WorldWideScience

Sample records for cyber medical training

  1. Game Based Cyber Security Training: are Serious Games suitable for cyber security training?

    Directory of Open Access Journals (Sweden)

    Maurice Hendrix

    2016-03-01

    Full Text Available Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security professionals. Thus cyber security seems especially well-suited to Serious Games. This paper investigates whether games can be effective cyber security training tools. The study is conducted by means of a structured literature review supplemented with a general web search.While there are early positive indications there is not yet enough evidence to draw any definite conclusions. There is a clear gap in target audience with almost all products and studies targeting the general public and very little attention given to IT professionals and managers. The products and studies also mostly work over a short period, while it is known that short-term interventions are not particularly effective at affecting behavioural change.

  2. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  3. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  4. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  5. Development of cyber training system for nuclear fields

    International Nuclear Information System (INIS)

    Kim, Young Taek; Park, Jong Kyun; Lee, Eui Jin; Lee, Han Young; Choi, Nan Young

    2002-02-01

    This report describes on technical contents related cyber training system construct on KAERI Nuclear Training Center, and on using cases of cyber education in domestic and foreign countries. Also realtime training system through the internet and cyber training management system for atomic fields is developed. All users including trainee, course managers and lecturers can use new technical for create new paradigm

  6. Cognitive Task Analysis Based Training for Cyber Situation Awareness

    OpenAIRE

    Huang , Zequn; Shen , Chien-Chung; Doshi , Sheetal; Thomas , Nimmi; Duong , Ha

    2015-01-01

    Part 1: Innovative Methods; International audience; Cyber attacks have been increasing significantly in both number and complexity, prompting the need for better training of cyber defense analysts. To conduct effective training for cyber situation awareness, it becomes essential to design realistic training scenarios. In this paper, we present a Cognitive Task Analysis based approach to address this training need. The technique of Cognitive Task Analysis is to capture and represent knowledge ...

  7. Cyber visual training as a new method for the mastery of endoscopic surgery.

    Science.gov (United States)

    Takiguchi, S; Sekimoto, M; Yasui, M; Miyata, H; Fujiwara, Y; Yasuda, T; Yano, M; Monden, M

    2005-09-01

    We devised a new method incorporating cyber visual training whereby novices in endoscopic surgery are instructed via repetition of a video-recorded procedure. We then conducted a study designed to investigate the impact of this cyber visual training on the mastery of intracorporeal knot-tying as an endoscopic technique. For the cyber visual training a 10-min video of the same procedure was replayed at normal, slow, and rapid speeds or presented in a series of still images. The training was undertaken by 36 medical students and 1st year trainee doctors who had had no experience of endoscopic surgery. They were divided into three groups, each of all received the same introductory lecture. Group A was only given training with the instructor for 15 min. Group B trained with the instructor for 15 min and was allowed self-training for 10 min. Group C viewed the cyber video beforehand and then underwent training with the instructor for 15 min. For all participants, the time required to complete a knot-tying task was measured and the level of endoscopic skill before and after the training was assessed using a virtual reality system the minimally Invasive Surgical Trainer-Virtual Reality (MIST-VR), in terms of the following three parameters: time, errors, and efficiency of hand movements. The Steel-Dwass test was used to evaluate the differences among the three groups in task performance. Group C completed the knot-tying task faster than group A (p = 0.0375), but there were significant differences between groups A and B and groups B and C. There were no significant differences in the parameters assessed using the MIST-VR. Our new concept of cyber visual training is effective for mastering the knot-tying technique. This type of training should be widely applicable to other procedures, such as dissection, clipping, and hemostasis.

  8. ORGANIZING, TRAINING, AND RETAINING INTELLIGENCE PROFESSIONALS FOR CYBER OPERATIONS

    Science.gov (United States)

    2016-02-13

    in Education,” Preventing School Failure 57(3), (2013): 162-170. Wall , Andru, “Demystifying the Title 10-Title 50 Debate,” Harvard Law School...AIR WAR COLLEGE AIR UNIVERSITY ORGANIZING, TRAINING, AND RETAINING INTELLIGENCE PROFESSIONALS FOR CYBER OPERATIONS by Melissa A...to adequately organize, train and retain cyber expertise. This is especially true within Air Force intelligence, a critical component of the

