94 research outputs found

    Postgraduate Students and Critical Thinking: Some Validation

    Get PDF
    Sustainability in higher education is an interesting idea because the nature of the concept changes depending on the viewpoint of the stakeholder. For an academic, a key aspect of sustainability is about facilitating life-long learning. One way to do that is to provide students with opportunities to think for themselves and to nurture that ability. This paper describes the second stage of a research programme whose focus was critical thinking (CT) and explores how information technology (IT) Masters-level students model problems. Results from a prior study suggested that IT students appear to improve their problem-solving ability by undertaking structured CT exercises. This study provides some validation of the first study and suggests future directions for the research programme. Critical thinking, as taught in a university setting, is often structured as a formal logic subject. While there is nothing intrinsically wrong with teaching students logic, that does not necessarily equate to critical thinking, and also raises the question of the place of lateral thinking. The assessment of critical thinking skills is also somewhat problematic. There are several generic assessment tools available but if critical thinking is discipline-specific, then such tools may not be particularly useful. The solution used in this research is to apply a formal critical thinking assessment instrument in a pre/post treatment experiment, the treatment being the CT exercises. This study evaluated the CT skills of Masters-level students. The participants were a class of coursework Masters students at an Australian university. Two tests were administered that targeted CT skills regarded as essential elements in a university education. The research design was a classic pre/post treatment experiment, with the treatment being the CT exercises. The results indicate that the students‘ problem-solving ability improved over time which suggests that the exercises were effective, thus validating (in part) the initial study

    The Proceedings of 14th Australian Information Security Management Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia

    Get PDF
    The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fourteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Fifteen papers were submitted from Australia and overseas, of which ten were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conferences. To our sponsors also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference

    Assessment of shoulder active range of motion in prone versus supine:A reliability and concurrent validity study

    Get PDF
    Background: As swimming and surfing are prone dominant sports, it would be more sport specific to assess shoulder active range of motion in this position. Objectives: To determine the reliability of the inclinometer and HALO© for assessing shoulder active range of motion in supine and prone and the concurrent validity of the HALO©. Concurrent validity is based on the comparison of the HALO© and inclinometer. To determine if active range of motion (AROM) differences exists between prone and supine when assessing shoulder internal (IR) and external rotation (ER). Design: The design included clinical measurement, reliability and validity. Methods: Thirty shoulders (mean age = 26.8 years) without pathology were evaluated. Measurements were taken in supine and prone with both an inclinometer and HALO© device. Results: Active ER ROM in prone was significantly higher than in supine when using both devices. Intra-rater reliability (within and between session) intraclass correlation coefficient (ICC) values ranged between 0.82–0.99 for both devices in supine and prone. An ICC test revealed a significant (p \u3c 0.01) correlation for both devices in IR and ER movements (ICC3,1 = 0.87 and ICC3,1 = 0.72), respectively. Conclusion: This study has shown prone assessment of active ER and IR ROM to be a reliable and appropriate method for prone dominant athletes (swimmers and surfers). In this study greater ER ROM was achieved in prone compared to supine. This finding highlights the importance of standardizing the test position for initial and follow up assessments. Furthermore the HALO© and inclinometer have been shown to be reliable tools that show good concurrent validity

    A Survey of Lawyers’ Cyber Security Practises in Western Australia

    Get PDF
    This paper reports on the results of a survey that is the initial phase of an action research project being conducted with the Law Society of Western Australia. The online survey forms a baseline for the expression of a targeted training regime aimed at improving the cyber security awareness and posture of the membership of the Society. The full complement of over 3000 members were given the opportunity to participate in the survey, with 122 members responding in this initial round. The survey was designed to elicit responses about information technology use and the awareness of good practices with respect to cyber security within the legal profession. The legal profession is one of the most sensitive with respect to loss of information that would affect legal professional privilege where exposure can have catastrophic consequences. We found that, comparable with other professions, lawyers do claim to use effective countermeasures on their laptops, but largely ignore their mobile phones, which highlights a particular class of risks for the profession

