5,070 research outputs found

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Proceedings of the International Workshop on EuroPLOT Persuasive Technology for Learning, Education and Teaching (IWEPLET 2013)

    Get PDF
    "This book contains the proceedings of the International Workshop on EuroPLOT Persuasive Technology for Learning, Education and Teaching (IWEPLET) 2013 which was held on 16.-17.September 2013 in Paphos (Cyprus) in conjunction with the EC-TEL conference. The workshop and hence the proceedings are divided in two parts: on Day 1 the EuroPLOT project and its results are introduced, with papers about the specific case studies and their evaluation. On Day 2, peer-reviewed papers are presented which address specific topics and issues going beyond the EuroPLOT scope. This workshop is one of the deliverables (D 2.6) of the EuroPLOT project, which has been funded from November 2010 – October 2013 by the Education, Audiovisual and Culture Executive Agency (EACEA) of the European Commission through the Lifelong Learning Programme (LLL) by grant #511633. The purpose of this project was to develop and evaluate Persuasive Learning Objects and Technologies (PLOTS), based on ideas of BJ Fogg. The purpose of this workshop is to summarize the findings obtained during this project and disseminate them to an interested audience. Furthermore, it shall foster discussions about the future of persuasive technology and design in the context of learning, education and teaching. The international community working in this area of research is relatively small. Nevertheless, we have received a number of high-quality submissions which went through a peer-review process before being selected for presentation and publication. We hope that the information found in this book is useful to the reader and that more interest in this novel approach of persuasive design for teaching/education/learning is stimulated. We are very grateful to the organisers of EC-TEL 2013 for allowing to host IWEPLET 2013 within their organisational facilities which helped us a lot in preparing this event. I am also very grateful to everyone in the EuroPLOT team for collaborating so effectively in these three years towards creating excellent outputs, and for being such a nice group with a very positive spirit also beyond work. And finally I would like to thank the EACEA for providing the financial resources for the EuroPLOT project and for being very helpful when needed. This funding made it possible to organise the IWEPLET workshop without charging a fee from the participants.

    Introducing Psychological Concepts and Methods to Cybersecurity Students

    Get PDF
    This chapter will begin with a brief review of the literature that highlights what psychology research and practice can offer to cybersecurity education. The authors draw on their wide-ranging inter-disciplinary teaching experience and in this chapter they discuss their observations gained from teaching psychological principles and methods to undergraduate and postgraduate cybersecurity students. The authors pay special attention to the consideration of the characteristics of cybersecurity students, so that psychology is taught in a way that is accessible and engaging. Finally, the authors offer some practical suggestions for academics to help them incorporate psychology into the cybersecurity curriculum

    Recommendations for improvement to the South African information technology curriculum: a case study of new higher certificate graduates' first year of employment

    Get PDF
    Employment issues in South Africa (SA) are a significant problem. There are ongoing discussions revolving around the employability challenges facing South African graduates, particularly in the Information Technology (IT) sector. The preparedness of these IT graduates has been questioned with many looking towards skill sets and employability status while others have scrutinised the validity of the IT curriculum meeting industry needs. The research focuses on a case study of graduates from an accredited, private higher education institution in SA. The study followed a qualitative approach using questionnaires and interviews to understand the experiences of employers, employed graduates and recruitment personnel upon employment of the graduates. This study investigated, determined and confirmed recommendations to adapt the South African higher education IT curriculum to improve the productivity of IT graduates upon employment.School of ComputingM. Sc. (Computing

    Anonymity, hacking and cloud computing forensic challenges

    Get PDF
    Cloud Computing is rising and becomes more complex with the daily addition of new technologies. Huge amounts of data transits through the Cloud networks. In the case of a cyber-attack, it can be difficult to analyze every single aspect of the Cloud. Legal challenges also exist due to the local positioning of Cloud servers. This research paper aims to alleviate the challenges in Cloud computing forensics and to sensitize businesses and governments to several solutions. The results of this research are relevant to cyber forensic analysts but also to network administrators and can be used during the preliminary stages of a Cloud computing environment creation. A complete test has been created using ethical hacking tools and cyber forensics to understand the steps of an investigation in a single service that could be implemented in a Cloud. The paper goes on to present frameworks that have been developed in order to maintain integrity and repetition. In the end, it is legal aspects and shortcomings in the technical structure implementation that represent the Cloud computing forensics’ main challenges

    Subject benchmark statement. History. Draft for consultation, June 2014

    Get PDF

    Subject benchmark statement. History : December 2014

    Get PDF

    Can artificial intelligence, RegTech and CharityTech provide effective solutions for anti-money laundering and counter-terror financing initiatives in charitable fundraising

    Get PDF
    Purpose: Artificial intelligence has had a major impact on organisations from Banking through to Law Firms. The rate at which technology has developed in terms of tasks that are complex, technical and time consuming has been astounding. The purpose of this article is to explore the solutions that AI, RegTech and CharityTech provide to charities in navigating the vast amount of anti-money laundering and counter-terror finance legislation in the United Kingdom; so that they comply with the requirements and mitigate the potential risk they face but also develop a more coherent and streamlined set of actions. Design/methodology/approach: The subject is approached through the analysis of data, literature and, domestic and international regulation. The first part of the article explores the current obligations and risks charities face, these are then, in the second part, set against the examination of potential technological solutions as at August 2020. Findings: It is suggested that charities underestimate the importance of the nature and size of the threat posed to them, this is significant, as demonstrated, given the growing size and impact of the sector. Technological solutions are suggested to combat the issues charities face. Originality: The work is original because it is the first to create the notion of CharityTech, and to specifically explore what technological advances can assist charities in meeting the regulatory compliance challenge
    • …
    corecore