  9. Medical cyber-physical systems: A survey.

    Science.gov (United States)

    Dey, Nilanjan; Ashour, Amira S; Shi, Fuqian; Fong, Simon James; Tavares, João Manuel R S

    2018-03-10

    Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD) systems to increase the efficiency and safety of the healthcare. It also can assist the specialists of medical device to overcome crucial issues related to medical devices, and the challenges facing the design of the medical device's network. The concept of the social networking and its security along with the concept of the wireless sensor networks (WSNs) are addressed. Afterward, the CPS systems and platforms have been established, where more focus was directed toward CPS-based healthcare. The big data framework of CPSs is also included.

  10. Cyber Security Training and Awareness Through Game Play

    National Research Council Canada - National Science Library

    Cone, Benjamin D; Thompson, Michael F; Irvine, Cynthia E; Nguyen, Thuy D

    2006-01-01

    Although many of the concepts included in staff cyber-security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization...

  11. Training organizational supervisors to detect and prevent cyber insider threats: two approaches

    Directory of Open Access Journals (Sweden)

    Dee H. Andrews

    2013-05-01

    Full Text Available Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instructional approaches for this training challenge – optimal path modelling and a competency-based approach. The paper concludes by discussing challenges of evaluating training for seldom occurring real world phenomena, like detecting a cyber-insider threat.

  12. A Video Game for Cyber Security Training and Awareness

    National Research Council Canada - National Science Library

    Cone, Benjamin D; Irvine, Cynthia E; Thompson, Michael F; Nguyen, Thuy D

    2006-01-01

    Although many of the concepts included in cyber security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization...

  13. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  14. Cyber Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  15. Training the Cyber Warrior

    OpenAIRE

    Fulp, J.D.

    2003-01-01

    This paper suggests the major educational components of a curriculum that is designed to educate individuals for job assignments as Information Assurance professionals - also known as: cyber warriors. It suggests a minimum common body of knowledge for all cyber warriors along with two major specialization categories: cyber tacticians and cyber strategists. The paper describes the distinction between tactician and strategist and offers a rough outline of the education each should receive.

  16. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  17. Enhanced Training for Cyber Situational Awareness in Red versus Blue Team Exercises

    Energy Technology Data Exchange (ETDEWEB)

    Carbajal, Armida J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Human Factors and Statistics; Stevens-Adams, Susan Marie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Risk and Reliability Analysis; Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cognitive Modeling; Nauer, Kevin S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cyber Security Technologies; Anderson, Benjamin Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Assurance Technologies and Assessment; Forsythe, James Chris [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cognitive Modeling

    2012-09-01

    This report summarizes research conducted through the Sandia National Laboratories Enhanced Training for Cyber Situational Awareness in Red Versus Blue Team Exercises Laboratory Directed Research and Development project. The objective of this project was to advance scientific understanding concerning how to best structure training for cyber defenders. Two modes of training were considered. The baseline training condition (Tool-Based training) was based on current practices where classroom instruction focuses on the functions of a software tool with various exercises in which students apply those functions. In the second training condition (Narrative-Based training), classroom instruction addressed software functions, but in the context of adversary tactics and techniques. It was hypothesized that students receiving narrative-based training would gain a deeper conceptual understanding of the software tools and this would be reflected in better performance within a red versus blue team exercise.

  18. CYBER FORENSICS COMPETENCY-BASED FRAMEWORK - AREVIEW

    OpenAIRE

    Elfadil Sabeil; Azizah Bt Abdul Manaf; Zuraini Ismail; Mohamed Abas

    2011-01-01

    Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful day‟s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education h...

  19. Cyber Learning Platform for Nuclear Education and Training

    International Nuclear Information System (INIS)

    Vojtela, Martin

    2014-01-01

    Cyber Learning Platform for Nuclear Education and Training: … support capacity building and knowledge transfer in the nuclear sector by empowering web-based development and dissemination of high-quality learning resources in a way that is cost-effective, scalable and easy to use …

  20. Generating realistic environments for cyber operations development, testing, and training

    Science.gov (United States)

    Berk, Vincent H.; Gregorio-de Souza, Ian; Murphy, John P.

