783 resultados para cyber-bullying
Resumo:
El ciberespacio es un escenario de conflicto altamente complejo al estar en constante evolución. Ni la Unión Europea ni ningún otro actor del sistema internacional se encuentra a salvo de las amenazas procedentes del ciberespacio. Pero los pasos dados desde la UE en el mundo de la ciberseguridad no son en absoluto suficientes. Europa necesita que su Estrategia de ciberseguridad sea realmente capaz de integrar a las diferentes Estrategias nacionales. Es urgente una mayor determinación, unos mayores recursos y unos mejores instrumentos que permitan a la Unión implementar una gestión de crisis y una prevención de ciberconflictos verdaderamente eficaz.
Resumo:
Wessels, N. (2016). Ik ben een gelukkeling! Exploratief Onderzoek naar het Geluk van Basisschoolleerlingen binnen de Schoolcontext. Juli, 26, 2016, Heerlen, Nederland: Open Universiteit.
Resumo:
Compulsory education laws oblige primary and secondary schools to give each pupil positive encouragement in, for example, social, emotional, cognitive, creative, and ethical respects. This is a fairly smooth process for most pupils, but it is not as easy to achieve with others. A pattern of pupil, home or family, and school variables turns out to be responsible for a long-term process that may lead to a pupil’s dropping out of education. A systemic approach will do much to introduce more clarity into the diagnosis, potential reduction and possible prevention of some persistent educational problems that express themselves in related phenomena, for example low school motivation and achievement; forced underachievement of high ability pupils; concentration of bullying and violent behaviour in and around some types of classes and schools; and drop-out percentages that are relatively constant across time. Such problems have a negative effect on pupils, teachers, parents, schools, and society alike. In this address, I would therefore like to clarify some of the systemic causes and processes that we have identified between specific educational and pupil characteristics. Both theory and practice can assist in developing, implementing, and checking better learning methods and coaching procedures, particularly for pupils at risk. This development approach will take time and require co-ordination, but it will result in much better processes and outcomes than we are used to. First, I will diagnose some systemic aspects of education that do not seem to optimise the learning processes and school careers of some types of pupils in particular. Second, I will specify cognitive, social, motivational, and self-regulative aspects of learning tasks and relate corresponding learning processes to relevant instructional and wider educational contexts. I will elaborate these theoretical notions into an educational design with systemic instructional guidelines and multilevel procedures that may improve learning processes for different types of pupils. Internet-based Information and Communication Technology, or ICT, also plays a major role here. Third, I will report on concrete developments made in prototype research and trials. The development process concerns ICT-based differentiation of learning materials and procedures, and ICT-based strategies to improve pupil development and learning. Fourth, I will focus on the experience gained in primary and secondary educational practice with respect to implementation. We can learn much from such practical experience, in particular about the conditions for developing and implementing the necessary changes in and around schools. Finally, I will propose future research. As I hope to make clear, theory-based development and implementation research can join forces with systemic innovation and differentiated assessment in educational practice, to pave the way for optimal “learning for self-regulation” for pupils, teachers, parents, schools, and society at large.
Resumo:
Exclusion, discrimination and widespread disadvantage are issues common to the Traveller community. Children from the Traveller community are often seen as the most at risk within the education system in respect of attendance, attainment and bullying. In this article, we consider the views of Traveller children and parents with respect to primary level education in Northern Ireland and assess the level of support that exists to help Traveller children within the education system. The findings from the research are discussed with reference to institutional discrimination and the varying experiences of children and their families, including an identification of positive attitudes to education contrary to typical stereotypes.
Resumo:
Executive summary
Digital systems have transformed, and will continue to transform, our world. Supportive government policy, a strong research base and a history of industrial success make the UK particularly well-placed to realise the benefits of the emerging digital society. These benefits have already been substantial, but they remain at risk. Protecting the benefits and minimising the risks requires reliable and robust cybersecurity, underpinned by a strong research and translation system.
Trust is essential for growing and maintaining participation in the digital society. Organisations earn trust by acting in a trustworthy manner: building systems that are reliable and secure, treating people, their privacy and their data with respect, and providing credible and comprehensible information to help people understand how secure they are.
Resilience, the ability to function, adapt, grow, learn and transform under stress or in the face of shocks, will help organisations deliver systems that are reliable and secure. Resilient organisations can better protect their customers, provide more useful products and services, and earn people’s trust.
Research and innovation in industry and academia will continue to make important contributions to creating this resilient and trusted digital environment. Research can illuminate how best to build, assess and improve digital systems, integrating insights from different disciplines, sectors and around the globe. It can also generate advances to help cybersecurity keep up with the continued evolution of cyber risks.
