100,982 research outputs found

    Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge

    Get PDF
    The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture

    Towards a network government? A critical analysis of current assessment methods for e-government

    Get PDF
    Contemporary public administrations have become increasingly more complex, having to cordinate actions with emerging actors in the public and the private spheres. In this scenario the modern ICTs have begun to be seen as an ideal vehicle to resolve some of the problems of public administration. We argue that there is a clear need to explore the extent to which public administrations are undergoing a process of transformation towards a netowork government linked to the systematic incorporation of ICTs in their basic activities. Through critically analysing a selection of e-government evaluation reports, we conclude that research should be carried out if we are to build a solid government assessment framework based on network-like organisation characteristics

    The Influence of Technology on Adolescent Development: An Eco-Cultural Analysis of Cybersocial Activity

    Get PDF
    The introduction of new technologies into society inevitably results in culture-wide changes that affect the way people work, learn, and experience leisure time. For those American adolescents with access to technology, the use of the Internet to develop and maintain relationships is quickly becoming ubiquitous, especially through social network sites; the most popular network site, MySpace, has grown exponentially since its creation in 2003. Adolescents are the primary users of such sites and many of them maintain blogs, or online chronicles that are available for public viewing and comment, along with their profile pages and friend networks. This qualitative study examined what exactly adolescents write about in their blogs, and how that content reflects the developmental tasks associated with this life stage, in particular social maturity and identity development. This ethnographic content analysis draws on Vygotskian learning theory and Bronfenbrenner\u27s bioecological model of development to investigate the degree to which this online activity is shaping and is shaped by culturally constructed developmental processes. Findings showed that adolescents use their blogs as mediums through which they engage in self-expression and self-reflection, supporting both their social and identity development. Recommendations for how counselors and counselor educators can use blogs to enhance traditional interventions are provided, along with guidelines for ethical behavior when viewing adolescents\u27 social network site profiles

    Offenders and E-Learning - a literature review on behalf of Becta

    Get PDF
    This literature review has been prepared by the Hallam Centre of Community Justice at Sheffield Hallam University, on behalf of Becta. The literature review provides a summary of existing research and knowledge relating to e-learning in the offending learning sector with a view to developing a range of e-maturity indicators across the sector. The review also highlights linkages with current Government policy in relation to offender learning and skills

    Becta review 2006. Evidence on the progress of ICT in education.

    Get PDF
    This is the review of the use and impact of ICT in the education system prior to the publication of the Government's e-Strategy for the education system, known as Harnessing Technology. The Review drew upon Becta's surveys of schools and FE colleges as well as other research to assess the impact of technology within the education system and the progress made in achieving Government policies in 2005-06

    Future consumer mobile phone security: a case study using the data centric security model

    Get PDF
    In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security threats, a number of solutions have been suggested,\ud mostly aiming at securing data rather than whole systems or networks.\ud However, these visions (such as proposed by the Jericho Forum [9] and IBM\ud [4]) are mostly concerned with large (inter-) enterprise systems. Until now, it is\ud unclear what data-centric security could mean for other systems and environments.\ud One particular category of systems that has been neglected is that of\ud consumer mobile phones. Currently, data security is usually limited to a PIN\ud number on startup and the option to disable wireless connections. The lack of\ud protection does not seem justified, as these devices have steadily increased in\ud capabilities and capacity; they can connect wirelessly to the Internet and have\ud a high risk of being lost or stolen [8]. This not only puts end users at risk, but\ud also their contacts, as phones can contain privacy sensitive data of many others.\ud For example, if birth dates and addresses are kept with the contact records, in\ud many cases a thief will have enough information to impersonate a contact and\ud steal his identity.\ud Could consumer mobile phones benefit from data-centric security? How\ud useful is data-centric security in this context? These are the core questions we\ud will try to address here

    Bridging the Innovation Divide: An Agenda for Disseminating Technology Innovations within the Nonprofit Sector

    Get PDF
    Examines technology practices -- such as neighborhood information systems, electronic advocacy, Internet-based micro enterprise support, and digital inclusion initiatives -- that strengthen the capacity of nonprofits and community organizations
    • ā€¦
    corecore