    2012-06-01

    Training eective cyber operatives requires realistic network environments that incorporate the structural and social complexities representative of the real world. Network trac generators facilitate repeatable experiments for the development, training and testing of cyber operations. However, current network trac generators, ranging from simple load testers to complex frameworks, fail to capture the realism inherent in actual environments. In order to improve the realism of network trac generated by these systems, it is necessary to quantitatively measure the level of realism in generated trac with respect to the environment being mimicked. We categorize realism measures into statistical, content, and behavioral measurements, and propose various metrics that can be applied at each level to indicate how eectively the generated trac mimics the real world.

  1. Fighting cyber crime through cyber forensics first responder training

    CSIR Research Space (South Africa)

    Venter, JP

    2008-11-01

    Full Text Available behind traces that are of interest to cyber forensic scientists. Cyber forensics is the science of analysing traces in order to extract evidence for use in court or at formal hearings. This rapid rise in the use of ICT for criminal purposes necessitated...

  2. Automating cyber offensive operations for cyber challenges

    CSIR Research Space (South Africa)

    Burke, I

    2016-03-01

    Full Text Available with regards to attack automation. 2. Background on cyber games CTF exercises are offensive and defensive cyber training exercises whereby teams compete against one another to obtain flags or tokens hidden on various servers. In some cases these flags... are located on an opponent’s servers, which results in teams being required to attack adversary servers while maintaining defences on their own services (The National Cyber League 2013). These challenges are often time based and victors are determined based...

  3. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  4. Cyber crimes.

    Science.gov (United States)

    Nuzback, Kara

    2014-07-01

    Since it began offering cyber liability coverage in December 2011, the Texas Medical Liability Trust has received more than 150 cyber liability claims, most of which involved breaches of electronic protected health information. TMLT's cyber liability insurance will protect practices financially should a breach occur. The insurance covers a breach notification to customers and business partners, expenses for legal counsel, information security and forensic data services, public relations support, call center and website support, credit monitoring, and identity theft restoration services.

  5. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  6. Simulation of cyber attacks with applications in homeland defense training

    Science.gov (United States)

    Brown, Bill; Cutts, Andrew; McGrath, Dennis; Nicol, David M.; Smith, Timothy P.; Tofel, Brett

    2003-09-01

    We describe a tool to help exercise and train IT managers who make decisions about IP networks in the midst of cyber calamity. Our tool is interactive, centered around a network simulation. It includes various modes of communications one would use to make informed decisions. Our tool is capable of simulating networks with hundreds of components and dozens of players. Test indicate that it could support an exercise an order of magnitude larger and more complex.

  7. Teacher Training in a Synchronous Cyber Face-to-Face Classroom: Characterizing and Supporting the Online Teachers' Learning Process

    Science.gov (United States)

    Wang, Yuping; Chen, Nian-Shing; Levy, Mike

    2010-01-01

    This article discusses the learning process undertaken by language teachers in a cyber face-to-face teacher training program. Eight tertiary Chinese language teachers attended a 12-week training program conducted in an online synchronous learning environment characterized by multimedia-based, oral and visual interaction. The term "cyber…

  8. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  9. CyberWar, CyberTerror, CyberCrime

    CERN Document Server

    Mehan, Julie E

    2008-01-01

    CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today’s corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response.

  10. Recommendations for Model Driven Paradigms for Integrated Approaches to Cyber Defense

    Science.gov (United States)

    2017-03-06

    Human Cognitive Modeling in Cyber Security 13 4.1 Models of Human in the Cyber Detection Loop 14 4.2 Perception and Representation of the Cyber ...paradigm applied to cyber operations is likely to benefit traditional disciplines of cyber defense such as security , vulnerability analysis, intrusion...and simulation for full range of cyber specialties, not only for training and rehearsal. • Encourage participation of commercial companies , in NATO

  11. Cyber terrorism and cyber-crime – threats for cyber security

    OpenAIRE

    Ackoski, Jugoslav; Dojcinovski, Metodija

    2012-01-01

    This paper has aim to give contribution in supporting efforts against cyber threats recognized as a cyber terrorism and cyber crime. Also, it has aim to show future challenges related to cyber security and their emerging threats – cyber war, cyber terrorism and cyber crime. Accelerate weapon development called ICT (Information Communication Technology) which is developed every day faster and faster, and development of human conscious on higher level about consequences of ICT enormous pene...

