381 research outputs found

    Using the Victorian Curriculum and Standards Framework in music education

    Full text link
    This research examined the usefulness of the Victorian Curriculum and Standards Framework as the basis for school music education in Victoria. Interviews with experienced primary and secondary teachers sought to determine the extent to which the Curriculum and Standards Framework had impacted upon their classroom teaching practice and contributed to an understanding of learning in music education.<br /

    Analysis of Data Erasure Capability on SSHD Drives for Data Recovery

    Get PDF
    Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD

    In-the-wild residual data research and privacy

    Get PDF
    As the world becomes increasingly dependent on technology, researchers endeavor to understand how technology is used, the impact it has on everyday life and the life-cycle and span of digital information. In doing so, researchers are increasingly gathering `real-world' or `in the wild' residual data, obtained from a variety of sources without the explicit consent of the original owners. This data gathering raises significant concerns regarding privacy, ethics and legislation, as well as practical considerations concerning investigator training, data storage, overall security and disposal. This paper surveys recent studies of residual data gathered in the wild and analyses the challenges that were faced. Taking these insights, the paper presents a compendium of practices for addressing the issues that arise in in the wild residual data research. The practices presented in this paper can be used to critique current projects and assess the feasibility of proposed future research

    Protective Emblems in Cyber Warfare

    Get PDF
    The Tallinn Manual will be released in February 2013 and makes a significant step towards defining the concepts of cyber warfare. The early draft of the manual is available and the expert working party have interpreted the existing international agreements, instruments and conventions and applied them to the field of cyber warfare. The manual makes a number of interpretations on the legal position of civilians and other parties. The manual makes it clear that the existing conventions are applicable and that civilian / religious and medical systems should be viewed as non-combatants in a cyber conflict. In the kinetic warfare environment non-combatants are indicated with recognized international symbols such as the Red Cross, Red Diamond and the Red Crescent emblems. This paper proposes a simple method in which these and other symbols for protected sites could be replicated in the cyber world with a form of digital marker to ensure that systems and traffic are recognized as being clearly protected under the same terms as those that apply to the Geneva Conventions

    Survival prediction in mesothelioma using a scalable lasso regression model: instructions for use and initial performance using clinical predictors

    Get PDF
    Introduction: Accurate prognostication is difficult in malignant pleural mesothelioma (MPM). We developed a set of robust computational models to quantify the prognostic value of routinely available clinical data, which form the basis of published MPM prognostic models. Methods: Data regarding 269 patients with MPM were allocated to balanced training (n=169) and validation sets (n=100). Prognostic signatures (minimal length best performing multivariate trained models) were generated by least absolute shrinkage and selection operator regression for overall survival (OS), OS &lt;6 months and OS &lt;12 months. OS prediction was quantified using Somers DXY statistic, which varies from 0 to 1, with increasing concordance between observed and predicted outcomes. 6-month survival and 12-month survival were described by area under the curve (AUC) scores. Results: Median OS was 270 (IQR 140–450) days. The primary OS model assigned high weights to four predictors: age, performance status, white cell count and serum albumin, and after cross-validation performed significantly better than would be expected by chance (mean DXY0.332 (±0.019)). However, validation set DXY was only 0.221 (0.0935–0.346), equating to a 22% improvement in survival prediction than would be expected by chance. The 6-month and 12-month OS signatures included the same four predictors, in addition to epithelioid histology plus platelets and epithelioid histology plus C-reactive protein (mean AUC 0.758 (±0.022) and 0.737 (±0.012), respectively). The &lt;6-month OS model demonstrated 74% sensitivity and 68% specificity. The &lt;12-month OS model demonstrated 63% sensitivity and 79% specificity. Model content and performance were generally comparable with previous studies. Conclusions: The prognostic value of the basic clinical information contained in these, and previously published models, is fundamentally of limited value in accurately predicting MPM prognosis. The methods described are suitable for expansion using emerging predictors, including tumour genomics and volumetric staging

