首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
《Interacting with computers》2006,18(5):1101-1122
As a result of the evolution in the field of biometrics, a new breed of techniques and methods for user identity recognition and verification has appeared based on the recognition and verification of several biometric features considered unique to each individual. Signature and voice characteristics, facial features, and iris and fingerprint patterns have all been used to identify a person or just to verify that the person is who he/she claims to be. Although still relatively new, these new technologies have already reached a level of development that allows its commercialization. However, there is a lack of studies devoted to the evaluation of these technologies from a user-centered perspective. This paper is intended to promote user-centered design and evaluation of biometric technologies. Towards this end, we have developed a platform to perform empirical evaluations of commercial biometric identity verification systems, including fingerprint, voice and signature verification. In this article, we present an initial empirical study in which we evaluate, compare and try to get insights into the factors that are crucial for the usability of these systems.  相似文献   

2.
Much has been made of the capabilities to commit a crime that has a digital component, whether it is hacking, fraud, embezzlement, identity theft, organized crime, child pornography, or other criminal act. While the capabilities of the perpetrators and IT professionals' response are often discussed, what is often overlooked is the ability of law enforcement to investigate and prosecute digital crime. An information security plan that is not developed with prosecution as a possible outcome is short sighted. This article is a research report on Michigan's law enforcement capabilities, including training, staffing levels, and trends, and it provides information that will help IT professionals understand the challenges they may encounter when soliciting help from law enforcement agencies.  相似文献   

3.
Biometric technology - the automated recognition of individuals using biological and behavioral traits - has been presented as a natural identity management tool that offers "greater security and convenience than traditional methods of personal recognition." Indeed, many existing government identity management systems employ biometrics to assure that each person has only one identity in the system and that only one person can access each identity. Historically, however, biometric technology has also been controversial, with many writers suggesting that biometrics invade privacy, that specific technologies have error rates unsuitable for large-scale applications, or that the techniques "are useful to organizations that regulate the individual, but of little use where the individual controls identification and authorization." Here, I address these controversies by looking more deeply into the basic assumptions made in biometric recognition. I'll look at some example systems and delve into the differences between personal identity and digital identity. I'll conclude by discussing how those whose identity is managed with biometrics can manage biometric identity management.  相似文献   

4.
This paper considers whether emerging wearable computing technologies could and should be applied to reducing older people’s fear of crime. The paper begins by exploring the sociological and criminological literature, which debates why older people are most likely to fear crime, even though they are least likely to be victims. It goes on to report findings from ethnographic studies of key care and social service professionals in an English city. This field work reflects the ways in which assistive technologies for older people can function as signs of vulnerability, and also reports the uses of relatively simple information and communication technologies in providing critical backup and reassurance for elderly users. The fear of crime is then considered as an information problem centring on three questions: what’s going on, what can I do about it and can I get help? Possible applications of emerging wearable surveillance technologies are then explored through a design concept called the Cambadge. This is a wearable, wireless webcam for older people to broadcast video and audio data to police or community Web sites. This concept is situated with reference to a company developing a similar technology and to related fields. It is argued that the design problems of such surveillance technology are inherently political. The case is made with reference to the history and philosophy of surveillance and the massive demographic shifts of the ageing population. It is argued that utopian visions of the uses of such technology under-theorise power and accountability. The paper concludes that technological innovations will not adequately address older people’s fear of crime without accompanying social and cultural change.  相似文献   

5.
In considering identity management, the first issue is—What is identity? This is, of course, an issue that has plagued poets, philosophers, and playwrights for centuries. We're concerned with a more prosaic version of the question: How does an entity recognize another entity? This important question occurs when access to resources, such as health or financial records, services, or benefits, is limited to specific entities. The entity in question could be a person, a computer, or even a device with quite limited memory and computational power. In this issue of IEEE Security & Privacy—the first of what we suspect will be several special issues on identity management—we have chosen to focus on identity management in which the entity being identified is a person.  相似文献   

6.
Cooperative autonomous driving: intelligent vehicles sharing city roads   总被引:1,自引:0,他引:1  
The paper presents the Intelligent Control System Laboratory's (ICSL) Cooperative Autonomous Mobile Robot technologies and their application to intelligent vehicles for cities. The deployed decision and control algorithms made the road-scaled vehicles capable of undertaking cooperative autonomous maneuvers. Because the focus of ICSL's research is in decision and control algorithms, it is therefore reasonable to consider replacing or upgrading the sensors used with more recent road sensory concepts as produced by other research groups. While substantial progress has been made, there are still some issues that need to be addressed such as: decision and control algorithms for navigating roundabouts, real-time integration of all data, and decision-making algorithms to enable intelligent vehicles to choose the driving maneuver as they go. With continued research, it is feasible that cooperative autonomous vehicles will coexist alongside human drivers in the not-too-distant future.  相似文献   

