CAPTCHA is a widely adopted security measure on the Web and is designed to effectively distinguish humans and bots by exploiting human’s ability to recognize patterns that an automated bot is incapable of. To counter this, bots are being designed to recognize patterns in CAPTCHAs. As a result, CAPTCHAs are now being designed to maximize the difficulty for bots to pass human interaction proof tests, while making it quite an arduous task even for humans as well. The approachability of CAPTCHA is increasingly being questioned because of the inconvenience it causes to legitimate users. Irrespective of the popularity, CAPTCHA is indispensable if one wants to avoid potential security threats. We investigated the usability issues associated with CAPTCHA. We built a holistic model by identifying the important concepts associated with CAPTCHAs and its usability. This model can be used as a guide for the design and evaluation of CAPTCHAs.
A BENCHMARK FOR DESIGNING USABLE AND SECURE TEXT-BASED CAPTCHASIJNSA Journal
An automated public Turing test to distinguish between computers and humans known as CAPTCHA is a
widely used technique on many websites to protect their online services from malicious users. Two
fundamental aspects of captcha considered in various studies in the literature are robustness and usability.
A widely accepted standard benchmark, to guide the text-based captcha developers is not yet available. So
this paper proposes a benchmark for designing usable-secure text-based captchas based on a community
driven evaluation of the usability and security aspects. Based on this benchmark, we develop four new textbased
captcha schemes, and conduct two separate experiments to evaluate both the security and usability
perspectives of the developed schemes. The result of this evaluation indicates that the proposed benchmark
provides a basis for designing usable-secure text-based captchas.
How I Pass ASTQB Mobile Tester (ASTQB-MT) Certification in First Attempt?Meghna Arora
Start Here---> http://bit.ly/35M5812 <---Get complete detail on ASTQB-MT exam guide to crack Mobile Tester. You can collect all information on ASTQB-MT tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on Mobile Tester and get ready to crack ASTQB-MT certification. Explore all information on ASTQB-MT exam with the number of questions, passing percentage, and time duration to complete the test.
this is VTU FINAL YEAR PROJECT REPORT full report is attached below.this alone with front pages attached Front pages report follows all the guidelines specified by vtu according to our college.
A BENCHMARK FOR DESIGNING USABLE AND SECURE TEXT-BASED CAPTCHASIJNSA Journal
An automated public Turing test to distinguish between computers and humans known as CAPTCHA is a
widely used technique on many websites to protect their online services from malicious users. Two
fundamental aspects of captcha considered in various studies in the literature are robustness and usability.
A widely accepted standard benchmark, to guide the text-based captcha developers is not yet available. So
this paper proposes a benchmark for designing usable-secure text-based captchas based on a community
driven evaluation of the usability and security aspects. Based on this benchmark, we develop four new textbased
captcha schemes, and conduct two separate experiments to evaluate both the security and usability
perspectives of the developed schemes. The result of this evaluation indicates that the proposed benchmark
provides a basis for designing usable-secure text-based captchas.
How I Pass ASTQB Mobile Tester (ASTQB-MT) Certification in First Attempt?Meghna Arora
Start Here---> http://bit.ly/35M5812 <---Get complete detail on ASTQB-MT exam guide to crack Mobile Tester. You can collect all information on ASTQB-MT tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on Mobile Tester and get ready to crack ASTQB-MT certification. Explore all information on ASTQB-MT exam with the number of questions, passing percentage, and time duration to complete the test.
this is VTU FINAL YEAR PROJECT REPORT full report is attached below.this alone with front pages attached Front pages report follows all the guidelines specified by vtu according to our college.
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA ijait
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish between various groups of users. Completely Automatic Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious computer programs. Many
CAPTCHAs have been proposed in the literature that text-graphical based, audio-based, puzzle-based and mathematical questions-based. The design and implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we present a framework for a text-based CAPTCHA based on Devanagari script which can exploit the difference in the reading proficiency between humans and computer programs. Our selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a
large number of Indian languages including Hindi which is the third most spoken language. There is potential for an exponential rise in the applications that are likely to be developed in that script thereby making it easy to secure Indian language based applications.
The internet has been playing an increasingly important role in our daily life, with the availability of many web services such as email and search engines. However, these are often threatened by attacks from computer programs such as bots. To address this problem, CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) was developed to distinguish between computer programs and human users. Although this mechanism offers good security and limits automatic registration to web services, some CAPTCHAs have several weaknesses which allow hackers to infiltrate the mechanism of the CAPTCHA. This paper examines recent research on various CAPTCHA methods and their categories. Moreover it discusses the weakness and strength of these types.