  12. Cyber Friendly Fire

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    2011-09-01

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public

  13. Policing cyber hate, cyber threat and cyber terrorism

    OpenAIRE

    Chambers-Jones, C.

    2013-01-01

    In late August 2012 the Government Forum of Incident Response and Cyber security Teams (GFIRST) gathered in Atlanta to discuss cyber threats and how new realities are emerging and how new forms of regulation are needed. At the same time Policing cyber hate, cyber threat and cyber terrorism was published. This comprehensive book brings together a divergent problem and tackles each with a candid exploration. The book has ten chapters and covers aspects such as extortion via the internet, the ps...

  14. Cyber Forensics Ontology for Cyber Criminal Investigation

    Science.gov (United States)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  15. Cyber Crime & Cyber War – "Part of the Game": Cyber Security, Quo Vadis?

    Directory of Open Access Journals (Sweden)

    Karl H. Stingeder

    2015-09-01

    Full Text Available Welche Rolle spielt Cyber Crime gegenwärtig? Was unterscheidet Cyber Crime von Cyber War? Wie muss Cyber Security gestaltet sein, um effektiven Schutz nachhaltig zu gewährleisten? Cyber Crime-Aktivitäten kennzeichnen sich häufig durch eine einfache Zugänglichkeit von betrügerischem Know-How und technischen Hilfsmitteln. Bedingt durch eine schleppende und mangelhafte Umsetzung von koordinierten Gegenmaßnahmen, resultieren Cyber-Delikte in einem Low-Risk und High-Reward Szenario für Cyber-Kriminelle. Je organisierter und spezialisierter ein Cyber-Crime-Netzwerk gestaltet ist, desto größer wird das Schadenspotenzial. Cyber Crime ist der Überbegriff für betrügerische Aktivitäten über das Internet. Diese stützen sich auf das Vorbild von "traditionellen" Offline-Kriminalitätsverhaltensmustern, welche durch das technologische Spektrum des Internets einfach zugänglich sind. Nichtsdestoweniger ist es die technische Ausführung der Delikte, die ein wesentliches Unterscheidungsmerkmal zwischen Online- und Offline-Betrug bildet. Auch steht die für organisierte, kriminelle Verbindungen, so auch für Regierungen oder Terrororganisationen geringere Hemmschwelle für eine militärische Instrumentalisierung des Internets im Brennpunkt von Cyber Security. Erfolgen Cyber Crime Aktivitäten unter dem Anspruch der Verfolgung politischer Ziele, sprechen wir von Cyber War. Nachhaltige, gegen Cyber Crime und Cyber War gerichtete Cyber Security-Maßnahmen finden in einem hochdynamischen Umfeld statt. Cyber-Kriminelle sind im Regelfall logistisch und finanziell gut ausgestattet. Viele werden von Regierungen unterstützt. Cyber Crime-Player verfügen über weitreichende technische Fähigkeiten, sodass sie maßgeschneiderte Schadprogramme (Malware für ihre Ziele entwickeln können. Aktuell fehlt vielen Unternehmen und öffentlichen Institutionen das Bewusstsein für die Notwendigkeit von Abwehrsystemen. Ein Cyber Security-Fokus auf Pr

  16. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  17. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  18. Cyber Crime & Cyber War – "Part of the Game": Cyber Security, Quo Vadis?

    OpenAIRE

    Karl H. Stingeder

    2015-01-01

    Welche Rolle spielt Cyber Crime gegenwärtig? Was unterscheidet Cyber Crime von Cyber War? Wie muss Cyber Security gestaltet sein, um effektiven Schutz nachhaltig zu gewährleisten? Cyber Crime-Aktivitäten kennzeichnen sich häufig durch eine einfache Zugänglichkeit von betrügerischem Know-How und technischen Hilfsmitteln. Bedingt durch eine schleppende und mangelhafte Umsetzung von koordinierten Gegenmaßnahmen, resultieren Cyber-Delikte in einem Low-Risk und High-Reward Szenario für Cyber-Krimi...

