25837 research outputs found
Sort by
Automated Cybersecurity Compliance and Threat Response Using AI, Blockchain & Smart Contracts
To address the challenges of internal security policy compliance and dynamic threat response in organizations, we present a novel framework that integrates artificial intelligence (AI), blockchain, and smart contracts. We propose a system that automates the enforcement of security policies, reducing manual effort and potential human error. Utilizing AI, we can analyse cyber threat intelligence rapidly, identify non-compliances and automatically adjust cyber defence mechanisms. Blockchain technology provides an immutable ledger for transparent logging of compliance actions, while smart contracts ensure uniform application of security measures. The framework's effectiveness is demonstrated through simulations, showing improvements in compliance enforcement rates and response times compared to traditional methods. Ultimately, our approach provides for a scalable solution for managing complex security policies, reducing costs and enhancing the efficiency while achieving compliance. Finally, we discuss practical implications and propose future research directions to further refine the system and address implementation challenges
A discussion of co-offending behaviours, social bonds and implications for auditing practice, research and pedagogy
Purpose
The purpose of this study is to provide the discussion about the underlying reasons for predicting someone’s willingness to co-offend in fraud. In doing so, as a main question is how are group-based fraudulent activities initiated, and what rationales and motivations do individuals have for engaging in them?
Design/methodology/approach
The authors collected data through semi-structured interviews. They discussed with several civil servants, in a regional government in Indonesia, about the ways Indonesian civil servants made decisions when they were in normalised fraudulent behaviours. They shared their perspectives and opinions on the pressures and incentives that drive fraudulent actions, as well as the mechanisms through which these behaviours are rationalised and perpetuated within the institutional context. The interviews highlighted the complexity of the issue in Indonesian local governments in general.
Findings
In the context of co-offending behaviour, the findings suggest that neither reinforcements nor associations, even in combination, are adequate predictors of these behaviours. These factors act as initial triggers in situations that provoke cognitive dissonance, but one’s attitudes towards fraud do not independently motivate law-breaking. The predictive power of individual or social enablers is intertwined with the process of definition or rationalisation. Co-offending behaviours tend to occur and recur in contexts where rationalisations have already been learned and applied. Moreover, the adherence to or rejection of rationalisations favourable to fraud is influenced not just by the consequences of the act but significantly by one’s moral and cognitive readiness to imitate observed behaviours. Therefore, while favourable opportunities may increase the likelihood of co-offending acts, these acts do not inevitably occur without consideration of their moral implications.
Originality/value
This research significantly contributes to the expansion of fraud theories and models, and managerial/practice for instance by complementing the effectiveness of SAS No. 99 and the Committee of Sponsoring Organizations of the Treadway Commission internal control framework
The Value of Whole‐Face Procedures for the Construction and Naming of Identifiable Likenesses for Recall‐Based Methods of Facial‐Composite Construction
Traditional methods of facial-composite construction rely on a witness recalling features of an offender’s face. We assess the value of (1) the addition of a trait-recall mnemonic to a Cognitive-type Interview, and (2) perceptually stretching presented composites, to aid image recognition. Participant-constructors intentionally or incidentally encoded a target face, were interviewed about its facial features 3-4 hours or 2 days later, made a series of trait attributions (or not) about the face and constructed a feature-based composite. Regardless of encoding manipulation, faces constructed after 3-4 hours were twice as likely to be correctly named (cf. after two days) both when the trait-recall mnemonic was applied and composites were viewed stretched. Thus, the research indicates that benefit should be afforded when trait-recall mnemonics are employed for feature composites constructed on the same day as the crime, and composites are presented to potential recognisers with an instruction to view the face side-on
‘Empowering connections’: developing a coach mentoring framework
Mentoring has often been advocated as a method of harnessing the influential power of experience through guidance, observation, and reflective practice, allowing coaches to become better equipped to deal with the uncertain nature of coaching. Although much of the discourse on mentoring is set in a positive light, it continues to lack conceptual clarity, with no current universal definition available. Aligned to this, specific research into the programme at the heart of this study, also highlights the need for both wider, and more contextual research. Therefore, with this research being conducted into an established programme, broadly pragmatic research methods were adopted to ensure the research was sensitive to the social, historical and political context of the enquiry.
The purpose of study one was to investigate the mentoring process from the mentee’s perspective. Employing a questionnaire, the results of the study indicated a lack of clarity and understanding of the role of the mentor/mentee relationship in supporting coaching practice. Hence, building on the outcome of study one, study two interviewed four key managers within The FA with responsibility for mentoring to explore how they conceptualized the role of mentors in supporting coach development. The outcome of this study indicated an emphasis on ensuring mentors build healthy rapport with mentees to help provide clarity and understanding of the mentors role in supporting the grassroots coach. Clearly, a conceptual gap appeared to exist between what mentees were experiencing and what The FA were aiming to deliver. Consequently, study three created and presented an applied mentoring framework to support mentors in defining their role and help mentees understand the mentor/mentee relationship. Using a Delphi Study approach, the mentoring framework was shared with an independent panel of mentoring experts who provided constructive critical feedback to shape and help develop the mentoring process in context. As a consequence of this research, the mentoring framework is now employed by the FA to support the delivery of the national FA mentoring programme.
To support the research and findings further, a reflexive thread, and my own personal narrative is highlighted via the text, sketches and doodles to help the reader navigate my thoughts, reflections, and experiences on this research journey
Cooperatives and Business Schools: Why the Disconnect?
