WorldWideScience

Sample records for security human interactions

  1. Simulating human behavior for national security human interactions.

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  2. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  3. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  4. Securing Humanity - Situating 'Human Security' as Concept and Discourse

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2005-01-01

    markdownabstractAbstract The label ‘human security’ (HS) has attracted much attention since the 1994 Human Development Report, but there are numerous conflicting definitions and agendas and widespread scepticism. The Ogata-Sen Commission report Human Security Now has proposed a unified yet

  5. Human security from paradigm shift to operationalisation: job description for a human security worker

    NARCIS (Netherlands)

    Glasius, M.

    2008-01-01

    This article shows how human security has functioned as both a paradigm-shifting and a bridging concept, with its most significant implications being, first, the shift from a focus on state security to one on human rights, and, second, the indivisibility of physical and material security. The

  6. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  7. Human Rights, Human Needs, Human Development, Human Security

    OpenAIRE

    Gasper, Des

    2009-01-01

    Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each has emerged within the United Nations world; each relies implicitly on a conceptualisation of human need; each has specific strengths. Yet mutual communication, understanding and co-operation are deficient, espec...

  8. Security and trust: taking care of the human factor

    NARCIS (Netherlands)

    Egger, F.N.; Abrazhevich, D.

    2001-01-01

    In the e-business chain, the last link that needs to be convinced of the security of an online transaction is the end-user. That is why this article puts forward a user-centred perspective of the problem of trust in online payments, derived from the discipline of Human-Computer Interaction (HCI). We

  9. Human Security Concept in the UN Practice

    Directory of Open Access Journals (Sweden)

    Svetlana Alexandrovna Bokeriya

    2017-12-01

    Full Text Available This article is devoted to the theme, scientific actuality and practical relevance of which is not in doubt, and is caused by a new wave of interest in human security. The human security concept has been the subject of active discussions on national and international security forums for the past 10 years. This article is focused on the human security concept evolution in the framework of the UN in conditions of the growing challenges and threats as well as polycentric world and international relations transformation. The author turned to the analysis of human security issues in the UN human rights dimension, as this organization performs a key role in the application and implementation of the concept on a global scale. The detailed periodization of human security development within the UN is presented for the first time. The analysis of the situation with Syrian refugees in Lebanon is carried out in the format of a case study. Author has made an attempt to undertake not a comprehensive analysis of the concept within the UN, but re-evaluation of new trends and dominant problems in practical application of human security idea and its impact on the effectiveness of international organizations.

  10. Experiencing Security in Interaction Design

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne

    2011-01-01

    Security is experienced differently in different contexts. This paper argues that in everyday situations, users base their security decisions on a mix of prior experiences. When approaching security and interaction design from an experience approach, tools that help bring out such relevant...... experiences for design are needed. This paper reports on how Prompted exploration workshops and Acting out security were developed to target such experiences when iteratively designing a mobile digital signature solution in a participatory design process. We discuss how these tools helped the design process...... and illustrate how the tangibility of such tools matters. We further demonstrate how the approach grants access to non-trivial insights into people's security experience. We point out how the specific context is essential for exploring the space between experience and expectations, and we illustrate how people...

  11. Occupational stress in human computer interaction.

    Science.gov (United States)

    Smith, M J; Conway, F T; Karsh, B T

    1999-04-01

    There have been a variety of research approaches that have examined the stress issues related to human computer interaction including laboratory studies, cross-sectional surveys, longitudinal case studies and intervention studies. A critical review of these studies indicates that there are important physiological, biochemical, somatic and psychological indicators of stress that are related to work activities where human computer interaction occurs. Many of the stressors of human computer interaction at work are similar to those stressors that have historically been observed in other automated jobs. These include high workload, high work pressure, diminished job control, inadequate employee training to use new technology, monotonous tasks, por supervisory relations, and fear for job security. New stressors have emerged that can be tied primarily to human computer interaction. These include technology breakdowns, technology slowdowns, and electronic performance monitoring. The effects of the stress of human computer interaction in the workplace are increased physiological arousal; somatic complaints, especially of the musculoskeletal system; mood disturbances, particularly anxiety, fear and anger; and diminished quality of working life, such as reduced job satisfaction. Interventions to reduce the stress of computer technology have included improved technology implementation approaches and increased employee participation in implementation. Recommendations for ways to reduce the stress of human computer interaction at work are presented. These include proper ergonomic conditions, increased organizational support, improved job content, proper workload to decrease work pressure, and enhanced opportunities for social support. A model approach to the design of human computer interaction at work that focuses on the system "balance" is proposed.

  12. The Theoretical Aspects of the Security of Human Development

    Directory of Open Access Journals (Sweden)

    Markova Natalia S.

    2017-10-01

    Full Text Available The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethinking it as a new theory of global security. A cross-categorical analysis of the concepts of «human development» and of «human security» was carried out by the main criteria: characteristics, time frames, main purpose and objectives. As a result, the human security is complementary to the concept of human development in the part of safe variants of choice (freedom from needs; it further facilitated the security provision at the level of prosperity and progress, not at the level of survival. It has been determined that the conception of human security is at the same time an element of the conception of human development as well as of human security.

  13. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  14. Multimodal interaction for human-robot teams

    Science.gov (United States)

    Burke, Dustin; Schurr, Nathan; Ayers, Jeanine; Rousseau, Jeff; Fertitta, John; Carlin, Alan; Dumond, Danielle

    2013-05-01

    Unmanned ground vehicles have the potential for supporting small dismounted teams in mapping facilities, maintaining security in cleared buildings, and extending the team's reconnaissance and persistent surveillance capability. In order for such autonomous systems to integrate with the team, we must move beyond current interaction methods using heads-down teleoperation which require intensive human attention and affect the human operator's ability to maintain local situational awareness and ensure their own safety. This paper focuses on the design, development and demonstration of a multimodal interaction system that incorporates naturalistic human gestures, voice commands, and a tablet interface. By providing multiple, partially redundant interaction modes, our system degrades gracefully in complex environments and enables the human operator to robustly select the most suitable interaction method given the situational demands. For instance, the human can silently use arm and hand gestures for commanding a team of robots when it is important to maintain stealth. The tablet interface provides an overhead situational map allowing waypoint-based navigation for multiple ground robots in beyond-line-of-sight conditions. Using lightweight, wearable motion sensing hardware either worn comfortably beneath the operator's clothing or integrated within their uniform, our non-vision-based approach enables an accurate, continuous gesture recognition capability without line-of-sight constraints. To reduce the training necessary to operate the system, we designed the interactions around familiar arm and hand gestures.

  15. Human Security: China’s Discourses and Experience

    Directory of Open Access Journals (Sweden)

    Xiao Ren

    2016-02-01

    Full Text Available This article addresses three research questions by elaborating on how the idea of human security is understood or defined by the government and social actors in China; how the distinction between the “protection” aspect and “empowerment” aspect of human security is understood and accepted; and what particular downside risks are perceived as pressing human security issues in China. Amongst these the major ones include air pollution, food security, and cyber security. The study reveals that, whilst as a term “human security” is not frequently used, there have been significant discussions leading to the consideration and implementation of various human security practices in China. The idea of human security has been firmly established and threats to human security detected. For both the government and academic community in China, human security and state security are not necessarily confrontational but can rather be combined, often complimenting each other. Recent developments in China are pointing to a positive direction in terms of human security in the country.

  16. Need for a gender-sensitive human security framework: results of a quantitative study of human security and sexual violence in Djohong District, Cameroon.

    Science.gov (United States)

    Parmar, Parveen Kaur; Agrawal, Pooja; Goyal, Ravi; Scott, Jennifer; Greenough, P Gregg

    2014-01-01

    Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women.

  17. HUMAN SECURITY – BUILDING THE POST-2015 DEVELOPMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2015-04-01

    Full Text Available This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declaration and the Millennium Development Goals. The last part evaluates the improvements that the inclusion of the human security on the post-2015 development framework may bring. The results of this analysis present illustrate the opportunity of deepening the MDGs agenda with a more realistic and ethical approach, through the inclusion of the human security paradigm within the development agenda.

  18. Redefining Human Security for Vulnerable Migrants in East Asia

    Directory of Open Access Journals (Sweden)

    Jiyoung Song

    2015-01-01

    Full Text Available This article proposes human security as an analytical framework to understand the current trends of irregular migration (both forced and unauthorised in East Asia and revisits the seven pillars of human security defined in the 1994 Human Development Report by the United Nations Development Programme (UNDP. It explains how the concepts of human security are parallel to those prescribed in international human rights conventions but different in terms of the attitude towards states. Human security does not directly challenge state authority and adds a sense of urgency and moral authority that requires extra-legal measures by the states. The author argues that human security is the securitisation of human rights and is a better framework and policy discourse than human rights to engage with state and non-state actors, especially in East Asia where political leaders are more receptive to the former idea. The study draws examples from stateless Rohingyas, undocumented sex workers in Thailand and Singapore, trafficked brides from Vietnam and Cambodia, and smuggled North Korean refugees in China to demonstrate the nexus between human security and irregular migration.

  19. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  20. Human Rights, Human Needs, Human Development, Human Security - Relationships between four international human discourses.

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    markdownabstractAbstract: Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and

  1. Human Rights, Human Needs, Human Development, Human Security : Relationships between four international 'human' discourses

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    textabstractHuman rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each

  2. Toward a Theory of Human Security

    OpenAIRE

    Tanaka, Akihiko

    2015-01-01

    Human security” has occupied a significant place in the global discourses of peace, development, and diplomacy, despite often made criticisms of its conceptual ambiguity. Arguing for the merit of a broader definition of human security, i.e. “the right of people to live in freedom and dignity, free from poverty and despair” (UN Resolution A/RES/66/290), this paper offers an interdisciplinary theoretical framework in which key aspects of human security are systematically laid out: types of thr...

  3. The Theoretical Aspects of the Security of Human Development

    OpenAIRE

    Markova Natalia S.; Demyanenko Alina A.

    2017-01-01

    The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethink...

  4. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  5. The production of human security in premodern and contemporary history

    OpenAIRE

    Zwierlein, Cornel; Graf, Rüdiger

    2010-01-01

    "Since the end of the Cold War, Human Security has become an important approach in international politics, law, and political science. In contrast to the so-called 'Westphalian System' that knows only states as subjects and objects of security, human security aims at the security of individual human beings if failed or failing states do not protect them nor provide for their basic needs. Thereby, such heterogeneous forms of security as security from war, food security, energy security or secu...

  6. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    Science.gov (United States)

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  7. From Human-Computer Interaction to Human-Robot Social Interaction

    OpenAIRE

    Toumi, Tarek; Zidani, Abdelmadjid

    2014-01-01

    Human-Robot Social Interaction became one of active research fields in which researchers from different areas propose solutions and directives leading robots to improve their interactions with humans. In this paper we propose to introduce works in both human robot interaction and human computer interaction and to make a bridge between them, i.e. to integrate emotions and capabilities concepts of the robot in human computer model to become adequate for human robot interaction and discuss chall...

  8. The golden triangle of human dignity: human security, human development and human rights

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2004-01-01

    The success or failure of processes of democratization cannot be detached from processes of development related to the aspirations of people at the grassroots. Human rights, in a more theoretical terminology, require human development in order to enhance human security.

  9. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  10. (Human Security in Central America: A Return to the Past?

    Directory of Open Access Journals (Sweden)

    Jordi Urgell García

    2007-02-01

    Full Text Available After having become one of the principal scenarios of the Cold War, the pacification and democratisation of Central America in the 1990s were forged under the protection of the Esquipulas Process and the birth of the concept of human security. The resulting model of security was founded on the Framework Treaty on Democratic Security, which incorporated some of the basic postulates of human security and became one of its first institutional implementations. Nevertheless, the performance of this model has been eclipsed and questioned by the evolution of events in Central America (such as the impact of 9-11 on security agendas or the emergence of new forms of violence in the region, which open the door to a new security instrument (the Rapid Reaction Force, generate fears about an eventual regression of Central America in the area of security and raise doubts about the habitual assumptions of human security.

  11. Doing Justice to Human Security: A Textbook in Tune with its Time

    Directory of Open Access Journals (Sweden)

    Deane Edward Neubauer

    2013-01-01

    Full Text Available I begin this brief review of this important volume with the confession that I have not personally pursued a teaching style that has employed a self-acclaimed textbook for many, many years, preferring to construct courses around monographs, articles and other visual materials. However, were I provided the opportunity to teach a course at the upper division undergraduate level or early gradate level in the subject of human security, this would certainly be the book I would choose (with the caveat introduced below. Alex and Sabina Lautensach have given careful and thoughtful consideration to every aspect of the text: the preface and introduction, written by the editors, lay out both the logic of the text and frame the subject matter that will locate the reader firmly in the midst of the vast challenges that consti­tute the issue of human security. They do so by em­phasizing both the multiple dimensions along which the issue of human security can be located and the inseparable nature of these as they interact with each other in complex ways. In many respects this strikes me as one of the most important contributions to the text—its steady insistence that human security as a construct is in a discursive state of constant emer­gence, such that in some important ways all its varied dimensions insistently co-vary. To make such a claim is in itself daunting—to demonstrate its validity and mutual engagements through the complex subject matters of its 20 chapters, is a tour de force. Their conclusion is sufficiently rich to stand alone as an illustrative text in other course materials.

  12. Child rights, right to water and sanitation, and human security.

    Science.gov (United States)

    Pink, Ross

    2012-06-15

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.

  13. Energy security and climate policy. Assessing interactions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-28

    World energy demand is surging. Oil, coal and natural gas still meet most global energy needs, creating serious implications for the environment. One result is that CO2 emissions, the principal cause of global warming, are rising. This new study underlines the close link between efforts to ensure energy security and those to mitigate climate change. Decisions on one side affect the other. To optimise the efficiency of their energy policy, OECD countries must consider energy security and climate change mitigation priorities jointly. The book presents a framework to assess interactions between energy security and climate change policies, combining qualitative and quantitative analyses. The quantitative analysis is based on the development of energy security indicators, tracking the evolution of policy concerns linked to energy resource concentration. The 'indicators' are applied to a reference scenario and CO2 policy cases for five case-study countries: The Czech Republic, France, Italy, the Netherlands, and the United Kingdom. Simultaneously resolving energy security and environmental concerns is a key challenge for policy makers today. This study helps chart the course.

  14. Gender, Conflict and Human Security in Nigeria: Challenges and ...

    African Journals Online (AJOL)

    ... buttress the inadequacies of human security in Nigeria; strategies were proffered to tackle these challenges. The paper concluded that once the strategies are critically looked into and steps are taken to implement them, certain prospects will accrue to gender human security network in Nigeria. Gender and Behaviour Vol.

  15. 1 THE HUMANITIES AND NATIONAL IDENTITY, SECURITY AND ...

    African Journals Online (AJOL)

    User

    ethnicity in favour of social stability as a pre-requisite for security. ... Humanities, National Identity, Ethnicity, Security and Political. Stability. .... instability. They are often used in open violence during elections where contending political ...

  16. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  17. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    Science.gov (United States)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  18. Human and Citizen Rights Guarantees While Providing Information Security

    Directory of Open Access Journals (Sweden)

    Serhii Yesimov

    2018-05-01

    Full Text Available With the development of information and communication technologies, issues of providing information security are becoming more and more aggravated. These are crimes related to the use of electronic computers, systems and computer networks and telecommunication networks, the propaganda of separatism and extremism, etc. While providing information security in the digital environment, the role of technical and legal human rights guarantees, due to technical means of protection, is increasing. Relying on the developers of technical means of protection determines the difference between the aforesaid concepts and the traditional approach to ensuring the protection of human and citizen rights, in which responsibilities are put on information intermediaries, owners of confidential information. Technical guarantees of human rights are a necessary component of ensuring information security, but the effectiveness of the application is provided in conjunction with the legal guarantees of human rights, as evidenced by the tendency to recognize the principles of inviolability of privacy on the basis of design decisions in the law of the European Union as legal acts. Providing information security is a legitimate goal of establishing constraints of human rights, since it can be correlated with the norms of international law. The establishment of constraints of human rights is permissible in order to attain other objectives–ensuring state security, public order, health, rights and freedoms of the person in the information sphere. The legitimacy of this goal is determined by its compliance with the objectives envisaged by international agreements ratified in an established order. The article examines the impact of the use of technical means in the field of providing information security in the aspect of following the fundamental human and civil rights in Ukraine, taking into account the legislation of the European Union and the decision of the European Court

  19. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  20. Supporting secure programming in web applications through interactive static analysis.

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  1. Automated Security Testing of Web Widget Interactions

    NARCIS (Netherlands)

    Bezemer, C.P.; Mesbah, A.; Van Deursen, A.

    2009-01-01

    This paper is a pre-print of: Cor-Paul Bezemer, Ali Mesbah, and Arie van Deursen. Automated Security Testing of Web Widget Interactions. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering

  2. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  3. Human-machine interactions

    Science.gov (United States)

    Forsythe, J Chris [Sandia Park, NM; Xavier, Patrick G [Albuquerque, NM; Abbott, Robert G [Albuquerque, NM; Brannon, Nathan G [Albuquerque, NM; Bernard, Michael L [Tijeras, NM; Speed, Ann E [Albuquerque, NM

    2009-04-28

    Digital technology utilizing a cognitive model based on human naturalistic decision-making processes, including pattern recognition and episodic memory, can reduce the dependency of human-machine interactions on the abilities of a human user and can enable a machine to more closely emulate human-like responses. Such a cognitive model can enable digital technology to use cognitive capacities fundamental to human-like communication and cooperation to interact with humans.

  4. Integrated Approach to Peace & Human Security in the 21st Century

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2016-10-01

    Full Text Available Humanity has made remarkable progress during the past two centuries in advancing peace, democracy, human rights, economic development and social equality. The evolution of human relations has progressed far from the time when physical violence, war and conquest were the predominant form of international relations. Diplomacy has evolved from political negotiations at the conference table to mutually beneficial economic exchange and creative cultural integration. But the ideal of peace and human security for all human beings remains elusive, distant and utopian. Violence and insecurity persist and social harmony is threatened by the competition for political supremacy, markets, jobs and scarce resources. Thousands of nuclear weapons remain armed and on alert. Existential ecological threats increase daily. The roots of war and violence remain intact, even if their most horrendous expressions have receded from view. The permanent abolition of war and achievement of human security for all cannot be attained by narrowly conceived political alliances or collective security agreements. The negative concept of peace as the absence of war needs to be replaced by a positive conception of peace as the essential condition for the fullest development of human potential. The narrow concept of security in military and political terms needs to be replaced by an inclusive conception that views security as an emergent property of effective and harmonious social organization founded on the ultimate value of the human being. Peace and security are fundamental attributes of society as a whole. They can only be achieved by a comprehensive, integrated approach that addresses the roots of violence and disharmony in all forms—political, military, economic, social, cultural and ecological. This will require radical democratization of international institutions, establishment of an effective global legal process, abandonment of outmoded conceptions of national

  5. Supporting secure programming in web applications through interactive static analysis

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  6. Supporting secure programming in web applications through interactive static analysis

    Directory of Open Access Journals (Sweden)

    Jun Zhu

    2014-07-01

    Full Text Available Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  7. Security Implications of Human-Trafficking Networks

    Science.gov (United States)

    2007-06-15

    to those security concerns. Background How is Human Trafficking Carried Out? While trafficking victims are often found in sweatshops , domestic...labor. This type of trafficking is often found in agricultural labor, the production of goods (typically called sweatshops ) and construction labor

  8. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  9. Movement coordination in applied human-human and human-robot interaction

    DEFF Research Database (Denmark)

    Schubö, Anna; Vesper, Cordula; Wiesbeck, Mathey

    2007-01-01

    and describing human-human interaction in terms of goal-oriented movement coordination is considered an important and necessary step for designing and describing human-robot interaction. In the present scenario, trajectories of hand and finger movements were recorded while two human participants performed......The present paper describes a scenario for examining mechanisms of movement coordination in humans and robots. It is assumed that coordination can best be achieved when behavioral rules that shape movement execution in humans are also considered for human-robot interaction. Investigating...... coordination were affected. Implications for human-robot interaction are discussed....

  10. Analytic Provenance Datasets: A Data Repository of Human Analysis Activity and Interaction Logs

    OpenAIRE

    Mohseni, Sina; Pachuilo, Andrew; Nirjhar, Ehsanul Haque; Linder, Rhema; Pena, Alyssa; Ragan, Eric D.

    2018-01-01

    We present an analytic provenance data repository that can be used to study human analysis activity, thought processes, and software interaction with visual analysis tools during exploratory data analysis. We conducted a series of user studies involving exploratory data analysis scenario with textual and cyber security data. Interactions logs, think-alouds, videos and all coded data in this study are available online for research purposes. Analysis sessions are segmented in multiple sub-task ...

  11. Human-Interaction Challenges in UAV-Based Autonomous Surveillance

    Science.gov (United States)

    Freed, Michael; Harris, Robert; Shafto, Michael G.

    2004-01-01

    Autonomous UAVs provide a platform for intelligent surveillance in application domains ranging from security and military operations to scientific information gathering and land management. Surveillance tasks are often long duration, requiring that any approach be adaptive to changes in the environment or user needs. We describe a decision- theoretic model of surveillance, appropriate for use on our autonomous helicopter, that provides a basis for optimizing the value of information returned by the UAV. From this approach arise a range of challenges in making this framework practical for use by human operators lacking specialized knowledge of autonomy and mathematics. This paper describes our platform and approach, then describes human-interaction challenges arising from this approach that we have identified and begun to address.

  12. Security of attachment and quality of mother-toddler social interaction in a high-risk sample.

    Science.gov (United States)

    Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S

    2012-02-01

    The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.

  13. Usable security history, themes, and challenges

    CERN Document Server

    Garfinkel, Simson

    2014-01-01

    There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat

  14. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  15. Gender security between human development and human security. Recent issues in the political international agenda

    Directory of Open Access Journals (Sweden)

    Paola Degani

    2014-06-01

    Full Text Available Issues regarding security, for a long time have been proposed, both in the scientific literature, that in the writings of popular character, without taking into due consideration the specificity of the effects that certain threats can cause the different subjectivity or on specific groups rather than on other . In particular, very rarely takes into account the fact that, in relation to the condition of women, we can talk, referring to certain areas or aspects of the problem, think of the problem of violence, of a real security crisis. The safety cultures sedimentation processes of socialization through everyday practices, can be considered an integral part of the internal structures of states. The issues relating to the in / security for women are on the agenda institutional, only a few years, do not fall within the traditional framework of interventions aimed at regulating sector profiles of women, in line with a vision of the subject recipient of this policy individual as "neutral." These are issues that today are also of inter-governmental organizations, in particular the United Nations, a central political role with respect to the adoption of policies related to the affirmation, respect and the effectiveness of human rights and at the same time enrich and innovate in order substantial guidelines and decision-making processes in the field of security.

  16. Human Security and Mutual Vulnerability: The Global Political ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Human Security and Mutual Vulnerability: The Global Political Economy of Development and ... that will help us understand this turbulent and chaotic period in human history. ... The Rapid Research Fund (RRF) for Ebola Virus Disease Outbreaks will fund ... Copyright · Open access policy · Privacy policy · Research ethics ...

  17. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  18. When Should We Care About Sustainability? Applying Human Security as the Decisive Criterion

    Directory of Open Access Journals (Sweden)

    Alexander K. Lautensach

    2012-05-01

    Full Text Available It seems intuitively clear that not all human endeavours warrant equal concern over the extent of their sustainability. This raises the question about what criteria might best serve for their prioritisation. We refute, on empirical and theoretical grounds, the counterclaim that sustainability should be of no concern regardless of the circumstances. Human security can serve as a source of criteria that are both widely shared and can be assessed in a reasonably objective manner. Using established classifications, we explore how four forms of sustainability (environmental, economic, social, and cultural relate to the four pillars of human security (environmental, economic, sociopolitical, and health-related. Our findings, based on probable correlations, suggest that the criteria of human security allow for a reliable discrimination between relatively trivial incidences of unsustainable behavior and those that warrant widely shared serious concern. They also confirm that certain sources of human insecurity, such as poverty or violent conflict, tend to perpetuate unsustainable behavior, a useful consideration for the design of development initiatives. Considering that human security enjoys wide and increasing political support among the international community, it is to be hoped that by publicizing the close correlation between human security and sustainability greater attention will be paid to the latter and to its careful definition.

  19. Human-Robot Interaction and Human Self-Realization

    DEFF Research Database (Denmark)

    Nørskov, Marco

    2014-01-01

    is to test the basis for this type of discrimination when it comes to human-robot interaction. Furthermore, the paper will take Heidegger's warning concerning technology as a vantage point and explore the possibility of human-robot interaction forming a praxis that might help humans to be with robots beyond...

  20. Formal Analysis of Graphical Security Models

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi

    , software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...... formal verification of their properties. Finally, their appealing graphical notations enable to communicate security concerns in an understandable way also to non-experts, often in charge of the decision making. This dissertation argues that automated techniques can be developed on graphical security...

  1. Understanding human factors in cyber security as a dynamic system

    NARCIS (Netherlands)

    Young, H.J.; Vliet, A.J. van; Ven, J.G.S. van de; Jol, S.C.; Broekman, C.C.M.T.

    2018-01-01

    The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing

  2. Impact of Human Security Threats on Leadership and Political ...

    African Journals Online (AJOL)

    Human security threats in contemporary Africa have become a major political challenge. Whether it involves sectional conflicts, kidnapping, human trafficking, armed robbery they have continued to exert a far reaching impact on the leadership and political stability in the region. This paper is therefore an attempt to examine ...

  3. Human factors and security in the nuclear and radioactive facilities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Ilizastegui Perez, F.

    1998-01-01

    Considering the wide and multidisciplinary character the topics related with the human factors and the security one believes in the one in CNSN a group gives human factors that has carried out some works in several addresses such form that can be integrated the knowledge and experience in an unique objective to reduce the incidence the human factors in the security starting from a fundamentally preventive work. The present work picks up the main results the developed work

  4. Human Security and Energy Security: A Sustainable Energy System as a Public Good

    NARCIS (Netherlands)

    Karlsson-Vinkhuyzen, S.I.S.E.; Jollands, N.

    2013-01-01

    This chapter is dedicated to the concept of human security and its link to energy and energy governance, particularly global energy governance. Through this focus emerges the need to look at the links between the concept of public goods and energy. Our starting argument is that conventional notions

  5. Increasing Awareness of Insider Information Security Threats in Human Resource Department

    OpenAIRE

    Burcin Cetin Karabat; Cagatay Karabat

    2012-01-01

    An insider threat for companies is defined as a threat caused by malicious user who is an employee company. In recent years, there are number of work on insider threats in information security technologies. These works shows that companies should increasingly and seriously should take into account these threats. Human factors in companies constitute one of the weakest links in information security technology and its products used in human resource (HR) management departments. In the literatur...

  6. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  7. Task-related Interactions between Kindergarten Children and their Teachers : The Role of Emotional Security

    NARCIS (Netherlands)

    Thijs, Jochem T.; Koomen, Helma M.Y.

    2008-01-01

    This study examined the emotional security of kindergarten children in dyadic task-related interactions with their teachers. In particular, it examined the interrelations between security, task behaviours (persistence and independence), social inhibition, and teachers’ support. Participants were 79

  8. Task-related interactions between kindergarten children and their teachers: the role of emotional security.

    NARCIS (Netherlands)

    Thijs, J.T.; Koomen, H.M.Y.

    2008-01-01

    This study examined the emotional security of kindergarten children in dyadic task-related interactions with their teachers. In particular, it examined the interrelations between security, task behaviours (persistence and independence), social inhibition, and teachers' support. Participants were 79

  9. Interactive telemedicine solution based on a secure mHealth application.

    Science.gov (United States)

    Eldeib, Ayman M

    2014-01-01

    In dynamic healthcare environments, caregivers and patients are constantly moving. To increase the healthcare quality when it is necessary, caregivers need the ability to reach each other and securely access medical information and services from wherever they happened to be. This paper presents an Interactive Telemedicine Solution (ITS) to facilitate and automate the communication within a healthcare facility via Voice over Internet Protocol (VOIP), regular mobile phones, and Wi-Fi connectivity. Our system has the capability to exchange/provide securely healthcare information/services across geographic barriers through 3G/4G wireless communication network. Our system assumes the availability of an Electronic Health Record (EHR) system locally in the healthcare organization and/or on the cloud network such as a nation-wide EHR system. This paper demonstrate the potential of our system to provide effectively and securely remote healthcare solution.

  10. Peace, Human Security and Sustainable Development in Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Peace, Human Security and Sustainable Development in Africa ... into a sustainable livelihood for some of the poorest communities in Africa. ... Project status ... IDRC congratulates first cohort of Women in Climate Change Science Fellows ... titled “Climate change and adaptive water management: Innovative solutions from ...

  11. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success...

  12. Impacts of Climate Change on Food Security and Poverty Reduction ...

    African Journals Online (AJOL)

    Dynamic interactions between bio-geophysical and human environments lead to the production, processing, distribution, preparation and consumption of foods, resulting in food systems that underpin food security. Food systems encompass food availability, utilization and access, so that food security is diminished when ...

  13. The Self-Organization of Human Interaction

    DEFF Research Database (Denmark)

    Dale, Rick; Fusaroli, Riccardo; Duran, Nicholas

    2013-01-01

    We describe a “centipede’s dilemma” that faces the sciences of human interaction. Research on human interaction has been involved in extensive theoretical debate, although the vast majority of research tends to focus on a small set of human behaviors, cognitive processes, and interactive contexts...

  14. Measuring Multimodal Synchrony for Human-Computer Interaction

    NARCIS (Netherlands)

    Reidsma, Dennis; Nijholt, Antinus; Tschacher, Wolfgang; Ramseyer, Fabian; Sourin, A.

    2010-01-01

    Nonverbal synchrony is an important and natural element in human-human interaction. It can also play various roles in human-computer interaction. In particular this is the case in the interaction between humans and the virtual humans that inhabit our cyberworlds. Virtual humans need to adapt their

  15. Environmentally-induced displacement and human security

    OpenAIRE

    Terminski, Bogumil

    2012-01-01

    We can distinguish two general causes of internal displacement worldwide: 1. the impact of threats to and ensuing decline in the level of human security below that needed for normal existence in the homeland territory, 2. administrative compulsion to leave the current place of residence. Every year, at least tens of millions of people on all continents are forced to leave their places of residence. The predominant cause is the occurrence of natural disasters, creating the most dynamic categor...

  16. Editorial for Journal of Human Security Volume 10

    Directory of Open Access Journals (Sweden)

    Sabina Lautensach

    2014-01-01

    Full Text Available Nelson Rolihlahla Mandela's death on 5 December 2013 and his funeral ten days later were taken as an occasion in the global media to discuss the merits of political leadership for human security, with occasional comments on its pitfalls. This particular leader is not the most politically safe object of discussion, as, for a long time, he openly advocated civil disobedience and resistance, initially of the non-violent kind, but later becoming violent. Predictably, the local hegemon reacted with great brutality and sweeping measures to the resistance of the ANC, policies that shocked many in the western world. This reaction by the gov­ernment and its supporters and the counterreaction it incited amounted, in the long run, to little more than a vast reduction in human security for most citizens of South Africa, lasting until the ANC's victory and Mr Mandela's ascendance to the presidency in 1994.

  17. Task-Related Interactions between Kindergarten Children and Their Teachers: The Role of Emotional Security

    Science.gov (United States)

    Thijs, Jochem T.; Koomen, Helma M. Y.

    2008-01-01

    This study examined the emotional security of kindergarten children in dyadic task-related interactions with their teachers. In particular, it examined the interrelations between security, task behaviours (persistence and independence), social inhibition, and teachers' support. Participants were 79 kindergartners (mean age = 69.7 months) and their…

  18. Emotion based human-robot interaction

    Directory of Open Access Journals (Sweden)

    Berns Karsten

    2018-01-01

    Full Text Available Human-machine interaction is a major challenge in the development of complex humanoid robots. In addition to verbal communication the use of non-verbal cues such as hand, arm and body gestures or mimics can improve the understanding of the intention of the robot. On the other hand, by perceiving such mechanisms of a human in a typical interaction scenario the humanoid robot can adapt its interaction skills in a better way. In this work, the perception system of two social robots, ROMAN and ROBIN of the RRLAB of the TU Kaiserslautern, is presented in the range of human-robot interaction.

  19. Interaction debugging : an integral approach to analyze human-robot interaction

    NARCIS (Netherlands)

    Kooijmans, T.; Kanda, T.; Bartneck, C.; Ishiguro, H.; Hagita, N.

    2006-01-01

    Along with the development of interactive robots, controlled experiments and field trials are regularly conducted to stage human-robot interaction. Experience in this field has shown that analyzing human-robot interaction for evaluation purposes fosters the development of improved systems and the

  20. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    Science.gov (United States)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  1. Human Security and the Governmentality of Neo-Liberal Mobility : A Feminist Perspective

    NARCIS (Netherlands)

    T-D. Truong (Thanh-Dam)

    2006-01-01

    textabstractTransnational migration and its implications for human security as a policy field constitute one of the most complex issues of our time. Current experiences of displacement and security spans between a cyber world characterized by hyper mobility of finance, technology, information and

  2. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    Science.gov (United States)

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  3. Modeling multimodal human-computer interaction

    NARCIS (Netherlands)

    Obrenovic, Z.; Starcevic, D.

    2004-01-01

    Incorporating the well-known Unified Modeling Language into a generic modeling framework makes research on multimodal human-computer interaction accessible to a wide range off software engineers. Multimodal interaction is part of everyday human discourse: We speak, move, gesture, and shift our gaze

  4. The Role of Divine Revelation and Religious Teachings in Human Rights System: Security and Global Peace

    Directory of Open Access Journals (Sweden)

    Mahmoud Ghayyoum Zadeh

    2009-03-01

    Full Text Available Peace and security have always been considered as one of man’s concerns. The basis of peace and security should be sought in the theoretical foundations. However, the drafters of universal human rights have struggled to attain peace and security away from religious principles. The present article intends to introduce universal human rights in the light of religious teachings and elaborate on the related religious principles. It also deals with the distinctions between the principles governing the present world with regard to human rights and religious principles to show that if religious principles are seriously followed in the international relations, they will bring about perpetual peace and security for mankind. Therefore, Religion has a unique role in peace and security.

  5. Human factors and man-machine-interaction

    International Nuclear Information System (INIS)

    Bohr-Bruckmayr, E.

    1985-01-01

    Definitions of the man-machine-interface concept are given. The importance of ergonomics in planning, construction, start-up and operation of a nuclear power plant is highlighted. A comprehensive task analysis is the basis of man-machine-interaction. Personnel performance, work shaping and security are discussed

  6. Towards quantifying dynamic human-human physical interactions for robot assisted stroke therapy.

    Science.gov (United States)

    Mohan, Mayumi; Mendonca, Rochelle; Johnson, Michelle J

    2017-07-01

    Human-Robot Interaction is a prominent field of robotics today. Knowledge of human-human physical interaction can prove vital in creating dynamic physical interactions between human and robots. Most of the current work in studying this interaction has been from a haptic perspective. Through this paper, we present metrics that can be used to identify if a physical interaction occurred between two people using kinematics. We present a simple Activity of Daily Living (ADL) task which involves a simple interaction. We show that we can use these metrics to successfully identify interactions.

  7. impact of boko haram insurgency on human security in nigeria

    African Journals Online (AJOL)

    abduction and killing of people; destruction of houses, schools, health care centres, churches, mosques and farms has ... KEYWORDS: Boko Haram, Insurgency, Human Security, Violence, Nigeria ..... Provide the citizens with adequate ...

  8. Human-computer interaction : Guidelines for web animation

    OpenAIRE

    Galyani Moghaddam, Golnessa; Moballeghi, Mostafa

    2006-01-01

    Human-computer interaction in the large is an interdisciplinary area which attracts researchers, educators, and practioners from many differenf fields. Human-computer interaction studies a human and a machine in communication, it draws from supporting knowledge on both the machine and the human side. This paper is related to the human side of human-computer interaction and focuses on animations. The growing use of animation in Web pages testifies to the increasing ease with which such multim...

  9. Predictors of mother-child interaction quality and child attachment security in at-risk families.

    Science.gov (United States)

    De Falco, Simona; Emer, Alessandra; Martini, Laura; Rigo, Paola; Pruner, Sonia; Venuti, Paola

    2014-01-01

    Child healthy development is largely influenced by parent-child interaction and a secure parent-child attachment is predictively associated with positive outcomes in numerous domains of child development. However, the parent-child relationship can be affected by several psychosocial and socio-demographic risk factors that undermine its quality and in turn play a negative role in short and long term child psychological health. Prevention and intervention programs that support parenting skills in at-risk families can efficiently reduce the impact of risk factors on mother and child psychological health. This study examines predictors of mother-child interaction quality and child attachment security in a sample of first-time mothers with psychosocial and/or socio-demographic risk factors. Forty primiparous women satisfying specific risk criteria participated in a longitudinal study with their children from pregnancy until 18 month of child age. A multiple psychological and socioeconomic assessment was performed. The Emotional Availability Scales were used to measure the quality of emotional exchanges between mother and child at 12 months and the Attachment Q-Sort served as a measure of child attachment security at 18 months. Results highlight both the effect of specific single factors, considered at a continuous level, and the cumulative risk effect of different co-occurring factors, considered at binary level, on mother-child interaction quality and child attachment security. Implication for the selection of inclusion criteria of intervention programs that support parenting skills in at-risk families are discussed.

  10. Predictors of mother-child interaction quality and child attachment security in at-risk families

    Directory of Open Access Journals (Sweden)

    Simona eDe Falco

    2014-08-01

    Full Text Available Child healthy development is largely influenced by parent-child interaction and a secure parent-child attachment is predictively associated with positive outcomes in numerous domains of child development. However, the parent-child relationship can be affected by several psychosocial and socio-demographic risk factors that undermine its quality and in turn play a negative role in short and long term child psychological health. Prevention and intervention programs that support parenting skills in at-risk families can efficiently reduce the impact of risk factors on mother and child psychological health. This study examines predictors of mother-child interaction quality and child attachment security in a sample of first-time mothers with psychosocial and/or socio-demographic risk factors. Forty primiparous women satisfying specific risk criteria participated in a longitudinal study with their children from pregnancy until 18 month of child age. A multiple psychological and socioeconomic assessment was performed. The Emotional Availability Scales were used to measure the quality of emotional exchanges between mother and child at 12 months and the Attachment Q-Sort served as a measure of child attachment security at 18 months. Results highlight both the effect of specific single factors, considered at a continuous level, and the cumulative risk effect of different co-occurring factors, considered at binary level, on mother-child interaction quality and child attachment security. Implication for the selection of inclusion criteria of intervention programs that support parenting skills in at-risk families are discussed.

  11. Relationship between Security and Human Rights in Counter-Terrorism: A Case of Introducing Body Scanners in Civil Aviation

    Directory of Open Access Journals (Sweden)

    Prezelj Iztok

    2015-12-01

    Full Text Available Changes in security environment after the end of Cold War and 9/11 have strongly affected our security concepts and paradigms. In the field of counter-terrorism, a serious conceptual and practical debate on the relationship between security and human rights and freedoms has begun. The goal of this paper is to reflect on this complex relationship at the conceptual level and introduce the empirical debate on this relationship in the field of civil aviation (case of introducing body scanners. The paper’s results show that the concept of human security usefully integrates the care for human rights and security of individuals. The debate on the potential introduction of body scanners on the European airports was actually a debate on the ways of providing individual human security on the airports with simultaneous concern for other human rights. The output of this debate was a compromise: body scanners can be used at the discretion of individual airports and member states, but are not an obligatory measure on all European airports.

  12. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  13. Personality and social skills in human-dog interaction

    DEFF Research Database (Denmark)

    Meyer, Iben Helene Coakley

    developing a social tool set that makes it very successful in interacting and communicating with humans. Human evolution has similarly resulted in the development of complex social cognition in humans. This enables humans to form bonded relationships, besides pair-bonding, and it seems that humans are also...... of this thesis was to attain a better understanding of some of the factors related to the inter-action between humans and dogs. This aim was addressed by focusing on dog personality and hu-man social skills in relation to human-dog interaction. Two studies investigated dog personality and how it a) affects...... the relationship with the owner, and b) is affected by human breeding goals. Two studies investigated how human social skills affect the communication and interaction between hu-man and dog. As part of these studies it was also investigated how experience with dogs interacts with human social skills, perception...

  14. Learning to Detect Human-Object Interactions

    KAUST Repository

    Chao, Yu-Wei; Liu, Yunfan; Liu, Xieyang; Zeng, Huayi; Deng, Jia

    2017-01-01

    In this paper we study the problem of detecting human-object interactions (HOI) in static images, defined as predicting a human and an object bounding box with an interaction class label that connects them. HOI detection is a fundamental problem in computer vision as it provides semantic information about the interactions among the detected objects. We introduce HICO-DET, a new large benchmark for HOI detection, by augmenting the current HICO classification benchmark with instance annotations. We propose Human-Object Region-based Convolutional Neural Networks (HO-RCNN), a novel DNN-based framework for HOI detection. At the core of our HO-RCNN is the Interaction Pattern, a novel DNN input that characterizes the spatial relations between two bounding boxes. We validate the effectiveness of our HO-RCNN using HICO-DET. Experiments demonstrate that our HO-RCNN, by exploiting human-object spatial relations through Interaction Patterns, significantly improves the performance of HOI detection over baseline approaches.

