83 research outputs found

    Gamification techniques for raising cyber security awareness

    Get PDF
    Due to the prevalence of online services in modern society, such as internet banking and social media, it is important for users to have an understanding of basic security measures in order to keep themselves safe online. However, users often do not know how to make their online interactions secure, which demonstrates an educational need in this area. Gamification has grown in popularity in recent years and has been used to teach people about a range of subjects. This paper presents an exploratory study investigating the use of gamification techniques to educate average users about password security, with the aim of raising overall security awareness. To explore the impact of such techniques, a role-playing quiz application (RPG) was developed for the Android platform to educate users about password security. Results gained from the work highlightedthat users enjoyed learning via the use of the password application, and felt they benefitted from the inclusion of gamification techniques. Future work seeks to expand the prototype into a full solution, covering a range of security awareness issues

    A national certification programme for academic degrees in cyber security

    Get PDF
    With a growing need for cyber security skills, there has been a notable increase in the number of academic degrees targeting this topic area, at both undergraduate and postgraduate levels. However, with a widening and varied choice available to them, prospective students and employers require a means to identify academic degrees that offer appropriate and high-quality education in the subject area. This paper presents a case study of the establishment and operation of a certification programme for academic degrees in cyber security. It describes the means by which appropriate topic themes and subject areas for relevant degrees were identified and defined, leading to a certification programme that addresses degrees in general cyber security as well as notable specialisations including digital forensics and network security. The success of the programme is evidenced by 25 degrees across 19 universities having been certified to date, and a continued response to new calls for certification

    A perspective on using experiment and theory to identify design principles in dye-sensitized solar cells

    Get PDF
    Dye-sensitized solar cells (DSCs) have been the subject of wide-ranging studies for many years because of their potential for large-scale manufacturing using roll-to-roll processing allied to their use of earth abundant raw materials. Two main challenges exist for DSC devices to achieve this goal; uplifting device efficiency from the 12 to 14% currently achieved for laboratory-scale ‘hero’ cells and replacement of the widely-used liquid electrolytes which can limit device lifetimes. To increase device efficiency requires optimized dye injection and regeneration, most likely from multiple dyes while replacement of liquid electrolytes requires solid charge transporters (most likely hole transport materials – HTMs). While theoretical and experimental work have both been widely applied to different aspects of DSC research, these approaches are most effective when working in tandem. In this context, this perspective paper considers the key parameters which influence electron transfer processes in DSC devices using one or more dye molecules and how modelling and experimental approaches can work together to optimize electron injection and dye regeneration. This paper provides a perspective that theory and experiment are best used in tandem to study DSC device

    Conceivable security risks and authentication techniques for smart devices

    Get PDF
    With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques

    Continuous and transparent multimodal authentication: reviewing the state of the art

    Get PDF
    Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. They are also still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. Thus, it is apparent that a more innovative, convenient and secure user authentication solution is vital. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art and identifying the open problems to be tackled and available solutions to be adopted. It also investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. This is followed by a literature review of the existing research on continuous and transparent multimodal authentication. It concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; however it needs to be developed and extensively evaluated, thus operating in a transparent, continuous and user-friendly manner

    SMEs' Confidentiality Concerns for Security Information Sharing

    Full text link
    Small and medium-sized enterprises are considered an essential part of the EU economy, however, highly vulnerable to cyberattacks. SMEs have specific characteristics which separate them from large companies and influence their adoption of good cybersecurity practices. To mitigate the SMEs' cybersecurity adoption issues and raise their awareness of cyber threats, we have designed a self-paced security assessment and capability improvement method, CYSEC. CYSEC is a security awareness and training method that utilises self-reporting questionnaires to collect companies' information about cybersecurity awareness, practices, and vulnerabilities to generate automated recommendations for counselling. However, confidentiality concerns about cybersecurity information have an impact on companies' willingness to share their information. Security information sharing decreases the risk of incidents and increases users' self-efficacy in security awareness programs. This paper presents the results of semi-structured interviews with seven chief information security officers of SMEs to evaluate the impact of online consent communication on motivation for information sharing. The results were analysed in respect of the Self Determination Theory. The findings demonstrate that online consent with multiple options for indicating a suitable level of agreement improved motivation for information sharing. This allows many SMEs to participate in security information sharing activities and supports security experts to have a better overview of common vulnerabilities. The final publication is available at Springer via https://doi.org/10.1007/978-3-030-57404-8_22Comment: 10 pages, 2 figures, 14th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2020

    Stellar mass-halo mass relation for the brightest central galaxies of X-ray clusters since z similar to 0.65

