500 research outputs found

    The Pessimistic Investor Sentiments Indicator in Social Networks

    Get PDF
    With the worldwide proliferation of social networks, the social networks have played an important role in the social activities .Peoples are inclined to obtain the corresponding public opinion to make decision such as shopping, education, investment and so on. Analysis of data generated by social networks has become an important field of research, however in the field of public opinion analysis of social networks the quantitative measure indexes are still lacking. In this paper, the calculation method of pessimistic investor sentiments indicator is proposed, and the index has a certain theoretical and practical value

    Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases

    Get PDF
    [Abstract] Shodan is a search engine for exploring the Internet and thus finding connected devices. Its main use is to provide a tool for cybersecurity researchers and developers to detect vulnerable Internet-connected devices without scanning them directly. Due to its features, Shodan can be used for performing cybersecurity audits on Internet of Things (IoT) systems and devices used in applications that require to be connected to the Internet. The tool allows for detecting IoT device vulnerabilities that are related to two common cybersecurity problems in IoT: the implementation of weak security mechanisms and the lack of a proper security configuration. To tackle these issues, this article describes how Shodan can be used to perform audits and thus detect potential IoT-device vulnerabilities. For such a purpose, a use case-based methodology is proposed to teach students and users to carry out such audits and then make more secure the detected exploitable IoT devices. Moreover, this work details how to automate IoT-device vulnerability assessments through Shodan scripts. Thus, this article provides an introductory practical guide to IoT cybersecurity assessment and exploitation with Shodan.This work has been funded by the Xunta de Galicia (ED431G2019/01), the Agencia Estatal de Investigación of Spain (TEC2016-75067-C4-1-R, RED2018-102668-T, PID2019-104958RB-C42) and ERDF funds of the EU (AEI/FEDER, UE)Xunta de Galicia; ED431G2019/0

    The Encyclopedia of Neutrosophic Researchers - vol. 3

    Get PDF
    This is the third volume of the Encyclopedia of Neutrosophic Researchers, edited from materials offered by the authors who responded to the editor’s invitation. The authors are listed alphabetically. The introduction contains a short history of neutrosophics, together with links to the main papers and books. Neutrosophic set, neutrosophic logic, neutrosophic probability, neutrosophic statistics, neutrosophic measure, neutrosophic precalculus, neutrosophic calculus and so on are gaining significant attention in solving many real life problems that involve uncertainty, impreciseness, vagueness, incompleteness, inconsistent, and indeterminacy. In the past years the fields of neutrosophics have been extended and applied in various fields, such as: artificial intelligence, data mining, soft computing, decision making in incomplete / indeterminate / inconsistent information systems, image processing, computational modelling, robotics, medical diagnosis, biomedical engineering, investment problems, economic forecasting, social science, humanistic and practical achievements

    Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era

    Get PDF
    [Abstract] Industry 4.0 and Industrial Internet of Things (IIoT) are paradigms that are driving current industrial revolution by connecting to the Internet industrial machinery, management tools or products so as to control and gather data about them. The problem is that many IIoT/Industry 4.0 devices have been connected to the Internet without considering the implementation of proper security measures, thus existing many examples of misconfigured or weakly protected devices. Securing such systems requires very specific skills, which, unfortunately, are not taught extensively in engineering schools. This article details how Industry 4.0 and IIoT cybersecurity can be learned through practical use cases, making use of a methodology that allows for carrying out audits to students that have no previous experience in IIoT or industrial cybersecurity. The described teaching approach is blended and has been imparted at the University of A Coruña (Spain) during the last years, even during the first semester of 2020, when the university was closed due to the COVID-19 pandemic lockdown. Such an approach is supported by online tools like Shodan, which ease the detection of vulnerable IIoT devices. The feedback results provided by the students show that they consider useful the proposed methodology, which allowed them to find that 13% of the IIoT/Industry 4.0 systems they analyzed could be accessed really easily. In addition, the obtained teaching results indicate that the established course learning outcomes are accomplished. Therefore, this article provides useful guidelines for teaching industrial cybersecurity and thus train the next generation of security researchers and developers.This work has been funded by the Xunta de Galicia (ED431G 2019/01), the Agencia Estatal de Investigación of Spain (TEC2016-75067-C4-1-R, RED2018-102668-T, PID2019-104958RB-C42) and ERDF funds of the EU (AEI/FEDER, UE)Xunta de Galicia; ED431G 2019/0