7.
Reducing energy consumption is becoming an increasingly high government priority. Teenagers are an important category of future energy consumers, but little is known of their conceptions about energy and, particularly, how formal learning about energy translates into understanding of personal energy consumption. We have worked with teenagers to investigate the design of learning technologies that support understanding about energy consumption in a way that is relevant to teenagers' personal contexts, including their motivations, concerns and conceptions, their personal energy consumption, and the sources of information about energy already available to them. In this paper we report on our findings and participatory design methodology. The findings contribute to our understanding of the support learning technologies must provide to scaffold teenagers' learning about personal energy consumption, in terms of how teenagers conceptualise energy consumption, what skills they have in searching for information, and what they consider motivating and relevant. Our methodology, more generally, contributes to our understanding of the initial phases of developing learning technologies that are grounded in an understanding of learners' personal contexts.  相似文献   

8.
Traditional human–computer interaction (HCI) allowed researchers and practitioners to share and rely on the ‘five E’s’ of usability, the principle that interactive systems should be designed to be effective, efficient, engaging, error tolerant, and easy to learn. A recent trend in HCI, however, is that academic researchers as well as practitioners are becoming increasingly interested in user experiences, i.e., understanding and designing for relationships between users and artifacts that are for instance affective, engaging, fun, playable, sociable, creative, involving, meaningful, exciting, ambiguous, and curious. In this paper, it is argued that built into this shift in perspective there is a concurrent shift in accountability that is drawing attention to a number of ethical, moral, social, cultural, and political issues that have been traditionally de-emphasized in a field of research guided by usability concerns. Not surprisingly, this shift in accountability has also received scarce attention in HCI. To be able to find any answers to the question of what makes a good user experience, the field of HCI needs to develop a philosophy of technology. One building block for such a philosophy of technology in HCI is presented. Albert Borgmann argues that we need to be cautious and rethink the relationship as well as the often-assumed correspondence between what we consider useful and what we think of as good in technology. This junction—that some technologies may be both useful and good, while some technologies that are useful for some purposes might also be harmful, less good, in a broader context—is at the heart of Borgmann’s understanding of technology. Borgmann’s notion of the device paradigm is a valuable contribution to HCI as it points out that we are increasingly experiencing the world with, through, and by information technologies and that most of these technologies tend to be designed to provide commodities that effortlessly grant our wishes without demanding anything in return, such as patience, skills, or effort. This paper argues that Borgmann’s work is relevant and makes a valuable contribution to HCI in at least two ways: first, as a different way of seeing that raises important social, cultural, ethical, and moral issues from which contemporary HCI cannot escape; and second, as providing guidance as to how specific values might be incorporated into the design of interactive systems that foster engagement with reality.  相似文献   

9.
Traditional human–computer interaction (HCI) allowed researchers and practitioners to share and rely on the ‘five E’s’ of usability, the principle that interactive systems should be designed to be effective, efficient, engaging, error tolerant, and easy to learn. A recent trend in HCI, however, is that academic researchers as well as practitioners are becoming increasingly interested in user experiences, i.e., understanding and designing for relationships between users and artifacts that are for instance affective, engaging, fun, playable, sociable, creative, involving, meaningful, exciting, ambiguous, and curious. In this paper, it is argued that built into this shift in perspective there is a concurrent shift in accountability that is drawing attention to a number of ethical, moral, social, cultural, and political issues that have been traditionally de-emphasized in a field of research guided by usability concerns. Not surprisingly, this shift in accountability has also received scarce attention in HCI. To be able to find any answers to the question of what makes a good user experience, the field of HCI needs to develop a philosophy of technology. One building block for such a philosophy of technology in HCI is presented. Albert Borgmann argues that we need to be cautious and rethink the relationship as well as the often-assumed correspondence between what we consider useful and what we think of as good in technology. This junction—that some technologies may be both useful and good, while some technologies that are useful for some purposes might also be harmful, less good, in a broader context—is at the heart of Borgmann’s understanding of technology. Borgmann’s notion of the device paradigm is a valuable contribution to HCI as it points out that we are increasingly experiencing the world with, through, and by information technologies and that most of these technologies tend to be designed to provide commodities that effortlessly grant our wishes without demanding anything in return, such as patience, skills, or effort. This paper argues that Borgmann’s work is relevant and makes a valuable contribution to HCI in at least two ways: first, as a different way of seeing that raises important social, cultural, ethical, and moral issues from which contemporary HCI cannot escape; and second, as providing guidance as to how specific values might be incorporated into the design of interactive systems that foster engagement with reality.  相似文献   