A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
It is used, commonly, to protect your sites.
A BENCHMARK FOR DESIGNING USABLE AND SECURE TEXT-BASED CAPTCHASIJNSA Journal
An automated public Turing test to distinguish between computers and humans known as CAPTCHA is a widely used technique on many websites to protect their online services from malicious users. Two fundamental aspects of captcha considered in various studies in the literature are robustness and usability. A widely accepted standard benchmark, to guide the text-based captcha developers is not yet available. So this paper proposes a benchmark for designing usable-secure text-based captchas based on a community driven evaluation of the usability and security aspects. Based on this benchmark, we develop four new textbased captcha schemes, and conduct two separate experiments to evaluate both the security and usability perspectives of the developed schemes. The result of this evaluation indicates that the proposed benchmark provides a basis for designing usable-secure text-based captchas.
A BENCHMARK FOR DESIGNING USABLE AND SECURE TEXT-BASED CAPTCHASIJNSA Journal
An automated public Turing test to distinguish between computers and humans known as CAPTCHA is a widely used technique on many websites to protect their online services from malicious users. Two fundamental aspects of captcha considered in various studies in the literature are robustness and usability. A widely accepted standard benchmark, to guide the text-based captcha developers is not yet available. So
this paper proposes a benchmark for designing usable-secure text-based captchas based on a community driven evaluation of the usability and security aspects. Based on this benchmark, we develop four new textbased captcha schemes, and conduct two separate experiments to evaluate both the security and usability
perspectives of the developed schemes. The result of this evaluation indicates that the proposed benchmark
provides a basis for designing usable-secure text-based captchas.
Research trends on CAPTCHA: A systematic literature IJECEIAES
The advent of technology has crept into virtually all sectors and this has culminated in automated processes making use of the Internet in executing various tasks and actions. Web services have now become the trend when it comes to providing solutions to mundane tasks. However, this development comes with the bottleneck of authenticity and intent of users. Providers of these Web services, whether as a platform, as a software or as an Infrastructure use various human interaction proof’s (HIPs) to validate authenticity and intent of its users. Completely automated public turing test to tell computer and human apart (CAPTCHA), a form of IDS in web services is advantageous. Research into CAPTCHA can be grouped into two -CAPTCHA development and CAPTCH recognition. Selective learning and convolutionary neural networks (CNN) as well as deep convolutionary neural network (DCNN) have become emerging trends in both the development and recognition of CAPTCHAs. This paper reviews critically over fifty article publications that shows the current trends in the area of the CAPTCHA scheme, its development and recognition mechanisms and the way forward in helping to ensure a robust and yet secure CAPTCHA development in guiding future research endeavor in the subject domain.
An Optimized System to Solve Text-Based Captchagerogepatton
CAPTCHA(Completely Automated Public Turing test to Tell Computers and Humans Apart) can be used to protect data from auto bots. Countless kinds of CAPTCHAs are thus designed, while we most frequently
utilize text-based scheme because of most convenience and user-friendly way [1]. Currently, various types of CAPTCHAs need corresponding segmentation to identify single character due to the numerous different segmentation ways. Our goal is to defeat the CAPTCHA,thus rstly the CAPTCHAs need to be split into character by character. There isn't a regular segmentation algorithm to obtain the divided characters in all kinds of examples, which means that we have to treat the segmentation individually. In this paper, we build
a whole system todefeat the CAPTCHAs as well as achieve state-of-the-art performance.In detail, we present our self-adaptive algorithm to segment different kinds of characters optimally, and then utilize both the existing methods and our own constructed convolutional neural network as an extra classfier. Results are provided showing how our system work well towards defeating these CAPTCHAs.
The 2023 Florida Data Science for Social Good (FL-DSSG) Big Reveal event was held on August 23 at the WJCT Studios, Jacksonville, FL. The DSSG interns presented findings from the Cathedral Arts Project, GrowFL, and Florida Philanthropic Network projects.
Systematic Literature Review and Research Model to Examine Data Analytics Ado...Karthikeyan Umapathy
Data analytics offers a wide variety of opportunities across all industries enabling improvements in all business operations. Data analytics adoption has several associated complexities making it cumbersome and challenging for organizations. In particular, small and medium businesses (SMB) and nonprofit organizations lag behind data analytics adoption, even though they are crucial for the economy and would benefit most from data-driven decisions. This paper aims to identify factors that influence data analytics adoption by organizations. We conduct a systematic literature review to identify articles relevant to data analytics adoption studies performed using survey methodology. We synthesize literature review results to propose a research model to investigate data analytics adoption in small & medium businesses and nonprofit organizations. The proposed research model was developed primarily based on Technology Organization Environment (TOE) framework, combined with other factors relevant to data analytics adoption found in the literature. The research model investigates the influences of data analytics, organization, and environment characteristics on data analytics adoption by SMBs and nonprofits. We hope that further progress with this research will provide insights into helping SMBs and nonprofits adopt data analytics technologies.