  19. The Design and Implementation of a Holistic Training Model for Language Teacher Education in a Cyber Face-to-Face Learning Environment

    Science.gov (United States)

    Wang, Yuping; Chen, Nian-Shing; Levy, Mike

    2010-01-01

    This study reports a qualitative investigation that examines the design and implementation of a holistic teacher training model in a cyber face-to-face language learning context. To this end, this study first proposes an e-training model called the Practice, Reflection and Collaboration (PRC) model, and discusses the rationale and theoretical…

  20. Towards a Research Agenda for Cyber Friendly Fire

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.; Fluckiger, Jerry D.

    2009-11-18

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is to examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.

  1. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.

    Science.gov (United States)

    Sackner-Bernstein, Jonathan

    2017-03-01

    The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.

  2. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    Science.gov (United States)

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  3. A cognitive and economic decision theory for examining cyber defense strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  4. Cyber security in ports: Business as usual

    OpenAIRE

    Moerel, Lokke; Dezeure, Freddy

    2017-01-01

    Our paper summarizes the risks and provides concrete and pragmatic proposals to increase substantially the cyber maturity and resilience in the ports by organizing training and awareness raising, fostering cooperation and information exchange both between the stakeholders in the ports and across the ports and integrating the cyber risk into the physical security risk management processes and structures already in place within the ports. This also involves a higher degree of oversight by the P...

  5. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    Science.gov (United States)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  6. DETERMINATION OF CYBER SECURITY AWARENESS OF PUBLIC EMPLOYEES AND CONSCIOUSNESS-RISING SUGGESTIONS

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2016-07-01

    Full Text Available The aim of this study is to measure Turkish government employees’ awareness of cyber security and cyber space elements. Participants were 71 Turkish public employees working for various ministries. Both qualitative and quantitative research methods were used to get the most detailed information from the participants. A survey was administered to cyber security officers in chosen state institutions. For qualitative research, open-ended questions were administered to the participants. Reliability and validity issues were established for both surveys. Results show that employees have enough information about cyber security and cyber warfare. Findings clearly suggests that cyber defense policy should be planned in coordination with other state institutions and experiences should be shared. In order to create feasible and realistic cyber security policy at institutional level, experts at cyber security must be trained, hired and help must be requested from specialized individuals and institutions. This study recommends that rapid reaction teams (RRT should be established to take care of cyber systems, to react against cyber breaches in time, to alert staff for cyber-attacks in order to establish effective recovery.

  7. Using Google Analytics to evaluate the impact of the CyberTraining project.

    Science.gov (United States)

    McGuckin, Conor; Crowley, Niall

    2012-11-01

    A focus on results and impact should be at the heart of every project's approach to research and dissemination. This article discusses the potential of Google Analytics (GA: http://google.com/analytics ) as an effective resource for measuring the impact of academic research output and understanding the geodemographics of users of specific Web 2.0 content (e.g., intervention and prevention materials, health promotion and advice). This article presents the results of GA analyses as a resource used in measuring the impact of the EU-funded CyberTraining project, which provided a well-grounded, research-based training manual on cyberbullying for trainers through the medium of a Web-based eBook ( www.cybertraining-project.org ). The training manual includes review information on cyberbullying, its nature and extent across Europe, analyses of current projects, and provides resources for trainers working with the target groups of pupils, parents, teachers, and other professionals. Results illustrate the promise of GA as an effective tool for measuring the impact of academic research and project output with real potential for tracking and understanding intra- and intercountry regional variations in the uptake of prevention and intervention materials, thus enabling precision focusing of attention to those regions.

  8. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  9. Preventing and Coping Strategies for Cyber Bullying and Cyber Victimization

    OpenAIRE

    Erdinc Ozturk; Gizem Akcan

    2016-01-01

    Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students w...

  10. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  11. Development on Guidance of Cyber Security Exercise for the Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyundoo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber threats and attacks are increasing rapidly against infrastructure including energy and utilities industry over the world. Because of lack of human resource and incident response system to prevent or defend increased cyber threats, many governments and major national infrastructures perform cyber security exercises to improve capabilities of cyber security incident response. Accordingly there are exponential growth in the number of cyber security exercises over the past decade with the trend expecting to accelerate in the coming years. Even though there were many cyber security exercises in the Nuclear Facilities, this exercise was first which focused on mitigation and recovery of the system of the Nuclear Facility against cyber incident. So many insufficient items were deduced such as absence of a procedure for mitigation and recovery of cyber incident. These procedures should be developed and established through 3rd phase of Cyber Security Plan (CSP) and other technical complement actions under regulatory body’s guidance. Also developed and existed procedures should be regularly performed to make cyber incident response team and related people rapidly response against cyber incident through exercises or other training. The insufficient items come from the exercise should be reflected to developed and existed procedures by periods.

