.

Design/methodology/approach

To evaluate how much the performance of the system is affected by changing the keyboard layout, an experimental study is conducted by using two different keyboards which are a Mac’s keyboard and an HP’s keyboard.

Findings

By using the Mac’s keyboard, the results showed that the false rejection rate (FRR) was 0.20, whilst the false acceptance rate (FAR) was 0.44. However, these values have changed when using the HP’s keyboard where the FRR was equal to 0.08 and the FAR was equal to 0.60.

Research limitations/implications

The number of participants in the experiment, as the authors were targeting much more participants.

Originality/value

These results showed for the first time the impact of the keyboards on the system’s performance regarding the recognition accuracy when using Arabic free-text.

Details

Information & Computer Security, vol. 27 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 July 2005

Esharenana E. Adomi and Oghenevwogaga Benson Adogbeji

Introduces readers to the new multilingual keyboard technology, KONYIN.

374

Abstract

Purpose

Introduces readers to the new multilingual keyboard technology, KONYIN.

Design/methodology/approach

This paper describes KONYIN, a Nigerian multilingual keyboard that has just been invented. It highlights the features and the benefits of the keyboard manufactured by LANCOR technologies based in Boston, MA. Describes eight years of product design to achieve results.

Findings

Applications for a new typewriter/keyboard that accommodates different languages and diacritical marks in a single interface.

Research limitations/implications

Users no longer have to switch keyboard layout to type in any language. Has great potential for other language variations.

Practical Implications

Provides useful information and advice for software architects and computer scientists, linguists and writers who want to write in native languages and dialects as well as international languages on one keyboard. Has enormous potential for translation.

Originality/value

This may be the first virtual keyboard layout with its scope.

Details

Library Hi Tech News, vol. 22 no. 6
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 30 November 2021

Bhaveer Bhana and Stephen Vincent Flowerday

The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting…

Abstract

Purpose

The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting or mistyping the password (usually because of character switching). The source of this issue is that while a password containing combinations of lowercase characters, uppercase characters, digits and special characters (LUDS) offers a reasonable level of security, it is complex to type and/or memorise, which prolongs the user authentication process. This results in much time being spent for no benefit (as perceived by users), as the user authentication process is merely a prerequisite for whatever a user intends to accomplish. This study aims to address this issue, passphrases that exclude the LUDS guidelines are proposed.

Design/methodology/approach

To discover constructs that create security and to investigate usability concerns relating to the memory and typing issues concerning passphrases, this study was guided by three theories as follows: Shannon’s entropy theory was used to assess security, chunking theory to analyse memory issues and the keystroke level model to assess typing issues. These three constructs were then evaluated against passwords and passphrases to determine whether passphrases better address the security and usability issues related to text-based user authentication. A content analysis was performed to identify common password compositions currently used. A login assessment experiment was used to collect data on user authentication and user – system interaction with passwords and passphrases in line with the constructs that have an impact on user authentication issues related to security, memory and typing. User–system interaction data was collected from a purposeful sample size of 112 participants, logging in at least once a day for 10 days. An expert review, which comprised usability and security experts with specific years of industry and/or academic experience, was also used to validate results and conclusions. All the experts were given questions and content to ensure sufficient context was provided and relevant feedback was obtained. A pilot study involving 10 participants (experts in security and/or usability) was performed on the login assessment website and the content was given to the experts beforehand. Both the website and the expert review content was refined after feedback was received from the pilot study.

Findings

It was concluded that, overall, passphrases better support the user during the user authentication process in terms of security, memory issues and typing issues.

Originality/value

This research aims at promoting the use of a specific type of passphrase instead of complex passwords. Three core aspects need to be assessed in conjunction with each other (security, memorisation and typing) to determine whether user-friendly passphrases can support user authentication better than passwords.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 May 1994

Peter Kahrel

WordPerfect offers several facilities to handle foreign languages and multi‐lingual documents. This paper discusses two aspects of language handling in WP: the language code…

Abstract

WordPerfect offers several facilities to handle foreign languages and multi‐lingual documents. This paper discusses two aspects of language handling in WP: the language code, which is a WP formatting code that gives access to language modules and the keyboard editor, which facilitates entering foreign characters. The paper discusses the possibilities offered in the 5.1 version of the program. The last section discusses improvements in WP 6.0.

