20 research outputs found

    Machine Perception of Political Manifestos in Predicting Performance of Public Office Holders

    Get PDF
    Electorates expect politicians seeking public office to make known in advance, their intended programs in form of proposal. This is usually presented in speech in form of manifesto. Times within number, manifestos have always precede voting proper whereby the electorates evaluate politicians based on their manifestos. While intention is socially difficult to measure, this study adopts artificial neural network machine learning approach to map-measure the manifestos of politicians and their eventual performance in office. Due to changes in political names and structure, the study could only utilized the manifesto data of the two most popular political parties in Nigeria, from 2007 to 2019. The result of the empirical analysis shows that the model evaluation accuracy stood at 67%. With more adequate data, this result can be improved upon by subsequent research work

    Performance of broiler chickens served heat-treated fluted pumpkin (Telfaria occidentalis) leaves extract supplement

    Get PDF
    Performance of broiler chickens served heat-treated fluted pumpkin (Telfaria occidentalis) leaves extract (FPLE) was investigated. The experiment was carried out during the early rainy season of 2005.One hundred and twenty five day-old chicks of Anak 2000 were weighed and randomly distributed to five dietary treatments A, B, C, D and E which contained no FPLE (control), fluted pumpkin leaves (FPL)no heat treatment, FPL immersed in hot water (100°C) for 1, 3 and 5 min, respectively. Each treatment was replicated 3 times in a completely randomized design. The broiler starters were fed the samestarter diet, while broiler finishers were equally fed the same finisher diet. Water and feeds were served ad-libitum. The FPLE is a valuable protein and mineral supplement for broiler chickens. One to fiveminutes heat treatment of FPLE reduced the concentrations of phytate and tannin by 13.51 - 24.32 and 5.26 - 7.89%, respectively, but had no effect on the reduction of saponin. The results revealed that FPLEserved to the birds had significant (

    Cyber Supply Chain Risks in Cloud Computing - Bridging the Risk Assessment Gap

    Get PDF
    Cloud computing represents a significant paradigm shift in the delivery of information technology (IT) services. The rapid growth of the cloud and the increasing security concerns associated with the delivery of cloud services has led many researchers to study cloud risks and risk assessments. Some of these studies highlight the inability of current risk assessments to cope with the dynamic nature of the cloud, a gap we believe is as a result of the lack of consideration for the inherent risk of the supply chain. This paper, therefore, describes the cloud supply chain and investigates the effect of supply chain transparency in conducting a comprehensive risk assessment. We conducted an industry survey to gauge stakeholder awareness of supply chain risks, seeking to find out the risk assessment methods commonly used, factors that hindered a comprehensive evaluation and how the current state-of-the-art can be improved. The analysis of the survey dataset showed the lack of flexibility of the popular qualitative assessment methods in coping with the risks associated with the dynamic supply chain of cloud services, typically made up of an average of eight suppliers. To address these gaps, we propose a Cloud Supply Chain Cyber Risk Assessment (CSCCRA) model, a quantitative risk assessment model which is supported by decision support analysis and supply chain mapping in the identification, analysis and evaluation of cloud risks

    An Assessment of Good Governance and Development in Nigeria: A Study of Bayelsa State 2012-2019

    Get PDF
    Good governance and development are dimensions of democracy for fostering equity and inclusiveness, accountability, rule of law, transparency, and the attainment of national development among others. The major purpose of the research is to examine good governance and development were institutionalized and achieved by the Bayelsa State government under Henry Seriake Dickson from 2012-2019. The study adopted structural-functional theory, descriptive research design, secondary sources of data collection and content analysis. The study among others discovered that from 2012-2019, the fundamental liberal politico-administrative values of good governance and development such as equity and inclusiveness, rule of law, accountability, vis-à-vis socio-economic and political development were not adequately addressed by the Bayelsa State government. Based on this, the study recommended that, Bayelsa State government should pursue an inclusive, people-oriented and participatory democracy to address the challenges inhibiting good governance and open up opportunities for developmen

