108 research outputs found

    Proteomics investigations of immune activation

    Get PDF

    A personality-based behavioural model: Susceptibility to phishing on social networking sites

    Get PDF
    The worldwide popularity of social networking sites (SNSs) and the technical features they offer users have created many opportunities for malicious individuals to exploit the behavioral tendencies of their users via social engineering tactics. The self-representation and social interactions on SNSs encourage users to reveal their personalities in a way which characterises their behaviour. Frequent engagement on SNSs may also reinforce the performance of certain activities, such as sharing and clicking on links, at a “habitual” level on these sites. Subsequently, this may also influence users to overlook phishing posts and messages on SNSs and thus not apply sufficient cognitive effort in their decision-making. As users do not expect phishing threats on these sites, they may become accustomed to behaving in this manner which may consequently put them at risk of such attacks. Using an online survey, primary data was collected from 215 final-year undergraduate students. Employing structural equation modelling techniques, the associations between the Big Five personality traits, habits and information processing were examined with the aim to identify users susceptible to phishing on SNSs. Moreover, other behavioural factors such as social norms, computer self-efficacy and perceived risk were examined in terms of their influence on phishing susceptibility. The results of the analysis revealed the following key findings: 1) users with the personality traits of extraversion, agreeableness and neuroticism are more likely to perform habitual behaviour, while conscientious users are least likely; 2) users who perform certain behaviours out of habit are directly susceptible to phishing attacks; 3) users who behave out of habit are likely to apply a heuristic mode of processing and are therefore more susceptible to phishing attacks on SNSs than those who apply systematic processing; 4) users with higher computer self-efficacy are less susceptible to phishing; and 5) users who are influenced by social norms are at greater risk of phishing. This study makes a contribution to scholarship and to practice, as it is the first empirical study to investigate, in one comprehensive model, the relationship between personality traits, habit and their effect on information processing which may influence susceptibility to phishing on SNSs. The findings of this study may assist organisations in the customisation of an individual anti-phishing training programme to target specific dispositional factors in vulnerable users. By using a similar instrument to the one used in this study, pre-assessments could determine and classify certain risk profiles that make users vulnerable to phishing attacks.Thesis (PhD) -- Faculty of Commerce, Information Systems, 202

    A framework to mitigate phishing threats

    Get PDF
    We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme

    Dreibund der Baltischen Staaten Lettland, Estland und Litauen

    Get PDF
    http://www.ester.ee/record=b4260227*es

    An investigation of the sources and supply of coarse sediment input to a semi-arid channel reach

    Get PDF
    This study comprises an investigation of the source and supply of coarse sediment input to a semi-arid channel reach. Despite a growing body of lIterature documentIng research of various aspects of sediment response in semi-arId areas, few studies attempt to integrate processes active in specific source areas wIth sediment supply to the channel. Detailed In the present study is an account of the processes active in the study area, identifIcation of source environments, a discussion of some of the factors affecting supply, a comparison of the effectiveness of gravItatIonal and fluvIal supply processes and an estImatIon of the time sequence of sediment supply to and removal from a channel reach. The above aspects of sediment supply are embodied In the aims set for the study. The study is conceptualIsed withIn the framework of a coarse sedIment supply model. The model is formulated from supporting literature and tested in the light of the results obtained through an investigation of the above aspects of sediment supply in the specIfic study area. The model is prImarily a qualitative one and the data collected intended to strengthen the qualitative nature of the model, while at the same time add at least some measure of quantification. Several reasons for studyIng coarse sediment behavIour in semI-arid areas are identIfied and include the need to improve the present lack of understanding of the relatIonship between supply and removal of sediment, the temporal dIstributIon of sediment discharge and the relatIve contrIbutions of coarse sediment to the overall load of rivers. The study area is located within the semi-arid Ecca basin north-east of Grahamstown. A specifIc channel reach is chosen withIn a sub-catchment (catchment B) of the Ecca catchment area as it has a variety of channel bank environments, is accessible through the entire reach, and the proximity of a raingauge and flow measurIng weir provide the necessary hydrometeorological inputs. The methods of observing sediment response from five data collection sites Include the use of slope or bank base sediment traps, erosion pins, tracer particle monitoring. sequential photographic surveys, and channel bed surface profile surveys. Hydrometeorological data is provided by records drawn from the data bank at the Hydrological Research Unit. Rhodes University. All rainfall records as well as channel flow data are available in the form of continuous records. Rainfall amount and intensity for any period could be extracted from these records. Data collection is confined to a period of two years, during which time the study area was visited on an approximate monthly basis. The index of erosivity (EI₃₀) could also be calculated from the hydrometeorological records and has been used as an integrated measure of rainfall intensity over the monthly period between site visits. The results are presented on a sample day for sample day basis. The sediment response data together with hydrological data is represented graphically for each sample day, of which there were nineteen. Discussion and interpretation of the results is left to a separate chapter. The interpretation of the results are based largely upon graphical representation of data time series and of interrelationships between some of the variables measured. The limited number of sample days together with the assumed auto correlation present in much of the data precluded the use of simple statistical testing procedures. The use of more complex procedures is not considered worthwhile and is unlikely to add to the interpretation of the results. Bedrock weathering is found to be a fairly active producer of coarse sediment on exposed shale bedrock outcrops through which sections of the channel are cut. The transport of the weathered detritus to the channel is attributed to a combination of gravitational and fluvial transport processes, with each process dominating at different times, depending on the magnitude of the climatic input. A tentative comparison of the effectiveness of the two processes reveals that both are capable of transporting similar amounts of sediment but on different time scales. The trends of sediment supply from the various bank environments display remarkable similarity , suggesting a measure of consistency of response to climatic input through the entire reach. Source areas of coarse sediment identified were limited to a small percentage of the total valley area and consisted almost entirely of the immediate channel environment. A tributary gully appears to be an important source of coarse sediment during fluvially dominated supply episodes, while the channel banks supply sediment on a quasi-continuous basis. The total yields for each source environment were extrapolated from the sampled amounts, revealing that channel banks are the predominant source environments. An attempt is made to assess the role of various factors which might affect sediment supply. The factors include rainfall amount and intensity, channel flow, geology/lithology, dip of strata, aspect of channel banks and size of weathered material. The findings, though not conclusive, do give some indication of the role of the above factors. It is suggested though that this particular aspect of sediment supply receive further attention in future research. Discussion on the time sequence of supply to and removal from the channel draws attention to a pulse- like movement of sediment 'waves' through the channel, and two scales of removal-accumulation cycles are identified. Finally the validity of the model is assessed and with the exception of a tributary inflow process not envisaged in the original model, is found to be an accurate representation of sediment supply in semi-arid areas, in both its static and dynamic phases. The suggestion is offered that future research on the sediment supply system, in all climatic regimes, can be conceptualised within the context of the basic model proposed in the present study. Specific components of the model should be quantified by numerous individual research efforts, and in this way, serve to build up the model into a widely applicable tool with which to interpret sediment suppl