10.
Academic libraries frequently consider students’ high usage of certain technologies when deciding what services to offer electronically, but less research has been done on whether faculty also use any of these technologies. This study surveyed faculty at two very different institutions, a liberal arts college and a Research I university, about the technologies they use or might consider using, with a particular focus on information and/or communication-related technologies. The results show that faculty do use many of the technologies that previous studies have associated with students.  相似文献   

11.
In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brainwave pattern of every individual is unique and that the electroencephalogram (EEG) can be used for biometric identification. EEG-based biometry is an emerging research topic and we believe that it may open new research directions and applications in the future. However, very little work has been done in this area and was focusing mainly on person identification but not on person authentication. Person authentication aims to accept or to reject a person claiming an identity, i.e., comparing a biometric data to one template, while the goal of person identification is to match the biometric data against all the records in a database. We propose the use of a statistical framework based on Gaussian mixture models and maximum a posteriori model adaptation, successfully applied to speaker and face authentication, which can deal with only one training session. We perform intensive experimental simulations using several strict train/test protocols to show the potential of our method. We also show that there are some mental tasks that are more appropriate for person authentication than others  相似文献   

12.
In this article, I call for more complicated understandings of the relationship between women and technology, arguing that two interpretive frameworks interfere with our current representations of women and technology: a reliance on what Paul V. Anderson (1998) has called “person-based research” (p. 63) and an either/or framework for thinking about technology. Recent scholarship is firmly grounded in an awareness that technologies are always ideological, that technologies can be used to both oppressive and empowering ends, and that disempowered groups are more likely to be oppressed than empowered by technologies. Although composition has developed a complicated understanding of the ideologies of technology, we have not focused our attention in a systematic way on the perhaps unique relationship of women and technology. I draw on feminist technology theorists’ constructions of technology as always ideological but never predetermined in its meanings for users as a way of beginning this project.  相似文献   

13.
The Internet has become a field of dragon teeth for a person’s identity. It has made it possible for your identity to be mistaken by a credit agency, spied on by the government, foolishly exposed by yourself, pilloried by an enemy, pounded by a bully, or stolen by a criminal. These harms to one’s integrity could be inflicted in the past, but information technology has multiplied and aggravated such injuries. They have not gone unnoticed and are widely bemoaned and discussed. The government and private watchdogs are working to protect the identity of citizens though at least in the United States both the government and individuals all too often side with prosperity when it conflicts with privacy. Still, these information-technological threats to identity have been recognized and can be reasonably met through legislation, regulation, and discretion. There is another kind of danger to our identity that is more difficult to define and to meet, for it has no familiar predecessors, has no criminal aspects, and exhibits no sharp moral or cultural contours. Still that threat to our identity haunts us constantly and surfaces occasionally in conversations and the media. It makes us feel displaced, distracted, and fragmented at the very times when to all appearances we seem to be connected, busy, and energetic. At the same time, the culture of technology, and of information technology particularly, has opened up fields of diversity and contingency that invite us to comprehend our identities in newly responsible, intricate, and open-minded ways.  相似文献   

14.
Recently, the importance of face recognition has been increasingly emphasized since popular CCD cameras are distributed to various applications. However, facial images are dramatically changed by lighting variations, so that facial appearance changes caused serious performance degradation in face recognition. Many researchers have tried to overcome these illumination problems using diverse approaches, which have required a multiple registered images per person or the prior knowledge of lighting conditions. In this paper, we propose a new method for face recognition under arbitrary lighting conditions, given only a single registered image and training data under unknown illuminations. Our proposed method is based on the illuminated exemplars which are synthesized from photometric stereo images of training data. The linear combination of illuminated exemplars can represent the new face and the weighted coefficients of those illuminated exemplars are used as identity signature. We make experiments for verifying our approach and compare it with two traditional approaches. As a result, higher recognition rates are reported in these experiments using the illumination subset of Max-Planck Institute face database and Korean face database.  相似文献   