    Get PDF
    We present the brightest cluster galaxies (BCGs) catalog for SPectroscoic IDentification of eROSITA Sources (SPIDERS) DR14 cluster program value-added catalog. We list the 416 BCGs identified as part of this process, along with their stellar mass, star formation rates (SFRs), and morphological properties. We identified the BCGs based on the available spectroscopic data from SPIDERS and photometric data from SDSS. We computed stellar masses and SFRs of the BCGs on the basis of SDSS, WISE, and GALEX photometry using spectral energy distribution fitting. Morphological properties for all BCGs were derived by Sersic profile fitting using the software package SIGMA in different optical bands (g,r,i). We combined this catalog with the BCGs of galaxy groups and clusters extracted from the deeper AEGIS, CDFS, COSMOS, XMM-CFHTLS, and XMM-XXL surveys to study the stellar mass-halo mass relation using the largest sample of X-ray groups and clusters known to date. This result suggests that the mass growth of the central galaxy is controlled by the hierarchical mass growth of the host halo. We find a strong correlation between the stellar mass of BCGs and the mass of their host halos. This relation shows no evolution since z similar to 0.65. We measure a mean scatter of 0.21 and 0.25 for the stellar mass of BCGs in a given halo mass at low (0.1 <z <0.3) and high (0.3 <z <0.65) redshifts, respectively. We further demonstrate that the BCG mass is covariant with the richness of the host halos in the very X-ray luminous systems. We also find evidence that part of the scatter between X-ray luminosity and richness can be reduced by considering stellar mass as an additional variable.Peer reviewe

    SPIDERS : overview of the X-ray galaxy cluster follow-up and the final spectroscopic data release

    Get PDF
    SPIDERS (The SPectroscopic IDentification of eROSITA Sources) is a large spectroscopic programme for X-ray selected galaxy clusters as part of the Sloan Digital Sky Survey-IV (SDSS-IV). We describe the final data set in the context of SDSS Data Release 16 (DR16): the survey overall characteristics, final targeting strategies, achieved completeness, and spectral quality, with special emphasis on its use as a galaxy cluster sample for cosmology applications. SPIDERS now consists of about 27 000 new optical spectra of galaxies selected within 4000 photometric red sequences, each associated with an X-ray source. The excellent spectrograph efficiency and a robust analysis pipeline yield a spectroscopic redshift measurement success rate exceeding 98 per cent, with a median velocity accuracy of 20 kms(-1) (at z = 0.2). Using the catalogue of 2740 X-ray galaxy clusters confirmed with DR16 spectroscopy, we reveal the 3D map of the galaxy cluster distribution in the observable Universe up to z similar to 0.6. We highlight the homogeneity of the member galaxy spectra among distinct regions of the galaxy cluster phase space. Aided by accurate spectroscopic redshifts and by a model of the sample selection effects, we compute the galaxy cluster X-ray luminosity function and we present its lack of evolution up to z = 0.6. Finally we discuss the prospects of forthcoming large multiplexed spectroscopic programmes dedicated to follow up the next generation of all-sky X-ray source catalogues.Peer reviewe

    The UKIRT Hemisphere Survey: Definition and Full J-band Data Release

    Get PDF
    This paper defines the UK Infra-red Telescope (UKIRT) Hemisphere Survey (UHS) and release of the complete J-band dataset. The UHS provides continuous coverage in the northern hemisphere from a declination of 0 deg to 60 deg by combining the existing Large Area Survey, Galactic Plane Survey and Galactic Clusters Survey conducted under the UKIRT Infra-red Deep Sky Survey (UKIDSS) programme with a new additional ~12,700 sq.deg area not covered by UKIDSS. This data release includes J-band imaging and source catalogues over the new area, which, together with UKIDSS, completes the J-band UHS coverage over the full ~17,900 sq.deg area. 98 per cent of the data in this release have passed quality control criteria, the remaining 2 per cent being scheduled for re-observation. The median 5-sigma point source sensitivity of the released data is 19.6 mag (Vega). The median full width at half-maximum of the point spread function across the dataset is 0.75 arcsec. In this paper, we outline the survey management, data acquisition, processing and calibration, quality control and archiving as well as summarising the characteristics of the released data products. The data are initially available to a limited consortium with a world-wide release scheduled for August 2018

    The growth of intracluster light in XCS-HSC galaxy clusters from 0.1 < z < 0.5

    Get PDF
    We estimate the Intracluster Light (ICL) component within a sample of 18clusters detected in XMM Cluster Survey (XCS) data using deep (∌\sim26.8 mag) Hyper Suprime Cam Subaru Strategic Program DR1 (HSC-SSP DR1)ii-band data. We apply a rest-frame ÎŒB=25mathrmmag/arcsec2{\mu}_{B} = 25 \\mathrm{mag/arcsec^{2}} isophotal threshold to our clusters, belowwhich we define light as the ICL within an aperture of RX,500R_{X,500}(X-ray estimate of R500R_{500}) centered on the Brightest Cluster Galaxy(BCG). After applying careful masking and corrections for flux lossesfrom background subtraction, we recover ∌\sim20% of the ICL flux,approximately four times our estimate of the typical background at thesame isophotal level (∌\sim 5%). We find that the ICL makes up about∌\sim 24% of the total cluster stellar mass on average (∌\sim 41%including the flux contained in the BCG within 50 kpc); this value iswell-matched with other observational studies andsemi-analytic/numerical simulations, but is significantly smaller thanresults from recent hydrodynamical simulations (even when measured in anobservationally consistent way). We find no evidence for any linksbetween the amount of ICL flux with cluster mass, but find a growth rateof 2−42-4 for the ICL between 0.1<z<0.50.1 <z <0.5. We conclude that theICL is the dominant evolutionary component of stellar mass in clustersfrom z∌1z \sim 1. Our work highlights the need for a consistent approachwhen measuring ICL alongside the need for deeper imaging, in order tounambiguously measure the ICL across as broad a redshift range aspossible (e.g. 10-year stacked imaging from the Vera C. RubinObservatory)
    • 

    corecore