7,278 research outputs found

    InGAME international pathway to collaboration: Collaboration in Games UK-China

    Get PDF
    In 2019 the Arts &amp; Humanities Research Council (AHRC) funded a series of projects as part of its UK-China Creative Partnerships Programme. Led by Abertay University in partnership with academic and industry partners across the UK and China, InGAME International was funded through this AHRC programme with the aim of studying the potential for UK-China cooperation and collaboration in the computer games sector. The project is linked to the AHRC Creative Industries Cluster, InGAME: Innovation for Games and Media Enterprise, which is also led by Abertay University in partnership with the University of Dundee and University of St Andrews. The games industry is one of the largest and fastest growing sectors in both the UK and the Chinese creative economies. In 2023, China was the largest gaming market globally with revenue forecast at 82.064billioncomparedwith82.064 billion compared with 7.94 billion in the UK (Statista, 2023). The growth in China’s market has long been the source of appeal for UK game developers and publishers seeking new routes to market. However, the divergence between the UK and China in terms of market profile, consumption patterns, leading companies, technologies, regulation, licensing, management, and business culture has presented ongoing difficulties for any UK based developer interested in engagement in- or with- China. It is from this basis that the current study sought to consolidate industry, legal, and regulatory knowhow with a view to providing a valuable resource to games professionals and researchers who have interests in UK-China collaboration. This Pathway to Collaboration report curates the cumulative knowledge and insight generated during the InGAME International programme, with an intended audience of games industry professionals and researchers interested in UK-China collaboration. At the heart of the research is an unprecedented qualitative study that involved in-depth interviews with 47 leading experts from the UK, China and other territories and with knowledge of games development, business, publishing, marketing, localisation, IP, copyright, regulation, markets, and sales. This report is the first comprehensive qualitative study to investigate the intersection between the UK and China games industries and markets at this scale and depth, providing readers with an invaluable, interactive resource that will support professionals and researchers to initiate new collaborations between the two nations.</p

    A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection

    Get PDF
    The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just at the economic level but also in terms of physical damage and even loss of human life. Complementing traditional security mechanisms, forensics and compliance audit processes play an important role in ensuring Critical Infrastructure trustworthiness. Compliance auditing contributes to checking if security measures are in place and compliant with standards and internal policies. Forensics assist the investigation of past security incidents. Since these two areas significantly overlap, in terms of data sources, tools and techniques, they can be merged into unified Forensics and Compliance Auditing (FCA) frameworks. In this paper, we survey the latest developments, methodologies, challenges, and solutions addressing forensics and compliance auditing in the scope of Critical Infrastructure Protection. This survey focuses on relevant contributions, capable of tackling the requirements imposed by massively distributed and complex Industrial Automation and Control Systems, in terms of handling large volumes of heterogeneous data (that can be noisy, ambiguous, and redundant) for analytic purposes, with adequate performance and reliability. The achieved results produced a taxonomy in the field of FCA whose key categories denote the relevant topics in the literature. Also, the collected knowledge resulted in the establishment of a reference FCA architecture, proposed as a generic template for a converged platform. These results are intended to guide future research on forensics and compliance auditing for Critical Infrastructure Protection.info:eu-repo/semantics/publishedVersio

    Taser and Social, Ethnic and Racial Disparities research programme

    Get PDF
    Report from the 'Taser use and its association with social, ethnic and racial disparities in policing (TASERD)' research project. The research project was initiated by the National Police Chiefs’ Council and commissioned by the College of Policing, after their Officer and Staff Safety Review (OSSR) in 2019 found there was growing evidence to suggest that Tasers were being used disproportionately in society. It was carried out by researchers from Keele University, UCL, The University of Exeter and Staffordshire University.National Police Chiefs’ CouncilLondon’s Mayor's Office for Policing and Crime (MOPAC

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    InGAME international pathway to collaboration: Collaboration in Games UK-China

    Get PDF
    In 2019 the Arts &amp; Humanities Research Council (AHRC) funded a series of projects as part of its UK-China Creative Partnerships Programme. Led by Abertay University in partnership with academic and industry partners across the UK and China, InGAME International was funded through this AHRC programme with the aim of studying the potential for UK-China cooperation and collaboration in the computer games sector. The project is linked to the AHRC Creative Industries Cluster, InGAME: Innovation for Games and Media Enterprise, which is also led by Abertay University in partnership with the University of Dundee and University of St Andrews. The games industry is one of the largest and fastest growing sectors in both the UK and the Chinese creative economies. In 2023, China was the largest gaming market globally with revenue forecast at 82.064billioncomparedwith82.064 billion compared with 7.94 billion in the UK (Statista, 2023). The growth in China’s market has long been the source of appeal for UK game developers and publishers seeking new routes to market. However, the divergence between the UK and China in terms of market profile, consumption patterns, leading companies, technologies, regulation, licensing, management, and business culture has presented ongoing difficulties for any UK based developer interested in engagement in- or with- China. It is from this basis that the current study sought to consolidate industry, legal, and regulatory knowhow with a view to providing a valuable resource to games professionals and researchers who have interests in UK-China collaboration. This Pathway to Collaboration report curates the cumulative knowledge and insight generated during the InGAME International programme, with an intended audience of games industry professionals and researchers interested in UK-China collaboration. At the heart of the research is an unprecedented qualitative study that involved in-depth interviews with 47 leading experts from the UK, China and other territories and with knowledge of games development, business, publishing, marketing, localisation, IP, copyright, regulation, markets, and sales. This report is the first comprehensive qualitative study to investigate the intersection between the UK and China games industries and markets at this scale and depth, providing readers with an invaluable, interactive resource that will support professionals and researchers to initiate new collaborations between the two nations.</p

    An indigenous perspective on institutions for sustainable business in China

    Get PDF

    IT Risk Management: Towards a System for Enhancing Objectivity in Asset Valuation that Engenders a Security Culture

    Get PDF
    In today’s technology-centric business environment, where organizations encounter numerous cyber threats, effective IT risk management is crucial. An objective risk assessment— based on information relating to business requirements, human elements, and the security culture within an organisation — can provide a sound basis for informed decision making, effective risk prioritisation, and the implementation of suitable security measures. This paper focuses on asset valuation, supply chain risk, and enhanced objectivity — via a “segregation of duties” approach — to extend and apply the capabilities of an established security culture framework. The resultant system design aims at mitigating subjectivity in IT risk assessments, thereby diminishing personal biases and presumptions to provide a more transparent and accurate understanding of the real risks involved. Survey responses from 16 practitioners working in the private and public sectors confirmed the validity of the approach but suggest it may be more workable in larger organisations where resources allow dedicated risk professionals to operate. This research contributes to the literature on IT and cyber risk management and provides new perspectives on the need to improve objectivity in asset valuation and risk assessment

    Automation for network security configuration: state of the art and research trends

    Get PDF
    The size and complexity of modern computer networks are progressively increasing, as a consequence of novel architectural paradigms such as the Internet of Things and network virtualization. Consequently, a manual orchestration and configuration of network security functions is no more feasible, in an environment where cyber attacks can dramatically exploit breaches related to any minimum configuration error. A new frontier is then the introduction of automation in network security configuration, i.e., automatically designing the architecture of security services and the configurations of network security functions, such as firewalls, VPN gateways, etc. This opportunity has been enabled by modern computer networks technologies, such as virtualization. In view of these considerations, the motivations for the introduction of automation in network security configuration are first introduced, alongside with the key automation enablers. Then, the current state of the art in this context is surveyed, focusing on both the achieved improvements and the current limitations. Finally, possible future trends in the field are illustrated

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp
    corecore