  15. Learning to Detect Human-Object Interactions

    KAUST Repository

    Chao, Yu-Wei

    2017-02-17

    In this paper we study the problem of detecting human-object interactions (HOI) in static images, defined as predicting a human and an object bounding box with an interaction class label that connects them. HOI detection is a fundamental problem in computer vision as it provides semantic information about the interactions among the detected objects. We introduce HICO-DET, a new large benchmark for HOI detection, by augmenting the current HICO classification benchmark with instance annotations. We propose Human-Object Region-based Convolutional Neural Networks (HO-RCNN), a novel DNN-based framework for HOI detection. At the core of our HO-RCNN is the Interaction Pattern, a novel DNN input that characterizes the spatial relations between two bounding boxes. We validate the effectiveness of our HO-RCNN using HICO-DET. Experiments demonstrate that our HO-RCNN, by exploiting human-object spatial relations through Interaction Patterns, significantly improves the performance of HOI detection over baseline approaches.

  16. Impact of Boko Haram insurgency on human security in Nigeria ...

    African Journals Online (AJOL)

    Impact of Boko Haram insurgency on human security in Nigeria. ... Global Journal of Social Sciences ... denied millions of children and youths access to education; increased the number of internally displaced persons with dire need of shelter ...

  17. The Human-Robot Interaction Operating System

    Science.gov (United States)

    Fong, Terrence; Kunz, Clayton; Hiatt, Laura M.; Bugajska, Magda

    2006-01-01

    In order for humans and robots to work effectively together, they need to be able to converse about abilities, goals and achievements. Thus, we are developing an interaction infrastructure called the "Human-Robot Interaction Operating System" (HRI/OS). The HRI/OS provides a structured software framework for building human-robot teams, supports a variety of user interfaces, enables humans and robots to engage in task-oriented dialogue, and facilitates integration of robots through an extensible API.

  18. Task-related Interactions between Kindergarten Children and their Teachers: The Role of Emotional Security

    OpenAIRE

    Thijs, Jochem T.; Koomen, Helma M.Y.

    2008-01-01

    This study examined the emotional security of kindergarten children in dyadic task-related interactions with their teachers. In particular, it examined the interrelations between security, task behaviours (persistence and independence), social inhibition, and teachers’ support. Participants were 79 kindergartners (mean age = 69.7 months) and their 40 regular teachers. Children were selected to approach a normal distribution of social inhibition. Children and teachers were filmed during a dyad...

  19. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  20. Cyber security challenges in Smart Cities: Safety, security and privacy

    Science.gov (United States)

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  1. Cyber security challenges in Smart Cities: Safety, security and privacy

    Directory of Open Access Journals (Sweden)

    Adel S. Elmaghraby

    2014-07-01

    Full Text Available The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  2. Cyber security challenges in Smart Cities: Safety, security and privacy.

    Science.gov (United States)

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  3. Human-computer interaction and management information systems

    CERN Document Server

    Galletta, Dennis F

    2014-01-01

    ""Human-Computer Interaction and Management Information Systems: Applications"" offers state-of-the-art research by a distinguished set of authors who span the MIS and HCI fields. The original chapters provide authoritative commentaries and in-depth descriptions of research programs that will guide 21st century scholars, graduate students, and industry professionals. Human-Computer Interaction (or Human Factors) in MIS is concerned with the ways humans interact with information, technologies, and tasks, especially in business, managerial, organizational, and cultural contexts. It is distinctiv

  4. Human Security versus Human Development - Behavioristic Approach

    Directory of Open Access Journals (Sweden)

    Duralia Oana

    2016-08-01

    Full Text Available Recent terrorist attacks in Brussels, Paris and Istanbul, are shaking a world bewildered of daily fear of violence, while the contemporary consumer has to deal with the “new wars” emerging in the context of the current socio-economic and political context. The issue is especially thorny since, most of the times, the “enemy” the citizens must face is unknown, not only when it comes to terrorist attacks, but also when dealing with the question of the “enemy” in foods purchased for consumption (food security or the security of personal data when accessing and using the Internet (cyber security. Consequently, this paper attempts to highlight the way in which the safety and security needs of the contemporary consumer have diversified over time, often becoming determinants of social behavior in general, and of the buying and consumption behavior, in particular.

  5. Effects of interactions between humans and domesticated animals

    NARCIS (Netherlands)

    Bokkers, E.A.M.

    2006-01-01

    Humans have many kinds of relationships with domesticated animals. To maintain relationships interactions are needed. Interactions with animals may be beneficial for humans but may also be risky. Scientific literature on effects of human¿animal relationships and interactions in a workplace,

  6. Human (in)security at the livestock-crop-wildlife nexus

    DEFF Research Database (Denmark)

    Bond, Jennifer Lauren

    Conflicts in relation to natural resources occur throughout the world in a range of contexts, both rural and urban, and across a spectrum of non-violent conflict of interest to violence. These conflicts may be between specific user groups such as agriculturalists and pastoralists or humans...... including agro-pastoral conflicts, cattle rustling and human-wildlife conflicts. The five articles of the thesis address the research questions through a human security lens drawing on quantitative and qualitative data. Analysis showed that there were several factors related to insecurity, weak governance......, natural resource management and cultural practices which cut across each of the gropastoral, cattle rustling and human-wildlife conflicts focussed on in this study. Further analysis built on these cross-cutting issues to identify the hidden impacts of these interrelated forms of insecurity on people which...

  7. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks...

  8. An ontology for human-like interaction systems

    OpenAIRE

    Albacete García, Esperanza

    2016-01-01

    This report proposes and describes the development of a Ph.D. Thesis aimed at building an ontological knowledge model supporting Human-Like Interaction systems. The main function of such knowledge model in a human-like interaction system is to unify the representation of each concept, relating it to the appropriate terms, as well as to other concepts with which it shares semantic relations. When developing human-like interactive systems, the inclusion of an ontological module can be valuab...

  9. Human security and access to water, sanitation, and hygiene: exploring the drivers and nexus

    NARCIS (Netherlands)

    Obani, P.; Gupta, J.; Pahl-Wostl, C.; Badhuri, A.; Gupta, J.

    2016-01-01

    Water security challenges are mostly covered in the literature on the food and energy nexus. This chapter however adopts a broader conception of water security in relation to lack of access to water, sanitation, and hygiene (WASH), and argues that the human rights approach could be instrumental in

  10. Quantitative heartbeat coupling measures in human-horse interaction.

    Science.gov (United States)

    Lanata, Antonio; Guidi, Andrea; Valenza, Gaetano; Baragli, Paolo; Scilingo, Enzo Pasquale

    2016-08-01

    We present a study focused on a quantitative estimation of a human-horse dynamic interaction. A set of measures based on magnitude and phase coupling between heartbeat dynamics of both humans and horses in three different conditions is reported: no interaction, visual/olfactory interaction and grooming. Specifically, Magnitude Squared Coherence (MSC), Mean Phase Coherence (MPC) and Dynamic Time Warping (DTW) have been used as estimators of the amount of coupling between human and horse through the analysis of their heart rate variability (HRV) time series in a group of eleven human subjects, and one horse. The rationale behind this study is that the interaction of two complex biological systems go towards a coupling process whose dynamical evolution is modulated by the kind and time duration of the interaction itself. We achieved a congruent and consistent statistical significant difference for all of the three indices. Moreover, a Nearest Mean Classifier was able to recognize the three classes of interaction with an accuracy greater than 70%. Although preliminary, these encouraging results allow a discrimination of three distinct phases in a real human-animal interaction opening to the characterization of the empirically proven relationship between human and horse.

  11. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  12. Human-Robot Interaction

    Science.gov (United States)

    Sandor, Aniko; Cross, E. Vincent, II; Chang, Mai Lee

    2015-01-01

    Human-robot interaction (HRI) is a discipline investigating the factors affecting the interactions between humans and robots. It is important to evaluate how the design of interfaces affect the human's ability to perform tasks effectively and efficiently when working with a robot. By understanding the effects of interface design on human performance, workload, and situation awareness, interfaces can be developed to appropriately support the human in performing tasks with minimal errors and with appropriate interaction time and effort. Thus, the results of research on human-robot interfaces have direct implications for the design of robotic systems. For efficient and effective remote navigation of a rover, a human operator needs to be aware of the robot's environment. However, during teleoperation, operators may get information about the environment only through a robot's front-mounted camera causing a keyhole effect. The keyhole effect reduces situation awareness which may manifest in navigation issues such as higher number of collisions, missing critical aspects of the environment, or reduced speed. One way to compensate for the keyhole effect and the ambiguities operators experience when they teleoperate a robot is adding multiple cameras and including the robot chassis in the camera view. Augmented reality, such as overlays, can also enhance the way a person sees objects in the environment or in camera views by making them more visible. Scenes can be augmented with integrated telemetry, procedures, or map information. Furthermore, the addition of an exocentric (i.e., third-person) field of view from a camera placed in the robot's environment may provide operators with the additional information needed to gain spatial awareness of the robot. Two research studies investigated possible mitigation approaches to address the keyhole effect: 1) combining the inclusion of the robot chassis in the camera view with augmented reality overlays, and 2) modifying the camera

  13. Modelling dynamic human-device interaction in healthcare

    OpenAIRE

    Niezen, Gerrit

    2013-01-01

    Errors are typically blamed on human factors, forgetting that the system should have been designed to take them into account and minimise these problems. In our research we are developing tools to design interactive medical devices using human-in-the-loop modelling. Manual control theory is used to describe and analyse the dynamic aspects of human-device interaction.

  14. Soil, Food Security and Human Health

    Science.gov (United States)

    Oliver, Margaret

    2017-04-01

    "Upon this handful of soil our survival depends. Husband it and it will grow food, our fuel, and our shelter and surround us with beauty. Abuse it and the soil will collapse and die, taking humanity with it" Vedas Sanskrit Scripture, 1500 BC. As the world's population increases issues of food security become more pressing as does the need to sustain soil fertility and to minimize soil degradation. Soil and land are finite resources, and agricultural land is under severe competition from many other uses. Lack of adequate food and food of poor nutritional quality lead to under-nutrition of different degrees, all of which can cause ill- or suboptimal-health. The soil can affect human health directly and indirectly. Direct effects of soil or its constituents result from its ingestion, inhalation or absorption. For example, hook worms enter the body through the skin and cause anaemia, and fungi and dust can be inhaled resulting in respiratory problems. The soil is the source of actinomycetes on which our earliest antibiotics are based (actinomycin, neomycin and streptomycin). Furthermore, it is a potential reservoir of new antibiotics with methods such as functional metagenomics to identify antibiotic resistant genes. Indirect effects of soil arise from the quantity and quality of food that humans consume. Trace elements can have both beneficial and toxic effects on humans, especially where the range for optimal intake is narrow as for selenium. Deficiencies of four trace elements, iodine, iron, selenium and zinc, will be considered because of their substantial effects on human health. Relations between soil and human health are often difficult to extricate because of the many confounding factors present such as the source of food, social factors and so on. Nevertheless, recent scientific understanding of soil processes and factors that affect human health are enabling greater insight into the effects of soil on our health. Multidisciplinary research that includes soil

  15. Safe physical human robot interaction- past, present and future

    International Nuclear Information System (INIS)

    Pervez, Aslam; Ryu, Jeha

    2008-01-01

    When a robot physically interacts with a human user, the requirements should be drastically changed. The most important requirement is the safety of the human user in the sense that robot should not harm the human in any situation. During the last few years, research has been focused on various aspects of safe physical human robot interaction. This paper provides a review of the work on safe physical interaction of robotic systems sharing their workspace with human users (especially elderly people). Three distinct areas of research are identified: interaction safety assessment, interaction safety through design, and interaction safety through planning and control. The paper then highlights the current challenges and available technologies and points out future research directions for realization of a safe and dependable robotic system for human users

  16. Effects of interactions between humans and domesticated animals

    OpenAIRE

    Bokkers, E.A.M.

    2006-01-01

    Humans have many kinds of relationships with domesticated animals. To maintain relationships interactions are needed. Interactions with animals may be beneficial for humans but may also be risky. Scientific literature on effects of human¿animal relationships and interactions in a workplace, health-care and residential context has been reviewed to develop ideas about the effects farm animals can have on humans. Although there are quite a few studies, the variety of methods, the complexity of t...

  17. Fundamentals of human-computer interaction

    CERN Document Server

    Monk, Andrew F

    1985-01-01

    Fundamentals of Human-Computer Interaction aims to sensitize the systems designer to the problems faced by the user of an interactive system. The book grew out of a course entitled """"The User Interface: Human Factors for Computer-based Systems"""" which has been run annually at the University of York since 1981. This course has been attended primarily by systems managers from the computer industry. The book is organized into three parts. Part One focuses on the user as processor of information with studies on visual perception; extracting information from printed and electronically presented

  18. Socially intelligent robots: dimensions of human-robot interaction.

    Science.gov (United States)

    Dautenhahn, Kerstin

    2007-04-29

    Social intelligence in robots has a quite recent history in artificial intelligence and robotics. However, it has become increasingly apparent that social and interactive skills are necessary requirements in many application areas and contexts where robots need to interact and collaborate with other robots or humans. Research on human-robot interaction (HRI) poses many challenges regarding the nature of interactivity and 'social behaviour' in robot and humans. The first part of this paper addresses dimensions of HRI, discussing requirements on social skills for robots and introducing the conceptual space of HRI studies. In order to illustrate these concepts, two examples of HRI research are presented. First, research is surveyed which investigates the development of a cognitive robot companion. The aim of this work is to develop social rules for robot behaviour (a 'robotiquette') that is comfortable and acceptable to humans. Second, robots are discussed as possible educational or therapeutic toys for children with autism. The concept of interactive emergence in human-child interactions is highlighted. Different types of play among children are discussed in the light of their potential investigation in human-robot experiments. The paper concludes by examining different paradigms regarding 'social relationships' of robots and people interacting with them.

  19. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  20. reCAPTCHA: human-based character recognition via Web security measures.

    Science.gov (United States)

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  1. User localization during human-robot interaction.

    Science.gov (United States)

    Alonso-Martín, F; Gorostiza, Javi F; Malfaz, María; Salichs, Miguel A

    2012-01-01

    This paper presents a user localization system based on the fusion of visual information and sound source localization, implemented on a social robot called Maggie. One of the main requisites to obtain a natural interaction between human-human and human-robot is an adequate spatial situation between the interlocutors, that is, to be orientated and situated at the right distance during the conversation in order to have a satisfactory communicative process. Our social robot uses a complete multimodal dialog system which manages the user-robot interaction during the communicative process. One of its main components is the presented user localization system. To determine the most suitable allocation of the robot in relation to the user, a proxemic study of the human-robot interaction is required, which is described in this paper. The study has been made with two groups of users: children, aged between 8 and 17, and adults. Finally, at the end of the paper, experimental results with the proposed multimodal dialog system are presented.

  2. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  3. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  4. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  5. Motor contagion during human-human and human-robot interaction.

    Directory of Open Access Journals (Sweden)

    Ambra Bisio

    Full Text Available Motor resonance mechanisms are known to affect humans' ability to interact with others, yielding the kind of "mutual understanding" that is the basis of social interaction. However, it remains unclear how the partner's action features combine or compete to promote or prevent motor resonance during interaction. To clarify this point, the present study tested whether and how the nature of the visual stimulus and the properties of the observed actions influence observer's motor response, being motor contagion one of the behavioral manifestations of motor resonance. Participants observed a humanoid robot and a human agent move their hands into a pre-specified final position or put an object into a container at various velocities. Their movements, both in the object- and non-object- directed conditions, were characterized by either a smooth/curvilinear or a jerky/segmented trajectory. These trajectories were covered with biological or non-biological kinematics (the latter only by the humanoid robot. After action observation, participants were requested to either reach the indicated final position or to transport a similar object into another container. Results showed that motor contagion appeared for both the interactive partner except when the humanoid robot violated the biological laws of motion. These findings suggest that the observer may transiently match his/her own motor repertoire to that of the observed agent. This matching might mediate the activation of motor resonance, and modulate the spontaneity and the pleasantness of the interaction, whatever the nature of the communication partner.

  6. Motor contagion during human-human and human-robot interaction.

    Science.gov (United States)

    Bisio, Ambra; Sciutti, Alessandra; Nori, Francesco; Metta, Giorgio; Fadiga, Luciano; Sandini, Giulio; Pozzo, Thierry

    2014-01-01

    Motor resonance mechanisms are known to affect humans' ability to interact with others, yielding the kind of "mutual understanding" that is the basis of social interaction. However, it remains unclear how the partner's action features combine or compete to promote or prevent motor resonance during interaction. To clarify this point, the present study tested whether and how the nature of the visual stimulus and the properties of the observed actions influence observer's motor response, being motor contagion one of the behavioral manifestations of motor resonance. Participants observed a humanoid robot and a human agent move their hands into a pre-specified final position or put an object into a container at various velocities. Their movements, both in the object- and non-object- directed conditions, were characterized by either a smooth/curvilinear or a jerky/segmented trajectory. These trajectories were covered with biological or non-biological kinematics (the latter only by the humanoid robot). After action observation, participants were requested to either reach the indicated final position or to transport a similar object into another container. Results showed that motor contagion appeared for both the interactive partner except when the humanoid robot violated the biological laws of motion. These findings suggest that the observer may transiently match his/her own motor repertoire to that of the observed agent. This matching might mediate the activation of motor resonance, and modulate the spontaneity and the pleasantness of the interaction, whatever the nature of the communication partner.

  7. Model-based acquisition and analysis of multimodal interactions for improving human-robot interaction

    OpenAIRE

    Renner, Patrick; Pfeiffer, Thies

    2014-01-01

    For solving complex tasks cooperatively in close interaction with robots, they need to understand natural human communication. To achieve this, robots could benefit from a deeper understanding of the processes that humans use for successful communication. Such skills can be studied by investigating human face-to-face interactions in complex tasks. In our work the focus lies on shared-space interactions in a path planning task and thus 3D gaze directions and hand movements are of particular in...

  8. Human centric security and privacy for the IoT using formal techniques

    OpenAIRE

    Kammueller, Florian

    2018-01-01

    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of at...

  9. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  10. Language evolution and human-computer interaction

    Science.gov (United States)

    Grudin, Jonathan; Norman, Donald A.

    1991-01-01

    Many of the issues that confront designers of interactive computer systems also appear in natural language evolution. Natural languages and human-computer interfaces share as their primary mission the support of extended 'dialogues' between responsive entities. Because in each case one participant is a human being, some of the pressures operating on natural languages, causing them to evolve in order to better support such dialogue, also operate on human-computer 'languages' or interfaces. This does not necessarily push interfaces in the direction of natural language - since one entity in this dialogue is not a human, this is not to be expected. Nonetheless, by discerning where the pressures that guide natural language evolution also appear in human-computer interaction, we can contribute to the design of computer systems and obtain a new perspective on natural languages.

  11. Themes in human work interaction design

    DEFF Research Database (Denmark)

    Ørngreen, Rikke; Mark Pejtersen, Annelise; Clemmensen, Torkil

    2008-01-01

    Design (name HWID) through the last two and half years since the commencement of this Working Group. The paper thus provides an introduction to the theory and empirical evidence that lie behind the combination of empirical work studies and interaction design. It also recommends key topics for future......Abstract. This paper raises themes that are seen as some of the challenges facing the emerging practice and research field of Human Work Interaction Design. The paper has its offset in the discussions and writings that have been dominant within the IFIP Working Group on Human Work Interaction...

  12. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  13. Method for Determining the Sensitivity of a Physical Security System.

    Energy Technology Data Exchange (ETDEWEB)

    Speed, Ann [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gauthier, John H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hoffman, Matthew John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wachtel, Amanda [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kittinger, Robert Scott [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Munoz-Ramos, Karina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-23

    Modern systems, such as physical security systems, are often designed to involve complex interactions of technological and human elements. Evaluation of the performance of these systems often overlooks the human element. A method is proposed here to expand the concept of sensitivity—as denoted by d’—from signal detection theory (Green & Swets 1966; Macmillan & Creelman 2005), which came out of the field of psychophysics, to cover not only human threat detection but also other human functions plus the performance of technical systems in a physical security system, thereby including humans in the overall evaluation of system performance. New in this method is the idea that probabilities of hits (accurate identification of threats) and false alarms (saying “threat” when there is not one), which are used to calculate d’ of the system, can be applied to technologies and, furthermore, to different functions in the system beyond simple yes-no threat detection. At the most succinct level, the method returns a single number that represents the effectiveness of a physical security system; specifically, the balance between the handling of actual threats and the distraction of false alarms. The method can be automated, and the constituent parts revealed, such that given an interaction graph that indicates the functional associations of system elements and the individual probabilities of hits and false alarms for those elements, it will return the d’ of the entire system as well as d’ values for individual parts. The method can also return a measure of the response bias* of the system. One finding of this work is that the d’ for a physical security system can be relatively poor in spite of having excellent d’s for each of its individual functional elements.

  14. Eyeblink Synchrony in Multimodal Human-Android Interaction.

    Science.gov (United States)

    Tatsukawa, Kyohei; Nakano, Tamami; Ishiguro, Hiroshi; Yoshikawa, Yuichiro

    2016-12-23

    As the result of recent progress in technology of communication robot, robots are becoming an important social partner for humans. Behavioral synchrony is understood as an important factor in establishing good human-robot relationships. In this study, we hypothesized that biasing a human's attitude toward a robot changes the degree of synchrony between human and robot. We first examined whether eyeblinks were synchronized between a human and an android in face-to-face interaction and found that human listeners' eyeblinks were entrained to android speakers' eyeblinks. This eyeblink synchrony disappeared when the android speaker spoke while looking away from the human listeners but was enhanced when the human participants listened to the speaking android while touching the android's hand. These results suggest that eyeblink synchrony reflects a qualitative state in human-robot interactions.

  15. A conceptual framework to evaluate human-wildlife interactions within coupled human and natural systems

    Directory of Open Access Journals (Sweden)

    Anita T. Morzillo

    2014-09-01

    Full Text Available Landscape characteristics affect human-wildlife interactions. However, there is a need to better understand mechanisms that drive those interactions, particularly feedbacks that exist between wildlife-related impacts, human reaction to and behavior as a result of those impacts, and how land use and landscape characteristics may influence those components within coupled human and natural systems. Current conceptual models of human-wildlife interactions often focus on species population size as the independent variable driving those interactions. Such an approach potentially overlooks important feedbacks among and drivers of human-wildlife interactions that result from mere wildlife presence versus absence. We describe an emerging conceptual framework that focuses on wildlife as a driver of human behavior and allows us to better understand linkages between humans, wildlife, and the broader landscape. We also present results of a pilot analysis related to our own ongoing study of urban rodent control behavior to illustrate one application of this framework within a study of urban landscapes.

  16. Human Security in the Asia-Pacific: In Australia’s National Interests?

    Science.gov (United States)

    2011-12-16

    opportunities for the disadvantaged. Further, overfishing and intense competition reduces legitimate income for traditional seafaring communities and...international community through the rule of law. In the second way, the purpose of human security is essentially humanitarian. Viewed through this prism, human...terrorism and Sudden Acute Respiratory Syndrome generated fear within the community —one through fear of violence and the other fear of illness

  17. Peace, Security, Globalisation & Cultural Diplomacy

    Directory of Open Access Journals (Sweden)

    Ashok Natarajan

    2017-06-01

    Full Text Available This article argues for a positive, comprehensive conception of peace that goes beyond the mere absence of war and a more integrated conception of human security that encompasses a wider range of issues than threats of physical violence. Education is one of humanity’s most effective social institutions for redirecting the violent physical energies of destruction into higher avenues of civilization and culture as an instrument of conscious social evolution. Organization is knowledge of higher accomplishment. Organization has the power to vastly accelerate and multiply the potentials of education for the promotion of peace and security. Peace and Security have a mutually reinforcing effect on each other in the sense that peace results in security while security results in peace. Physical violence eventually led to the development of the knowledge needed for the avoidance of violence by means of diplomacy, trade and cultural exchanges, marking the beginning of the transition from the physical to the mental level of evolution. Trade requires travel, transport, human interaction, exchange, trust with respect to products, and reliable mechanisms for the exchange of a stable currency that can only be effectively founded on an enduring peace that generates confidence among the traders. Isolated communities evolve a communal consciousness as they mature into organized social units founded on shared customs and culture, which later develop into a common legal framework. What began as diplomacy so many centuries ago has now evolved into a near universal recognition of fundamental human rights and the rule of law. The evolution of diplomacy in previous centuries is the foundation for the remarkable betterment of human life witnessed in recent times. The world is in the process of evolving a unifying global culture founded on universal values and recognition of the rich contributions of different cultures to humanity’s progress. As physical force once

  18. Proxemics in Human-Computer Interaction

    OpenAIRE

    Greenberg, Saul; Honbaek, Kasper; Quigley, Aaron; Reiterer, Harald; Rädle, Roman

    2014-01-01

    In 1966, anthropologist Edward Hall coined the term "proxemics." Proxemics is an area of study that identifies the culturally dependent ways in which people use interpersonal distance to understand and mediate their interactions with others. Recent research has demonstrated the use of proxemics in human-computer interaction (HCI) for supporting users' explicit and implicit interactions in a range of uses, including remote office collaboration, home entertainment, and games. One promise of pro...

  19. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  20. Culture of socio-economic security of Ukraine: Challenges in XXIst Century

    Directory of Open Access Journals (Sweden)

    Olesya Ihorivna Datsko

    2015-12-01

    Full Text Available It is argued, that the culture of social- economic security has impact on the socio-economic development of state. It is formed at several levels of human interaction: with oneself, other people, work, environment, community groups, state, world, God. It is proved that low level of culture of socio-economic security of Ukraine's population, especially state leaders has a destructive effect on the economic development, labour potential, and increasing level of corruption. The necessity to develop a culture of social- economic security in the state economic policy is proved.

  1. A Secure Alignment Algorithm for Mapping Short Reads to Human Genome.

    Science.gov (United States)

    Zhao, Yongan; Wang, Xiaofeng; Tang, Haixu

    2018-05-09

    The elastic and inexpensive computing resources such as clouds have been recognized as a useful solution to analyzing massive human genomic data (e.g., acquired by using next-generation sequencers) in biomedical researches. However, outsourcing human genome computation to public or commercial clouds was hindered due to privacy concerns: even a small number of human genome sequences contain sufficient information for identifying the donor of the genomic data. This issue cannot be directly addressed by existing security and cryptographic techniques (such as homomorphic encryption), because they are too heavyweight to carry out practical genome computation tasks on massive data. In this article, we present a secure algorithm to accomplish the read mapping, one of the most basic tasks in human genomic data analysis based on a hybrid cloud computing model. Comparing with the existing approaches, our algorithm delegates most computation to the public cloud, while only performing encryption and decryption on the private cloud, and thus makes the maximum use of the computing resource of the public cloud. Furthermore, our algorithm reports similar results as the nonsecure read mapping algorithms, including the alignment between reads and the reference genome, which can be directly used in the downstream analysis such as the inference of genomic variations. We implemented the algorithm in C++ and Python on a hybrid cloud system, in which the public cloud uses an Apache Spark system.

  2. Sphericall: A Human/Artificial Intelligence interaction experience

    Directory of Open Access Journals (Sweden)

    Frack Gechter

    2014-12-01

    Full Text Available Multi-agent systems are now wide spread in scientific works and in industrial applications. Few applications deal with the Human/Multi-agent system interaction. Multi-agent systems are characterized by individual entities, called agents, in interaction with each other and with their environment. Multi-agent systems are generally classified into complex systems categories since the global emerging phenomenon cannot be predicted even if every component is well known. The systems developed in this paper are named reactive because they behave using simple interaction models. In the reactive approach, the issue of Human/system interaction is hard to cope with and is scarcely exposed in literature. This paper presents Sphericall, an application aimed at studying Human/Complex System interactions and based on two physics inspired multi-agent systems interacting together. The Sphericall device is composed of a tactile screen and a spherical world where agents evolve. This paper presents both the technical background of Sphericall project and a feedback taken from the demonstration performed during OFFF Festival in La Villette (Paris.

  3. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  4. The European Union’s Human Security Doctrine: A Critical Analysis

    Science.gov (United States)

    2009-03-01

    Symbolism: Europe Takes on Human Security,” 92. 91 Ayn Rand, The Virtue of Selfishness: A New Concept of Egoism (New York: Signet Press, 1964). 92 Bailes...New Concept of Egoism . New York: Signet Press, 1964. Report of the International Commission on Intervention and State Sovereignty. The Responsibility

  5. Evaluation of the Humanity Research Paradigms based on Analysis of Human – Environment Interaction

    Directory of Open Access Journals (Sweden)

    Reza Sameh

    2015-09-01

    Full Text Available As claimed by many behavioral scientists, designing should be based on the knowledge of interaction between human and environment. Environmental quality is also created in the context in which humans interact with their environment. To achieve such quality, designers should develop appropriate models for explaining this relationship, and this requires an understanding of human nature and the environment. Criticisms on the Modern Movement have shown that architects have often used incomplete and simplistic models in this regard, while most of design ideas are based on the definitions of human and environment and the interaction between them. However, the most important question that is raised is that how understanding of human nature and the environment and their interaction, which depends on foundations of different views, can affect the pursuit of quality in designing? Therefore, the present paper, in addition to introduction and comparison of common paradigms in humanities as the and methodological foundation of human sciences, aims to deal with the relationship of human and the environment from the perspective of objectivist, relativist, and critical paradigms in order to identify the characteristics and differences in their views on the analysis of the quality of this interaction. This is the most important step that paves the way for understanding the qualitative foundations of the environment and human life quality and also the quality of interaction between them.

  6. Human-Robot Interaction: Status and Challenges.

    Science.gov (United States)

    Sheridan, Thomas B

    2016-06-01

    The current status of human-robot interaction (HRI) is reviewed, and key current research challenges for the human factors community are described. Robots have evolved from continuous human-controlled master-slave servomechanisms for handling nuclear waste to a broad range of robots incorporating artificial intelligence for many applications and under human supervisory control. This mini-review describes HRI developments in four application areas and what are the challenges for human factors research. In addition to a plethora of research papers, evidence of success is manifest in live demonstrations of robot capability under various forms of human control. HRI is a rapidly evolving field. Specialized robots under human teleoperation have proven successful in hazardous environments and medical application, as have specialized telerobots under human supervisory control for space and repetitive industrial tasks. Research in areas of self-driving cars, intimate collaboration with humans in manipulation tasks, human control of humanoid robots for hazardous environments, and social interaction with robots is at initial stages. The efficacy of humanoid general-purpose robots has yet to be proven. HRI is now applied in almost all robot tasks, including manufacturing, space, aviation, undersea, surgery, rehabilitation, agriculture, education, package fetch and delivery, policing, and military operations. © 2016, Human Factors and Ergonomics Society.

  7. Information and Knowledge Management in the Scope of the Information Security practices: the human factor within Organizations

    Directory of Open Access Journals (Sweden)

    Luciana Emirena Santos Carneiro

    2013-08-01

    Full Text Available The security of informational assets has always been a corporate requirement. These assets can be scaled in three main spheres, namely, people, organizational processes and technologies. The internet, the web, the broadcast of networks, and the growing presence of technology both in people's lives and in organizational contexts have caused profound transformations in the intrinsic processes that constitute personal and organizational routines. On the one hand, these changes provided by the technological progress have fostered competitiveness and decentralization; on the other hand, they require better management, control, security and protection for information and knowledge. This article presents the results of an investigation within information security realm, focusing on the human aspects of knowledge and information management related to security practices. Using a quality-quantitative approach, we identify behavioral actions and profiles of employees of a company in the field of healthcare, which reveal some connections with information security failures. We conclude that the human element is a relevant variable, even a critical one, for the management of information security in organizations.

  8. Extended sequence diagram for human system interaction

    International Nuclear Information System (INIS)

    Hwang, Jong Rok; Choi, Sun Woo; Ko, Hee Ran; Kim, Jong Hyun

    2012-01-01

    Unified Modeling Language (UML) is a modeling language in the field of object oriented software engineering. The sequence diagram is a kind of interaction diagram that shows how processes operate with one another and in what order. It is a construct of a message sequence chart. It depicts the objects and classes involved in the scenario and the sequence of messages exchanged between the objects needed to carry out the functionality of the scenario. This paper proposes the Extended Sequence Diagram (ESD), which is capable of depicting human system interaction for nuclear power plants, as well as cognitive process of operators analysis. In the conventional sequence diagram, there is a limit to only identify the activities of human and systems interactions. The ESD is extended to describe operators' cognitive process in more detail. The ESD is expected to be used as a task analysis method for describing human system interaction. The ESD can also present key steps causing abnormal operations or failures and diverse human errors based on cognitive condition

  9. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  10. Human-Bat Interactions in Rural West Africa.

    Science.gov (United States)

    Anti, Priscilla; Owusu, Michael; Agbenyega, Olivia; Annan, Augustina; Badu, Ebenezer Kofi; Nkrumah, Evans Ewald; Tschapka, Marco; Oppong, Samuel; Adu-Sarkodie, Yaw; Drosten, Christian

    2015-08-01

    Because some bats host viruses with zoonotic potential, we investigated human-bat interactions in rural Ghana during 2011-2012. Nearly half (46.6%) of respondents regularly visited bat caves; 37.4% had been bitten, scratched, or exposed to bat urine; and 45.6% ate bat meat. Human-bat interactions in rural Ghana are frequent and diverse.

  11. The Potential of Human Rights Education for Conflict Prevention and Security

    Science.gov (United States)

    Davies, Lynn

    2010-01-01

    This paper examines the contribution of human rights education (HRE) to conflict prevention and to the promotion of security. It outlines the difficulties in evaluating the long-term impact of HRE, but then proposes five benefits of a rights-based approach to education--rights as secular, man-made, requiring transparency, enabling freedom from…

  12. Duplicability of self-interacting human genes.

    LENUS (Irish Health Repository)

    Pérez-Bercoff, Asa

    2010-01-01

    BACKGROUND: There is increasing interest in the evolution of protein-protein interactions because this should ultimately be informative of the patterns of evolution of new protein functions within the cell. One model proposes that the evolution of new protein-protein interactions and protein complexes proceeds through the duplication of self-interacting genes. This model is supported by data from yeast. We examined the relationship between gene duplication and self-interaction in the human genome. RESULTS: We investigated the patterns of self-interaction and duplication among 34808 interactions encoded by 8881 human genes, and show that self-interacting proteins are encoded by genes with higher duplicability than genes whose proteins lack this type of interaction. We show that this result is robust against the system used to define duplicate genes. Finally we compared the presence of self-interactions amongst proteins whose genes have duplicated either through whole-genome duplication (WGD) or small-scale duplication (SSD), and show that the former tend to have more interactions in general. After controlling for age differences between the two sets of duplicates this result can be explained by the time since the gene duplication. CONCLUSIONS: Genes encoding self-interacting proteins tend to have higher duplicability than proteins lacking self-interactions. Moreover these duplicate genes have more often arisen through whole-genome rather than small-scale duplication. Finally, self-interacting WGD genes tend to have more interaction partners in general in the PIN, which can be explained by their overall greater age. This work adds to our growing knowledge of the importance of contextual factors in gene duplicability.

  13. Pantomimic gestures for human-robot interaction

    CSIR Research Space (South Africa)

    Burke, Michael G

    2015-10-01

    Full Text Available -1 IEEE TRANSACTIONS ON ROBOTICS 1 Pantomimic Gestures for Human-Robot Interaction Michael Burke, Student Member, IEEE, and Joan Lasenby Abstract This work introduces a pantomimic gesture interface, which classifies human hand gestures using...

  14. Book Review: Anja Jetschke: Human Rights and State Security: Indonesia and the Philippines

    Directory of Open Access Journals (Sweden)

    Salvador Santino F. Regilme, Jr.

    2013-01-01

    Full Text Available Book Review of the Monograph: Jetschke, Anja (2010, Human Rights and State Security: Indonesia and the Philippines ; Philadelphia: University of Pennsylvania Press, ISBN: 978-0-8122-4301-7, 368 pages

  15. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  16. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  17. Human Work Interaction Design

    DEFF Research Database (Denmark)

    Lopes, Arminda; Ørngreen, Rikke

    This book constitutes the thoroughly refereed post-conference proceedings of the Third IFIP WG 13.6 Working Conference on Human Work Interaction Design, HWID 2012, held in Copenhagen, Denmark, in December 2012. The 16 revised papers presented were carefully selected for inclusion in this volume...

  18. A human engineering and ergonomic evaluation of the security access panel interface

    International Nuclear Information System (INIS)

    Hartney, C.; Banks, W.W.

    1995-02-01

    The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system's primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard

  19. Yes we can! The Raffles Dialogue on Human Wellbeing and Security

    Directory of Open Access Journals (Sweden)

    Dr. Tikki Pang

    2015-08-01

    Full Text Available The future of human wellbeing and security depends on our ability to deal with the multiple effects of globalisation and on adoption of a new paradigm and philosophy for living and for health that emphasises people's wellbeing and social justice. Such was the topic of the inaugural Raffles Dialogue on Human Wellbeing and Security held in Singapore on Feb 2–3, 2015. Participants agreed that, to achieve these goals, four conditions must be met. First, equity must be integral to the implementation of technology. Second, there is an urgent need for innovations within our global institutions to make them “fit for purpose” in a rapidly changing world. Third, we must find the right balance between the roles of government and markets so that all those in need can access affordable medicine and health care. Finally, we must realise that we live in a small and interdependent “global village”, where Asian countries need to assume greater leadership of our global village councils. This is the great imperative of our times.

  20. Interactive Exploration Robots: Human-Robotic Collaboration and Interactions

    Science.gov (United States)

    Fong, Terry

    2017-01-01

    For decades, NASA has employed different operational approaches for human and robotic missions. Human spaceflight missions to the Moon and in low Earth orbit have relied upon near-continuous communication with minimal time delays. During these missions, astronauts and mission control communicate interactively to perform tasks and resolve problems in real-time. In contrast, deep-space robotic missions are designed for operations in the presence of significant communication delay - from tens of minutes to hours. Consequently, robotic missions typically employ meticulously scripted and validated command sequences that are intermittently uplinked to the robot for independent execution over long periods. Over the next few years, however, we will see increasing use of robots that blend these two operational approaches. These interactive exploration robots will be remotely operated by humans on Earth or from a spacecraft. These robots will be used to support astronauts on the International Space Station (ISS), to conduct new missions to the Moon, and potentially to enable remote exploration of planetary surfaces in real-time. In this talk, I will discuss the technical challenges associated with building and operating robots in this manner, along with lessons learned from research conducted with the ISS and in the field.

  1. Audited credential delegation: a usable security solution for the virtual physiological human toolkit

    Science.gov (United States)

    Haidar, Ali N.; Zasada, Stefan J.; Coveney, Peter V.; Abdallah, Ali E.; Beckles, Bruce; Jones, Mike A. S.

    2011-01-01

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username–password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214

  2. Audited credential delegation: a usable security solution for the virtual physiological human toolkit.

    Science.gov (United States)

    Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S

    2011-06-06

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.

  3. International Security Presence in Kosovo and its Human Rights Implications

    Directory of Open Access Journals (Sweden)

    Istrefi Remzije

    2017-11-01

    Full Text Available In this article I will examine the powers and activities of NATO-led Kosovo forces (KFOR and their impact on human rights protection in Kosovo. Through this examination, I seek to answer the following questions: which KFOR actions affected the human rights of Kosovars? Does KFOR carry out responsibilities and abide by the obligations normally imposed upon nation-states? And is there a solution available when the alleged violator is KFOR? KFOR is responsible for carrying out military tasks and for ‘shouldering’ UNMIK and local security forces in some civilian peace-building tasks. In the course of the exercise of its mandate, there were alleged complaints of human rights violations by KFOR. The legal implications of these alleged complaints against KFOR (inactions will also be discussed.

  4. Threats to Security Posed by ISIS in Syria: A Human Security Approach

    Directory of Open Access Journals (Sweden)

    Lee-Ann Louw

    2017-02-01

    Full Text Available The civil war in Syria coupled with the attacks by ISIS, has resulted in one of the largest humanitarian crises since World War II. Although international efforts have resulted in regaining control of important cities, these military approaches have escalated and inflamed the violence of which innocent civilians bear the consequences. The continuing violence and resulting threats or insecurities negatively affect the lives, freedom, dignity and development of the people to name but a few. For that reason, the aim is to explore the applicability of a human security approach to the conflict in Syria that focuses on, among other aspects, minimising violence, mitigating the effects of the conflict, protecting people, restoring peace and eliminating the grounds that resulted in the development of these conditions in the first place.