  12. Development on Guidance of Cyber Security Exercise for the Nuclear Facilities

    International Nuclear Information System (INIS)

    Kim, Hyundoo

    2016-01-01

    Cyber threats and attacks are increasing rapidly against infrastructure including energy and utilities industry over the world. Because of lack of human resource and incident response system to prevent or defend increased cyber threats, many governments and major national infrastructures perform cyber security exercises to improve capabilities of cyber security incident response. Accordingly there are exponential growth in the number of cyber security exercises over the past decade with the trend expecting to accelerate in the coming years. Even though there were many cyber security exercises in the Nuclear Facilities, this exercise was first which focused on mitigation and recovery of the system of the Nuclear Facility against cyber incident. So many insufficient items were deduced such as absence of a procedure for mitigation and recovery of cyber incident. These procedures should be developed and established through 3rd phase of Cyber Security Plan (CSP) and other technical complement actions under regulatory body’s guidance. Also developed and existed procedures should be regularly performed to make cyber incident response team and related people rapidly response against cyber incident through exercises or other training. The insufficient items come from the exercise should be reflected to developed and existed procedures by periods

  13. Process flows for cyber forensic training and operations

    CSIR Research Space (South Africa)

    Venter, JP

    2006-02-01

    Full Text Available In this paper the development and testing of Cyber First Responder Process Flows is discussed. A generic process flow framework is presented and design principles and layout characteristics as well as important points within the process flows...

  14. A Baseline Patient Model to Support Testing of Medical Cyber-Physical Systems.

    Science.gov (United States)

    Silva, Lenardo C; Perkusich, Mirko; Almeida, Hyggo O; Perkusich, Angelo; Lima, Mateus A M; Gorgônio, Kyller C

    2015-01-01

    Medical Cyber-Physical Systems (MCPS) are currently a trending topic of research. The main challenges are related to the integration and interoperability of connected medical devices, patient safety, physiologic closed-loop control, and the verification and validation of these systems. In this paper, we focus on patient safety and MCPS validation. We present a formal patient model to be used in health care systems validation without jeopardizing the patient's health. To determine the basic patient conditions, our model considers the four main vital signs: heart rate, respiratory rate, blood pressure and body temperature. To generate the vital signs we used regression models based on statistical analysis of a clinical database. Our solution should be used as a starting point for a behavioral patient model and adapted to specific clinical scenarios. We present the modeling process of the baseline patient model and show its evaluation. The conception process may be used to build different patient models. The results show the feasibility of the proposed model as an alternative to the immediate need for clinical trials to test these medical systems.

  15. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  16. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  17. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    Science.gov (United States)

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  18. Medical Differential Diagnosis (MDD) as the Architectural Framework for a Knowledge Model: A Vulnerability Detection and Threat Identification Methodology for Cyber-Crime and Cyber-Terrorism

    Science.gov (United States)

    Conley-Ware, Lakita D.

    2010-01-01

    This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…

  19. Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

    Directory of Open Access Journals (Sweden)

    Jawad Hussain Awan

    2018-04-01

    Full Text Available Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.

  20. Optimization and Control of Cyber-Physical Vehicle Systems

    Directory of Open Access Journals (Sweden)

    Justin M. Bradley

    2015-09-01

    Full Text Available A cyber-physical system (CPS is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined.

  1. Optimization and Control of Cyber-Physical Vehicle Systems.

    Science.gov (United States)

    Bradley, Justin M; Atkins, Ella M

    2015-09-11

    A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined.

  2. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  3. Preparing South Africa for cyber crime and cyber defense

    CSIR Research Space (South Africa)

    Grobler, M

    2013-01-01

    Full Text Available revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa... legislation and a lack of cyber defense mechanisms. As a starting point, cyber warfare for the purpose of this article is defined as the use of exploits in cyber space as a way to intentionally cause harm to people, assets or economies (Owen 2008). It can...

