14 research outputs found

    A NOVEL FRAMEWORK FOR SOCIAL INTERNET OF THINGS: LEVERAGING THE FRIENDSHIPS AND THE SERVICES EXCHANGED BETWEEN SMART DEVICES

    Get PDF
    As humans, we tackle many problems in complex societies and manage the complexities of networked social systems. Cognition and sociability are two vital human capabilities that improve social life and complex social interactions. Adding these features to smart devices makes them capable of managing complex and networked Internet of Things (IoT) settings. Cognitive and social devices can improve their relationships and connections with other devices and people to better serve human needs. Nowadays, researchers are investigating two future generations of IoT: social IoT (SIoT) and cognitive IoT (CIoT). This study develops a new framework for IoT, called CSIoT, by using complexity science concepts and by integrating social and cognitive IoT concepts. This framework uses a new mechanism to leverage the friendships between devices to address service management, privacy, and security. The framework addresses network navigability, resilience, and heterogeneity between devices in IoT settings. This study uses a new simulation tool for evaluating the new CSIoT framework and evaluates the privacy-preserving ability of CSIoT using the new simulation tool. To address different CSIoT security and privacy issues, this study also proposes a blockchain-based CSIoT. The evaluation results show that CSIoT can effectively preserve the privacy and the blockchain-based CSIoT performs effectively in addressing different privacy and security issues

    Understanding Deterrence Theory in Security Compliance Behavior: A Quantitative Meta-Analysis Approach

    Get PDF
    Nowadays, one of the major concerns in assuring information systems security (ISS) is the employees’ non-compliance behavior. Several studies have investigated compliance behavior by utilizing several behavioral theories and models. Deterrence theory is one of the widely used theories in ISS literature in order to investigate compliance behavior. Based on this theory, behaviors can be controlled by the threat of severe, certain and swift sanctions. This study aims to conduct a quantitative meta-analysis of existing literature to investigate relationship between constructs of deterrence theory (severity, certainty and celerity) and compliance behavior of employees. Results show that deterrence theory has not a remarkable impact on employees’ compliance behavior

    Defining Objectives For Securing The Internet Of Things: A Value-Focused Thinking Approach

    Get PDF
    Over the past few years Internet of Things (IoT) has touched most people. Companies have been competing with each other in inventing new IoT based products and services. It has become a real business opportunity for various companies and a luxury for end users. Yet, the research on securing the Internet of Things (IoT) is in its infancy. In this study, we use the “value-focused thinking” approach to systematically identify IoT security values and objectives from 58 IT professionals. This study provides a foundation for strategically planning and thinking about IoT security. We present four fundamental objectives and thirteen means objectives. The results of this qualitative study will help researchers and practitioners identify and prioritize key IoT security issues

    Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model

    Get PDF
    Modern organizations have to utilize proper methods for ensuring the employees’ compliance with security policies. Investigating the employees’ compliance behavior is important issue for IS security management success. Several researchers have studied the compliance behavior by using different conceptual models including technology acceptance model (TAM), theory of planned behavior (TPB), deterrence, neutralization and etc. However, there is no study for investigating continuance of the security compliance. It is very important for organizations that employees comply with IS security policies and continue complying. This study aims to fill this gap on IS security research and to probe the important factors that lead employees to have continuous security compliance behavior by using IS continuance model. The analysis of data collected from 270 employees in banking organizations shows that employees’ perceived satisfaction, perceived usefulness, security awareness and normative believes directly influence continuance intention to comply with IS security policies

    Clinical Efficacy of ONC201 in H3K27M-Mutant Diffuse Midline Gliomas Is Driven by Disruption of Integrated Metabolic and Epigenetic Pathways