  5. A human protein interaction network shows conservation of aging processes between human and invertebrate species.

    Directory of Open Access Journals (Sweden)

    Russell Bell

    2009-03-01

    Full Text Available We have mapped a protein interaction network of human homologs of proteins that modify longevity in invertebrate species. This network is derived from a proteome-scale human protein interaction Core Network generated through unbiased high-throughput yeast two-hybrid searches. The longevity network is composed of 175 human homologs of proteins known to confer increased longevity through loss of function in yeast, nematode, or fly, and 2,163 additional human proteins that interact with these homologs. Overall, the network consists of 3,271 binary interactions among 2,338 unique proteins. A comparison of the average node degree of the human longevity homologs with random sets of proteins in the Core Network indicates that human homologs of longevity proteins are highly connected hubs with a mean node degree of 18.8 partners. Shortest path length analysis shows that proteins in this network are significantly more connected than would be expected by chance. To examine the relationship of this network to human aging phenotypes, we compared the genes encoding longevity network proteins to genes known to be changed transcriptionally during aging in human muscle. In the case of both the longevity protein homologs and their interactors, we observed enrichments for differentially expressed genes in the network. To determine whether homologs of human longevity interacting proteins can modulate life span in invertebrates, homologs of 18 human FRAP1 interacting proteins showing significant changes in human aging muscle were tested for effects on nematode life span using RNAi. Of 18 genes tested, 33% extended life span when knocked-down in Caenorhabditis elegans. These observations indicate that a broad class of longevity genes identified in invertebrate models of aging have relevance to human aging. They also indicate that the longevity protein interaction network presented here is enriched for novel conserved longevity proteins.

  6. Gaze-and-brain-controlled interfaces for human-computer and human-robot interaction

    Directory of Open Access Journals (Sweden)

    Shishkin S. L.

    2017-09-01

    Full Text Available Background. Human-machine interaction technology has greatly evolved during the last decades, but manual and speech modalities remain single output channels with their typical constraints imposed by the motor system’s information transfer limits. Will brain-computer interfaces (BCIs and gaze-based control be able to convey human commands or even intentions to machines in the near future? We provide an overview of basic approaches in this new area of applied cognitive research. Objective. We test the hypothesis that the use of communication paradigms and a combination of eye tracking with unobtrusive forms of registering brain activity can improve human-machine interaction. Methods and Results. Three groups of ongoing experiments at the Kurchatov Institute are reported. First, we discuss the communicative nature of human-robot interaction, and approaches to building a more e cient technology. Specifically, “communicative” patterns of interaction can be based on joint attention paradigms from developmental psychology, including a mutual “eye-to-eye” exchange of looks between human and robot. Further, we provide an example of “eye mouse” superiority over the computer mouse, here in emulating the task of selecting a moving robot from a swarm. Finally, we demonstrate a passive, noninvasive BCI that uses EEG correlates of expectation. This may become an important lter to separate intentional gaze dwells from non-intentional ones. Conclusion. The current noninvasive BCIs are not well suited for human-robot interaction, and their performance, when they are employed by healthy users, is critically dependent on the impact of the gaze on selection of spatial locations. The new approaches discussed show a high potential for creating alternative output pathways for the human brain. When support from passive BCIs becomes mature, the hybrid technology of the eye-brain-computer (EBCI interface will have a chance to enable natural, fluent, and the

  7. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  8. Human-Robot Interaction Directed Research Project

    Science.gov (United States)

    Rochlis, Jennifer; Ezer, Neta; Sandor, Aniko

    2011-01-01

    Human-robot interaction (HRI) is about understanding and shaping the interactions between humans and robots (Goodrich & Schultz, 2007). It is important to evaluate how the design of interfaces and command modalities affect the human s ability to perform tasks accurately, efficiently, and effectively (Crandall, Goodrich, Olsen Jr., & Nielsen, 2005) It is also critical to evaluate the effects of human-robot interfaces and command modalities on operator mental workload (Sheridan, 1992) and situation awareness (Endsley, Bolt , & Jones, 2003). By understanding the effects of interface design on human performance, workload, and situation awareness, interfaces can be developed that support the human in performing tasks with minimal errors and with appropriate interaction time and effort. Thus, the results of research on human-robot interfaces have direct implications for design. Because the factors associated with interfaces and command modalities in HRI are too numerous to address in 3 years of research, the proposed research concentrates on three manageable areas applicable to National Aeronautics and Space Administration (NASA) robot systems. These topic areas emerged from the Fiscal Year (FY) 2011 work that included extensive literature reviews and observations of NASA systems. The three topic areas are: 1) video overlays, 2) camera views, and 3) command modalities. Each area is described in detail below, along with relevance to existing NASA human-robot systems. In addition to studies in these three topic areas, a workshop is proposed for FY12. The workshop will bring together experts in human-robot interaction and robotics to discuss the state of the practice as applicable to research in space robotics. Studies proposed in the area of video overlays consider two factors in the implementation of augmented reality (AR) for operator displays during teleoperation. The first of these factors is the type of navigational guidance provided by AR symbology. In the proposed

  9. Human Work Interaction Design

    DEFF Research Database (Denmark)

    Gonçalves, Frederica; Campos, Pedro; Clemmensen, Torkil

    2015-01-01

    In this paper, we review research in the emerging practice and research field of Human Work Interaction Design (HWID). We present a HWID frame-work, and a sample of 54 papers from workshops, conferences and journals from the period 2009-2014. We group the papers into six topical groups, and then ...

  10. Human security and the quest for peace in the Middle East, 24 October 2006, University of Maryland

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2006-10-24

    In his talk about 'Human Security And The Quest For Peace In The Middle East' Dr. Mohamed ElBaradei, Director General of the IAEA, first looked at the international security landscape and then focused on the Middle East as a case in point. According to a recent report on human security, there has been a sharp decline since the early 1990s in civil wars and other forms of armed conflict. The number of refugees has also gone down, and human rights abuses have decreased. These statistics indicate that the world is becoming more peaceful. Yet at the same time, the collective sense of insecurity is higher than at any time before, because the forces that drive insecurity remain persistent and pervasive. These drivers of insecurity fit into four categories: poverty (poverty-related insecurities, for the billions who lack access to reliable food supplies, safe drinking water, adequate health care, and modern energy supplies), the lack of good governance, the sense of injustice (resulting from the imbalance between the 'haves' and the 'have nots' and the artificial polarization along religious or ethnic lines. The modern age demands that we think in terms of human security - a concept of security that is people centered and without borders. A concept that acknowledges the inherent linkages between economic and social development, respect for human rights, and peace. This is the basis on which we must 're-engineer' security. UN bodies have succeeded in setting norms and overseeing many important aspects of our life - such as labour relations, global health, civil aviation, food and agriculture, and trade. Despite these achievements, however the system often fails short in addressing threats to international peace and security. To understand the urgency of reforming our system for maintaining international peace and security, we must also look critically at situations where it has not been able to adequately fulfill its function. Three aspects in that regard are to be

  11. Human security and the quest for peace in the Middle East, 24 October 2006, University of Maryland

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2006-01-01

    In his talk about 'Human Security And The Quest For Peace In The Middle East' Dr. Mohamed ElBaradei, Director General of the IAEA, first looked at the international security landscape and then focused on the Middle East as a case in point. According to a recent report on human security, there has been a sharp decline since the early 1990s in civil wars and other forms of armed conflict. The number of refugees has also gone down, and human rights abuses have decreased. These statistics indicate that the world is becoming more peaceful. Yet at the same time, the collective sense of insecurity is higher than at any time before, because the forces that drive insecurity remain persistent and pervasive. These drivers of insecurity fit into four categories: poverty (poverty-related insecurities, for the billions who lack access to reliable food supplies, safe drinking water, adequate health care, and modern energy supplies), the lack of good governance, the sense of injustice (resulting from the imbalance between the 'haves' and the 'have nots' and the artificial polarization along religious or ethnic lines. The modern age demands that we think in terms of human security - a concept of security that is people centered and without borders. A concept that acknowledges the inherent linkages between economic and social development, respect for human rights, and peace. This is the basis on which we must 're-engineer' security. UN bodies have succeeded in setting norms and overseeing many important aspects of our life - such as labour relations, global health, civil aviation, food and agriculture, and trade. Despite these achievements, however the system often fails short in addressing threats to international peace and security. To understand the urgency of reforming our system for maintaining international peace and security, we must also look critically at situations where it has not been able to adequately fulfill its function. Three aspects in that regard are to be

  12. Human trafficking in Southeast Asia and U.S. national security

    OpenAIRE

    Snoke, Joshua H.

    2015-01-01

    Approved for public release; distribution is unlimited The United States government finds human trafficking to be an important subject and is placing increasing focus on the issue. The Southeast Asian portion of the Western Pacific encompasses a substantial portion of global trafficking, much of which has a final destination in the United States. This thesis asks the following question: How does trafficking in persons (TIP) affect U.S. national security interests and regional stability in ...

  13. Transactional costs of the interaction between business and government as a threat to the economic security of the state

    Directory of Open Access Journals (Sweden)

    Evmenov Aleksandr

    2018-01-01

    Full Text Available The article considers the costs of the interaction between the state and business as a threat to the development of the economy of the Russian Federation from the point of view of ensuring economic security. The authors identified significant obstacles both from the business and from the government side, which pose a threat to economic security. The study is of interest for the further development of a system of providing the economic security of the Russian Federation.

  14. Social interactions through the eyes of macaques and humans.

    Directory of Open Access Journals (Sweden)

    Richard McFarland

    Full Text Available Group-living primates frequently interact with each other to maintain social bonds as well as to compete for valuable resources. Observing such social interactions between group members provides individuals with essential information (e.g. on the fighting ability or altruistic attitude of group companions to guide their social tactics and choice of social partners. This process requires individuals to selectively attend to the most informative content within a social scene. It is unclear how non-human primates allocate attention to social interactions in different contexts, and whether they share similar patterns of social attention to humans. Here we compared the gaze behaviour of rhesus macaques and humans when free-viewing the same set of naturalistic images. The images contained positive or negative social interactions between two conspecifics of different phylogenetic distance from the observer; i.e. affiliation or aggression exchanged by two humans, rhesus macaques, Barbary macaques, baboons or lions. Monkeys directed a variable amount of gaze at the two conspecific individuals in the images according to their roles in the interaction (i.e. giver or receiver of affiliation/aggression. Their gaze distribution to non-conspecific individuals was systematically varied according to the viewed species and the nature of interactions, suggesting a contribution of both prior experience and innate bias in guiding social attention. Furthermore, the monkeys' gaze behavior was qualitatively similar to that of humans, especially when viewing negative interactions. Detailed analysis revealed that both species directed more gaze at the face than the body region when inspecting individuals, and attended more to the body region in negative than in positive social interactions. Our study suggests that monkeys and humans share a similar pattern of role-sensitive, species- and context-dependent social attention, implying a homologous cognitive mechanism of

  15. Maternal secure-base scripts and children's attachment security in an adopted sample.

    Science.gov (United States)

    Veríssimo, Manuela; Salvaterra, Fernanda

    2006-09-01

    Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth

  16. Neural correlate of human reciprocity in social interactions.

    Science.gov (United States)

    Sakaiya, Shiro; Shiraito, Yuki; Kato, Junko; Ide, Hiroko; Okada, Kensuke; Takano, Kouji; Kansaku, Kenji

    2013-01-01

    Reciprocity plays a key role maintaining cooperation in society. However, little is known about the neural process that underpins human reciprocity during social interactions. Our neuroimaging study manipulated partner identity (computer, human) and strategy (random, tit-for-tat) in repeated prisoner's dilemma games and investigated the neural correlate of reciprocal interaction with humans. Reciprocal cooperation with humans but exploitation of computers by defection was associated with activation in the left amygdala. Amygdala activation was also positively and negatively correlated with a preference change for human partners following tit-for-tat and random strategies, respectively. The correlated activation represented the intensity of positive feeling toward reciprocal and negative feeling toward non-reciprocal partners, and so reflected reciprocity in social interaction. Reciprocity in social interaction, however, might plausibly be misinterpreted and so we also examined the neural coding of insight into the reciprocity of partners. Those with and without insight revealed differential brain activation across the reward-related circuitry (i.e., the right middle dorsolateral prefrontal cortex and dorsal caudate) and theory of mind (ToM) regions [i.e., ventromedial prefrontal cortex (VMPFC) and precuneus]. Among differential activations, activation in the precuneus, which accompanied deactivation of the VMPFC, was specific to those without insight into human partners who were engaged in a tit-for-tat strategy. This asymmetric (de)activation might involve specific contributions of ToM regions to the human search for reciprocity. Consequently, the intensity of emotion attached to human reciprocity was represented in the amygdala, whereas insight into the reciprocity of others was reflected in activation across the reward-related and ToM regions. This suggests the critical role of mentalizing, which was not equated with reward expectation during social interactions.

  17. Neural correlate of human reciprocity in social interactions

    Directory of Open Access Journals (Sweden)

    Shiro eSakaiya

    2013-12-01

    Full Text Available Reciprocity plays a key role maintaining cooperation in society. However, little is known about the neural process that underpins human reciprocity during social interactions. Our neuroimaging study manipulated partner identity (computer, human and strategy (random, tit-for-tat in repeated prisoner’s dilemma games and investigated the neural correlate of reciprocal interaction with humans. Reciprocal cooperation with humans but exploitation of computers by defection was associated with activation in the left amygdala. Amygdala activation was also positively and negatively correlated with a preference change for human partners following tit-for-tat and random strategies, respectively. The correlated activation represented the intensity of positive feeling toward reciprocal and negative feeling toward non-reciprocal partners, and so reflected reciprocity in social interaction. Reciprocity in social interaction, however, might plausibly be misinterpreted and so we also examined the neural coding of insight into the reciprocity of partners. Those with and without insight revealed differential brain activation across the reward-related circuitry (i.e., the right middle dorsolateral prefrontal cortex and dorsal caudate and theory of mind (ToM regions (i.e., ventromedial prefrontal cortex [VMPFC] and precuneus. Among differential activations, activation in the precuneus, which accompanied deactivation of the VMPFC, was specific to those without insight into human partners who were engaged in a tit-for-tat strategy. This asymmetric (deactivation might involve specific contributions of ToM regions to the human search for reciprocity. Consequently, the intensity of emotion attached to human reciprocity was represented in the amygdala, whereas insight into the reciprocity of others was reflected in activation across the reward-related and ToM regions. This suggests the critical role of mentalizing, which was not equated with reward expectation during

  18. Interaction of Citrinin with Human Serum Albumin

    Directory of Open Access Journals (Sweden)

    Miklós Poór

    2015-12-01

    Full Text Available Citrinin (CIT is a mycotoxin produced by several Aspergillus, Penicillium, and Monascus species. CIT occurs worldwide in different foods and drinks and causes health problems for humans and animals. Human serum albumin (HSA is the most abundant plasma protein in human circulation. Albumin forms stable complexes with many drugs and xenobiotics; therefore, HSA commonly plays important role in the pharmacokinetics or toxicokinetics of numerous compounds. However, the interaction of CIT with HSA is poorly characterized yet. In this study, the complex formation of CIT with HSA was investigated using fluorescence spectroscopy and ultrafiltration techniques. For the deeper understanding of the interaction, thermodynamic, and molecular modeling studies were performed as well. Our results suggest that CIT forms stable complex with HSA (logK ~ 5.3 and its primary binding site is located in subdomain IIA (Sudlow’s Site I. In vitro cell experiments also recommend that CIT-HSA interaction may have biological relevance. Finally, the complex formations of CIT with bovine, porcine, and rat serum albumin were investigated, in order to test the potential species differences of CIT-albumin interactions.

  19. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  20. Unmasking the social engineer the human element of security

    CERN Document Server

    Hadnagy, Christopher

    2014-01-01

    Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the c

  1. Policy for securing human resources in the nuclear industry of Japan

    International Nuclear Information System (INIS)

    Takeuchi, S.

    1993-01-01

    The shortage of human resources in the field of nuclear industry in Japan is due to: structural difficulty resulting from the prevailing labor shortage in Japan, difficulties from the ever-intensifying adverse wind against nuclear power, and difficulties specific to R and D organizations. A practical plan is proposed for securing qualified personnel: approach to be directly made on campuses; effective/advanced management of human resources; better treatment and fringe benefit; promoting the nuclear industry attractiveness; expanding the scope of basic and fundamental researches; regaining the public confidence; closer cooperation between the government and the nuclear power groups. 6 figs

  2. A Physical Interaction Network of Dengue Virus and Human Proteins*

    Science.gov (United States)

    Khadka, Sudip; Vangeloff, Abbey D.; Zhang, Chaoying; Siddavatam, Prasad; Heaton, Nicholas S.; Wang, Ling; Sengupta, Ranjan; Sahasrabudhe, Sudhir; Randall, Glenn; Gribskov, Michael; Kuhn, Richard J.; Perera, Rushika; LaCount, Douglas J.

    2011-01-01

    Dengue virus (DENV), an emerging mosquito-transmitted pathogen capable of causing severe disease in humans, interacts with host cell factors to create a more favorable environment for replication. However, few interactions between DENV and human proteins have been reported to date. To identify DENV-human protein interactions, we used high-throughput yeast two-hybrid assays to screen the 10 DENV proteins against a human liver activation domain library. From 45 DNA-binding domain clones containing either full-length viral genes or partially overlapping gene fragments, we identified 139 interactions between DENV and human proteins, the vast majority of which are novel. These interactions involved 105 human proteins, including six previously implicated in DENV infection and 45 linked to the replication of other viruses. Human proteins with functions related to the complement and coagulation cascade, the centrosome, and the cytoskeleton were enriched among the DENV interaction partners. To determine if the cellular proteins were required for DENV infection, we used small interfering RNAs to inhibit their expression. Six of 12 proteins targeted (CALR, DDX3X, ERC1, GOLGA2, TRIP11, and UBE2I) caused a significant decrease in the replication of a DENV replicon. We further showed that calreticulin colocalized with viral dsRNA and with the viral NS3 and NS5 proteins in DENV-infected cells, consistent with a direct role for calreticulin in DENV replication. Human proteins that interacted with DENV had significantly higher average degree and betweenness than expected by chance, which provides additional support for the hypothesis that viruses preferentially target cellular proteins that occupy central position in the human protein interaction network. This study provides a valuable starting point for additional investigations into the roles of human proteins in DENV infection. PMID:21911577

  3. A physical interaction network of dengue virus and human proteins.

    Science.gov (United States)

    Khadka, Sudip; Vangeloff, Abbey D; Zhang, Chaoying; Siddavatam, Prasad; Heaton, Nicholas S; Wang, Ling; Sengupta, Ranjan; Sahasrabudhe, Sudhir; Randall, Glenn; Gribskov, Michael; Kuhn, Richard J; Perera, Rushika; LaCount, Douglas J

    2011-12-01

    Dengue virus (DENV), an emerging mosquito-transmitted pathogen capable of causing severe disease in humans, interacts with host cell factors to create a more favorable environment for replication. However, few interactions between DENV and human proteins have been reported to date. To identify DENV-human protein interactions, we used high-throughput yeast two-hybrid assays to screen the 10 DENV proteins against a human liver activation domain library. From 45 DNA-binding domain clones containing either full-length viral genes or partially overlapping gene fragments, we identified 139 interactions between DENV and human proteins, the vast majority of which are novel. These interactions involved 105 human proteins, including six previously implicated in DENV infection and 45 linked to the replication of other viruses. Human proteins with functions related to the complement and coagulation cascade, the centrosome, and the cytoskeleton were enriched among the DENV interaction partners. To determine if the cellular proteins were required for DENV infection, we used small interfering RNAs to inhibit their expression. Six of 12 proteins targeted (CALR, DDX3X, ERC1, GOLGA2, TRIP11, and UBE2I) caused a significant decrease in the replication of a DENV replicon. We further showed that calreticulin colocalized with viral dsRNA and with the viral NS3 and NS5 proteins in DENV-infected cells, consistent with a direct role for calreticulin in DENV replication. Human proteins that interacted with DENV had significantly higher average degree and betweenness than expected by chance, which provides additional support for the hypothesis that viruses preferentially target cellular proteins that occupy central position in the human protein interaction network. This study provides a valuable starting point for additional investigations into the roles of human proteins in DENV infection.

  4. Humans, computers and wizards human (simulated) computer interaction

    CERN Document Server

    Fraser, Norman; McGlashan, Scott; Wooffitt, Robin

    2013-01-01

    Using data taken from a major European Union funded project on speech understanding, the SunDial project, this book considers current perspectives on human computer interaction and argues for the value of an approach taken from sociology which is based on conversation analysis.

  5. Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device

    Directory of Open Access Journals (Sweden)

    Hyun-Woo Kim

    2014-01-01

    Full Text Available Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  6. Time pattern locking scheme for secure multimedia contents in human-centric device.

    Science.gov (United States)

    Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik

    2014-01-01

    Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  7. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  8. Interacting forms of expertise in security governance: the example of CCTV surveillance at Geneva International Airport.

    Science.gov (United States)

    Klauser, Francisco

    2009-06-01

    The paper investigates the multiple public-private exchanges and cooperation involved in the installation and development of CCTV surveillance at Geneva International Airport. Emphasis is placed on the interacting forms of authority and expertise of five parties: the user(s), owner and supplier of the camera system, as well as the technical managers of the airport and the Swiss regulatory bodies in airport security. While placing the issues of airport surveillance in the particular context of a specific range of projects and transformations relating to the developments of CCTV at Geneva Airport, the paper not only provides important insights into the micro-politics of surveillance at Geneva Airport, but aims to re-institute these as part of a broader 'problematic': the mediating role of expertise and the growing functional fragmentation of authority in contemporary security governance. On this basis, the paper also exemplifies the growing mutual interdependences between security and business interests in the ever growing 'surveillant assemblage' in contemporary security governance.

  9. Human-Computer Interaction in Smart Environments

    Science.gov (United States)

    Paravati, Gianluca; Gatteschi, Valentina

    2015-01-01

    Here, we provide an overview of the content of the Special Issue on “Human-computer interaction in smart environments”. The aim of this Special Issue is to highlight technologies and solutions encompassing the use of mass-market sensors in current and emerging applications for interacting with Smart Environments. Selected papers address this topic by analyzing different interaction modalities, including hand/body gestures, face recognition, gaze/eye tracking, biosignal analysis, speech and activity recognition, and related issues.

  10. Human interactions with sirenians (manatees and dugongs)

    Science.gov (United States)

    Bonde, Robert K.; Flint, Mark

    2017-01-01

    There are three extant sirenian species of the Trichechidae family and one living Dugongidae family member. Given their close ties to coastal and often urbanized habitats, sirenians are exposed to many types of anthropogenic activities that result in challenges to their well-being, poor health, and even death. In the wild, they are exposed to direct and indirect local pressures as well as subject to large-scale stressors such as global climate change acting on regions or entire genetic stocks. In captivity, they are subject to husbandry and management practices based on our collective knowledge, or in some cases lack thereof, of their needs and welfare. It is therefore reasonable to consider that their current imperiled status is very closely linked to our actions. In this chapter, we identify and define human interactions that may impact dugongs and manatees, including hunting, fisheries, boat interactions, negative interactions with man-made structures, disease and contaminants, and global climate change. We examine techniques used to investigate these impacts and the influence of sirenian biology and of changing human behaviors on potential outcomes. We examine how this differs for dugongs and manatees in the wild and for those held in captivity. Finally, we provide possible mitigation strategies and ways to assess the efforts we are making to improve the welfare of individuals and to conserve these species. This chapter identifies how the welfare of these species is intrinsically linked to the human interactions these animals experience, and how the nature of these interactions has changed with societal shifts. We proffer suggested ways to minimize negative impacts. Current knowledge should be used to minimize negative human interactions and impacts, to promote positive impacts, and to protect these animals for the future.

  11. A roadmap for security challenges in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Arbia Riahi Sfar

    2018-04-01

    Full Text Available Unquestionably, communicating entities (object, or things in the Internet of Things (IoT context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the IoT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the IoT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current standardization activities are surveyed and discussed to the ensure the security of IoT components and applications. Keywords: Internet of Things, Systemic and cognitive approach, Security, Privacy, Trust, Identification, Access control

  12. A Secure Behavior Modification Sensor System for Physical Activity Improvement

    Science.gov (United States)

    Price, Alan

    2011-01-01

    Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit. In this research, exploration was…

  13. EDUCATIONAL NETWORKING: HUMAN VIEW TO CYBER DEFENSE

    Directory of Open Access Journals (Sweden)

    Oleksandr Yu. Burov

    2016-05-01

    Full Text Available Networks play more and more important role for human life and activity, both in critical occupations (aviation, power industry, military missions etc., and in everyday life (home computers, education, leisure. Interaction between human and other elements of human-machine system have changed, because they coincide in the information habitat. Human-system integration has reached new level of defense needs. The paper will introduce features of information society in respect of a human and corresponding changes in HF/E: (1 information becomes a tool, goal, mean and environment of a human activity, (2 it becomes a part of the human nature and this makes him/her unprotected, (3 human psycho-physiological status becomes not only a basis of effective performance, but an object of control and support, and means of a human security and safety should be a part of information habitat, (4 networking environment becomes an independent actor in a human activity. Accompanying cyber-security challenges and tasks are discussed, as well as types of networking threats and Human View regarding the cyber security challenges.

  14. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  15. Human-Computer Interaction in Smart Environments

    Directory of Open Access Journals (Sweden)

    Gianluca Paravati

    2015-08-01

    Full Text Available Here, we provide an overview of the content of the Special Issue on “Human-computer interaction in smart environments”. The aim of this Special Issue is to highlight technologies and solutions encompassing the use of mass-market sensors in current and emerging applications for interacting with Smart Environments. Selected papers address this topic by analyzing different interaction modalities, including hand/body gestures, face recognition, gaze/eye tracking, biosignal analysis, speech and activity recognition, and related issues.

  16. Interactively human: Sharing time, constructing materiality.

    Science.gov (United States)

    Roepstorff, Andreas

    2013-06-01

    Predictive processing models of cognition are promising an elegant way to unite action, perception, and learning. However, in the current formulations, they are species-unspecific and have very little particularly human about them. I propose to examine how, in this framework, humans can be able to massively interact and to build shared worlds that are both material and symbolic.

  17. A scored human protein-protein interaction network to catalyze genomic interpretation

    DEFF Research Database (Denmark)

    Li, Taibo; Wernersson, Rasmus; Hansen, Rasmus B

    2017-01-01

    Genome-scale human protein-protein interaction networks are critical to understanding cell biology and interpreting genomic data, but challenging to produce experimentally. Through data integration and quality control, we provide a scored human protein-protein interaction network (InWeb_InBioMap,......Genome-scale human protein-protein interaction networks are critical to understanding cell biology and interpreting genomic data, but challenging to produce experimentally. Through data integration and quality control, we provide a scored human protein-protein interaction network (In...

  18. Human Security in the Context of Sudan's State Crisis: The Case of ...

    African Journals Online (AJOL)

    ... lost more than 5 million citizens in civil wars. A violent confl ict erupted in 2003, with more than 250 000 civilians killed and more than 2 million people displaced. This article traces and examines the genesis and magnitude of human security challenges in the Darfur region of the Sudan. Africa Insight Vol. 37 (4) 2008 pp.

  19. Human-machine interaction in nuclear power plants

    International Nuclear Information System (INIS)

    Yoshikawa, Hidekazu

    2005-01-01

    Advanced nuclear power plants are generally large complex systems automated by computers. Whenever a rate plant emergency occurs the plant operators must cope with the emergency under severe mental stress without committing any fatal errors. Furthermore, the operators must train to improve and maintain their ability to cope with every conceivable situation, though it is almost impossible to be fully prepared for an infinite variety of situations. In view of the limited capability of operators in emergency situations, there has been a new approach to preventing the human error caused by improper human-machine interaction. The new approach has been triggered by the introduction of advanced information systems that help operators recognize and counteract plant emergencies. In this paper, the adverse effect of automation in human-machine systems is explained. The discussion then focuses on how to configure a joint human-machine system for ideal human-machine interaction. Finally, there is a new proposal on how to organize technologies that recognize the different states of such a joint human-machine system

  20. Virtual-Reality training system for nuclear security

    International Nuclear Information System (INIS)

    Nonaka, Nobuyuki

    2012-01-01

    At the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency, the virtual reality (VR) training system is under development for providing a practical training environment to implement experience-oriented and interactive lessons on nuclear security for wide range of participants in human resource development assistance program mainly to Asian emerging nuclear-power countries. This system electrically recreates and visualizes nuclear facilities and training conditions in stereoscopic (3D) view on a large-scale display (CAVE system) as virtual reality training facility (VR facility) and it provides training participants with effective environments to learn installation and layout of security equipment in the facility testing and verifying visually the protection performances under various situations such as changes in day-night lighting and weather conditions, which may lead to practical exercise in the design and evaluation of the physical protection system. This paper introduces basic concept of the system and outline of training programs as well as featured aspects in using the VR technology for the nuclear security. (author)

  1. Discriminative Vision-Based Recovery and Recognition of Human Motion

    NARCIS (Netherlands)

    Poppe, Ronald Walter

    2009-01-01

    The automatic analysis of human motion from images opens up the way for applications in the domains of security and surveillance, human-computer interaction, animation, retrieval and sports motion analysis. In this dissertation, the focus is on robust and fast human pose recovery and action

  2. Predictive Mechanisms Are Not Involved the Same Way during Human-Human vs. Human-Machine Interactions: A Review

    Directory of Open Access Journals (Sweden)

    Aïsha Sahaï

    2017-10-01

    Full Text Available Nowadays, interactions with others do not only involve human peers but also automated systems. Many studies suggest that the motor predictive systems that are engaged during action execution are also involved during joint actions with peers and during other human generated action observation. Indeed, the comparator model hypothesis suggests that the comparison between a predicted state and an estimated real state enables motor control, and by a similar functioning, understanding and anticipating observed actions. Such a mechanism allows making predictions about an ongoing action, and is essential to action regulation, especially during joint actions with peers. Interestingly, the same comparison process has been shown to be involved in the construction of an individual's sense of agency, both for self-generated and observed other human generated actions. However, the implication of such predictive mechanisms during interactions with machines is not consensual, probably due to the high heterogeneousness of the automata used in the experimentations, from very simplistic devices to full humanoid robots. The discrepancies that are observed during human/machine interactions could arise from the absence of action/observation matching abilities when interacting with traditional low-level automata. Consistently, the difficulties to build a joint agency with this kind of machines could stem from the same problem. In this context, we aim to review the studies investigating predictive mechanisms during social interactions with humans and with automated artificial systems. We will start by presenting human data that show the involvement of predictions in action control and in the sense of agency during social interactions. Thereafter, we will confront this literature with data from the robotic field. Finally, we will address the upcoming issues in the field of robotics related to automated systems aimed at acting as collaborative agents.

  3. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  4. The Past, Present and Future of Human Computer Interaction

    KAUST Repository

    Churchill, Elizabeth

    2018-01-16

    Human Computer Interaction (HCI) focuses on how people interact with, and are transformed by computation. Our current technology landscape is changing rapidly. Interactive applications, devices and services are increasingly becoming embedded into our environments. From our homes to the urban and rural spaces, we traverse everyday. We are increasingly able toヨoften required toヨmanage and configure multiple, interconnected devices and program their interactions. Artificial intelligence (AI) techniques are being used to create dynamic services that learn about us and others, that make conclusions about our intents and affiliations, and that mould our digital interactions based in predictions about our actions and needs, nudging us toward certain behaviors. Computation is also increasingly embedded into our bodies. Understanding human interactions in the everyday digital and physical context. During this lecture, Elizabeth Churchill -Director of User Experience at Google- will talk about how an emerging landscape invites us to revisit old methods and tactics for understanding how people interact with computers and computation, and how it challenges us to think about new methods and frameworks for understanding the future of human-centered computation.

  5. [Principles and methodology for ecological rehabilitation and security pattern design in key project construction].

    Science.gov (United States)

    Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian

    2007-03-01

    Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.

  6. Human-Computer Interaction The Agency Perspective

    CERN Document Server

    Oliveira, José

    2012-01-01

    Agent-centric theories, approaches and technologies are contributing to enrich interactions between users and computers. This book aims at highlighting the influence of the agency perspective in Human-Computer Interaction through a careful selection of research contributions. Split into five sections; Users as Agents, Agents and Accessibility, Agents and Interactions, Agent-centric Paradigms and Approaches, and Collective Agents, the book covers a wealth of novel, original and fully updated material, offering:   ü  To provide a coherent, in depth, and timely material on the agency perspective in HCI ü  To offer an authoritative treatment of the subject matter presented by carefully selected authors ü  To offer a balanced and broad coverage of the subject area, including, human, organizational, social, as well as technological concerns. ü  To offer a hands-on-experience by covering representative case studies and offering essential design guidelines   The book will appeal to a broad audience of resea...

  7. Interaction of an atypical Plasmodium falciparum ETRAMP with human apolipoproteins

    Directory of Open Access Journals (Sweden)

    Sahasrabudhe Sudhir

    2008-10-01

    Full Text Available Abstract Background In order to establish a successful infection in the human host, the malaria parasite Plasmodium falciparum must establish interactions with a variety of human proteins on the surface of different cell types, as well as with proteins inside the host cells. To better understand this aspect of malaria pathogenesis, a study was conducted with the goal of identifying interactions between proteins of the parasite and those of its human host. Methods A modified yeast two-hybrid methodology that preferentially selects protein fragments that can be expressed in yeast was used to conduct high-throughput screens with P. falciparum protein fragments against human liver and cerebellum libraries. The resulting dataset was analyzed to exclude interactions that are not likely to occur in the human host during infection. Results An initial set of 2,200 interactions was curated to remove proteins that are unlikely to play a role in pathogenesis based on their annotation or localization, and proteins that behave promiscuously in the two-hybrid assay, resulting in a final dataset of 456 interactions. A cluster that implicates binding between P. falciparum PFE1590w/ETRAMP5, a putative parasitophorous vacuole membrane protein, and human apolipoproteins ApoA, ApoB and ApoE was selected for further analysis. Different isoforms of ApoE, which are associated with different outcomes of malaria infection, were shown to display differential interactions with PFE1590w. Conclusion A dataset of interactions between proteins of P. falciparum and those of its human host was generated. The preferential interaction of the P. falciparum PFE1590w protein with the human ApoE ε3 and ApoE ε4 isoforms, but not the ApoE ε2 isoform, supports the hypothesis that ApoE genotype affects risk of malaria infection. The dataset contains other interactions of potential relevance to disease that may identify possible vaccine candidates and drug targets.

  8. Human work interaction design meets international development

    DEFF Research Database (Denmark)

    Campos, P.; Clemmensen, T.; Barricelli, B.R.

    2017-01-01

    opportunity to observe technology-mediated innovative work practices in informal settings that may be related to the notion of International Development. In this unique context, this workshop proposes to analyze findings related to opportunities for design research in this type of work domains: a) human......Over the last decade, empirical relationships between work domain analysis and HCI design have been identified by much research in the field of Human Work Interaction Design (HWID) across five continents. Since this workshop takes place at the Interact Conference in Mumbai, there is a unique...

  9. Study on Human-structure Dynamic Interaction in Civil Engineering

    Science.gov (United States)

    Gao, Feng; Cao, Li Lin; Li, Xing Hua

    2018-06-01

    The research of human-structure dynamic interaction are reviewed. Firstly, the influence of the crowd load on structural dynamic characteristics is introduced and the advantages and disadvantages of different crowd load models are analyzed. Then, discussing the influence of structural vibration on the human-induced load, especially the influence of different stiffness structures on the crowd load. Finally, questions about human-structure interaction that require further study are presented.

  10. Metabolic interaction between toluene, trichloroethylene and n-hexane in humans

    DEFF Research Database (Denmark)

    Bælum, Jesper; Mølhave, Lars; Hansen, S H

    1998-01-01

    This human experimental study describes the mutual metabolic interaction between toluene, trichloroethylene, and n-hexane.......This human experimental study describes the mutual metabolic interaction between toluene, trichloroethylene, and n-hexane....

  11. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  12. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  13. Neural Signatures of Trust During Human-Automation Interactions

    Science.gov (United States)

    2016-04-01

    also automated devices such as a Global Positioning System. For instance, to provide advanced safety measures, the Transportation Safety...AFRL-AFOSR-VA-TR-2016-0160 Neural Signatures of Trust during Human- Automation Interactions Frank Krueger GEORGE MASON UNIVERSITY Final Report 04/01...SUBTITLE Neural Signatures of Trust during Human- Automation Interactions 5a. CONTRACT NUMBER FA9550-13-1-0017 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  14. Advancements in Violin-Related Human-Computer Interaction

    DEFF Research Database (Denmark)

    Overholt, Daniel

    2014-01-01

    of human intelligence and emotion is at the core of the Musical Interface Technology Design Space, MITDS. This is a framework that endeavors to retain and enhance such traits of traditional instruments in the design of interactive live performance interfaces. Utilizing the MITDS, advanced Human...

  15. Human-wildlife interaction in Serengeti and Ngorongoro districts

    African Journals Online (AJOL)

    Mgina

    animals for reptile farms, ecologically focused small mammal management ... Magige - Human-wildlife interaction in Serengeti and Ngorongoro districts of Tanzania … 96 ... Information about attitudes of ..... interface: Interactions around Tilden.

  16. Inferring high-confidence human protein-protein interactions

    Directory of Open Access Journals (Sweden)

    Yu Xueping

    2012-05-01

    Full Text Available Abstract Background As numerous experimental factors drive the acquisition, identification, and interpretation of protein-protein interactions (PPIs, aggregated assemblies of human PPI data invariably contain experiment-dependent noise. Ascertaining the reliability of PPIs collected from these diverse studies and scoring them to infer high-confidence networks is a non-trivial task. Moreover, a large number of PPIs share the same number of reported occurrences, making it impossible to distinguish the reliability of these PPIs and rank-order them. For example, for the data analyzed here, we found that the majority (>83% of currently available human PPIs have been reported only once. Results In this work, we proposed an unsupervised statistical approach to score a set of diverse, experimentally identified PPIs from nine primary databases to create subsets of high-confidence human PPI networks. We evaluated this ranking method by comparing it with other methods and assessing their ability to retrieve protein associations from a number of diverse and independent reference sets. These reference sets contain known biological data that are either directly or indirectly linked to interactions between proteins. We quantified the average effect of using ranked protein interaction data to retrieve this information and showed that, when compared to randomly ranked interaction data sets, the proposed method created a larger enrichment (~134% than either ranking based on the hypergeometric test (~109% or occurrence ranking (~46%. Conclusions From our evaluations, it was clear that ranked interactions were always of value because higher-ranked PPIs had a higher likelihood of retrieving high-confidence experimental data. Reducing the noise inherent in aggregated experimental PPIs via our ranking scheme further increased the accuracy and enrichment of PPIs derived from a number of biologically relevant data sets. These results suggest that using our high

  17. Humor in Human-Computer Interaction : A Short Survey

    NARCIS (Netherlands)

    Nijholt, Anton; Niculescu, Andreea; Valitutti, Alessandro; Banchs, Rafael E.; Joshi, Anirudha; Balkrishan, Devanuj K.; Dalvi, Girish; Winckler, Marco

    2017-01-01

    This paper is a short survey on humor in human-computer interaction. It describes how humor is designed and interacted with in social media, virtual agents, social robots and smart environments. Benefits and future use of humor in interactions with artificial entities are discussed based on

  18. Drum-mate: interaction dynamics and gestures in human-humanoid drumming experiments

    Science.gov (United States)

    Kose-Bagci, Hatice; Dautenhahn, Kerstin; Syrdal, Dag S.; Nehaniv, Chrystopher L.

    2010-06-01

    This article investigates the role of interaction kinesics in human-robot interaction (HRI). We adopted a bottom-up, synthetic approach towards interactive competencies in robots using simple, minimal computational models underlying the robot's interaction dynamics. We present two empirical, exploratory studies investigating a drumming experience with a humanoid robot (KASPAR) and a human. In the first experiment, the turn-taking behaviour of the humanoid is deterministic and the non-verbal gestures of the robot accompany its drumming to assess the impact of non-verbal gestures on the interaction. The second experiment studies a computational framework that facilitates emergent turn-taking dynamics, whereby the particular dynamics of turn-taking emerge from the social interaction between the human and the humanoid. The results from the HRI experiments are presented and analysed qualitatively (in terms of the participants' subjective experiences) and quantitatively (concerning the drumming performance of the human-robot pair). The results point out a trade-off between the subjective evaluation of the drumming experience from the perspective of the participants and the objective evaluation of the drumming performance. A certain number of gestures was preferred as a motivational factor in the interaction. The participants preferred the models underlying the robot's turn-taking which enable the robot and human to interact more and provide turn-taking closer to 'natural' human-human conversations, despite differences in objective measures of drumming behaviour. The results are consistent with the temporal behaviour matching hypothesis previously proposed in the literature which concerns the effect that the participants adapt their own interaction dynamics to the robot's.

