Different moderators/mediators of risk are involved in developmental dyslexia (DD), but data are inconsistent. We explored the prevalence of season of birth and its association with gender and age of school entry in an Italian sample of dyslexic children compared to an Italian normal control group. The clinical sample included 498 children (345 boys, mean age 10.3 ± 2.1 years) with DD, the control sample 1,276 children (658 boys, mean age 10.8 ± 2.2 years) from four elementary schools from the same urban area, and with the same socio-economic status level. A prevalence of birth in autumn was found among children with DD compared to controls (34% versus 24%, p < 0.0001). Children with DD were more frequently males (p < 0.0001) and had a lower mean age of school entry (p < 0.0001). Regarding the distribution of ages, 11.4% of children with DD, but none of the subjects in the control group, started school before 5.7 years. Therefore, greater risk of DD was related to age of school entry (OR = 2.72), gender (OR = 2.16), and season of birth (OR = 1.21). Significant interactions between boys with DD born in autumn, and correct school of entry (OR = 2.56) were joint predictors of higher risk of DD. The association between birth in autumn and DD may be explained by the earlier age of school entry, which may be a critical element in the youngest children with DD or at risk to DD. Whether Italian school policy is oriented to anticipate the school entry, a closer detection of early learning disorders and associated risk factors (familial load, specific language disorders, and attention deficit hyperactivity disorder) should be warranted.
Mobile payment represents a promising emerging market. Nevertheless, especially for Mobile Proximity Payment (MPP), neither users nor merchants have largely adopted this innovation so far. This study aims to identify the adoption factors of MPP by developing a user model, tested through an in-lab experimentation involving 50 users in Italy. We then compared our results with those obtained through a remote survey that involved 1001 subjects who have never used a MPP system before. Compatibility with users' needs, habits and lifestyle has been found to be the dominating factor for adoption. Surprisingly, we found that a previous use of e-payment systems does not influence the user's perception of compatibility. While perceived security is a concern for prospective users who have never used MPP, it does not affect the intention to adopt for users who tried the system at least once. Cost considerations do not influence MPP adoption intention. Based on these findings we expect that MPP systems have a high chance to be widely adopted if optimized for compatibility
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is an infrastructure based on a hierarchical model, but the use of PKIs in non-hierarchical contexts has exposed them to many types of attacks. Here, we discuss weaknesses exploited in past attacks and we propose a solution based on an original consensus algorithm developed for use on blockchain technology. In this implementation we retain the full functionality around X.509 certificates, i.e., for the triad (server name, server address, X.509 server certificate), and demonstrate a mechanism for obtaining fast consensus. The main properties of the solution are that a consensus may be reached even when not all members of the involved PKI participate in a transaction, and that no advanced trust agreement among PKIs is needed. The proposed solution is able to detect PKI attacks and can distinguish errors from attacks, allowing precise management of anomalies. IntroductionPublic key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, and online banking. Their use is increasing, and propositions can be found for e-mail, social networking, cloud services, and many others.The main goal of PKIs is to provide a secure means of authenticating identities over the Internet. It defines the policies and procedures needed to issue, manage, validate, and distribute digital certificates, and then allows the correct use of public-key encryption [1]. PKI management of public keys is usually based on the certificate standard X.509, which provides verification of ownership of a private key by some external entity (certificate authority). The X.509 certificate is defined as a data structure that binds public key values to subjects (e.g., domain names).The binding is asserted by trusted certificate authorities (CAs), which digitally sign each certificate. The CA, before this assertion, has to strongly validate the identity of the private certificate holder [1].An X.509 certificate [2] usually contains not only the pair (public key, subject), but other fields related to the role of the authenticated subject (for example, a web server with a public domain name) and the use or scope of the certificate (for example digital signature, authentication, and others).The key task of the certificate and the associated PKI infrastructure is to establish trust in the certified information. This fails if false certificates are issued erroneously or maliciously and if Future Internet 2020, 12, 40 2 of 16 revocation mechanisms are weak or slow. Centralized solutions, such as certificate revocation lists (CRLs), online certificate status protocol (OCSP), and creating artificial groups of CAs, specifically designed to address these issues, have not resolved them completely. He...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.