  4. Cyber threats and responses in the banking sector

    CSIR Research Space (South Africa)

    Strauss

    2017-10-01

    Full Text Available stream_source_info Strauss_CSIR2017.pdf.txt stream_content_type text/plain stream_size 5207 Content-Encoding UTF-8 stream_name Strauss_CSIR2017.pdf.txt Content-Type text/plain; charset=UTF-8 CSIR Conference Cyber... Threats and Responses in the banking sector Paul Strauss Chief Information Risk Officer October 2017 CSIR / Standard Bank / page 2 Cyber Risk Drivers 4% of www content Academic Information Medical Records Legal Documents Scientific...

  5. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    Directory of Open Access Journals (Sweden)

    Vladislav D. Veksler

    2018-05-01

    Full Text Available Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior via techniques such as model tracing and dynamic parameter fitting.

  6. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    Science.gov (United States)

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  7. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  8. Cyber security in ports : Business as usual

    NARCIS (Netherlands)

    Moerel, Lokke; Dezeure, Freddy

    2017-01-01

    Our paper summarizes the risks and provides concrete and pragmatic proposals to increase substantially the cyber maturity and resilience in the ports by organizing training and awareness raising, fostering cooperation and information exchange both between the stakeholders in the ports and across the

  9. Reduction of Equipment Access Time through Cyber Plant Navigation

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Jang Soo; Goo, Ja Sung; Kim, Yong Yi [Korea Hydro and Nuclera Power Co., Daejeon (Korea, Republic of)

    2012-05-15

    Safe and effective on-the-job training at a nuclear power plant has been gaining its importance in South Korea and in the UAE. As a solution to this, a cyber plant has been developed based on 3D model design data. It allows its users to access equipment and components in a virtual reality without risks or danger of potential radiation exposure and also increases their familiarity with NPP structures. Equipped with navigation functions similar to those of the applications installed in automobiles and smart phones, this application displays the shortest route to reach the target equipment and predicts estimated access time and radiation exposure dose. This application has contributed to the reduction of equipment access time, and therefore has facilitated early response to abnormal conditions, reduced radiation exposure dose, and maximized the effects of OJT at nuclear power plants. This paper will look at the realization of the cyber plant, the operations of the cyber plant, and how cyber plant applications can be applied further

  10. Reduction of Equipment Access Time through Cyber Plant Navigation

    International Nuclear Information System (INIS)

    Suh, Jang Soo; Goo, Ja Sung; Kim, Yong Yi

    2012-01-01

    Safe and effective on-the-job training at a nuclear power plant has been gaining its importance in South Korea and in the UAE. As a solution to this, a cyber plant has been developed based on 3D model design data. It allows its users to access equipment and components in a virtual reality without risks or danger of potential radiation exposure and also increases their familiarity with NPP structures. Equipped with navigation functions similar to those of the applications installed in automobiles and smart phones, this application displays the shortest route to reach the target equipment and predicts estimated access time and radiation exposure dose. This application has contributed to the reduction of equipment access time, and therefore has facilitated early response to abnormal conditions, reduced radiation exposure dose, and maximized the effects of OJT at nuclear power plants. This paper will look at the realization of the cyber plant, the operations of the cyber plant, and how cyber plant applications can be applied further

  11. Resilience of Cyber Systems with Over- and Underregulation.

    Science.gov (United States)

    Gisladottir, Viktoria; Ganin, Alexander A; Keisler, Jeffrey M; Kepner, Jeremy; Linkov, Igor

    2017-09-01

    Recent cyber attacks provide evidence of increased threats to our critical systems and infrastructure. A common reaction to a new threat is to harden the system by adding new rules and regulations. As federal and state governments request new procedures to follow, each of their organizations implements their own cyber defense strategies. This unintentionally increases time and effort that employees spend on training and policy implementation and decreases the time and latitude to perform critical job functions, thus raising overall levels of stress. People's performance under stress, coupled with an overabundance of information, results in even more vulnerabilities for adversaries to exploit. In this article, we embed a simple regulatory model that accounts for cybersecurity human factors and an organization's regulatory environment in a model of a corporate cyber network under attack. The resulting model demonstrates the effect of under- and overregulation on an organization's resilience with respect to insider threats. Currently, there is a tendency to use ad-hoc approaches to account for human factors rather than to incorporate them into cyber resilience modeling. It is clear that using a systematic approach utilizing behavioral science, which already exists in cyber resilience assessment, would provide a more holistic view for decisionmakers. © 2016 Society for Risk Analysis.