    The Impact of Hard Disk Firmware Steganography on Computer Forensics

    Get PDF
    The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There are recommended methods for the detection and forensic analysis of these areas using appropriate tools and techniques. However, there are additional areas of a disk that have currently been overlooked. The Service Area or Platter Resident Firmware Area is used to store code and control structures responsible for the functionality of the drive and for logging failing or failed sectors. This paper provides an introduction into initial research into the investigation and identification of issues relating to the analysis of the Platter Resident Firmware Area. In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially from a digital forensic investigator

    The Impact of Hard Disk Firmware Steganography on Computer Forensics

    Get PDF
    <p class="JDFSLParagraph">The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There are recommended methods for the detection and forensic analysis of these areas using appropriate tools and techniques. However, there are additional areas of a disk that have currently been overlooked.  The Service Area or Platter Resident Firmware Area is used to store code and control structures responsible for the functionality of the drive and for logging failing or failed sectors.</p><p class="JDFSLParagraph">This paper provides an introduction into initial research into the investigation and identification of issues relating to the analysis of the Platter Resident Firmware Area. In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially from a digital forensic investigator.</p

    Dobutamine stress MRI in pulmonary hypertension: relationships between stress pulmonary artery relative area change, RV performance, and 10-year survival

    Get PDF
    In pulmonary hypertension (PH), right ventricular (RV) performance determines survival. Pulmonary artery (PA) stiffening is an important biomechanical event in PH and also predicts survival based on the PA relative area change (RAC) measured at rest using magnetic resonance imaging (MRI). In this exploratory study, we sought to generate novel hypotheses regarding the influence of stress RAC on PH prognosis and the interaction between PA stiffening, RV performance and survival. Fifteen PH patients underwent dobutamine stress-MRI (ds-MRI) and right heart catheterization. RACREST, RACSTRESS, and ΔRAC (RAC STRESS – RAC REST) were correlated against resting invasive hemodynamics and ds-MRI data regarding RV performance and RV-PA coupling efficiency (n’vv [RV stroke volume/RV end-systolic volume]). The impact of RAC, RV data, and n’vv on ten-year survival were determined using Kaplan–Meier analysis. PH patients with a low ΔRAC (&lt;−2.6%) had a worse long-term survival (log-rank P = 0.045, HR for death = 4.46 [95% CI = 1.08–24.5]) than those with ΔRAC ≥ −2.6%. Given the small sample, these data should be interpreted with caution; however, low ΔRAC was associated with an increase in stress diastolic PA area indicating proximal PA stiffening. Associations of borderline significance were observed between low RACSTRESS and low n’vvSTRESS, Δη’VV, and ΔRVEF. Further studies are required to validate the potential prognostic impact of ΔRAC and the biomechanics potentially connecting low ΔRAC to shorter survival. Such studies may facilitate development of novel PH therapies targeted to the proximal PA

    Pain and the global burden of disease

    Get PDF

    Zombie Hard disks - Data from the Living Dead

    Get PDF
    There have been a number of studies conducted in relation to data remaining on disks purchased on the second hand market. A large number of these studies have indicated that a proportion of these disks contain a degree of residual data placed on the drive by the original owners. The Security Research Centre at BT has sponsored a residual data study over the last five years examining disks sourced around the globe, in the UK, USA, Germany France and Australia. In 2008 as part of a 5 year study, Glamorgan University in conjunction with Edith Cowan University in Australia, Longwood University in Virginia USA and the BT Security Research Centre completed the fourth annual disk study aimed at assessing the volume and nature of information that remains on computer hard disks offered for sale on the second hand market. One of the main findings of the study was the high proportion of disks that are sold in a non-functioning state. As in both previous and following years a percentage of the hard disks examined in the 2008 study failed the imaging process and were marked as faulty. This paper describes further analysis of a number of these faulty drives from the UK sample set of the 2008 study. This paper details the analysis of non-functioning disks supplied to the University of Glamorgan to determine the ease with which data can be recovered from these drives using specialist recovery tools. It discusses implications for both computer forensics and information security practices and procedures
    • …
    corecore