Business schools are not neutral purveyors of teaching and research about how to organise. More often than not, they sell a very particular form of knowledge and act as outlets for a form of life in which a cooperative economy is ignored. Using international evidence, our paper shows that cooperatives lack adequate intellectual support from academia in terms of research or education. We explore the disconnect between academia and the cooperative economy in a search for explanations and justifications. Our analysis suggests that this state of affairs denies the cooperative sector an opportunity to both address its skill shortages and acquire the organisational capabilities needed to boost the impact of cooperative enterprises. Equally important, this normalises the situation where business schools can continue to ignore alternative business models. We conclude by suggesting that there would be societal and scholarly gains from accepting the cooperative sector as a legitimate and valuable constituent of any modern economy, and that this should be reflected in the teaching and research of business schools
Thermodynamic properties of hydrogen containing systems and calculation of gas critical flow factor
Sonic nozzles are emerging as crucial reference devices in the calibration of flow meters designed for hydrogen service. In this research study we aim to investigate existing equations governing the critical flow factor (C∗) for hydrogen and assess the achievable uncertainty in determining this vital property. An examination of the literature has been undertaken to target experimental measurements related to hydrogen mixtures, setting the stage for a comprehensive gap analysis.
We introduced C∗ values and validated our calculations with two calibration gases: nitrogen, and methane and their standardised C∗ values. Then, the verified methodology has been utilised for generating C∗ values for hydrogen.
This study concluded that the integration of precise experimental data and the utilisation of representative equations and optimised thermodynamic models is essential for enhancing the accuracy of C∗ calculations, particularly in the context of the expanding role of sonic nozzles in hydrogen flow meter calibration
Leveraging Artificial Intelligence for Predictive CyberSecurity: Enhancing Threat Forecasting and Vulnerability Management
The rise in sophisticated cyber threats demands advanced cybersecurity methods that surpass traditional rule-based approaches. This study explores the application of Artificial Intelligence (AI) to enhance predictive cybersecurity, enabling more accurate threat forecasting and effective vulnerability management. The research assesses various AI
modelssuch as neural networks, decision trees, and Support Vector Machines (SVMs) in their ability to predict cyber threats. Employing a quantitative methodology, the study utilizes historical data from cybersecurity sources, threat intelligence feeds, vulnerability logs, and incident reports. Key performance metrics, including accuracy, precision, recall, F1-score, and Receiver Operating Characteristic - Area Under the Curve (ROC-AUC), were used to test, validate, and train the AI models. Neural networks emerged as the most accurate, achieving 93% accuracy, particularly excelling in identifying phishing attacks and zero-day vulnerabilities. SVM models also performed well, minimizing false positives and increasing detection rates, while decision trees proved computationally efficient and easily interpretable in simpler cybersecurity scenarios. The findings underscore the superiority of AI models over traditional methods, offering dynamic solutions for evolving cyber threats. This research contributes to the field by demonstrating the extensive potential of AI in predictive cybersecurity, providing actionable insights for organizations implementing AI-driven threat detection and vulnerability management
Moving Beyond the Impasse: Importation, Deprivation, and Difference in Prisons
This theoretical article uses an intersectionality lens to show that, together, the importation and deprivation models can act as an important theoretical tool for understanding the lives of incarcerated people who deviate from the expected population of young, white, able-bodied, hearing males. We use examples from the lives of incarcerated d/Deaf people and incarcerated women to introduce a pain-difference continuum, where the extent to which someone differs from what is ‘expected' in prison correlates with the types of pains/deprivations they experience. We acknowledge the impact of imported oppression and coin the term “imported coping,” where people utilize pre-existing strategies to navigate prison's pains
Type 2 diabetes mellitus in people with intellectual disabilities: Examining incidence, risk factors, quality of care and related complications. A population-based matched cohort study
Aims
People with intellectual disabilities are at higher risk of type 2 diabetes mellitus (T2DM) but there are currently gaps in our understanding related to risk of new onset, care of T2DM and complications.
Methods
We examined electronic health-record data from Jan 2010 to May 2022 in 189,172 people with intellectual disabilities and 306,697 age, sex and family practice matched controls. We estimated incidence rates per 1,000-person-years, incidence rate ratios (IRRs), risk factors for T2DM (odds ratio, OR), indicators of quality of care and complications (hazard ratio, HR).
Results
Incidence of T2DM in people with intellectual disabilities was 3.74 compared to 2.21 per 1,000 person-years in controls. After allowing for the younger age of T2DM onset in intellectual disabilities, the adjusted IRR was 6.91 (95 % CI 5.81–8.22). Impaired mobility was associated with T2DM incidence in people with intellectual disabilities (OR = 7.72, 5.87–10.15). People with intellectual disabilities received blood tests for HbA1c and cholesterol, and eye and foot examinations less often; and had a 12 % higher risk of developing macrovascular complications.
Conclusions
People with intellectual disabilities are at increased risk of T2DM at younger ages, have specific risk factors, experience inequities in care and are at risk for macrovascular complications
Misrepresenting the “MAP” Literature Does Little to Advance Child Abuse Prevention: A Critical Commentary and Response to Farmer, Salter, and Woodlock
In a recent paper published in Trauma, Violence, & Abuse, Farmer et al. purport to have critically examined the academic use of the term “Minor Attracted Persons” (MAPs) in published social science research. In the paper, their stated aims are to “understand how this body of scholarship defines and uses the terminology of MAP, conceptualizes sexual interest in minors, and its relationship with child sex offending, and the implications for child protection and safeguarding” (p. 4079). However, we believe that there are significant problems in their handling of this topic, their depth of analysis, and the selective reporting of research in the review that may demonstrate an inherent confirmation bias