abi

Significant Contributions Advance the Understanding of Disability Programs and the People They Serve

Mathematica’s Center for Studying Disability Policy has provided valuable insights into the Social Security Administration’s (SSA) disability programs during its seven years as a research center for the SSA’s Disability Research Consortium (DRC).




abi

Improving Effect Estimates by Limiting the Variability in Inverse Propensity Score Weights

This study describes a novel method to reweight a comparison group used for causal inference, so the group is similar to a treatment group on observable characteristics yet avoids highly variable weights that would limit statistical power.




abi

In Vitro Plant Breeding Towards Novel Agronomic Traits: Biotic and Abiotic Stress Tolerance / Manoj Kumar, Annamalai Muthusamy, Vivek Kumar, Neera Bhalla-Sarin, editors

Online Resource




abi

Cottage Industry of Biocontrol Agents and Their Applications: Practical Aspects to Deal Biologically with Pests and Stresses Facing Strategic Crops / Nabil El-Wakeil, Mahmoud Saleh, Mohamed Abu-hashim, editors

Online Resource




abi

Introduction to environmental data analysis and modeling Moses Eterigho Emetere, Esther Titilayo Akinlabi

Online Resource




abi

Machine learning in aquaculture: hunger classification of Lates Calcarifer / Mohd Azraai Mohd Razman, Anwar P. P. Abdul Majeed, Rabiu Muazu Musa, Zahari Taha, Gian-Antonio Susto, Yukinori Mukai

Online Resource




abi

Rehabilitating damaged ecosystems / edited by John Cairns, Jr

Online Resource




abi

Future remains: a cabinet of curiosities for the Anthropocene / edited by Gregg Mitman, Marco Armiero, and Robert S. Emmett

Barker Library - GF75.F88 2018




abi

Marine hydrocarbon seeps: microbiology and biogeochemistry of a global marine habitat / Andreas Teske, Verena Carvalho, editors

Online Resource




abi

Socio-economic and eco-biological dimensions in resource use and conservation: strategies for sustainability / Niranjan Roy, Shubhadeep Roychoudhury, Sunil Nautiyal, Sunil K. Agarwal, Sangeeta Baksi, editors

Online Resource




abi

Reconciling human needs and conserving biodiversity: large landscapes as a new conservation paradigm: The Lake Tumba, Democratic Republic of Congo / Bila-Isia Inogwabini

Online Resource




abi

Brassica improvement: molecular, genetics and genomic perspectives / Shabir Hussain Wani, Ajay Kumar Thakur, Yasin Jeshima Khan, editors

Online Resource




abi

Mixed plantations of eucalyptus and leguminous trees: soil, microbiology and ecosystem services / Elke Jurandy Bran Nogueira Cardoso, José Leonardo de Moraes Gonçalves, Fabiano de Carvalho Balieiro, Avílio Antônio Franco, editors

Online Resource




abi

Viscoelastic interfaces comprising of cellulose nanocrystals and lauroyl ethyl arginate for enhanced foam stability

Soft Matter, 2020, 16,3981-3990
DOI: 10.1039/C9SM02392E, Paper
Agnieszka Czakaj, Aadithya Kannan, Agnieszka Wiśniewska, Gabriela Grześ, Marcel Krzan, Piotr Warszyński, Gerald G. Fuller
At submillimolar concentrations of lauroyl ethyl arginate, cellulose nanocrystals aggregate and form elongated fibres. This interfacial assembly efficiently stabilises foams.
The content of this RSS Feed (c) The Royal Society of Chemistry




abi

Role of molecular bend angle and biaxiality in the stabilization of the twist-bend nematic phase

Soft Matter, 2020, Advance Article
DOI: 10.1039/D0SM00078G, Communication
Wojciech Tomczyk, Lech Longa
Within mean-field theory for V-shaped molecules, we have investigated how the alteration of a molecule's structural features influence the stabilization of modulated and non-modulated nematic phases.
To cite this article before page numbers are assigned, use the DOI form of citation above.
The content of this RSS Feed (c) The Royal Society of Chemistry




abi

How clay particulates affect flow cessation and the coiling stability of yield stress-matched cementing suspensions

Soft Matter, 2020, 16,3929-3940
DOI: 10.1039/C9SM02414J, Paper
Iman Mehdipour, Hakan Atahan, Narayanan Neithalath, Mathieu Bauchy, Edward Garboczi, Gaurav Sant
Transition from closely-packed to fractally-architected structures with clay addition improves homogeneity and prevents local dewatering, thus enhancing coiling stability of layer-wise extruded cementing suspensions during 3D-printing.
The content of this RSS Feed (c) The Royal Society of Chemistry




abi

Evaluation of the subtle trade-off between physical stability and thermo-responsiveness in crosslinked methylcellulose hydrogels

Soft Matter, 2020, Accepted Manuscript
DOI: 10.1039/D0SM00269K, Paper
Lorenzo Bonetti, Luigi De Nardo, Fabio Variola, Silvia Fare
Methylcellulose (MC) hydrogels, undergoing sol-gel reversible transition upon temperature changes, lend themselves to smart system applications. However, their reduced stability in aqueous environment and unsatisfactory mechanical properties limit the breadth...
The content of this RSS Feed (c) The Royal Society of Chemistry




abi

Systematic approach for wettability prediction using molecular dynamics simulations