    Cyber risk assessment in cloud provider environments: Current models and future needs

    Get PDF
    Traditional frameworks for risk assessment do not work well for cloud computing. While recent work has often focussed on the risks faced by firms adopting or selecting cloud services, there has been little research on how cloud providers might assess their own services. In this paper, we use an in-depth review of the extant literature to highlight the weaknesses of traditional risk assessment frameworks for this task. Using examples, we then describe a new risk assessment model (CSCCRA) and compare this against three established approaches. For each approach, we consider its goals, the risk assessment process, decisions, the scope of the assessment and the way in which risk is conceptualised. This evaluation points to the need for dynamic models specifically designed to evaluate cloud risk. Our suggestions for future research are aimed at improving the identification, assessment, and mitigation of inter-dependent cloud risks inherent in a defined supply chain

    Towards optimising the detection of sophisticated attacks in Security Operation Centres (SOCs)

    No full text
    The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has remained a menace to the security community. Existing network security solutions, including those depending on machine learning algorithms, have proven inadequate in detecting sophisticated, multi-stage attacks. These solutions have often centred their detection on the identification of threats in individual network events, which sometimes look benign. Similarly, SOC analysts whose role involves detecting advanced threats on a daily basis are faced with a significant amount of false-positive alerts in their search for malicious threats using existing tools. In the course of our literature review, we identified two primary gaps with malware detection research. Many of the reviewed studies lacked expert input from SOC analysts and utilised features that are closely linked to the structure of the malware targeted as part of the detection model. We argue that this limits the ability to detect novel attacks, which occasionally are new variants of old malware. Our approach to malware detection is based on behavioural analytics of malicious network traffic and to achieve this, we carried out interviews with SOC analysts to identify common malware trends, malware behaviours, and SOC specification for a malware detection tool. Our thematic analysis of the interview dataset provided significant insights into SOC operations and generated three broad themes, namely people, process and technology. The malware patterns identified during the interview were analysed and converted to machine learning features, which in combination with other applicable features identified through reflection on literature reviews provides a rich feature set. A total of 34 features divided into instance-based and flow-based were identified during this study. In this report, we present Detection-Response (DeTReS), a framework for detecting sophisticated attacks in SOC environments. DeTReS is made up of three main components namely, the Logging Module, the ML Clustering Engine, and the Malware Ensemble Engine and its goal is to detect malware based on accurate correlation of network and application events (web proxy, DNS, firewall) while leveraging the intelligence of external reputation systems

    Cyber supply chain risks in cloud computing - the effect of transparency on the risk assessment of SaaS applications

    No full text
    While the cloud model has many economic and functional advantages, the increased external interactions of cloud applications have expanded the complexity of its architectures and reshaped its supply chain. Due to the variety of parties involved in cloud service delivery and the high degree of supplier autonomy, assessing cloud risks has become a challenge. Also, the widespread application of traditional frameworks to cloud risk assessment has several shortcomings, including the subjectivity of risk evaluation and inability to measure cyber risk in complex systems. Recognising that recent work on cloud risk assessment has focussed on cloud consumer risks, we sought to address the cloud service provider (CSP) risk assessment challenge. This research began with an in-depth assessment of the literature in cloud risk assessment and supply chain transparency. We conducted surveys and semi-structured interviews to validate the transparency gap and establish its link with qualitative risk assessment methods. The results of the studies substantiated the need for more rigour in cloud risk assessments and provided evidence on how this can be improved with supply chain transparency. To address this gap, we proposed the Cyber Supply Chain Cloud Risk Assessment (CSCCRA) model; a quantitative and supply chain-inclusive model targeted at Software-as-a-Service (SaaS) CSPs. The model is made up of three main components, two of which are novel inclusions to cloud risk assessment, i.e. supply chain mapping and supplier security assessment. The CSCCRA model reflects the systems thinking approach, enabling CSPs to visualise information flow through the supply chain, assess supplier security posture, document assumptions regarding the risk factors, and appraise security controls. In evaluating the CSCCRA model, a three-step approach was adopted. First, the developed model was evaluated by the author and members of the academic community to ensure that it met our initial criteria. Second, the model was face-validated by cloud and risk experts within the industry. Third, we conducted three real-world case studies, using the model to assess the risks of SaaS providers. The result of these evaluations confirmed the usefulness and applicability of the model for assessing cloud provider risks. Also, the case study results and subsequent development of the CSCCRA web application showed that a structured and systematic application of the proposed model within a SaaS organisation was capable of yielding objective and defensible results. The model demonstrated its utility by assisting stakeholders to quantify cloud risks, while also promoting cost-effective risk mitigation and optimal risk prioritisation. Overall, these results advance knowledge both for research and in practice, taking us one step further into improving cloud risk assessment.</p

