1,092 research outputs found

    Three Essays on Individuals’ Vulnerability to Security Attacks in Online Social Networks: Factors and Behaviors

    Get PDF
    With increasing reliance on the Internet, the use of online social networks (OSNs) for communication has grown rapidly. OSN platforms are used to share information and communicate with friends and family. However, these platforms can pose serious security threats to users. In spite of the extent of such security threats and resulting damages, little is known about factors associated with individuals’ vulnerability to online security attacks. We address this gap in the following three essays. Essay 1 draws on a synthesis of the epidemic theory in infectious disease epidemiology with the social capital theory to conceptualize factors that contribute to an individual’s role in security threat propagation in OSN. To test the model, we collected data and created a network of hacked individuals over three months from Twitter. The final hacked network consists of over 8000 individual users. Using this data set, we derived individual’s factors measuring threat propagation efficacy and threat vulnerability. The dependent variables were defined based on the concept of epidemic theory in disease propagation. The independent variables are measured based on the social capital theory. We use the regression method for data analysis. The results of this study uncover factors that have significant impact on threat propagation efficacy and threat vulnerability. We discuss the novel theoretical and managerial contributions of this work. Essay 2 explores the role of individuals’ interests in their threat vulnerability in OSNs. In OSNs, individuals follow social pages and post contents that can easily reveal their topics of interest. Prior studies show high exposure of individuals to topics of interest can decrease individuals’ ability to evaluate the risks associated with their interests. This gives attackers a chance to target people based on what they are interested in. However, interest-based vulnerability is not just a risk factor for individuals themselves. Research has reported that similar interests lead to friendship and individuals share similar interests with their friends. This similarity can increase trust among friends and makes individuals more vulnerable to security threat coming from their friends’ behaviors. Despite the potential importance of interest in the propagation of online security attacks online, the literature on this topic is scarce. To address this gap, we capture individuals’ interests in OSN and identify the association between individuals’ interests and their vulnerability to online security threats. The theoretical foundation of this work is a synthesis of dual-system theory and the theory of homophily. Communities of interest in OSN were detected using a known algorithm. We test our model using the data set and social network of hacked individuals from Essay 1. We used this network to collect additional data about individuals’ interests in OSN. The results determine communities of interests which were associated with individuals’ online threat vulnerability. Moreover, our findings reveal that similarities of interest among individuals and their friends play a role in individuals’ threat vulnerability in OSN. We discuss the novel theoretical and empirical contributions of this work. Essay 3 examines the role addiction to OSNs plays in individuals’ security perceptions and behaviors. Despite the prevalence of problematic use of OSNs and the possibility of addiction to these platforms, little is known about the functionalities of brain systems of users who suffer from OSN addiction and their online security perception and behaviors. In addressing these gaps, we have developed the Online addiction & security behaviors (OASB) theory by synthesizing dual-system theory and extended protection motivation theory (PMT). We collected data through an online survey. The results indicate that OSN addiction is rooted in the individual’s brain systems. For the OSN addicted, there is a strong cognitive-emotional preoccupation with using OSN. Our findings also reveal the positive and significant impact of OSN addiction on perceived susceptibility to and severity of online security threats. Moreover, our results show the negative association between OSN addiction and perceived self-efficacy. We discuss the theoretical and practical implications of this work

    Toward a New Approach to Information Science: Intertextuality

    Get PDF
    Intertextuality is the meaning of the text that is formed by other texts. It means the formation of a new text based on contemporary or previous texts, so that the new text is a compact of a number of texts, the border between which is blurred, and its structure is renewed in a new way, so that nothing is left of the previous texts except its substance, and its essence is in the new text is hidden and only experts can recognize it. No text can be understood on its own without relying on other texts, because it is impossible to avoid using expressions and things that others have already used. Therefore, intertextuality shows that all events are somehow related to previous events and benefit from them. Intertextuality idea is emerged effectively in various operations of librarianship. Although it is a relative modern idea, despite its history and librarians’ awareness of the idea, intertextual relationships have been implicitly circulating in professional librarianship operations, either intrinsically or ideally, so the position of the idea can be traced in practices of this field. This papar aims to represent three technical aspects in information science and librarianship including Collection develpement, cataloging and information retrieval from an intertextual perspective

    Equity, diversit[y], inclusion: exciting first steps of a winding journey.

    Get PDF
    This presentation formed part of the "Inclusive Curriculum Design and Delivery" strand of the 2022 Pharmacist Education Summit. In the presentation, the author reflects on the results of working with pharmacy students at Robert Gordon University (RGU), in terms of aiming to improve the student experience and quality of teaching from an equality/equity, diversity and inclusion (EDI) perspective

    Co-creating compassionate classrooms.