  19. Haptic Human-Human Interaction Through a Compliant Connection Does Not Improve Motor Learning in a Force Field

    NARCIS (Netherlands)

    Beckers, Niek; Keemink, Arvid; van Asseldonk, Edwin; van der Kooij, Herman; Prattichizzo, Domenico; Shinoda, Hiroyuki; Tan, Hong Z.; Ruffaldi, Emanuele; Frisoli, Antonio

    2018-01-01

    Humans have a natural ability to haptically interact with other humans, for instance during physically assisting a child to learn how to ride a bicycle. A recent study has shown that haptic human-human interaction can improve individual motor performance and motor learning rate while learning to

  20. Minimal mobile human computer interaction

    NARCIS (Netherlands)

    el Ali, A.

    2013-01-01

    In the last 20 years, the widespread adoption of personal, mobile computing devices in everyday life, has allowed entry into a new technological era in Human Computer Interaction (HCI). The constant change of the physical and social context in a user's situation made possible by the portability of

  1. Human agency beliefs influence behaviour during virtual social interactions.

    Science.gov (United States)

    Caruana, Nathan; Spirou, Dean; Brock, Jon

    2017-01-01

    In recent years, with the emergence of relatively inexpensive and accessible virtual reality technologies, it is now possible to deliver compelling and realistic simulations of human-to-human interaction. Neuroimaging studies have shown that, when participants believe they are interacting via a virtual interface with another human agent, they show different patterns of brain activity compared to when they know that their virtual partner is computer-controlled. The suggestion is that users adopt an "intentional stance" by attributing mental states to their virtual partner. However, it remains unclear how beliefs in the agency of a virtual partner influence participants' behaviour and subjective experience of the interaction. We investigated this issue in the context of a cooperative "joint attention" game in which participants interacted via an eye tracker with a virtual onscreen partner, directing each other's eye gaze to different screen locations. Half of the participants were correctly informed that their partner was controlled by a computer algorithm ("Computer" condition). The other half were misled into believing that the virtual character was controlled by a second participant in another room ("Human" condition). Those in the "Human" condition were slower to make eye contact with their partner and more likely to try and guide their partner before they had established mutual eye contact than participants in the "Computer" condition. They also responded more rapidly when their partner was guiding them, although the same effect was also found for a control condition in which they responded to an arrow cue. Results confirm the influence of human agency beliefs on behaviour in this virtual social interaction context. They further suggest that researchers and developers attempting to simulate social interactions should consider the impact of agency beliefs on user experience in other social contexts, and their effect on the achievement of the application's goals.

  2. You Look Human, But Act Like a Machine: Agent Appearance and Behavior Modulate Different Aspects of Human-Robot Interaction.

    Science.gov (United States)

    Abubshait, Abdulaziz; Wiese, Eva

    2017-01-01

    Gaze following occurs automatically in social interactions, but the degree to which gaze is followed depends on whether an agent is perceived to have a mind, making its behavior socially more relevant for the interaction. Mind perception also modulates the attitudes we have toward others, and determines the degree of empathy, prosociality, and morality invested in social interactions. Seeing mind in others is not exclusive to human agents, but mind can also be ascribed to non-human agents like robots, as long as their appearance and/or behavior allows them to be perceived as intentional beings. Previous studies have shown that human appearance and reliable behavior induce mind perception to robot agents, and positively affect attitudes and performance in human-robot interaction. What has not been investigated so far is whether different triggers of mind perception have an independent or interactive effect on attitudes and performance in human-robot interaction. We examine this question by manipulating agent appearance (human vs. robot) and behavior (reliable vs. random) within the same paradigm and examine how congruent (human/reliable vs. robot/random) versus incongruent (human/random vs. robot/reliable) combinations of these triggers affect performance (i.e., gaze following) and attitudes (i.e., agent ratings) in human-robot interaction. The results show that both appearance and behavior affect human-robot interaction but that the two triggers seem to operate in isolation, with appearance more strongly impacting attitudes, and behavior more strongly affecting performance. The implications of these findings for human-robot interaction are discussed.

  3. When Humanoid Robots Become Human-Like Interaction Partners: Corepresentation of Robotic Actions

    Science.gov (United States)

    Stenzel, Anna; Chinellato, Eris; Bou, Maria A. Tirado; del Pobil, Angel P.; Lappe, Markus; Liepelt, Roman

    2012-01-01

    In human-human interactions, corepresenting a partner's actions is crucial to successfully adjust and coordinate actions with others. Current research suggests that action corepresentation is restricted to interactions between human agents facilitating social interaction with conspecifics. In this study, we investigated whether action…

  4. Ghost-in-the-Machine reveals human social signals for human-robot interaction.

    Science.gov (United States)

    Loth, Sebastian; Jettka, Katharina; Giuliani, Manuel; de Ruiter, Jan P

    2015-01-01

    We used a new method called "Ghost-in-the-Machine" (GiM) to investigate social interactions with a robotic bartender taking orders for drinks and serving them. Using the GiM paradigm allowed us to identify how human participants recognize the intentions of customers on the basis of the output of the robotic recognizers. Specifically, we measured which recognizer modalities (e.g., speech, the distance to the bar) were relevant at different stages of the interaction. This provided insights into human social behavior necessary for the development of socially competent robots. When initiating the drink-order interaction, the most important recognizers were those based on computer vision. When drink orders were being placed, however, the most important information source was the speech recognition. Interestingly, the participants used only a subset of the available information, focussing only on a few relevant recognizers while ignoring others. This reduced the risk of acting on erroneous sensor data and enabled them to complete service interactions more swiftly than a robot using all available sensor data. We also investigated socially appropriate response strategies. In their responses, the participants preferred to use the same modality as the customer's requests, e.g., they tended to respond verbally to verbal requests. Also, they added redundancy to their responses, for instance by using echo questions. We argue that incorporating the social strategies discovered with the GiM paradigm in multimodal grammars of human-robot interactions improves the robustness and the ease-of-use of these interactions, and therefore provides a smoother user experience.

  5. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    Directory of Open Access Journals (Sweden)

    Ani Kelechi Johnmary

    2014-04-01

    Full Text Available The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassination-based human insecurity, robbery/kidnapping related human insecurity, political-related human insecurity, ethnic-based human insecurity, inter-communal conflict-related human insecurity, religious-motivated human insecurity and multi-dimensional conflict related human insecurity. The paper calles on all lovers of life and human dignity to rise up and defend the survival and existence of every breathing soul around him or her in this sovereign entity, called Nigeria.

  6. Human-robot interaction assessment using dynamic engagement profiles

    DEFF Research Database (Denmark)

    Drimus, Alin; Poltorak, Nicole

    2017-01-01

    -1] interval, where 0 represents disengaged and 1 fully engaged. The network shows a good accuracy at recognizing the engagement state of humans given positive emotions. A time based analysis of interaction experiments between small humanoid robots and humans provides time series of engagement estimates, which...... and is applicable to humanoid robotics as well as other related contexts.......This paper addresses the use of convolutional neural networks for image analysis resulting in an engagement metric that can be used to assess the quality of human robot interactions. We propose a method based on a pretrained convolutional network able to map emotions onto a continuous [0...

  7. Human-technology interaction for standoff IED detection

    Science.gov (United States)

    Zhang, Evan; Zou, Yiyang; Zachrich, Liping; Fulton, Jack

    2011-03-01

    IEDs kill our soldiers and innocent people every day. Lessons learned from Iraq and Afghanistan clearly indicated that IEDs cannot be detected/defeated by technology alone; human-technology interaction must be engaged. In most cases, eye is the best detector, brain is the best computer, and technologies are tools, they must be used by human being properly then can achieve full functionality. In this paper, a UV Raman/fluorescence, CCD and LWIR 3 sensor fusion system for standoff IED detection and a handheld fusion system for close range IED detection are developed and demonstrated. We must train solders using their eyes or CCD/LWIR cameras to do wide area search while on the move to find small suspected area first then use the spectrometer because the laser spot is too small, to scan a one-mile long and 2-meter wide road needs 185 days although our fusion system can detect the IED in 30m with 1s interrogating time. Even if the small suspected area (e.g., 0.5mx0.5m) is found, human eyes still cannot detect the IED, soldiers must use or interact with the technology - laser based spectrometer to scan the area then they are able to detect and identify the IED in 10 minutes not 185 days. Therefore, the human-technology interaction approach will be the best solution for IED detection.

  8. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    OpenAIRE

    Ani Kelechi Johnmary

    2014-01-01

    The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassinat...

  9. Comparison of dogs and humans in visual scanning of social interaction.

    Science.gov (United States)

    Törnqvist, Heini; Somppi, Sanni; Koskela, Aija; Krause, Christina M; Vainio, Outi; Kujala, Miiamaaria V

    2015-09-01

    Previous studies have demonstrated similarities in gazing behaviour of dogs and humans, but comparisons under similar conditions are rare, and little is known about dogs' visual attention to social scenes. Here, we recorded the eye gaze of dogs while they viewed images containing two humans or dogs either interacting socially or facing away: the results were compared with equivalent data measured from humans. Furthermore, we compared the gazing behaviour of two dog and two human populations with different social experiences: family and kennel dogs; dog experts and non-experts. Dogs' gazing behaviour was similar to humans: both species gazed longer at the actors in social interaction than in non-social images. However, humans gazed longer at the actors in dog than human social interaction images, whereas dogs gazed longer at the actors in human than dog social interaction images. Both species also made more saccades between actors in images representing non-conspecifics, which could indicate that processing social interaction of non-conspecifics may be more demanding. Dog experts and non-experts viewed the images very similarly. Kennel dogs viewed images less than family dogs, but otherwise their gazing behaviour did not differ, indicating that the basic processing of social stimuli remains similar regardless of social experiences.

  10. Dynamic perceptions of human-likeness while interacting with a social robot

    NARCIS (Netherlands)

    Ruijten, P.A.M.; Cuijpers, R.H.

    2017-01-01

    In human-robot interaction research, much attention is given to the development of socially assistive robots that can have natural interactions with their users. One crucial aspect of such natural interactions is that the robot is perceived as human-like. Much research already exists that

  11. Human-Computer Interaction, Tourism and Cultural Heritage

    Science.gov (United States)

    Cipolla Ficarra, Francisco V.

    We present a state of the art of the human-computer interaction aimed at tourism and cultural heritage in some cities of the European Mediterranean. In the work an analysis is made of the main problems deriving from training understood as business and which can derail the continuous growth of the HCI, the new technologies and tourism industry. Through a semiotic and epistemological study the current mistakes in the context of the interrelations of the formal and factual sciences will be detected and also the human factors that have an influence on the professionals devoted to the development of interactive systems in order to safeguard and boost cultural heritage.

  12. The Personal Information Security Assistant

    NARCIS (Netherlands)

    Kegel, Roeland Hendrik,Pieter

    The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security

  13. Human-computer systems interaction backgrounds and applications 3

    CERN Document Server

    Kulikowski, Juliusz; Mroczek, Teresa; Wtorek, Jerzy

    2014-01-01

    This book contains an interesting and state-of the art collection of papers on the recent progress in Human-Computer System Interaction (H-CSI). It contributes the profound description of the actual status of the H-CSI field and also provides a solid base for further development and research in the discussed area. The contents of the book are divided into the following parts: I. General human-system interaction problems; II. Health monitoring and disabled people helping systems; and III. Various information processing systems. This book is intended for a wide audience of readers who are not necessarily experts in computer science, machine learning or knowledge engineering, but are interested in Human-Computer Systems Interaction. The level of particular papers and specific spreading-out into particular parts is a reason why this volume makes fascinating reading. This gives the reader a much deeper insight than he/she might glean from research papers or talks at conferences. It touches on all deep issues that ...

  14. The human dynamic clamp as a paradigm for social interaction.

    Science.gov (United States)

    Dumas, Guillaume; de Guzman, Gonzalo C; Tognoli, Emmanuelle; Kelso, J A Scott

    2014-09-02

    Social neuroscience has called for new experimental paradigms aimed toward real-time interactions. A distinctive feature of interactions is mutual information exchange: One member of a pair changes in response to the other while simultaneously producing actions that alter the other. Combining mathematical and neurophysiological methods, we introduce a paradigm called the human dynamic clamp (HDC), to directly manipulate the interaction or coupling between a human and a surrogate constructed to behave like a human. Inspired by the dynamic clamp used so productively in cellular neuroscience, the HDC allows a person to interact in real time with a virtual partner itself driven by well-established models of coordination dynamics. People coordinate hand movements with the visually observed movements of a virtual hand, the parameters of which depend on input from the subject's own movements. We demonstrate that HDC can be extended to cover a broad repertoire of human behavior, including rhythmic and discrete movements, adaptation to changes of pacing, and behavioral skill learning as specified by a virtual "teacher." We propose HDC as a general paradigm, best implemented when empirically verified theoretical or mathematical models have been developed in a particular scientific field. The HDC paradigm is powerful because it provides an opportunity to explore parameter ranges and perturbations that are not easily accessible in ordinary human interactions. The HDC not only enables to test the veracity of theoretical models, it also illuminates features that are not always apparent in real-time human social interactions and the brain correlates thereof.

  15. Mobile human-computer interaction perspective on mobile learning

    CSIR Research Space (South Africa)

    Botha, Adèle

    2010-10-01

    Full Text Available Applying a Mobile Human Computer Interaction (MHCI) view to the domain of education using Mobile Learning (Mlearning), the research outlines its understanding of the influences and effects of different interactions on the use of mobile technology...

  16. Sweet Dreams and Nightmares: Security in the Internet of Things

    OpenAIRE

    Kasper , Timo; Oswald , David; Paar , Christof

    2014-01-01

    Part 1: Invited Paper; International audience; Wireless embedded devices are predominant in the Internet of Things: Objects tagged with Radio Frequency IDentification and Near Field Communication technology, smartphones, and other embedded tokens interact from device to device and thereby often process information that is security or privacy relevant for humans. For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schem...

  17. The Science of Human Interaction and Teaching

    Science.gov (United States)

    Yano, Kazuo

    2013-01-01

    There is a missing link between our understanding of teaching as high-level social phenomenon and teaching as a physiological phenomenon of brain activity. We suggest that the science of human interaction is the missing link. Using over one-million days of human-behavior data, we have discovered that "collective activenes" (CA), which indicates…

  18. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  19. Pose Estimation and Adaptive Robot Behaviour for Human-Robot Interaction

    DEFF Research Database (Denmark)

    Svenstrup, Mikael; Hansen, Søren Tranberg; Andersen, Hans Jørgen

    2009-01-01

    Abstract—This paper introduces a new method to determine a person’s pose based on laser range measurements. Such estimates are typically a prerequisite for any human-aware robot navigation, which is the basis for effective and timeextended interaction between a mobile robot and a human. The robot......’s pose. The resulting pose estimates are used to identify humans who wish to be approached and interacted with. The interaction motion of the robot is based on adaptive potential functions centered around the person that respect the persons social spaces. The method is tested in experiments...

  20. Prosthetic Leg Control in the Nullspace of Human Interaction.

    Science.gov (United States)

    Gregg, Robert D; Martin, Anne E

    2016-07-01

    Recent work has extended the control method of virtual constraints, originally developed for autonomous walking robots, to powered prosthetic legs for lower-limb amputees. Virtual constraints define desired joint patterns as functions of a mechanical phasing variable, which are typically enforced by torque control laws that linearize the output dynamics associated with the virtual constraints. However, the output dynamics of a powered prosthetic leg generally depend on the human interaction forces, which must be measured and canceled by the feedback linearizing control law. This feedback requires expensive multi-axis load cells, and actively canceling the interaction forces may minimize the human's influence over the prosthesis. To address these limitations, this paper proposes a method for projecting virtual constraints into the nullspace of the human interaction terms in the output dynamics. The projected virtual constraints naturally render the output dynamics invariant with respect to the human interaction forces, which instead enter into the internal dynamics of the partially linearized prosthetic system. This method is illustrated with simulations of a transfemoral amputee model walking with a powered knee-ankle prosthesis that is controlled via virtual constraints with and without the proposed projection.

  1. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  2. Human-Computer Interaction and Information Management Research Needs

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — In a visionary future, Human-Computer Interaction HCI and Information Management IM have the potential to enable humans to better manage their lives through the use...

  3. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  4. [Affective behavioural responses by dogs to tactile human-dog interactions].

    Science.gov (United States)

    Kuhne, Franziska; Hössler, Johanna C; Struwe, Rainer

    2012-01-01

    The communication of dogs is based on complex, subtle body postures and facial expressions. Some social interaction between dogs includes physical contact. Humans generally use both verbal and tactile signals to communicate with dogs. Hence, interaction between humans and dogs might lead to conflicts because the behavioural responses of dogs to human-dog interaction may be misinterpreted and wrongly assessed. The behavioural responses of dogs to tactile human-dog interactions and human gestures are the focus of this study. The participating dogs (n = 47) were privately owned pets.They were of varying breed and gender.The test consisted of nine randomised test sequences (e. g. petting the dog's head or chest). A test sequence was performed for a period of 30 seconds. The inter-trial interval was set at 60 seconds and the test-retest interval was set at 10 minutes. The frequency and duration of the dogs'behavioural responses were recorded using INTERACT. To examine the behavioural responses of the dogs, a two-way analysis of variance within the linear mixed models procedure of IBM SPSS Statistics 19 was conducted. A significant influence of the test-sequenc order on the dogs' behaviour could be analysed for appeasement gestures (F8,137 = 2.42; p = 0.018), redirected behaviour (F8,161 = 6.31; p = 0.012) and socio-positive behaviour (F8,148 = 6.28; p = 0.012). The behavioural responses of the dogs, which were considered as displacement activities (F8,109 = 2.5; p = 0.014) differed significantly among the test sequences. The response of the dogs, measured as gestures of appeasement, redirected behaviours, and displacement activities, was most obvious during petting around the head and near the paws.The results of this study conspicuously indicate that dogs respond to tactile human-dog interactions with gestures of appeasement and displacement activities. Redirected behaviours, socio-positive behaviours as well displacement activities are behavioural responses which dogs

  5. One health security: an important component of the global health security agenda.

    Science.gov (United States)

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  6. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    Science.gov (United States)

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  7. An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization.

    Science.gov (United States)

    Gladden, Matthew E

    2017-01-01

    Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the "CIA Triad" of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel "posthumanized" human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses.

  8. The Urban Crisis in Sub-Saharan Africa: A Threat to Human Security and Sustainable Development

    Directory of Open Access Journals (Sweden)

    Mediel Hove

    2013-03-01

    Full Text Available Urban centres have existed and have been evolving for many centuries across the world. However, the accelerated growth of urbanisation is a relatively recent phenomenon. The enormous size of urban populations and more significantly, the rapidity with which urban areas have been and are growing in many developing countries have severe social, economic and physical repercussions. This paper argues that the accelerated growth of urbanisation has amplified the demand for key services. However, the provision of shelter and basic services such as water and sanitation, education, public health, employment and transport has not kept pace with this increasing demand. Furthermore, accelerated and poorly managed urbanisation has resulted in various types of atmospheric, land and water pollution thereby jeopardising human security. This paper offers the conclusion that the increased environmental, social and economic problems associated with rapid urbanisation pose a threat to sustainable development, human security and, crucially, peace.

  9. Social Security and divorce or death benefits storyboard (S(2)D(2)BS): an interactive participant learning exercise.

    Science.gov (United States)

    Brown, Pamela Pitman

    2014-01-01

    Using the concept of an interactive or living storyboard, the author discusses the use of seven case narratives constructed for the sole purpose of teaching introductory gerontology or geriatric students about the distribution of Social Security benefits after spousal death. Additional information is included pertaining to Social Security benefits payable to divorced persons after the death of the former spouse, including the status of married same-sex couples. Narratives include representations of a male breadwinner model couple, a two-earner couple who have similar/dissimilar earnings prior to retirement, a divorced couple with a remarriage after a death, a gay couple with and without children, and a female primary breadwinner couple. Updated information from the Social Security Administration, as well as information on game preparation, scripts, and debriefing questions are included.

  10. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  11. Modeling human dynamics of face-to-face interaction networks

    OpenAIRE

    Starnini, Michele; Baronchelli, Andrea; Pastor-Satorras, Romualdo

    2013-01-01

    Face-to-face interaction networks describe social interactions in human gatherings, and are the substrate for processes such as epidemic spreading and gossip propagation. The bursty nature of human behavior characterizes many aspects of empirical data, such as the distribution of conversation lengths, of conversations per person, or of inter-conversation times. Despite several recent attempts, a general theoretical understanding of the global picture emerging from data is still lacking. Here ...

  12. Turn-Taking Based on Information Flow for Fluent Human-Robot Interaction

    OpenAIRE

    Thomaz, Andrea L.; Chao, Crystal

    2011-01-01

    Turn-taking is a fundamental part of human communication. Our goal is to devise a turn-taking framework for human-robot interaction that, like the human skill, represents something fundamental about interaction, generic to context or domain. We propose a model of turn-taking, and conduct an experiment with human subjects to inform this model. Our findings from this study suggest that information flow is an integral part of human floor-passing behavior. Following this, we implement autonomous ...

  13. The epistemology and ontology of human-computer interaction

    NARCIS (Netherlands)

    Brey, Philip A.E.

    2005-01-01

    This paper analyzes epistemological and ontological dimensions of Human-Computer Interaction (HCI) through an analysis of the functions of computer systems in relation to their users. It is argued that the primary relation between humans and computer systems has historically been epistemic:

  14. In our own image? Emotional and neural processing differences when observing human-human vs human-robot interactions.

    Science.gov (United States)

    Wang, Yin; Quadflieg, Susanne

    2015-11-01

    Notwithstanding the significant role that human-robot interactions (HRI) will play in the near future, limited research has explored the neural correlates of feeling eerie in response to social robots. To address this empirical lacuna, the current investigation examined brain activity using functional magnetic resonance imaging while a group of participants (n = 26) viewed a series of human-human interactions (HHI) and HRI. Although brain sites constituting the mentalizing network were found to respond to both types of interactions, systematic neural variation across sites signaled diverging social-cognitive strategies during HHI and HRI processing. Specifically, HHI elicited increased activity in the left temporal-parietal junction indicative of situation-specific mental state attributions, whereas HRI recruited the precuneus and the ventromedial prefrontal cortex (VMPFC) suggestive of script-based social reasoning. Activity in the VMPFC also tracked feelings of eeriness towards HRI in a parametric manner, revealing a potential neural correlate for a phenomenon known as the uncanny valley. By demonstrating how understanding social interactions depends on the kind of agents involved, this study highlights pivotal sub-routes of impression formation and identifies prominent challenges in the use of humanoid robots. © The Author (2015). Published by Oxford University Press.

  15. Quantifying Engagement: Measuring Player Involvement in Human-Avatar Interactions

    Science.gov (United States)

    Norris, Anne E.; Weger, Harry; Bullinger, Cory; Bowers, Alyssa

    2014-01-01

    This research investigated the merits of using an established system for rating behavioral cues of involvement in human dyadic interactions (i.e., face-to-face conversation) to measure involvement in human-avatar interactions. Gameplay audio-video and self-report data from a Feasibility Trial and Free Choice study of an effective peer resistance skill building simulation game (DRAMA-RAMA™) were used to evaluate reliability and validity of the rating system when applied to human-avatar interactions. The Free Choice study used a revised game prototype that was altered to be more engaging. Both studies involved girls enrolled in a public middle school in Central Florida that served a predominately Hispanic (greater than 80%), low-income student population. Audio-video data were coded by two raters, trained in the rating system. Self-report data were generated using measures of perceived realism, predictability and flow administered immediately after game play. Hypotheses for reliability and validity were supported: Reliability values mirrored those found in the human dyadic interaction literature. Validity was supported by factor analysis, significantly higher levels of involvement in Free Choice as compared to Feasibility Trial players, and correlations between involvement dimension sub scores and self-report measures. Results have implications for the science of both skill-training intervention research and game design. PMID:24748718

  16. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  17. An Integrated Human System Interaction (HSI) Framework for Human-Agent Team Collaboration, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The NASA commitment to a human presence in space exploration results in the interaction of humans with challenging environments in space, on lunar, and on planetary...

  18. Velocity-curvature patterns limit human-robot physical interaction.

    Science.gov (United States)

    Maurice, Pauline; Huber, Meghan E; Hogan, Neville; Sternad, Dagmar

    2018-01-01

    Physical human-robot collaboration is becoming more common, both in industrial and service robotics. Cooperative execution of a task requires intuitive and efficient interaction between both actors. For humans, this means being able to predict and adapt to robot movements. Given that natural human movement exhibits several robust features, we examined whether human-robot physical interaction is facilitated when these features are considered in robot control. The present study investigated how humans adapt to biological and non-biological velocity patterns in robot movements. Participants held the end-effector of a robot that traced an elliptic path with either biological (two-thirds power law) or non-biological velocity profiles. Participants were instructed to minimize the force applied on the robot end-effector. Results showed that the applied force was significantly lower when the robot moved with a biological velocity pattern. With extensive practice and enhanced feedback, participants were able to decrease their force when following a non-biological velocity pattern, but never reached forces below those obtained with the 2/3 power law profile. These results suggest that some robust features observed in natural human movements are also a strong preference in guided movements. Therefore, such features should be considered in human-robot physical collaboration.

  19. A Review of Verbal and Non-Verbal Human-Robot Interactive Communication

    OpenAIRE

    Mavridis, Nikolaos

    2014-01-01

    In this paper, an overview of human-robot interactive communication is presented, covering verbal as well as non-verbal aspects of human-robot interaction. Following a historical introduction, and motivation towards fluid human-robot communication, ten desiderata are proposed, which provide an organizational axis both of recent as well as of future research on human-robot communication. Then, the ten desiderata are examined in detail, culminating to a unifying discussion, and a forward-lookin...

  20. Human-computer interaction handbook fundamentals, evolving technologies and emerging applications

    CERN Document Server

    Sears, Andrew

    2007-01-01

    This second edition of The Human-Computer Interaction Handbook provides an updated, comprehensive overview of the most important research in the field, including insights that are directly applicable throughout the process of developing effective interactive information technologies. It features cutting-edge advances to the scientific knowledge base, as well as visionary perspectives and developments that fundamentally transform the way in which researchers and practitioners view the discipline. As the seminal volume of HCI research and practice, The Human-Computer Interaction Handbook feature

  1. The Properties of Intelligent Human-Machine Interface

    Directory of Open Access Journals (Sweden)

    Alexander Alfimtsev

    2012-04-01

    Full Text Available Intelligent human-machine interfaces based on multimodal interaction are developed separately in different application areas. No unified opinion exists about the issue of what properties should these interfaces have to provide an intuitive and natural interaction. Having carried out an analytical survey of the papers that deal with intelligent interfaces a set of properties are presented, which are necessary for intelligent interface between an information system and a human: absolute response, justification, training, personification, adaptiveness, collectivity, security, hidden persistence, portability, filtering.

  2. THE RESPONSIBILITY OF PROTECTING (R2P HUMAN RIGHTS AND SECURITY COUNCIL

    Directory of Open Access Journals (Sweden)

    ULDARICIO FIGUEROA PLÁ

    2017-12-01

    Full Text Available The adoption in 1948 of the Convention on the Prevention and Punishment of the Crime of Genocide seemed to open a new era in the international scenario in which these kind of practices apparently are left in the historic past. Reality has shown us that this international instrument was not enough to face arbitrary measures of some Governments. Nevertheless, genocide actions continuing to be performed, and in order to decrease human suffering, “humanitarian intervention” was thought as a response to the ineffectiveness of the Security Council which also brought along arbitrary actions in its invocation, discrediting it. Before the reiterated calls of the Secretary General of the United Nations to prevent and detain massive violations to human rights, an effort has been made in order to standardizing a type of interventions that can respond to massive violations of human rights. This has been called Responsibility to Protect.

  3. The joint European TEMPUS project 'Human Security (environment, quality of food, public health, and society) on territories contaminated by radioactive agents'

    International Nuclear Information System (INIS)

    Goncharova, N.; Butchenkow, I.; Maestri, E.

    2016-01-01

    Full text: The Joint European TEMPUS Project 'Human Security (environment, quality of food, public health, and society) on Territories Contaminated by Radioactive Agents', started in 2012. The EU project participants are the following: University of Cordoba (Spain) - Project Coordinator, University of Parma (Italy), University of Florence (Italy), Swedish University of Agricultural Sciences (Sweden) and Riga Technical University (Latvia). The project involves three partner countries - Belarus, Russia, Ukraine, represented by the following institutions: Belarusian State University, International Sakharov Environmental University, Grodno State Medical University, Grodno State Agrarian University, Voronezh State University, Tyumen State Medical Academy, Ural Federal University (Yekaterinburg), Chelyabinsk State University, Nuclear Cities Information-Education Centre, Vinnitsa National Medical University, Zhytomyr State Technological University, Kyiv International University, Sevastopol National University of Nuclear Energy and Industry, Polissya branch of G.M. Vysotsky Ukrainian Research Institute of Forestry and Forest Melioration. The main objectives of the project are: to develop interdisciplinary Master and Doctoral (PhD) programs in the field of Human Security of people living in areas affected by accidents at nuclear power plants / plant for processing nuclear fuel within the following specialties: Ecology and Environment Sciences - 'Human Security and Environment'; Food quality control - 'Human Security and Quality of Food'; Medicine - 'Human Security and Public Health'; Political and Social Sciences - 'Human Security and Society'. These programs will be implemented at 12 universities, 4 from each partner country. During the project implementation it is expected to achieve the following main results: modified interdisciplinary Master and Doctoral (PhD) programs taking into account the studied European experience and practice; joint system of upgrade of

  4. Exploring cultural factors in human-robot interaction : A matter of personality?

    NARCIS (Netherlands)

    Weiss, Astrid; Evers, Vanessa

    2011-01-01

    This paper proposes an experimental study to investigate task-dependence and cultural-background dependence of the personality trait attribution on humanoid robots. In Human-Robot Interaction, as well as in Human-Agent Interaction research, the attribution of personality traits towards intelligent

  5. Colombia: Surveillance, Private Security and Gun Control 1994 -2013

    OpenAIRE

    María Stella Baracaldo Méndez

    2014-01-01

    The culture of reglating behavior in the defense of human life is as ancient as social interaction itself. Both are necessarily mutually related in order to achieve coexistence, security, and justice, according to the covenants established in each society. In the modern State, the Universal Declaration of the Rights of Man, and the Citizen led to institutionalizing public force to achieve these objectives. In the western world, this operates from the principle of “monopoly of legitimate physi...

  6. Benefits of Subliminal Feedback Loops in Human-Computer Interaction

    OpenAIRE

    Walter Ritter

    2011-01-01

    A lot of efforts have been directed to enriching human-computer interaction to make the user experience more pleasing or efficient. In this paper, we briefly present work in the fields of subliminal perception and affective computing, before we outline a new approach to add analog communication channels to the human-computer interaction experience. In this approach, in addition to symbolic predefined mappings of input to output, a subliminal feedback loop is used that provides feedback in evo...

  7. A Preliminary Study of Peer-to-Peer Human-Robot Interaction

    Science.gov (United States)

    Fong, Terrence; Flueckiger, Lorenzo; Kunz, Clayton; Lees, David; Schreiner, John; Siegel, Michael; Hiatt, Laura M.; Nourbakhsh, Illah; Simmons, Reid; Ambrose, Robert

    2006-01-01

    The Peer-to-Peer Human-Robot Interaction (P2P-HRI) project is developing techniques to improve task coordination and collaboration between human and robot partners. Our work is motivated by the need to develop effective human-robot teams for space mission operations. A central element of our approach is creating dialogue and interaction tools that enable humans and robots to flexibly support one another. In order to understand how this approach can influence task performance, we recently conducted a series of tests simulating a lunar construction task with a human-robot team. In this paper, we describe the tests performed, discuss our initial results, and analyze the effect of intervention on task performance.

  8. Human-Robot Interaction Directed Research Project

    Science.gov (United States)

    Sandor, Aniko; Cross, Ernest V., II; Chang, Mai Lee

    2014-01-01

    Human-robot interaction (HRI) is a discipline investigating the factors affecting the interactions between humans and robots. It is important to evaluate how the design of interfaces and command modalities affect the human's ability to perform tasks accurately, efficiently, and effectively when working with a robot. By understanding the effects of interface design on human performance, workload, and situation awareness, interfaces can be developed to appropriately support the human in performing tasks with minimal errors and with appropriate interaction time and effort. Thus, the results of research on human-robot interfaces have direct implications for the design of robotic systems. This DRP concentrates on three areas associated with interfaces and command modalities in HRI which are applicable to NASA robot systems: 1) Video Overlays, 2) Camera Views, and 3) Command Modalities. The first study focused on video overlays that investigated how Augmented Reality (AR) symbology can be added to the human-robot interface to improve teleoperation performance. Three types of AR symbology were explored in this study, command guidance (CG), situation guidance (SG), and both (SCG). CG symbology gives operators explicit instructions on what commands to input, whereas SG symbology gives operators implicit cues so that operators can infer the input commands. The combination of CG and SG provided operators with explicit and implicit cues allowing the operator to choose which symbology to utilize. The objective of the study was to understand how AR symbology affects the human operator's ability to align a robot arm to a target using a flight stick and the ability to allocate attention between the symbology and external views of the world. The study evaluated the effects type of symbology (CG and SG) has on operator tasks performance and attention allocation during teleoperation of a robot arm. The second study expanded on the first study by evaluating the effects of the type of

  9. Characterization of human-dog social interaction using owner report.

    Science.gov (United States)

    Lit, Lisa; Schweitzer, Julie B; Oberbauer, Anita M

    2010-07-01

    Dog owners were surveyed for observations of social behaviors in their dogs, using questions adapted from the human Autism Diagnostic Observation Schedule (ADOS) pre-verbal module. Using 939 responses for purebred and mixed-breed dogs, three factors were identified: initiation of reciprocal social behaviors (INIT), response to social interactions (RSPNS), and communication (COMM). There were small or no effects of sex, age, breed group or training. For six breeds with more than 35 responses (Border Collie, Rough Collie, German Shepherd, Golden Retriever, Labrador Retriever, Standard Poodle), the behaviors eye contact with humans, enjoyment in interactions with human interaction, and name recognition demonstrated little variability across breeds, while asking for objects, giving/showing objects to humans, and attempts to direct humans' attention showed higher variability across these breeds. Breeds with genetically similar backgrounds had similar response distributions for owner reports of dog response to pointing. When considering these breeds according to the broad categories of "herders" and "retrievers," owners reported that the "herders" used more eye contact and vocalization, while the "retrievers" used more body contact. Information regarding social cognitive abilities in dogs provided by owner report suggest that there is variability across many social cognitive abilities in dogs and offers direction for further experimental investigations. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  10. Brain Computer Interfaces for Enhanced Interaction with Mobile Robot Agents

    Science.gov (United States)

    2016-07-27

    SECURITY CLASSIFICATION OF: Brain Computer Interfaces (BCIs) show great potential in allowing humans to interact with computational environments in a...Distribution Unlimited UU UU UU UU 27-07-2016 17-Sep-2013 16-Sep-2014 Final Report: Brain Computer Interfaces for Enhanced Interactions with Mobile Robot...published in peer-reviewed journals: Number of Papers published in non peer-reviewed journals: Final Report: Brain Computer Interfaces for Enhanced

  11. Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions

    Science.gov (United States)

    Gupta, Ankur; Awasthi, Lalit K.

    Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been limited to individual computers connected to the internet. P2P networks are also notorious for blatant copyright violations and facilitating several kinds of security attacks. Businesses and large organizations have thus stayed away from deploying P2P applications citing security loopholes in P2P systems as the biggest reason for non-adoption. In theory P2P applications can help fulfill many organizational requirements such as collaboration and joint projects with other organizations, access to specialized computing infrastructure and finally accessing the specialized information/content and expert human knowledge available at other organizations. These potentially beneficial interactions necessitate that the research community attempt to alleviate the security shortcomings in P2P systems and ensure their acceptance and wide deployment. This research paper therefore examines the security issues prevalent in enabling cross-organizational P2P interactions and provides some technical insights into how some of these issues can be resolved.

  12. DenHunt - A Comprehensive Database of the Intricate Network of Dengue-Human Interactions.

    Directory of Open Access Journals (Sweden)

    Prashanthi Karyala

    2016-09-01

    Full Text Available Dengue virus (DENV is a human pathogen and its etiology has been widely established. There are many interactions between DENV and human proteins that have been reported in literature. However, no publicly accessible resource for efficiently retrieving the information is yet available. In this study, we mined all publicly available dengue-human interactions that have been reported in the literature into a database called DenHunt. We retrieved 682 direct interactions of human proteins with dengue viral components, 382 indirect interactions and 4120 differentially expressed human genes in dengue infected cell lines and patients. We have illustrated the importance of DenHunt by mapping the dengue-human interactions on to the host interactome and observed that the virus targets multiple host functional complexes of important cellular processes such as metabolism, immune system and signaling pathways suggesting a potential role of these interactions in viral pathogenesis. We also observed that 7 percent of the dengue virus interacting human proteins are also associated with other infectious and non-infectious diseases. Finally, the understanding that comes from such analyses could be used to design better strategies to counteract the diseases caused by dengue virus. The whole dataset has been catalogued in a searchable database, called DenHunt (http://proline.biochem.iisc.ernet.in/DenHunt/.

  13. DenHunt - A Comprehensive Database of the Intricate Network of Dengue-Human Interactions.

    Science.gov (United States)

    Karyala, Prashanthi; Metri, Rahul; Bathula, Christopher; Yelamanchi, Syam K; Sahoo, Lipika; Arjunan, Selvam; Sastri, Narayan P; Chandra, Nagasuma

    2016-09-01

    Dengue virus (DENV) is a human pathogen and its etiology has been widely established. There are many interactions between DENV and human proteins that have been reported in literature. However, no publicly accessible resource for efficiently retrieving the information is yet available. In this study, we mined all publicly available dengue-human interactions that have been reported in the literature into a database called DenHunt. We retrieved 682 direct interactions of human proteins with dengue viral components, 382 indirect interactions and 4120 differentially expressed human genes in dengue infected cell lines and patients. We have illustrated the importance of DenHunt by mapping the dengue-human interactions on to the host interactome and observed that the virus targets multiple host functional complexes of important cellular processes such as metabolism, immune system and signaling pathways suggesting a potential role of these interactions in viral pathogenesis. We also observed that 7 percent of the dengue virus interacting human proteins are also associated with other infectious and non-infectious diseases. Finally, the understanding that comes from such analyses could be used to design better strategies to counteract the diseases caused by dengue virus. The whole dataset has been catalogued in a searchable database, called DenHunt (http://proline.biochem.iisc.ernet.in/DenHunt/).

  14. Social interaction enhances motor resonance for observed human actions.

    Science.gov (United States)

    Hogeveen, Jeremy; Obhi, Sukhvinder S

    2012-04-25

    Understanding the neural basis of social behavior has become an important goal for cognitive neuroscience and a key aim is to link neural processes observed in the laboratory to more naturalistic social behaviors in real-world contexts. Although it is accepted that mirror mechanisms contribute to the occurrence of motor resonance (MR) and are common to action execution, observation, and imitation, questions remain about mirror (and MR) involvement in real social behavior and in processing nonhuman actions. To determine whether social interaction primes the MR system, groups of participants engaged or did not engage in a social interaction before observing human or robotic actions. During observation, MR was assessed via motor-evoked potentials elicited with transcranial magnetic stimulation. Compared with participants who did not engage in a prior social interaction, participants who engaged in the social interaction showed a significant increase in MR for human actions. In contrast, social interaction did not increase MR for robot actions. Thus, naturalistic social interaction and laboratory action observation tasks appear to involve common MR mechanisms, and recent experience tunes the system to particular agent types.

  15. The Interaction between Human and Organizational Capital in Strategic Human Resource Management (P.49-62)

    OpenAIRE

    Audia Junita

    2017-01-01

    Studies in strategic human resource management emphasize the contribution of human and human resource management to organizational performance achievement. Human and organizational capitals are strategic capability and mechanism to create value in an organization.This paper seeks to identify an interactive relationship between human and organizational capital in strategic human resource management theoretically, which so far, have not got adequate attention, particularly in a systemic relatio...

  16. Human agency beliefs influence behaviour during virtual social interactions

    Directory of Open Access Journals (Sweden)

    Nathan Caruana

    2017-09-01

    Full Text Available In recent years, with the emergence of relatively inexpensive and accessible virtual reality technologies, it is now possible to deliver compelling and realistic simulations of human-to-human interaction. Neuroimaging studies have shown that, when participants believe they are interacting via a virtual interface with another human agent, they show different patterns of brain activity compared to when they know that their virtual partner is computer-controlled. The suggestion is that users adopt an “intentional stance” by attributing mental states to their virtual partner. However, it remains unclear how beliefs in the agency of a virtual partner influence participants’ behaviour and subjective experience of the interaction. We investigated this issue in the context of a cooperative “joint attention” game in which participants interacted via an eye tracker with a virtual onscreen partner, directing each other’s eye gaze to different screen locations. Half of the participants were correctly informed that their partner was controlled by a computer algorithm (“Computer” condition. The other half were misled into believing that the virtual character was controlled by a second participant in another room (“Human” condition. Those in the “Human” condition were slower to make eye contact with their partner and more likely to try and guide their partner before they had established mutual eye contact than participants in the “Computer” condition. They also responded more rapidly when their partner was guiding them, although the same effect was also found for a control condition in which they responded to an arrow cue. Results confirm the influence of human agency beliefs on behaviour in this virtual social interaction context. They further suggest that researchers and developers attempting to simulate social interactions should consider the impact of agency beliefs on user experience in other social contexts, and their effect

  17. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  18. Human detection and motion analysis at security points

    Science.gov (United States)

    Ozer, I. Burak; Lv, Tiehan; Wolf, Wayne H.