More Related Content
Similar to Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA ijait
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish between various groups of users. Completely Automatic Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious computer programs. Many
CAPTCHAs have been proposed in the literature that text-graphical based, audio-based, puzzle-based and mathematical questions-based. The design and implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we present a framework for a text-based CAPTCHA based on Devanagari script which can exploit the difference in the reading proficiency between humans and computer programs. Our selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a
large number of Indian languages including Hindi which is the third most spoken language. There is potential for an exponential rise in the applications that are likely to be developed in that script thereby making it easy to secure Indian language based applications.
The internet has been playing an increasingly important role in our daily life, with the availability of many web services such as email and search engines. However, these are often threatened by attacks from computer programs such as bots. To address this problem, CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) was developed to distinguish between computer programs and human users. Although this mechanism offers good security and limits automatic registration to web services, some CAPTCHAs have several weaknesses which allow hackers to infiltrate the mechanism of the CAPTCHA. This paper examines recent research on various CAPTCHA methods and their categories. Moreover it discusses the weakness and strength of these types.
A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
It is used, commonly, to protect your sites.
A BENCHMARK FOR DESIGNING USABLE AND SECURE TEXT-BASED CAPTCHASIJNSA Journal
An automated public Turing test to distinguish between computers and humans known as CAPTCHA is a widely used technique on many websites to protect their online services from malicious users. Two fundamental aspects of captcha considered in various studies in the literature are robustness and usability. A widely accepted standard benchmark, to guide the text-based captcha developers is not yet available. So this paper proposes a benchmark for designing usable-secure text-based captchas based on a community driven evaluation of the usability and security aspects. Based on this benchmark, we develop four new textbased captcha schemes, and conduct two separate experiments to evaluate both the security and usability perspectives of the developed schemes. The result of this evaluation indicates that the proposed benchmark provides a basis for designing usable-secure text-based captchas.
A BENCHMARK FOR DESIGNING USABLE AND SECURE TEXT-BASED CAPTCHASIJNSA Journal
An automated public Turing test to distinguish between computers and humans known as CAPTCHA is a widely used technique on many websites to protect their online services from malicious users. Two fundamental aspects of captcha considered in various studies in the literature are robustness and usability. A widely accepted standard benchmark, to guide the text-based captcha developers is not yet available. So
this paper proposes a benchmark for designing usable-secure text-based captchas based on a community driven evaluation of the usability and security aspects. Based on this benchmark, we develop four new textbased captcha schemes, and conduct two separate experiments to evaluate both the security and usability
perspectives of the developed schemes. The result of this evaluation indicates that the proposed benchmark
provides a basis for designing usable-secure text-based captchas.
Research trends on CAPTCHA: A systematic literature IJECEIAES
The advent of technology has crept into virtually all sectors and this has culminated in automated processes making use of the Internet in executing various tasks and actions. Web services have now become the trend when it comes to providing solutions to mundane tasks. However, this development comes with the bottleneck of authenticity and intent of users. Providers of these Web services, whether as a platform, as a software or as an Infrastructure use various human interaction proof’s (HIPs) to validate authenticity and intent of its users. Completely automated public turing test to tell computer and human apart (CAPTCHA), a form of IDS in web services is advantageous. Research into CAPTCHA can be grouped into two -CAPTCHA development and CAPTCH recognition. Selective learning and convolutionary neural networks (CNN) as well as deep convolutionary neural network (DCNN) have become emerging trends in both the development and recognition of CAPTCHAs. This paper reviews critically over fifty article publications that shows the current trends in the area of the CAPTCHA scheme, its development and recognition mechanisms and the way forward in helping to ensure a robust and yet secure CAPTCHA development in guiding future research endeavor in the subject domain.
An Optimized System to Solve Text-Based Captchagerogepatton
CAPTCHA(Completely Automated Public Turing test to Tell Computers and Humans Apart) can be used to protect data from auto bots. Countless kinds of CAPTCHAs are thus designed, while we most frequently
utilize text-based scheme because of most convenience and user-friendly way [1]. Currently, various types of CAPTCHAs need corresponding segmentation to identify single character due to the numerous different segmentation ways. Our goal is to defeat the CAPTCHA,thus rstly the CAPTCHAs need to be split into character by character. There isn't a regular segmentation algorithm to obtain the divided characters in all kinds of examples, which means that we have to treat the segmentation individually. In this paper, we build
a whole system todefeat the CAPTCHAs as well as achieve state-of-the-art performance.In detail, we present our self-adaptive algorithm to segment different kinds of characters optimally, and then utilize both the existing methods and our own constructed convolutional neural network as an extra classfier. Results are provided showing how our system work well towards defeating these CAPTCHAs.