15.
《IT Professional》2009,11(1):27-35
In a complex, interconnected world, being able to confirm the identity of a person or object is critical. Applications from border control to banking rely on the notion that a system can weed out deception while permitting legitimate access. This trade-off is at the heart of identity discovery. As more scanning technologies become available, data potentially useful to identity discovery is growing exponentially. Different features and processing algorithms can have complementary strengths and weaknesses, so combining them increases identity discovery accuracy. We believe fusion-the use of multiple technologies, algorithms, or modalities in identifying or authenticating people and items-is the better approach because it can improve a system's accuracy, efficiency, and robustness. A simple linear combination fusion method can work almost as well as more analytically sophisticated fusion methods. A framework for generalizing fusion-based identity discovery helps designers think about an identity discovery system in system engineering terms.  相似文献   

16.
The purpose of this article is to offer some reflections on the relationships between digital technologies and learning. It is argued that activities of learning, as they have been practised within institutionalized schooling, are coming under increasing pressure from the developments of digital technologies and the capacities to store, access and manipulate information that such resources offer. Thus, the technologies do not merely support learning; they transform how we learn and how we come to interpret learning. The metaphors of learning currently emerging as relevant in the new media ecology emphasize the transformational and performative nature of such activities, and of knowing in general. These developments make the hybrid nature of human knowing and learning obvious; what we know and master is, to an increasing extent, a function of the mediating tools we are familiar with. At a theoretical and practical level, this implies that the interdependences between human agency, minds, bodies and technologies have to serve as foundations when attempting to understand and improve learning. Attempts to account for what people know without integrating their mastery of increasingly sophisticated technologies into the picture will lack ecological validity.  相似文献   

17.
If we were to have a Grid infrastructure for visualization, what technologies would be needed to build such an infrastructure, what kind of applications would benefit from it, and what challenges are we facing in order to accomplish this goal? In this survey paper, we make use of the term ‘visual supercomputing’ to encapsulate a subject domain concerning the infrastructural technology for visualization. We consider a broad range of scientific and technological advances in computer graphics and visualization, which are relevant to visual supercomputing. We identify the state‐of‐the‐art technologies that have prepared us for building such an infrastructure. We examine a collection of applications that would benefit enormously from such an infrastructure, and discuss their technical requirements. We propose a set of challenges that may guide our strategic efforts in the coming years.  相似文献   

18.
Steadily increasing urbanization is causing significant economic and social transformations in urban areas, posing several challenges related to city management and services. In particular, in cities with higher crime rates, effectively providing for public safety is an increasingly complex undertaking. To handle this complexity, new technologies are enabling police departments to access growing volumes of crime-related data that can be analyzed to understand patterns and trends. These technologies have potentially to increase the efficient deployment of police resources within a given territory and ultimately support more effective crime prevention. This paper presents a predictive approach based on spatial analysis and auto-regressive models to automatically detect high-risk crime regions in urban areas and to reliably forecast crime trends in each region. The algorithm result is a spatio-temporal crime forecasting model, composed of a set of crime-dense regions with associated crime predictors, each one representing a predictive model for estimating the number of crimes likely to occur in its associated region. The experimental evaluation was performed on two real-world datasets collected in the cities of Chicago and New York City. This evaluation shows that the proposed approach achieves good accuracy in spatial and temporal crime forecasting over rolling time horizons.  相似文献   

19.
Programmers have always been curious about what their programs are doing while it is executing, especially when the behavior is not what they are expecting. Since program execution is intricate and involved, visualization has long been used to provide the programmer with appropriate insights into program execution. This paper looks at the evolution of on-line visual representations of executing programs, showing how they have moved from concrete representations of relatively small programs to abstract representations of larger systems. Based on this examination, we describe the challenges implicit in future execution visualizations and methodologies that can meet these challenges.  相似文献   

20.
Len Hynds, is head of the UK-based National Hi-tech Crime Unit in the UK. The Unit has been around since 2001 and is endeavouring to bridge the gap in information sharing between law enforcement and the security commmunity to eradicate hi-tech crime. The expression “Hi-Tech Crime” is a classic oxymoron. We are talking about cutting edge technology when we talk of matters “hi-tech” — conjuring positive, forward thinking, images. And then we link this term with “crime.” Little wonder then that my colleagues in mainstream policing assign it specialist status. And hardly surprising I suppose that IT security is rarely seen as a board level portfolio for the business community. We must recognize hi-tech crime for what it really is — if we are to combat it. It is every type of crime but with a component placing it in the digital environment. It is able to operate instantaneously, remotely, and with disregard for sovereignty and geography. It also becomes easier for criminals to target multiple-victims, hide assets, and cover the evidential trail.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号