    Quantitative and Dynamic Catalogs of Proteins Released during Apoptotic and Necroptotic Cell Death

    No full text
    The inflammatory functions of the cytokine tumor necrosis factor (TNF) rely on its ability to induce cytokine production and to induce cell death. Caspase-dependent and caspase-independent pathways-apoptosis and necroptosis, respectively-regulate immunogenicity by the release of distinct sets of cellular proteins. To obtain an unbiased, systems-level understanding of this important process, we here applied mass spectrometry-based proteomics to dissect protein release during apoptosis and necroptosis. We report hundreds of proteins released from human myeloid cells in time course experiments. Both cell death types induce receptor shedding, but only apoptotic cells released nucleosome components. Conversely, necroptotic cells release lysosomal components by activating lysosomal exocytosis at early stages of necroptosis-induced membrane permeabilization and show reduced release of conventionally secreted cytokines

    Proteomics reveals distinct mechanisms regulating the release of cytokines and alarmins during pyroptosis

    Get PDF
    A major pathway for proinflammatory protein release by macrophages is inflammasome-mediated pyroptotic cell death. As conventional secretion, unconventional secretion, and cell death are executed simultaneously, however, the cellular mechanisms regulating this complex paracrine program remain incompletely understood. Here, we devise a quantitative proteomics strategy to define the cellular exit route for each protein by pharmacological and genetic dissection of cellular checkpoints regulating protein release. We report the release of hundreds of proteins during pyroptosis, predominantly due to cell lysis. They comprise constitutively expressed and transcriptionally induced proteins derived from the cytoplasm and specific intracellular organelles. Many low-molecular-weight proteins including the cytokine interleukin-1b, alarmins, and lysosomal-cargo proteins exit cells in the absence of cell lysis. Cytokines and alarmins are released in an endoplasmic reticulum (ER)-Golgi-dependent manner as free proteins rather than by extracellular vesicles. Our work provides an experimental framework for the dissection of cellular exit pathways and a resource for pyroptotic protein release

    Reproductive seasonality and sexual dimorphism in green turtles

    Full text link
    The temporal distribution of nesting and mating in green turtles Chelonia mydas at Ascension Island (7°57¹S, 14°22¹W) in the South Atlantic is described. Mathematical description of the seasonal pattern of nesting showed extreme similarity between seasons, and evidence is presented to support the hypothesis that observed patterns are driven by prevailing environmental temperature. Mating was observed to begin before nesting and follow a pattern consistent with a modelled seasonal influx of suitable females into the annual breeding population. When available data on male size are compared with that of females from the same population (n = 12 populations), a pronounced and consistent sexual dimorphism, with males being smaller than females, is highlighted in all populations. The possible mechanisms behind the evolution of such a pattern are discussed

    Environmental arginine controls multinuclear giant cell metabolism and formation

    No full text
    Multinucleated giant cells (MGCs) are implicated in many diseases including schistosomiasis, sarcoidosis and arthritis. MGC generation is energy intensive to enforce membrane fusion and cytoplasmic expansion. Using receptor activator of nuclear factor kappa-Beta ligand (RANKL) induced osteoclastogenesis to model MGC formation, here we report RANKL cellular programming requires extracellular arginine. Systemic arginine restriction improves outcome in multiple murine arthritis models and its removal induces preosteoclast metabolic quiescence, associated with impaired tricarboxylic acid (TCA) cycle function and metabolite induction. Effects of arginine deprivation on osteoclastogenesis are independent of mTORC1 activity or global transcriptional and translational inhibition. Arginine scarcity also dampens generation of IL-4 induced MGCs. Strikingly, in extracellular arginine absence, both cell types display flexibility as their formation can be restored with select arginine precursors. These data establish how environmental amino acids control the metabolic fate of polykaryons and suggest metabolic ways to manipulate MGC-associated pathologies and bone remodelling. Multinucleated giant cells (MGCs) are important in the pathogenesis of various diseases. Here, the authors demonstrate that extracellular presence of the amino acid arginine is required for MGC formation and metabolism, suggesting a translational impact for strategies utilizing systemic arginine depletion in MGC-mediated diseases
    corecore