Translation of innovative ideas and approaches from research will create a strong supply of reliable, proven solutions to difficult to predict cybersecurity risks. This is best achieved by maximising the diversity and number of innovations that see the light of day as products.
Policy, practice and research will all need to adapt. The recommendations made in this report seek to set up a trustworthy, self-improving and resilient digital environment that can thrive in the face of unanticipated threats, and earn the trust people place in it.
Innovation and research will be particularly important to the UK’s economy as it establishes a new relationship with the EU. Cybersecurity delivers important economic benefits, both by underpinning the digital foundations of UK business and trade and also through innovation that feeds directly into growth. The findings of this report will be relevant regardless of how the UK’s relationship to the EU changes.
Headline recommendations
● Trust: Governments must commit to preserving the robustness of encryption, including end-to-end encryption, and promoting its widespread use. Encryption is a foundational security technology that is needed to build user trust, improve security standards and fully realise the benefits of digital systems.
● Resilience: Government should commission an independent review of the UK’s future cybersecurity needs, focused on the institutional structures needed to support resilient and trustworthy digital systems in the medium and longer term. A self-improving, resilient digital environment will need to be guided and governed by institutions that are transparent, expert and have a clear and widely-understood remit.
● Research: A step change in cybersecurity research and practice should be pursued; it will require a new approach to research, focused on identifying ambitious high-level goals and enabling excellent researchers to pursue those ambitions. This would build on the UK's existing strengths in many aspects of cybersecurity research and ultimately help build a resilient and trusted digital sector based on excellent research and world-class expertise.
● Translation: The UK should promote a free and unencumbered flow of cybersecurity ideas from research to practical use and support approaches that have public benefits beyond their short term financial return. The unanticipated nature of future cyber threats means that a diverse set of cybersecurity ideas and approaches will be needed to build resilience and adaptivity. Many of the most valuable ideas will have broad security benefits for the public, beyond any direct financial returns.
Resumo:
Network security monitoring remains a challenge. As global networks scale up, in terms of traffic, volume and speed, effective attribution of cyber attacks is increasingly difficult. The problem is compounded by a combination of other factors, including the architecture of the Internet, multi-stage attacks and increasing volumes of nonproductive traffic. This paper proposes to shift the focus of security monitoring from the source to the target. Simply put, resources devoted to detection and attribution should be redeployed to efficiently monitor for targeting and prevention of attacks. The effort of detection should aim to determine whether a node is under attack, and if so, effectively prevent the attack. This paper contributes by systematically reviewing the structural, operational and legal reasons underlying this argument, and presents empirical evidence to support a shift away from attribution to favour of a target-centric monitoring approach. A carefully deployed set of experiments are presented and a detailed analysis of the results is achieved.
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.
Resumo:
Malware detection is a growing problem particularly on the Android mobile platform due to its increasing popularity and accessibility to numerous third party app markets. This has also been made worse by the increasingly sophisticated detection avoidance techniques employed by emerging malware families. This calls for more effective techniques for detection and classification of Android malware. Hence, in this paper we present an n-opcode analysis based approach that utilizes machine learning to classify and categorize Android malware. This approach enables automated feature discovery that eliminates the need for applying expert or domain knowledge to define the needed features. Our experiments on 2520 samples that were performed using up to 10-gram opcode features showed that an f-measure of 98% is achievable using this approach.
Resumo:
Android is becoming ubiquitous and currently has the largest share of the mobile OS market with billions of application downloads from the official app market. It has also become the platform most targeted by mobile malware that are becoming more sophisticated to evade state-of-the-art detection approaches. Many Android malware families employ obfuscation techniques in order to avoid detection and this may defeat static analysis based approaches. Dynamic analysis on the other hand may be used to overcome this limitation. Hence in this paper we propose DynaLog, a dynamic analysis based framework for characterizing Android applications. The framework provides the capability to analyse the behaviour of applications based on an extensive number of dynamic features. It provides an automated platform for mass analysis and characterization of apps that is useful for quickly identifying and isolating malicious applications. The DynaLog framework leverages existing open source tools to extract and log high level behaviours, API calls, and critical events that can be used to explore the characteristics of an application, thus providing an extensible dynamic analysis platform for detecting Android malware. DynaLog is evaluated using real malware samples and clean applications demonstrating its capabilities for effective analysis and detection of malicious applications.
