Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

The Usability Factors Of Lost Digital Legacy Icoict.Pdf, David M. Cook, Derani Nathasha Dissanayake, Kulwinder Kaur Jul 2019

The Usability Factors Of Lost Digital Legacy Icoict.Pdf, David M. Cook, Derani Nathasha Dissanayake, Kulwinder Kaur

Dr. David M Cook

The increased acquisition of digital objects over time has grown in the 21st century to represent objects of value as digital assets. Many people who plan their lives are unaware of the transfer and ownership challenges associated with digital legacy. This paper discusses the burden of digital legacy management and the need for regulatory reform in the transition of digital objects to digital assets. A study of thirty two (n=32) Australians over the age of 65 identified critical issues in the transfer, ownership, management and mobility of digital objects under legacy conditions. 


Virtual Reality And Older Hands: Dexterity And Accessibility In Hand-Held Vr Control, David M. Cook, Derani N. Dissanayake, Kulwinder Kaur Apr 2019

Virtual Reality And Older Hands: Dexterity And Accessibility In Hand-Held Vr Control, David M. Cook, Derani N. Dissanayake, Kulwinder Kaur

Dr. David M Cook

Whilst the VR Headset has a sense of commonality with users, VR hand controllers are largely incongruent with each other. This paper examines the common ground between VR developments in the area of hand control devices. This paper looks at VR controllers through the lens of older people, specifically for the purpose of including people from any age in the opportunity to enjoy the benefits of VR experiences. This study uses Fitts’ Index of Difficulty to determine areas of concern in terms of dexterity and accessibility. The study recommends a standardized approach to agility and access in VR hand control …


Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook Nov 2018

Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook

Dr. David M Cook

Despite the variety of global research on the identification and proliferation of ransomware and other online scams, there is still a relative vacuum of research with respect to the problem of digitally and socially engineered deception in the form of ransomware on an individual. This is particularly problematic for older cohorts, where life experience in many endeavours sits alongside novice understanding and experience in the use of online technology. This paper examines the indicators that characterize authenticity and deception within ransomware and phishing. A survey of older Australian people over the age of 65 reveals markers and patterns that assist …


Haptic Alternatives For Mobile Device Authentication By Older Technology Users, David M. Cook, Kulwinder Kaur Jul 2018

Haptic Alternatives For Mobile Device Authentication By Older Technology Users, David M. Cook, Kulwinder Kaur

Dr. David M Cook

Turing tests are used to secure the human interaction on the Internet. Tests such as CAPTCHA are based on visual or auditory recognition of symbols and are difficult to distinguish by elderly people. A study examining the consistency of a tactile feedback-based Turing test identified an alternative to mainstream tests. This approach examines the vibration-based sensitivity which is detectable through skin surfaces when used to touch the screen of a mobile device. The study concentrated on a range of rough, smooth, sticky and coarse textures as possible differentiators for swipe-based tactile authentication using mobile devices. This study examined the vibration-based …


The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib Jul 2018

The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib

Dr. David M Cook

Virtual reality (VR) is an emerging technology that has already found successful application in a variety of different fields, including simulation, training, education, and gaming. While VR technologies have been considered for use in recruitment practices, available research on the topic is limited. In all stages of the recruitment process, social categorization of job applicants based on ethnicity, skin color, and gender, as well as other forms of discrimination are contemporary issues. This study examined the efficacy of using virtual reality technology as part of job interview strategies and evaluated its potential to mitigate personal bias towards job applicants. The …


An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook May 2018

An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook

Dr. David M Cook

Care needs to be taken to reduce the number of people who are fearful and mistrustful of using ICT where that usage is forced upon them without choice or alternative. The growing incidence of mandatory and imposed online systems can result in confusion, misuse, fear, and rejection by people with only rudimentary ICT skills. A cohort where a high percentage of such people occur is older people, defined in this study as people over the age of 60 Examples of compulsory ICT interactions include some banks limiting bank statement access through online rather than paper-based options. Other examples include the …


Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook Sep 2017

Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook

Dr. David M Cook

Virtual Reality (VR) usability is an emerging area that has made rapid progress among early adopters, but has so far failed to address the concerns of late adopters. In particular, elderly cohorts stand to benefit greatly from VR technologies as they enter areas of assistive technology, gerontechnology, and authentic modes of training. This study examined technology rejection criteria from a sample of 19 retired persons by comparing normative and VR practices for the fundamental learning of navigation using Google Earth mapping. This research discovered that three dimensional fear was a major factor in determining the acceptance and rejection of VR …


The Changing Values Of Digital Legacies: E-Books And The Challenges Of Data Mobility And The Perceived Value Of Books, Derani Nathasha Dissanayake, David M. Cook Oct 2016

