811 research outputs found
Occupational Therapy and Accessibility in the Outdoors and Summer Camps
Opportunities for positive youth development (PYD) are promoted through both outdoor and camp experiences. The experiences provided by the outdoors and camps are ideal for developing physically, cognitively, socially, emotionally, and spiritually. These areas of PYD are further generalizable to several aspects of occupational performance and participation, while continuing to have benefits throughout the lifespan. While the outdoors and camps provide these valuable opportunities for development, the environments and contexts of these opportunities are often limiting factors for individuals with disabilities.
Utilizing an occupational therapy approach allows for further understanding of how to promote inclusion and accessibility practices in these settings and further support occupational performance and participation for individuals of all abilities. The application of an occupational therapy perspective combined with research, review, and collaboration within these communities determined appropriate project objectives to address these areas of need. Further development based on project objectives led to the creation of Access Outdoors Occupational Therapy and the associated website www.accessoutdoorsot.com. Access Outdoors Occupational Therapy is a cumulative result of fulfilling project objectives and aims to promote and advocate for inclusion and accessibility in the outdoors and camp programs while also expanding available knowledge. Areas of growth for Access Outdoors Occupational Therapy include expanding occupational therapy roles, community partnerships, on the ground advocacy and outreach, and individualized consulting for outdoors and camp programs.https://soar.usa.edu/otdcapstonessummer2020/1001/thumbnail.jp
Evaluation of College and Career Readiness Class Efficacy for Students with Learning Differences
A significant percentage of first year students in post-secondary education (PSE) do not persist through their first year and high schools continue to seek new ways of supporting students’ college and career readiness (CCR). Studies show lack of persistence derives not only from academic deficits but in non-academic skill deficits such as self-determination and executive function skills. Public school CCR programs have had limited resources to address these non-academic challenges to their students’ success whereas private high schools have significantly lower student to counselor ratio and many provide enhanced CCR programming. One small private school has provided a new semester class to prepare high school seniors, developed by OTs, that teaches non-academic skills experientially for greater impact. This project evaluates the efficacy of this CCR class using a quantitative and qualitative student survey developed to measure outcomes for self-determination, self-advocacy, and goal-setting skills. Survey questions were divided into the career exploration, PSE and employment readiness, financial literacy, and life skills units plus an overall evaluation section. Results of this survey indicate the class curriculum is meeting objectives and the students are being prepared for PSE, employment, and adult living skills. The implication for OT is that non-academic skills can be effectively taught and that OTs can support enhanced CCR programming that supports student persistence in post-secondary endeavors.https://soar.usa.edu/otdcapstonesfall2021/1026/thumbnail.jp
Hearing voices: A narrative analysis of the senate inquiry into the social and economic impacts of rural wind farms
This is a preliminary examination of the public debate initiated as a result of the rapid expansion of wind farms in rural spaces. The study is based on a sample of submissions to the Senate Inquiry, The Social and Economic Impact of Rural Wind Farms (2011). Using a narrative analysis (Riessman 2008), the study identifies the issues raised in support of, or opposition to, wind farm developments in south-west Victoria. Narratives of personal loss or personal gain and by extension, community gain, were used to frame the stories. The narratives of loss struggled to connect to a contemporary public discourse and were as a result marginalised. The narratives of gain were found to link more successfully to themes with national and international currency that allowed the narratives to assume a 'just' stance. This study may be useful for others who engage, communicate and negotiate in the context of further wind farm developments
Hosting critical infrastructure services in the cloud environment considerations
Critical infrastructure technology vendors will inevitability take advantage of the benefits offered by the cloud computing paradigm. While this may offer improved performance and scalability, the associated security threats impede this progression. Hosting critical infrastructure services in the cloud environment may seem inane to some, but currently remote access to the control system over the internet is commonplace. This shares the same characteristics as cloud computing, i.e., on-demand access and resource pooling. There is a wealth of data used within critical infrastructure. There needs to be an assurance that the confidentiality, integrity and availability of this data remains. Authenticity and non-repudiation are also important security requirements for critical infrastructure systems. This paper provides an overview of critical infrastructure and the cloud computing relationship, whilst detailing security concerns and existing protection methods. Discussion on the direction of the area is presented, as is a survey of current protection methods and their weaknesses. Finally, we present our observation and our current research into hosting critical infrastructure services in the cloud environment, and the considerations for detecting cloud attacks. © 2015 Inderscience Enterprises Ltd
