10,066 research outputs found

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    A systematic literature review on information systems for disaster management and proposals for its future research agenda

    Get PDF
    Emergency management information systems (EMIS) are fundamental for responding to disasters effectively since they provide and process emergency-related information. A literature stream has emerged that corresponds with the increased relevance of the wide array of different information systems that have been used in response to disasters. In addition, the discussion around systems used primarily within responder organizations broadened to systems such as social media that are open to the general public. However, a systematic review of the EMIS literature stream is still missing. This literature review presents a timeline of EMIS research from 1990 up to 2021. It shows the types of information system scholars focused on, and what disaster response functions they supported. It furthermore identifies challenges in EMIS research and proposes future research directions

    The developing maternal-infant relationship: a qualitative longitudinal study

    Get PDF
    Aim The study aimed to explore maternal perceptions and the use of knowledge relating to their infant’s mental health over time using qualitative longitudinal research. Background There has been a growing interest in infant mental health over recent years. Much of this interest is directed through the lens of infant determinism, through knowledge regarding neurological development resulting in biological determinism. Research and policy in this field are directed toward individual parenting behaviours, usually focused on the mother. Despite this, there is little attention given to maternal perspectives of infant mental health, indicating that a more innovative approach to methodology is required. Methods This study took a qualitative longitudinal approach, and interviews were undertaken with seven mothers from the third trimester of pregnancy and then throughout the first year of the infant’s life. Interviews were conducted at 34 weeks of pregnancy, and then when the infant was 6 and 12 weeks, 6, 9, and 12 months, alongside the collection of researcher field notes—a total of 41 interviews. Data were analysed by creating case profiles, memos, and summaries, and then cross-comparison of the emerging narratives. A psycho-socially informed approach was taken to the analysis of data. Findings Three interrelated themes emerged from the data: evolving maternal identity, growing a person, and creating a safe space. The theme of evolving maternal identity dominated the other themes of growing a person and creating a safe space in a way that met perceived socio-cultural requirements for mothering and childcare practices. Participants’ personal stories give voice to their perceptions of the developing maternal-infant relationship in the context of their socio-cultural setting, relationships with others, and experiences over time. Conclusions This study adds new knowledge by giving mothers a voice to express how the maternal-infant relationship develops over time. The findings demonstrate how the developing maternal-infant relationship grows in response to their mutual needs as the mother works to create and sustain identities for herself and the infant that will fit within their socio-cultural context and individual situations. Additionally, the findings illustrate the importance of temporal considerations, social networks, and intergenerational relationships to this evolving process. Recommendations for practice, policy, and education are made that reflect the unique relationship between mother and infant and the need to conceptualise this using an ecological approach

    From wallet to mobile: exploring how mobile payments create customer value in the service experience

    Get PDF
    This study explores how mobile proximity payments (MPP) (e.g., Apple Pay) create customer value in the service experience compared to traditional payment methods (e.g. cash and card). The main objectives were firstly to understand how customer value manifests as an outcome in the MPP service experience, and secondly to understand how the customer activities in the process of using MPP create customer value. To achieve these objectives a conceptual framework is built upon the Grönroos-Voima Value Model (Grönroos and Voima, 2013), and uses the Theory of Consumption Value (Sheth et al., 1991) to determine the customer value constructs for MPP, which is complimented with Script theory (Abelson, 1981) to determine the value creating activities the consumer does in the process of paying with MPP. The study uses a sequential exploratory mixed methods design, wherein the first qualitative stage uses two methods, self-observations (n=200) and semi-structured interviews (n=18). The subsequent second quantitative stage uses an online survey (n=441) and Structural Equation Modelling analysis to further examine the relationships and effect between the value creating activities and customer value constructs identified in stage one. The academic contributions include the development of a model of mobile payment services value creation in the service experience, introducing the concept of in-use barriers which occur after adoption and constrains the consumers existing use of MPP, and revealing the importance of the mobile in-hand momentary condition as an antecedent state. Additionally, the customer value perspective of this thesis demonstrates an alternative to the dominant Information Technology approaches to researching mobile payments and broadens the view of technology from purely an object a user interacts with to an object that is immersed in consumers’ daily life

    The Adirondack Chronology

    Get PDF
    The Adirondack Chronology is intended to be a useful resource for researchers and others interested in the Adirondacks and Adirondack history.https://digitalworks.union.edu/arlpublications/1000/thumbnail.jp

    Free Movement of Persons and Access to the Labour Market: Lessons from the European Economic Community for the Association of Southeast Asian Nations Economic Community.