    2003-08-01

    This paper presents a real-time video surveillance system for the recognition of specific human activities. Specifically, the proposed automatic motion analysis is used as an on-line alarm system to detect abnormal situations in a campus environment. A smart multi-camera system developed at Princeton University is extended for use in smart environments in which the camera detects the presence of multiple persons as well as their gestures and their interaction in real-time.

  19. Are Children with Autism More Responsive to Animated Characters? A Study of Interactions with Humans and Human-Controlled Avatars

    Science.gov (United States)

    Carter, Elizabeth J.; Williams, Diane L.; Hodgins, Jessica K.; Lehman, Jill F.

    2014-01-01

    Few direct comparisons have been made between the responsiveness of children with autism to computer-generated or animated characters and their responsiveness to humans. Twelve 4-to 8-year-old children with autism interacted with a human therapist; a human-controlled, interactive avatar in a theme park; a human actor speaking like the avatar; and…

  20. Computer Network Security- The Challenges of Securing a Computer Network

    Science.gov (United States)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  1. Parental attachment style: examination of links with parent secure base provision and adolescent secure base use.

    Science.gov (United States)

    Jones, Jason D; Cassidy, Jude

    2014-01-01

    The secure base construct represents one of attachment theory's most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents' self-reported attachment styles relate to parental secure base provision and adolescent (mean age = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers', as well as mothers', attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers' self-reported hostile behavior toward their adolescents and through adolescents' less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers' self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research.

  2. Workshop on cultural usability and human work interaction design

    DEFF Research Database (Denmark)

    Clemmensen, Torkil; Ørngreen, Rikke; Roese, Kerstin

    2008-01-01

    it into interaction design. The workshop will present current research into cultural usability and human work interaction design. Cultural usability is a comprehensive concept, which adheres to all kinds of contexts in which humans are involved (private family, work, public and private organizations, nature......, Workplace observation, Think-Aloud Usability Test, etc. These techniques often give - seemingly - similar results when applied in diverse cultural settings, but experience shows that we need a deep understanding of the cultural, social and organizational context to interpret the results, and to transform...

  3. Toward a unified method for analysing and teaching Human Robot Interaction

    DEFF Research Database (Denmark)

    Dinesen, Jens Vilhelm

    , drawing on key theories and methods from both communications- and interaction-theory. The aim is to provide a single unified method for analysing interaction, through means of video analysis and then applying theories, with proven mutual compatibility, to reach a desired granularity of study.......This abstract aims to present key aspect of a future paper, which outlines the ongoing development ofa unified method for analysing and teaching Human-Robot-Interaction. The paper will propose a novel method for analysing both HRI, interaction with other forms of technologies and fellow humans...

  4. Promoting food security and well-being among poor and HIV/AIDS affected households: Lessons from an interactive and integrated approach

    NARCIS (Netherlands)

    Swaans, K.; Broerse, J.E.W.; Meincke, M.; Mudhara, M.; Bunders, J.

    2009-01-01

    Participatory and interdisciplinary approaches have been suggested to develop appropriate agricultural innovations as an alternative strategy to improve food security and well-being among HIV/AIDS affected households. However, sustainable implementation of such interactive approaches is far from

  5. Audio Technology and Mobile Human Computer Interaction

    DEFF Research Database (Denmark)

    Chamberlain, Alan; Bødker, Mads; Hazzard, Adrian

    2017-01-01

    Audio-based mobile technology is opening up a range of new interactive possibilities. This paper brings some of those possibilities to light by offering a range of perspectives based in this area. It is not only the technical systems that are developing, but novel approaches to the design...... and understanding of audio-based mobile systems are evolving to offer new perspectives on interaction and design and support such systems to be applied in areas, such as the humanities....

  6. Centrality of Social Interaction in Human Brain Function.

    Science.gov (United States)

    Hari, Riitta; Henriksson, Linda; Malinen, Sanna; Parkkonen, Lauri

    2015-10-07

    People are embedded in social interaction that shapes their brains throughout lifetime. Instead of emerging from lower-level cognitive functions, social interaction could be the default mode via which humans communicate with their environment. Should this hypothesis be true, it would have profound implications on how we think about brain functions and how we dissect and simulate them. We suggest that the research on the brain basis of social cognition and interaction should move from passive spectator science to studies including engaged participants and simultaneous recordings from the brains of the interacting persons. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  8. Socio-hydrology: conceptualising human-flood interactions

    Directory of Open Access Journals (Sweden)

    G. Di Baldassarre

    2013-08-01

    Full Text Available Over history, humankind has tended to settle near streams because of the role of rivers as transportation corridors and the fertility of riparian areas. However, human settlements in floodplains have been threatened by the risk of flooding. Possible responses have been to resettle away and/or modify the river system by building flood control structures. This has led to a complex web of interactions and feedback mechanisms between hydrological and social processes in settled floodplains. This paper is an attempt to conceptualise these interplays for hypothetical human-flood systems. We develop a simple, dynamic model to represent the interactions and feedback loops between hydrological and social processes. The model is then used to explore the dynamics of the human-flood system and the effect of changing individual characteristics, including external forcing such as technological development. The results show that the conceptual model is able to reproduce reciprocal effects between floods and people as well as the emergence of typical patterns. For instance, when levees are built or raised to protect floodplain areas, their presence not only reduces the frequency of flooding, but also exacerbates high water levels. Then, because of this exacerbation, higher flood protection levels are required by society. As a result, more and more flooding events are avoided, but rare and catastrophic events take place.

  9. Rhythm Patterns Interaction - Synchronization Behavior for Human-Robot Joint Action

    Science.gov (United States)

    Mörtl, Alexander; Lorenz, Tamara; Hirche, Sandra

    2014-01-01

    Interactive behavior among humans is governed by the dynamics of movement synchronization in a variety of repetitive tasks. This requires the interaction partners to perform for example rhythmic limb swinging or even goal-directed arm movements. Inspired by that essential feature of human interaction, we present a novel concept and design methodology to synthesize goal-directed synchronization behavior for robotic agents in repetitive joint action tasks. The agents’ tasks are described by closed movement trajectories and interpreted as limit cycles, for which instantaneous phase variables are derived based on oscillator theory. Events segmenting the trajectories into multiple primitives are introduced as anchoring points for enhanced synchronization modes. Utilizing both continuous phases and discrete events in a unifying view, we design a continuous dynamical process synchronizing the derived modes. Inverse to the derivation of phases, we also address the generation of goal-directed movements from the behavioral dynamics. The developed concept is implemented to an anthropomorphic robot. For evaluation of the concept an experiment is designed and conducted in which the robot performs a prototypical pick-and-place task jointly with human partners. The effectiveness of the designed behavior is successfully evidenced by objective measures of phase and event synchronization. Feedback gathered from the participants of our exploratory study suggests a subjectively pleasant sense of interaction created by the interactive behavior. The results highlight potential applications of the synchronization concept both in motor coordination among robotic agents and in enhanced social interaction between humanoid agents and humans. PMID:24752212

  10. Studying human-automation interactions: methodological lessons learned from the human-centred automation experiments 1997-2001

    International Nuclear Information System (INIS)

    Massaiu, Salvatore; Skjerve, Ann Britt Miberg; Skraaning, Gyrd Jr.; Strand, Stine; Waeroe, Irene

    2004-04-01

    This report documents the methodological lessons learned from the Human Centred Automation (HCA) programme both in terms of psychometric evaluation of the measurement techniques developed for human-automation interaction study, and in terms of the application of advanced statistical methods for analysis of experiments. The psychometric evaluation is based on data from the four experiments performed within the HCA programme. The result is a single-source reference text of measurement instruments for the study of human-automation interaction, part of which were specifically developed by the programme. The application of advanced statistical techniques is exemplified by additional analyses performed on the IPSN-HCA experiment of 1998. Special importance is given to the statistical technique Structural Equation Modeling, for the possibility it offers to advance, and empirically test, comprehensive explanations about human-automation interactions. The additional analyses of the IPSN-HCA experiment investigated how the operators formed judgments about their own performance. The issue is of substantive interest for human automation interaction research because the operators' over- or underestimation of their own performance could be seen as a symptom of human-machine mismatch, and a potential latent failure. These analyses concluded that it is the interplay between (1) the level of automation and several factors that determines the operators' bias in performance self-estimation: (2) the nature of the task, (3) the level of scenario complexity, and (4) the level of trust in the automatic system. A structural model that expresses the interplay of all these factors was empirically evaluated and was found able to provide a concise and elegant explanation of the intricate pattern of relationships between the identified factors. (Author)

  11. Multimodal Information Presentation for High-Load Human Computer Interaction

    NARCIS (Netherlands)

    Cao, Y.

    2011-01-01

    This dissertation addresses multimodal information presentation in human computer interaction. Information presentation refers to the manner in which computer systems/interfaces present information to human users. More specifically, the focus of our work is not on which information to present, but

  12. Network Security Visualization

    National Research Council Canada - National Science Library

    1999-01-01

    The application of interactive, three-dimensional viewing techniques to the representation of security-related, computer network status and events is expected to improve the timeliness and efficiency...

  13. Intrinsic interactive reinforcement learning - Using error-related potentials for real world human-robot interaction.

    Science.gov (United States)

    Kim, Su Kyoung; Kirchner, Elsa Andrea; Stefes, Arne; Kirchner, Frank

    2017-12-14

    Reinforcement learning (RL) enables robots to learn its optimal behavioral strategy in dynamic environments based on feedback. Explicit human feedback during robot RL is advantageous, since an explicit reward function can be easily adapted. However, it is very demanding and tiresome for a human to continuously and explicitly generate feedback. Therefore, the development of implicit approaches is of high relevance. In this paper, we used an error-related potential (ErrP), an event-related activity in the human electroencephalogram (EEG), as an intrinsically generated implicit feedback (rewards) for RL. Initially we validated our approach with seven subjects in a simulated robot learning scenario. ErrPs were detected online in single trial with a balanced accuracy (bACC) of 91%, which was sufficient to learn to recognize gestures and the correct mapping between human gestures and robot actions in parallel. Finally, we validated our approach in a real robot scenario, in which seven subjects freely chose gestures and the real robot correctly learned the mapping between gestures and actions (ErrP detection (90% bACC)). In this paper, we demonstrated that intrinsically generated EEG-based human feedback in RL can successfully be used to implicitly improve gesture-based robot control during human-robot interaction. We call our approach intrinsic interactive RL.

  14. Human Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots

    Directory of Open Access Journals (Sweden)

    Mazen Ghandour

    2017-06-01

    Full Text Available In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of the robots in implementing their tasks, especially when the robots navigate in crowded and dynamic environments, which include humans. Traditional collision avoidance methods deal with the human as a dynamic obstacle, without taking into consideration that the human will also try to avoid the robot, and this causes the people and the robot to get confused, especially in crowded social places such as restaurants, hospitals, and laboratories. To avoid such scenarios, a reactive-supervised collision avoidance system for mobile robots based on human-robot interaction is implemented. In this method, both the robot and the human will collaborate in generating the collision avoidance via interaction. The person will notify the robot about the avoidance direction via interaction, and the robot will search for the optimal collision-free path on the selected direction. In case that no people interacted with the robot, it will select the navigation path autonomously and select the path that is closest to the goal location. The humans will interact with the robot using gesture recognition and Kinect sensor. To build the gesture recognition system, two models were used to classify these gestures, the first model is Back-Propagation Neural Network (BPNN, and the second model is Support Vector Machine (SVM. Furthermore, a novel collision avoidance system for avoiding the obstacles is implemented and integrated with the HRI system. The system is tested on H20 robot from DrRobot Company (Canada and a set of experiments were implemented to report the performance of the system in interacting with the human and avoiding

  15. Sense of presence and anxiety during virtual social interactions between a human and virtual humans

    OpenAIRE

    Morina, Nexhmedin; Brinkman, Willem-Paul; Hartanto, Dwi; Emmelkamp, Paul M.G.

    2014-01-01

    Virtual reality exposure therapy (VRET) has been shown to be effective in treatment of anxiety disorders. Yet, there is lack of research on the extent to which interaction between the individual and virtual humans can be successfully implanted to increase levels of anxiety for therapeutic purposes. This proof-of-concept pilot study aimed at examining levels of the sense of presence and anxiety during exposure to virtual environments involving social interaction with virtual humans and using d...

  16. Human Metabolism and Interactions of Deployment-Related Chemicals

    National Research Council Canada - National Science Library

    Hodgson, Ernest

    2003-01-01

    This study examines the human-metabolism and metabolic interactions of a subset of deployment-related chemicals, including chlorpyrifos, DEET, permethrin, pyridostigmine bromide, and sulfur mustard metabolites...

  17. The Contribution of the Spanish Guardia Civil to the Peace and Stability Operations Within the Human Security Framework

    Science.gov (United States)

    2010-03-08

    1999.- U.N. Civilian Police component in Kosovo (UNMIK.) 2000.- Oficina del Programa de Irak (no es especificamente una misi6n de paz) 2000.- Special...community security, and political security. Nevertheless, it is worth pointing out that the establishment and the inclusion of an agenda based on the human...model the pattern set in France by the Gendarmerie and in Catalonia by the existing Mossos de Escuadra. The Dulce of Ahumada personally shaped this new

  18. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  19. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  20. See You See Me: the Role of Eye Contact in Multimodal Human-Robot Interaction.

    Science.gov (United States)

    Xu, Tian Linger; Zhang, Hui; Yu, Chen

    2016-05-01

    We focus on a fundamental looking behavior in human-robot interactions - gazing at each other's face. Eye contact and mutual gaze between two social partners are critical in smooth human-human interactions. Therefore, investigating at what moments and in what ways a robot should look at a human user's face as a response to the human's gaze behavior is an important topic. Toward this goal, we developed a gaze-contingent human-robot interaction system, which relied on momentary gaze behaviors from a human user to control an interacting robot in real time. Using this system, we conducted an experiment in which human participants interacted with the robot in a joint attention task. In the experiment, we systematically manipulated the robot's gaze toward the human partner's face in real time and then analyzed the human's gaze behavior as a response to the robot's gaze behavior. We found that more face looks from the robot led to more look-backs (to the robot's face) from human participants and consequently created more mutual gaze and eye contact between the two. Moreover, participants demonstrated more coordinated and synchronized multimodal behaviors between speech and gaze when more eye contact was successfully established and maintained.

  1. Modelling human interactions in the assessment of man-made hazards

    International Nuclear Information System (INIS)

    Nitoi, M.; Farcasiu, M.; Apostol, M.

    2016-01-01

    The human reliability assessment tools are not currently capable to model adequately the human ability to adapt, to innovate and to manage under extreme situations. The paper presents the results obtained by ICN PSA team in the frame of FP7 Advanced Safety Assessment Methodologies: extended PSA (ASAMPSA_E) project regarding the investigation of conducting HRA in human-made hazards. The paper proposes to use a 4-steps methodology for the assessment of human interactions in the external events (Definition and modelling of human interactions; Quantification of human failure events; Recovery analysis; Review). The most relevant factors with respect to HRA for man-made hazards (response execution complexity; existence of procedures with respect to the scenario in question; time available for action; timing of cues; accessibility of equipment; harsh environmental conditions) are presented and discussed thoroughly. The challenges identified in relation to man-made hazards HRA are highlighted. (authors)

  2. Computer security at ukrainian nuclear facilities: interface between nuclear safety and security

    International Nuclear Information System (INIS)

    Chumak, D.; Klevtsov, O.

    2015-01-01

    Active introduction of information technology, computer instrumentation and control systems (I and C systems) in the nuclear field leads to a greater efficiency and management of technological processes at nuclear facilities. However, this trend brings a number of challenges related to cyber-attacks on the above elements, which violates computer security as well as nuclear safety and security of a nuclear facility. This paper considers regulatory support to computer security at the nuclear facilities in Ukraine. The issue of computer and information security considered in the context of physical protection, because it is an integral component. The paper focuses on the computer security of I and C systems important to nuclear safety. These systems are potentially vulnerable to cyber threats and, in case of cyber-attacks, the potential negative impact on the normal operational processes can lead to a breach of the nuclear facility security. While ensuring nuclear security of I and C systems, it interacts with nuclear safety, therefore, the paper considers an example of an integrated approach to the requirements of nuclear safety and security

  3. Human Capital Variables and Economic Growth in Nigeria: An Interactive Effect

    Directory of Open Access Journals (Sweden)

    Adenike Mosunmola Osoba

    2017-05-01

    Full Text Available Various studies have focused on the relationship between human capital and economic growth all over the world. However, there is still a missing gap on the joint influence of human capital investment components on economic growth particularly in Nigeria. This study therefore examines the interactive effects of the relationship between human capital investment components and economic growth in Nigeria for the period of 1986 – 2014. The study employed secondary annual data on education expenditure, health expenditure, real gross domestic product and gross capital formation obtained from the Central Bank Statistical bulletin, 2014. The data were analyzed using Fully Modified Ordinary Least Squares (FMOLS technique. The results of the study showed that there was positive and significant relationship between the interactive effects of human capital components and growth in Nigeria. The study concluded that the interactive effect of the human capital variables was also in conformity with the theoretical proposition that increase in human capital will enhance growth as stipulated in the modified Solow growth model by Mankiw, Romer & Weil (1992.

  4. Tactile interactions activate mirror system regions in the human brain.

    Science.gov (United States)

    McKyton, Ayelet

    2011-12-07

    Communicating with others is essential for the development of a society. Although types of communications, such as language and visual gestures, were thoroughly investigated in the past, little research has been done to investigate interactions through touch. To study this we used functional magnetic resonance imaging. Twelve participants were scanned with their eyes covered while stroking four kinds of items, representing different somatosensory stimuli: a human hand, a realistic rubber hand, an object, and a simple texture. Although the human and the rubber hands had the same overall shape, in three regions there was significantly more blood oxygen level dependent activation when touching the real hand: the anterior medial prefrontal cortex, the ventral premotor cortex, and the posterior superior temporal cortex. The last two regions are part of the mirror network and are known to be activated through visual interactions such as gestures. Interestingly, in this study, these areas were activated through a somatosensory interaction. A control experiment was performed to eliminate confounds of temperature, texture, and imagery, suggesting that the activation in these areas was correlated with the touch of a human hand. These results reveal the neuronal network working behind human tactile interactions, and highlight the participation of the mirror system in such functions.

  5. Formation of Human Subjectivity in Psychological Interactions with Nature

    Directory of Open Access Journals (Sweden)

    S A Mudrak

    2014-12-01

    Full Text Available The article outlines the current trends in the environmental psychological research of the peculiarities of developing the subject-subjective human relationship with nature: considering human habitat environment as a set of natural objects; studying certain natural sites as psychologically attributive elements of the environment; determining the psychological meaning of the «Human Habitat Environment»; giving the analysis of the problem of the subjectivity development in human interaction with the natural objects.

  6. The EU Security Continuum: the interaction between internal and external spheres in

    Directory of Open Access Journals (Sweden)

    Ana Postolache

    2012-08-01

    Full Text Available Exceeding the traditional dividing line between internal and external security, the article aims to analyze the coordination link between EU internal and external spheres in combating the "new security threats" and in achieving its security goals. First, I will analyze the rapprochement steps towards the EU security continuum, the instruments and the logic behind the process. Second, I will step beyond the discursive claims and I will analyze the EU operational aspects directed under this umbrella, with a particular focus on organised crime. Last but not least, I will discuss the reflection of EU security continuum on the wider global security arena.

  7. Proceedings of the Third International Conference on Intelligent Human Computer Interaction

    CERN Document Server

    Pokorný, Jaroslav; Snášel, Václav; Abraham, Ajith

    2013-01-01

    The Third International Conference on Intelligent Human Computer Interaction 2011 (IHCI 2011) was held at Charles University, Prague, Czech Republic from August 29 - August 31, 2011. This conference was third in the series, following IHCI 2009 and IHCI 2010 held in January at IIIT Allahabad, India. Human computer interaction is a fast growing research area and an attractive subject of interest for both academia and industry. There are many interesting and challenging topics that need to be researched and discussed. This book aims to provide excellent opportunities for the dissemination of interesting new research and discussion about presented topics. It can be useful for researchers working on various aspects of human computer interaction. Topics covered in this book include user interface and interaction, theoretical background and applications of HCI and also data mining and knowledge discovery as a support of HCI applications.

  8. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  9. Employment Security of Nurses: Baseline for a Strategic Human Resource Direction

    Directory of Open Access Journals (Sweden)

    Dr. Renante A. Egcas

    2017-11-01

    Full Text Available This study is anchored on Herzberg’s Two-Factor Theory which suggests that satisfaction of employees is related to motivation (e.g. achievement, recognition, advancement, growth, and responsibility and dissatisfaction is related to hygiene factors (e.g. company policy and administration, supervision, interpersonal relationships, working conditions, pay, status, and job security. This study aimed to determine the level and predictors of employment security of nurses in both private and government hospitals in Negros Occidental, Philippines. The level of employment security was categorized into economic security, professional security, personal security, and workplace security. Specifically, this study examined the nurserespondents’ profile in terms of types of hospital employed to, sex, civil status, number of dependents, educational attainment, rank, employment status, salary grade, net income, and length of service. This study also determined the significant differences on the level of employment security of nurses when assessed at different categories and when the respondents are grouped according to their profile. This is a descriptive study which surveyed and interviewed nurses (n=318 from 18 government hospitals, 3 infirmaries and 4 private hospitals which signified intention to participate in the study. The study used the stratified random sampling to insure representativeness of the nurse-respondents.Results revealed that the nurse-respondents expressed moderate security in economic aspect, low security in professional aspect, high security in personal aspect and moderate security in workplace aspect. Highly significant differences were noted between professional security and workplace security. Results also revealed that types of hospital, civil status, rank, employment status are predictors of employment security of the nurse-respondents. Hence, the results implied that fast turnover and migration of Philippine nurses are not mainly

  10. Human-nature interactions and the consequences and drivers of provisioning wildlife.

    Science.gov (United States)

    Cox, Daniel T C; Gaston, Kevin J

    2018-05-05

    Many human populations are undergoing an extinction of experience, with a progressive decline in interactions with nature. This is a consequence both of a loss of opportunity for, and orientation towards, such experiences. The trend is of concern in part because interactions with nature can be good for human health and wellbeing. One potential means of redressing these losses is through the intentional provision of resources to increase wildlife populations in close proximity to people, thereby increasing the potential for positive human-nature experiences, and thence the array of benefits that can result. In this paper, we review the evidence that these resource subsidies have such a cascade of effects. In some Westernized countries, the scale of provision is extraordinarily high, and doubtless leads to both positive and negative impacts for wildlife. In turn, these impacts often lead to more frequent, reliable and closer human-nature interactions, with a greater variety of species. The consequences for human wellbeing remain poorly understood, although benefits documented in the context of human-nature interactions more broadly seem likely to apply. There are also some important feedback loops that need to be better characterized if resource provisioning is to contribute effectively towards averting the extinction of experience.This article is part of the theme issue 'Anthropogenic resource subsidies and host-parasite dynamics in wildlife'. © 2018 The Authors.

  11. AR.Drone: security threat analysis and exemplary attack to track persons

    Science.gov (United States)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  12. TECHNOLOGY AND INNOVATION IN HUMAN ACTIVITY OF THE INFORMATION AGE: HUMAN AND ICT

    Directory of Open Access Journals (Sweden)

    Oleksandr Yu. Burov

    2016-01-01

    Full Text Available In the article a brief overview of projects initiated by the U.S. National Science Foundation that related to new knowledge on integration and mutual development of social systems is proposed. The projects have a potential for transformation of science and researches, improvement of life quality and economy prosperity, as well as they should ensure outrunning development of information and communication technologies for all spheres of human activity: anthropocentric computerization, integration of information and informatics, robust intelligence, cyber-human systems, as well as two cross-technical areas - human and/or robots interaction, security and information protection.

  13. Development of Food Security Information System Based on Business Intelligence in Food Security Agency, Ministry of Agriculture, Indonesia

    OpenAIRE

    Hendrawaty, Manise; Harisno, Harisno

    2014-01-01

    Food is the main basic need of human, because of that fulfillment of human need of food has to be fulfilled. So it can fulfill that need, then government institution, Food Security Agency (BKP) is formed so it can monitor fulfillment of food need of society. The goals of this writing are to develop food security information system that provides dashboard facility based on business intelligence, to develop food security information system that can give fast, precise and real time information a...

  14. The Human-Computer Interaction of Cross-Cultural Gaming Strategy

    Science.gov (United States)

    Chakraborty, Joyram; Norcio, Anthony F.; Van Der Veer, Jacob J.; Andre, Charles F.; Miller, Zachary; Regelsberger, Alexander

    2015-01-01

    This article explores the cultural dimensions of the human-computer interaction that underlies gaming strategies. The article is a desktop study of existing literature and is organized into five sections. The first examines the cultural aspects of knowledge processing. The social constructs technology interaction is discussed. Following this, the…

  15. Effect of cognitive biases on human-robot interaction: a case study of robot's misattribution

    OpenAIRE

    Biswas, Mriganka; Murray, John

    2014-01-01

    This paper presents a model for developing long-term human-robot interactions and social relationships based on the principle of 'human' cognitive biases applied to a robot. The aim of this work is to study how a robot influenced with human ‘misattribution’ helps to build better human-robot interactions than unbiased robots. The results presented in this paper suggest that it is important to know the effect of cognitive biases in human characteristics and interactions in order to better u...

  16. Drug interactions at the human placenta: what is the evidence?

    Directory of Open Access Journals (Sweden)

    Miriam eRubinchik-Stern

    2012-07-01

    Full Text Available Pregnant women (and their fetuses are treated with a significant number of prescription and nonprescription medications. Interactions among those drugs may affect their efficacy and toxicity in both mother and fetus. Whereas interactions that result in altered drug concentrations in maternal plasma are detectable, those involving modulation of placental transfer mechanisms are rarely reflected by altered drug concentrations in maternal plasma. Therefore, they are often overlooked. Placental-mediated interactions are possible because the placenta is not only a passive diffusional barrier, but also expresses a variety of influx and efflux transporters and drug metabolizing enzymes. Current data on placental-mediated drug interactions are limited. In rodents, pharmacological or genetic manipulations of placental transporters significantly affect fetal drug exposure. In contrast, studies in human placentae suggest that the magnitude of such interactions is modest in most cases. Nevertheless, under certain circumstances, such interactions may be of clinical significance. This review describes currently known mechanisms of placental-mediated drug interactions and the potential implications of such interactions in humans. Better understanding of those mechanisms is important for minimizing fetal toxicity from drugs while improving their efficacy when directed to treat the fetus.

  17. A Social Cognitive Neuroscience Stance on Human-Robot Interactions

    Directory of Open Access Journals (Sweden)

    Chaminade Thierry

    2011-12-01

    Full Text Available Robotic devices, thanks to the controlled variations in their appearance and behaviors, provide useful tools to test hypotheses pertaining to social interactions. These agents were used to investigate one theoretical framework, resonance, which is defined, at the behavioral and neural levels, as an overlap between first- and third- person representations of mental states such as motor intentions or emotions. Behaviorally, we found a reduced, but significant, resonance towards a humanoid robot displaying biological motion, compared to a human. Using neuroimaging, we've reported that while perceptual processes in the human occipital and temporal lobe are more strongly engaged when perceiving a humanoid robot than a human action, activity in areas involved in motor resonance depends on attentional modulation for artificial agent more strongly than for human agents. Altogether, these studies using artificial agents offer valuable insights into the interaction of bottom-up and top-down processes in the perception of artificial agents.

  18. Security issues in mobile NFC devices

    CERN Document Server

    Roland, Michael

    2015-01-01

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

  19. Cognitive engineering models: A prerequisite to the design of human-computer interaction in complex dynamic systems

    Science.gov (United States)

    Mitchell, Christine M.

    1993-01-01

    This chapter examines a class of human-computer interaction applications, specifically the design of human-computer interaction for the operators of complex systems. Such systems include space systems (e.g., manned systems such as the Shuttle or space station, and unmanned systems such as NASA scientific satellites), aviation systems (e.g., the flight deck of 'glass cockpit' airplanes or air traffic control) and industrial systems (e.g., power plants, telephone networks, and sophisticated, e.g., 'lights out,' manufacturing facilities). The main body of human-computer interaction (HCI) research complements but does not directly address the primary issues involved in human-computer interaction design for operators of complex systems. Interfaces to complex systems are somewhat special. The 'user' in such systems - i.e., the human operator responsible for safe and effective system operation - is highly skilled, someone who in human-machine systems engineering is sometimes characterized as 'well trained, well motivated'. The 'job' or task context is paramount and, thus, human-computer interaction is subordinate to human job interaction. The design of human interaction with complex systems, i.e., the design of human job interaction, is sometimes called cognitive engineering.

  20. The human-bacterial pathogen protein interaction networks of Bacillus anthracis, Francisella tularensis, and Yersinia pestis.

    Directory of Open Access Journals (Sweden)

    Matthew D Dyer

    2010-08-01

    Full Text Available Bacillus anthracis, Francisella tularensis, and Yersinia pestis are bacterial pathogens that can cause anthrax, lethal acute pneumonic disease, and bubonic plague, respectively, and are listed as NIAID Category A priority pathogens for possible use as biological weapons. However, the interactions between human proteins and proteins in these bacteria remain poorly characterized leading to an incomplete understanding of their pathogenesis and mechanisms of immune evasion.In this study, we used a high-throughput yeast two-hybrid assay to identify physical interactions between human proteins and proteins from each of these three pathogens. From more than 250,000 screens performed, we identified 3,073 human-B. anthracis, 1,383 human-F. tularensis, and 4,059 human-Y. pestis protein-protein interactions including interactions involving 304 B. anthracis, 52 F. tularensis, and 330 Y. pestis proteins that are uncharacterized. Computational analysis revealed that pathogen proteins preferentially interact with human proteins that are hubs and bottlenecks in the human PPI network. In addition, we computed modules of human-pathogen PPIs that are conserved amongst the three networks. Functionally, such conserved modules reveal commonalities between how the different pathogens interact with crucial host pathways involved in inflammation and immunity.These data constitute the first extensive protein interaction networks constructed for bacterial pathogens and their human hosts. This study provides novel insights into host-pathogen interactions.

  1. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  2. The Security Plan for the Joint Euratom/IAEA Remote Monitoring Network

    International Nuclear Information System (INIS)

    Stronkhorst, J.; Schoop, K.; Ruuska, K.; Kurek, S.; Levert, J.F.

    2015-01-01

    The European Commission and the IAEA have installed surveillance systems in all larger civil European nuclear facilities. The monitoring data is gathered by optical surveillance systems, electronic sealing systems and numerous measuring devices. The on-site joint Euratom/IAEA monitoring networks operate in general completely isolated from the operator's IT systems. To largely improve data security and reliability, remote data transmission (RDT) is installed on a growing number of sites, and the inspection data is daily transferred to the Data Collect Servers in Luxembourg and Vienna. A growing number of RDT connections and a growing number of security threats require an IT security policy that is pro-active as well as reactive in an efficient way. The risk based approach used in setting up the security plans assesses all elements of the monitoring network, from the implemented technical solution and the assessment of the security needs and threats, up to the incident handling and lessons learned. The results of the assessments are, for each individual RDT connection, described in the technical paragraphs and annexes, including system descriptions, network plans and contact information. The principles of secure data handling as implemented in the shared Euratom /IAEA monitoring network can apply to a broad range of industrial monitoring systems, where human interaction is in general the largest security risk. (author)

  3. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  4. Temporal stability in human interaction networks

    Science.gov (United States)

    Fabbri, Renato; Fabbri, Ricardo; Antunes, Deborah Christina; Pisani, Marilia Mello; de Oliveira, Osvaldo Novais

    2017-11-01

    This paper reports on stable (or invariant) properties of human interaction networks, with benchmarks derived from public email lists. Activity, recognized through messages sent, along time and topology were observed in snapshots in a timeline, and at different scales. Our analysis shows that activity is practically the same for all networks across timescales ranging from seconds to months. The principal components of the participants in the topological metrics space remain practically unchanged as different sets of messages are considered. The activity of participants follows the expected scale-free trace, thus yielding the hub, intermediary and peripheral classes of vertices by comparison against the Erdös-Rényi model. The relative sizes of these three sectors are essentially the same for all email lists and the same along time. Typically, 45% are peripheral vertices. Similar results for the distribution of participants in the three sectors and for the relative importance of the topological metrics were obtained for 12 additional networks from Facebook, Twitter and ParticipaBR. These properties are consistent with the literature and may be general for human interaction networks, which has important implications for establishing a typology of participants based on quantitative criteria.

  5. On the application of motivation theory to human factors/ergonomics: motivational design principles for human-technology interaction.

    Science.gov (United States)

    Szalma, James L

    2014-12-01

    Motivation is a driving force in human-technology interaction. This paper represents an effort to (a) describe a theoretical model of motivation in human technology interaction, (b) provide design principles and guidelines based on this theory, and (c) describe a sequence of steps for the. evaluation of motivational factors in human-technology interaction. Motivation theory has been relatively neglected in human factors/ergonomics (HF/E). In both research and practice, the (implicit) assumption has been that the operator is already motivated or that motivation is an organizational concern and beyond the purview of HF/E. However, technology can induce task-related boredom (e.g., automation) that can be stressful and also increase system vulnerability to performance failures. A theoretical model of motivation in human-technology interaction is proposed, based on extension of the self-determination theory of motivation to HF/E. This model provides the basis for both future research and for development of practical recommendations for design. General principles and guidelines for motivational design are described as well as a sequence of steps for the design process. Human motivation is an important concern for HF/E research and practice. Procedures in the design of both simple and complex technologies can, and should, include the evaluation of motivational characteristics of the task, interface, or system. In addition, researchers should investigate these factors in specific human-technology domains. The theory, principles, and guidelines described here can be incorporated into existing techniques for task analysis and for interface and system design.

  6. Intelligent Interaction for Human-Friendly Service Robot in Smart House Environment

    Directory of Open Access Journals (Sweden)

    Z. Zenn Bien

    2008-01-01

    Full Text Available The smart house under consideration is a service-integrated complex system to assist older persons and/or people with disabilities. The primary goal of the system is to achieve independent living by various robotic devices and systems. Such a system is treated as a human-in-the loop system in which human- robot interaction takes place intensely and frequently. Based on our experiences of having designed and implemented a smart house environment, called Intelligent Sweet Home (ISH, we present a framework of realizing human-friendly HRI (human-robot interaction module with various effective techniques of computational intelligence. More specifically, we partition the robotic tasks of HRI module into three groups in consideration of the level of specificity, fuzziness or uncertainty of the context of the system, and present effective interaction method for each case. We first show a task planning algorithm and its architecture to deal with well-structured tasks autonomously by a simplified set of commands of the user instead of inconvenient manual operations. To provide with capability of interacting in a human-friendly way in a fuzzy context, it is proposed that the robot should make use of human bio-signals as input of the HRI module as shown in a hand gesture recognition system, called a soft remote control system. Finally we discuss a probabilistic fuzzy rule-based life-long learning system, equipped with intention reading capability by learning human behavioral patterns, which is introduced as a solution in uncertain and time-varying situations.

  7. Human-robot interaction strategies for walker-assisted locomotion

    CERN Document Server

    Cifuentes, Carlos A

    2016-01-01

    This book presents the development of a new multimodal human-robot interface for testing and validating control strategies applied to robotic walkers for assisting human mobility and gait rehabilitation. The aim is to achieve a closer interaction between the robotic device and the individual, empowering the rehabilitation potential of such devices in clinical applications. A new multimodal human-robot interface for testing and validating control strategies applied to robotic walkers for assisting human mobility and gait rehabilitation is presented. Trends and opportunities for future advances in the field of assistive locomotion via the development of hybrid solutions based on the combination of smart walkers and biomechatronic exoskeletons are also discussed. .

  8. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    Science.gov (United States)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and

  9. Domestic water and sanitation as water security: monitoring, concepts and strategy

    Science.gov (United States)

    Bradley, David J.; Bartram, Jamie K.

    2013-01-01

    Domestic water and sanitation provide examples of a situation where long-term, target-driven efforts have been launched with the objective of reducing the proportion of people who are water-insecure, most recently through the millennium development goals (MDGs) framework. Impacts of these efforts have been monitored by an increasingly evidence-based system, and plans for the next period of international policy, which are likely to aim at universal coverage with basic water and sanitation, are being currently developed. As distinct from many other domains to which the concept of water security is applied, domestic or personal water security requires a perspective that incorporates the reciprocal notions of provision and risk, as the current status of domestic water and sanitation security is dominated by deficiency This paper reviews the interaction of science and technology with policies, practice and monitoring, and explores how far domestic water can helpfully fit into the proposed concept of water security, how that is best defined, and how far the human right to water affects the situation. It is considered that they fit well together in terms both of practical planning of targets and indicators and as a conceptual framework to help development. The focus needs to be broad, to extend beyond households, to emphasize maintenance as well as construction and to increase equity of access. International and subnational monitoring need to interact, and monitoring results need to be meaningful to service providers as well as users. PMID:24080628

  10. Information flow between interacting human brains: Identification, validation, and relationship to social expertise.

    Science.gov (United States)

    Bilek, Edda; Ruf, Matthias; Schäfer, Axel; Akdeniz, Ceren; Calhoun, Vince D; Schmahl, Christian; Demanuele, Charmaine; Tost, Heike; Kirsch, Peter; Meyer-Lindenberg, Andreas

    2015-04-21

    Social interactions are fundamental for human behavior, but the quantification of their neural underpinnings remains challenging. Here, we used hyperscanning functional MRI (fMRI) to study information flow between brains of human dyads during real-time social interaction in a joint attention paradigm. In a hardware setup enabling immersive audiovisual interaction of subjects in linked fMRI scanners, we characterize cross-brain connectivity components that are unique to interacting individuals, identifying information flow between the sender's and receiver's temporoparietal junction. We replicate these findings in an independent sample and validate our methods by demonstrating that cross-brain connectivity relates to a key real-world measure of social behavior. Together, our findings support a central role of human-specific cortical areas in the brain dynamics of dyadic interactions and provide an approach for the noninvasive examination of the neural basis of healthy and disturbed human social behavior with minimal a priori assumptions.

  11. Adaptive interaction a utility maximization approach to understanding human interaction with technology

    CERN Document Server

    Payne, Stephen J

    2013-01-01

    This lecture describes a theoretical framework for the behavioural sciences that holds high promise for theory-driven research and design in Human-Computer Interaction. The framework is designed to tackle the adaptive, ecological, and bounded nature of human behaviour. It is designed to help scientists and practitioners reason about why people choose to behave as they do and to explain which strategies people choose in response to utility, ecology, and cognitive information processing mechanisms. A key idea is that people choose strategies so as to maximise utility given constraints. The frame

  12. Vocal Interactivity in-and-between Humans, Animals and Robots

    Directory of Open Access Journals (Sweden)

    Roger K Moore

    2016-10-01

    Full Text Available Almost all animals exploit vocal signals for a range of ecologically-motivated purposes: detecting predators prey and marking territory, expressing emotions, establishing social relations and sharing information. Whether it is a bird raising an alarm, a whale calling to potential partners,a dog responding to human commands, a parent reading a story with a child, or a business-person accessing stock prices using emph{Siri}, vocalisation provides a valuable communication channel through which behaviour may be coordinated and controlled, and information may be distributed and acquired.Indeed, the ubiquity of vocal interaction has led to research across an extremely diverse array of fields, from assessing animal welfare, to understanding the precursors of human language, to developing voice-based human-machine interaction. Opportunities for cross-fertilisation between these fields abound; for example, using artificial cognitive agents to investigate contemporary theories of language grounding, using machine learning to analyse different habitats or adding vocal expressivity to the next generation of language-enabled autonomous social agents. However, much of the research is conducted within well-defined disciplinary boundaries, and many fundamental issues remain. This paper attempts to redress the balance by presenting a comparative review of vocal interaction within-and-between humans, animals and artificial agents (such as robots, and it identifies a rich set of open research questions that may benefit from an inter-disciplinary analysis.