Resumo:
Emerging cybersecurity vulnerabilities in supervisory control and data acquisition (SCADA) systems are becoming urgent engineering issues for modern substations. This paper proposes a novel intrusion detection system (IDS) tailored for cybersecurity of IEC 61850 based substations. The proposed IDS integrates physical knowledge, protocol specifications and logical behaviours to provide a comprehensive and effective solution that is able to mitigate various cyberattacks. The proposed approach comprises access control detection, protocol whitelisting, model-based detection, and multi-parameter based detection. This SCADA-specific IDS is implemented and validated using a comprehensive and realistic cyber-physical test-bed and data from a real 500kV smart substation.
Resumo:
Det gemensamma intresset för konflikter grundade idén att studera väl ansedda ledares perspektiv på arbetsplatskonflikter och hur dessa ledare löser konflikter konstruktivt. I grunden finns en undran om väl ansedda ledare har förmågor som gör att de löser konflikter mer konstruktivt. Konflikter utgör en stor del av en ledares arbetstid. Konflikter kan förmodligen inte undvikas men hur konflikter hanteras är avgörande för att en organisation och dess anställda skall mogna och utvecklas. Det har utövats forskning inom konflikthantering utifrån ett ledarskapsperspektiv men de studierna har haft en kvantitativ ansats. Studiens syfte är att undersöka hur väl ansedda chefer ser på arbetsplatskonflikter och hur dessa chefer hanterar konflikter. Ett delsyfte är att erhålla kunskap om vilka metoder ansedda ledare använder i konflikthantering. För att besvara syftet har följande frågeställningar använts: Vilka typer av arbetsplatskonflikter uppstår i en organisation? Vad är avgörande om konflikter blir konstruktiva eller destruktiva? Vad har ledarskapet för inverkan på konflikthantering och hur ska ledaren ta sig an konflikter? Vilka förmågor och egenskaper har ledare som hanterar konflikter effektivt? Studien grundar sig på en kvalitativ ansats med semistrukturerade intervjuer som insamlingsmetod. Det införskaffade materialet kodades och tematiserades. Resultaten analyserades med hjälp av teoriramen. Slutligen användes Rahims (2002) teori om conflict management i diskussion då det i resultatet framkom stöd för modellen, dock med en utveckling vilket presenteras i slutsatsen. I studiens analys framkom att ledare som hanterar konflikter konstruktivt behärskar tre huvudområden. Dessa förmågor är människoorienterad, uppgiftsorienterad och lärande- och kulturorienterad. Väl ansedda ledare manövrerar emellan dessa förmågor beroende på situation. I studiens resultat framkom också att undvikande och dominant ledarskapsbeteende skapar barriärer i konflikthantering.
Resumo:
Thèse réalisée en cotutelle avec l'université Paris1-Sorbonne
Resumo:
This work explores the development of MemTri. A memory forensics triage tool that can assess the likelihood of criminal activity in a memory image, based on evidence data artefacts generated by several applications. Fictitious illegal suspect activity scenarios were performed on virtual machines to generate 60 test memory images for input into MemTri. Four categories of applications (i.e. Internet Browsers, Instant Messengers, FTP Client and Document Processors) are examined for data artefacts located through the use of regular expressions. These identified data artefacts are then analysed using a Bayesian Network, to assess the likelihood that a seized memory image contained evidence of illegal activity. Currently, MemTri is under development and this paper introduces only the basic concept as well as the components that the application is built on. A complete description of MemTri coupled with extensive experimental results is expected to be published in the first semester of 2017.
