5,633 research outputs found

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    A Design Science Research Approach to Smart and Collaborative Urban Supply Networks

    Get PDF
    Urban supply networks are facing increasing demands and challenges and thus constitute a relevant field for research and practical development. Supply chain management holds enormous potential and relevance for society and everyday life as the flow of goods and information are important economic functions. Being a heterogeneous field, the literature base of supply chain management research is difficult to manage and navigate. Disruptive digital technologies and the implementation of cross-network information analysis and sharing drive the need for new organisational and technological approaches. Practical issues are manifold and include mega trends such as digital transformation, urbanisation, and environmental awareness. A promising approach to solving these problems is the realisation of smart and collaborative supply networks. The growth of artificial intelligence applications in recent years has led to a wide range of applications in a variety of domains. However, the potential of artificial intelligence utilisation in supply chain management has not yet been fully exploited. Similarly, value creation increasingly takes place in networked value creation cycles that have become continuously more collaborative, complex, and dynamic as interactions in business processes involving information technologies have become more intense. Following a design science research approach this cumulative thesis comprises the development and discussion of four artefacts for the analysis and advancement of smart and collaborative urban supply networks. This thesis aims to highlight the potential of artificial intelligence-based supply networks, to advance data-driven inter-organisational collaboration, and to improve last mile supply network sustainability. Based on thorough machine learning and systematic literature reviews, reference and system dynamics modelling, simulation, and qualitative empirical research, the artefacts provide a valuable contribution to research and practice

    Corporate Social Responsibility: the institutionalization of ESG

    Get PDF
    Understanding the impact of Corporate Social Responsibility (CSR) on firm performance as it relates to industries reliant on technological innovation is a complex and perpetually evolving challenge. To thoroughly investigate this topic, this dissertation will adopt an economics-based structure to address three primary hypotheses. This structure allows for each hypothesis to essentially be a standalone empirical paper, unified by an overall analysis of the nature of impact that ESG has on firm performance. The first hypothesis explores the evolution of CSR to the modern quantified iteration of ESG has led to the institutionalization and standardization of the CSR concept. The second hypothesis fills gaps in existing literature testing the relationship between firm performance and ESG by finding that the relationship is significantly positive in long-term, strategic metrics (ROA and ROIC) and that there is no correlation in short-term metrics (ROE and ROS). Finally, the third hypothesis states that if a firm has a long-term strategic ESG plan, as proxied by the publication of CSR reports, then it is more resilience to damage from controversies. This is supported by the finding that pro-ESG firms consistently fared better than their counterparts in both financial and ESG performance, even in the event of a controversy. However, firms with consistent reporting are also held to a higher standard than their nonreporting peers, suggesting a higher risk and higher reward dynamic. These findings support the theory of good management, in that long-term strategic planning is both immediately economically beneficial and serves as a means of risk management and social impact mitigation. Overall, this contributes to the literature by fillings gaps in the nature of impact that ESG has on firm performance, particularly from a management perspective

    Redefining quality interpersonal communication and communication activities in marriage from divorcees’ perspectives

    Get PDF
    Quality interpersonal communication is essential in the development and maintenance of any relationship, including marriage. As society adapts to new avenues of communication, married couples often underestimate the relevance of interpersonal communication in their relationship due to their lack of understanding of quality interpersonal communication. Therefore, this study investigated the conceptualisation of quality interpersonal communication through the lens of Relational Dialectic Theory and communication activities in marriage from the perspectives of divorcees. This study also explored the antecedents of poor-quality interpersonal communication and its repercussions on married couples. The present study also extended Knapp’s Relational Development Model by incorporating communication technology as a medium of communication. In-depth interviews were conducted on 20 divorcees from different states in Malaysia, chosen through a purposive sampling technique. The gathered data was then evaluated and combined in a thematic data analysis using the NVivo 12 software. This study discovers that the definitions of quality interpersonal communication are divided into seven (7) categories, with communication skills, intimacy, and characters identified as the top three significant traits. Results of this study also indicate that spouses use various medium of communication based on their circumstances but prefer face-to-face communication. However, communication occurrences between spouses are low and mostly negative, with the majority of them mainly involving households and children. The other antecedents of poor-quality interpersonal communication are communication skills, attitudes, third-party involvement, and emotional condition. The current study concludes that emotional condition is one of the protuberant effects of poor-quality interpersonal communication. All in all, the current study provides a new paradigm in Knapp’s Relational Development Model through the incorporation of the effects of poor-quality interpersonal communication into the deterioration stages of the model

