Search results
1 – 10 of 53Suliman A. Alsuhibany, Muna Almushyti, Noorah Alghasham and Fatimah Alkhudhayr
Nowadays, there is a high demand for online services and applications. However, there is a challenge to keep these applications secured by applying different methods rather than…
Abstract
Purpose
Nowadays, there is a high demand for online services and applications. However, there is a challenge to keep these applications secured by applying different methods rather than using the traditional approaches such as passwords and usernames. Keystroke dynamics is one of the alternative authentication methods that provide high level of security in which the used keyboard plays an important role in the recognition accuracy. To guarantee the robustness of a system in different practical situations, there is a need to examine how much the performance of the system is affected by changing the keyboard layout. This paper aims to investigate the impact of using different keyboards on the recognition accuracy for Arabic free-text typing.
Design/methodology/approach
To evaluate how much the performance of the system is affected by changing the keyboard layout, an experimental study is conducted by using two different keyboards which are a Mac’s keyboard and an HP’s keyboard.
Findings
By using the Mac’s keyboard, the results showed that the false rejection rate (FRR) was 0.20, whilst the false acceptance rate (FAR) was 0.44. However, these values have changed when using the HP’s keyboard where the FRR was equal to 0.08 and the FAR was equal to 0.60.
Research limitations/implications
The number of participants in the experiment, as the authors were targeting much more participants.
Originality/value
These results showed for the first time the impact of the keyboards on the system’s performance regarding the recognition accuracy when using Arabic free-text.
Details
Keywords
Esharenana E. Adomi and Oghenevwogaga Benson Adogbeji
Introduces readers to the new multilingual keyboard technology, KONYIN.
Abstract
Purpose
Introduces readers to the new multilingual keyboard technology, KONYIN.
Design/methodology/approach
This paper describes KONYIN, a Nigerian multilingual keyboard that has just been invented. It highlights the features and the benefits of the keyboard manufactured by LANCOR technologies based in Boston, MA. Describes eight years of product design to achieve results.
Findings
Applications for a new typewriter/keyboard that accommodates different languages and diacritical marks in a single interface.
Research limitations/implications
Users no longer have to switch keyboard layout to type in any language. Has great potential for other language variations.
Practical Implications
Provides useful information and advice for software architects and computer scientists, linguists and writers who want to write in native languages and dialects as well as international languages on one keyboard. Has enormous potential for translation.
Originality/value
This may be the first virtual keyboard layout with its scope.
Details
Keywords
Bhaveer Bhana and Stephen Vincent Flowerday
The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting…
Abstract
Purpose
The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting or mistyping the password (usually because of character switching). The source of this issue is that while a password containing combinations of lowercase characters, uppercase characters, digits and special characters (LUDS) offers a reasonable level of security, it is complex to type and/or memorise, which prolongs the user authentication process. This results in much time being spent for no benefit (as perceived by users), as the user authentication process is merely a prerequisite for whatever a user intends to accomplish. This study aims to address this issue, passphrases that exclude the LUDS guidelines are proposed.
Design/methodology/approach
To discover constructs that create security and to investigate usability concerns relating to the memory and typing issues concerning passphrases, this study was guided by three theories as follows: Shannon’s entropy theory was used to assess security, chunking theory to analyse memory issues and the keystroke level model to assess typing issues. These three constructs were then evaluated against passwords and passphrases to determine whether passphrases better address the security and usability issues related to text-based user authentication. A content analysis was performed to identify common password compositions currently used. A login assessment experiment was used to collect data on user authentication and user – system interaction with passwords and passphrases in line with the constructs that have an impact on user authentication issues related to security, memory and typing. User–system interaction data was collected from a purposeful sample size of 112 participants, logging in at least once a day for 10 days. An expert review, which comprised usability and security experts with specific years of industry and/or academic experience, was also used to validate results and conclusions. All the experts were given questions and content to ensure sufficient context was provided and relevant feedback was obtained. A pilot study involving 10 participants (experts in security and/or usability) was performed on the login assessment website and the content was given to the experts beforehand. Both the website and the expert review content was refined after feedback was received from the pilot study.
Findings
It was concluded that, overall, passphrases better support the user during the user authentication process in terms of security, memory issues and typing issues.
Originality/value
This research aims at promoting the use of a specific type of passphrase instead of complex passwords. Three core aspects need to be assessed in conjunction with each other (security, memorisation and typing) to determine whether user-friendly passphrases can support user authentication better than passwords.
