252 research outputs found

    A Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs

    Get PDF
    In this paper we reviewed the cost-benefit analysis of Information Security and applied to Organisations Responsible for Vulnerable Individuals (ORVIs). Our research investigates the mitigation value and cost effectiveness of mitigation methods which discussed findings based on business focus and evaluation. Research findings indicated metrics for calculations assumptions, as proposed in the research work and thus, determined that the relative data analysis presented for cost comparable scores of the mitigation methods adopted. It is recommended from our analysis that ORVIs implement Internal Penetration Testing alongside Policy implementation due to the added benefit this combination has for this specific use-case

    On the Identification of Information Extracted from Windows Physical Memory

    Get PDF
    Forensic investigation of the physical memory of computer systems is gaining the attention of experts in the digital forensics community. Forensic investigators find it helpful to seize and capture data from the physical memory and perform post-incident analysis when identifying potential evidence. However, there have been few investigations which have identified the quantity and quality of information that can be recovered from only the computer system memory (RAM) while the application is still running. In this paper, we present the results of investigations carried out to identify relevant information that has been extracted from the physical memory of computer systems running Windows XP. We found fragments of partial evidence from allocated memory segments. This evidence was dispersed in the physical memory that had been allocated to the application. The identification of this information is useful to forensic investigators as this approach can uncover what a user is doing on the application which can be used as evidence

    Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies

    Get PDF
    In this paper, we explore the security and privacy issues of Internet of Things (IoT) healthcare applications for special needs users. IoT enables health-related organizations to lift important data from diverse sources in real-time and this helps in precise decision-making. The transformation of the health sector, required enhancement and efficiency of protective systems, thereby reducing data vulnerability and hence, providing opportunities for secure patient data, particularly, for special needs patients. A quantitative method for purposive sampling technique was adopted and eighty-eight respondents provided the process of how the IoT technology was utilised. Data findings indicated that IoT monitoring devices have the detective ability for a person with special needs living alone with problems related to vital signs of diseases or disabilities. Personal patient health records are integrated into the e-health Centre via IoT technologies. For data privacy, security, and confidentiality, patients' records are kept on Personal Health Record Systems (PHRS). The research revealed suspected breaches of information due to cyber-attacks on the probability of false data errors in the PHRS, leading to special needs personal data leakage

    Endocrine disrupting compounds exposure and testis development in mammals

    Get PDF
    In the last few decades, there is substantial evidence that male reproductive function is deteriorating in humans and wildlife and this is associated with unintentional exposure to widely used synthetic chemicals. Subsequently, much has been done to show that certain chemicals in the environment adversely interfere with the developing fetal gonads of the laboratory animals. Some in vitro studies have demonstrated treatment-induced reproductive problems in offspring exposed to endocrine disrupting compounds (EDC) which are similar to those observed in wildlife and human population. Few EDC studies have demonstrated that there are certain periods of gestation when the developing fetus is highly sensitive and at risk of small endocrine changes. Similar observations have been made in the sewage sludge model, however, while animal studies have been insightful in providing valuable information about the range of effects that can be attributed to in utero exposure to EDCs, varying levels of maternal doses administered in different studies exaggerated extrapolation of these results to human. Thus the EDC concentration representative of fetal exposure levels is uncertain because of the complexities of its nature. So far, the level of fetal exposure can only be roughly estimated. There is substantial evidence from animal data to prove that EDCs can adversely affect reproductive development and function in male and more has accumulated on the mechanisms by which they exert their effects. This paper therefore, reviews previous studies to highlight the extent to which testis development can be disrupted during fetal life

    Child-mediated health communication: A conceptual framework for increasing stroke literacy in hard to reach populations

    Full text link
    Effectively engaging economically-disadvantaged ethnic minority communities for promoting health has proved to be challenging for a variety of reasons, including factors related to healthcare access, literacy, inadequate or ineffective cultural appropriateness of materials, and the relatively low priority for health due to competing demands related to economic hardship. We have developed a framework of Child-Mediated Health Communication (CMHC), which focuses on children as channels for carrying out health promotion interventions to parents and other caregivers. CMHC is an innovative, alternative strategy for engaging this underserved population, where traditional methods of health promotion have not been successful. We discuss the theoretical foundation, development, and effectiveness of a CMHC framework in our stroke preparedness communication intervention, Hip Hop Stroke

    Forensic extraction of user information in continuous block of evidence

    Get PDF
    Extraction of user information in the physical memory of Windows application is vital in today's digital investigation. Digital forensic community feels the urge for the development of tools and techniques in volatile memory analysis. However, there have been few investigations into the amount of relevant information that can be recovered from the application memory. In this research, we present the quantitative and qualitative results of experiments carried out on Windows applications. In conducting this research; we have identified the most commonly used applications on Windows systems, designed a methodology to capture data and processed that data. This research report the amount of evidence that was stored over time and recovered in continuous block of evidence in the physical memory
    • …
    corecore