2,812 research outputs found

    Ghost trace on the wire? Using key evidence for informed decisions

    Get PDF
    Modern smartphone messaging apps now use end-to-end encryption to provide authenticity, integrity and confidentiality. Consequently, the preferred strategy for wiretapping such apps is to insert a ghost user by compromising the platform's public key infrastructure. The use of warning messages alone is not a good defence against a ghost user attack since users change smartphones, and therefore keys, regularly, leading to a multitude of warning messages which are overwhelmingly false positives. Consequently, these false positives discourage users from viewing warning messages as evidence of a ghost user attack. To address this problem, we propose collecting evidence from a variety of sources, including direct communication between smartphones over local networks and CONIKS, to reduce the number of false positives and increase confidence in key validity. When there is enough confidence to suggest a ghost user attack has taken place, we can then supply the user with evidence to help them make a more informed decision

    Replacing home visits with telephone calls to support parents implementing a sleep management intervention : findings from a pilot study and implications for future research

    Get PDF
    Background - Resource constraints may inhibit the provision of appropriate interventions for children with neurodisabilities presenting with behavioural sleep problems. Telephone calls (TC), as opposed to home visits (HV), may be a more resource efficient means of supporting these families. Objective - To conduct a preliminary investigation exploring the feasibility and acceptability of replacing HV with TC to support parents implementing sleep management strategies and to gather evidence to inform the design and methods of a full trial. Methods - Parents referred to a sleep management intervention routinely delivered by a community paediatric team were alternately allocated to receive implementation support via HV (n = 7) or TC (n = 8). Activity logs recorded the frequency, duration and mode of support. Parents and practitioners were interviewed about their experiences of receiving/delivering the intervention. Results - Intervention drop-out was low, the frequency, number of contacts and intervention duration appeared comparable. Parents allocated TC received less contact time. Parents valued implementation support irrespective of delivery mode and practitioners reported that despite initial reservations, implementation support via TC appeared to work well. Conclusions - TC appears an acceptable and convenient mode of delivering sleep support, valued by both parents and practitioners. We recommend a full-scale trial to investigate effectiveness

    Security metrics for the Android ecosystem

    Get PDF
    © 2015 ACM. The security of Android depends on the timely delivery of updates to fix critical vulnerabilities. In this paper we map the complex network of players in the Android ecosystem who must collaborate to provide updates, and determine that inaction by some manufacturers and network operators means many handsets are vulnerable to critical vulnerabil- ities. We define the FUM security metric to rank the per- formance of device manufacturers and network operators, based on their provision of updates and exposure to critical vulnerabilities. Using a corpus of 20 400 devices we show that there is significant variability in the timely delivery of security updates across different device manufacturers and network operators. This provides a comparison point for purchasers and regulators to determine which device man- ufacturers and network operators provide security updates and which do not. We find that on average 87.7% of An- droid devices are exposed to at least one of 11 known critical vulnerabilities and, across the ecosystem as a whole, assign a FUM security score of 2.87 out of 10. In our data, Nexus devices do considerably better than average with a score of 5.17; and LG is the best manufacturer with a score of 3.97

    Incentivising software updates

    Get PDF
    Internet of Things devices will need software updates to fix the security vulnerabilities that are found after they are sold. Even when using development practices that make producing updates easy, there is still a cost to doing so. Hence, incentives to provide updates are required. This incentive can only be provided by monitoring the relative performance of different companies at supplying software updates to their customers

    CAGE

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/28986/1/0000013.pd

    Effect of galactose metabolising and non-metabolising strains of Streptococcus thermophilus as a starter culture adjunct on the properties of Cheddar cheese made with low or high pH at whey drainage

    Get PDF
    Cheddar cheese was made using control culture (Lactococcus lactis subsp. lactis), or with control culture plus a galactose-metabolising (Gal+) or galactose-non-metabolising (Gal-) Streptococcus thermophilus adjunct; for each culture type, the pH at whey drainage was either low (pH 6.15) or high (pH 6.45). Sc. thermophilus affected the levels of residual lactose and galactose, and the volatile compound profile and sensory properties of the mature cheese (270 d) to an extent dependent on the drain pH and phenotype (Gal+ or Gal-). For all culture systems, reducing drain pH resulted in lower levels of moisture and lactic acid, a higher concentration of free amino acids, and higher firmness. The results indicate that Sc. thermophilus may be used to diversify the sensory properties of Cheddar cheese, for example from a fruity buttery odour and creamy flavour to a more acid taste, rancid odour, and a sweaty cheese flavour at high drain pH

    Service user involvement in giving mental health students feedback on placement: a participatory action research study

    Get PDF
    Background Although the drive to engage service users in service delivery, research and education has mainstream acceptance, it is not easy to achieve meaningful involvement. The contribution that could potentially be made by users whilst accessing services is often overlooked. Objectives and Participants This study involved stakeholders (mentors, service users and a lecturer) working together to design, evaluate and refine a system enabling students to seek feedback from service users. The feedback concerned mental health students’ interpersonal skills and occurred whilst on practice placement. This research aimed to explore the experiences of those concerned when nine students attempted to learn from rather than about service users. Design A 2-year study, encompassing five cycles of participatory action research (PAR). Setting A small island community in the British Isles, adopting UK standards for pre-registration nurse education. Methods Data came from interviews with service users and mentors and a series of reflective group discussions with students who volunteered to try out the feedback mechanism. The deliberations of the PAR stakeholder group informed the research cycles and added to the data, which were subject to thematic analysis. Findings Findings indicated that service users volunteering to give feedback had unanimously positive experiences. Students’ experience lay on a continuum: those with a stronger sense of self were more willing and able to ask for feedback than less confident students. Cultural adjustment to the role change needed was challenging, requiring self-awareness and courage. Over time, all students achieved deep learning and, for some, learning appeared transformative. Conclusion Although contextual, the study concluded that the feedback initiative encouraged the development of more equitable relationships, in which mental health nurses respected the expertise of service users. This potentially benefits student development, recovery-orientated practice, service users and HEIs searching for meaningful ways to involve service users in learning and formative assessment
    • …
    corecore