  13. Discourse with Visual Health Data: Design of Human-Data Interaction

    Directory of Open Access Journals (Sweden)

    Oluwakemi Ola

    2018-03-01

    Full Text Available Previous work has suggested that large repositories of data can revolutionize healthcare activities; however, there remains a disconnection between data collection and its effective usage. The way in which users interact with data strongly impacts their ability to not only complete tasks but also capitalize on the purported benefits of such data. Interactive visualizations can provide a means by which many data-driven tasks can be performed. Recent surveys, however, suggest that many visualizations mostly enable users to perform simple manipulations, thus limiting their ability to complete tasks. Researchers have called for tools that allow for richer discourse with data. Nonetheless, systematic design of human-data interaction for visualization tools is a non-trivial task. It requires taking into consideration a myriad of issues. Creation of visualization tools that incorporate rich human-data discourse would benefit from the use of design frameworks. In this paper, we examine and present a design process that is based on a conceptual human-data interaction framework. We discuss and describe the design of interaction for a visualization tool intended for sensemaking of public health data. We demonstrate the utility of systematic interaction design in two ways. First, we use scenarios to highlight how our design approach supports a rich and meaningful discourse with data. Second, we present results from a study that details how users were able to perform various tasks with health data and learn about global health trends.

  14. The importance of the secure base effect for domestic dogs - evidence from a manipulative problem-solving task.

    Directory of Open Access Journals (Sweden)

    Lisa Horn

    Full Text Available It has been suggested that dogs display a secure base effect similar to that found in human children (i.e., using the owner as a secure base for interacting with the environment. In children, this effect influences their daily lives and importantly also their performance in cognitive testing. Here, we investigate the importance of the secure base effect for dogs in a problem-solving task.Using a manipulative task, we tested dogs in three conditions, in which we varied the owner's presence and behavior (Experiment 1: "Absent owner", "Silent owner", "Encouraging owner" and in one additional condition, in which the owner was replaced by an unfamiliar human (Experiment 2: "Replaced owner". We found that the dogs' duration of manipulating the apparatus was longer when their owner was present than absent, irrespective of the owner's behavior. The presence of an unfamiliar human however did not increase their manipulation. Furthermore, the reduced manipulation during the absence of the owner was not correlated with the dog's degree of separation distress scored in a preceding attachment experiment.Our study is the first to provide evidence for an owner-specific secure base effect in dogs that extends from attachment tests to other areas of dogs' lives and also manifests itself in cognitive testing - thereby confirming the remarkable similarity between the secure base effect in dogs and in human children. These results also have important implications for behavioral testing in dogs, because the presence or absence of the owner during a test situation might substantially influence dogs' motivation and therefore the outcome of the test.

  15. Interactive inverse kinematics for human motion estimation

    DEFF Research Database (Denmark)

    Engell-Nørregård, Morten Pol; Hauberg, Søren; Lapuyade, Jerome

    2009-01-01

    We present an application of a fast interactive inverse kinematics method as a dimensionality reduction for monocular human motion estimation. The inverse kinematics solver deals efficiently and robustly with box constraints and does not suffer from shaking artifacts. The presented motion...... to significantly speed up the particle filtering. It should be stressed that the observation part of the system has not been our focus, and as such is described only from a sense of completeness. With our approach it is possible to construct a robust and computationally efficient system for human motion estimation....

  16. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  17. Applying systemic-structural activity theory to design of human-computer interaction systems

    CERN Document Server

    Bedny, Gregory Z; Bedny, Inna

    2015-01-01

    Human-Computer Interaction (HCI) is an interdisciplinary field that has gained recognition as an important field in ergonomics. HCI draws on ideas and theoretical concepts from computer science, psychology, industrial design, and other fields. Human-Computer Interaction is no longer limited to trained software users. Today people interact with various devices such as mobile phones, tablets, and laptops. How can you make such interaction user friendly, even when user proficiency levels vary? This book explores methods for assessing the psychological complexity of computer-based tasks. It also p

  18. Two is better than one: Physical interactions improve motor performance in humans

    Science.gov (United States)

    Ganesh, G.; Takagi, A.; Osu, R.; Yoshioka, T.; Kawato, M.; Burdet, E.

    2014-01-01

    How do physical interactions with others change our own motor behavior? Utilizing a novel motor learning paradigm in which the hands of two - individuals are physically connected without their conscious awareness, we investigated how the interaction forces from a partner adapt the motor behavior in physically interacting humans. We observed the motor adaptations during physical interactions to be mutually beneficial such that both the worse and better of the interacting partners improve motor performance during and after interactive practice. We show that these benefits cannot be explained by multi-sensory integration by an individual, but require physical interaction with a reactive partner. Furthermore, the benefits are determined by both the interacting partner's performance and similarity of the partner's behavior to one's own. Our results demonstrate the fundamental neural processes underlying human physical interactions and suggest advantages of interactive paradigms for sport-training and physical rehabilitation.

  19. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  20. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  1. See You See Me: the Role of Eye Contact in Multimodal Human-Robot Interaction

    Science.gov (United States)

    XU, TIAN (LINGER); ZHANG, HUI; YU, CHEN

    2016-01-01

    We focus on a fundamental looking behavior in human-robot interactions – gazing at each other’s face. Eye contact and mutual gaze between two social partners are critical in smooth human-human interactions. Therefore, investigating at what moments and in what ways a robot should look at a human user’s face as a response to the human’s gaze behavior is an important topic. Toward this goal, we developed a gaze-contingent human-robot interaction system, which relied on momentary gaze behaviors from a human user to control an interacting robot in real time. Using this system, we conducted an experiment in which human participants interacted with the robot in a joint attention task. In the experiment, we systematically manipulated the robot’s gaze toward the human partner’s face in real time and then analyzed the human’s gaze behavior as a response to the robot’s gaze behavior. We found that more face looks from the robot led to more look-backs (to the robot’s face) from human participants and consequently created more mutual gaze and eye contact between the two. Moreover, participants demonstrated more coordinated and synchronized multimodal behaviors between speech and gaze when more eye contact was successfully established and maintained. PMID:28966875

  2. Extending NGOMSL Model for Human-Humanoid Robot Interaction in the Soccer Robotics Domain

    Directory of Open Access Journals (Sweden)

    Rajesh Elara Mohan

    2008-01-01

    Full Text Available In the field of human-computer interaction, the Natural Goals, Operators, Methods, and Selection rules Language (NGOMSL model is one of the most popular methods for modelling knowledge and cognitive processes for rapid usability evaluation. The NGOMSL model is a description of the knowledge that a user must possess to operate the system represented as elementary actions for effective usability evaluations. In the last few years, mobile robots have been exhibiting a stronger presence in commercial markets and very little work has been done with NGOMSL modelling for usability evaluations in the human-robot interaction discipline. This paper focuses on extending the NGOMSL model for usability evaluation of human-humanoid robot interaction in the soccer robotics domain. The NGOMSL modelled human-humanoid interaction design of Robo-Erectus Junior was evaluated and the results of the experiments showed that the interaction design was able to find faults in an average time of 23.84 s. Also, the interaction design was able to detect the fault within the 60 s in 100% of the cases. The Evaluated Interaction design was adopted by our Robo-Erectus Junior version of humanoid robots in the RoboCup 2007 humanoid soccer league.

  3. Impact of sensor-scene interaction on the design of an IR security surveillance system

    International Nuclear Information System (INIS)

    Claassen, J.P.; Phipps, G.S.

    1982-01-01

    Recent encouraging developments in infrared staring arrays with CCD readouts and in real time image processors working on and off the focal plane have suggested that technologies suitable for infrared security surveillance may be available in a two-to-five year time frame. In anticipation of these emerging technologies, an investigation has been undertaken to establish the design potential of a passive IR perimeter security system incorporating both detection and verification capabilities. To establish the design potential, it is necessary to characterize the interactions between the scene ad the sensor. To this end, theoretical and experimental findings were employed to document (1) the emission properties of scenes to include an intruder, (2) the propagation and emission characteristics of the intervening atmosphere, and (3) the reception properties of the imaging sensor. The impact of these findings are summarized in the light of the application constraints. Optimal wavelengths, intruder and background emission characteristics, weather limitations, and basic sensor design considerations are treated. Although many system design features have been identified to this date, continued efforts are required to complete a detailed system design to include the identifying processing requirements. A program to accomplish these objectives is presented

  4. Accelerating Robot Development through Integral Analysis of Human-Robot Interaction

    NARCIS (Netherlands)

    Kooijmans, T.; Kanda, T.; Bartneck, C.; Ishiguro, H.; Hagita, N.

    2007-01-01

    The development of interactive robots is a complicated process, involving a plethora of psychological, technical, and contextual influences. To design a robot capable of operating "intelligently" in everyday situations, one needs a profound understanding of human-robot interaction (HRI). We propose

  5. Introduction to human-computer interaction

    CERN Document Server

    Booth, Paul

    2014-01-01

    Originally published in 1989 this title provided a comprehensive and authoritative introduction to the burgeoning discipline of human-computer interaction for students, academics, and those from industry who wished to know more about the subject. Assuming very little knowledge, the book provides an overview of the diverse research areas that were at the time only gradually building into a coherent and well-structured field. It aims to explain the underlying causes of the cognitive, social and organizational problems typically encountered when computer systems are introduced. It is clear and co

  6. Security Sector Reform in Albania

    OpenAIRE

    Abazi, Enika; Bumci, Aldo; Hide, Enri; Rakipi, Albert

    2009-01-01

    International audience; This paper analyses security sector reform (SSR) in Albania. In all its enterprises in reforming the security sector,Albania is assisted by different initiatives and projects that provide expertise and financial support. To assesswhether reforms improved the overall security environment (national and human) of the country, it is necessaryto measure the effectiveness of the various initiatives and projects. This is gauged by how well the initiatives andprojects achieved...

  7. Common Metrics for Human-Robot Interaction

    Science.gov (United States)

    Steinfeld, Aaron; Lewis, Michael; Fong, Terrence; Scholtz, Jean; Schultz, Alan; Kaber, David; Goodrich, Michael

    2006-01-01

    This paper describes an effort to identify common metrics for task-oriented human-robot interaction (HRI). We begin by discussing the need for a toolkit of HRI metrics. We then describe the framework of our work and identify important biasing factors that must be taken into consideration. Finally, we present suggested common metrics for standardization and a case study. Preparation of a larger, more detailed toolkit is in progress.

  8. Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

    OpenAIRE

    Ranbir Sinha; Nishant Behar; Devendra Singh

    2012-01-01

    This paper presents a concept of enhancing the security in wireless communication. A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. These days wireless...

  9. Temporal interaction between an artificial orchestra conductor and human musicians

    NARCIS (Netherlands)

    Reidsma, Dennis; Nijholt, Antinus; Bos, Pieter

    2008-01-01

    The Virtual Conductor project concerns the development of the first properly interactive virtual orchestra conductor—a Virtual Human that can conduct a piece of music through interaction with musicians, leading and following them while they are playing. This article describes our motivation for

  10. Structure of the human chromosome interaction network.

    Directory of Open Access Journals (Sweden)

    Sergio Sarnataro

    Full Text Available New Hi-C technologies have revealed that chromosomes have a complex network of spatial contacts in the cell nucleus of higher organisms, whose organisation is only partially understood. Here, we investigate the structure of such a network in human GM12878 cells, to derive a large scale picture of nuclear architecture. We find that the intensity of intra-chromosomal interactions is power-law distributed. Inter-chromosomal interactions are two orders of magnitude weaker and exponentially distributed, yet they are not randomly arranged along the genomic sequence. Intra-chromosomal contacts broadly occur between epigenomically homologous regions, whereas inter-chromosomal contacts are especially associated with regions rich in highly expressed genes. Overall, genomic contacts in the nucleus appear to be structured as a network of networks where a set of strongly individual chromosomal units, as envisaged in the 'chromosomal territory' scenario derived from microscopy, interact with each other via on average weaker, yet far from random and functionally important interactions.

  11. The Creation of a Multi-Human, Multi-Robot Interactive Jam Session

    OpenAIRE

    Weinberg, Gil; Blosser, Brian; Mallikarjuna, Trishul; Raman, Aparna

    2009-01-01

    This paper presents an interactive and improvisational jam session, including human players and two robotic musicians. The project was developed in an effort to create novel and inspiring music through human-robot collaboration. The jam session incorporates Shimon, a newly-developed socially-interactive robotic marimba player, and Haile, a perceptual robotic percussionist developed in previous work. The paper gives an overview of the musical perception modules, adaptive improvisation modes an...

  12. Modelling Engagement in Multi-Party Conversations : Data-Driven Approaches to Understanding Human-Human Communication Patterns for Use in Human-Robot Interactions

    OpenAIRE

    Oertel, Catharine

    2016-01-01

    The aim of this thesis is to study human-human interaction in order to provide virtual agents and robots with the capability to engage into multi-party-conversations in a human-like-manner. The focus lies with the modelling of conversational dynamics and the appropriate realization of multi-modal feedback behaviour. For such an undertaking, it is important to understand how human-human communication unfolds in varying contexts and constellations over time. To this end, multi-modal human-human...

  13. Security dimension of the Canada-EU relationship

    Directory of Open Access Journals (Sweden)

    O. M. Antokhiv­Skolozdra

    2014-05-01

    In particular, it defines that the Canadian Government accepted the fact of strengthening the security part of the European Union activity in a reserved manner, as it could cause decrease in influence of this North American State in Euro­Atlantic area. It outlines the main directions of cooperation, scrutinizes institutional mechanisms of interaction and emphasizes the key challenges of security dimension of bilateral relations.  It deals with the peculiarities of Canada’s participation in military and civil actions under the auspices of the European Union and stresses that the limited military potential of Ottawa makes its effective participation in bilateral cooperation with the European partners less possible. It stresses the adherence of priority in relations between Canada and the United States in security sphere and underlines the significant role of the North Atlantic Treaty Organization in its interaction on the security and defense issues between Canada and the European Union. It emphasizes that the official Ottawa insists on NATO playing the leading role in providing security in Euro­Atlantic area. It illustrates, however, that due to a number of reasons, in particular, lack of initiative in advancing European security and defense policy, the Canadian Government on current stage don’t present particular interest in activating interaction with their European partners in this sphere. It depicts also that Canada and the European Union have started developing cooperation outside ESDP on domestic security, in particular, on struggle against organized crime and other challenges of current society, which has encouraged institutionalization in relationship of the European Union and the Europol.

  14. Peer-to-Peer Human-Robot Interaction for Space Exploration

    Science.gov (United States)

    Fong, Terrence; Nourbakhsh, Illah

    2004-01-01

    NASA has embarked on a long-term program to develop human-robot systems for sustained, affordable space exploration. To support this mission, we are working to improve human-robot interaction and performance on planetary surfaces. Rather than building robots that function as glorified tools, our focus is to enable humans and robots to work as partners and peers. In this paper. we describe our approach, which includes contextual dialogue, cognitive modeling, and metrics-based field testing.

  15. An Experimental Study of Embodied Interaction and Human Perception of Social Presence for Interactive Robots in Public Settings

    DEFF Research Database (Denmark)

    Jochum, Elizabeth Ann; Heath, Damith; Vlachos, Evgenios

    2018-01-01

    The human perception of cognitive robots as social depends on many factors, including those that do not necessarily pertain to a robot’s cognitive functioning. Experience Design offers a useful framework for evaluating when participants interact with robots as products or tools and when they regard...... them as social actors. This study describes a between-participants experiment conducted at a science museum, where visitors were invited to play a game of noughts and crosses with a Baxter robot. The goal is to foster meaningful interactions that promote engagement between the human and robot...... in a museum context. Using an Experience Design framework, we tested the robot in three different conditions to better understand which factors contribute to the perception of robots as social. The experiment also outlines best practices for conducting human-robot interaction research in museum exhibitions...

  16. Comparing human-Salmonella with plant-Salmonella protein-protein interaction predictions

    Directory of Open Access Journals (Sweden)

    Sylvia eSchleker

    2015-01-01

    Full Text Available Salmonellosis is the most frequent food-borne disease world-wide and can be transmitted to humans by a variety of routes, especially via animal and plant products. Salmonella bacteria are believed to use not only animal and human but also plant hosts despite their evolutionary distance. This raises the question if Salmonella employs similar mechanisms in infection of these diverse hosts. Given that most of our understanding comes from its interaction with human hosts, we investigate here to what degree knowledge of Salmonella-human interactions can be transferred to the Salmonella-plant system. Reviewed are recent publications on analysis and prediction of Salmonella-host interactomes. Putative protein-protein interactions (PPIs between Salmonella and its human and Arabidopsis hosts were retrieved utilizing purely interolog-based approaches in which predictions were inferred based on available sequence and domain information of known PPIs, and machine learning approaches that integrate a larger set of useful information from different sources. Transfer learning is an especially suitable machine learning technique to predict plant host targets from the knowledge of human host targets. A comparison of the prediction results with transcriptomic data shows a clear overlap between the host proteins predicted to be targeted by PPIs and their gene ontology enrichment in both host species and regulation of gene expression. In particular, the cellular processes Salmonella interferes with in plants and humans are catabolic processes. The details of how these processes are targeted, however, are quite different between the two organisms, as expected based on their evolutionary and habitat differences. Possible implications of this observation on evolution of host-pathogen communication are discussed.

  17. Pragmatic Frames for Teaching and Learning in Human-Robot Interaction: Review and Challenges.

    Science.gov (United States)

    Vollmer, Anna-Lisa; Wrede, Britta; Rohlfing, Katharina J; Oudeyer, Pierre-Yves

    2016-01-01

    One of the big challenges in robotics today is to learn from human users that are inexperienced in interacting with robots but yet are often used to teach skills flexibly to other humans and to children in particular. A potential route toward natural and efficient learning and teaching in Human-Robot Interaction (HRI) is to leverage the social competences of humans and the underlying interactional mechanisms. In this perspective, this article discusses the importance of pragmatic frames as flexible interaction protocols that provide important contextual cues to enable learners to infer new action or language skills and teachers to convey these cues. After defining and discussing the concept of pragmatic frames, grounded in decades of research in developmental psychology, we study a selection of HRI work in the literature which has focused on learning-teaching interaction and analyze the interactional and learning mechanisms that were used in the light of pragmatic frames. This allows us to show that many of the works have already used in practice, but not always explicitly, basic elements of the pragmatic frames machinery. However, we also show that pragmatic frames have so far been used in a very restricted way as compared to how they are used in human-human interaction and argue that this has been an obstacle preventing robust natural multi-task learning and teaching in HRI. In particular, we explain that two central features of human pragmatic frames, mostly absent of existing HRI studies, are that (1) social peers use rich repertoires of frames, potentially combined together, to convey and infer multiple kinds of cues; (2) new frames can be learnt continually, building on existing ones, and guiding the interaction toward higher levels of complexity and expressivity. To conclude, we give an outlook on the future research direction describing the relevant key challenges that need to be solved for leveraging pragmatic frames for robot learning and teaching.

  18. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  19. Error-Based Accidents and Security Incidents in Nuclear Materials Management

    International Nuclear Information System (INIS)

    Pond, Daniel J.; Greitzer, Frank L.

    2005-01-01

    Hazard and risk assessments, along with human error analysis and mitigation techniques, have long been mainstays of effective safety programs. These tools have revealed that worker errors contributing to or resulting in accidents are often the consequence of ineffective system conditions, process features, or individual employee characteristics. At Los Alamos National Laboratory (LANL), security, safety, human error, and organizational analysts determined that the system-induced human errors that make accidents more likely also are contributing to security incidents. A similar set of system conditions has been found to underlie deliberate, non-malevolent deviations from proper security practices - termed breaches - that also can result in a security incident. In fiscal-year (FY) 2002, LANL's Security Division therefore established the ESTHER (Enhanced Security Through Human Error Reduction) program to identify and reduce the influence of the factors that underlie employee errors and breaches and, in turn, security incidents. Recognizing the potential benefits of this program and approach, in FY2004 the Department of Energy (DOE) Office of Security Policy (DOE-SO) funded an expansion of ESTHER implementation to the causal assessment and reporting of security incidents at other DOE sites. This presentation will focus on three applications of error/breach assessment and mitigation techniques. One use is proactive, accomplished through the elimination of contributors to error, whereas two are reactive, implemented in response to accidents or security incidents as well as to near misses, to prevent recurrence. The human performance and safety bases of these techniques will be detailed. Associated tools - including computer-based assessment training and web-based incident reporting modules developed by Pacific Northwest National Laboratory - will be discussed

  20. Quantifying human-environment interactions using videography in the context of infectious disease transmission.

    Science.gov (United States)

    Julian, Timothy R; Bustos, Carla; Kwong, Laura H; Badilla, Alejandro D; Lee, Julia; Bischel, Heather N; Canales, Robert A

    2018-05-08

    Quantitative data on human-environment interactions are needed to fully understand infectious disease transmission processes and conduct accurate risk assessments. Interaction events occur during an individual's movement through, and contact with, the environment, and can be quantified using diverse methodologies. Methods that utilize videography, coupled with specialized software, can provide a permanent record of events, collect detailed interactions in high resolution, be reviewed for accuracy, capture events difficult to observe in real-time, and gather multiple concurrent phenomena. In the accompanying video, the use of specialized software to capture humanenvironment interactions for human exposure and disease transmission is highlighted. Use of videography, combined with specialized software, allows for the collection of accurate quantitative representations of human-environment interactions in high resolution. Two specialized programs include the Virtual Timing Device for the Personal Computer, which collects sequential microlevel activity time series of contact events and interactions, and LiveTrak, which is optimized to facilitate annotation of events in real-time. Opportunities to annotate behaviors at high resolution using these tools are promising, permitting detailed records that can be summarized to gain information on infectious disease transmission and incorporated into more complex models of human exposure and risk.

  1. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  2. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  3. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  4. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  5. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  6. Interaction of Staphylococci with Human B cells.

    Directory of Open Access Journals (Sweden)

    Tyler K Nygaard

    Full Text Available Staphylococcus aureus is a leading cause of human infections worldwide. The pathogen produces numerous molecules that can interfere with recognition and binding by host innate immune cells, an initial step required for the ingestion and subsequent destruction of microbes by phagocytes. To better understand the interaction of this pathogen with human immune cells, we compared the association of S. aureus and S. epidermidis with leukocytes in human blood. We found that a significantly greater proportion of B cells associated with S. epidermidis relative to S. aureus. Complement components and complement receptors were important for the binding of B cells with S. epidermidis. Experiments using staphylococci inactivated by ultraviolet radiation and S. aureus isogenic deletion mutants indicated that S. aureus secretes molecules regulated by the SaeR/S two-component system that interfere with the ability of human B cells to bind this bacterium. We hypothesize that the relative inability of B cells to bind S. aureus contributes to the microbe's success as a human pathogen.

  7. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    Science.gov (United States)

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  8. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    Science.gov (United States)

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  9. Optimal design method to minimize users' thinking mapping load in human-machine interactions.

    Science.gov (United States)

    Huang, Yanqun; Li, Xu; Zhang, Jie

    2015-01-01

    The discrepancy between human cognition and machine requirements/behaviors usually results in serious mental thinking mapping loads or even disasters in product operating. It is important to help people avoid human-machine interaction confusions and difficulties in today's mental work mastered society. Improving the usability of a product and minimizing user's thinking mapping and interpreting load in human-machine interactions. An optimal human-machine interface design method is introduced, which is based on the purpose of minimizing the mental load in thinking mapping process between users' intentions and affordance of product interface states. By analyzing the users' thinking mapping problem, an operating action model is constructed. According to human natural instincts and acquired knowledge, an expected ideal design with minimized thinking loads is uniquely determined at first. Then, creative alternatives, in terms of the way human obtains operational information, are provided as digital interface states datasets. In the last, using the cluster analysis method, an optimum solution is picked out from alternatives, by calculating the distances between two datasets. Considering multiple factors to minimize users' thinking mapping loads, a solution nearest to the ideal value is found in the human-car interaction design case. The clustering results show its effectiveness in finding an optimum solution to the mental load minimizing problems in human-machine interaction design.

  10. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  11. The Study on Human-Computer Interaction Design Based on the Users’ Subconscious Behavior

    Science.gov (United States)

    Li, Lingyuan

    2017-09-01

    Human-computer interaction is human-centered. An excellent interaction design should focus on the study of user experience, which greatly comes from the consistence between design and human behavioral habit. However, users’ behavioral habits often result from subconsciousness. Therefore, it is smart to utilize users’ subconscious behavior to achieve design's intention and maximize the value of products’ functions, which gradually becomes a new trend in this field.

  12. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  13. Security, Extremism and Education: Safeguarding or Surveillance?

    Science.gov (United States)

    Davies, Lynn

    2016-01-01

    This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…

  14. Panta Rhei-Everything flows: Global Hotspots of Human-Water Interactions

    Science.gov (United States)

    Di Baldassarre, G.; Srinivasan, V.; Tian, F.; Mohamed, Y.; Krueger, T.; Kreibich, H.; Liu, J.; Troy, T. J.; AghaKouchak, A.

    2017-12-01

    Panta Rhei-Everything Flows is the scientific decade (2013-2022) of the International Association of Hydrological Sciences (IAHS). This initiative aims to reach an improved interpretation of the processes governing the water cycle by focusing on their changing dynamics in connection with rapidly changing human systems (Montanari et al., 2013; McMillan et al., 2016). More than 400 water scientists have been involved in Panta Rhei so far, and several working groups have produced significant outcomes. In this presentation, we first summarize some key achievements of this initiative by showing how they have advanced our understanding of the way in which humans impact on, and respond to, hydrological change. Then, we suggest simple indicators to characterize interactions between water and human systems. These indicators aim to capture the relevance of human-water interactions and their potential to generate negative effects, such as water crises or unintended consequences. Finally, we show an application of these indicators to global hotspots, i.e. contrasting case studies from around the world. Our goal is to facilitate a community-wide effort in collecting and sharing essential data to map the role of human-water interactions across social and hydrological conditions. ReferencesMontanari et al. (2013) Panta Rhei—Everything Flows: Change in hydrology and society—The IAHS Scientific Decade 2013-2022, Hydrological Sciences Journal, 58(6), 1256-1275. McMillan et al. (2016) Panta Rhei 2013-2015: Global perspectives on hydrology, society and change. Hydrological sciences journal 61(7), 1174-1191.

  15. Human milk blocks DC-SIGN - pathogen interaction via MUC1

    Directory of Open Access Journals (Sweden)

    Nathalie eKoning

    2015-03-01

    Full Text Available Beneficial effects of breastfeeding are well-recognized and include both immediate neonatal protection against pathogens, as well as long term protection against allergies and autoimmune diseases. Although several proteins have been identified to have anti-viral or anti-bacterial effects like secretory IgA or lactoferrin, the mechanisms of immune modulation are not fully understood. Recent studies identified important beneficial effects of glycans in human milk, such as those expressed in oligosaccharides or on glycoproteins. Glycans are recognized by the carbohydrate receptors C-type lectins on DC and specific tissue macrophages, which exert important functions in immune modulation and immune homeostasis. A well-characterized C-type lectin is DC-SIGN, which binds terminal fucose. The present study shows that in human milk, MUC1 is the major milk glycoprotein that binds to the lectin domain of DC-SIGN and prevents pathogen interaction through the presence of Lewis x-type oligosaccharides. Surprisingly, this was specific for human milk, as formula, bovine or camel milk did not show any presence of proteins that interacted with DC-SIGN. The expression of DC-SIGN is found in young infants along the entire gastro-intestinal tract. Our data thus suggest the importance of human milk glycoproteins for blocking pathogen interaction to DC in young children. Moreover, a potential benefit of human milk later in life in shaping the infants immune system through DC-SIGN cannot be ruled out.

  16. Structure-Interaction Theory: Conceptual, Contextual and Strategic Influences on Human Communication

    Directory of Open Access Journals (Sweden)

    Стивен А Биби

    2015-12-01

    Full Text Available This paper addresses Structure-Interaction Theory (SIT, a theoretical framework that both describes communication messages as well as assists in making predictions about how human communication can be improved based on listener preferences for message structure or interaction. Communication messages may be characterized as existing on a continuum of structure-interaction. Communication structure is the inherent way information in a message is organized. A highly structured message is one in which the message is strategically organized using a planned arrangement of symbols to create meaning. Communication interaction is a way of viewing a message with give-and-take, less sustained “notes,” more change in note sequence and briefer notes. SIT seeks to provide a framework to assist communicators in appropriately adapting a message for maximum effectiveness. Although Structure-Interaction Theory newly articulated here, it is anchored in both classic ways of describing communication, such as rhetoric and dialectic (Aristotle, 1959, as well as more contemporary communication theories (Salem, 2012; Littlejohn & Foss, 2008. Specifically, the paper provides an overview of the theory and its conceptual assumptions, identifies how the theory can help explain and predict communication in several communication contexts (interpersonal, group, public communication, and suggests how SIT may help identify strategies to enhance human development. Structure-Interaction Theory is based on an assumption that a human communication message which is understood, achieves the intended effect of the communicator, and is ethical, requires an appropriate balance of two things: structure and interaction. Communication structure is the inherent way a message is constructed to provide a sustained direction to present information to another person. In linking structure and interaction to Aristotle’s description of messages, rhetoric is a more structured, sustained speech

  17. Interactive effects of temperature and drought on cassava growth and toxicity: implications for food security?

    Science.gov (United States)

    Brown, Alicia L; Cavagnaro, Timothy R; Gleadow, Ros; Miller, Rebecca E

    2016-10-01

    Cassava is an important dietary component for over 1 billion people, and its ability to yield under drought has led to it being promoted as an important crop for food security under climate change. Despite its known photosynthetic plasticity in response to temperature, little is known about how temperature affects plant toxicity or about interactions between temperature and drought, which is important because cassava tissues contain high levels of toxic cyanogenic glucosides, a major health and food safety concern. In a controlled glasshouse experiment, plants were grown at 2 daytime temperatures (23 °C and 34 °C), and either well-watered or subject to a 1 month drought prior to harvest at 6 months. The objective was to determine the separate and interactive effects of temperature and drought on growth and toxicity. Both temperature and drought affected cassava physiology and chemistry. While temperature alone drove differences in plant height and above-ground biomass, drought and temperature × drought interactions most affected tuber yield, as well as foliar and tuber chemistry, including C : N, nitrogen and cyanide potential (CNp; total cyanide released from cyanogenic glucosides). Conditions that most stimulated growth and yield (well-watered × high temperature) effected a reduction in tuber toxicity, whereas drought inhibited growth and yield, and was associated with increased foliar and tuber toxicity. The magnitude of drought effects on tuber yield and toxicity were greater at high temperature; thus, increases in tuber CNp were not merely a consequence of reduced tuber biomass. Findings confirm that cassava is adaptable to forecast temperature increases, particularly in areas of adequate or increasing rainfall; however, in regions forecast for increased incidence of drought, the effects of drought on both food quality (tuber toxicity) and yield are a greater threat to future food security and indicate an increasing necessity for processing of

  18. Abstract robots with an attitude : applying interpersonal relation models to human-robot interaction

    NARCIS (Netherlands)

    Hiah, J.L.; Beursgens, L.; Haex, R.; Perez Romero, L.M.; Teh, Y.; Bhomer, ten M.; Berkel, van R.E.A.; Barakova, E.I.

    2013-01-01

    This paper explores new possibilities for social interaction between a human user and a robot with an abstract shape. The social interaction takes place by simulating behaviors such as submissiveness and dominance and analyzing the corresponding human reactions. We used an object that has no

  19. A digital interactive human brain atlas based on Chinese visible human datasets for anatomy teaching.

    Science.gov (United States)

    Li, Qiyu; Ran, Xu; Zhang, Shaoxiang; Tan, Liwen; Qiu, Mingguo

    2014-01-01

    As we know, the human brain is one of the most complicated organs in the human body, which is the key and difficult point in neuroanatomy and sectional anatomy teaching. With the rapid development and extensive application of imaging technology in clinical diagnosis, doctors are facing higher and higher requirement on their anatomy knowledge. Thus, to cultivate medical students to meet the needs of medical development today and to improve their ability to read and understand radiographic images have become urgent challenges for the medical teachers. In this context, we developed a digital interactive human brain atlas based on the Chinese visible human datasets for anatomy teaching (available for free download from http://www.chinesevisiblehuman.com/down/DHBA.rar). The atlas simultaneously provides views in all 3 primary planes of section. The main structures of the human brain have been anatomically labeled in all 3 views. It is potentially useful for anatomy browsing, user self-testing, and automatic student assessment. In a word, it is interactive, 3D, user friendly, and free of charge, which can provide a new, intuitive means for anatomy teaching.

  20. Pathways of understanding: The interactions of humanity and global environmental change

    International Nuclear Information System (INIS)

    Jacobson, H.K.; Katzenberger, J.; Lousma, J.; Mooney, H.A.; Moss, R.H.; Kuhn, W.; Luterbacher, U.; Wiegandt, E.

    1992-01-01

    How humans, interacting within social systems, affect and are affected by global change is explored. Recognizing the impact human activities have on the environment and responding to the need to document the interactions among human activities, the Consortium for International Earth Science Information Network (CIESIN) commissioned a group of 12 scientists to develop a framework illustrating the key human systems that contribute to global change. This framework, called the Social Process Diagram, will help natural and social scientists, educators, resource managers and policy makers envision and analyze how human systems interact among themselves and with the natural system. The Social Process Diagram consists of the following blocks that constitute the Diagram's structural framework: (1) fund of knowledge and experience; (2) preferences and expectations; (3) factors of production and technology; (4) population and social structure; (5) economic systems; (6) political systems and institutions; and (7) global scale environmental processes. To demonstrate potential ways the Diagram can be used, this document includes 3 hypothetical scenarios of global change issues: global warming and sea level rise; the environmental impact of human population migration; and energy and the environment. These scenarios demonstrate the Diagram's usefulness for visualizing specific processes that might be studied to evaluate a particular global change issues. The scenario also shows that interesting and unanticipated questions may emerge as links are explored between categories on the Diagram

  1. Pathways of Understanding: the Interactions of Humanity and Global Environmental Change

    Science.gov (United States)

    Jacobson, Harold K.; Katzenberger, John; Lousma, Jack; Mooney, Harold A.; Moss, Richard H.; Kuhn, William; Luterbacher, Urs; Wiegandt, Ellen

    1992-01-01

    How humans, interacting within social systems, affect and are affected by global change is explored. Recognizing the impact human activities have on the environment and responding to the need to document the interactions among human activities, the Consortium for International Earth Science Information Network (CIESIN) commissioned a group of 12 scientists to develop a framework illustrating the key human systems that contribute to global change. This framework, called the Social Process Diagram, will help natural and social scientists, educators, resource managers and policy makers envision and analyze how human systems interact among themselves and with the natural system. The Social Process Diagram consists of the following blocks that constitute the Diagram's structural framework: (1) fund of knowledge and experience; (2) preferences and expectations; (3) factors of production and technology; (4) population and social structure; (5) economic systems; (6) political systems and institutions; and (7) global scale environmental processes. To demonstrate potential ways the Diagram can be used, this document includes 3 hypothetical scenarios of global change issues: global warming and sea level rise; the environmental impact of human population migration; and energy and the environment. These scenarios demonstrate the Diagram's usefulness for visualizing specific processes that might be studied to evaluate a particular global change issues. The scenario also shows that interesting and unanticipated questions may emerge as links are explored between categories on the Diagram.

  2. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  3. Human body micro-environment: The benefits of controlling airflow interaction

    DEFF Research Database (Denmark)

    Melikov, Arsen Krikor

    2015-01-01

    This paper focuses on the micro-environment around a human body, and especially on its interaction with the surrounding environment. Research on the free convection flow generated by a human body (including the convective boundary layer around the body and the thermal plume above the body), its...

  4. Fourth ICT Innovations conference ”Secure and Intelligent Systems”

    CERN Document Server

    Gusev, Marjan; ICT Innovations 2012 : Secure and Intelligent Systems

    2013-01-01

    The present stage of the human civilization is the e-society, which is build over the achievements obtained by the development of the information and communication technologies. It affects everyone, from ordinary mobile phone users to designers of high quality industrial products, and every human activity, from taking medical care to improving the state governing. The science community working in computer sciences and informatics is therefore under constant challenge; it has to solve the new appeared theoretical problem as well as to find new practical solutions. \\\\ The fourth ICT Innovations Conference, held in September 2012 in Ohrid, Macedonia, was one of the several world-wide forums where academics, professionals and practitioners presented their last scientific results and development applications in the fields of high performance and parallel computing, bioinformatics, human computer interaction, security and cryptography, computer and mobile networks, neural networks, cloud computing, process verifica...

  5. Motivating forces of human actions. Neuroimaging reward and social interaction.

    Science.gov (United States)

    Walter, Henrik; Abler, Birgit; Ciaramidaro, Angela; Erk, Susanne

    2005-11-15

    In neuroeconomics, reward and social interaction are central concepts to understand what motivates human behaviour. Both concepts are investigated in humans using neuroimaging methods. In this paper, we provide an overview about these results and discuss their relevance for economic behaviour. For reward it has been shown that a system exists in humans that is involved in predicting rewards and thus guides behaviour, involving a circuit including the striatum, the orbitofrontal cortex and the amygdala. Recent studies on social interaction revealed a mentalizing system representing the mental states of others. A central part of this system is the medial prefrontal cortex, in particular the anterior paracingulate cortex. The reward as well as the mentalizing system is engaged in economic decision-making. We will discuss implications of this study for neuromarketing as well as general implications of these results that may help to provide deeper insights into the motivating forces of human behaviour.

  6. A Human-Robot Interaction Perspective on Assistive and Rehabilitation Robotics.

    Science.gov (United States)

    Beckerle, Philipp; Salvietti, Gionata; Unal, Ramazan; Prattichizzo, Domenico; Rossi, Simone; Castellini, Claudio; Hirche, Sandra; Endo, Satoshi; Amor, Heni Ben; Ciocarlie, Matei; Mastrogiovanni, Fulvio; Argall, Brenna D; Bianchi, Matteo

    2017-01-01

    Assistive and rehabilitation devices are a promising and challenging field of recent robotics research. Motivated by societal needs such as aging populations, such devices can support motor functionality and subject training. The design, control, sensing, and assessment of the devices become more sophisticated due to a human in the loop. This paper gives a human-robot interaction perspective on current issues and opportunities in the field. On the topic of control and machine learning, approaches that support but do not distract subjects are reviewed. Options to provide sensory user feedback that are currently missing from robotic devices are outlined. Parallels between device acceptance and affective computing are made. Furthermore, requirements for functional assessment protocols that relate to real-world tasks are discussed. In all topic areas, the design of human-oriented frameworks and methods is dominated by challenges related to the close interaction between the human and robotic device. This paper discusses the aforementioned aspects in order to open up new perspectives for future robotic solutions.

  7. Muscle-tendon interaction and elastic energy usage in human walking

    DEFF Research Database (Denmark)

    Ishikawa, Masaki; Komi, Paavo V.; Grey, Michael James

    2005-01-01

    The present study was designed to explore how the interaction between the fascicles and tendinous tissues is involved in storage and utilization of elastic energy during human walking. Eight male subjects walked with a natural cadence (1.4 +/- 0.1 m/s) on a 10-m-long force plate system. In vivo......-stance phase. In contrast, the soleus fascicles were lengthened until the end of the single-stance phase. These findings suggest that the elastic recoil takes place not as a spring-like bouncing but as a catapult action in natural human walking. The interaction between the muscle fascicles and tendinous...

  8. A study on the application of voice interaction in automotive human machine interface experience design

    Science.gov (United States)

    Huang, Zhaohui; Huang, Xiemin

    2018-04-01

    This paper, firstly, introduces the application trend of the integration of multi-channel interactions in automotive HMI ((Human Machine Interface) from complex information models faced by existing automotive HMI and describes various interaction modes. By comparing voice interaction and touch screen, gestures and other interaction modes, the potential and feasibility of voice interaction in automotive HMI experience design are concluded. Then, the related theories of voice interaction, identification technologies, human beings' cognitive models of voices and voice design methods are further explored. And the research priority of this paper is proposed, i.e. how to design voice interaction to create more humane task-oriented dialogue scenarios to enhance interactive experiences of automotive HMI. The specific scenarios in driving behaviors suitable for the use of voice interaction are studied and classified, and the usability principles and key elements for automotive HMI voice design are proposed according to the scenario features. Then, through the user participatory usability testing experiment, the dialogue processes of voice interaction in automotive HMI are defined. The logics and grammars in voice interaction are classified according to the experimental results, and the mental models in the interaction processes are analyzed. At last, the voice interaction design method to create the humane task-oriented dialogue scenarios in the driving environment is proposed.

  9. Dopaminergic, Serotonergic, and Oxytonergic Candidate Genes Associated with Infant Attachment Security and Disorganization? In Search of Main and Interaction Effects

    Science.gov (United States)

    Luijk, Maartje P. C. M.; Roisman, Glenn I.; Haltigan, John D.; Tiemeier, Henning; Booth-LaForce, Cathryn; van IJzendoorn, Marinus H.; Belsky, Jay; Uitterlinden, Andre G.; Jaddoe, Vincent W. V.; Hofman, Albert; Verhulst, Frank C.; Tharner, Anne; Bakermans-Kranenburg, Marian J.

