153 research outputs found

    Using behavioural insights to improve the public’s use of cyber security best practices

    Get PDF

    A systematic review of crime facilitated by the consumer Internet of Things

    Get PDF
    The nature of crime is changing — estimates suggest that at least half of all crime is now committed online. Once everyday objects (e.g. televisions, baby monitors, door locks) that are now internet connected, collectively referred to as the Internet of Things (IoT), have the potential to transform society, but this increase in connectivity may generate new crime opportunities. Here, we conducted a systematic review to inform understanding of these risks. We identify a number of high-level mechanisms through which offenders may exploit the consumer IoT including profiling, physical access control and the control of device audio/visual outputs. The types of crimes identified that could be facilitated by the IoT were wide ranging and included burglary, stalking, and sex crimes through to state level crimes including political subjugation. Our review suggests that the IoT presents substantial new opportunities for offending and intervention is needed now to prevent an IoT crime harvest

    The consumer security index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices

    Get PDF
    Consumer IoT devices often lack adequate in-built security, giving rise to newer forms of threats and crime risks. Security should be designed into devices but at present there is little incentive for manufacturers to do so consistently. Additionally, consumers are not given simple information at the point of purchase, in user manuals or other materials to help them assess the security of devices. Consumers are therefore not afforded the opportunity to understand the level of security devices offer. Consumer rating indices (e.g. food traffic light labels) can provide this opportunity to aid consumer choice. This research aims to co-develop a consumer security index (CSI), with consumers and security experts, to aid consumer decision making and incentivise greater security provision in the manufacture of IoT devices. In this paper, we focus on the methodology for the development of the index. Through a focus group with IoT security experts, Study 1 will identify security features that consumer IoT devices should provide. Study 2 will employ an online survey to identify consumer preferences concerning the disclosure of security and privacy features that devices provide, and focus groups will help to co-design the CSI by discussing the information value, appeal and likely engagement of a security index label. To better understand the current situation, Study 3 will develop a matrix of different classes of IoT devices manually coded according to the CSI for a sample of devices. Study 4 will explore the use of natural language processing to extract data from device user manuals to identify what information is communicated about the security features, as well as, what crime prevention messaging is provided by manufacturers. The project will use a formal methodology to develop a CSI that is co-designed with experts and consumers. The ultimate aims are to encourage the use of the index to help inform consumer choice, and to lever market action so that IoT devices are shipped with security features in-built

    What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?

    Get PDF
    Through the enhanced connectivity of physical devices, the Internet of Things (IoT) brings improved efficiency to the lives of consumers when on-the-go and in the home. However, it also introduces new potential security threats and risks. These include threats that range from the direct hacking of devices that could undermine the security, privacy and safety of its users, to the enslaving of IoT devices to commit cybercrime at scale, such as Denial of Service attacks. The IoT is recognized as being widely insecure, in large part, due to the lack of security features built into devices. Additionally, consumers do not always actively use security features when available. More disconcerting is that we lack market surveillance on whether manufacturers ship products with good security features or how the importance of user-controlled security features is explained to IoT users. Our study seeks to address this gap. To do this, we compiled a database of 270 consumer IoT devices produced by 220 different manufacturers on sale at the time of the study. The user manuals and associated support pages for these devices were then analysed to provide a ‘consumer eye’ view of the security features they provide and the cyber hygiene advice that is communicated to users. The security features identified were then mapped to the UK Government’s Secure by Design Code of Practice for IoT devices to examine the extent to which devices currently on the market appear to conform to it. Our findings suggest that manufacturers provide too little publicly available information about the security features of their devices, which makes market surveillance challenging and provides consumers with little information about the security of devices prior to their purchase. On average, there was discussion of around four security features, with account management and software updates being the most frequently mentioned. Advice to consumers on cyber hygiene was rarely provided. Finally, we found a lack of standardization in the communication of security-related information for IoT devices among our sample. We argue for government intervention in this space to provide assurances around device security, whether this is provided in a centralized or decentralized manner

    The transitioning experiences of internationally-educated nurses into a Canadian health care system: A focused ethnography

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Beyond well-documented credentialing issues, internationally-educated nurses (IENs) may need considerable support in transitioning into new social and health care environments. This study was undertaken to gain an understanding of transitioning experiences of IENs upon relocation to Canada, while creating policy and practice recommendations applicable globally for improving the quality of transitioning and the retention of IENs.</p> <p>Methods</p> <p>A focused ethnography of newly-recruited IENs was conducted, using individual semi-structured interviews at both one-to-three months (Phase 1) and nine-to-twelve months post-relocation (Phase 2). A purposive sample of IENs was recruited during their orientation at a local college, to a health authority within western Canada which had recruited them for employment throughout the region. The interviews were recorded and transcribed, and data was managed using qualitative analytical software. Data analysis was informed by Roper and Shapira's framework for focused ethnography.</p> <p>Results</p> <p>Twenty three IENs consented to participate in 31 interviews. All IENs which indicated interest during their orientation sessions consented to the interviews, yet 14 did not complete the Phase 2 interview due to reorganization of health services and relocation. The ethno-culturally diverse group had an average age of 36.4 years, were primarily educated to first degree level or higher, and were largely (under) employed as "Graduate Nurses". Many IENs reported negative experiences related to their work contract and overall support upon arrival. There were striking differences in nursing practice and some experiences of perceived discrimination. The primary area of discontentment was the apparent communication breakdown at the recruitment stage with subsequent discrepancy in expected professional role and financial reimbursement.</p> <p>Conclusions</p> <p>Explicit and clear communication is needed between employers and recruitment agencies to avoid employment contract misunderstandings and to enable clear interpretation of the credentialing processes. Pre-arrival orientation of IENs including health care communications should be encouraged and supported by the recruiting institution. Moreover, employers should provide more structured and comprehensive workplace orientation to IENs with consistent preceptorship. Similar to findings of many other studies, diversity should be valued and incorporated into the professional culture by nurse managers.</p

