3,275 research outputs found

    The Need to Address Mobile Device Security in the Higher Education IT Curriculum

    Get PDF
    Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading mobile operating systems (OS), Google’s Android OS and Apple’s iOS, both have security concerns as do the mobile applications and the major application markets. ‘Bring your own devices,’ where employees supply their own equipment for work-related purposes, can cut costs for organizations, but failing to address security can significantly increase those costs. This paper focuses on the increasing need for mobile business and its related mobile device security concerns. We propose that future IT professionals should be aware of these issues and learn how to secure mobile devices through the integration of the topic into the IT Model Curriculum. Using the case of one undergraduate IT program, we developed a set of mobile device security education recommendations, which we then mapped to the IT Model Curriculum using the guidelines from Accreditation Board for Engineering and Technology (ABET). This mapping approach demonstrates one way how higher education institutions could integrate mobile device security into any IT curriculum

    On-line data archives

    Get PDF
    ©2001 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.Digital libraries and other large archives of electronically retrievable and manipulable material are becoming widespread in both commercial and scientific arenas. Advances in networking technologies have led to a greater proliferation of wide-area distributed data warehousing with associated data management challenges. We review tools and technologies for supporting distributed on-line data archives and explain our key concept of active data archives, in which data can be, processed on-demand before delivery. We are developing wide-area data warehousing software infrastructure for geographically distributed archives of large scientific data sets, such as satellite image data, that are stored hierarchically on disk arrays and tape silos and are accessed by a variety of scientific and decision support applications. Interoperability is a major issue for distributed data archives and requires standards for server interfaces and metadata. We review present activities and our contributions in developing such standards for different application areas.K. Hawick, P. Coddington, H. James, C. Patte

    The Lithium Depletion Boundary and the Age of the Young Open Cluster IC~2391

    Full text link
    We have obtained new photometry and intermediate resolution (Δλ=2.7\Delta \lambda = 2.7 \AA\ ) spectra of 19 of these objects (14.9 \le IcI_c \le 17.5) in order to confirm cluster membership. We identify 15 of our targets as likely cluster members based on their VRIVRI photometry, spectral types, radial velocity, and Hα\alpha emission strengths. Higher S/N spectra were obtained for 8 of these probable cluster members in order to measure the strength of the lithium 6708 \AA\ doublet and thus obtain an estimate of the cluster's age. One of these 8 stars has a definite lithium detection and two other (fainter) stars have possible lithium detections. A color-magnitude diagram for our program objects shows that the lithium depletion boundary in IC~2391 is at IcI_c=16.2. Using recent theoretical model predictions, we derive an age for IC~2391 of 53±\pm5 Myr. While this is considerably older than the age most commonly attributed for this cluster (\sim35 Myr) this result for IC~2391 is comparable those recently derived for the Pleiades and Alpha Persei clusters and can be explained by new models for high mass stars that incorporate a modest amount of convective core overshooting.Comment: ApJ Letters, acccepte

    The Impact of Driving Conditions on PHEV Battery Performance

    Get PDF
    The battery performance of a modified Prius with a 5 kWh plug-in battery was documented for a year to determine the impact of environmental conditions and user attributes on vehicle performance. Both fuel economy and pure electrical efficiency were compared to ambient temperature. The fuel economy has a positive relationship with ambient temperature until approximately 70˚F where the efficiency begins to drop. Electrical performance has a positive linear relationship with ambient temperature. With the emergence of electric vehicles (EVs) and PHEVs from a variety of automotive manufacturers, information on EV and PHEV performance for consumers will become more important

    Using Bloom\u27s and Webb\u27s Taxonomies to Integrate Emerging Cybersecurity Topics into a Computic Curriculum

