scholarly journals Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity

2022 ◽  
Vol 22 (2) ◽  
pp. 1-27
Author(s):  
Tingmin Wu ◽  
Wanlun Ma ◽  
Sheng Wen ◽  
Xin Xia ◽  
Cecile Paris ◽  
...  

Computer users are generally faced with difficulties in making correct security decisions. While an increasingly fewer number of people are trying or willing to take formal security training, online sources including news, security blogs, and websites are continuously making security knowledge more accessible. Analysis of cybersecurity texts from this grey literature can provide insights into the trending topics and identify current security issues as well as how cyber attacks evolve over time. These in turn can support researchers and practitioners in predicting and preparing for these attacks. Comparing different sources may facilitate the learning process for normal users by creating the patterns of the security knowledge gained from different sources. Prior studies neither systematically analysed the wide range of digital sources nor provided any standardisation in analysing the trending topics from recent security texts. Moreover, existing topic modelling methods are not capable of identifying the cybersecurity concepts completely and the generated topics considerably overlap. To address this issue, we propose a semi-automated classification method to generate comprehensive security categories to analyse trending topics. We further compare the identified 16 security categories across different sources based on their popularity and impact. We have revealed several surprising findings as follows: (1) The impact reflected from cybersecurity texts strongly correlates with the monetary loss caused by cybercrimes, (2) security blogs have produced the context of cybersecurity most intensively, and (3) websites deliver security information without caring about timeliness much.

Author(s):  
Alika Guchua

Abstract: The article deals with new type of asymmetric warfare and hybrid war. The potential threats in international politics and global security issues, Euro-Atlantic Alliance policy of fighting against terrorism. A serious challenge to modern security creates many problems around the world. The beginning of the twenty-first century was marked by proliferation of hybrid wars, held between flexible and sophisticated adversaries engaged in asymmetric conflicts using various forms. The hybrid war is caused by a hybrid threat, a blend of military and non-military assets and operations, terrorism, guerrilla tactics, criminality and cyber attacks. The use of hybrid type tactics can ensure the achievement of the main objectives of an international actor, with a minimum of effort, usually without using the force, and can deny to the target/victim the possibility to take any defensive actions. The complexity, diversity, the nature and dynamics of contemporary conflicts represent challenges that should be widely studied. The war, be it ancient or modern, hybrid or not, is always complex and cannot be described by a single adjective. The work focuses on the role of NATO in ensuring peace worldwide in the context of new asymmetric threats. The aim of the research topic: analyzing global challenges, which pose a serious threat to international security.


2020 ◽  
Author(s):  
Karen McKenzie ◽  
Aja Murray ◽  
George Murray ◽  
Rachel Martin

Abstract There is an increasing emphasis on the importance of research having an impact on policy and practice. This can be more difficult to evidence in intellectual disability services because of the wide range of stakeholders involved. We evaluated whether an impact questionnaire covering: knowledge production, capacity building, informing policy and practice, social and economic benefits could successfully be used to evaluate the impact of research into and use of two screening questionnaires: the Learning Disability Screening Questionnaire (LDSQ) and Child and Adolescent Intellectual Disability Screening Questionnaire (CAIDS-Q). We conducted an online search for published peer reviewed and grey literature, and Internet resources that referenced LDSQ and/or CAIDS-Q. The resultant literature and resources were assessed for relevance and organized according to the categories outlined in the impact questionnaire. Evidence was found for all the areas of impact, with the largest body of evidence being in relation to informing policy and practice and social benefits and the least for economic benefits. The impact questionnaire provided the basis for a comprehensive and useful evaluative framework to assess impact, although there was some overlap between the different categories. The process of using it highlighted some wider issues to consider when attempting to evaluate impact. The results indicated that the research underpinning the LDSQ and CAIDS-Q had resulted in significant, generally positive, and wide-reaching impact on policy and practice in intellectual disability and other services, resulting in a number of positive outcomes.


Author(s):  
Nancy Houston

Perhaps the greatest challenge to cyber security is that people are inherently behind each cyber problem as well as its solution. The reality is that people have been stealing secrets and information and attacking others for thousands of years; the technology of the Internet just allows it to happen at a faster pace and on a larger scale. This chapter describes aspects of human behavior that impact cyber security efforts. Cognitive overload, bias, incentives and behavioral traits all affect the decision making of both those who develop policy and strategy, those who fall victim to cyber attacks, and those who initiate cyber attacks. Although limited research has been completed on the behavioral aspects of cyber security, many behavioral principles and models are applicable to cyber security issues.


Author(s):  
Nancy Houston

Perhaps the greatest challenge to cyber security is that people are inherently behind each cyber problem as well as its solution. The reality is that people have been stealing secrets and information and attacking others for thousands of years; the technology of the Internet just allows it to happen at a faster pace and on a larger scale. This chapter describes aspects of human behavior that impact cyber security efforts. Cognitive overload, bias, incentives and behavioral traits all affect the decision making of both those who develop policy and strategy, those who fall victim to cyber attacks, and those who initiate cyber attacks. Although limited research has been completed on the behavioral aspects of cyber security, many behavioral principles and models are applicable to cyber security issues.