Soft Matter, 2020, 16,4299-4310
DOI: 10.1039/D0SM00197J, Paper
Open Access
  This article is licensed under a Creative Commons Attribution 3.0 Unported Licence.
Ahmed Jarray, Herman Wijshoff, Jurriaan A. Luiken, Wouter K. den Otter
An efficient approach for fast screening of liquids in terms of their wetting properties.
The content of this RSS Feed (c) The Royal Society of Chemistry




abi

Saddle-curvature instability of lipid bilayer induced by amphipathicpeptides: A molecular model

Soft Matter, 2020, Accepted Manuscript
DOI: 10.1039/D0SM00499E, Paper
Rachel Downing, Guilherme Volpe Bossa, Sylvio May
Amphipathic peptides that partition into lipid bilayers affect the curvature elastic properties oftheir host. Some of these peptides are able to shift the Gaussian modulus to positive values, thustriggering an...
The content of this RSS Feed (c) The Royal Society of Chemistry




abi

[ASAP] Describing Meta-Atoms Using the Exact Higher-Order Polarizability Tensors

ACS Photonics
DOI: 10.1021/acsphotonics.9b01776




abi

[ASAP] Strong Optical Feedback Stabilized Quantum Cascade Laser

ACS Photonics
DOI: 10.1021/acsphotonics.0c00189




abi

Usability and Security; Better Together

Divya Sasidharan calls into question the trade-offs often made between security and usability. Does a secure interface by necessity need to be hard to use? Or is it the choice we make based on years of habit? Snow has fallen, snow on snow.


Security is often synonymous with poor usability. We assume that in order for something to be secure, it needs to by default appear impenetrable to disincentivize potential bad actors. While this premise is true in many instances like in the security of a bank, it relies on a fundamental assumption: that there is no room for choice.

With the option to choose, a user almost inevitably picks a more usable system or adapts how they interact with it regardless of how insecure it may be. In the context of the web, passwords are a prime example of such behavior. Though passwords were implemented as a way to drastically reduce the risk of attack, they proved to be marginally effective. In the name of convenience, complex, more secure passwords were shirked in favor of easy to remember ones, and passwords were liberally reused across accounts. This example clearly illustrates that usability and security are not mutually exclusive. Rather, security depends on usability, and it is imperative to get user buy-in in order to properly secure our applications.

Security and Usability; a tale of broken trust

At its core, security is about fostering trust. In addition to protecting user accounts from malicious attacks, security protocols provide users with the peace of mind that their accounts and personal information is safe. Ironically, that peace of mind is incumbent on users using the security protocols in the first place, which further relies on them accepting that security is needed. With the increased frequency of cyber security threats and data breaches over the last couple of years, users have grown to be less trusting of security experts and their measures. Security experts have equally become less trusting of users, and see them as the “the weakest link in the chain”. This has led to more cumbersome security practices such as mandatory 2FA and constant re-login flows which bottlenecks users from accomplishing essential tasks. Because of this break down in trust, there is a natural inclination to shortcut security altogether.

Build a culture of trust not fear

Building trust among users requires empowering them to believe that their individual actions have a larger impact on the security of the overall organization. If a user understands that their behavior can put critical resources of an organization at risk, they will more likely behave with security in mind. For this to work, nuance is key. Deeming that every resource needs a similarly high number of checks and balances diminishes how users perceive security and adds unnecessary bottlenecks to user workflows.

In order to lay the foundation for good security, it’s worth noting that risk analysis is the bedrock of security design. Instead of blindly implementing standard security measures recommended by the experts, a better approach is to tailor security protocols to meet specific use cases and adapt as much as possible to user workflows. Here are some examples of how to do just that:

Risk based authentication

Risk based authentication is a powerful way to perform a holistic assessment of the threats facing an organization. Risks occur at the intersection of vulnerability and threat. A high risk account is vulnerable and faces the very real threat of a potential breach. Generally, risk based authentication is about calculating a risk score associated with accounts and determining the proper approach to securing it. It takes into account a combination of the likelihood that that risk will materialize and the impact on the organization should the risk come to pass. With this system, an organization can easily adapt access to resources depending on how critical they are to the business; for instance, internal documentation may not warrant 2FA, while accessing business and financial records may.

Dynamically adaptive auth

Similar to risk based auth, dynamically adaptive auth adjusts to the current situation. Security can be strengthened and slackened as warranted, depending on how risky the access point is. A user accessing an account from a trusted device in a known location may be deemed low risk and therefore not in need of extra security layers. Likewise, a user exhibiting predictive patterns of use should be granted quick and easy access to resources. The ability to adapt authentication based on the most recent security profile of a user significantly improves the experience by reducing unnecessary friction.