    E-book Adoption in Academic & Research Libraries

    Get PDF
    From a fledgling technology with no proven business models, Electronic books (E-books) have grown in importance. Nowhere is this more apparent than in academic libraries, where E-books in many libraries now account for more than half of the library acquisitions budget (Huthwaite et al., 2011). In situations where funding is scarce and E-book adoption requires substantial budgetary provision, libraries must establish the level and extent of E-book use and ascertain factors that point to the worth of E-books as library resources (Crosetto, 2011, p. 125). Consequently, user needs assessment and the analysis of E-book usage patterns have become key factors in managing library collections effectively (Al, Soydal, & Tonta, 2010)

    Why Penetration Testing is a Limited Use Choice for Sound Cyber Security Practice

    Get PDF
    Penetration testing of networks is a process that is overused when demonstrating or evaluating the cyber security posture of an organisation. Most penetration testing is not aligned with the actual intent of the testing, but rather is driven by a management directive of wanting to be seen to be addressing the issue of cyber security. The use of penetration testing is commonly a reaction to an adverse audit outcome or as a result of being penetrated in the first place. Penetration testing used in this fashion delivers little or no value to the organisation being tested for a number of reasons. First, a test is only as good as the tools, the tester and the methodology being applied. Second, the results are largely temporal. That is, the test will likely only find known vulnerabilities that exist at one specific point in time and not larger longitudinal flaws with the cyber security of an organisation, one such flaw commonly being governance. Finally, in many cases, one has to question what the point is in breaking the already broken. Penetration testing has its place when used judiciously and as part of an overall review and audit of cyber security. It can be an invaluable tool to assess the ability of a system to survive a sustained attack if properly scoped and deployed. However, it is our assessment and judgement that this rarely occurs. Keywords: cyber security, penetration testing, vulnerability assessmen

    Morale among general practitioners:qualitative study exploring relations between partnership arrangements, personal style, and workload

    Get PDF
    OBJECTIVES: To explore general practitioners' experiences of wellbeing and distress at work, to identify their perceptions of the causes of and solutions to distress, and to draw out implications for improving morale in general practice. DESIGN: Three stage qualitative study consisting of one to one unstructured interviews, one to one guided interviews, and focus groups. SETTING: Fife, Lothian, and the Borders, South East Scotland. PARTICIPANTS: 63 general practitioner principals. RESULTS: Morale of general practitioners was explained by the complex interrelations between factors. Three key factors were identified: workload, personal style, and practice arrangements. Workload was commonly identified as a cause of low morale, but partnership arrangements were also a key mediating variable between increasing workload and external changes in general practice on the one hand and individual responses to these changes on the other. Integrated interventions at personal, partnership, and practice levels were seen to make considerable contributions to improving morale. Effective partnerships helped individuals to manage workload, but increasing workload was also seen to take away time and opportunities for practices to manage change and to build supportive and effective working environments. CONCLUSIONS: Solutions to the problem of low morale need integrated initiatives at individual, partnership, practice, and policy levels. Improving partnership arrangements is a key intervention, and rigorous action research is needed to evaluate different approaches

    Visualizing the actin cytoskeleton in living plant cells using a photo-convertible mEos::FABD-mTn fluorescent fusion protein