2017 ◽  
Vol 31 (3) ◽  
pp. 286-301 ◽  
Author(s):  
Sharlene Chadwick ◽  
Joanne Travaglia

Purpose During the past decade, there has been increased attention into bullying behaviours in workplaces. Research to date has varied in design, the definition of what constitutes bullying behaviour, as well as the methods used to collect data and measure bullying incidence and prevalence. Nonetheless, studies demonstrate that bullying is a significant issue, which warrants an increased research focus to develop greater understanding of the concept, its effects and implications in, and for, the workplace. The purpose of this paper is to focus on capturing a range of international and Australian literature regarding workplace bullying behaviours in a health context from a management perspective. As a result, this paper identified the gaps in the literature when expanded specifically to an Australian health context. Design/methodology/approach The purpose of this review is to summarise the existing literature, both internationally and in Australia which examines workplace bullying behaviours in a health context from a management perspective. This describes the review of the literature on workplace bullying in a health context undertaken from January to April 2014. The “Preferred Reporting Systematic Reviews and Meta-Analyses” method was used to structure the review, which covered a wide range of literature from databases including MEDLINE, Embase, CINAHL and InformIT, as well as reports, and grey literature. Findings The review included 62 studies that met the inclusion criteria and reported either: factors contributing to workplace bullying, at least one significant example of workplace bullying behaviour or the impact of workplace bullying behaviours in a health context. Originality/value There is limited data on workplace bullying behaviours in an Australian health context. The literature supports there is value in future research to develop consistent definitions, policies, procedures and frameworks, which could help to prevent or address workplace bullying behaviours based on work being undertaken internationally.


2017 ◽  
Vol 24 (4) ◽  
pp. 67-76 ◽  
Author(s):  
Bogdan Landowski ◽  
Michał Pająk ◽  
Bogdan Żółtowski ◽  
Łukasz Muślewski

AbstractThis article deals with the modeling of the processes of operating both marine main and auxiliary engines. The paper presents a model of changes in operating conditions of ship’s internal combustion engine. The semi-Markov decision process was used to mathematically describe the process model of the engine. The developed model describes the effect of engine damage on the characteristics of its operation. A change in the input parameters of the model can simulate the influence of internal and external factors on the course of the analyzed process. A simplified calculation example is also presented for illustration purposes. The presented method together with developed algorithms and IT tools can be used to solve a wide range of problems related to the operation of marine main engines and other marine equipment as well as maritime and port facilities. This concerns primarily the economic, risk management and operational security issues of complex technical systems, as well as the readiness and reliability analysis of technical facilities.


2018 ◽  
Vol 28 (02) ◽  
pp. 1930002 ◽  
Author(s):  
Hongxia Chai ◽  
Gongxuan Zhang ◽  
Junlong Zhou ◽  
Jin Sun ◽  
Longxia Huang ◽  
...  

With the rapid development of embedded systems, users and services have been greatly facilitated while also experiencing security threats as a result of cyber-attacks and system vulnerabilities. Currently, the real-time embedded system (RTES) focus is to deal with these security issues. In this paper, we introduce a short review of security-aware techniques for RTES. We mainly discuss two common approaches to improve the security of RTESs. The first approach is achieved by exploring specific attacks. The second approach is realized by deploying security-guaranteed services. However, improving the security of embedded systems may cause excessive energy consumption at the same time. Therefore, we investigate the secure and energy-aware RTESs on a wide range of research. In addition, we study a number of common applications used in secure RETSs. This paper stands for providing awareness and better understanding of the current RTES research status as well as technical theory behind it. Hence, the RTES security issues are resolved.


2021 ◽  
Vol 10 (4) ◽  
pp. 583
Author(s):  
Natalia Booth ◽  
Nicki A. Dowling ◽  
Jason Landon ◽  
Dan I. Lubman ◽  
Stephanie S. Merkouris ◽  
...  

Affected others impacted by someone else’s gambling utilise numerous behaviour change strategies to minimise gambling-related harm but knowledge on what these strategies are and how they are implemented is limited. This study aimed to develop a comprehensive data-driven taxonomy of the types of self-help strategies used by affected others, and to categorize these into high-level behaviour change techniques (BCTs). Two taxonomies were developed using an inductive and deductive approach which was applied to a dataset of online sources and organised into the Rubicon model of action phases. These taxonomies were family-focused (how to reduce the impact of gambling harm on families) and gambler-focused (how to support the gambler in behaviour change). In total, 329 online sources containing 3536 different strategies were identified. The family-focused classification contained 16 BCTs, and the most frequent were professional support, financial management and planned consequences. The gambler-focused classification contained 11 BCTs, and the most frequent were feedback on behaviours, professional support and financial management. The majority of family- and gambler-focused BCTs fell under the actional phase of the Rubicon model. Grounded in lived experience, the findings highlight the need for intervention and resource development that includes a wide range of specific techniques that affected others can utilise.


Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


2016 ◽  
Vol 3 (2) ◽  
pp. 56-62
Author(s):  
R. Iskra ◽  
V. Vlizlo ◽  
R. Fedoruk

The results of our studies and the data of modern literature regarding the biological role of Cr(III) compounds in conditions of their application in the nutrition for pigs and cattle are discussed. The metabolic impact of Cr(III), coming from different sources – mineral and organic compounds, obtained by chemical synthesis or a nanotechnological method (chromium citrate), as well as in the form of biocomplexes from the cultural medium of Saccharomyces cerevisiae yeasts was analyzed. The metabolic connection between the impact of Cr(III) and the biosynthesis of some hormones – insulin, cortisol – as well as the sensitivity of some tissues and organs to the effect of chromium compounds was studied. A considerable part of the review material was dedicated to the metabolic effect of Cr(III) compounds on the reproductive function of pigs and cattle and their impact on the viability of the offspring and gametes of animals. The data about the stimulating effect of Cr(III) on the growth and development of the organism of piglets and calves, meat and milk performance of these species of animals are discussed. The relevance of dosing Cr(III) in the nutrition of pigs and cattle is highlighted.


Sign in / Sign up

Export Citation Format

Share Document