24,487 research outputs found

    The Internet of Things Connectivity Binge: What are the Implications?

    Get PDF
    Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services and opportunities

    Cyberbullying - when does a school authority\u27s liability in tort end?

    Get PDF
    Cyberbullying in schools is increasing on an alarming rate. The development of the Internet and smartphone technology have increased the potential scope of a school authority’s duty of care for its students. A question frequently asked by educators is “Where does a school authority’s duty of care end in the interconnected, 24/7 world of the Internet?” This paper argues that a duty of care will be owed where the school is in a school/student relationship with its students. That relationship can exist outside the school gates and outside of school hours. There are no decisions of senior appellate courts that deal with a school authority’s liability for cyberbullying. The authors, therefore, analyse the nature of the relationship to identify the key features that must be present to establish the existence of a duty of care. Three features are identified as critical to the existence of the duty of care outside of the normal school hours. They are the extent to which the school authority controls or ought to control a given situation, the extent to which it has encouraged students to participate in a particular activity and the extent to which a school authority is aware or ought to be aware of risks associated with the relevant activity of its students

    Security guidelines for field research in complex, remote and hazardous places

    Get PDF
    These guidelines assist researchers in conducting their field-based research or fieldwork in hazardous, remote or complex environments as safely and securely as possible. Fieldwork comes with risks, ranging from the mundane risks of car accidents to more exceptional risks of encountering violence. These risks may affect the security of the researcher and the research outcomes, as well as the security of the respondents, local assistants and interpreters, the home and host organizations, and research sponsors. Taking into account the risk environment should be

    Security guidelines for field research in complex, remote and hazardous places

    Get PDF
    These guidelines assist researchers in conducting their field-based research or fieldwork in hazardous, remote or complex environments as safely and securely as possible. Fieldwork comes with risks, ranging from the mundane risks of car accidents to more exceptional risks of encountering violence. These risks may affect the security of the researcher and the research outcomes, as well as the security of the respondents, local assistants and interpreters, the home and host organizations, and research sponsors. Taking into account the risk environment should be an integral part of the methodological and ethical choices researchers make. The first section of the publication deals with the particular security considerations posed by field-based research and suggests a set of ethical guidelines for field-based research. Section two is about field work and details how to conduct context analysis and risk assessment as well as how to plan and stay healthy during the course of field research. The final section is largely comprised of checklists and key considerations to assist researchers in managing their own personal security, both in terms of preventive and reactive measures

    BYOD NETWORK: Enhancing Security through Trust–Aided Access Control Mechanisms

    Get PDF
    The growth of mobile devices both in variety and in computational abilities have given birth to a concept in the corporate world known as Bring Your Own Device (BYOD). Under this concept, Employees are allowed to bring personally owned mobile devices for official work. Though relatively new, it has gained up to 53% patronage among organisations, and it is expected to hit 88% in the near future. Its popularity is driven by significant advantages ranging from reduced cost, employee satisfaction to improved productivity. However, the concept also introduces new security challenges; for instance, the organisation looses the ownership of devices used for official work, to the employees. Implying that the employees own and manage the devices they use to work, including seeing to the security needs of such devices. With this development, protecting the corporate network becomes pertinent and even more challenging with an audacious need for outwittingconventional access control mechanisms, giving the highly dynamic nature of mobile devices. Considering the fact that BYOD is also a type of pervasive/dynamic environment, this work studies similar dynamic environments, relating to how their security challenges are addressed, and from such bases a Trust-Aided Dynamic Access Control Approach is proposed for enhancing the security of BYOD devices. Through computational analysis, this scheme has been seen to be security-compliant and could significantly improving the overall security of BYOD networks

    “It's the one thing that makes my life tick”:security perspectives of the smartphone era

    Get PDF
    As smartphones overtake personal computers as the device of choice for internet access and everyday digital tasks, cybersecurity becomes a pressing issue for the platform. Research has found that smartphone users appear to act less securely than they would on a PC, but the reasons for this are unclear. The technology, the threats, and the role of smartphones have all developed in recent years, and this paper examines what smartphone security looks like to users in the 2020s. We interviewed 27 smartphone users about their security attitudes and behaviours. We find that users place great emphasis on, and take responsibility for, the physical security of their device, but minimise their responsibility for dealing with digital threats. We observe key contextual factors that influence how users protect their smartphones. The increasing monetary cost of smartphones and users’ functional reliance on them, causes participants to be highly concerned with protecting the physical safety and integrity of their devices. However, users appear to have a high level of trust in apps, based on the vetting processes of official app stores, yet they are still vulnerable to abuse from malicious/unnecessary permissions, and exhibit poor security habits when accessing illegitimate, pirated media outside of their smartphone's app store

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Pakistan’s Nuclear Weapons Program and Implications for US National Security.

    Get PDF
    This article analyzes Pakistan’s nuclear weapons program and the characteristics of the environment in which the program is nested. These characteristics include Pakistan’s history of internal and external instability; nuclear saber rattling during crises; support for Islamic terrorism in order to advance state goals; indigenous production of many elements of its nuclear forces; possession of delivery and command and control systems with destabilizing characteristics; and finally, nuclear doctrine that appears to advocate first use of nuclear weapons. The article argues that the characteristics of Pakistan’s nuclear weapons program generate threats to US national security interests. The article examines six interrelated and synergistic challenges for US national security: first, Pakistan is engaged in an arms race in Southwest Asia that has negative implications for Pakistan’s stability; second, the threat of nuclear proliferation from Pakistan continues; third, Pakistan’s arsenal characteristics make accidental and/or unauthorized nuclear war more likely; fourth, there is an ongoing possibility of war with India; fifth, Islamist influence is spreading through key sectors of Pakistani society; and finally, there is an increasing danger of state failure in Pakistan
    • 

    corecore