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The actin cytoskeleton responds quickly to diverse stimuli and plays numerous roles in cellular signalling, organelle motility and subcellular compartmentation during plant growth and development. Molecular and cell biological tools that can facilitate visualization of actin organization and dynamics in a minimally invasive manner are essential for understanding this fundamental component of the living cell.</p> <p>Results</p> <p>A novel, monomeric (m) Eos-fluorescent protein derived from the coral <it>Lobophyllia hemprichii </it>was assessed for its green to red photo-convertibility in plant cells by creating mEosFP-cytosolic. mEosFP was fused to the F-(filamentous)-Actin Binding Domain of the mammalian Talin gene to create mEosFP::FABDmTalin. Photo-conversion, visualization and colour quantification protocols were developed for EosFP targeted to the F-actin cytoskeleton. Rapid photo-conversion in the entire cell or in a region of interest was easily achieved upon illumination with an approximately 400 nm wavelength light beam using an epi-fluorescent microscope. Dual color imaging after photo-conversion was carried out using a confocal laser-scanning microscope. Time-lapse imaging revealed that although photo-conversion of single mEosFP molecules can be rapid in terms of live-cell imaging it involves a progressive enrichment of red fluorescent molecules over green species. The fluorescence of photo-converted cells thus progresses through intermediate shades ranging from green to red. The time taken for complete conversion to red fluorescence depends on protein expression level within a cell and the quality of the focusing lens used to deliver the illuminating beam. Three easily applicable methods for obtaining information on fluorescent intensity and colour are provided as a means of ensuring experimental repeatability and data quantification, when using mEosFP and similar photo-convertible proteins.</p> <p>Conclusion</p> <p>The mEosFP::FABD-mTn probe retains all the imaging qualities associated with the well tested GFP::mTn probe while allowing for non-invasive, regional photo-conversion that allows colour based discrimination within a living cell. Whereas a number of precautions should be exercised in dealing with photo-convertible probes, mEosFP::FABD-mTn is a versatile live imaging tool for dissecting the organization and activity of the actin cytoskeleton in plants.</p

    DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol

    Get PDF
    Adversaries may exploit a range of vulnerabilities in Internet of Things (IoT) environments. These vulnerabilities are typically exploited to carry out attacks, such as denial-of-service (DoS) attacks, either against the IoT devices themselves, or using the devices to perform the attacks. These attacks are often successful due to the nature of the protocols used in the IoT. One popular protocol used for machine-to-machine IoT communications is the Message Queueing Telemetry Protocol (MQTT). Countermeasures for attacks against MQTT include testing defenses with existing datasets. However, there is a lack of real-world test datasets in this area. For this reason, this paper introduces a DoS/DDoS-MQTT-IoT dataset—that contains various DoS/DDoS attack scenarios using MQTT traffic—to help develop and test countermeasures against such attacks. To this end, a physical IoT testbed was constructed and a large volume of IoT data was generated that included standard MQTT traffic as well as 10 DoS scenarios. The usability of the dataset has been evaluated via machine learning

    RAIDER: Reinforcement-aided Spear Phishing Detector

    Full text link
    Spear Phishing is a harmful cyber-attack facing business and individuals worldwide. Considerable research has been conducted recently into the use of Machine Learning (ML) techniques to detect spear-phishing emails. ML-based solutions may suffer from zero-day attacks; unseen attacks unaccounted for in the training data. As new attacks emerge, classifiers trained on older data are unable to detect these new varieties of attacks resulting in increasingly inaccurate predictions. Spear Phishing detection also faces scalability challenges due to the growth of the required features which is proportional to the number of the senders within a receiver mailbox. This differs from traditional phishing attacks which typically perform only a binary classification between phishing and benign emails. Therefore, we devise a possible solution to these problems, named RAIDER: Reinforcement AIded Spear Phishing DEtectoR. A reinforcement-learning based feature evaluation system that can automatically find the optimum features for detecting different types of attacks. By leveraging a reward and penalty system, RAIDER allows for autonomous features selection. RAIDER also keeps the number of features to a minimum by selecting only the significant features to represent phishing emails and detect spear-phishing attacks. After extensive evaluation of RAIDER over 11,000 emails and across 3 attack scenarios, our results suggest that using reinforcement learning to automatically identify the significant features could reduce the dimensions of the required features by 55% in comparison to existing ML-based systems. It also improves the accuracy of detecting spoofing attacks by 4% from 90% to 94%. In addition, RAIDER demonstrates reasonable detection accuracy even against a sophisticated attack named Known Sender in which spear-phishing emails greatly resemble those of the impersonated sender.Comment: 16 page
    • …
    corecore