Details

Aslib Proceedings, vol. 46 no. 5
Type: Research Article
ISSN: 0001-253X

Abstract

Details

Economic Complexity
Type: Book
ISBN: 978-0-44451-433-2

Article
Publication date: 1 December 2003

Laura Tull and Dona Straley

Unicode is a standard for a universal character set for all of the scripts of the world’s languages It is one of the fundamental technological building blocks for international…

811

Abstract

Unicode is a standard for a universal character set for all of the scripts of the world’s languages It is one of the fundamental technological building blocks for international exchange of textual information, via computers. It is particularly important to libraries that house collections in many languages and written in various scripts. Ohio State University Libraries houses collections written in many non‐Latin scripts including Arabic, Hebrew, Chinese, Japanese, Korean and Cyrillic. Providing patrons with access to these materials has become much easier with the incorporation of Unicode into library systems and software. This article describes what needs to be in place on personal computers and in the library system in order to take advantage of Unicode as well as providing some guidelines to troubleshoot problems when they occur.

Details

Library Hi Tech, vol. 21 no. 4
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 December 1971

Computer teacher simulates future working conditions for Post Office sorters As part of a drive to streamline Britain's postal sorting procedures, the Mechanisation Division of…

Abstract

Computer teacher simulates future working conditions for Post Office sorters As part of a drive to streamline Britain's postal sorting procedures, the Mechanisation Division of the Post Office has recently completed acceptance trials of a computer system which is intended to play a major role in developing training programmes to teach mechanised methods to postal sorting staff.

Details

Industrial and Commercial Training, vol. 3 no. 12
Type: Research Article
ISSN: 0019-7858

Article
Publication date: 20 January 2020

Joakim Kävrestad, Johan Zaxmy and Marcus Nohlberg

Using passwords to keep account and data safe is very common in modern computing. The purpose of this paper is to look into methods for cracking passwords as a means of increasing…

Abstract

Purpose

Using passwords to keep account and data safe is very common in modern computing. The purpose of this paper is to look into methods for cracking passwords as a means of increasing security, a practice commonly used in penetration testing. Further, in the discipline of digital forensics, password cracking is often an essential part of a computer examination as data has to be decrypted to be analyzed. This paper seeks to look into how users that actively encrypt data construct their passwords to benefit the forensics community.

Design/methodology/approach

The study began with an automated analysis of over one billion passwords in 22 different password databases that leaked to the internet. The study validated the result with an experiment were passwords created on a local website was analyzed during account creation. Further a survey was used to gather data that was used to identify differences in password behavior between user that actively encrypt their data and other users.

Findings

The result of this study suggests that American lowercase letters and numbers are present in almost every password and that users seem to avoid using special characters if they can. Further, the study suggests that users that actively encrypt their data are more prone to use keyboard patterns as passwords than other users.

Originality/value

This paper contributes to the existing body of knowledge around password behavior and suggests that password-guessing attacks should focus on American letters and numbers. Further, the paper suggests that forensics experts should consider testing patterns-based passwords when performing password-guessing attacks against encrypted data.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Article
Publication date: 1 April 2002

Alex M. Andrew

38

Abstract

Details

Kybernetes, vol. 31 no. 3/4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 3 November 2014

Bernard Scott and Abhinav Bansal

The purpose of this paper is to explain some phenomena observed in the acquisition of motor skills: the loss of conscious access to knowledge of the structure of a skill and the…

Abstract

Purpose

The purpose of this paper is to explain some phenomena observed in the acquisition of motor skills: the loss of conscious access to knowledge of the structure of a skill and the awareness that an error has been made prior to the receipt of knowledge of results. Although there are rich descriptive accounts of skill acquisition in the literature, there are no satisfactory explanatory models of the cognitive processes involved. The paper provides such a model.

Design/methodology/approach

In the 1970s, the first author implemented a computer program model of the cognitive processes involved in learning and skill acquisition, based on a series of empirical investigations. Recently, with assistance from the second author, the model has been reviewed, updated and re-implemented. The paper sets this work in the broader context of a theory of learning and teaching, conversation theory.

Findings

The model provides a constructivist account of skill acquisition and associated phenomena. The model provides theoretical foundations for conversation theory.

Practical implications

The model adds to the understanding of motor skill acquisition and to the understanding of processes of learning and teaching in general.

Originality/value

The model and its interpretation are an original contribution to the skills acquisition literature.

Details

Kybernetes, vol. 43 no. 9/10
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 53