5.3 Accessibility In Section 5.1 you assessed the usability of Figure 11, the noticeboard in a public park. For a visually impaired person, that noticeboard might not be usable at all, as you may have commented. This raises the issue of accessibility. Accessibility relates to how well a service is ada
4.8 Verification You will, perhaps, by now be getting a sense of the challenge of setting up an identification system on a national scale. However, for many routine purposes, establishing who a person is from an entire population of possibilities is not what is required. Instead what is required is confirmation that the person is who they claim to be. This is verification. An example of verification happens when you collect a parcel from a depot. You are sometimes asked to show your driving licence, pa
1.6.6 Problems with the use of sound Pre-recorded digitised speech can be included in a UI relatively easily, but generating speech is harder. One of the methods for synthesising speech is called concatenation. The idea behind concatenation is that the computer stores sentences, phrases or word segments of real human speech. New sentences are constructed by arranging words in the right order. For example, with current telephone directory enquiry systems in many countries, after having made an enquiry of a human operator,
1.3.4 How to use colour to good effect The effective use of colour is a complex and technical area. In Table 2 we have listed some general guidelines. 1.3.3 Choosing colours with the right connotations When you use a colour, you should think about what it is likely to mean to the people who look at it, as colours can have different connotations. Colours can even make people feel different. For example, pink has been shown to have a calming effect on emotionally disturbed people. These connotations are partly cultural, so you may find they do not ring true for you if you are a member of a non-western culture, such as Chinese or Indian. For example, in western culture, red is often used 4.3 Scarcity and shareability Modern business theory now views an organisation's intangible, rather than its tangible, assets as the reservoir of much of its value. Even a not-for-profit organisation requires information to be shared and protected for its mission to be accomplished. With this new perspective has come a re-evaluation of the methods to be used to protect the value of an organisation. Historically, four walls were all that was needed to demarcate the inside of an organisation from the outside; and four sturd 3.3 Incentives Reread the short section entitled ‘Benefits of an information security management system’ at the end of Chapter 1 of IT Governance: A Manager's Guide to Data Security & BS 7799/ISO 177799 (the Set Book). In light 3.2.3. Regulation and codes of conduct Chapter 1 of the Set Book presents a case for effective information security based largely upon perceived threats and legal obligations. Chapter 2 introduces further imperatives, which govern specific types of organisation in the UK. 3.2 Imperatives Imperatives generally arise from three sources: threats: companies that depend on information and the technologies that carry it have to protect these resources from a wide range of threats; legislation: many countries have enacted legislation to govern the storage and use of information; regulation: many countries have regulations governing the management and control of public and private assets. 3.1 Introduction The design of a successful information security policy and strategy for any organisation requires an assessment of a number of key factors. These factors can be categorised as either imperatives or incentives. Imperatives are pressures that force you to act. Incentives are the rewards and opportunities that arise from acting. In Subsection 3.2 we examine the main imperatives confronting organisations. These arise either from threats to information assets or from the obliga 1 Why is information security important? This unit introduces you to information security and its management. A succinct definition of information security might run as follows: Information security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. But why is it important to secure information? And how should its security be managed? To s Introduction Information security underpins the commercial viability and profitability of enterprises of all sizes and the effectiveness of public sector organisations. This unit begins by explaining why information security and its management are important for any modern organisation. The unit continues by examining the value that can be placed on information as an organisational asset. The protection of information assets is the subject of the BSi standard on information security management, and the uni 11.3 Controlling cookies in Internet Explorer It's important to remember that you have the ability to control cookies. This exercise will take you through setting a level of security on cookies using Microsoft Internet Explorer version 6, while the next page deals with Mozilla Firefox version 1 (you do not have to be online to do this exercise). Using Internet Explorer Open your browser. On the top menu bar of the browser choose Tools > Internet Options. 4.1 Email attachments Following some simple rules should help you to minimise the risks from malware. The first rule is:
Never ‘double click’ to open a file attached to an email
Instead, what you should do is: Create a folder called ‘Attachments’ (or something similar) in an accessible location within your file structure. Mine is in ‘My Documents’ and is called ‘My Received Files’. 2.2 Browsing for information on the Web One way to find what you are looking for on the Web is to start from sites that you know are likely to have useful ‘links’ on them, like the main Open University pages or the Open University Library pages. These opening pages are known as home pages and are a bit like the contents page of a book. The home page usually gives you some information about the content of the website, often with links to other pages of information held on that site and on sites elsewhere. By clicking on a link â Information on the web Liz Bennett and Jon Rosewell 7.6 Researching information about RFID tags What is the smallest RFID tag currently available? Use the Web to see what you can come up with but don't spend longer than 10 minutes on this activity. (Hint: using ‘smallest RFID tag’ as the search term w 7.5 Active and passive tags Read the extracts below. Using the information they contain, make notes about the main differences between active and passive RFID tags. You will get more out of this exercise if you make a serious attempt to d 6.4 Signal accuracy In the Networked microsensors and the end of the world as we know it article, the author talks about sensors being able to link the ‘world of events’ with the ‘electronic world of computers, processes and storage devices […] by integrating analogue sensing with digital processing […]’ (Shepherd, 2003). In the physical world, events usually take place as an ever-changing continuum. Time passes, the seasons change, temperatures fluctuate and water reservoirs fill and dr 5.3 An introduction to competing technologies Look again at Table 4. If I simply wanted to connect my computer and my mouse wirelessly, would I use WiFi? If I wanted to connect together six or seven laptop computers so that they could share information with each other in a face-to-face business meeting, would I
Table 2: Making e
Activity 8
Activity 6
Activity 32: exploratory
Activity 30: exploratory