The Changing Values Of Digital Legacies: E-Books And The Challenges Of Data Mobility And The Perceived Value Of Books, Derani Nathasha Dissanayake, David M. Cook

Dr. David M Cook

Digital Legacies in the form of e-Books represent a challenge for those who make direct comparisons to in-print paper books.  Digital legacies come in a variety of segments that are characterised in terms of their perceived value. Digital objects retain higher values when they are easily transferred from one person to another. The value of e-books is dependent upon the ability to access and re-read each e-book, and to make a comparison between an e-book and a paper copy of the same book. A qualitative study of 32 adults over the age of 65 in Australia revealed the difficulty in …


Twitter Influence And Cumulative Perceptions Of Extremist Support: A Case Study Of Geert Wilders, Gabrielle Blanquart, David M. Cook Feb 2014

Twitter Influence And Cumulative Perceptions Of Extremist Support: A Case Study Of Geert Wilders, Gabrielle Blanquart, David M. Cook

Dr. David M Cook

The advent of Social media has changed the manner in which perceptions about power and information can be influenced. Twitter is used as a fast‐paced vehicle to deliver short, succinct pieces of information, creating the perception of acceptance, popularity and authority. In the case of extremist groups, Twitter is one of several avenues to create the perception of endorsement of values that would otherwise gain less prominence through mainstream media. This study examines the use of Twitter in augmenting the status and reputation of anti‐Islam and anti‐immigration policy through the controlled release of social media information bursts. The paper demonstrates …


Seniors Language Paradigms: 21st Century Jargon And The Impact On Computer Security And Financial Transactions For Senior Citizens, David M. Cook, Patryck Szewczyk, Krishnun Sansurooah Feb 2014

Seniors Language Paradigms: 21st Century Jargon And The Impact On Computer Security And Financial Transactions For Senior Citizens, David M. Cook, Patryck Szewczyk, Krishnun Sansurooah

Dr. David M Cook

Senior Citizens represent a unique cohort of computer users insomuch as they have come to the field of computer usage later in life, as novices compared to other users. As a group they exhibit a resentment, mistrust and ignorance towards cyber related technology that is born out of their educational and social experiences prior to widespread information technology. The shift from analogue to digital proficiency has been understated for a generation of citizens who were educated before computer usage and internet ubiquity. This paper examines the language difficulties encountered by senior citizens in attempting to engage in banking and communications …


The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook Feb 2014

The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook

Dr. David M Cook

It is uncertain how many discreet users occupy the social media community. Fake tweets, sock puppets, force‐multipliers and botnets have become embedded within the fabric of new media in sufficient numbers that social media support by means of quantity is no longer a reliable metric for determining authority and influence within openly expressed issues and causes. Election campaigns, and their associated political agendas, can now be influenced by non‐specific virtual presences that cajole and redirect opinions without declaring identity or allegiance. In the lead up to the 2013 Australian Federal Election, the open source Twitter activity for the two major …


Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance With High-Impact Returns , David M. Cook Feb 2014

Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance With High-Impact Returns , David M. Cook

Dr. David M Cook

The realization that cyber threats can cause the same devastation to a country as physical security risks has taken the long route towards acceptance. Governments and businesses have thrown the glove of responsibility back and forth on numerous occasions, with government agencies citing the need for private enterprise to take up the mantle, and Business returning the gesture by proposing a ‘national’ perspective on cyber security. Ambit claims such as these drain a range of security resources when both sides should work in concert by directing all available energy towards resolving cyber-threats. This paper compares the public-private arrangements through Australasia …


Securing The Elderly: A Developmental Approach To Hypermedia Based Online Information Security For Senior Novice Computer Users, David M. Cook, Patryck Szewczyk, Krishnun Sansurooah Feb 2014

Securing The Elderly: A Developmental Approach To Hypermedia Based Online Information Security For Senior Novice Computer Users, David M. Cook, Patryck Szewczyk, Krishnun Sansurooah

Dr. David M Cook

Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content. It subsequently demonstrates a solution designed with the elderly, yet novice, end-user in mind. …


Birds Of A Feather Deceive Together: The Chicanery Of Multiplied Metadata, David M. Cook Dec 2013

Birds Of A Feather Deceive Together: The Chicanery Of Multiplied Metadata, David M. Cook

Dr. David M Cook

New Media conventions have fluttered along unforeseen flight paths. By combining sock-puppetry with the grouping power of metadata it is possible to demonstrate widespread influence through Twitter dispersion. In one nest there is a growing use of sock-puppetry accentuated by the exploitation of a social media that does not attempt to verify proof of identity. Created identities in their thousands can flock towards, and in support of, a single identity. They do so alongside legitimate accounts but in concert remain imperceptible within an overall group. In another nest there is the practise of homophily, captured through metadata, and used to …