    2011-01-01

    Background and methods: In two birth cohort studies with genetic, sensitive parenting, and attachment data of more than 1,000 infants in total, we tested main and interaction effects of candidate genes involved in the dopamine, serotonin, and oxytocin systems ("DRD4", "DRD2", "COMT", "5-HTT", "OXTR") on attachment security and disorganization.…

  10. Human Work Interaction Design. Work Analysis and HCI

    DEFF Research Database (Denmark)

    Paasch, Kasper

    2013-01-01

    . The papers reflect many different areas and address many complex and diverse work domains, ranging from medical user interfaces, work and speech interactions at elderly care facilities, greenhouse climate control, navigating through large oil industry engineering models, crisis management, library usability......This book constitutes the thoroughly refereed post-conference proceedings of the Third IFIP WG 13.6 Working Conference on Human Work Interaction Design, HWID 2012, held in Copenhagen, Denmark, in December 2012. The 16 revised papers presented were carefully selected for inclusion in this volume...

  11. A review of over three decades of research on cat-human and human-cat interactions and relationships.

    Science.gov (United States)

    Turner, Dennis C

    2017-08-01

    This review article covers research conducted over the last three decades on cat-human and human-cat interactions and relationships, especially from an ethological point of view. It includes findings on cat-cat and cat-human communication, cat personalities and cat-owner personalities, the effects of cats on humans, and problems caused by cats. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. The pervasive triad of food security, gender inequity and women's ...

    African Journals Online (AJOL)

    Objectives: This study was designed to explore the interactions between food securing activities, health and gender equity from the perspective of rural east African women. The specific objectives were to document the critical interaction among these three issues—food security, gender inequity, women's health within the ...

  13. Choice of Human-Computer Interaction Mode in Stroke Rehabilitation.

    Science.gov (United States)

    Mousavi Hondori, Hossein; Khademi, Maryam; Dodakian, Lucy; McKenzie, Alison; Lopes, Cristina V; Cramer, Steven C

    2016-03-01

    Advances in technology are providing new forms of human-computer interaction. The current study examined one form of human-computer interaction, augmented reality (AR), whereby subjects train in the real-world workspace with virtual objects projected by the computer. Motor performances were compared with those obtained while subjects used a traditional human-computer interaction, that is, a personal computer (PC) with a mouse. Patients used goal-directed arm movements to play AR and PC versions of the Fruit Ninja video game. The 2 versions required the same arm movements to control the game but had different cognitive demands. With AR, the game was projected onto the desktop, where subjects viewed the game plus their arm movements simultaneously, in the same visual coordinate space. In the PC version, subjects used the same arm movements but viewed the game by looking up at a computer monitor. Among 18 patients with chronic hemiparesis after stroke, the AR game was associated with 21% higher game scores (P = .0001), 19% faster reaching times (P = .0001), and 15% less movement variability (P = .0068), as compared to the PC game. Correlations between game score and arm motor status were stronger with the AR version. Motor performances during the AR game were superior to those during the PC game. This result is due in part to the greater cognitive demands imposed by the PC game, a feature problematic for some patients but clinically useful for others. Mode of human-computer interface influences rehabilitation therapy demands and can be individualized for patients. © The Author(s) 2015.

  14. Human-inspired feedback synergies for environmental interaction with a dexterous robotic hand.

    Science.gov (United States)

    Kent, Benjamin A; Engeberg, Erik D

    2014-11-07

    Effortless control of the human hand is mediated by the physical and neural couplings inherent in the structure of the hand. This concept was explored for environmental interaction tasks with the human hand, and a novel human-inspired feedback synergy (HFS) controller was developed for a robotic hand which synchronized position and force feedback signals to mimic observed human hand motions. This was achieved by first recording the finger joint motion profiles of human test subjects, where it was observed that the subjects would extend their fingers to maintain a natural hand posture when interacting with different surfaces. The resulting human joint angle data were used as inspiration to develop the HFS controller for the anthropomorphic robotic hand, which incorporated finger abduction and force feedback in the control laws for finger extension. Experimental results showed that by projecting a broader view of the tasks at hand to each specific joint, the HFS controller produced hand motion profiles that closely mimic the observed human responses and allowed the robotic manipulator to interact with the surfaces while maintaining a natural hand posture. Additionally, the HFS controller enabled the robotic hand to autonomously traverse vertical step discontinuities without prior knowledge of the environment, visual feedback, or traditional trajectory planning techniques.

  15. Human-inspired feedback synergies for environmental interaction with a dexterous robotic hand

    International Nuclear Information System (INIS)

    Kent, Benjamin A; Engeberg, Erik D

    2014-01-01

    Effortless control of the human hand is mediated by the physical and neural couplings inherent in the structure of the hand. This concept was explored for environmental interaction tasks with the human hand, and a novel human-inspired feedback synergy (HFS) controller was developed for a robotic hand which synchronized position and force feedback signals to mimic observed human hand motions. This was achieved by first recording the finger joint motion profiles of human test subjects, where it was observed that the subjects would extend their fingers to maintain a natural hand posture when interacting with different surfaces. The resulting human joint angle data were used as inspiration to develop the HFS controller for the anthropomorphic robotic hand, which incorporated finger abduction and force feedback in the control laws for finger extension. Experimental results showed that by projecting a broader view of the tasks at hand to each specific joint, the HFS controller produced hand motion profiles that closely mimic the observed human responses and allowed the robotic manipulator to interact with the surfaces while maintaining a natural hand posture. Additionally, the HFS controller enabled the robotic hand to autonomously traverse vertical step discontinuities without prior knowledge of the environment, visual feedback, or traditional trajectory planning techniques. (paper)

  16. The interactive evolution of human communication systems.

    Science.gov (United States)

    Fay, Nicolas; Garrod, Simon; Roberts, Leo; Swoboda, Nik

    2010-04-01

    This paper compares two explanations of the process by which human communication systems evolve: iterated learning and social collaboration. It then reports an experiment testing the social collaboration account. Participants engaged in a graphical communication task either as a member of a community, where they interacted with seven different partners drawn from the same pool, or as a member of an isolated pair, where they interacted with the same partner across the same number of games. Participants' horizontal, pair-wise interactions led "bottom up" to the creation of an effective and efficient shared sign system in the community condition. Furthermore, the community-evolved sign systems were as effective and efficient as the local sign systems developed by isolated pairs. Finally, and as predicted by a social collaboration account, and not by an iterated learning account, interaction was critical to the creation of shared sign systems, with different isolated pairs establishing different local sign systems and different communities establishing different global sign systems. Copyright © 2010 Cognitive Science Society, Inc.

  17. Poster Abstract: A Practical Model for Human-Smart Appliances Interaction

    DEFF Research Database (Denmark)

    Fürst, Jonathan; Fruergaard, Andreas; Johannesen, Marco Høvinghof

    2016-01-01

    for human-smart appliance interaction. We present a prototype implementation with an off-the-shelf smart lighting and heating system in a shared office space. Our approach minimizes the need for location metadata. It relies on a human-feedback loop (both sensor based and manual) to identify the optimal...

  18. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  19. Quantifying Trust, Distrust, and Suspicion in Human-System Interactions

    Science.gov (United States)

    2015-10-26

    communication, psychology , human factors, management, marketing, information technology, and brain/neurology. We first developed a generic model of state...task classification based upon topographic EEG data. Biological Psychology , 1995. 40: p. 239-250. 5. Gevins, A., et al., High-Resolution EEG...Interaction (submitted), 2013. 15. Pouliota, P., et al., Nonlinear hemodynamic responses in human epilepsy : A multimodal analysis with fNIRS-EEG and fMRI

  20. Quantifying human-environment interactions using videography in the context of infectious disease transmission

    Directory of Open Access Journals (Sweden)

    Timothy R. Julian

    2018-05-01

    Full Text Available Quantitative data on human-environment interactions are needed to fully understand infectious disease transmission processes and conduct accurate risk assessments. Interaction events occur during an individual’s movement through, and contact with, the environment, and can be quantified using diverse methodologies. Methods that utilize videography, coupled with specialized software, can provide a permanent record of events, collect detailed interactions in high resolution, be reviewed for accuracy, capture events difficult to observe in real-time, and gather multiple concurrent phenomena. In the accompanying video, the use of specialized software to capture humanenvironment interactions for human exposure and disease transmission is highlighted. Use of videography, combined with specialized software, allows for the collection of accurate quantitative representations of human-environment interactions in high resolution. Two specialized programs include the Virtual Timing Device for the Personal Computer, which collects sequential microlevel activity time series of contact events and interactions, and LiveTrak, which is optimized to facilitate annotation of events in real-time. Opportunities to annotate behaviors at high resolution using these tools are promising, permitting detailed records that can be summarized to gain information on infectious disease transmission and incorporated into more complex models of human exposure and risk.

  1. Federal Government Information Systems Security Management and Governance Are Pacing Factors for Innovation

    Science.gov (United States)

    Edwards, Gregory

    2011-01-01

    Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…

  2. Interaction of rocuronium with human liver cytochromes P450

    OpenAIRE

    Anzenbacherova, Eva; Spicakova, Alena; Jourova, Lenka; Ulrichova, Jitka; Adamus, Milan; Bachleda, Petr; Anzenbacher, Pavel

    2015-01-01

    Rocuronium is a neuromuscular blocking agent acting as a competitive antagonist of acetylcholine. Results of an inhibition of eight individual liver microsomal cytochromes P450 (CYP) are presented. As the patients are routinely premedicated with diazepam, possible interaction of diazepam with rocuronium has been also studied. Results indicated that rocuronium interacts with human liver microsomal CYPs by binding to the substrate site. Next, concentration dependent inhibition of liver micro...

  3. A definitional framework for the human/biometric sensor interaction model

    Science.gov (United States)

    Elliott, Stephen J.; Kukula, Eric P.

    2010-04-01

    Existing definitions for biometric testing and evaluation do not fully explain errors in a biometric system. This paper provides a definitional framework for the Human Biometric-Sensor Interaction (HBSI) model. This paper proposes six new definitions based around two classifications of presentations, erroneous and correct. The new terms are: defective interaction (DI), concealed interaction (CI), false interaction (FI), failure to detect (FTD), failure to extract (FTX), and successfully acquired samples (SAS). As with all definitions, the new terms require a modification to the general biometric model developed by Mansfield and Wayman [1].

  4. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  5. Interactive analysis of human error factors in NPP operation events

    International Nuclear Information System (INIS)

    Zhang Li; Zou Yanhua; Huang Weigang

    2010-01-01

    Interactive of human error factors in NPP operation events were introduced, and 645 WANO operation event reports from 1999 to 2008 were analyzed, among which 432 were found relative to human errors. After classifying these errors with the Root Causes or Causal Factors, and then applying SPSS for correlation analysis,we concluded: (1) Personnel work practices are restricted by many factors. Forming a good personnel work practices is a systematic work which need supports in many aspects. (2)Verbal communications,personnel work practices, man-machine interface and written procedures and documents play great roles. They are four interaction factors which often come in bundle. If some improvements need to be made on one of them,synchronous measures are also necessary for the others.(3) Management direction and decision process, which are related to management,have a significant interaction with personnel factors. (authors)

  6. The Impact of Pro-Government Militias on State and Human Security: A Comparative Analysis of the Afghan Local Police and the Janjaweed

    Science.gov (United States)

    2018-03-01

    employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and human security. This study also...security to the principal who employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and...Uzbek forces, the United States and its allied partners momentarily destroyed most of the al Qaeda operatives in Afghanistan while simultaneously

  7. Observations on human-technology interaction aspects in remote handling for fusion

    International Nuclear Information System (INIS)

    Salminen, Karoliina

    2009-01-01

    Remote handling can been seen as cooperation between human and machine. One of the characteristics of remote handling is that there is always a human involved in the technique: there is always a human guiding and supervising the movements and deciding the actions of the machine. Unlike many other fields of remote handling for fusion, the human-technology interaction side has not been studied carefully recently. The state-of-the-art research about different kinds of remote handling systems shows that there is a lot of information available in this subject, but there is a clear need for studies where the special needs of ITER are taken into account. During the PREFIT programme, the human-interaction aspects of remote handling have been studied, and the goal has been to find solutions compatible with ITER. Some of the aspects that make ITER a unique system are its new technology combining state-of-the-art knowledge from several different fields, and its very international working environment. When discussing the human aspects, the fact of the multinational cooperation cannot be neglected. Since the majority of the information found in the literature review is not about remote handling, references need to be taken from other industries, like aviation. This article consists of ITER remote handling relevant findings in state-of-the-art research and information and knowledge gained during the PREFIT programme, especially during the training periods at JET in Culham and at CEA in Fontenay-aux-Roses. It also discusses the importance of human-technology interaction field in remote handling, especially in ITER.

  8. Security Policy Alignment: A Formal Approach

    NARCIS (Netherlands)

    Pieters, Wolter; Dimkov, T.; Pavlovic, Dusko

    2013-01-01

    Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks,

  9. Probing cocaine-antibody interactions in buffer and human serum.

    Directory of Open Access Journals (Sweden)

    Muthu Ramakrishnan

    Full Text Available Despite progress in cocaine immunotherapy, the kinetic and thermodynamic properties of antibodies which bind to cocaine and its metabolites are not well understood. It is also not clear how the interactions between them differ in a complex matrix such as the serum present in the human body. In the present study, we have used microscale thermophoresis (MST, isothermal titration calorimetry (ITC, and surface plasmon resonance (SPR we have evaluated the affinity properties of a representative mouse monoclonal (mAb08 as well as those of polyclonal antibodies purified from vaccinated mouse and human patient serum.MST analysis of fluorescently tagged mAb08 binding to cocaine reveals an approximately 15 fold decrease in its equilibrium dissociation constant in 20-50% human serum compared with that in saline buffer. A similar trend was also found using enriched polyclonal antibodies purified from vaccinated mice and patient serum, for which we have used fluorescently tagged bovine serum albumin conjugated to succinyl norcocaine (BSA-SNC. This conjugate closely mimics both cocaine and the hapten used to raise these antibodies. The ITC data also revealed that cocaine has a moderate affinity of about 2 µM to 20% human serum and very little interaction with human serum albumin or nonspecific human IgG at that concentration range. In a SPR inhibition experiment, the binding of mAb08 to immobilized BSA-SNC was inhibited by cocaine and benzoylecgonine in a highly competitive manner, whereas the purified polyclonal antibodies from vaccinated humans and mice, revealed preferential selectivity to pharmacologically active cocaine but not to the inactive metabolite benzoylecgonine. We have also developed a simple binding model to simulate the challenges associated with cocaine immunotherapy using the variable quantitative and kinetic properties of the antibodies.High sensitivity calorimetric determination of antibody binding to cocaine and its metabolites provide

  10. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2014-01-01

    Full Text Available After two recent security attacks against implantable medical devices (IMDs have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient’s life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician’s treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  11. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  12. Global Water Cycle Diagrams Minimize Human Influence and Over-represent Water Security

    Science.gov (United States)

    Abbott, B. W.; Bishop, K.; Zarnetske, J. P.; Minaudo, C.; Chapin, F. S., III; Plont, S.; Marçais, J.; Ellison, D.; Roy Chowdhury, S.; Kolbe, T.; Ursache, O.; Hampton, T. B.; GU, S.; Chapin, M.; Krause, S.; Henderson, K. D.; Hannah, D. M.; Pinay, G.

    2017-12-01

    The diagram of the global water cycle is the central icon of hydrology, and for many people, the point of entry to thinking about key scientific concepts such as conservation of mass, teleconnections, and human dependence on ecological systems. Because humans now dominate critical components of the hydrosphere, improving our understanding of the global water cycle has graduated from an academic exercise to an urgent priority. To assess how the water cycle is conceptualized by researchers and the general public, we analyzed 455 water cycle diagrams from textbooks, scientific articles, and online image searches performed in different languages. Only 15% of diagrams integrated human activity into the water cycle and 77% showed no sign of humans whatsoever, although representation of humans varied substantially by region (lowest in China, N. America, and Australia; highest in Western Europe). The abundance and accessibility of freshwater resources were overrepresented, with 98% of diagrams omitting water pollution and climate change, and over 90% of diagrams making no distinction for saline groundwater and lakes. Oceanic aspects of the water cycle (i.e. ocean size, circulation, and precipitation) and related teleconnections were nearly always underrepresented. These patterns held across disciplinary boundaries and through time. We explore the historical and contemporary reasons for some of these biases and present a revised version of the global water cycle based on research from natural and social sciences. We conclude that current depictions of the global water cycle convey a false sense of water security and that reintegrating humans into water cycle diagrams is an important first step towards understanding and sustaining the hydrosocial cycle.

  13. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  14. DISTRIBUTED SYSTEM FOR HUMAN MACHINE INTERACTION IN VIRTUAL ENVIRONMENTS

    Directory of Open Access Journals (Sweden)

    Abraham Obed Chan-Canche

    2017-07-01

    Full Text Available The communication networks built by multiple devices and sensors are becoming more frequent. These device networks allow human-machine interaction development which aims to improve the human performance generating an adaptive environment in response to the information provided by it. The problem of this work is the quick integration of a device network that allows the development of a flexible immersive environment for different uses.

  15. Human-wildlife interactions in urban areas: a review of conflicts, benefits and opportunities

    OpenAIRE

    Soulsbury, Carl D.; White, Piran C. L.

    2015-01-01

    Wildlife has existed in urban areas since records began. However, the discipline of urban ecology is relatively new and one that is undergoing rapid growth. All wildlife in urban areas will interact with humans to some degree. With rates of urbanisation increasing globally, there is a pressing need to understand the type and nature of human-wildlife interactions within urban environments, to help manage, mitigate or even promote these interactions. Much research attention has focussed on th...

  16. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  17. Islamic movement and human rights: Pertubuhan Jamaah Islah Malaysia’s involvement in the “Abolish Internal Security Act Movement,” 2000-2012

    Directory of Open Access Journals (Sweden)

    Maszlee Malik

    2014-12-01

    Full Text Available Human rights has been acknowledged as one of the essential characteristics of good governance. Abuse of human rights is strongly associated with bad governance, which is believed by many to be a serious impediment to development and sustainable growth. Despite the active participations of Islamic movements in many parts of the political world, very little is known of their involvement in advocating human rights issues as part of their struggle for power. Nevertheless, as an Islamic movement and an Islamic revivalism actor in Malaysia, Pertubuhan Jamaah Islah Malaysia (JIM has shown otherwise. JIM has resembled a different attitude towards the issue of human rights that they believe as an integrated and pertinent composition of good governance. By scrutinising their political activities and discourse since 2000, it becomes clear that JIM has been actively engaged in good governance and human rights issues, especially those that relate to the political rights of citizens through its involvement in the Abolish Internal Security Act (ISA Movement (Gerakan Mansuhkan ISA. This paper examines JIM’s involvement in human rights issues with a special focus on its active and leading role in calling for the abolishment of the Internal Security Act (ISA.

  18. Intrinsically motivated reinforcement learning for human-robot interaction in the real-world.

    Science.gov (United States)

    Qureshi, Ahmed Hussain; Nakamura, Yutaka; Yoshikawa, Yuichiro; Ishiguro, Hiroshi

    2018-03-26

    For a natural social human-robot interaction, it is essential for a robot to learn the human-like social skills. However, learning such skills is notoriously hard due to the limited availability of direct instructions from people to teach a robot. In this paper, we propose an intrinsically motivated reinforcement learning framework in which an agent gets the intrinsic motivation-based rewards through the action-conditional predictive model. By using the proposed method, the robot learned the social skills from the human-robot interaction experiences gathered in the real uncontrolled environments. The results indicate that the robot not only acquired human-like social skills but also took more human-like decisions, on a test dataset, than a robot which received direct rewards for the task achievement. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION

  20. CHI 2013 Human Work Interaction Design (HWID) SIG

    DEFF Research Database (Denmark)

    Clemmensen, Torkil; Campos, Pedro F.; Katre, Dinesh S.

    2013-01-01

    In this SIG we aim to introduce the IFIP 13.6 Human Work Interaction Design (HWID) approach to the CHI audience. The HWID working group aims at establishing relationships between extensive empirical work-domain studies and HCI design. We invite participants from industry and academia with an inte...

  1. Protocol and the post-human performativity of security techniques.

    Science.gov (United States)

    O'Grady, Nathaniel

    2016-07-01

    This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the 'aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.

  2. PVA matches human liver in needle-tissue interaction.

    Science.gov (United States)

    de Jong, Tonke L; Pluymen, Loes H; van Gerwen, Dennis J; Kleinrensink, Gert-Jan; Dankelman, Jenny; van den Dobbelsteen, John J

    2017-05-01

    Medical phantoms can be used to study needle-tissue interaction and to train medical residents. The purpose of this research is to study the suitability of polyvinyl alcohol (PVA) as a liver tissue mimicking material in terms of needle-tissue interaction. Insertions into ex-vivo human livers were used for reference. Six PVA samples were created by varying the mass percentage of PVA to water (4m% and 7m%) and the number of freeze-thaw cycles (1, 2 and 3 cycles, 16hours of freezing at -19°C, 8hours of thawing). The inner needle of an 18 Gauge trocar needle with triangular tip was inserted 13 times into each of the samples, using an insertion velocity of 5 mm/s. In addition, 39 insertions were performed in two ex-vivo human livers. Axial forces on the needle were captured during insertion and retraction and characterized by friction along the needle shaft, peak forces, and number of peak forces per unit length. The concentration of PVA and the number of freeze-thaw cycles both influenced the mechanical interaction between needle and specimen. Insertions into 4m% PVA phantoms with 2 freeze-thaw cycles were comparable to human liver in terms of estimated friction along the needle shaft and the number of peak forces. Therefore, these phantoms are considered to be suitable liver mimicking materials for image-guided needle interventions. The mechanical properties of PVA hydrogels can be influenced in a controlled manner by varying the concentration of PVA and the number of freeze-thaw cycles, to mimic liver tissue characteristics. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Human-Structure Dynamic Interaction during Short-Distance Free Falls

    Directory of Open Access Journals (Sweden)

    E. Shahabpoor

    2016-01-01

    Full Text Available The dynamic interactions of falling human bodies with civil structures, regardless of their potentially critical effects, have sparsely been researched in contact biomechanics. The physical contact models suggested in the existing literature, particularly for short-distant falls in home settings, assume the human body falls on a “rigid” (not vibrating ground. A similar assumption is usually made during laboratory-based fall tests, including force platforms. Based on observations from a set of pediatric head-first free fall tests, the present paper shows that the dynamics of the grounded force plate are not always negligible when doing fall test in a laboratory setting. By using a similar analogy for lightweight floor structures, it is shown that ignoring the dynamics of floors in the contact model can result in an up to 35% overestimation of the peak force experienced by a falling human. A nonlinear contact model is suggested, featuring an agent-based modelling approach, where the dynamics of the falling human and the impact object (force plate or a floor structure here are each modelled using a single-degree-of-freedom model to simulate their dynamic interactions. The findings of this research can have wide applications in areas such as impact biomechanics and sports science.

  4. Interactive Synthesis of Code Level Security Rules

    Science.gov (United States)

    2017-04-01

    Proceedings of the 9th ACM conference on Computer and communications security, pages 235–244. ACM, 2002. [19] J. Davis. Hacking of government computers...Inductive programming meets the real world. Communications of the ACM, 58(11):90–99, 2015. [24] S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and...Software Engineering, pages 462–473. ACM, 2015. [37] S. H. Muggleton, D. Lin, and A. Tamaddoni-Nezhad. Meta-interpretive learning of higher- order dyadic

  5. Human cancer protein-protein interaction network: a structural perspective.

    Directory of Open Access Journals (Sweden)

    Gozde Kar

    2009-12-01

    Full Text Available Protein-protein interaction networks provide a global picture of cellular function and biological processes. Some proteins act as hub proteins, highly connected to others, whereas some others have few interactions. The dysfunction of some interactions causes many diseases, including cancer. Proteins interact through their interfaces. Therefore, studying the interface properties of cancer-related proteins will help explain their role in the interaction networks. Similar or overlapping binding sites should be used repeatedly in single interface hub proteins, making them promiscuous. Alternatively, multi-interface hub proteins make use of several distinct binding sites to bind to different partners. We propose a methodology to integrate protein interfaces into cancer interaction networks (ciSPIN, cancer structural protein interface network. The interactions in the human protein interaction network are replaced by interfaces, coming from either known or predicted complexes. We provide a detailed analysis of cancer related human protein-protein interfaces and the topological properties of the cancer network. The results reveal that cancer-related proteins have smaller, more planar, more charged and less hydrophobic binding sites than non-cancer proteins, which may indicate low affinity and high specificity of the cancer-related interactions. We also classified the genes in ciSPIN according to phenotypes. Within phenotypes, for breast cancer, colorectal cancer and leukemia, interface properties were found to be discriminating from non-cancer interfaces with an accuracy of 71%, 67%, 61%, respectively. In addition, cancer-related proteins tend to interact with their partners through distinct interfaces, corresponding mostly to multi-interface hubs, which comprise 56% of cancer-related proteins, and constituting the nodes with higher essentiality in the network (76%. We illustrate the interface related affinity properties of two cancer-related hub

  6. Visual exploration and analysis of human-robot interaction rules

    Science.gov (United States)

    Zhang, Hui; Boyles, Michael J.

    2013-01-01

    We present a novel interaction paradigm for the visual exploration, manipulation and analysis of human-robot interaction (HRI) rules; our development is implemented using a visual programming interface and exploits key techniques drawn from both information visualization and visual data mining to facilitate the interaction design and knowledge discovery process. HRI is often concerned with manipulations of multi-modal signals, events, and commands that form various kinds of interaction rules. Depicting, manipulating and sharing such design-level information is a compelling challenge. Furthermore, the closed loop between HRI programming and knowledge discovery from empirical data is a relatively long cycle. This, in turn, makes design-level verification nearly impossible to perform in an earlier phase. In our work, we exploit a drag-and-drop user interface and visual languages to support depicting responsive behaviors from social participants when they interact with their partners. For our principal test case of gaze-contingent HRI interfaces, this permits us to program and debug the robots' responsive behaviors through a graphical data-flow chart editor. We exploit additional program manipulation interfaces to provide still further improvement to our programming experience: by simulating the interaction dynamics between a human and a robot behavior model, we allow the researchers to generate, trace and study the perception-action dynamics with a social interaction simulation to verify and refine their designs. Finally, we extend our visual manipulation environment with a visual data-mining tool that allows the user to investigate interesting phenomena such as joint attention and sequential behavioral patterns from multiple multi-modal data streams. We have created instances of HRI interfaces to evaluate and refine our development paradigm. As far as we are aware, this paper reports the first program manipulation paradigm that integrates visual programming

  7. Validity evidence for the Security Scale as a measure of perceived attachment security in adolescence.

    Science.gov (United States)

    Van Ryzin, Mark J; Leve, Leslie D

    2012-04-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  8. Sources of law, voluntary obedience and human interactions: an ...

    African Journals Online (AJOL)

    Sources of law, voluntary obedience and human interactions: an analysis. ... Nnamdi Azikiwe University Journal of International Law and Jurisprudence ... This paper examines ways in which the various sources of law can be modified in such ...

  9. Control system security in nuclear power plant

    International Nuclear Information System (INIS)

    Li Jianghai; Huang Xiaojin

    2012-01-01

    The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed. (authors)

  10. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  11. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    Science.gov (United States)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  12. Research report on human media; Human media no chosa kenkyu hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The human multimedia technology corresponding to users` subjective characteristics was researched to realize information environment producing a sense of unity with human. The human media technology realizes a human sensitive information processing model and a common database easily acceptable sensitively by various users. This technology also should be able to fairly accept and transmit individual`s information and knowledge as multimedia information, and in addition it is required to supply a virtual space with presence. In fiscal 1995, the research committee studied the concrete developmental issue for integrating these advanced fundamental technologies, and as practical images planned the prototype systems such as human media interactive plant operation, supply of environment supporting personal intelligent activities, and virtual medical center. The research committee also discussed development of space mobile media to secure energy-saving and safety of automobiles, and an environment simulation system with participation of many people. 34 figs., 2 tabs.

  13. Radioactive Waste SECURITY

    International Nuclear Information System (INIS)

    Brodowski, R.; Drapalik, M.; Gepp, C.; Gufler, K.; Sholly, S.

    2010-01-01

    The purpose of this work is to investigate the safety requirements for a radioactive waste repository, the fundamental problems involved and the legislative rules and arrangements for doing so. As the title already makes clear, the focus of this work is on aspects that can be assigned to the security sector - ie the security against the influence of third parties - and are to be distinguished from safety measures for the improvement of the technical safety aspects. In this context, mention is made of events such as human intrusion into guarded facilities, whereas e.g. a geological analysis on seismic safety is not discussed. For a variety of reasons, the consideration of security nuclear waste repositories in public discussions is increasingly taking a back seat, as ia. Terrorist threats can be considered as negligible risk or well calculable. Depending on the type of storage, different security aspects still have to be considered. (roessner)

  14. Layout Design of Human-Machine Interaction Interface of Cabin Based on Cognitive Ergonomics and GA-ACA

    Directory of Open Access Journals (Sweden)

    Li Deng

    2016-01-01

    Full Text Available In order to consider the psychological cognitive characteristics affecting operating comfort and realize the automatic layout design, cognitive ergonomics and GA-ACA (genetic algorithm and ant colony algorithm were introduced into the layout design of human-machine interaction interface. First, from the perspective of cognitive psychology, according to the information processing process, the cognitive model of human-machine interaction interface was established. Then, the human cognitive characteristics were analyzed, and the layout principles of human-machine interaction interface were summarized as the constraints in layout design. Again, the expression form of fitness function, pheromone, and heuristic information for the layout optimization of cabin was studied. The layout design model of human-machine interaction interface was established based on GA-ACA. At last, a layout design system was developed based on this model. For validation, the human-machine interaction interface layout design of drilling rig control room was taken as an example, and the optimization result showed the feasibility and effectiveness of the proposed method.

  15. Layout Design of Human-Machine Interaction Interface of Cabin Based on Cognitive Ergonomics and GA-ACA.

    Science.gov (United States)

    Deng, Li; Wang, Guohua; Yu, Suihuai

    2016-01-01

    In order to consider the psychological cognitive characteristics affecting operating comfort and realize the automatic layout design, cognitive ergonomics and GA-ACA (genetic algorithm and ant colony algorithm) were introduced into the layout design of human-machine interaction interface. First, from the perspective of cognitive psychology, according to the information processing process, the cognitive model of human-machine interaction interface was established. Then, the human cognitive characteristics were analyzed, and the layout principles of human-machine interaction interface were summarized as the constraints in layout design. Again, the expression form of fitness function, pheromone, and heuristic information for the layout optimization of cabin was studied. The layout design model of human-machine interaction interface was established based on GA-ACA. At last, a layout design system was developed based on this model. For validation, the human-machine interaction interface layout design of drilling rig control room was taken as an example, and the optimization result showed the feasibility and effectiveness of the proposed method.

  16. The Error Is the Clue: Breakdown In Human-Machine Interaction

    National Research Council Canada - National Science Library

    Martinovsky, Bilyana; Traum, David

    2006-01-01

    .... Human reactions to these irritating features typically appear in the following order: tiredness, tolerance, anger, confusion, irony, humor, exhaustion, uncertainty, lack of desire to communicate. The studied features of human expressions of irritation in nonface- to-face interaction are: intonation, emphatic speech, elliptic speech, speed of speech, extra-linguistic signs, speed of verbal action, and overlap.

  17. Towards Semantic Analysis of Training-Learning Relationships within Human-Machine Interactions

    DEFF Research Database (Denmark)

    Badie, Farshad

    2016-01-01

    In this article First-Order Predicate Logic (FOL) is employed for analysing some relationships between human beings and machines. Based on FOL, I will be conceptually and logically concerned with semantic analysis of training-learning relationships in human-machine interaction. The central focus...

  18. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  19. Tele-Lab IT-Security: an Architecture for an online virtual IT Security Lab

    Directory of Open Access Journals (Sweden)

    Christoph Meinel

    2008-05-01

    Full Text Available Recently, Awareness Creation in terms of IT security has become a big thing – not only for enterprises. Campaigns for pupils try to highlight the importance of IT security even in the user’s early years. Common practices in security education – as seen in computer science courses at universities – mainly consist of literature and lecturing. In the best case, the teaching facility offers practical courses in a dedicated isolated computer lab. Additionally, there are some more or less interactive e-learning applications around. Most existing offers can do nothing more than impart theoretical knowledge or basic information. They all lack of possibilities to provide practical experience with security software or even hacker tools in a realistic environment. The only exceptions are the expensive and hard-to-maintain dedicated computer security labs. Those can only be provided by very few organizations. Tele-Lab IT-Security was designed to offer hands-on experience exercises in IT security without the need of additional hardware or maintenance expenses. The existing implementation of Tele-Lab even provides access to the learning environment over the Internet – and thus can be used anytime and anywhere. The present paper describes the extended architecture on which the current version of the Tele-Lab server is built.

  20. The Human Threat to River Ecosystems at the Watershed Scale: An Ecological Security Assessment of the Songhua River Basin, Northeast China

    Directory of Open Access Journals (Sweden)

    Yuan Shen

    2017-03-01

    Full Text Available Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basins and promoting environmental management. In this study, China’s Songhua River Basin was divided into 204 assessment units by combining watershed and administrative boundaries. Ten human threat factors were identified based on their significant influence on the river ecosystem. A modified ecological threat index was used to synthetically evaluate the ecological security, where frequency was weighted by flow length from the grids to the main rivers, while severity was weighted by the potential hazard of the factors on variables of river ecosystem integrity. The results showed that individual factors related to urbanization, agricultural development and facility construction presented different spatial distribution characteristics. At the center of the plain area, the provincial capital cities posed the highest level of threat, as did the municipal districts of prefecture-level cities. The spatial relationships between hot spot locations of the ecological threat index and water quality, as well as the distribution areas of critically endangered species, were analyzed. The sensitivity analysis illustrated that alteration of agricultural development largely changed the ecological security level of the basin. By offering a reference for assessing ecological security, this study can enhance water environmental planning and management.

  1. A process framework for information security management

    Directory of Open Access Journals (Sweden)

    Knut Haufe

    2016-01-01

    Full Text Available Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Key elements of the operation of an ISMS are ISMS processes. However, and in spite of its importance, an ISMS process framework with a description of ISMS processes and their interaction as well as the interaction with other management processes is not available in the literature. Cost benefit analysis of information security investments regarding single measures protecting information and ISMS processes are not in the focus of current research, mostly focused on economics. This article aims to fill this research gap by proposing such an ISMS process framework as the main contribution. Based on a set of agreed upon ISMS processes in existing standards like ISO 27000 series, COBIT and ITIL. Within the framework, identified processes are described and their interaction and interfaces are specified. This framework helps to focus on the operation of the ISMS, instead of focusing on measures and controls. By this, as a main finding, the systemic character of the ISMS consisting of processes and the perception of relevant roles of the ISMS is strengthened.

  2. Toward a framework for levels of robot autonomy in human-robot interaction.

    Science.gov (United States)

    Beer, Jenay M; Fisk, Arthur D; Rogers, Wendy A

    2014-07-01

    A critical construct related to human-robot interaction (HRI) is autonomy, which varies widely across robot platforms. Levels of robot autonomy (LORA), ranging from teleoperation to fully autonomous systems, influence the way in which humans and robots may interact with one another. Thus, there is a need to understand HRI by identifying variables that influence - and are influenced by - robot autonomy. Our overarching goal is to develop a framework for levels of robot autonomy in HRI. To reach this goal, the framework draws links between HRI and human-automation interaction, a field with a long history of studying and understanding human-related variables. The construct of autonomy is reviewed and redefined within the context of HRI. Additionally, the framework proposes a process for determining a robot's autonomy level, by categorizing autonomy along a 10-point taxonomy. The framework is intended to be treated as guidelines to determine autonomy, categorize the LORA along a qualitative taxonomy, and consider which HRI variables (e.g., acceptance, situation awareness, reliability) may be influenced by the LORA.

  3. Situated dialog in speech-based human-computer interaction

    CERN Document Server

    Raux, Antoine; Lane, Ian; Misu, Teruhisa

    2016-01-01

    This book provides a survey of the state-of-the-art in the practical implementation of Spoken Dialog Systems for applications in everyday settings. It includes contributions on key topics in situated dialog interaction from a number of leading researchers and offers a broad spectrum of perspectives on research and development in the area. In particular, it presents applications in robotics, knowledge access and communication and covers the following topics: dialog for interacting with robots; language understanding and generation; dialog architectures and modeling; core technologies; and the analysis of human discourse and interaction. The contributions are adapted and expanded contributions from the 2014 International Workshop on Spoken Dialog Systems (IWSDS 2014), where researchers and developers from industry and academia alike met to discuss and compare their implementation experiences, analyses and empirical findings.

  4. Two is better than one: Physical interactions improve motor performance in humans

    OpenAIRE

    G. Ganesh; A. Takagi; R. Osu; T. Yoshioka; M. Kawato; E. Burdet

    2014-01-01

    How do physical interactions with others change our own motor behavior? Utilizing a novel motor learning paradigm in which the hands of two - individuals are physically connected without their conscious awareness, we investigated how the interaction forces from a partner adapt the motor behavior in physically interacting humans. We observed the motor adaptations during physical interactions to be mutually beneficial such that both the worse and better of the interacting partners improve motor...

  5. Mapping frontier research in the humanities

    DEFF Research Database (Denmark)

    -academic fields and supplemented by new transdisciplinary methods focusing on solving grand societal challenges, such as globalisation, multiculturalism, equality, democracy, security and health. Given the nature of these challenges and the ways in which university leadership has been organised, the very notion...... of impact and styles of reasoning, both in classical and interdisciplinary fields of the humanities. From this perspective, a more composite picture of human culture, language and history can emerge from humanities research. It goes beyond the picture of rational agents, and situates human interaction...... in more complex landscapes of collective identities, networks, and constraints that open for new forms of intellectual leadership in the 21st century. Link: http://www.bloomsbury.com/uk/mapping-frontier-research-in-the-humanities-9781472597687/...

  6. Mapping Frontier Research in the Humanities

    DEFF Research Database (Denmark)

    -academic fields and supplemented by new transdisciplinary methods focusing on solving grand societal challenges, such as globalisation, multiculturalism, equality, democracy, security and health. Given the nature of these challenges and the ways in which university leadership has been organised, the very notion...... of impact and styles of reasoning, both in classical and interdisciplinary fields of the humanities. From this perspective, a more composite picture of human culture, language and history can emerge from humanities research. It goes beyond the picture of rational agents, and situates human interaction...... in more complex landscapes of collective identities, networks, and constraints that open for new forms of intellectual leadership in the 21st century. Link: http://www.bloomsbury.com/uk/mapping-frontier-research-in-the-humanities-9781472597687/...

  7. In silico modeling of human α2C-adrenoreceptor interaction with filamin-2.

    Directory of Open Access Journals (Sweden)

    Marcin Pawlowski

    Full Text Available Vascular smooth muscle α2C-adrenoceptors (α2C-ARs mediate vasoconstriction of small blood vessels, especially arterioles. Studies of endogenous receptors in human arteriolar smooth muscle cells (referred to as microVSM and transiently transfected receptors in heterologous HEK293 cells show that the α2C-ARs are perinuclear receptors that translocate to the cell surface under cellular stress and elicit a biological response. Recent studies in microVSM unraveled a crucial role of Rap1A-Rho-ROCK-F-actin pathways in receptor translocation, and identified protein-protein interaction of α2C-ARs with the actin binding protein filamin-2 as an essential step in the process. To better understand the molecular nature and specificity of this interaction, in this study, we constructed comparative models of human α2C-AR and human filamin-2 proteins. Finally, we performed in silico protein-protein docking to provide a structural platform for the investigation of human α2C-AR and filamin-2 interactions. We found that electrostatic interactions seem to play a key role in this complex formation which manifests in interactions between the C-terminal arginines of α2C-ARs (particularly R454 and R456 and negatively charged residues from filamin-2 region between residues 1979 and 2206. Phylogenetic and sequence analysis showed that these interactions have evolved in warm-blooded animals.

  8. Investigation of Employee Security Behaviour: A Grounded Theory Approach

    OpenAIRE

    Connolly , Lena; Lang , Michael; Tygar , J. ,

    2015-01-01

    Part 5: Security Management and Human Aspects of Security; International audience; At a time of rapid business globalisation, it is necessary to understand employee security behaviour within diverse cultural settings. While general deterrence theory has been extensively used in Behavioural Information Security research with the aim to explain the effect of deterrent factors on employees’ security actions, these studies provide inconsistent and even contradictory findings. Therefore, a further...

  9. Comparison of dogs and humans in visual scanning of social interaction

    OpenAIRE

    Törnqvist, Heini; Somppi, Sanni; Koskela, Aija; Krause, Christina M.; Vainio, Outi; Kujala, Miiamaaria V.

    2015-01-01

    Previous studies have demonstrated similarities in gazing behaviour of dogs and humans, but comparisons under similar conditions are rare, and little is known about dogs' visual attention to social scenes. Here, we recorded the eye gaze of dogs while they viewed images containing two humans or dogs either interacting socially or facing away: the results were compared with equivalent data measured from humans. Furthermore, we compared the gazing behaviour of two dog and two human populations w...