Details
Keywords
WordPerfect offers several facilities to handle foreign languages and multi‐lingual documents. This paper discusses two aspects of language handling in WP: the language code…
Abstract
WordPerfect offers several facilities to handle foreign languages and multi‐lingual documents. This paper discusses two aspects of language handling in WP: the language code, which is a WP formatting code that gives access to language modules and the keyboard editor, which facilitates entering foreign characters. The paper discusses the possibilities offered in the 5.1 version of the program. The last section discusses improvements in WP 6.0.
Unicode is a standard for a universal character set for all of the scripts of the world’s languages It is one of the fundamental technological building blocks for international…
Abstract
Unicode is a standard for a universal character set for all of the scripts of the world’s languages It is one of the fundamental technological building blocks for international exchange of textual information, via computers. It is particularly important to libraries that house collections in many languages and written in various scripts. Ohio State University Libraries houses collections written in many non‐Latin scripts including Arabic, Hebrew, Chinese, Japanese, Korean and Cyrillic. Providing patrons with access to these materials has become much easier with the incorporation of Unicode into library systems and software. This article describes what needs to be in place on personal computers and in the library system in order to take advantage of Unicode as well as providing some guidelines to troubleshoot problems when they occur.
Details
Keywords
Computer teacher simulates future working conditions for Post Office sorters As part of a drive to streamline Britain's postal sorting procedures, the Mechanisation Division of…
Abstract
Computer teacher simulates future working conditions for Post Office sorters As part of a drive to streamline Britain's postal sorting procedures, the Mechanisation Division of the Post Office has recently completed acceptance trials of a computer system which is intended to play a major role in developing training programmes to teach mechanised methods to postal sorting staff.
Joakim Kävrestad, Johan Zaxmy and Marcus Nohlberg
Using passwords to keep account and data safe is very common in modern computing. The purpose of this paper is to look into methods for cracking passwords as a means of increasing…
Abstract
Purpose
Using passwords to keep account and data safe is very common in modern computing. The purpose of this paper is to look into methods for cracking passwords as a means of increasing security, a practice commonly used in penetration testing. Further, in the discipline of digital forensics, password cracking is often an essential part of a computer examination as data has to be decrypted to be analyzed. This paper seeks to look into how users that actively encrypt data construct their passwords to benefit the forensics community.
Design/methodology/approach
The study began with an automated analysis of over one billion passwords in 22 different password databases that leaked to the internet. The study validated the result with an experiment were passwords created on a local website was analyzed during account creation. Further a survey was used to gather data that was used to identify differences in password behavior between user that actively encrypt their data and other users.
Findings
The result of this study suggests that American lowercase letters and numbers are present in almost every password and that users seem to avoid using special characters if they can. Further, the study suggests that users that actively encrypt their data are more prone to use keyboard patterns as passwords than other users.
Originality/value
This paper contributes to the existing body of knowledge around password behavior and suggests that password-guessing attacks should focus on American letters and numbers. Further, the paper suggests that forensics experts should consider testing patterns-based passwords when performing password-guessing attacks against encrypted data.
Details
Keywords
Abstract
Details
Keywords
Bernard Scott and Abhinav Bansal
The purpose of this paper is to explain some phenomena observed in the acquisition of motor skills: the loss of conscious access to knowledge of the structure of a skill and the…
Abstract
Purpose
The purpose of this paper is to explain some phenomena observed in the acquisition of motor skills: the loss of conscious access to knowledge of the structure of a skill and the awareness that an error has been made prior to the receipt of knowledge of results. Although there are rich descriptive accounts of skill acquisition in the literature, there are no satisfactory explanatory models of the cognitive processes involved. The paper provides such a model.
Design/methodology/approach
In the 1970s, the first author implemented a computer program model of the cognitive processes involved in learning and skill acquisition, based on a series of empirical investigations. Recently, with assistance from the second author, the model has been reviewed, updated and re-implemented. The paper sets this work in the broader context of a theory of learning and teaching, conversation theory.
Findings
The model provides a constructivist account of skill acquisition and associated phenomena. The model provides theoretical foundations for conversation theory.
Practical implications
The model adds to the understanding of motor skill acquisition and to the understanding of processes of learning and teaching in general.
Originality/value
The model and its interpretation are an original contribution to the skills acquisition literature.
Details