1,642 research outputs found
The effects of security protocols on cybercrime at Ahmadu Bello University, Zaria, Nigeria.
Masters Degree. University of KwaZulu-Natal, Durban.The use of Information Communication Technology (ICT) within the educational
sector is increasing rapidly. University systems are becoming increasingly
dependent on computerized information systems (CIS) in order to carry out their
daily routine. Moreover, CIS no longer process staff records and financial data
only, as they once did. Nowadays, universities use CIS to assist in automating
the overall system. This automation includes the use of multiple databases, data
detail periodicity (i.e. gender, race/ethnicity, enrollment, degrees granted, and
program major), record identification (e.g. social security number ‘SSN’), linking
to other databases (i.e. linking unit record data with external databases such as
university and employment data).
The increasing demand and exposure to Internet resources and infrastructure by
individuals and universities have made IT infrastructure easy targets for
cybercriminals who employ sophisticated attacks such as Advanced Persistent
Threats, Distributed Denial of Service attacks and Botnets in order to steal
confidential data, identities of individuals and money. Hence, in order to stay in
business, universities realise that it is imperative to secure vital Information
Systems from easily being exploited by emerging and existing forms of
cybercrimes. This study was conducted to determine and evaluate the various
forms of cybercrimes and their consequences on the university network at
Ahmadu Bello University, Zaria. The study was also aimed at proposing means
of mitigating cybercrimes and their effects on the university network. Hence, an
exploratory research design supported by qualitative research approach was
used in this study. Staff of the Institute of Computing, Information and
Communication technology (ICICT) were interviewed. The findings of the study
present different security measures, and security tools that can be used to
effectively mitigate cybercrimes. It was found that social engineering, denial of
service attacks, website defacement were among the types of cybercrimes
occurring on the university network. It is therefore recommended that behavioural
approach in a form of motivation of staff behaviour, salary increases, and cash
incentive to reduce cybercrime perpetrated by these staff
Psychological interventions countering misinformation in social media : a scoping review : research protocol
Introduction: Misinformation is a complex concept and its meaning can encompass several kinds of different phenomena. Liang Wu et el. consider a wide variety of online behavior as misinformation:1 unintentionally spreading false information, intentionally spreading false information, disseminating urban legends, sharing fake news, unverified information, and rumors, as well as crowdturfing, spamming, trolling, and propagating hate speech, or being involved in cyberbullying. The aim of this review is to address the following question: “What psychological interventions countering misinformation can be deployed on popular social media platforms (e.g. Twitter, Facebook)?". In order to address this question, we have designed a systematic scoping review procedure in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. 2,3 Effective measures of countering misinformation on social media are instrumental for facilitating and fostering reliable public conversation about political and social problems. Moreover, countering misinformation on social media platforms can be also considered a public health intervention, especially in the time of health emergencies, such as the COVID-19 pandemic. Methods and analysis: A scoping review is a modern, rigorous approach to synthesis science, developed among others by the Joanna Briggs Institute team. For data extractions, we plan to use the following databases: Embase, Scopus, and PubMed. For paper selection, eligibility criteria were defined
An introduction to crowdsourcing for language and multimedia technology research
Language and multimedia technology research often relies on
large manually constructed datasets for training or evaluation of algorithms and systems. Constructing these datasets is often expensive with significant challenges in terms of recruitment of personnel to carry out the work. Crowdsourcing methods using scalable pools of workers available on-demand offers a flexible means of rapid low-cost construction of many of these datasets to support existing research requirements and potentially promote new research initiatives that would otherwise not be possible
HybridChain: Fast, Accurate, and Secure Transaction Processing with Distributed Learning
In order to fully unlock the transformative power of distributed ledgers and
blockchains, it is crucial to develop innovative consensus algorithms that can
overcome the obstacles of security, scalability, and interoperability, which
currently hinder their widespread adoption. This paper introduces HybridChain
that combines the advantages of sharded blockchain and DAG distributed ledger,
and a consensus algorithm that leverages decentralized learning. Our approach
involves validators exchanging perceptions as votes to assess potential
conflicts between transactions and the witness set, representing input
transactions in the UTXO model. These perceptions collectively contribute to an
intermediate belief regarding the validity of transactions. By integrating
their beliefs with those of other validators, localized decisions are made to
determine validity. Ultimately, a final consensus is achieved through a
majority vote, ensuring precise and efficient validation of transactions. Our
proposed approach is compared to the existing DAG-based scheme IOTA and the
sharded blockchain Omniledger through extensive simulations. The results show
that IOTA has high throughput and low latency but sacrifices accuracy and is
vulnerable to orphanage attacks especially with low transaction rates.
Omniledger achieves stable accuracy by increasing shards but has increased
latency. In contrast, the proposed HybridChain exhibits fast, accurate, and
secure transaction processing, and excellent scalability
- …