Results 41 to 50 of about 55,115 (255)
Abstract Active learning strategies, particularly game‐based learning (GBL), have been shown to enhance student engagement and knowledge acquisition across various educational contexts. This study investigates the impact of a GBL activity, “Medical Jargon,” for high school students learning anatomy and physiology while participating in the 2024 Summer ...
Andrew Bloh +4 more
wiley +1 more source
Password Substantiation with Negative Password Encryption
Secure secret password storage is an essential perspective in frameworks dependent on secret phrase Substantiation method, which is as yet the most broadly utilized Substantiation confirmation procedure, in spite of its some security imperfections. In this paper, a secret key Substantiation architecture structure is implemented that is intended for ...
Dr. D. Hema Latha +2 more
openaire +1 more source
RoseCliff Algorithm: Making Passwords Dynamic
Authentication in the digital landscape faces persistent challenges due to evolving cyber threats. Traditional text-based passwords, which are vulnerable to various attacks, necessitate innovative solutions to fortify user systems.
Afamefuna P. Umejiaku, Victor S. Sheng
doaj +1 more source
From disorientation to preparedness: Information practices as scaffolding in acute crises
Abstract This qualitative study examines how adults in Israel enacted information practices during an acute national crisis. Using the information transitions framework, we investigate how concrete practices emerge and evolve across three stages: understanding, negotiating, and resolving. Semi‐structured Zoom interviews with 18 adults were analyzed via
Lilach Alon +2 more
wiley +1 more source
Abstract This paper uses empirical data from a longitudinal qualitative study conducted with aspirant teachers in England to propose (re)definitions of the concepts of ‘status’ and ‘safety’ as a framework with which to understand and improve teacher recruitment.
Emily MacLeod
wiley +1 more source
ABSTRACT The global manufacturing sector has increasingly adopted circular economy (CE) practices to address sustainability challenges and improve operational efficiency. This study explores the impact of five CE practices—reduce, reuse, remanufacture, recycle, and recover—on key operational performance dimensions: quality, speed, dependability ...
Jose Arturo Garza‐Reyes +5 more
wiley +1 more source
GOTCHA password hackers! [PDF]
2013 ACM Workshop on Artificial Intelligence and Security (AISec)
Blocki, Jeremiah +2 more
openaire +2 more sources
Barriers to the Adoption of Circular Economy Business Models in the Indian Textile Industry
ABSTRACT The Indian textile industry has significant negative impacts on the environment. This industry needs to adopt a circular economy approach to become more sustainable; however, progress on this has been limited. In this study, we report on the barriers to adoption of Circular Economy Business Models (CEBMs) in the Indian textile industry.
Himanshu Chandra +2 more
wiley +1 more source
Multiple password interference in text passwords and click-based graphical passwords [PDF]
The underlying issues relating to the usability and security of multiple passwords are largely unexplored. However, we know that people generally have difficulty remembering multiple passwords. This reduces security since users reuse the same password for different systems or reveal other passwords as they try to log in. We report on a laboratory study
Sonia Chiasson +4 more
openaire +1 more source
ABSTRACT As correctional jurisdictions and risk instrument developers look to optimize scoring for specific population needs, an open question remains ‐ which method is optimal. Popular scoring methods range from manual simple scoring approaches (e.g., Burgess) to more complex machine learning algorithms (e.g., random forests).
Danielle J. Rieger +2 more
wiley +1 more source