The 2023 Florida Data Science for Social Good (FL-DSSG) Big Reveal event was held on August 23 at the WJCT Studios, Jacksonville, FL. The DSSG interns presented findings from the Cathedral Arts Project, GrowFL, and Florida Philanthropic Network projects.
Systematic Literature Review and Research Model to Examine Data Analytics Ado...Karthikeyan Umapathy
Data analytics offers a wide variety of opportunities across all industries enabling improvements in all business operations. Data analytics adoption has several associated complexities making it cumbersome and challenging for organizations. In particular, small and medium businesses (SMB) and nonprofit organizations lag behind data analytics adoption, even though they are crucial for the economy and would benefit most from data-driven decisions. This paper aims to identify factors that influence data analytics adoption by organizations. We conduct a systematic literature review to identify articles relevant to data analytics adoption studies performed using survey methodology. We synthesize literature review results to propose a research model to investigate data analytics adoption in small & medium businesses and nonprofit organizations. The proposed research model was developed primarily based on Technology Organization Environment (TOE) framework, combined with other factors relevant to data analytics adoption found in the literature. The research model investigates the influences of data analytics, organization, and environment characteristics on data analytics adoption by SMBs and nonprofits. We hope that further progress with this research will provide insights into helping SMBs and nonprofits adopt data analytics technologies.
In this research, we analyzed voter registration and elections data re-leased by the Florida Division of Elections to investigate the profile of Florida voter participation. The utilized data was associated with federal general elec-tions from 2014 to 2020. Data preparation issues were resolved during the data merging, including exact duplicates, multiple associated vote types, and misclas-sified vote types. The merged data consisted of voter ID, registration county code, zip code, sex, ethnicity, age, vote type for each general election year, voting in-dicator for each general election year, and county code. Boosted Tree model (with a misclassification rate of 0.22) identified zip code, age, and voter status are key factors that influence voter participation. Based on voter eligibility and total vote counts in each general election held between 2014 and 2020, voters were classi-fied into the following profile categories: always-voted (participated in all elec-tions), increasing-in-voting (participated in recent elections but not in the past elections), intermittent-in-voting (participated in some elections but not all), de-creasing-in-voting (participated past elections but not recently), never-voted (didn’t participate in the elections), and not-eligible (registered but under 18 years of age). Voter profile counts information was merged with Census demo-graphic information at the zip code level. To find insights into the voter profiles, we created Tableau dashboards to view voter profiles, voting methods, and the effect of census variables on voter turnout at the zip code level. We hope this dashboard helps organizations like the League of Women Voters of Florida target their voter participation and engagement activities at the zip code level.
A Systematic Review of Affordable Homeownership using Data Science MethodsKarthikeyan Umapathy
Interest in the global unaffordable housing dilemma is manifest in its growing publications. However, there is a limited systematic review of the literature concerning data science approaches to address the social issues of owning affordable homes through Housing and Urban Development (HUD) programs. The systematic literature review was performed using Google Scholar and followed the phases prescribed in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). This study synthesizes data sources, tools, analytical approaches, and theoretical frameworks from the literature on affordable housing issues using data science methods. Our findings indicate that researchers have approached the issue completely differently from each other, with census data and usage of mapping visualizations as being a common trend.
Identifying Communities with Opportunities for Positive Youth DevelopmentKarthikeyan Umapathy
Game Face 4:13 Training Academy is a strategic camp developed by Mrs. Ashanti Jackson that exists to develop basketball skills, academic excellence, and ethical character within young people in the Jacksonville community. To identify the areas where GameFace can offer its programs, we collected data from the Census, Florida Department of Juvenile Justice, Florida Department of Health, Duval County Public Schools, Food Deserts, and Churches with Food Banks. We performed Factor Analysis and Correlation Analysis on the gathered data. We utilized the statistical analysis results to create a geographic information systems decision tool using Tableau.
