Confronting Cyber Risk

Author(s):  
Gregory J. Falco ◽  
Eric Rosenbach

Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization.

Author(s):  
Dayane Gabriele Alves Silveira

The purposes of this study were: (1) examine the literature about innovation diffusion; (2) conduct a literature review on the innovation-decision process; (3) identify factors affecting the success of an innovation; (4) to determine a new strategy for diffusion of innovation. A structured search of the internet was undertaken to identify and appraise direct relationship between opinion leaders and diffusion of innovation. Models for describing the pattern of the diffusion processes for innovations are used by researchers. The present study went beyond the global structure of network to understand the actual position of the actors within the innovation networks. To do this, a strategy was needed that went to understand from the macro to the micro level, and then returned to the macro level to explain the structure of the authorship in innovation networks.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Varaporn Pothipala ◽  
Prae Keerasuntonpong ◽  
Carolyn Cordery

Purpose Thailand is a developing economy underpinned by high levels of wealth inequality and an ingrained patronage culture. This research aims to examine how social enterprises (SEs) have been encouraged in Thailand in recent years as “micro-level challenges” to capitalism and their potential impact in addressing inequality. Design/methodology/approach Through analysing policy documents and consultations, this paper traces the development of Thai policies intended to encourage SEs’ development. Additionally, the paper uses case study interviews and documents to demonstrate how SEs tackle inequality. From these, a framework is developed, outlining SEs’ roles and interventions to reduce inequality. Findings Thailand’s new policy is in contrast to those countries where SEs face policy neglect. Nevertheless, government has been slow to embed processes to encourage new SEs. Despite SEs’ “challenge” to capitalism, listed companies are increasingly providing in-kind and financial support. The case study data shows SEs reduce inequality as they work with rural citizens to increase their employment and incomes. This work may also contribute to diminishing rural citizens’ dependency on political patronage. Research limitations/implications While SEs can address inequality gaps, the research includes only existing SEs on specific lists. Nevertheless, the Thai experience will be useful to other developing countries, especially those beset by political patronage. Originality/value The research shows legislation is insufficient to support SE growth and inequality reduction. The framework highlights the need for both government policy attention and interventions from donors and companies to support SEs’ efforts.


2008 ◽  
pp. 4-19 ◽  
Author(s):  
A. Libman

The last decades witnessed the increasing importance of econometric methods and empirical research in economics. The success of the empirical turn in economics depends on the formats and problems of communication between theory and empirics. The paper considers potential difficulties in communication "from the theory to empirical research" and "from empirical research to theory". It analyzes the role of informal consensus as an instrument facilitating such communication and potential impact of this consensus on the direction of research.


2021 ◽  
Vol 13 (15) ◽  
pp. 8351
Author(s):  
Brack W. Hale

The benefits from educational travel programs (ETPs) for students have been well-documented in the literature, particularly for programs looking at sustainability and environmental issues. However, the impacts the ETPs have on the destinations that host them have been less frequently considered; most of these studies focus, understandably, on destinations in the Global South. This paper draws on a framework of sustainable educational travel to examine how ETPs affect their host destinations in two case study destinations, based on the author’s professional experience in these locations, interviews with host organizations that use the lens of the pandemic, and information from government databases. The findings highlight an awareness of the sustainability of the destination, the importance of good, local partnerships with organizations well-connected in their communities, and educational activities that can benefit both students and hosts. Nonetheless, we have a long way to go to understand the full impacts of ETPs on their host destinations and thus truly learn to avoid them.


Toxins ◽  
2021 ◽  
Vol 13 (7) ◽  
pp. 496
Author(s):  
Ana Campos-Ríos ◽  
Lola Rueda-Ruzafa ◽  
Salvador Herrera-Pérez ◽  
Paula Rivas-Ramírez ◽  
José Antonio Lamas

Visceral pain is one of the most common symptoms associated with functional gastrointestinal (GI) disorders. Although the origin of these symptoms has not been clearly defined, the implication of both the central and peripheral nervous systems in visceral hypersensitivity is well established. The role of several pathways in visceral nociception has been explored, as well as the influence of specific receptors on afferent neurons, such as voltage-gated sodium channels (VGSCs). VGSCs initiate action potentials and dysfunction of these channels has recently been associated with painful GI conditions. Current treatments for visceral pain generally involve opioid based drugs, ≠≠which are associated with important side-effects and a loss of effectiveness or tolerance. Hence, efforts have been intensified to find new, more effective and longer-lasting therapies. The implication of VGSCs in visceral hypersensitivity has drawn attention to tetrodotoxin (TTX), a relatively selective sodium channel blocker, as a possible and promising molecule to treat visceral pain and related diseases. As such, here we will review the latest information regarding this toxin that is relevant to the treatment of visceral pain and the possible advantages that it may offer relative to other treatments, alone or in combination.


