7 research outputs found

    Plant phenology supports the multi-emergence hypothesis for ebola spillover events

    Get PDF
    Ebola virus disease outbreaks in animals (including humans and great apes) start with sporadic host switches from unknown reservoir species. The factors leading to such spillover events are little explored. Filoviridae viruses have a wide range of natural hosts and are unstable once outside hosts. Spillover events, which involve the physical transfer of viral particles across species, could therefore be directly promoted by conditions of host ecology and environment. In this report we outline a proof of concept that temporal fluctuations of a set of ecological and environmental variables describing the dynamics of the host ecosystem are able to predict such events of Ebola virus spillover to humans and animals. We compiled a dataset of climate and plant phenology variables and Ebola virus disease spillovers in humans and animals. We identified critical biotic and abiotic conditions for spillovers via multiple regression and neural networks based time series regression. Phenology variables proved to be overall better predictors than climate variables. African phenology variables are not yet available as a comprehensive online resource. Given the likely importance of phenology for forecasting the likelihood of future Ebola spillover events, our results highlight the need for cost-effective transect surveys to supply phenology data for predictive modelling efforts

    Avoiding the internet of insecure industrial things

    Get PDF
    Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to be enforced from May 2018). We use the case study of the emergent smart energy supply chain to frame, scope out and consolidate the breadth of security concerns at play, and the regulatory responses. We argue the industrial IoT brings four security concerns to the fore, namely: appreciating the shift from offline to online infrastructure; managing temporal dimensions of security; addressing the implementation gap for best practice; and engaging with infrastructural complexity. Our goal is to surface risks and foster dialogue to avoid the emergence of an Internet of Insecure Industrial Things
    corecore