91,011 research outputs found
LIBER's involvement in supporting digital preservation in member libraries
Digital curation and preservation represent new challenges for universities. LIBER
has invested considerable effort to engage with the new agendas of digital preservation
and digital curation. Through two successful phases of the LIFE project, LIBER
is breaking new ground in identifying innovative models for costing digital curation
and preservation. Through LIFEâs input into the US-UK Blue Ribbon Task Force on
Sustainable Digital Preservation and Access, LIBER is aligned with major international
work in the economics of digital preservation. In its emerging new strategy and
structures, LIBER will continue to make substantial contributions in this area, mindful
of the needs of European research libraries
Read-React-Respond: An integrative model for understanding sexual revictimization
Females who have been sexually abused in childhood are at significantly higher risk to be revictimized in adolescence and adulthood. Revictimization is associated with a raft of adverse mental and physical health outcomes, and so understanding why victims of childhood sexual abuse are more vulnerable to later sexual assaults has critical implications for their development. It has been hypothesized that sexual abuse in childhood results in reduced ability to recognize and/or respond effectively to sexual threats later in life, but studies examining these ideas have produced inconsistent results. Further, this research has failed to incorporate the powerful physiological reaction elicited by threats of imminent harm to the self, which has the potential to disrupt cognitive processing and coping behavior. In the present paper, we propose a model of revictimization that integrates contemporary theory and research on the biological stress response with cognitive, affective, and behavioral factors believed to be involved in adaptive responding to sexual threats. The model provides a conceptual guide for understanding why females with a history of sexual abuse are more vulnerable to revictimization and offers ideas for improving prevention programs designed to strengthen femalesâ ability to resist sexual coercion
EU cybersecurity capacity building in the Mediterranean and the Middle East
Cyberthreats on the Rise
The 2008 Report on the implementation of the European Security Strategy included âcybersecurityâ for the first time among the priorities of the EUâs external action, stating that: âmodern economies are heavily reliant on critical infrastructure including transport, communication and power supplies, but also the Internet.â If the EU Strategy for a Secure Information Society, adopted two years before, already addressed âcybercrime,â the proliferation of cyber-attacks âagainst private or government IT systemsâ gave the spread of cyber-capabilities a ânew dimension, as a potential new economic, political and military weapon.â
An EU Cybersecurity Strategy was adopted in 20132 followed, in 2016, by a first EU âDirective on Security of Network and Information Systems,â known as the âNIS Directive,â which harmonized the EU Member Statesâ legislations
Defending Against Firmware Cyber Attacks on Safety-Critical Systems
In the past, it was not possible to update the underlying software in many industrial control devices. Engineering
teams had to ârip and replaceâ obsolete components. However, the ability to make firmware updates has provided
significant benefits to the companies who use Programmable Logic Controllers (PLCs), switches, gateways and
bridges as well as an array of smart sensor/actuators. These updates include security patches when vulnerabilities are
identified in existing devices; they can be distributed by physical media but are increasingly downloaded over
Internet connections. These mechanisms pose a growing threat to the cyber security of safety-critical applications,
which are illustrated by recent attacks on safety-related infrastructures across the Ukraine. Subsequent sections
explain how malware can be distributed within firmware updates. Even when attackers cannot reverse engineer the
code necessary to disguise their attack, they can undermine a device by forcing it into a constant upload cycle where
the firmware installation never terminates. In this paper, we present means of mitigating the risks of firmware attack
on safety-critical systems as part of wider initiatives to secure national critical infrastructures. Technical solutions,
including firmware hashing, must be augmented by organizational measures to secure the supply chain within
individual plants, across companies and throughout safety-related industries
The Dictatorâs Dilemma: to Punish or to Assist? Plan Failures and Interventions under Stalin
A dictator issues an order, but the order is not carried out. The dictator does not know whether the order failed because the agent behaved opportunistically, or because his order contained some mistake. Imperfect information creates his dilemma: whether to punish the agent, or assist her or both. This paper models the dictatorâs intervention when an order fails. The analysis links the dictatorâs coercive policy with the softness of budget constraints. The model is verified against the history of Stalinâs dictatorship, using statistical evidence extracted from the formerly secret records of the Communist Party's "control commission".dictatorship, principal-agent problem, soft budget constraints, USSR
The Dictatorâs Dilemma : to Punish or to Assist? Plan Failures and Interventions under Stalin
A dictator issues an order, but the order is not carried out. The dictator does not know whether the order failed because the agent behaved opportunistically, or because his order contained some mistake. Imperfect information creates his dilemma : whether to punish the agent, or assist her or both. This paper models the dictatorâs intervention when an order fails. The analysis links the dictatorâs coercive policy with the softness of budget constraints. The model is verified against the history of Stalinâs dictatorship, using statistical evidence extracted from the formerly secret records of the Communist Party's "control commission".dictatorship ; principal-agent problem ; soft budget constraints ; USSR
Critique of Architectures for Long-Term Digital Preservation
Evolving technology and fading human memory threaten the long-term intelligibility of many kinds of documents. Furthermore, some records are susceptible to improper alterations that make them untrustworthy. Trusted Digital Repositories (TDRs) and Trustworthy Digital Objects (TDOs) seem to be the only broadly applicable digital preservation methodologies proposed. We argue that the TDR approach has shortfalls as a method for long-term digital preservation of sensitive information. Comparison of TDR and TDO methodologies suggests differentiating near-term preservation measures from what is needed for the long term.
TDO methodology addresses these needs, providing for making digital documents durably intelligible. It uses EDP standards for a few file formats and XML structures for text documents. For other information formats, intelligibility is assured by using a virtual computer. To protect sensitive informationâcontent whose inappropriate alteration might mislead its readers, the integrity and authenticity of each TDO is made testable by embedded public-key cryptographic message digests and signatures. Key authenticity is protected recursively in a social hierarchy. The proper focus for long-term preservation technology is signed packages that each combine a record collection with its metadata and that also bind contextâTrustworthy Digital Objects.
- âŚ