54 research outputs found
The Feedback Intervention Trial (FIT)--improving hand-hygiene compliance in UK healthcare workers: a stepped wedge cluster randomised controlled trial.
Achieving a sustained improvement in hand-hygiene compliance is the WHO's first global patient safety challenge. There is no RCT evidence showing how to do this. Systematic reviews suggest feedback is most effective and call for long term well designed RCTs, applying behavioural theory to intervention design to optimise effectiveness
Conceptos de la revolución y del nuevo México encontrados en ciertos Mexicanos contemporáneos
The National Vulnerability Database (NVD) is a rich source of information for system administrators, software engineers, IT security consultants, and researchers in software security. Relevant information is provided in machine readable form and hence can be used for automated software security management. However, we discovered that information on affected software versions and fix information is not always available in structured form. We therefore propose to enrich the NVD database with this information and use a rule-based approach to extract this information from the informal vulnerability description. Such information is useful in software development to exchange or avoid vulnerable components as well as in security research for directed cause analysis
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App
An established way to steal the income of app developers, or to
trick users into installing malware, is the creation of repackaged
apps. These are clones of – typically – successful apps. To conceal
their nature, they are often obfuscated by their creators. But, given
that it is a common best practice to obfuscate apps, a trivial identification
of repackaged apps is not possible. The problem is further
intensified by the prevalent usage of libraries. In many apps, the
size of the overall code base is basically determined by the used
libraries. Therefore, two apps, where the obfuscated code bases are
very similar, do not have to be repackages of each other.
To reliably detect repackaged apps, we propose a two step approach
which first focuses on the identification and removal of
the library code in obfuscated apps. This approach – LibDetect –
relies on code representations which abstract over several parts
of the underlying bytecode to be resilient against certain obfuscation
techniques. Using this approach, we are able to identify on
average 70% more used libraries per app than previous approaches.
After the removal of an app’s library code, we then fuzzy hash the
most abstract representation of the remaining app code to ensure
that we can identify repackaged apps even if very advanced obfuscation
techniques are used. This makes it possible to identify
repackaged apps. Using our approach, we found that ≈ 15% of all
apps in Android app stores are repackages
A question of taste: Recognising the role of latent preferences and attitudes in analysing food choices
There has long been substantial interest in understanding consumer food choices, where a key complexity in this context is the potentially large amount of heterogeneity in tastes across individual consumers, as well as the role of underlying attitudes towards food and cooking. The present paper underlines that both tastes and attitudes are unobserved, and makes the case for a latent variable treatment of these components. Using empirical data collected in Northern Ireland as part of a wider study to elicit intra-household trade-offs between home-cooked meal options, we show how these latent sensitivities and attitudes drive both the choice behaviour as well as the answers to supplementary questions. We find significant heterogeneity across respondents in these underlying factors and show how incorporating them in our models leads to important insights into preferences
- …