Based on our analysis, we understand that youths are facing major issues in Duval County are Juvenile Arrests and Disciplinary Actions within schools. Zip Codes 32210, 32209, and 32208 have a higher number of all the issues analyzed. Game Face is on the right track to providing Physical, Mental, and Spiritual Training to youth in Duval County as these would help tackle these issues and create a positive impact on the lives of youth. We recommend Game Face collaborate with schools and churches in these communities to set up their training camp. We recommend Game Face gather data on youth involvement in training, leadership coaching, and healthy habits programs. We recommend Game Face to gather data related to student academic outcomes beyond Game Face training, such as college scholarships and high school graduations.
2022 Florida Data Science for Social Good (FL-DSSG) Big Reveal SlidesKarthikeyan Umapathy
The 2022 Florida Data Science for Social Good (FL-DSSG) Big Reveal event was held on August 23 at the WJCT Studios, Jacksonville, FL. The DSSG interns presented findings from the Cathedral Arts Project, League of Women Voters of Florida, and GameFace 4:13 Training Academy projects.
Longitudinal Study on the Generational Impacts of Habitat for Humanity: A Res...Karthikeyan Umapathy
Habitat for Humanity addresses the challenging social issue of providing affordable housing to income-constrained families. There isn’t much research on the generational impact of affordable homeownership on the families served by Habitat. In this research, we propose a longitudinal research design that will collect and analyze data gathered from families who received affordable housing. This study will be performed as a collaborative inquiry with a partnership from HabiJax, Jacksonville, FL, affiliated with Habitat for Humanity. We will be conducting semi-structured interviews focused on education, employment, wealth building, safety, neighborhood, health, and critical life-changing impacts. We will be collecting data every 5 years over the next 30 years. Collected data would be analyzed to identify the generational impacts of affordable housing. We will be sharing the findings with HabiJax decision-makers who could improve program strategies.
We analyzed voter registration and elections data released by the Florida Division of Elections to investigate the profile of Florida voter participation. We utilized data associated with general elections from 2012 to 2020. We merged an individual’s January 2021 voter registration data with elections data for above listed years. Several data preparation issues were resolved during the data merging process, including exact duplicates, multiple associated vote types, and misclassified vote types. The merged data consisted of the following columns: voter ID, registration county code, zip code, sex, ethnicity, age, [2012 to 2020] vote type, [2012 to 2020] voting indicator, and [2012 to 2020] county code. As it is computationally intensive to process data of entire Florida voters, county-wise data were merged into associated metropolitan, micropolitan, and rural areas (MSA). Based on voter eligibility and total vote counts on each general election held between 2012 and 2020, voters were classified into the following profile categories: always-voted (participated in all elections), increasing-in-voting (participated in recent elections but not in the past elections), intermittent-in-voting (participated in some elections but not all), decreasing-in-voting (participated past elections but not recently), never-voted (didn’t participate in the elections), and not-eligible (registered but under 18 years of age). Our analysis indicates that there is a considerable number of never-voted individuals regardless of MSA regions. Profile analysis reveals that metropolitan and micropolitan regions tend to have more individuals categorized as increasing-in-voting than always-voted. In contrast, rural regions tend to have more individuals categorized as always-voted than increasing-in-voting.
FL-DSSG Big Reveal Event was held on August 17th, 2021, from 4:30 PM to 6:30 PM as a Zoom webinar event. At the event, DSSG interns presented findings and revealed insights gained from the Barnabas Center, League of Women Voters of Florida, and Jewish Family and Community Services data science projects.
At the event, DSSG interns presented findings and revealed insights gained from the Center for Children’s Rights, Episcopal Children’s Services, and Literacy Alliance of Northeast Florida projects.
Dashboard for Extracting Regional Insights and Ranking Food Deserts in Northe...Karthikeyan Umapathy
2019 Florida Data Science for Social Good (FL-DSSG) Feeding Northeast Florida project results presented as a poster at the University of North Florida (UNF) Digital Humanities Initiative (DHI) Digital Projects Showcase event on November, 15, 2019.
Developing a GIS Dashboard Tool to Inform Non-Profit Hospitals of Community H...Karthikeyan Umapathy
Slide deck for the paper presented at the 2019 Conference on Information Systems Applied Research (CONISAR), Cleveland, OH, on November 8, 2019.
The objective of this paper is to describe the methods used to develop geographic information systems (GIS) dashboard tool and explain how it can assist nonprofit hospitals to identify priority neighborhoods. Multiple data sources from the 500 Cities Project databases were analyzed, and two online dashboards were created. The first dashboard is a hospital-specific composite dashboard, and the second is a comparison dashboard of health outcomes identified by both the hospital and the county’s community health needs assessment focused on neighborhood-level disparities. Hospital-specific health outcomes were Stroke, Diabetes, and Coronary Heart Disease. County-specific health outcomes were Obesity, Dental, and Mental Health. All of the six health outcomes were standardized, rescaled, and weighted within the final composite score. Tableau was used for developing the dashboards and geographically mapping the analyzed data. The maps were developed specifically for a large hospital in Florida; however, this methodology can be utilized by other hospitals across the US. City-specific data is essential to ensure the accuracy of community health needs. The development of an interactive, comprehensive map using Tableau is a useful tool for visualizing target neighborhoods for community health outreach. The integration of community needs assessment findings into the development of composite scores allows hospitals in the US to use this tool to inform community health outreach strategy adequately.