    A UX model for the evaluation of learners' experience on lms platforms over time

    Get PDF
    Although user experience (UX) is dynamic and evolves over time, prior research reported that the learners' experience models developed so far were only for the static evaluation of learners' experiences. So far, no model has been developed for the dynamic summative evaluation of the UX of LMS platforms over time. The objective of this study is to build a UX model that will be used to evaluate learners' experience on LMS over time. The study reviewed relevant literature with the goal of conceptualizing a theoretical model. The Stimuli-Organism-Response (SOR) framework was deployed to model the experience engineering process. To verify the model, 6 UX experts were involved. The model was also validated using a quasi-experimental design involving 900 students. The evaluation was conducted in four time points, once a week for four weeks. From the review, a conceptual UX model was developed for the evaluation of learners' experience with LMS design over time. The outcome of the model verification shows that the experts agreed that the model is adequate for the evaluation of learners' experience on LMS. The results of the model validation indicate that the model was highly statistically significant over time (Week 1: x2(276) = 273 I 9.339, Week2: x2(276) = 23419.626, Week3: x2(276) =18941.900, Week4: x2(276) = 27580.397, p=000<0.01). Each design quality had strong positive effects on the learners' cognitive, sensorimotor and affective states respectively. Furthermore, each of the three organismic states: cognitive, sensorimotor, and affective, had strong positive influence on learners' overall learning experience. These results imply that the experience engineering process was successful. The study fills a significant gap in knowledge by contributing a novel UX model for the evaluation of learners' experience on LMS platforms over time. UX quality assurance practitioners can also utilize the model in the verification and validation of learner experience over tim

    A shared cyber threat intelligence solution for SMEs

    Get PDF
    Small- and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often do not have the means to counter these attacks. Therefore, cybersecurity researchers and practitioners need to aid SMEs in their defence against cyber threats. Research has shown that SMEs require solutions that are automated and adapted to their context. In recent years, we have seen a surge in initiatives to share cyber threat intelligence (CTI) to improve collective cybersecurity resilience. Shared CTI has the potential to answer the SME call for automated and adaptable solutions. Sadly, as we demonstrate in this paper, current shared intelligence approaches scarcely address SME needs. We must investigate how shared CTI can be used to improve SME cybersecurity resilience. In this paper, we tackle this challenge using a systematic review to discover current state-of-the-art approaches to using shared CTI. We find that threat intelligence sharing platforms such as MISP have the potential to address SME needs, provided that the shared intelligence is turned into actionable insights. Based on this observation, we developed a prototype application that processes MISP data automatically, prioritises cybersecurity threats for SMEs, and provides SMEs with actionable recommendations tailored to their context. Subsequent evaluations in operational environments will help to improve our application, such that SMEs are enabled to thwart cyberattacks in future.Public Health and primary carePrevention, Population and Disease management (PrePoD

    IoT Health Devices: Exploring Security Risks in the Connected Landscape

    Get PDF
    The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-layer approach, and suggest means for improved governance and interaction. We also discuss technological innovations expected to set the stage for novel exploits leading into the middle and latter parts of the 21st century

    Blockchain applications in agribusiness: a systematic review

    Get PDF
    Blockchain is a technology that can be applied in different sectors to solve various problems. As a complex system, agribusiness presents many possibilities to take advantage of blockchain technology. The main goal of this paper is to identify the purposes for which blockchain has been applied in the agribusiness sector, for which a PRISMA-based systematic review was carried out. The scientific literature corpus was accessed and selected from Elsevier’s Scopus and ISI of Knowledge’s Web of Science (WoS) platforms, using the PRISMA protocol procedures. Seventy-one articles were selected for analysis. Blockchain application in agribusiness is a novel topic, with the first publication dating from 2016. The technological development prevails more than blockchain applications since it has been addressed mainly in the Computer Sciences and Engineering. Blockchain applications for agribusiness management of financial, energy, logistical, environmental, agricultural, livestock, and industrial purposes have been reported in the literature. The findings suggest that blockchain brings many benefits when used in agribusiness supply chains. We concluded that the research on blockchain applications in agribusiness is only at an early stage, as many prototypes are being developed and tested in the laboratory. In the near future, blockchain will be increasingly applied across all economic sectors, including agribusiness, promoting greater reliability and agility in information with a reduced cost. Several gaps for future studies were observed, with significant value for science, industry, and society
    • …
    corecore