A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models
Digital forensic examiners and stakeholders face increasing challenges during the investigation of Internet of Things (IoT) environments due to the heterogeneous nature of the IoT infrastructure. These challenges include guaranteeing the integrity of forensic evidence collected and stored during the investigation process. Similarly, they also encounter challenges in ensuring the transparency of the investigation process which includes the chain-of-custody and evidence chain. In recent years, some blockchain-based secure evidence models have been proposed especially for IoT forensic investigations. These proof-of-concept models apply the inherent properties of blockchain to secure the evidence chain of custody, maintain privacy, integrity, provenance, traceability, and verification of evidence collected and stored during the investigation process. Although there have been few prototypes to demonstrate the practical implementation of some of these proposed models, there is a lack of descriptive review of these blockchain-based IoT forensic models. In this paper, we report a comprehensive Systematic Literature Review (SLR) of the latest blockchain-based IoT forensic investigation process models. Particularly, we systematically review how blockchain is being used to securely improve the forensic investigation process and discuss the efficiency of these proposed models. Finally, the paper highlights challenges, open issues, and future research directions of blockchain technology in the field of IoT forensic investigations
COVID-19 Pandemic Preparedness in a UK Tertiary and Quaternary Children's Hospital: Tales of the Unexpected
We describe the adaptive coping strategies required in the management of a heterogeneous group of SARS-CoV-2 paediatric patients. The diverse range of presentations, presenting in distinct phenotypic waves, exemplified the importance of preparedness for the unknown. Lessons learned will be essential in planning for a likely second wave of SARS-CoV-2
A secure fog-based platform for SCADA-based IoT critical infrastructure
© 2019 John Wiley & Sons, Ltd. The rapid proliferation of Internet of things (IoT) devices, such as smart meters and water valves, into industrial critical infrastructures and control systems has put stringent performance and scalability requirements on modern Supervisory Control and Data Acquisition (SCADA) systems. While cloud computing has enabled modern SCADA systems to cope with the increasing amount of data generated by sensors, actuators, and control devices, there has been a growing interest recently to deploy edge data centers in fog architectures to secure low-latency and enhanced security for mission-critical data. However, fog security and privacy for SCADA-based IoT critical infrastructures remains an under-researched area. To address this challenge, this contribution proposes a novel security “toolbox” to reinforce the integrity, security, and privacy of SCADA-based IoT critical infrastructure at the fog layer. The toolbox incorporates a key feature: a cryptographic-based access approach to the cloud services using identity-based cryptography and signature schemes at the fog layer. We present the implementation details of a prototype for our proposed secure fog-based platform and provide performance evaluation results to demonstrate the appropriateness of the proposed platform in a real-world scenario. These results can pave the way toward the development of a more secure and trusted SCADA-based IoT critical infrastructure, which is essential to counter cyber threats against next-generation critical infrastructure and industrial control systems. The results from the experiments demonstrate a superior performance of the secure fog-based platform, which is around 2.8 seconds when adding five virtual machines (VMs), 3.2 seconds when adding 10 VMs, and 112 seconds when adding 1000 VMs, compared to the multilevel user access control platform
Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot
The Internet of Things (IoT) plays a significant role in our daily lives as interconnection and automation positively impact our societal needs. In contrast to traditional devices, IoT devices require connectivity and data sharing to operate effectively. This interaction necessitates that data resides on multiple platforms and often across different locations, posing challenges from a digital forensic investigator's perspective. Recovering a full trail of data requires piecing together elements from various devices and locations. IoT-based forensic investigations include an increasing quantity of objects of forensic interest, the uncertainty of device relevance in terms of digital artifacts or potential data, blurry network boundaries, and edgeless networks, each of which poses new challenges for the identification of significant forensic artifacts. One example of the positive societal impact of IoT devices is that of Humanoid robots, with applications in public spaces such as assisted living, medical facilities, and airports. These robots use IoT to provide varying functionality but rely heavily on supervised learning to customize their utilization of the IoT to various environments. A humanoid robot can be a rich source of sensitive data about individuals and environments, and this data may assist in digital investigations, delivering additional information during a crime investigation. In this paper, we present our case study on the Zenbo Humanoid Robot, exploring how Zenbo could be a witness to a crime. In our experiments, a forensic examination was conducted on the robot to locate all useful evidence from multiple locations, including root-level directories using logical acquisition
Assessing and augmenting SCADA cyber security: a survey of techniques
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
- …