Resumo:
The global financial crisis has had innumerate outcomes around the globe. Whilst most of these are generally perceived to be negative, there are outcomes which could be considered positive for society. One such outcome is the spotlight that the financial crisis has shone on corruption within organisations and in particular, the role that destructive leaders play in the promotion of negative behaviours within organisations. This interest in identifying so-called ‘dark-side’ traits in leaders is a positive step both academically and practically. Academically, there is a limited research examining individuals with ‘dark-traits’ within organisations (Mahmut, Homewood & Stevenson, 2008). Practically, most leader derailment can be attributed to ‘dark-side’ traits and leaders with such traits are implicated in a host of issues for organisations including poor staff morale and satisfaction, bullying, poor levels of productivity, high staff turnover, unethical behaviour and even white collar crime (e.g. Boddy,2010; 2011; Lesha & Lesha, 2012; O’Boyle, Forsyth, Banks & McDaniel, 2012; Sanecka, 2013). This paper focuses on one of the ‘dark-side’ traits; psychopathy. Psychopathy is a personality disorder characterised by guiltlessness, incapacity to experience love, impulsivity, shallow emotions, superficial charm and an inability to learn from experience (Cleckley, 1941, 1982). Research has found that individuals with high levels of psychopathy can be found working within organisations and experiencing some degree of career success (e.g. Babiak, Neumann & Hare, 2010; Board & Fritzon, 2005; Boddy, 2010; Lilienfeld, Latzman, Watts, Smith & Dutton, 2014). These individuals are theoretically thought to be attracted to careers which offer power, status and monetary rewards. In particular, the finance industry has been suggested as an ideal work place for the organisational psychopath. Some authors go as far as attribute organisational psychopaths a key role in the financial crisis (Boddy, 2011). However, little research has been conducted to explore whether levels of psychopathy in employees differ across industries and what careers might be most attractive to individuals with high levels of psychopathy. This paper presents the results of a large scale survey of 265 alumni of universities in the Central England region of the UK. The survey was conducted to assess the link between levels of three factors of psychopathy (Egotism, Callousness and Antisocialism) with occupation as defined by Holland’s RIASEC model. Participants completed Brinkley, Diamond, Magaletta & Heigel’s (2008) revision of Levenson’s Self-Report Psychopathy Scale and responded to questions regarding their current occupation. Logistic regression analyses were conducted to assess whether levels of Egotism, Callousness and Antisocialism were predictive of occupation. The results showed that when compared to individuals who occupy job roles within the Social sector of Holland’s model, individuals with higher levels of psychopathy were more likely to be employed within Realistic, Investigative, Enterprising and Conventional roles. When comparing Social and Realistic roles, more Egotistical individuals were likely to be employed within Realistic roles. When comparing those employed in Social roles to Investigative, Enterprising and Conventional roles, individuals with higher levels of Antisocialism were more likely to be employed within the latter three occupations than within Social roles. This suggests that individuals with psychopathy do gravitate towards certain career paths. Social roles where job incumbents are required to be caring and interact with others to a large extent appear to be unattractive to individuals with high levels of psychopathy. Social roles are also associated with lower monetary rewards and are generally less prestigious (Henley, 2001). These individuals instead seek out occupations where there are higher levels of risk, power and reward. Roles in the Realistic category include those which include high levels of risk e.g. fighter pilot, fireman etc., (Cohen, Meir, Segal & Amar, 2003). Investigative careers hold the highest level of prestige and ranking. Enterprising roles include management positions where power is wielded over subordinates and sales roles, where customers can be manipulated (ACT, 2009). Conventional roles include those within the finance industry, which include some of the most financially lucrative positive available (Babiak & Hare, 2006). The above suggests that individuals with higher levels of psychopathy may be seeking to satisfy their self-centred natures by selecting careers which provide them with high levels of reward in one way or another. Alternatively, these individuals may select roles where their traits can be accepted. The importance of Antisocialism in predicting occupation may be testament to the importance of finding a career which ‘fits’ such traits. Antisocialism is generally associated with negative outcomes in the workplace (Ettner, MacLean & French, 2010). Therefore, finding environments tolerant of antisocial tendencies may be a priority for individuals with high levels of these traits. The results suggest that Enterprising, Investigative and Conventional work environments may be tolerant of Antisocialism in employees and Realistic environments tolerant of Egotism. Academically, the results show that there is value in studying ‘dark-side’ characteristics in organisations. Individuals with higher levels of psychopathic traits, do not appear to randomly enter employment. Instead, they appear to gravitate to careers which meet their needs and/or tolerate their traits. It is important to further explore what industries and positions are particularly attractive to individuals with higher levels of psychopathy and what makes them attractive to these individuals. Such knowledge is important for practitioners to be able to advise organisations as to the likely level of risk they face of employing organisational psychopaths and to enable organisations which are particularly attractive to highly psychopathic employees to design selection systems which detect undesirable traits in candidates. Furthermore, organisations can examine their culture to assess whether traits such as antisocialism are tolerated (or even rewarded) and what the implications of this are.
Resumo:
Abstract—With the proliferation of Software systems and the rise of paradigms such the Internet of Things, Cyber- Physical Systems and Smart Cities to name a few, the energy consumed by software applications is emerging as a major concern. Hence, it has become vital that software engineers have a better understanding of the energy consumed by the code they write. At software level, work so far has focused on measuring the energy consumption at function and application level. In this paper, we propose a novel approach to measure energy consumption at a feature level, cross-cutting multiple functions, classes and systems. We argue the importance of such measurement and the new insight it provides to non-traditional stakeholders such as service providers. We then demonstrate, using an experiment, how the measurement can be done with a combination of tools, namely our program slicing tool (PORBS) and energy measurement tool (Jolinar).