Conclusion

Historically, security failed to take the user experience into account, putting the onus of securing accounts solely on users. Considering the fate of password security, we can neither rely on users nor stringent security mechanisms to keep our accounts safe. Instead, we should aim for security measures that give users the freedom to bypass them as needed while still protecting our accounts from attack. The fate of secure systems lies in the understanding that security is a process that must constantly adapt to face the shifting landscape of user behavior and potential threats.


About the author

Divya is a web developer who is passionate about open source and the web. She is currently a developer experience engineer at Netlify, and believes that there is a better workflow for building and deploying sites that doesn’t require a server—ask her about the JAMstack. You will most likely find her in the sunniest spot in the room with a cup of tea in hand.

More articles by Divya




abi

Cigarette taxes and teen marijuana use [electronic resource] / D. Mark Anderson, Kyutaro Matsuzawa, Joseph J. Sabia

Cambridge, Mass. : National Bureau of Economic Research, 2020




abi

Drug courts [electronic resource] : a new approach to treatment and rehabilitation / James E. Lessenger, Glade F. Roper, editors

New York : Springer, [2007]




abi

Italian populism and constitutional law: strategies, conflicts and dilemmas / Giacomo Delledonne, Giuseppe Martinico, Matteo Monti, Fabio Pacini, editors

Online Resource




abi

Tyranny comes home: the domestic fate of U.S. militarism / Christopher J. Coyne and Abigail R. Hall

Dewey Library - UA23.C685 2018




abi

The end of strategic stability?: Nuclear weapons and the challenge of regional rivalries / Lawrence Rubin and Adam N. Stulberg, editors

Dewey Library - U263.E557 2018




abi

Gender equality in politics: implementing party quotas in Germany and Austria / Petra Ahrens, Katja Chmilewski, Sabine Lang, Birgit Sauer

Online Resource




abi

Sacrificial limbs: masculinity, disability, and political violence in Turkey / Salih Can Açıksöz

Dewey Library - UB365.T8 A27 2020




abi

United Andhra leaders call for bandh today as Cabinet clears Telangana formation

Congress MPs, MLAs from Seemandhra say Cabinet move was hasty.




abi

Cabinet clears statutory status for UIDAI

Besides giving statutory status to UIDAI, the Bill seeks to provide legal backing to Aadhaar.




abi

Controversial MLA Raja Bhaiya back in Akhilesh cabinet

Raja Bhaiya resigned after being named by DSP Haq's wife Parveen Azad in a murder case this year.




abi

3 more babies die in Malda hospital, toll rises to 18

15 new-born babies, brought to the Malda Hospital in critical condition, have died since Tuesday.




abi

'Became Buddhist for haircut, shave... mental untouchability persists'

The organisers of the event have claimed that a total of 60,000 Dalits converted to Buddhism.




abi

Extending the Scalability of Linkage Learning Genetic Algorithms [electronic resource] / Ying-ping Chen

Secaucus : Springer, 2006




abi

Explicit stability conditions for continuous systems [electronic resource] : a functional analytic approach / by Michael I. Gil’

Berlin, Heidelberg : Springer Berlin Heidelberg, 2005




abi

Elementi di Probabilità e Statistica [electronic resource] / F. Biagini, M. Campanino

Milano : Springer, 2006




abi

Adaptive food webs : stability and transitions of real and model ecosystems / edited by John C. Moore (Colorado State University, CO, USA), Peter C. de Ruiter (Wageningen Universiteit, The Netherlands), Kevin S. McCann (University of Guelph, ON, Canada),




abi

Economics and liability for environmental problems / edited by Kathleen Segerson (University of Connecticut, USA)




abi

Environmental assessment on energy and sustainability by data envelopment analysis / Toshiyuki Sueyoshi (New Mexico Institute of Mining and Technology, New Mexico, USA), Mika Gogo (Tokyo Institute of Technology, Tokyo, Japan)

Sueyoshi, T. (Toshiyuki), 1954- author




abi

Climate change, new security challenges and the United Nations / Dr Sabita Mohapatra

Mohpatra, Sabita, author




abi

The green marble : earth system science and global sustainability / David P. Turner

Turner, David (David P.), 1950- author




abi

Sustainability and peaceful coexistence for the anthropocene / edited by Pasi Heikkurinen




abi

Global environmental governance and the accountability trap / edited by Susan Park and Teresa Kramarz




abi

Plant conservation : the role of habitat restoration / Sergei Volis

Volis, Sergei, author




abi

Petition in Calcutta High Court seeking Madan Mitra’s removal from Bengal cabinet



  • DO NOT USE West Bengal
  • India

abi

The effect of fertiliser application and timing on jarrah and marri growth, density and form in nine-year-old bauxite mine rehabilitation / M.A. Norman, C.D. Grant

Norman, M. A




abi

Germination and viability of seeds of jarrah (Eucalyptus marginata) forest species according to temperature and duration of storage / M.A. Norman, E.L. Cromer, S.K. Taylor

Norman, M. A




abi

Direct transfer of soil in the wet season as a method to establish resprouter species in rehabilitated bauxite mines / M.A. Norman, J.M. Koch

Norman, M. A




abi

On the operability of the Sherritt-Gordon ammonia leach at the Kwinana Nickel Refinery / Travis M. Woodward

Woodward, Travis M., author