    Can improved transparency reduce supply chain risks in cloud computing?

    No full text
    As organisations move sensitive data to the cloud, their risk profile increases, due to the integrated supply chain utilised in cloud computing. The risk is made visible in situations where a cloud offering is federated, with customer data located in multiple datacenters, under the control of multiple providers and sub-providers in different jurisdictions. This problem is further exacerbated by the disposition of cloud providers to keep details of suppliers, data location, architecture and security of infrastructure confidential from the cloud customers. As such, the shallowness of transparency amongst cloud providers makes it difficult for customers to assess the risk of cloud adoption. In this study, we report on our research into finding out how much customers know about their supply chain. We evaluate the transparency of cloud providers based on their published information and determine the resultant risk of limited visibility of the supply chain. In the course of the research, we identified eight transparency features, which, at a minimum, cloud providers should make available to their current or prospective customers, which we argue had no adverse impact on the competitiveness or profitability of the provider. The study concludes that ultimately, cloud supply chain transparency remains a customer-driven process

    Towards optimising the detection of sophisticated attacks in Security Operation Centres (SOCs)

    Get PDF
    The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has remained a menace to the security community. Existing network security solutions, including those depending on machine learning algorithms, have proven inadequate in detecting sophisticated, multi-stage attacks. These solutions have often centred their detection on the identification of threats in individual network events, which sometimes look benign. Similarly, SOC analysts whose role involves detecting advanced threats on a daily basis are faced with a significant amount of false-positive alerts in their search for malicious threats using existing tools. In the course of our literature review, we identified two primary gaps with malware detection research. Many of the reviewed studies lacked expert input from SOC analysts and utilised features that are closely linked to the structure of the malware targeted as part of the detection model. We argue that this limits the ability to detect novel attacks, which occasionally are new variants of old malware. Our approach to malware detection is based on behavioural analytics of malicious network traffic and to achieve this, we carried out interviews with SOC analysts to identify common malware trends, malware behaviours, and SOC specification for a malware detection tool. Our thematic analysis of the interview dataset provided significant insights into SOC operations and generated three broad themes, namely people, process and technology. The malware patterns identified during the interview were analysed and converted to machine learning features, which in combination with other applicable features identified through reflection on literature reviews provides a rich feature set. A total of 34 features divided into instance-based and flow-based were identified during this study. In this report, we present Detection-Response (DeTReS), a framework for detecting sophisticated attacks in SOC environments. DeTReS is made up of three main components namely, the Logging Module, the ML Clustering Engine, and the Malware Ensemble Engine and its goal is to detect malware based on accurate correlation of network and application events (web proxy, DNS, firewall) while leveraging the intelligence of external reputation systems

    Current state of cloud computing risk assessment in Malaysian private sector

    Get PDF
    The potential benefits of cloud computing, such as flexibility and cost-effective, have attracted many companies to use it. Nevertheless, security issues are still prominent in cloud computing. Measuring the security of cloud computing can be effectively implemented by performing cloud computing risk assessments. Since the traditional risk assessment method is no longer applicable to cloud computing, the effective method in assessing cloud computing becomes the debated issues among scholars. This study reveals the current state of cloud computing risk assessment conducted in the private sector in Malaysia. We performed a semi-structured interview session with five private companies and highlighted the issues debated by the scholar
    corecore