Collaborative Community Engagement: Bringing Data Science to Societal Challen...Karthikeyan Umapathy
The collaborative community engagement triad model involves a partnership between the university, private, and nonprofit sectors to enhance the student learning experience while creating community impacts. This talk will introduce the triad model, and describe how it was implemented at the College of Computing at the University of North Florida under the Data Science for the Social Good (DSSG) umbrella. The talk will describe the challenges faced, how they were addressed, and the solutions developed in response. The triad model and the outcomes from the model will be demonstrated with example implementations from a capstone that leads to students producing software and other artifacts incorporating data science techniques in response to important societal problems. The talk will also discuss questions of scaling such efforts, and the next steps in the journey at the University of North Florida.
2019 Florida Data Science for Social Good (FL-DSSG) Big RevealKarthikeyan Umapathy
At the 2019 Big Reveal event, FL-DSSG interns presented findings and revealed insights gained from the Cathedral Arts Project, Children's Services Council, Feeding Northeast Florida, GTM Research Reserve, and Starting Point Behavioral Healthcare projects. The UNF Foundation funded 2019 FL-DSSG Internship program. Big Reveal presentations were held at the WJCT Studio A, 100 Festival Park Ave., Jacksonville, FL - 32202. For more information about the 2019 FL-DSSG program visit http://dssg.unf.edu/2019program.html.
2018 Florida Data Science for Social Good (FL-DSSG) Big Reveal PresentationKarthikeyan Umapathy
At the 2018 Big Reveal event, FL-DSSG interns presented findings and revealed insights gained from the Baptist Health, Family Support Services, Girls Inc. of Jacksonville, and Performers Academy projects. 2018 FL-DSSG Internship program was funded by the Nonprofit Center for Northeast Florida and the University of North Florida. 2018 Big Reveal event was sponsored by AgileThought, Tampa based software consulting firm. Big Reveal presentations were held at the WJCT Studio A, 100 Festival Park Ave., Jacksonville, FL - 32202. For more information about the 2018 FL-DSSG program visit http://dssg.unf.edu/2018program.html.
Florida Data Science for Social Good (FL-DSSG) Big Reveal event was held on August 7 (Monday) from 4:30 PM to 6:30 PM at the Nonprofit Center (40 E Adams St., Jacksonville). At the event, FL-DSSG interns presented findings and revealed insights gained from the Mayo Clinic, Changing Homelessness, and Yoga 4 Change projects.
A Research Plan to Study Impact of a Collaborative Web Search Tool on Novice'...Karthikeyan Umapathy
In the past decade, research efforts dedicated to studying the process of collaborative web search have been on the rise. Yet, limited number of studies have examined the impact of collaborative information search process on novice’s query behaviors. Studying and analyzing factors that influence web search behaviors, specifically users’ patterns of queries when using collaborative search systems can help with making query suggestions for group users. Improvements in user query behaviors and system query suggestions help in reducing search time and increasing query success rates for novices. In this paper, we present an empirical study plan designed to investigate the influence of collaboration between experts and novices as well as use of a collaborative web search tool on novice’s query behavior. In this research-in-progress study, we intend to use SearchTeam as our collaborative search tool. The results of this study are expected to provide information that could help collaborative web search tool designers to find ways to improve the query suggestions feature for group users. Additionally, this study will test the hypothesis that – having domain experts working with non-experts using collaborative search systems would immensely increase the query success rates for non-expert users, and help them learn querying strategies over the course of time. If the above hypothesis is proven, then use of collaborative web search tools during training of interns would be highly recommended.
Leveraging Service Computing and Big Data Analytics for E-CommerceKarthikeyan Umapathy
Panel discussions on Leveraging Service Computing and Big Data Analytics for E-Commerce at the Workshop on e-Business (WeB) 2015 held on December 12, 2015 at Fort Worth, Texas, USA.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Security and User Experience: A Holistic Model for CAPTCHA Usability Issues
1. Security and User Experience:
A Holistic Model for CAPTCHA
Usability Issues
Jayalakshmi Raman, University of North Florida
Karthikeyan Umapathy, University of North
Florida
Haiyan Huang, Flagler College
March 23, 2018 Atlanta, GA
2018 Southern Association for Information Systems (SAIS) Annual Conference
2. CAPTCHA
Completely Automated Public Turing tests to tell
Computers and Humans Apart
A program that can distinguish humans from bots.