    Annual SHOT Report 2018

    Get PDF
    SHOT is affiliated to the Royal College of PathologistsAll NHS organisations must move away from a blame culture towards a just and learning culture. All clinical and laboratory staff should be encouraged to become familiar with human factors and ergonomics concepts. All transfusion decisions must be made after carefully assessing the risks and benefits of transfusion therapy. Collaboration and co-ordination among staff is vital

    The Artist as Surveillant: The Use of Surveillance Technology in Contemporary Art

    Get PDF
    Artists have long been called observers, voyeurs, and watchers, and with a particular interest in human behavior and society, they frequently use unknowing passersby as their subjects for works. Curators and scholars explored how artists put citizens under surveillance with photography and videography, which dates back to the early 1900s, years before governments deployed surveillance systems. Since the 1980s, artists have explicitly explored surveillance technology and theory to alert viewers to the rise of surveillance. Today, this genre is called artveillance, a term coined by Andrea Mubi Brighenti in 2010 to categorize art that explicitly deals with surveillance. This genre developed parallel to the rise of mass surveillance which created the current-day surveillance state. Since artveillance dominates the contemporary art scene, I was interested in the history of surveillance technology and themes in art. Although that history is brief, there is a wealth of artworks and studies on the topic. This thesis explores artists who use surveillance technology, specifically close-circuit video, in their practice and how this work has changed over time compared to the rise of government surveillance systems. To properly examine the artwork, each artwork’s technological history and broader cultural context is considered, with careful attention to the artists’ intentions. The thesis starts in the 1970s with Bruce Nauman and Peter Campus’s closed-circuit video installations. The artists did not aim to create a surveillance area but wanted to explore the viewer’s identity with their moving image. In Chapter 2, Julia Scher and Lynn Hershman Leeson’s work from the 1980s and early 1990s is discussed. Created when state surveillance was on the rise, the artists’ work used surveillance technology to critique the systems. The third chapter explores surveillance in a post-9/11 state through Jill Magid and Laura Poitras’s work. The artists exploited and exposed government systems to show how the public’s privacy is invaded. Finally, the paper concludes with an investigation into the public’s relationship with video surveillance, which resembles an apathetic acceptance

    Building body identities - exploring the world of female bodybuilders

    Get PDF
    This thesis explores how female bodybuilders seek to develop and maintain a viable sense of self despite being stigmatized by the gendered foundations of what Erving Goffman (1983) refers to as the 'interaction order'; the unavoidable presentational context in which identities are forged during the course of social life. Placed in the context of an overview of the historical treatment of women's bodies, and a concern with the development of bodybuilding as a specific form of body modification, the research draws upon a unique two year ethnographic study based in the South of England, complemented by interviews with twenty-six female bodybuilders, all of whom live in the U.K. By mapping these extraordinary women's lives, the research illuminates the pivotal spaces and essential lived experiences that make up the female bodybuilder. Whilst the women appear to be embarking on an 'empowering' radical body project for themselves, the consequences of their activity remains culturally ambivalent. This research exposes the 'Janus-faced' nature of female bodybuilding, exploring the ways in which the women negotiate, accommodate and resist pressures to engage in more orthodox and feminine activities and appearances

    Image classification over unknown and anomalous domains

    Get PDF
    A longstanding goal in computer vision research is to develop methods that are simultaneously applicable to a broad range of prediction problems. In contrast to this, models often perform best when they are specialized to some task or data type. This thesis investigates the challenges of learning models that generalize well over multiple unknown or anomalous modes and domains in data, and presents new solutions for learning robustly in this setting. Initial investigations focus on normalization for distributions that contain multiple sources (e.g. images in different styles like cartoons or photos). Experiments demonstrate the extent to which existing modules, batch normalization in particular, struggle with such heterogeneous data, and a new solution is proposed that can better handle data from multiple visual modes, using differing sample statistics for each. While ideas to counter the overspecialization of models have been formulated in sub-disciplines of transfer learning, e.g. multi-domain and multi-task learning, these usually rely on the existence of meta information, such as task or domain labels. Relaxing this assumption gives rise to a new transfer learning setting, called latent domain learning in this thesis, in which training and inference are carried out over data from multiple visual domains, without domain-level annotations. Customized solutions are required for this, as the performance of standard models degrades: a new data augmentation technique that interpolates between latent domains in an unsupervised way is presented, alongside a dedicated module that sparsely accounts for hidden domains in data, without requiring domain labels to do so. In addition, the thesis studies the problem of classifying previously unseen or anomalous modes in data, a fundamental problem in one-class learning, and anomaly detection in particular. While recent ideas have been focused on developing self-supervised solutions for the one-class setting, in this thesis new methods based on transfer learning are formulated. Extensive experimental evidence demonstrates that a transfer-based perspective benefits new problems that have recently been proposed in anomaly detection literature, in particular challenging semantic detection tasks
    • …
    corecore