    Get PDF
    UNLABELLED Patients with H3K27M-mutant diffuse midline glioma (DMG) have no proven effective therapies. ONC201 has recently demonstrated efficacy in these patients, but the mechanism behind this finding remains unknown. We assessed clinical outcomes, tumor sequencing, and tissue/cerebrospinal fluid (CSF) correlate samples from patients treated in two completed multisite clinical studies. Patients treated with ONC201 following initial radiation but prior to recurrence demonstrated a median overall survival of 21.7 months, whereas those treated after recurrence had a median overall survival of 9.3 months. Radiographic response was associated with increased expression of key tricarboxylic acid cycle-related genes in baseline tumor sequencing. ONC201 treatment increased 2-hydroxyglutarate levels in cultured H3K27M-DMG cells and patient CSF samples. This corresponded with increases in repressive H3K27me3 in vitro and in human tumors accompanied by epigenetic downregulation of cell cycle regulation and neuroglial differentiation genes. Overall, ONC201 demonstrates efficacy in H3K27M-DMG by disrupting integrated metabolic and epigenetic pathways and reversing pathognomonic H3K27me3 reduction. SIGNIFICANCE The clinical, radiographic, and molecular analyses included in this study demonstrate the efficacy of ONC201 in H3K27M-mutant DMG and support ONC201 as the first monotherapy to improve outcomes in H3K27M-mutant DMG beyond radiation. Mechanistically, ONC201 disrupts integrated metabolic and epigenetic pathways and reverses pathognomonic H3K27me3 reduction. This article is featured in Selected Articles from This Issue, p. 2293

    Organizasyon çalışanlarının bilgi sistemleri güvenlik politikalarına uymaya devam etmeleri : bilgi sistemleri sürekliliği modelinden çıkarımlar

    No full text
    Nowadays Information Systems (IS) are crucial for the survival of the modern organizations since they usually hold critical and valuable organizational data. Because of the potential threats like misuse, theft and destruction of the important data, It is obvious that organizations have to use several methods to keep their IS assets safe. In other words, the modern organizations should have a well-established IS security policy to address security issues. As employees are the weakest link in the security chain, having well-established security policies is not enough for solving security problems completely. They should also utilize proper methods for ensuring the employees’ compliance with security policies. So investigating the employees’ compliance behavior is important issue for IS security management success. Several researchers have studied the compliance behavior by using different conceptual models including technology acceptance model (TAM), theory of planned behavior (TPB), deterrence, neutralization and etc. However, there is no study for investigating continuance of the security compliance. It is very important for organizations that employees comply with IS security policies and continue complying. This study aims to fill this gap on IS security research and to probe the important factors that lead employees to have continuous security compliance behavior by using IS continuance model. The analysis of data collected from 270 employees in banking organizations shows that employees’ perceived satisfaction and perceived usefulness directly influence continuance intention to comply with IS security policies.M.S. - Master of Scienc

    Quetiapine reverse paclitaxel-induced neuropathic pain in mice: Role of Alpha2- adrenergic receptors

    No full text
    Objective(s): Paclitaxel-induced peripheral neuropathy is a common adverse effect of cancer chemo -therapy. This neuropathy has a profound impact on quality of life and patient’s survival. Preventing and treating paclitaxel-induced peripheral neuropathy is a major concern. First- and second-generation antipsychotics have shown analgesic effects both in humans and animals. Quetiapine is a novel atypical antipsychotic with low propensity to induce extrapyramidal or hyperprolactinemia side effects. The present study was designed to investigate the effects of quetiapine on the development and expression of neuropathic pain induced by paclitaxel in mice and the role of α2-adrenoceptors on its antinociception. Materials and Methods: Paclitaxel (2 mg/kg IP) was injected for five consecutive days which resulted in thermal hyperalgesia and mechanical and cold allodynia. Results: Early administration of quetiapine from the 1st day until the 5th day (5, 10, and 15 mg/kg PO) did not affect thermal, mechanical, and cold stimuli and could not prevent the development of neuropathic pain. In contrast, when quetiapine (10 and 15 mg/kg PO) administration was started on the 6th day after the first paclitaxel injections, once the model had been established, and given daily until the 10th day, heat hyperalgesia and mechanical and cold allodynia were significantly attenuated. Also, the effect of quetiapine on heat hyperalgesia was reversed by pretreatment with yohimbine, as an alpha-2 adrenergic receptor antagonist. Conclusion: These results indicate that quetiapine, when administered after nerve injury can reverse the expression of neuropathic pain. Also, we conclude that α2-adrenoceptors participate in the antinociceptive effects of quetiapine
    corecore