Picture source: https://www.letsnurture.com/blog/8-widely-used-captcha-examples.html
3. CAPTCHAs are Human Interaction Proofs
CAPTCHA is designed as a challenge response test, that is,
Simple enough for humans
But hard for the bots
These tests are typically a visual challenge as computers lack the ability
human eyes have, to process patterns.
CAPTCHA design involves picking random string of characters (in case of
text-based CAPTCHAs) rendering into a distorted image.
HAT8M
4. Purpose of CAPTCHAs
Websites featuring ability for visitors to comment,
register, signup, or post contents are exposed to
attacks from spam-robots.
These malicious program’s harmful effects extend to
extracting private data, spamming web forms, and
swaying polls in websites.
The purpose of CAPTCHA is to identify and block
malicious bots that may spam and/or make
unauthorized use of websites.
CAPCTHAs are designed as the gateways of
websites to grant the access to “legitimate” site
visitors.
CAPTCHA is widely adopted as a defense
mechanism across commercial websites to
determine whether a potential user is a human.
Source: http://ui-patterns.com/patterns/Captcha
5. Type of CAPTCHAs
Text-based
(Images of distorted text)
Image-based
(Set of images with
patterns among
them)
Source: https://www.letsnurture.com/blog/8-widely-used-captcha-examples.html, http://www.bespecular.com/blog/accessibility-of-captchas/
Audio-based
(Distorted sound
clips)
Math-based
(Basic math
problems)
3D CAPTCHAs
(animated texts or
verification code)
Puzzle-based
(Gamified puzzle
solvers)
6. Usability Issues of CAPTCHAs
Usability of CAPTCHAs contributes significantly to the quality of user
experience one obtains from the website.
With the advent of machine learning algorithms, deep learning
techniques and pattern recognition algorithms; bots are getting better
at reading CAPTCHAs.
As a result, some additional features are incorporated into the design of
CAPTCHAs to make the tests harder for bots to pass.
Improved CAPTCHAs sometimes are considered to be interfering with
usability and productivity because of their cumbersome nature.
7. Research Problem
Limited amount of research studies on CAPTCHAs.
As a widespread security measure encountered by most Internet users,
it is important to study CAPTCHAs state-of-the-art schemes and the
related usability issues.
This research focuses on the usability factor in the domain of CAPTCHAs.
The aim of this research is to develop a holistic framework that can shed
light on how to design effective and highly usable CAPTCHAs.
This framework is developed based on empirical facts claimed in literature
thus serving as a model for evaluation for future CAPTCHA designs.
8. Research Methodology
The aim of this research is to find the balance between usability and security
in CAPTCHAs.
Conduct a comprehensive study to gain an in-depth understanding of user’s view of
CAPTCHA.
Develop a holistic model that would in turn help in designing an effective and
adoptable CAPTCHA.
We used a qualitative method proposed by Jabareen (2009) for conducting
systematic study of the phenomena of interest and building the conceptual
framework based on the analyzed concepts.
A thorough understanding of relevant concepts are essential to gain
comprehensive understanding of the phenomena and to develop the
framework.
Empirical evidence on the practical issues confronted by users when solving
CAPTCHA challenge was collected from findings reported in the peer-
reviewed literature.
Thorough review of literature, we gathered evidences to form the basis for
developing a list of applicable usability features and concerns. These
identified features and concerns laid the foundations for developing the
holistic model of CAPTCHA usability.
9. Phases for Building Conceptual Framework
Conceptual framework analysis procedure consists of following steps:
1. Conduct extensive and systematic literature review on the phenomenon
to identify relevant literature
2. Reading and analyzing identified literature
3. Discover relevant concepts about the phenomenon from literature
4. Deconstruct and categorize the concepts
5. Integrate and group concepts based on similarities
6. Synthesize and re-synthesize concept groupings to build a holistic
framework that helps in making sense of the phenomenon
7. Validate the holistic framework by presenting to stakeholders
8. Rethink the holistic framework to keep it up to date
10. Holistic Model of CAPTCHA Usability
Usability of
CAPTCHA
Complexity
Content
Genericity
Presentation
Type of Input
Learnability
and ease of
use
Response
Time
Error Rate
User and
CAPTCHA
types
Culture and
familiarity
Language
Device Type
Distortion
Rate
Standardized
Scheme
Color
Schemes
Legends (*):
ConceptsAttributes
* Different colors are used to
distinguish concepts
11. Content Genericity
CAPTCHA challenge tests must be generic enough to allow varied set of users to
take these challenges regardless of their geographic, culture, or content
knowledge.
