9 research outputs found

    A Just Culture is Fundamental:Extending Security Ergonomics by Design

    Get PDF

    ThumbReels: query sensitive web video previews based on temporal, crowdsourced, semantic tagging

    Get PDF
    During online search, the user's expectations often differ from those of the author. This is known as the "intention gap" and is particularly problematic when searching for and discriminating between online video content. An author uses description and meta-data tags to label their content, but often cannot predict alternate interpretations or appropriations of their work. To address this intention gap, we present ThumbReels, a concept for query-sensitive video previews generated from crowdsourced, temporally defined semantic tagging. Further, we supply an open-source tool that supports on-the-fly temporal tagging of videos, whose output can be used for later search queries. A first user study validates the tool and concept. We then present a second study that shows participants found ThumbReels to better represent search terms than contemporary preview techniques

    Trust beyond computation alone:Human aspects of trust in blockchain technologies

    Get PDF

    Everything is Awesome! Or is it?:Cyber Security Risks in Critical Infrastructure

    Get PDF
    Industrial Control Systems (ICS) play an important role in the monitoring, control and automation of critical infrastructure such as water, gas, oil and electricity. Recent years have seen a number of high profile cyber attacks on such infrastructure exemplified by Stuxnet and the Ukrainian Power Grid attacks. This naturally begs the question: how should we manage cyber security risks in such infrastructure on which the day-to-day functioning of societies rely? What are the complexities of managing security in a landscape shaped by the often competing demands of a variety of stakeholders, e.g., managers, control engineers, enterprise IT personnel and field site operators? What are the challenges posed by the convergence of Internet of Things (IoT) and critical infrastructure through the so-called Industrial Internet of Things (IIoT)? In this paper, we discuss insights from a multi-year programme of research investigating these issues and the challenges to addressing them

    Developing for non-human users:Reflecting on practical implications in the ubiquitous computing era

    Get PDF
    Advances in modern technology, such as the Internet of Things (IoT) and ubiquitous computing, open up new exciting opportunities for technology for animals. This is evidenced by the explosion of products and gadgets available for pets, digital enrichment for captive animals in zoos, sensor based smart farming, etc. At the same time, the emerging discipline of Animal-Computer Interaction (ACI) marks a new era in the design and development of animal technologies, promoting a more animal-centric approach, considering the needs of the animal in the development process. In this article, we reflect on the ways in which ideas of animal-centric development may impact the development of technology for animals in practice. We start by looking at the process of development for and with animals, and propose a development model facilitating the principles of Agility, Welfare of Animals, and eXperts’ involvement (AWAX) within the development lifecycle. While promoting the animal-centric approach, it is important to acknowledge that an animal usually uses technology through humans and in a particular environment. We further extend the AWAX model to include considerations of the human in the loop and the environment, and discuss some practical implications of this view, including aspects such as security and privacy

    A Trustworthy IoT?

    No full text

    Poster: The Role of Confirmation Bias in Potentially Undermining Speculative Cryptocurrency Decisions

    No full text
    Studies have demonstrated that news reporting (as information) is critical to the adoption and pricing of Bitcoin. This early stage work represents the first look into how this information is being used as part of the speculation decision making process and how this might be compatible with a trust model. The outputs of this work will build a trust model for Bitcoin speculators’ use of news reporting as an information source. The work will further demonstrate if, and how, this trust model might be usurped by something as simple as a confirmation bias thus confirming a more psychological approach to speculative behaviours than that portrayed in a rational economics approac

    Beware Suppliers Bearing Gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks

    Get PDF
    Threat actors are increasingly targeting extended supply chains and abusing client-supplier trust to conduct third-party compromise. Governments are concerned about targeted attacks against critical national infrastructures, where compromise can have significant adverse national consequences. In this paper we identify and review advice and guidance offered by authorities in the UK, US, and the EU regarding Cyber Supply Chain Risk Management (C-SCRM). We then conduct a review of sector specific guidance in the three regions for the chemical, energy, and water sectors. We assessed frameworks that each region’s sector offered organisations for C-SCRM suitability. Our results found a range of interpretations for “Supply Chain” that resulted in a diversity in the quantity and quality of advice offered by regional authorities, sectors, and their frameworks. This is exacerbated by the lack of a common taxonomy to support supply chain procurement and risk management that has led to limited coverage in most C-SCRM programs. Our results highlight the need for a taxonomy regarding C-SCRM and systematic guidance (both general and sector specific) to enable controls to be deployed to mitigate against supply chain risk. We provide an outline taxonomy based on our data analysis to promote further discussion and research
    corecore