    Get PDF
    The impact of co-creating compassionate classrooms with international students will be explored through the student success formula: equity + wellbeing + inclusion. It is well-known that many postgraduate students are balancing professional working lives, their caring responsibilities, childcare, family and financial commitments with the demands of undertaking Higher Education. These challenges are often compounded for international students, as they are away from their usual support networks. This inequity can potentially lead to poor mental wellbeing and engagement, despite a desire and drive to partake in their courses. "Every night my kids plead with me to come back home... the call ends in tears, then I have to sit and write my assignment. It's really hard". Student lived experience testimonials like this highlight an urgent need for compassionate pedagogy and flexible course design that takes into account students' diverse learning and wellbeing needs. In this session, delegates will be able to gain insight into how capturing students protected characteristics and caring responsibilities can successfully ensure equity measures are put in place across the student journey from induction to alumni engagement. The session aims to help educators reflect on their own teaching practices and empower them to work in partnership with minority background students to nurture a sense of belonging within an inclusive learning environment

    Towards the Development of an Artificial Ovary

    Get PDF
    Ovarian preantral follicles often flatten and rupture during static culture in a tissue culture well. In this study, growth and morphology were evaluated for rat and mouse preantral follicles cultured for 72 hours in conventional culture wells and in suspension culture systems, consisting of orbiting test tubes and rotating-wall vessels. Follicles cultured in the orbiting test tubes had increased growth rates relative to the rate in the conventional culture wells, and experienced neither flattening nor rupture. The majority of follicles cultured in the rotating-wall vessel appeared to experience shear damage. In order to provide a potential barrier from shear stress during suspension culture, follicles were encapsulated in calcium alginate gels and growth and morphology were evaluated in the conventional and suspension culture systems. Encapsulated follicles more closely resembled an in vivo morphology and did not flatten nor rupture. Our studies suggest that suspension culturing in a rotating-wall vessel in combination with microencapsulation supports more natural three-dimensional follicular growth and morphology. The approach described herein is the first step toward the development of an artificial ovary. Additionally, this new culture system maintains follicles in a more natural morphology and will provide an important new avenue for further detailed investigation of the complex regulation of ovarian follicle development

    An integrated DRASTIC model using frequency ratio and two new hybrid methods for groundwater vulnerability assessment

    Get PDF
    Groundwater management can be effectively implemented by mapping groundwater contamination. Intense agricultural activities and land overexploitation have resulted in groundwater contamination, which is becoming a critical issue, specifically in areas where fertilizers are extensively used on large plantations. The goal of this study was to develop an integrated DRASTIC model with a frequency ratio (FR) as a novel approach. Two new hybrid methods namely single-parameter sensitivity analysis (SPSA) and an analytical hierarchy process (AHP) are also implemented for adjusting feature weights to local settings. The FR is used for DRASTIC model rates, whereas both SPSA and AHP are used for DRASTIC weights. The FR-DRASTIC, FR-SPSA and FR-AHP methods are developed; nitrate samples from the same month in different years are used for analysis and correlation (May 2010 and May 2012). The first nitrate samples are interpolated using the Kriging approach. The Kerman plain is used as an example, which is located in south-eastern part of Iran. Additionally, the new methods are employed in the study area to compare with each other and the original DRASTIC model. The validation results exhibited that using FR approach improved the correlation between vulnerability index and nitrate concentrations compared with original DRASTIC vulnerability correlation which was 0.37. The results indicated that the new hybrid methods exhibited higher correlation 0.75 in the FR-DRASTIC model. Correlations of the FR-SPSA and FR-AHP approaches were 0.77 and 0.80. Hence, the new hybrid methods are more effective and provide reasonably good results. Furthermore, quantitative measures of vulnerability offer an excellent opportunity to effectively prevent as well as reduce contamination

    Risk assessment of groundwater pollution with a new methodological framework: application of Dempster-Shafer theory and GIS

    Get PDF
    Managing natural groundwater resources is challenged by nitrate pollution resulting from agricultural activities. This issue is emerging as an important environmental concern that needs to be addressed through effective groundwater management. Groundwater assessment is an important aspect of groundwater management, particularly in arid and semi-arid regions. This study focused on the Kerman Plain, which is exposed to intensive agricultural activities and land exploitation that result in intense land pollution. The effects of nitrate pollution may be controlled by applying specific measures. Dempster–Shafer theory (DST) was applied in this study to develop a new methodology for assessing pollution risk. Applying this theory as a pioneering approach to assessing groundwater pollution risk is the novel component of this research. This approach provides a major advantage by dealing with varying levels of precision related to information. The spatial association between DRASTIC parameters including D (depth of water), R (net recharge), A (aquifer media), S (soil media), T (topography), I (impact of vadose zone) and C (hydraulic conductivity) and underground nitrate occurrence was evaluated by applying bivariate DST to assign mass functions. Dempster’s rule of combination using GIS was then applied to determine a series of combined mass functions for multiple hydrogeological data layers. The uncertainty of system responses was directly addressed by the proposed methodology. Finally, the modified DRASTIC map with the highest validity and accuracy was selected and combined with the damage map. The comparison between nitrate distribution and vulnerability and the risk maps exhibit high similarity between different vulnerability degrees and nitrate concentrations. Long-term planning of preventive measures and associated developments can be aided by the regions with low and very low risks located in the northeast, northwest, and central regions
    corecore