1The workplace is a captive environment where the overall contribution of the meal served could be 2 an important element of the overall diet. Despite growing demand little information is available to 3 aid healthy dish selection. 4This study identifies information valued by consumers in the UK, Greece, Denmark and France using 5 best-worst scaling. Value for Money, Nutrition and Naturalness are key elements of information that 6 consumers require to be able to make a conscious decision about dish selection in all four countries. 7Latent class analysis shows that consumers align to one of five cluster groups, i.e., Value Driven, 8Conventionalists, Socially Responsible, Health Conscious and Locavores. 9Understanding key information needs can allow food operators to align their service with consumer 10 preferences across different market segments. 11
Completeness of metadata is one of the most essential characteristics of their quality. An incomplete metadata record is a record of degraded quality. Existing approaches to measure metadata completeness limit their scope in counting the existence of values in fields, regardless of the metadata hierarchy as defined in international standards. Such a traditional approach overlooks several issues that need to be taken into account. This paper presents a fine‐grained metrics system for measuring metadata completeness, based on field completeness. A metadata field is considered to be a container of multiple pieces of information. In this regard, the proposed system is capable of following the hierarchy of metadata as it is set by the metadata schema and admeasuring the effect of multiple values of multivalued fields. An application of the proposed metrics system, after being configured according to specific user requirements, to measure completeness of a real‐world set of metadata is demonstrated. The results prove its ability to assess the sufficiency of metadata to describe a resource and provide targeted measures of completeness throughout the metadata hierarchy.
Compared to meals prepared at home, meals eaten out of home tend to contain more energy, total fat and saturated fat and it is here where consumers can have very little knowledge of the nutrient profile of the dish they are eating. The aim of the European Union‐funded FoodSMART project (http://www.foodsmartproject.net) was to develop an innovative technical menu solution ‘app’ that enables informed consumer food choice, which takes into account individual preferences (such as dietary requirements) as well as food product specifications, in a workplace canteen setting. A best–worst scaling questionnaire was conducted to identify consumers’ functional app requirements and inform the development of personalised food choice messages. Proof of concept was tested using the System Usability Scale in consumers from four European countries (Denmark, France, Greece and the UK). Information on ingredients, nutrition, food ‘naturalness’ and value for money were those most valued by consumers, with this presented ideally in a personalised way and using a traffic light model. Field trials of the FoodSMART app indicated that consumers found it to be simple, easy to use and attractive for frequent use. By gaining insight into the needs of consumers, dietary information can be better tailored and provided in an appropriate format to enable informed food choice.
Increase in usage of electronic communication tools (email, IM, Skype, etc.) in enterprise environments has created new attack vectors for social engineers. Billions of people are now using electronic equipment in their everyday workflow which means billions of potential victims of Social Engineering (SE) attacks. Human is considered the weakest link in cybersecurity chain and breaking this defense is nowadays the most accessible route for malicious internal and external users. While several methods of protection have already been proposed and applied, none of these focuses on chat-based SE attacks while at the same time automation in the field is still missing. Social engineering is a complex phenomenon that requires interdisciplinary research combining technology, psychology, and linguistics. Attackers treat human personality traits as vulnerabilities and use the language as their weapon to deceive, persuade and finally manipulate the victims as they wish. Hence, a holistic approach is required to build a reliable SE attack recognition system. In this paper we present the current state-of-the-art on SE attack recognition systems, we dissect a SE attack to recognize the different stages, forms, and attributes and isolate the critical enablers that can influence a SE attack to work. Finally, we present our approach for an automated recognition system for chatbased SE attacks that is based on Personality Recognition, Influence Recognition, Deception Recognition, Speech Act and Chat History. CCS CONCEPTS • Security and privacy → Phishing; • Computing methodologies → Supervised learning;
Abstract. The emergence of grid and cloud computing systems has introduced new security concepts, so it requires new access control approaches. Traditional systems engineering processes can be enriched with helper approaches that can facilitate the definition of access control requirements in such complex environments. Looking towards a holistic approach on the definition of access control requirements, we propose a four-layer conceptual categorization. In addition, an example is given so that to demonstrate the utilization of the proposed categorization in a grid scenario for defining access control requirements, and evaluate their fulfilment vis-à-vis contemporary employed access control approaches.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.