  10. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  11. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  12. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    Science.gov (United States)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  13. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  14. Neuroscience of Human Social Interactions and Adult Attachment Style

    Directory of Open Access Journals (Sweden)

    Pascal eVrticka

    2012-07-01

    Full Text Available Since its first description four decades ago, attachment theory has become one of the principal developmental psychological frameworks for describing the role of individual differences in the establishment and maintenance of social bonds between people. Yet, still little is known about the neurobiological underpinnings of attachment orientations and their well-established impact on a range of social and affective behaviors. In the present review, we summarize data from recent studies using cognitive and imaging approaches to characterize attachment styles and their effect on emotion and social cognition. We propose a functional neuroanatomical framework to integrate the key brain mechanisms involved in the perception and regulation of social emotional information, and their modulation by individual differences in terms of secure versus insecure (more specifically avoidant, anxious, or resolved vs. unresolved attachment traits. This framework describes how each individual’s attachment style (built through interactions between personal relationship history and predispositions may influence the encoding of approach versus aversion tendencies (safety versus threat in social encounters, implicating the activation of a network of subcortical (amygdala, hippocampus, striatum and cortical (insula, cingulate limbic areas. These basic and automatic affective mentalization mechanisms are in turn modulated by more elaborate and voluntary cognitive mentalization processes, subserving theory of mind, cognitive control, and emotion regulation capacities, implicating a distinct network (in medial prefrontal cortex, superior temporal sulcus, and temporo-parietal junction, among others. Such research does not only help better understand the neural underpinnings of human social behavior, but also provides important insights on psychopathological conditions where attachment dysregulations is likely to play an important (causal role.

  15. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  16. Studying the neurobiology of human social interaction: Making the case for ecological validity.

    Science.gov (United States)

    Hogenelst, Koen; Schoevers, Robert A; aan het Rot, Marije

    2015-01-01

    With this commentary we make the case for an increased focus on the ecological validity of the measures used to assess aspects of human social functioning. Impairments in social functioning are seen in many types of psychopathology, negatively affecting the lives of psychiatric patients and those around them. Yet the neurobiology underlying abnormal social interaction remains unclear. As an example of human social neuroscience research with relevance to biological psychiatry and clinical psychopharmacology, this commentary discusses published experimental studies involving manipulation of the human brain serotonin system that included assessments of social behavior. To date, these studies have mostly been laboratory-based and included computer tasks, observations by others, or single-administration self-report measures. Most laboratory measures used so far inform about the role of serotonin in aspects of social interaction, but the relevance for real-life interaction is often unclear. Few studies have used naturalistic assessments in real life. We suggest several laboratory methods with high ecological validity as well as ecological momentary assessment, which involves intensive repeated measures in naturalistic settings. In sum, this commentary intends to stimulate experimental research on the neurobiology of human social interaction as it occurs in real life.

  17. Iris Cryptography for Security Purpose

    Science.gov (United States)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  18. AUTOMATING THE DATA SECURITY PROCESS

    OpenAIRE

    Florin Ogigau-Neamtiu

    2017-01-01

    Contemporary organizations face big data security challenges in the cyber environment due to modern threats and actual business working model which relies heavily on collaboration, data sharing, tool integration, increased mobility, etc. The nowadays data classification and data obfuscation selection processes (encryption, masking or tokenization) suffer because of the human implication in the process. Organizations need to shirk data security domain by classifying information based on its...

  19. Mapping Protein Interactions between Dengue Virus and Its Human and Insect Hosts

    Science.gov (United States)

    Doolittle, Janet M.; Gomez, Shawn M.

    2011-01-01

    Background Dengue fever is an increasingly significant arthropod-borne viral disease, with at least 50 million cases per year worldwide. As with other viral pathogens, dengue virus is dependent on its host to perform the bulk of functions necessary for viral survival and replication. To be successful, dengue must manipulate host cell biological processes towards its own ends, while avoiding elimination by the immune system. Protein-protein interactions between the virus and its host are one avenue through which dengue can connect and exploit these host cellular pathways and processes. Methodology/Principal Findings We implemented a computational approach to predict interactions between Dengue virus (DENV) and both of its hosts, Homo sapiens and the insect vector Aedes aegypti. Our approach is based on structural similarity between DENV and host proteins and incorporates knowledge from the literature to further support a subset of the predictions. We predict over 4,000 interactions between DENV and humans, as well as 176 interactions between DENV and A. aegypti. Additional filtering based on shared Gene Ontology cellular component annotation reduced the number of predictions to approximately 2,000 for humans and 18 for A. aegypti. Of 19 experimentally validated interactions between DENV and humans extracted from the literature, this method was able to predict nearly half (9). Additional predictions suggest specific interactions between virus and host proteins relevant to interferon signaling, transcriptional regulation, stress, and the unfolded protein response. Conclusions/Significance Dengue virus manipulates cellular processes to its advantage through specific interactions with the host's protein interaction network. The interaction networks presented here provide a set of hypothesis for further experimental investigation into the DENV life cycle as well as potential therapeutic targets. PMID:21358811

  20. Mapping protein interactions between Dengue virus and its human and insect hosts.

    Directory of Open Access Journals (Sweden)

    Janet M Doolittle

    Full Text Available BACKGROUND: Dengue fever is an increasingly significant arthropod-borne viral disease, with at least 50 million cases per year worldwide. As with other viral pathogens, dengue virus is dependent on its host to perform the bulk of functions necessary for viral survival and replication. To be successful, dengue must manipulate host cell biological processes towards its own ends, while avoiding elimination by the immune system. Protein-protein interactions between the virus and its host are one avenue through which dengue can connect and exploit these host cellular pathways and processes. METHODOLOGY/PRINCIPAL FINDINGS: We implemented a computational approach to predict interactions between Dengue virus (DENV and both of its hosts, Homo sapiens and the insect vector Aedes aegypti. Our approach is based on structural similarity between DENV and host proteins and incorporates knowledge from the literature to further support a subset of the predictions. We predict over 4,000 interactions between DENV and humans, as well as 176 interactions between DENV and A. aegypti. Additional filtering based on shared Gene Ontology cellular component annotation reduced the number of predictions to approximately 2,000 for humans and 18 for A. aegypti. Of 19 experimentally validated interactions between DENV and humans extracted from the literature, this method was able to predict nearly half (9. Additional predictions suggest specific interactions between virus and host proteins relevant to interferon signaling, transcriptional regulation, stress, and the unfolded protein response. CONCLUSIONS/SIGNIFICANCE: Dengue virus manipulates cellular processes to its advantage through specific interactions with the host's protein interaction network. The interaction networks presented here provide a set of hypothesis for further experimental investigation into the DENV life cycle as well as potential therapeutic targets.

  1. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2012-01-01

    Full Text Available Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and argues that the newly promulgated Kenyan constitution in chapter three on citizenship has a provision that can be interpreted as encouraging child trafficking.

  2. Air traffic security act unconstitutional

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1 st Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  3. Virtual reality/ augmented reality technology : the next chapter of human-computer interaction

    OpenAIRE

    Huang, Xing

    2015-01-01

    No matter how many different size and shape the computer has, the basic components of computers are still the same. If we use the user perspective to look for the development of computer history, we can surprisingly find that it is the input output device that leads the development of the industry development, in one word, human-computer interaction changes the development of computer history. Human computer interaction has been gone through three stages, the first stage relies on the inpu...

  4. Scaling identity connects human mobility and social interactions.

    Science.gov (United States)

    Deville, Pierre; Song, Chaoming; Eagle, Nathan; Blondel, Vincent D; Barabási, Albert-László; Wang, Dashun

    2016-06-28

    Massive datasets that capture human movements and social interactions have catalyzed rapid advances in our quantitative understanding of human behavior during the past years. One important aspect affecting both areas is the critical role space plays. Indeed, growing evidence suggests both our movements and communication patterns are associated with spatial costs that follow reproducible scaling laws, each characterized by its specific critical exponents. Although human mobility and social networks develop concomitantly as two prolific yet largely separated fields, we lack any known relationships between the critical exponents explored by them, despite the fact that they often study the same datasets. Here, by exploiting three different mobile phone datasets that capture simultaneously these two aspects, we discovered a new scaling relationship, mediated by a universal flux distribution, which links the critical exponents characterizing the spatial dependencies in human mobility and social networks. Therefore, the widely studied scaling laws uncovered in these two areas are not independent but connected through a deeper underlying reality.

  5. Adaptive versus Non-Adaptive Security of Multi-Party Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2004-01-01

    Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation....

  6. Modelling of spatially complex human-ecosystem, rural-urban and rich-poor interactions

    CSIR Research Space (South Africa)

    Naude, AH

    2008-06-01

    Full Text Available The paper outlines the challenges of modelling and assessing spatially complex human-ecosystem interactions, and the need to simultaneously consider rural-urban and rich-poor interactions. The context for exploring these challenges is South Africa...

  7. Human-Human Interaction Forces and Interlimb Coordination During Side-by-Side Walking With Hand Contact.

    Science.gov (United States)

    Sylos-Labini, Francesca; d'Avella, Andrea; Lacquaniti, Francesco; Ivanenko, Yury

    2018-01-01

    Handholding can naturally occur between two walkers. When people walk side-by-side, either with or without hand contact, they often synchronize their steps. However, despite the importance of haptic interaction in general and the natural use of hand contact between humans during walking, few studies have investigated forces arising from physical interactions. Eight pairs of adult subjects participated in this study. They walked on side-by-side treadmills at 4 km/h independently and with hand contact. Only hand contact-related sensory information was available for unintentional synchronization, while visual and auditory communication was obstructed. Subjects walked at their natural cadences or following a metronome. Limb kinematics, hand contact 3D interaction forces and EMG activity of 12 upper limb muscles were recorded. Overall, unintentional step frequency locking was observed during about 40% of time in 88% of pairs walking with hand contact. On average, the amplitude of contact arm oscillations decreased while the contralateral (free) arm oscillated in the same way as during normal walking. Interestingly, EMG activity of the shoulder muscles of the contact arm did not decrease, and their synergistic pattern remained similar. The amplitude of interaction forces and of trunk oscillations was similar for synchronized and non-synchronized steps, though the synchronized steps were characterized by significantly more regular orientations of interaction forces. Our results further support the notion that gait synchronization during natural walking is common, and that it may occur through interaction forces. Conservation of the proximal muscle activity of the contact (not oscillating) arm is consistent with neural coupling between cervical and lumbosacral pattern generation circuitries ("quadrupedal" arm-leg coordination) during human gait. Overall, the findings suggest that individuals might integrate force interaction cues to communicate and coordinate steps during

  8. Human-Human Interaction Forces and Interlimb Coordination During Side-by-Side Walking With Hand Contact

    Directory of Open Access Journals (Sweden)

    Francesca Sylos-Labini

    2018-03-01

    Full Text Available Handholding can naturally occur between two walkers. When people walk side-by-side, either with or without hand contact, they often synchronize their steps. However, despite the importance of haptic interaction in general and the natural use of hand contact between humans during walking, few studies have investigated forces arising from physical interactions. Eight pairs of adult subjects participated in this study. They walked on side-by-side treadmills at 4 km/h independently and with hand contact. Only hand contact-related sensory information was available for unintentional synchronization, while visual and auditory communication was obstructed. Subjects walked at their natural cadences or following a metronome. Limb kinematics, hand contact 3D interaction forces and EMG activity of 12 upper limb muscles were recorded. Overall, unintentional step frequency locking was observed during about 40% of time in 88% of pairs walking with hand contact. On average, the amplitude of contact arm oscillations decreased while the contralateral (free arm oscillated in the same way as during normal walking. Interestingly, EMG activity of the shoulder muscles of the contact arm did not decrease, and their synergistic pattern remained similar. The amplitude of interaction forces and of trunk oscillations was similar for synchronized and non-synchronized steps, though the synchronized steps were characterized by significantly more regular orientations of interaction forces. Our results further support the notion that gait synchronization during natural walking is common, and that it may occur through interaction forces. Conservation of the proximal muscle activity of the contact (not oscillating arm is consistent with neural coupling between cervical and lumbosacral pattern generation circuitries (“quadrupedal” arm-leg coordination during human gait. Overall, the findings suggest that individuals might integrate force interaction cues to communicate and

  9. A study on the development of national guide for implementing nuclear security culture in ROK

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2014-05-15

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs.

  10. A study on the development of national guide for implementing nuclear security culture in ROK

    International Nuclear Information System (INIS)

    Koh, Moonsung; Lee, Youngwook; Yoo, Hosik

    2014-01-01

    Among the extended concepts, a remarkable thing is that nuclear security began to be focused on the human factor as well as technical factors (hardware and software system) because most security lapses at nuclear power facilities result from human failings such as low motivation, miscalculation, or malice. Nuclear Security Culture (NSC) is designed to improve the performance of the human factor and to make its interface with security technology and regulations more effective and smooth. There is a need to develop a variety of more efficient tools for achieving sustainable nuclear security culture. We studied for the implementing guide to establish and enhance the nuclear security culture. We have developed the Nuclear Security Culture Implementing Guidelines for licensees in order to enhance nuclear security culture. Licensees have separately established a separate code of conduct on nuclear security culture for their daily business based on such Implementing Guidelines. The Nuclear Security Culture Implementing Guidelines were developed with sufficient consideration of both the IAEA Security Series on nuclear security culture and the Korean circumstances. In all, the Korean government and licensees have timely established and applied the Implementing Guidelines and code of conduct and consequently paved the way for further improvements of the Korean nuclear security regime. The nuclear security culture will facilitate and optimize the human aspects in our nuclear security programs

  11. The role of optics in secure credentials

    Science.gov (United States)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  12. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  13. Warning Signals for Poor Performance Improve Human-Robot Interaction

    NARCIS (Netherlands)

    van den Brule, Rik; Bijlstra, Gijsbert; Dotsch, Ron; Haselager, Pim; Wigboldus, Daniel HJ

    2016-01-01

    The present research was aimed at investigating whether human-robot interaction (HRI) can be improved by a robot’s nonverbal warning signals. Ideally, when a robot signals that it cannot guarantee good performance, people could take preventive actions to ensure the successful completion of the

  14. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    Directory of Open Access Journals (Sweden)

    Ali Abdul Kadir Ali

    2015-07-01

    Full Text Available This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security refers to the general safety of inhabitants and the protection of human rights. This paper compares the security situation in so-called ‘rebel-held’ areas of Syria where alternative governance structures have emerged, examining the security approaches of Local Administrative Councils and Rebel Councils in Deir Azzor, Manbij, Dera, and areas dominated by the Kurdish Democratic Union Party (PYD. It argues that security and safety are strongly influenced by authority formation and the nature of deals and relationships involved in the formation of these nascent authorities. It also argues that security in these areas is strongly influenced by the Syrian government, which disrupts collectives that threaten its own collective security while giving limited support to those which serve its agenda of retaining power. It also demonstrates the limited utility of the ‘regime’ vs. ‘rebel-held’ dichotomy, as rebel groups at times must accommodate the Syrian state in limited ways for instrumental purposes. The article is based on fieldwork conducted in Turkey in 2013–2014, interviews conducted in 2015, and secondary sources based on field research.

  15. Sense of presence and anxiety during virtual social interactions between a human and virtual humans.

    Science.gov (United States)

    Morina, Nexhmedin; Brinkman, Willem-Paul; Hartanto, Dwi; Emmelkamp, Paul M G

    2014-01-01

    Virtual reality exposure therapy (VRET) has been shown to be effective in treatment of anxiety disorders. Yet, there is lack of research on the extent to which interaction between the individual and virtual humans can be successfully implanted to increase levels of anxiety for therapeutic purposes. This proof-of-concept pilot study aimed at examining levels of the sense of presence and anxiety during exposure to virtual environments involving social interaction with virtual humans and using different virtual reality displays. A non-clinical sample of 38 participants was randomly assigned to either a head-mounted display (HMD) with motion tracker and sterescopic view condition or a one-screen projection-based virtual reality display condition. Participants in both conditions engaged in free speech dialogues with virtual humans controlled by research assistants. It was hypothesized that exposure to virtual social interactions will elicit moderate levels of sense of presence and anxiety in both groups. Further it was expected that participants in the HMD condition will report higher scores of sense of presence and anxiety than participants in the one-screen projection-based display condition. Results revealed that in both conditions virtual social interactions were associated with moderate levels of sense of presence and anxiety. Additionally, participants in the HMD condition reported significantly higher levels of presence than those in the one-screen projection-based display condition (p = .001). However, contrary to the expectations neither the average level of anxiety nor the highest level of anxiety during exposure to social virtual environments differed between the groups (p = .97 and p = .75, respectively). The findings suggest that virtual social interactions can be successfully applied in VRET to enhance sense of presence and anxiety. Furthermore, our results indicate that one-screen projection-based displays can successfully activate levels of anxiety in

  16. Sense of presence and anxiety during virtual social interactions between a human and virtual humans

    Directory of Open Access Journals (Sweden)

    Nexhmedin Morina

    2014-04-01

    Full Text Available Virtual reality exposure therapy (VRET has been shown to be effective in treatment of anxiety disorders. Yet, there is lack of research on the extent to which interaction between the individual and virtual humans can be successfully implanted to increase levels of anxiety for therapeutic purposes. This proof-of-concept pilot study aimed at examining levels of the sense of presence and anxiety during exposure to virtual environments involving social interaction with virtual humans and using different virtual reality displays. A non-clinical sample of 38 participants was randomly assigned to either a head-mounted display (HMD with motion tracker and sterescopic view condition or a one-screen projection-based virtual reality display condition. Participants in both conditions engaged in free speech dialogues with virtual humans controlled by research assistants. It was hypothesized that exposure to virtual social interactions will elicit moderate levels of sense of presence and anxiety in both groups. Further it was expected that participants in the HMD condition will report higher scores of sense of presence and anxiety than participants in the one-screen projection-based display condition. Results revealed that in both conditions virtual social interactions were associated with moderate levels of sense of presence and anxiety. Additionally, participants in the HMD condition reported significantly higher levels of presence than those in the one-screen projection-based display condition (p = .001. However, contrary to the expectations neither the average level of anxiety nor the highest level of anxiety during exposure to social virtual environments differed between the groups (p = .97 and p = .75, respectively. The findings suggest that virtual social interactions can be successfully applied in VRET to enhance sense of presence and anxiety. Furthermore, our results indicate that one-screen projection-based displays can successfully activate levels

  17. 350 Years of Fire-Climate-Human Interactions in a Great Lakes Sandy Outwash Plain

    Directory of Open Access Journals (Sweden)

    Richard P. Guyette

    2016-08-01

    Full Text Available Throughout much of eastern North America, quantitative records of historical fire regimes and interactions with humans are absent. Annual resolution fire scar histories provide data on fire frequency, extent, and severity, but also can be used to understand fire-climate-human interactions. This study used tree-ring dated fire scars from red pines (Pinus resinosa at four sites in the Northern Sands Ecological Landscapes of Wisconsin to quantify the interactions among fire occurrence and seasonality, drought, and humans. New methods for assessing the influence of human ignitions on fire regimes were developed. A temporal and spatial index of wildland fire was significantly correlated (r = 0.48 with drought indices (Palmer Drought Severity Index, PDSI. Fire intervals varied through time with human activities that included early French Jesuit missions, European trade (fur, diseases, war, and land use. Comparisons of historical fire records suggest that annual climate in this region has a broad influence on the occurrence of fire years in the Great Lakes region.

  18. Interaction of rocuronium with human liver cytochromes P450.

    Science.gov (United States)

    Anzenbacherova, Eva; Spicakova, Alena; Jourova, Lenka; Ulrichova, Jitka; Adamus, Milan; Bachleda, Petr; Anzenbacher, Pavel

    2015-02-01

    Rocuronium is a neuromuscular blocking agent acting as a competitive antagonist of acetylcholine. Results of an inhibition of eight individual liver microsomal cytochromes P450 (CYP) are presented. As the patients are routinely premedicated with diazepam, possible interaction of diazepam with rocuronium has been also studied. Results indicated that rocuronium interacts with human liver microsomal CYPs by binding to the substrate site. Next, concentration dependent inhibition of liver microsomal CYP3A4 down to 42% (at rocuronium concentration 189 μM) was found. This effect has been confirmed with two CYP3A4 substrates, testosterone (formation of 6β-hydroxytestosterone) and diazepam (temazepam formation). CYP2C9 and CYP2C19 activities were inhibited down to 75-80% (at the same rocuronium concentration). Activities of other microsomal CYPs have not been inhibited by rocuronium. To prove the possibility of rocuronium interaction with other drugs (diazepam), the effect of rocuronium on formation of main diazepam metabolites, temazepam (by CYP3A4) and desmethyldiazepam, (also known as nordiazepam; formed by CYP2C19) in primary culture of human hepatocytes has been examined. Rocuronium has caused inhibition of both reactions by 20 and 15%, respectively. The results open a possibility that interactions of rocuronium with drugs metabolized by CYP3A4 (and possibly also CYP2C19) may be observed. Copyright © 2014 Japanese Pharmacological Society. Production and hosting by Elsevier B.V. All rights reserved.

  19. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  20. Structure and interactions of the human programmed cell death 1 receptor.

    Science.gov (United States)

    Cheng, Xiaoxiao; Veverka, Vaclav; Radhakrishnan, Anand; Waters, Lorna C; Muskett, Frederick W; Morgan, Sara H; Huo, Jiandong; Yu, Chao; Evans, Edward J; Leslie, Alasdair J; Griffiths, Meryn; Stubberfield, Colin; Griffin, Robert; Henry, Alistair J; Jansson, Andreas; Ladbury, John E; Ikemizu, Shinji; Carr, Mark D; Davis, Simon J

    2013-04-26

    PD-1, a receptor expressed by T cells, B cells, and monocytes, is a potent regulator of immune responses and a promising therapeutic target. The structure and interactions of human PD-1 are, however, incompletely characterized. We present the solution nuclear magnetic resonance (NMR)-based structure of the human PD-1 extracellular region and detailed analyses of its interactions with its ligands, PD-L1 and PD-L2. PD-1 has typical immunoglobulin superfamily topology but differs at the edge of the GFCC' sheet, which is flexible and completely lacks a C" strand. Changes in PD-1 backbone NMR signals induced by ligand binding suggest that, whereas binding is centered on the GFCC' sheet, PD-1 is engaged by its two ligands differently and in ways incompletely explained by crystal structures of mouse PD-1 · ligand complexes. The affinities of these interactions and that of PD-L1 with the costimulatory protein B7-1, measured using surface plasmon resonance, are significantly weaker than expected. The 3-4-fold greater affinity of PD-L2 versus PD-L1 for human PD-1 is principally due to the 3-fold smaller dissociation rate for PD-L2 binding. Isothermal titration calorimetry revealed that the PD-1/PD-L1 interaction is entropically driven, whereas PD-1/PD-L2 binding has a large enthalpic component. Mathematical simulations based on the biophysical data and quantitative expression data suggest an unexpectedly limited contribution of PD-L2 to PD-1 ligation during interactions of activated T cells with antigen-presenting cells. These findings provide a rigorous structural and biophysical framework for interpreting the important functions of PD-1 and reveal that potent inhibitory signaling can be initiated by weakly interacting receptors.

  1. HPIminer: A text mining system for building and visualizing human protein interaction networks and pathways.

    Science.gov (United States)

    Subramani, Suresh; Kalpana, Raja; Monickaraj, Pankaj Moses; Natarajan, Jeyakumar

    2015-04-01

    The knowledge on protein-protein interactions (PPI) and their related pathways are equally important to understand the biological functions of the living cell. Such information on human proteins is highly desirable to understand the mechanism of several diseases such as cancer, diabetes, and Alzheimer's disease. Because much of that information is buried in biomedical literature, an automated text mining system for visualizing human PPI and pathways is highly desirable. In this paper, we present HPIminer, a text mining system for visualizing human protein interactions and pathways from biomedical literature. HPIminer extracts human PPI information and PPI pairs from biomedical literature, and visualize their associated interactions, networks and pathways using two curated databases HPRD and KEGG. To our knowledge, HPIminer is the first system to build interaction networks from literature as well as curated databases. Further, the new interactions mined only from literature and not reported earlier in databases are highlighted as new. A comparative study with other similar tools shows that the resultant network is more informative and provides additional information on interacting proteins and their associated networks. Copyright © 2015 Elsevier Inc. All rights reserved.

  2. Portfolio analysis of layered security measures.

    Science.gov (United States)

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. © 2014 Society for Risk Analysis.

  3. RAID: a comprehensive resource for human RNA-associated (RNA–RNA/RNA–protein) interaction

    Science.gov (United States)

    Zhang, Xiaomeng; Wu, Deng; Chen, Liqun; Li, Xiang; Yang, Jinxurong; Fan, Dandan; Dong, Tingting; Liu, Mingyue; Tan, Puwen; Xu, Jintian; Yi, Ying; Wang, Yuting; Zou, Hua; Hu, Yongfei; Fan, Kaili; Kang, Juanjuan; Huang, Yan; Miao, Zhengqiang; Bi, Miaoman; Jin, Nana; Li, Kongning; Li, Xia; Xu, Jianzhen; Wang, Dong

    2014-01-01

    Transcriptomic analyses have revealed an unexpected complexity in the eukaryote transcriptome, which includes not only protein-coding transcripts but also an expanding catalog of noncoding RNAs (ncRNAs). Diverse coding and noncoding RNAs (ncRNAs) perform functions through interaction with each other in various cellular processes. In this project, we have developed RAID (http://www.rna-society.org/raid), an RNA-associated (RNA–RNA/RNA–protein) interaction database. RAID intends to provide the scientific community with all-in-one resources for efficient browsing and extraction of the RNA-associated interactions in human. This version of RAID contains more than 6100 RNA-associated interactions obtained by manually reviewing more than 2100 published papers, including 4493 RNA–RNA interactions and 1619 RNA–protein interactions. Each entry contains detailed information on an RNA-associated interaction, including RAID ID, RNA/protein symbol, RNA/protein categories, validated method, expressing tissue, literature references (Pubmed IDs), and detailed functional description. Users can query, browse, analyze, and manipulate RNA-associated (RNA–RNA/RNA–protein) interaction. RAID provides a comprehensive resource of human RNA-associated (RNA–RNA/RNA–protein) interaction network. Furthermore, this resource will help in uncovering the generic organizing principles of cellular function network. PMID:24803509

  4. Social Psychology Of Persuasion Applied To Human-agent Interaction

    Directory of Open Access Journals (Sweden)

    Shenghua Liu

    2008-01-01

    Full Text Available This paper discusses and evaluates the application of a social psychologically enriched, user-centered approach to agent architecture design. The major aim is to facilitate human-agent interaction (HAI by making agents not only algorithmically more intelligent but also socially more skillful in communicating with the user. A decision-making model and communicative argumentation strategies have been incorporated into the agent architecture. In the presented content resource management experiments, enhancement of human task performance is demonstrated for users that are supported by a persuasive agent. This superior performance seems to be rooted in a more trusting collaborative relationship between the user and the agent, rather than in the appropriateness of the agent's decision-making suggestions alone. In particular, the second experiment demonstrated that interface interaction design should follow the principles of task-orientation and implicitness. Making the influence of the agent too salient can trigger counterintentional effects, such as users' discomfort and psychological reactance.

  5. Advances in chemical sensing technologies for VOCs in breath for security/threat assessment, illicit drug detection, and human trafficking activity.

    Science.gov (United States)

    Giannoukos, S; Agapiou, A; Taylor, S

    2018-01-17

    On-site chemical sensing of compounds associated with security and terrorist attacks is of worldwide interest. Other related bio-monitoring topics include identification of individuals posing a threat from illicit drugs, explosive manufacturing, as well as searching for victims of human trafficking and collapsed buildings. The current status of field analytical technologies is directed towards the detection and identification of vapours and volatile organic compounds (VOCs). Some VOCs are associated with exhaled breath, where research is moving from individual breath testing (volatilome) to cell breath (microbiome) and most recently to crowd breath metabolites (exposome). In this paper, an overview of field-deployable chemical screening technologies (both stand-alone and those with portable characteristics) is given with application to early detection and monitoring of human exposome in security operations. On-site systems employed in exhaled breath analysis, i.e. mass spectrometry (MS), optical spectroscopy and chemical sensors are reviewed. Categories of VOCs of interest include (a) VOCs in human breath associated with exposure to threat compounds, and (b) VOCs characteristic of, and associated with, human body odour (e.g. breath, sweat). The latter are relevant to human trafficking scenarios. New technological approaches in miniaturised detection and screening systems are also presented (e.g. non-scanning digital light processing linear ion trap MS (DLP-LIT-MS), nanoparticles, mid-infrared photo-acoustic spectroscopy and hyphenated technologies). Finally, the outlook for rapid and precise, real-time field detection of threat traces in exhaled breath is revealed and discussed.

  6. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  7. Modeling and Simulation for Exploring Human-Robot Team Interaction Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Dudenhoeffer, Donald Dean; Bruemmer, David Jonathon; Davis, Midge Lee

    2001-12-01

    Small-sized and micro-robots will soon be available for deployment in large-scale forces. Consequently, the ability of a human operator to coordinate and interact with largescale robotic forces is of great interest. This paper describes the ways in which modeling and simulation have been used to explore new possibilities for human-robot interaction. The paper also discusses how these explorations have fed implementation of a unified set of command and control concepts for robotic force deployment. Modeling and simulation can play a major role in fielding robot teams in actual missions. While live testing is preferred, limitations in terms of technology, cost, and time often prohibit extensive experimentation with physical multi-robot systems. Simulation provides insight, focuses efforts, eliminates large areas of the possible solution space, and increases the quality of actual testing.

  8. Human eosinophil–airway smooth muscle cell interactions

    Directory of Open Access Journals (Sweden)

    J. Margaret Hughes

    2000-01-01

    Full Text Available Eosinophils are present throughout the airway wall of asthmatics. The nature of the interaction between human airway smooth muscle cells (ASMC and eosinophils was investigated in this study. We demonstrated, using light microscopy, that freshly isolated eosinophils from healthy donors rapidly attach to ASMC in vitro. Numbers of attached eosinophils were highest at 2 h, falling to 50% of maximum by 20 h. Eosinophil attachment at 2 h was reduced to 72% of control by anti-VCAM-1, and to 74% at 20 h by anti-ICAM-1. Pre-treatment of ASMC for 24 h with TNF-α, 10 nM, significantly increased eosinophil adhesion to 149 and 157% of control after 2 and 20 h. These results provide evidence that eosinophil interactions with ASMC involve VCAM-1 and ICAM-1 and are modulated by TNF-α.

  9. Photo-physical and structural interactions between viologen phosphorus-based dendrimers and human serum albumin

    International Nuclear Information System (INIS)

    Ciepluch, Karol; Katir, Nadia; El Kadib, Abdelkrim; Weber, Monika; Caminade, Anne-Marie; Bousmina, Mostapha; Pierre Majoral, Jean; Bryszewska, Maria

    2012-01-01

    This work deals with photo-physical and structural interactions between viologen phosphorus dendrimers and human serum albumin (HSA). Viologens are derivatives of 4,4′-bipyridinium salts. Aiming to rationalize the parameters governing such interactions eight types of these polycationic dendrimers in which the generation, the number of charges, the nature of the core and of the terminal groups vary from one to another, were designed and used. The influence of viologen-based dendrimers' on human serum albumin has been investigated. The photo-physical interactions of the two systems have been monitored by fluorescence quenching of free L-tryptophan and of HSA tryptophan residue. Additionally, using circular dichroism (CD) the effect of dendrimers on the secondary structure of albumin was measured. The obtained results show that viologen dendrimers interact with human serum albumin quenching its fluorescence either by collisional (dynamic) way or by forming complexes in a ground state (static quenching). In some cases the quenching is accompanied by changes of the secondary structure of HSA. - Highlights: ► Photo-physical interactions between viologen phosphorus dendrimers and human serum albumin (HSA) were investigated. ► The viologen dendrimers can quench the fluorescence of tryptophan in HSA. ► CD spectra to explain the changes in secondary structure of albumin after exposition of dendrimers.

  10. Prediction of protein-protein interactions between viruses and human by an SVM model

    Directory of Open Access Journals (Sweden)

    Cui Guangyu

    2012-05-01

    Full Text Available Abstract Background Several computational methods have been developed to predict protein-protein interactions from amino acid sequences, but most of those methods are intended for the interactions within a species rather than for interactions across different species. Methods for predicting interactions between homogeneous proteins are not appropriate for finding those between heterogeneous proteins since they do not distinguish the interactions between proteins of the same species from those of different species. Results We developed a new method for representing a protein sequence of variable length in a frequency vector of fixed length, which encodes the relative frequency of three consecutive amino acids of a sequence. We built a support vector machine (SVM model to predict human proteins that interact with virus proteins. In two types of viruses, human papillomaviruses (HPV and hepatitis C virus (HCV, our SVM model achieved an average accuracy above 80%, which is higher than that of another SVM model with a different representation scheme. Using the SVM model and Gene Ontology (GO annotations of proteins, we predicted new interactions between virus proteins and human proteins. Conclusions Encoding the relative frequency of amino acid triplets of a protein sequence is a simple yet powerful representation method for predicting protein-protein interactions across different species. The representation method has several advantages: (1 it enables a prediction model to achieve a better performance than other representations, (2 it generates feature vectors of fixed length regardless of the sequence length, and (3 the same representation is applicable to different types of proteins.

  11. Human-robot interaction: kinematics and muscle activity inside a powered compliant knee exoskeleton.

    Science.gov (United States)

    Knaepen, Kristel; Beyl, Pieter; Duerinck, Saartje; Hagman, Friso; Lefeber, Dirk; Meeusen, Romain

    2014-11-01

    Until today it is not entirely clear how humans interact with automated gait rehabilitation devices and how we can, based on that interaction, maximize the effectiveness of these exoskeletons. The goal of this study was to gain knowledge on the human-robot interaction, in terms of kinematics and muscle activity, between a healthy human motor system and a powered knee exoskeleton (i.e., KNEXO). Therefore, temporal and spatial gait parameters, human joint kinematics, exoskeleton kinetics and muscle activity during four different walking trials in 10 healthy male subjects were studied. Healthy subjects can walk with KNEXO in patient-in-charge mode with some slight constraints in kinematics and muscle activity primarily due to inertia of the device. Yet, during robot-in-charge walking the muscular constraints are reversed by adding positive power to the leg swing, compensating in part this inertia. Next to that, KNEXO accurately records and replays the right knee kinematics meaning that subject-specific trajectories can be implemented as a target trajectory during assisted walking. No significant differences in the human response to the interaction with KNEXO in low and high compliant assistance could be pointed out. This is in contradiction with our hypothesis that muscle activity would decrease with increasing assistance. It seems that the differences between the parameter settings of low and high compliant control might not be sufficient to observe clear effects in healthy subjects. Moreover, we should take into account that KNEXO is a unilateral, 1 degree-of-freedom device.

  12. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  13. Understanding and Resolving Failures in Human-Robot Interaction: Literature Review and Model Development

    Directory of Open Access Journals (Sweden)

    Shanee Honig

    2018-06-01

    Full Text Available While substantial effort has been invested in making robots more reliable, experience demonstrates that robots operating in unstructured environments are often challenged by frequent failures. Despite this, robots have not yet reached a level of design that allows effective management of faulty or unexpected behavior by untrained users. To understand why this may be the case, an in-depth literature review was done to explore when people perceive and resolve robot failures, how robots communicate failure, how failures influence people's perceptions and feelings toward robots, and how these effects can be mitigated. Fifty-two studies were identified relating to communicating failures and their causes, the influence of failures on human-robot interaction (HRI, and mitigating failures. Since little research has been done on these topics within the HRI community, insights from the fields of human computer interaction (HCI, human factors engineering, cognitive engineering and experimental psychology are presented and discussed. Based on the literature, we developed a model of information processing for robotic failures (Robot Failure Human Information Processing, RF-HIP, that guides the discussion of our findings. The model describes the way people perceive, process, and act on failures in human robot interaction. The model includes three main parts: (1 communicating failures, (2 perception and comprehension of failures, and (3 solving failures. Each part contains several stages, all influenced by contextual considerations and mitigation strategies. Several gaps in the literature have become evident as a result of this evaluation. More focus has been given to technical failures than interaction failures. Few studies focused on human errors, on communicating failures, or the cognitive, psychological, and social determinants that impact the design of mitigation strategies. By providing the stages of human information processing, RF-HIP can be used as a

  14. A Novel Bioinspired Vision System: A Step toward Real-Time Human-Robot Interactions

    Directory of Open Access Journals (Sweden)

    Abdul Rahman Hafiz

    2011-01-01

    Full Text Available Building a human-like robot that could be involved in our daily lives is a dream of many scientists. Achieving a sophisticated robot's vision system, which can enhance the robot's real-time interaction ability with the human, is one of the main keys toward realizing such an autonomous robot. In this work, we are suggesting a bioinspired vision system that helps to develop an advanced human-robot interaction in an autonomous humanoid robot. First, we enhance the robot's vision accuracy online by applying a novel dynamic edge detection algorithm abstracted from the rules that the horizontal cells play in the mammalian retina. Second, in order to support the first algorithm, we improve the robot's tracking ability by designing a variant photoreceptors distribution corresponding to what exists in the human vision system. The experimental results verified the validity of the model. The robot could have a clear vision in real time and build a mental map that assisted it to be aware of the frontal users and to develop a positive interaction with them.

  15. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    DOE Order 5637.1, ''Classified Computer Security,'' requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, we have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system. 1 tab

  16. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    This paper reports on DIE Order 5637.1, Classified Computer Security, which requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, the authors have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system

  17. Emotion model of interactive virtual humans on the basis of MDP

    Institute of Scientific and Technical Information of China (English)

    WANG Guojiang; WANG Zhiliang; TENG Shaodong; XIE Yinggang; WANG Yujie

    2007-01-01

    Emotion plays an essential role in the adaptation and social communication of organisms.Similarly,an appropriately timed and clearly expressed emotion is a central requirement for believable interactive virtual humans.Presently,incorporating emotion into virtual humans has gained increasing attention in the academia and industry.This strong interest is driven by a wide spectrum of promising applications in many areas such as virtual reality,e-learning,entertainment,etc.This paper introduces an emotion model of artificial psychology,in which the transition of emotion can be viewed as a Markov process and the relation of emotion,external incentive and personality can be described by a Markov decision process (MDP).In order to demonstrate the approach,this paper integrates the emotion model into a system composed of voice recognition and a realistic facial model.Thus,the model could be used for generating a variety of emotional expressions of autonomous,interactive virtual human beings.

  18. A Novel Multifactor Authentication System Ensuring Usability and Security

    OpenAIRE

    Mathew, Gloriya; Thomas, Shiney

    2013-01-01

    User authentication is one of the most important part of information security. Computer security most commonly depends on passwords to authenticate human users. Password authentication systems will be either been usable but not secure, or secure but not usable. While there are different types of authentication systems available alphanumeric password is the most commonly used authentication mechanism. But this method has significant drawbacks. An alternative solution to the text based authenti...

  19. Physical Forces between Humans and How Humans Attract and Repel Each Other Based on Their Social Interactions in an Online World.

    Directory of Open Access Journals (Sweden)

    Stefan Thurner

    Full Text Available Physical interactions between particles are the result of the exchange of gauge bosons. Human interactions are mediated by the exchange of messages, goods, money, promises, hostilities, etc. While in the physical world interactions and their associated forces have immediate dynamical consequences (Newton's laws the situation is not clear for human interactions. Here we quantify the relative acceleration between humans who interact through the exchange of messages, goods and hostilities in a massive multiplayer online game. For this game we have complete information about all interactions (exchange events between about 430,000 players, and about their trajectories (movements in the metric space of the game universe at any point in time. We use this information to derive "interaction potentials" for communication, trade and attacks and show that they are harmonic in nature. Individuals who exchange messages and trade goods generally attract each other and start to separate immediately after exchange events end. The form of the interaction potential for attacks mirrors the usual "hit-and-run" tactics of aggressive players. By measuring interaction intensities as a function of distance, velocity and acceleration, we show that "forces" between players are directly related to the number of exchange events. We find an approximate power-law decay of the likelihood for interactions as a function of distance, which is in accordance with previous real world empirical work. We show that the obtained potentials can be understood with a simple model assuming an exchange-driven force in combination with a distance-dependent exchange rate.

  20. The Security of Russia's Nuclear Arsenal: The Human Factor

    International Nuclear Information System (INIS)

    Ball, D.Y.

    1999-01-01

    Assertions by the Russian military that all of their nuclear weapons are secure against theft and that nuclear units within the military are somehow insulated from the problems plaguing the Russian military should not be accepted uncritically. Accordingly, we should not give unwarranted credence to the pronouncements of military figures like Cal.-Gen. Igor Valynkin, Chief of the Defense Ministry's 12th Main Directorate, which oversees the country's nuclear arsenal. He contends that ''Russian nuclear weapons are under reliable supervision'' and that ''talk about the unreliability of our control over nuclear weapons has only one pragmatic goal--to convince international society that the country is incapable of maintaining nuclear safety and to introduce international oversight over those weapons, as it is done, for example, in Iraq.'' While the comparison to Iraq is preposterous, many analysts might agree with Valynkin's sanguine appraisal of the security of Russia's nuclear weapons. In contrast, I argue that the numerous difficulties confronting the military as a whole should cause concern in the West over the security of the Russian nuclear arsenal