2021 ◽  
Vol 2 (1) ◽  
pp. 1-23
Author(s):  
Ziya Alper Genç ◽  
Gabriele Lenzini ◽  
Daniele Sgandurra

To protect their digital assets from malware attacks, most users and companies rely on antivirus (AV) software. AVs’ protection is a full-time task against malware: This is similar to a game where malware, e.g., through obfuscation and polymorphism, denial of service attacks, and malformed packets and parameters, tries to circumvent AV defences or make them crash. However, AVs react by complementing signature-based detection with anomaly or behavioral analysis, and by using OS protection, standard code, and binary protection techniques. Further, malware counter-acts, for instance, by using adversarial inputs to avoid detection, and so on. In this cat-and-mouse game, a winning strategy is trying to anticipate the move of the adversary by looking into one’s own weaknesses, seeing how the adversary can penetrate them, and building up appropriate defences or attacks. In this article, we play the role of malware developers and anticipate two novel moves for the malware side to demonstrate the weakness in the AVs and to improve the defences in AVs’ side. The first one consists in simulating mouse events to control AVs, namely, to send them mouse “clicks” to deactivate their protection. We prove that many AVs can be disabled in this way, and we call this class of attacks Ghost Control . The second one consists in controlling whitelisted applications, such as Notepad, by sending them keyboard events (such as “copy-and-paste”) to perform malicious operations on behalf of the malware. We prove that the anti-ransomware protection feature of AVs can be bypassed if we use Notepad as a “puppet” to rewrite the content of protected files as a ransomware would do. Playing with the words, and recalling the cat-and-mouse game, we call this class of attacks Cut-and-Mouse . We tested these two attacks on 29 AVs, and the results show that 14 AVs are vulnerable to Ghost Control attack while all 29 AV programs tested are found vulnerable to Cut-and-Mouse . Furthermore, we also show some weaknesses in additional protection mechanisms of AVs, such as sandboxing and CAPTCHA verification. We have engaged with the affected AV companies, and we reported the disclosure communication with them and their responses.


2021 ◽  
pp. 026858092199469
Author(s):  
Gowoon Jung

Scholarship on marriage migrants has examined the impact of class and gender ideology of receiving countries on their marital satisfaction. However, little is known about the role of transnational background in explaining women’s feelings of gratitude for husbands. Drawing on qualitative in-depth interviews with marriage migrant women residing in the eastern side of Seoul, Korea, this article explores the micro-level cognitive processes in understanding women’s gratitude for their husbands. Categorizing marriage migrants into two groups, ‘gratified’ and ‘ungratified’ wives, the author demonstrates how the gratified wives’ feelings of contentment is mediated by their active comparison of Korean husbands with local men in their homelands, and how these viewpoints conversely affect their aspirations for return. Bringing the sociology of emotion into an explanation of marriage migrants’ marital satisfaction, this study aims to develop a transnational frame of reference as an underlying dynamic for comprehending marriage migrants’ (in)gratitude.


1999 ◽  
Vol 1 (3) ◽  
pp. 103-108 ◽  
Author(s):  
N. S. Stanley

This article reviews the development and potential impact of Digitally Reconstructed Radiographs (DRR's) in the planning and verification of radiotherapy treatments. It explores the requirements for the creation of usable DRR's their integration into current verification methods and it highlights some of the factors that may influence the routine use of DRR's. Continuing developments in radiotherapy techniques demand increasingly accurate verification methods. DRR's provide an efficient and effective representation of planned treatments for comparison with both simulator and portal images, encompassing the digital imaging technology which is the future of radiotherapy treatment verification.


Sign in / Sign up

Export Citation Format

Share Document