Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Elderly (6)
- Twitter (3)
- Virtual Reality (3)
- Homophily (2)
- Metadata (2)
-
- Online security (2)
- VR (2)
- Acceptance (1)
- Accessibility (1)
- Anti‐immigration (1)
- Applicant Equity (1)
- Applicant Identity (1)
- Assistive Technology (1)
- Authentic Tasking (1)
- Beneficiary. Digital Afterlife (1)
- Botnets (1)
- CAPTCHA (1)
- Computer security (1)
- Critical Infrastructure (1)
- Data Heir (1)
- Data Longevity (1)
- Deception (1)
- Dexterity (1)
- Digital Asset (1)
- Digital Estate (1)
- Digital Legacy (1)
- Digital legacy (1)
- Diversity (1)
- E-books (1)
- Electoral manipulation (1)
Articles 1 - 14 of 14
Full-Text Articles in Physical Sciences and Mathematics
The Usability Factors Of Lost Digital Legacy Icoict.Pdf, David M. Cook, Derani Nathasha Dissanayake, Kulwinder Kaur
The Usability Factors Of Lost Digital Legacy Icoict.Pdf, David M. Cook, Derani Nathasha Dissanayake, Kulwinder Kaur
Dr. David M Cook
Virtual Reality And Older Hands: Dexterity And Accessibility In Hand-Held Vr Control, David M. Cook, Derani N. Dissanayake, Kulwinder Kaur
Virtual Reality And Older Hands: Dexterity And Accessibility In Hand-Held Vr Control, David M. Cook, Derani N. Dissanayake, Kulwinder Kaur
Dr. David M Cook
Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook
Older Adults And The Authenticity Of Emails.Docx, Premankit Sannd, David M. Cook
Dr. David M Cook
Haptic Alternatives For Mobile Device Authentication By Older Technology Users, David M. Cook, Kulwinder Kaur
Haptic Alternatives For Mobile Device Authentication By Older Technology Users, David M. Cook, Kulwinder Kaur
Dr. David M Cook
The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib
The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib
Dr. David M Cook
An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook
An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook
Dr. David M Cook
Care needs to be taken to reduce the number of people who are fearful and mistrustful of using ICT where that usage is forced upon them without choice or alternative. The growing incidence of mandatory and imposed online systems can result in confusion, misuse, fear, and rejection by people with only rudimentary ICT skills. A cohort where a high percentage of such people occur is older people, defined in this study as people over the age of 60 Examples of compulsory ICT interactions include some banks limiting bank statement access through online rather than paper-based options. Other examples include the …
Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook
Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook
Dr. David M Cook
The Changing Values Of Digital Legacies: E-Books And The Challenges Of Data Mobility And The Perceived Value Of Books, Derani Nathasha Dissanayake, David M. Cook
The Changing Values Of Digital Legacies: E-Books And The Challenges Of Data Mobility And The Perceived Value Of Books, Derani Nathasha Dissanayake, David M. Cook
Dr. David M Cook
Twitter Influence And Cumulative Perceptions Of Extremist Support: A Case Study Of Geert Wilders, Gabrielle Blanquart, David M. Cook
Twitter Influence And Cumulative Perceptions Of Extremist Support: A Case Study Of Geert Wilders, Gabrielle Blanquart, David M. Cook
Dr. David M Cook
The advent of Social media has changed the manner in which perceptions about power and information can be influenced. Twitter is used as a fast‐paced vehicle to deliver short, succinct pieces of information, creating the perception of acceptance, popularity and authority. In the case of extremist groups, Twitter is one of several avenues to create the perception of endorsement of values that would otherwise gain less prominence through mainstream media. This study examines the use of Twitter in augmenting the status and reputation of anti‐Islam and anti‐immigration policy through the controlled release of social media information bursts. The paper demonstrates …
Seniors Language Paradigms: 21st Century Jargon And The Impact On Computer Security And Financial Transactions For Senior Citizens, David M. Cook, Patryck Szewczyk, Krishnun Sansurooah
Seniors Language Paradigms: 21st Century Jargon And The Impact On Computer Security And Financial Transactions For Senior Citizens, David M. Cook, Patryck Szewczyk, Krishnun Sansurooah
Dr. David M Cook
Senior Citizens represent a unique cohort of computer users insomuch as they have come to the field of computer usage later in life, as novices compared to other users. As a group they exhibit a resentment, mistrust and ignorance towards cyber related technology that is born out of their educational and social experiences prior to widespread information technology. The shift from analogue to digital proficiency has been understated for a generation of citizens who were educated before computer usage and internet ubiquity. This paper examines the language difficulties encountered by senior citizens in attempting to engage in banking and communications …
The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook
The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook
Dr. David M Cook
It is uncertain how many discreet users occupy the social media community. Fake tweets, sock puppets, force‐multipliers and botnets have become embedded within the fabric of new media in sufficient numbers that social media support by means of quantity is no longer a reliable metric for determining authority and influence within openly expressed issues and causes. Election campaigns, and their associated political agendas, can now be influenced by non‐specific virtual presences that cajole and redirect opinions without declaring identity or allegiance. In the lead up to the 2013 Australian Federal Election, the open source Twitter activity for the two major …
Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance With High-Impact Returns , David M. Cook
Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance With High-Impact Returns , David M. Cook
Dr. David M Cook
The realization that cyber threats can cause the same devastation to a country as physical security risks has taken the long route towards acceptance. Governments and businesses have thrown the glove of responsibility back and forth on numerous occasions, with government agencies citing the need for private enterprise to take up the mantle, and Business returning the gesture by proposing a ‘national’ perspective on cyber security. Ambit claims such as these drain a range of security resources when both sides should work in concert by directing all available energy towards resolving cyber-threats. This paper compares the public-private arrangements through Australasia …
Securing The Elderly: A Developmental Approach To Hypermedia Based Online Information Security For Senior Novice Computer Users, David M. Cook, Patryck Szewczyk, Krishnun Sansurooah
Securing The Elderly: A Developmental Approach To Hypermedia Based Online Information Security For Senior Novice Computer Users, David M. Cook, Patryck Szewczyk, Krishnun Sansurooah
Dr. David M Cook
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content. It subsequently demonstrates a solution designed with the elderly, yet novice, end-user in mind. …
Birds Of A Feather Deceive Together: The Chicanery Of Multiplied Metadata, David M. Cook
Birds Of A Feather Deceive Together: The Chicanery Of Multiplied Metadata, David M. Cook
Dr. David M Cook