91,011 research outputs found

    LIBER's involvement in supporting digital preservation in member libraries

    Get PDF
    Digital curation and preservation represent new challenges for universities. LIBER has invested considerable effort to engage with the new agendas of digital preservation and digital curation. Through two successful phases of the LIFE project, LIBER is breaking new ground in identifying innovative models for costing digital curation and preservation. Through LIFE’s input into the US-UK Blue Ribbon Task Force on Sustainable Digital Preservation and Access, LIBER is aligned with major international work in the economics of digital preservation. In its emerging new strategy and structures, LIBER will continue to make substantial contributions in this area, mindful of the needs of European research libraries

    Read-React-Respond: An integrative model for understanding sexual revictimization

    Get PDF
    Females who have been sexually abused in childhood are at significantly higher risk to be revictimized in adolescence and adulthood. Revictimization is associated with a raft of adverse mental and physical health outcomes, and so understanding why victims of childhood sexual abuse are more vulnerable to later sexual assaults has critical implications for their development. It has been hypothesized that sexual abuse in childhood results in reduced ability to recognize and/or respond effectively to sexual threats later in life, but studies examining these ideas have produced inconsistent results. Further, this research has failed to incorporate the powerful physiological reaction elicited by threats of imminent harm to the self, which has the potential to disrupt cognitive processing and coping behavior. In the present paper, we propose a model of revictimization that integrates contemporary theory and research on the biological stress response with cognitive, affective, and behavioral factors believed to be involved in adaptive responding to sexual threats. The model provides a conceptual guide for understanding why females with a history of sexual abuse are more vulnerable to revictimization and offers ideas for improving prevention programs designed to strengthen females’ ability to resist sexual coercion

    EU cybersecurity capacity building in the Mediterranean and the Middle East

    Get PDF
    Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical infrastructure including transport, communication and power supplies, but also the Internet.” If the EU Strategy for a Secure Information Society, adopted two years before, already addressed “cybercrime,” the proliferation of cyber-attacks “against private or government IT systems” gave the spread of cyber-capabilities a “new dimension, as a potential new economic, political and military weapon.” An EU Cybersecurity Strategy was adopted in 20132 followed, in 2016, by a first EU “Directive on Security of Network and Information Systems,” known as the “NIS Directive,” which harmonized the EU Member States’ legislations

    Defending Against Firmware Cyber Attacks on Safety-Critical Systems

    Get PDF
    In the past, it was not possible to update the underlying software in many industrial control devices. Engineering teams had to ‘rip and replace’ obsolete components. However, the ability to make firmware updates has provided significant benefits to the companies who use Programmable Logic Controllers (PLCs), switches, gateways and bridges as well as an array of smart sensor/actuators. These updates include security patches when vulnerabilities are identified in existing devices; they can be distributed by physical media but are increasingly downloaded over Internet connections. These mechanisms pose a growing threat to the cyber security of safety-critical applications, which are illustrated by recent attacks on safety-related infrastructures across the Ukraine. Subsequent sections explain how malware can be distributed within firmware updates. Even when attackers cannot reverse engineer the code necessary to disguise their attack, they can undermine a device by forcing it into a constant upload cycle where the firmware installation never terminates. In this paper, we present means of mitigating the risks of firmware attack on safety-critical systems as part of wider initiatives to secure national critical infrastructures. Technical solutions, including firmware hashing, must be augmented by organizational measures to secure the supply chain within individual plants, across companies and throughout safety-related industries

    The Dictator’s Dilemma: to Punish or to Assist? Plan Failures and Interventions under Stalin

    Get PDF
    A dictator issues an order, but the order is not carried out. The dictator does not know whether the order failed because the agent behaved opportunistically, or because his order contained some mistake. Imperfect information creates his dilemma: whether to punish the agent, or assist her or both. This paper models the dictator’s intervention when an order fails. The analysis links the dictator’s coercive policy with the softness of budget constraints. The model is verified against the history of Stalin’s dictatorship, using statistical evidence extracted from the formerly secret records of the Communist Party's "control commission".dictatorship, principal-agent problem, soft budget constraints, USSR

    The Dictator’s Dilemma : to Punish or to Assist? Plan Failures and Interventions under Stalin

    Get PDF
    A dictator issues an order, but the order is not carried out. The dictator does not know whether the order failed because the agent behaved opportunistically, or because his order contained some mistake. Imperfect information creates his dilemma : whether to punish the agent, or assist her or both. This paper models the dictator’s intervention when an order fails. The analysis links the dictator’s coercive policy with the softness of budget constraints. The model is verified against the history of Stalin’s dictatorship, using statistical evidence extracted from the formerly secret records of the Communist Party's "control commission".dictatorship ; principal-agent problem ; soft budget constraints ; USSR

    Critique of Architectures for Long-Term Digital Preservation

    Get PDF
    Evolving technology and fading human memory threaten the long-term intelligibility of many kinds of documents. Furthermore, some records are susceptible to improper alterations that make them untrustworthy. Trusted Digital Repositories (TDRs) and Trustworthy Digital Objects (TDOs) seem to be the only broadly applicable digital preservation methodologies proposed. We argue that the TDR approach has shortfalls as a method for long-term digital preservation of sensitive information. Comparison of TDR and TDO methodologies suggests differentiating near-term preservation measures from what is needed for the long term. TDO methodology addresses these needs, providing for making digital documents durably intelligible. It uses EDP standards for a few file formats and XML structures for text documents. For other information formats, intelligibility is assured by using a virtual computer. To protect sensitive information—content whose inappropriate alteration might mislead its readers, the integrity and authenticity of each TDO is made testable by embedded public-key cryptographic message digests and signatures. Key authenticity is protected recursively in a social hierarchy. The proper focus for long-term preservation technology is signed packages that each combine a record collection with its metadata and that also bind context—Trustworthy Digital Objects.
    • …
    corecore