2,235 research outputs found

    UK security breach investigations report: an analysis of data compromise cases

    Get PDF
    This report, rather than relying on questionnaires and self-reporting, concerns cases that were investigated by the forensic investigation team at 7Safe. Whilst removing any inaccuracies arising from self-reporting, the authors acknowledge that the limitation of the sample size remains. It is hoped that the unbiased reporting by independent investigators has yielded interesting facts about modern security breaches. All data in this study is based on genuine completed breach investigations conducted by the compromise investigation team over the last 18 months

    A modified flood severity assessment for enhanced decision support: application to the Boscastle flash flood of 2004

    No full text
    A modified flash flood severity assessment is presented, based on scoring a set of factors according to their potential for generating extreme catchment-scale flooding. Improvements are made to the index through incorporation of parameter uncertainties, managing data absence, and clearer graphical communication. The motive for proposing these changes is to better inform flood managers during the development of a flash flood that may require an emergency response. This modified decision-support system is demonstrated for the Boscastle flood of 2004 and other historical floods in the United Kingdom. For Boscastle, the extreme nature of the flood is underestimated, which is likely to be due to the lack of sophistication in weighting flood parameters. However, the proposed amendments are able to rapidly reflect the reliability of a catchment severity rating, which may further enhance this technique as a decision-support tool alongside radar observations of localized storms

    Spectral flow and Dixmier traces

    Get PDF
    We obtain general theorems which enable the calculation of the Dixmier trace in terms of the asymptotics of the zeta function and of the heat operator in a general semi-finite von Neumann algebra. Our results have several applications. We deduce a formula for the Chern character of an odd L(1,){\mathcal L}^{(1,\infty)}-summable Breuer-Fredholm module in terms of a Hochschild 1-cycle. We explain how to derive a Wodzicki residue for pseudo-differential operators along the orbits of an ergodic \IR^n action on a compact space XX. Finally we give a short proof an index theorem of Lesch for generalised Toeplitz operators

    Specimens as research objects: reconciliation across distributed repositories to enable metadata propagation

    Full text link
    Botanical specimens are shared as long-term consultable research objects in a global network of specimen repositories. Multiple specimens are generated from a shared field collection event; generated specimens are then managed individually in separate repositories and independently augmented with research and management metadata which could be propagated to their duplicate peers. Establishing a data-derived network for metadata propagation will enable the reconciliation of closely related specimens which are currently dispersed, unconnected and managed independently. Following a data mining exercise applied to an aggregated dataset of 19,827,998 specimen records from 292 separate specimen repositories, 36% or 7,102,710 specimens are assessed to participate in duplication relationships, allowing the propagation of metadata among the participants in these relationships, totalling: 93,044 type citations, 1,121,865 georeferences, 1,097,168 images and 2,191,179 scientific name determinations. The results enable the creation of networks to identify which repositories could work in collaboration. Some classes of annotation (particularly those regarding scientific name determinations) represent units of scientific work: appropriate management of this data would allow the accumulation of scholarly credit to individual researchers: potential further work in this area is discussed.Comment: 9 pages, 1 table, 3 figure
    corecore