2,386 research outputs found

    ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology

    Get PDF
    Reliable authentication requires the devices and channels involved in the process to be trustworthy; otherwise authentication secrets can easily be compromised. Given the unceasing efforts of attackers worldwide such trustworthiness is increasingly not a given. A variety of technical solutions, such as utilising multiple devices/channels and verification protocols, has the potential to mitigate the threat of untrusted communications to a certain extent. Yet such technical solutions make two assumptions: (1) users have access to multiple devices and (2) attackers will not resort to hacking the human, using social engineering techniques. In this paper, we propose and explore the potential of using human-based computation instead of solely technical solutions to mitigate the threat of untrusted devices and channels. ZeTA (Zero Trust Authentication on untrusted channels) has the potential to allow people to authenticate despite compromised channels or communications and easily observed usage. Our contributions are threefold: (1) We propose the ZeTA protocol with a formal definition and security analysis that utilises semantics and human-based computation to ameliorate the problem of untrusted devices and channels. (2) We outline a security analysis to assess the envisaged performance of the proposed authentication protocol. (3) We report on a usability study that explores the viability of relying on human computation in this context

    What are we Managing Anyway?: The Need for an Interdisciplinary Approach to Managing Fisheries Ecosystems

    Get PDF
    Fisheries managers should really be attempting to manage the fishing fleets and the processing industry, not the fish. Consequently we argue that effective management ought to take an eco-systems approach that is necessarily interdisciplinary, incorporating both natural and social sciences. We ascribe the inadequate results of existing management regimes to scientific uncertainty, political pressures, the regulations\u27 lack of legitimacy among fishers, and excessive reliance on individual fishers (rather than households and communities) as the unit of analysis. In a new interdisciplinary approach, we emphasize the contribution of social science in helping to understand what is defined as Scientific knowledge, how expert scientific and local or traditional knowledge might be integrated, and the role of science in the management process. We conclude by advocating an ecosystem management strategy of periodic (every three to five years) in-depth assessments with explicit requirements for sociological and economic input

    Engaging the data moment: An introduction

    Get PDF
    All of the contributions to this special issue are occupied with how to engage data otherwise. This otherwise indexes the rich variety of approaches to data beyond what we are currently witnessing. Whether through the development of politically and ethically relevant forms of data experiments, or the construction of alternative visions of the much-critiqued data infrastructures of powerful platform providers, all the articles reflect upon how we - as scholars and citizens - can live and work with data in ways amenable to diverse, critical, and ethical forms of social existence. This introduction intervenes in this debate in its own particular way, principally by considering what it means to characterise the contemporary as a data moment. The term data moment, we argue, works as a conceptual device calling for more ethical-political engagement with data practices. At the same time, it also retains a temporal inflection. Moments, we claim, are not sequential steps in a linear process, but are themselves productive of, and products of, temporal orders. Moments are also saturated in affect, we argue, and it is such affects that contribute to how particular forms of meaning emerge with/as data. By embracing the compelling empirical, theoretical and ethical challenges of this data moment our ambition with this special issue is to make a modest contribution to how scholars can engage data in the present, while also shaping a future where data are treated critically, ethically, and reflexively

    Evolution of the Alfvén Mach number associated with a coronal mass ejection shock

    Get PDF
    The Sun regularly produces large-scale eruptive events, such as coronal mass ejections (CMEs) that can drive shock waves through the solar corona. Such shocks can result in electron acceleration and subsequent radio emission in the form of a type II radio burst. However, the early-phase evolution of shock properties and its relationship to type II burst evolution is still subject to investigation. Here we study the evolution of a CME-driven shock by comparing three commonly used methods of calculating the Alfvén Mach number (MA), namely: shock geometry, a comparison of CME speed to a model of the coronal Alfvén speed, and the type II bandsplitting method. We applied the three methods to the 2017 September 2 event, focusing on the shock wave observed in extreme ultraviolet by the Solar Ultraviolet Imager on board GOES-16, in white-light by the Large Angle and Spectrometric Coronagraph on board SOHO, and the type II radio burst observed by the Irish Low Frequency Array. We show that the three different methods of estimating shock MA yield consistent results and provide a means of relating shock property evolution to the type II emission duration. The type II radio emission emerged from near the nose of the CME when MA was in the range 1.4–2.4 at a heliocentric distance of ∼1.6 R⊙. The emission ceased when the CME nose reached ∼2.4 R⊙, despite an increasing Alfvén Mach number (up to 4). We suggest the radio emission cessation is due to the lack of quasi-perpendicular geometry at this altitude, which inhibits efficient electron acceleration and subsequent radio emission

    A descriptive survey study of violence management and priorities among psychiatric staff in mental health services, across seventeen european countries

    Get PDF
    BACKGROUND: In mental health services what is commonplace across international frontiers is that to prevent aggressive patients from harming themselves, other patients or staff, coercive measures and foremost, violence management strategies are required. There is no agreement, recommendations or direction from the EU on which measures of coercion should be practiced across EU countries, and there is no overall one best practice approach. METHODS: The project was conceived through an expert group, the European Violence in Psychiatry Research Group (EViPRG). The study aimed to incorporate an EU and multidisciplinary response in the determination of violence management practices and related research and education priorities across 17 European countries. From the EVIPRG members, one member from each country agreed to act as the national project coordinator for their country. Given the international spread of respondents, an eDelphi survey approach was selected for the study design and data collection. A survey instrument was developed, agreed and validated through members of EVIPRG. RESULTS: The results included a total of 2809 respondents from 17 countries with 999 respondents who self-selected for round 2 eDelphi. The majority of respondents worked in acute psychiatry, 54% (n = 1511); outpatient departments, 10.5% (n = 295); and Forensic, 9.3% (n = 262). Other work areas of respondents include Rehabilitation, Primary Care and Emergency. It is of concern that 19.5% of respondents had not received training on violence management. The most commonly used interventions in the management of violent patients were physical restraint, seclusion and medications. The top priorities for education and research included: preventing violence; the influence of environment and staff on levels of violence; best practice in managing violence; risk assessment and the aetiology and triggers for violence and aggression. CONCLUSION: In many European countries there is an alarming lack of clarity on matters of procedure and policy pertaining to violence management in mental health services. Violence management practices in Europe appear to be fragmented with no identified ideological position or collaborative education and research. In Europe, language differences are a reality and may have contributed to insular thinking, however, it must not be seen as a barrier to sharing best practice

    Designing a Data Warehouse for Cyber Crimes

    Get PDF
    One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on the data warehouse. We discuss several ways of utilizing the data warehouse using OLAP and data mining technologies. We finally discuss legal issues and data population issues for the data warehouse
    corecore