4 research outputs found

    Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices

    Get PDF
    Today’s organizations use control-centred security management systems as a preventative shield against a broad spectrum of attacks. However, these have proven to be less effective against the customized and innovative strategies and operational techniques used by Advanced Persistent Threats (APTs). In this short paper we argue that to combat APTs, organizations need a strategic-level shift away from a traditional prevention-cantered approach to that of a response-cantered one. Drawing on the information warfare (IW) paradigm in military studies, and using Dynamic Capability Theory (DCT), this research examines the applicability of IW capabilities in the corporate domain. We propose a research framework to argue that conventional prevention-centred response capabilities; such as incident response capabilities and IW-centred security capabilities can be integrated into IW-enabled dynamic response capabilities that improve enterprise security performance

    Insomnia among medical students: a cross-sectional study

    Get PDF
    Background: Insomnia, the most common sleep disorder, is the perception or complaint of inadequate or poor-quality sleep because of one or more of the following conditions: difficulty in falling asleep, frequent waking up during the night with difficulty for returning to sleep, waking up too early in the morning, or unrefreshing sleep. It is the most common sleep related complaint reported in the primary care setting. Medical students are specially at risk of developing insomnia and its consequences. This study evaluates the prevalence and severity of insomnia in medical students in relation to certain socio-demographic factors like age, sex and class of education.Methods: A questionnaire based study was done on 135 medical students of Nishtar Medical University, Multan chosen on basis of random sampling to test the prevalence of insomnia using Athens Insomnia Scale (AIS). Out of these students 75 were males and 60 were females. Students were interviewed to obtain information about age, sex and academic year of education.Results: According to Athens insomniac scale scoring, 55 (40.74%) students were found insomniac while 80 (59.25%) were non-insomniac. Out of 55 insomniac students, 23 (41.81%) were males while 32 (58.18%) were females. Likewise, out of 80 non-insomniac students, 52 (65%) were males while 28 (35%) were females. The prevalence of insomnia in medical students was found to be increased with the increasing age. It was found that the females have more insomnia prevalence as well as more severe signs and symptoms of insomnia. Moreover, final year students tend to show more prevalence and severity of insomnia than their juniors.Conclusions: According to this study, 2 out of every 5 students were insomniac. Demographic comparison showed that the prevalence and severity of insomnia was more in females and final year students. Also, it was increasing side by side with increasing age

    The descriptive study of imposter syndrome in medical students

    Get PDF
    Background: Imposter syndrome is characterized by chronic feelings of self-doubt and fear of being discovered as an intellectual fraud. Despite evidence of abilities, those suffering from imposter syndrome are unable to internalize a sense of accomplishment, competence, or skill. Overall, they believe themselves to be less intelligent and competent than others perceive them to be. IS has several potential implications for medical education. The current study was designed to find out the frequency of imposter syndrome among medical students college so that certain measures must be taken to improve the teaching and learning methodologies as well as the curriculum.Methods: A cross-sectional, psycho-social analysis was conducted from March to July, 2018 at Nishtar Medical College, Multan after taking informed consent from the students. Clance Imposter Phenomenon Sclae (CIPS) was used to assess the prevalence and degree of severity of Imposter syndrome among medical chosen on basis of random sampling. The data collected was entered and analysed on SPSS v.20.Results: Two hundred (200) students were selected for the study and were asked to return the completed 20 items questionnaire. One hundred and eighty-nine (189) students returned the questionnaires, so the response rate was 94.5%. Out of 189 students, 121(64.36%) were males and 68(35.97%) were females. According to Clance imposter phenomenon scoring, of the total 189 students the severity of imposter syndrome is as follows: mild, 5(2.64%), moderate,72(38.09%), severe,103(54.49%) and very severe, 09(4.76%). Moreover, third year students were found to have high prevalence and degree of severity of imposter syndrome.Conclusions: Imposter phenomenon exists in a significant percentage of medical students and appears to peak in the third year of medical school. Both genders are at equal risk of having imposter syndrome. It is associated with various psychological illnesses. Further discussion regarding medical education paradigms in light of high levels of imposter phenomenon is needed

    Energy level spoofing attacks and countermeasures in blockchain-enabled IoT

    Get PDF
    The Internet of Things (IoT) ecosystem is witnessing widespread deployments for emerging applications in diverse domains such as remote sensing, smart homes, and industry 4.0. There is also a growing need to secure such deployments against malicious IoT devices to sustain normal network operations. Since the IoT deployments encompass geographically distributed nodes, blockchain technology, which inherently offers distributed trust in such scenarios, is gaining popularity in providing a secure and trusted IoT deployment. In this paper, we present a use case in which an IoT deployment is retrofitted with a blockchain. The use of blockchain prevents malicious nodes from falsifying information about their energy levels. We first present attack scenarios where IoT nodes can spoof energy while joining or being a part of the network. We then build a defense strategy and evaluate its performance under various attack scenarios. Our results indicate that the IoT deployment is robust under the proposed defense strategy which can detect if a node is spoofing its energy levels over 75% of the time
    corecore