    Get PDF
    PhD Theses.While a regional framework on the free movement of persons does not exist within the current AEC, it envisions advancing the region to have a freer flow of skilled labour. It has initiated the regional movement of selected high-skilled labour through the MRAs on the movement of selected professionals and the MNP on the movement of businesspersons. However, the AEC does not have any integration at the regional level on the movement of low-skilled labour. Thailand, which is the most preferred destination for low-skilled AEC labour, has entered into bilateral agreements with other four AEC member states, namely, Myanmar, Laos, Cambodia and Vietnam, in order to supplement the regional rule regarding low-skilled labour. This thesis postulates that the EEC free movement of persons framework, which involved the movement of persons to pursue economic activities, could provide useful lessons for the emerging AEC labour migration framework. The main supporting reason for this hypothesis is that the original EEC framework has eventually developed into the most mature regional system on the free movement of persons within the EU. This thesis perceives the development of a regional framework on labour migration as a historical development, which challenges labour migration theory. The central question of this research is “How can participating states develop and accept a legal framework on labour migration within regional economic associations?” This thesis aims to examine the feasibility of regional integration on labour migration within the AEC, taking into account the experiences of the EEC free movement of persons framework. It aims to explore approaches and main features of the labour migration framework of the EEC and the AEC. The examination mainly relies on obstacles to labour migration including access to the labour market, permission to perform economic activities, permission to reside, family reunification, working conditions, and protection from expulsion. This thesis also aims to prove the hypothesis of the new regionalism theory, which proposed that regionalism emerges from below and within the region. Through the lens of the new regionalism theory, it explores the challenge that reliance only on existing international law may be inadequate for regional cooperation to achieve deep regionalism in respect of labour migration. Nevertheless, an effective regional framework could be initiated by new rules agreed by the participating states or developed from reciprocal bilateral agreements

    Migrant Workers' Access to Justice for Wage Theft: A Global Study of Promising Initiatives

    Get PDF
    Systemic wage theft has long been part of the labour migration landscape in every region of the world. Though every jurisdiction has judicial and/or administrative mechanisms to address wage claims, employers in every country can be confident that very few unpaid migrant workers will ever use those mechanisms to recover their wages. This is because the system is stacked against them at every stage in the wage claim process. This situation is not inevitable. This report provides a blueprint for improving government and court wage recovery processes for migrant workers. It draws on analysis of select, promising initiatives from around the world that demonstrate how many of the barriers that impede migrant workers’ access to justice can be overcome. These innovations shift risks and burdens of wage recovery away from workers and onto government and business, and disrupt employer expectations of impunity. The report proposes specific, evidence-based reform targets that can underpin global, national and local advocacy, and support greater coordination among a community of practice working to achieve labour justice for migrant workers

    Freelance subtitlers in a subtitle production network in the OTT industry in Thailand: a longitudinal study

    Get PDF
    The present study sets out to investigate a subtitle production network in the over-the-top (OTT) industry in Thailand through the perspective of freelance subtitlers. A qualitative longitudinal research design was adopted to gain insights into (1) the way the work practices of freelance subtitlers are influenced by both human and non-human actors in the network, (2) the evolution of the network, and (3) how the freelance subtitlers’ perception of quality is influenced by changes occurring in the network. Eleven subtitlers were interviewed every six months over a period of two years, contributing to over 60 hours of interview data. The data analysis was informed by selected concepts from Actor-Network Theory (ANT) (Law 1992, 2009; Latour 1996, 2005; Mol 2010), and complemented by the three-dimensional quality model proposed by Abdallah (2016, 2017). Reflexive thematic analysis (Braun and Clarke 2019a, 2020b) was used to generate themes and sub-themes which address the research questions and tell compelling stories about the actor-network. It was found that from July 2017 to September 2019, the subtitle production network, which was sustained by complex interrelationships between actors, underwent a number of changes. The changes affected the work practices of freelance subtitlers in a more negative than positive way, demonstrating their precarious position in an industry that has widely adopted the vendor model (Moorkens 2017). Moreover, as perceived by the research participants, under increasingly undesirable working conditions, it became more challenging to maintain a quality process and to produce quality subtitles. Finally, translation technology and tools, including machine translation, were found to be key non-human actors that catalyse the changes in the network under study
    • 

    corecore