English language based challenges can pose barriers for non-English users to
solve the test.
Recommend using generic contents like mathematical or image schema.
Language
Challenge tests must abide by W3C Web Accessibility Initiative Guidelines.
Alternative options to solve challenge tests must be provided.
General knowledge varies across geographically and cultural regions.
Combined with language barriers, these challenges can be unsolvable for
some.
Recommend using animal images, geometric shapes, or other simple
entities that are globally recognized.
Culture and
familiarity
User and
CAPTCHA
types
12. Presentation
Presentation of challenge response test schemes plays a vital role in learning and
usability of CAPTCHAs
Color
Schemes
Standardized
Scheme
Colors can facilitate recognition, help user focus on objects, and get user’s
attention.
However, color variations can complicate readability of CAPTCHAs.
Recommend using simple color schemes or avoidance of color schemes can also
accomplish the job effectively.
Variations in CAPTCHA schemes can pose substantial effort for users to learn
and solve the challenge tests.
Since there is no single standard in use currently, designers can opt for the
most popular choice of CAPTCHA scheme to ensure familiarity among users.
Recommend designing hybrid schemes that is easy for humans but harder
for bots.
13. Presentation (contd.)
Distortion
Rate
Device Type
Excessive application of distortion and/or noise will make it hard for humans to
detect patterns as well.
Recommend applying limited amount of distortion.
Mobile users prefer touch inputs over audio.
Presentation of a CAPTCHA can be different in mobile vs desktop machine.
Recommend taking screen size and input mediums into consideration before
presentation CAPTCHA challenge.
14. Complexity
Due to advancements with computer vision and machine learning, CAPTCHA
challenge complexity has been increased sacrificing usability.
Error Rate
Response
Time
Studies indicate that despite users being familiar with CAPTCHAs only 48% of
the users were able to solve the CAPTCHA challenge in their first try.
Every other attempt is inconvenience to user and system.
Recommend designing challenges that can be solved by humans in one or two
attempts.
Response time is the time taken by the users to solve a CAPTCHA challenge.
When complexity is increased, users spend considerable amount of time
solving or need additional aids to solve the problem.
Recommend designing CAPTCHAs that can be solved within 10 seconds in first
attempt, if not 20 seconds for multiple attempts.
15. Complexity (contd.)
Learnability
and ease of
use
Type of Input
For complex challenges, user must be able to learn and adopt to the test from
their trail and quickly complete it in the next consecutive trials.
Recommend designing challenges that have lower learning curve in regards to
identify patterns and solve the tests.
Studies show users prefer mouse inputs over keyboard and touch over voice
inputs.
Recommend using mouse input based challenges when accessing sites in
desktop and using touch inputs when accessing sites using mobile devices.
16. Conclusion
CAPCTHA is a widely used security measure that is designed to distinguish
humans from bots, in order to prevent unauthorized access to websites which
would result in exploiting the Web resources.
Contributions
Holistic model that captures usability and CAPTCHA design factors.
Holistic model can help designers and researchers make sense of the challenges
associated with balancing the effectiveness and the usability of CAPTCHAs.
Limitations
Study is based on secondary empirical evidences on the usability of CAPTCHA.
While we attempted it to be systematic review of literature, peer-review articles found
were limited to search terms used.
Holistic model makes aware of the most crucial characteristics of a CAPCTHA that
provides good user experience.
18. Designing CAPTCHA
CAPTCHA design involves picking random string of characters (in case of text-
based CAPTCHAs) rendering into a distorted image.
HAT8M
Inner workings of a CAPTCHA Source: Banday and Shah 2011, https://arxiv.org/ftp/arxiv/papers/1112/1112.5605.p
19. Holistic Model a.k.a Conceptual model
Conceptual model is a product of systematic qualitative analysis of
multidisciplinary knowledge sources performed to gain better
understanding of a phenomenon.
Conceptual model is
interrelated concepts that together provides comprehensive
understanding of a phenomenon
articulates 'the nature of reality' within a phenomenon
explains 'how things really works' within a phenomenon
A concept consists of a set of attributes which defines them.
Every concept is in relation to the phenomenon under study, to other
relevant concepts, and to its own attributes.
Concepts and attributes are identified through a systematic synthesis of
findings from multiple bodies of knowledge such as peer reviewed
research articles.