    Get PDF
    Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs recognize the need to solve this problem, these computing programs are constrained by accreditation standards and have limited ability to modify their curricula. This paper discusses a case study on how one Accreditation Board for Engineering and Technology (ABET) accredited undergraduate IT program created a strategy to continue to teach existing security-related topics as well as emerging cybersecurity topics within its IT curriculum without increasing credit requirements. The faculty developed an IT Security-related and Cybersecurity Curriculum Taxonomy to identify strategies to move security-related topics taught in the higher level courses to lower and intermediate courses. Thus emerging cybersecurity topics could be added to high-level courses. The faculty also created the IT Student Learning (Security-related) Taxonomy by combining Bloom’s Taxonomy’s six levels of thinking with Webb’s Depth of Knowledge Model. This student learning taxonomy enabled the faculty to review the student learning outcomes for each of the existing security-related core topics and develop new ones for the emerging cybersecurity topics. Challenges, benefits, and application of this strategy to other disciplines are discussed

    The Internet of Things: Multi-faceted Research Perspectives

    Get PDF
    Living beyond the hype, the Internet of things (IoT) continues to grow and has clearly emerged as a leading-edge topic in information systems. As the IoT moves beyond novel technologies and exploratory sandbox initiatives to ubiquitous technologies and full production, understanding the phenomenon surrounding IoT challenges and issues has become even more important. In this paper, we explore the critical issues and challenges currently facing IoT adoption and implementation in order to identify areas that require further study. Specifically, we discuss IoT from several key perspectives including IoT connectivity, platforms and 5G, IoT analytics, IoT privacy, security, and litigation risks, IoT business value and monetization, and human interaction with IoT and design considerations Finally, through identifying the current state of IoT and IoT research, we identify potential areas of contribution and future directions for IoT research

    Commensal-derived OMVs elicit a mild proinflammatory response in intestinal epithelial cells

    Get PDF
    Under normal physiological conditions, the intestinal immunity remains largely hyporesponsive to the commensal microbiota, yet also retains the inherent ability to rapidly respond to pathogenic antigens. However, immunomodulatory activities of extracellular products from commensal bacteria have been little studied, with previous investigations generally utilising the live bacterium to study microbiota-epithelial interactions. In this study, we demonstrate that extracellular products of a commensal bacterium, Escherichia coli C25, elicit a moderate release of proinflammatory IL-8 and stimulate transcriptional up-regulation of Toll-like receptors (TLRs) in intestinal epithelial cell lines, HT29-19A and Caco-2. Additionally, we show that removal of outer membrane vesicles (OMVs) diminishes the proinflammatory effect of secreted products from E. coli C25. Furthermore, we show that isolated OMVs have a dose-dependent proinflammatory effect on IECs. Interestingly, a relatively high concentration (10x culture concentration) of OMVs had no significant regulatory effects on TLR mRNA expression in both cell lines. Finally, we also demonstrate a that pre-incubation with E. coli C25-derived OMVs subsequently inhibited the internalisation of the bacterium itself in both cell lines. Taken together, our results suggest that commensal-derived extracellular products, in particular OMVs, could significantly contribute to intestinal homeostasis. We also demonstrate a unique interaction between commensal-derived OMVs and host cells

    Gastrointestinal nematode control practices on lowland sheep farms in Ireland with reference to selection for anthelmintic resistance

    Get PDF
    Gastrointestinal parasitism is a widely recognised problem in sheep production, particularly for lambs. While anthelmintics have a pivotal role in controlling the effects of parasites, there is a paucity of data on how farmers use anthelmintics. A representative sample of Irish lowland farmers were surveyed regarding their parasite control practices and risk factors that may contribute to the development of anthelmintic resistance. Questionnaires were distributed to 166 lowland Irish sheep producers. The vast majority of respondents treated their sheep with anthelmintics. Lambs were the cohort treated most frequently, the majority of farmers followed a set programme as opposed to treating at sign of disease. A substantial proportion (61%) administered four or more treatments to lambs in a 'normal' year. Departures from best practice in anthelmintic administration that would encourage the development of anthelmintic resistance were observed. In conclusion, in the light of anthelmintic resistance, there is a need for a greater awareness of the principles that underpin the sustainable use of anthelmintics and practices that preserve anthelmintic efficacy should be given a very high priority in the design of helminth control programmes on each farm. To this end, given that veterinary practitioners and agricultural advisors were considered to be the farmer's most popular information resource, the capacity of these professions to communicate information relating to best practice in parasite control should be targeted
    corecore