    A socio-environmental geodatabase for integrative research in the transboundary Rio Grande/Río Bravo basin

    Get PDF
    Integrative research on water resources requires a wide range of socio-environmental datasets to better understand human-water interactions and inform decision-making. However, in transboundary watersheds, integrating cross-disciplinary and multinational datasets is a daunting task due to the disparity of data sources and the inconsistencies in data format, content, resolution, and language. This paper introduces a socio-environmental geodatabase that transcends political and disciplinary boundaries in the Rio Grande/Río Bravo basin (RGB). The geodatabase aggregates 145 GIS data layers on five main themes: (i) Water & Land Governance, (ii) Hydrology, (iii) Water Use & Hydraulic Infrastructures, (iv) Socio-Economics, and (v) Biophysical Environment. Datasets were primarily collected from public open-access data sources, processed with ArcGIS, and documented through the FGCD metadata standard. By synthesizing a broad array of datasets and mapping public and private water governance, we expect to advance interdisciplinary research in the RGB, provide a replicable approach to dataset compilation for transboundary watersheds, and ultimately foster transboundary collaboration for sustainable resource management.The project was funded by Grant No. G15AP00132 from the United States Geological Survey. Open Access fees paid for in whole or in part by the University of Oklahoma Libraries.Ye

    The Plasmodium falciparum STEVOR Multigene Family Mediates Antigenic Variation of the Infected Erythrocyte

    Get PDF
    Modifications of the Plasmodium falciparum–infected red blood cell (iRBC) surface have been linked to parasite-associated pathology. Such modifications enable the parasite to establish long-lasting chronic infection by evading antibody mediate immune recognition and splenic clearance. With the exception of the well-demonstrated roles of var-encoded PfEMP1 in virulence and immune evasion, the biological significance of other variant surface antigens (rif and stevor) is largely unknown. While PfEMP1 and RIFIN have been located on the iRBC surface, recent studies have located STEVOR at the iRBC membrane where it may be exposed on the erythrocyte surface. To investigate the role of STEVOR in more detail, we have developed antibodies against two putative STEVOR proteins and used a combination of indirect immunofluorescence assays (IFA), live IFA, flow cytometry, as well as agglutination assays, which enable us to demonstrate that STEVOR is clonally variant at the surface of schizont stage parasites. Crucially, expression of different STEVOR on the surface of the iRBC changes the antigenic property of the parasite. Taken together, our data for the first time demonstrate that STEVOR plays a role in creating antigenic diversity of schizont stage parasites, thereby adding additional complexity to the immunogenic properties of the iRBC. Furthermore, it clearly demonstrates that to obtain a complete understanding of how parasite-induced pathology is linked to variation on the surface of the iRBC, focusing the interactions of multiple multigene families needs to be considered

    Design and utilization of epitope-based databases and predictive tools

    Get PDF
    In the last decade, significant progress has been made in expanding the scope and depth of publicly available immunological databases and online analysis resources, which have become an integral part of the repertoire of tools available to the scientific community for basic and applied research. Herein, we present a general overview of different resources and databases currently available. Because of our association with the Immune Epitope Database and Analysis Resource, this resource is reviewed in more detail. Our review includes aspects such as the development of formal ontologies and the type and breadth of analytical tools available to predict epitopes and analyze immune epitope data. A common feature of immunological databases is the requirement to host large amounts of data extracted from disparate sources. Accordingly, we discuss and review processes to curate the immunological literature, as well as examples of how the curated data can be used to generate a meta-analysis of the epitope knowledge currently available for diseases of worldwide concern, such as influenza and malaria. Finally, we review the impact of immunological databases, by analyzing their usage and citations, and by categorizing the type of citations. Taken together, the results highlight the growing impact and utility of immunological databases for the scientific community

    Impact of Immunization Technology and Assay Application on Antibody Performance – A Systematic Comparative Evaluation

    Get PDF
    Antibodies are quintessential affinity reagents for the investigation and determination of a protein's expression patterns, localization, quantitation, modifications, purification, and functional understanding. Antibodies are typically used in techniques such as Western blot, immunohistochemistry (IHC), and enzyme-linked immunosorbent assays (ELISA), among others. The methods employed to generate antibodies can have a profound impact on their success in any of these applications. We raised antibodies against 10 serum proteins using 3 immunization methods: peptide antigens (3 per protein), DNA prime/protein fragment-boost (“DNA immunization”; 3 per protein), and full length protein. Antibodies thus generated were systematically evaluated using several different assay technologies (ELISA, IHC, and Western blot). Antibodies raised against peptides worked predominantly in applications where the target protein was denatured (57% success in Western blot, 66% success in immunohistochemistry), although 37% of the antibodies thus generated did not work in any of these applications. In contrast, antibodies produced by DNA immunization performed well against both denatured and native targets with a high level of success: 93% success in Western blots, 100% success in immunohistochemistry, and 79% success in ELISA. Importantly, success in one assay method was not predictive of success in another. Immunization with full length protein consistently yielded the best results; however, this method is not typically available for new targets, due to the difficulty of generating full length protein. We conclude that DNA immunization strategies which are not encumbered by the limitations of efficacy (peptides) or requirements for full length proteins can be quite successful, particularly when multiple constructs for each protein are used
    corecore