  12. Human Factors in Training: Space Medical Proficiency Training

    Science.gov (United States)

    Byrne, Vicky E.; Barshi, I.; Arsintescu, L.; Connell, E.

    2010-01-01

    The early Constellation space missions are expected to have medical capabilities very similar to those currently on the Space Shuttle and the International Space Station (ISS). For Crew Exploration Vehicle (CEV) missions to the ISS, medical equipment will be located on the ISS, and carried into CEV in the event of an emergency. Flight surgeons (FS) on the ground in Mission Control will be expected to direct the crew medical officer (CMO) during medical situations. If there is a loss of signal and the crew is unable to communicate with the ground, a CMO would be expected to carry out medical procedures without the aid of a FS. In these situations, performance support tools can be used to reduce errors and time to perform emergency medical tasks. The space medical training work is part of the Human Factors in Training Directed Research Project (DRP) of the Space Human Factors Engineering (SHFE) Project under the Space Human Factors and Habitability (SHFH) Element of the Human Research Program (HRP). This is a joint project consisting of human factors team from the Ames Research Center (ARC) with Immanuel Barshi as Principal Investigator and the Johnson Space Center (JSC). Human factors researchers at JSC have recently investigated medical performance support tools for CMOs on-orbit, and FSs on the ground, and researchers at the Ames Research Center performed a literature review on medical errors. Work on medical training has been conducted in collaboration with the Medical Training Group at the Johnson Space Center (JSC) and with Wyle Laboratories that provides medical training to crew members, biomedical engineers (BMEs), and to flight surgeons under the Bioastronautics contract. One area of research building on activities from FY08, involved the feasibility of just-in-time (JIT) training techniques and concepts for real-time medical procedures. A second area of research involves FS performance support tools. Information needed by the FS during the ISS mission

  13. Cyber Defense Exercises and their Role in Cyber Warfare

    OpenAIRE

    Bogdan Alexandru Bratosin

    2014-01-01

    The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exer...

  14. Cyber terrorism prevention and counteraction workshop review

    NARCIS (Netherlands)

    Pastukhov, O.M.

    2011-01-01

    A NATO Advanced Training Course (ATC ) on Cyber Terrorism Prevention and Counteraction workshop, held in Kiev on September 27-29, 2010, allowed the participants to share their experiences with experts from Ukraine, a Partnership for Peace country. The participants exchanged their ideas on the ways

  15. Introducing cyber.

    Science.gov (United States)

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  16. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  17. Developing the cyber victimisation experiences and cyber bullying behaviours scales

    OpenAIRE

    Betts, LR; Spenser, KA

    2017-01-01

    The reported prevalence rates of cyber victimisation experiences and cyber bullying behaviours vary. Part of this variation is likely due to the diverse definitions and operationalisations of the constructs adopted in previous research and the lack of psychometrically robust measures. Through two studies, the current research developed (Study 1) and evaluated (Study 2) the cyber victimisation experiences and cyber bullying behaviours scales. In Study 1 393 (122 male, 171 female), and in Study...

  18. ISD Designed Medical Specialist Training.

    Science.gov (United States)

    Rock, Samuel K., Jr.; Chagalis, George P.

    The Basic Medical Specialist course has one of the largest enrollments of the U.S. Army's Academy of Health Sciences; 11,000 soldiers were trained in this course in 1977 and 1978. Training encompasses both emergency first aid (for field medics) and basic nursing skills. A task force working to improve Army training developed this course, in…

  19. Medical radiation physics training EMERALD

    International Nuclear Information System (INIS)

    Tabakov, S.; Roberts, C.; Lamm, I.L.; Milano, F.; Lewis, C.; Smith, D.; Litchev, A.; Jonsson, B.A.; Ljungberg, M.; Strand, S.E.; Jonsson, L.; Riccardi, L.; Benini, A.; Silva, G. da; Teixeira, N.; Pascoal, A.; Noel, A.; Smith, P.; Musilek, L.; Sheahan, N.

    2001-01-01

    Training of young medical physicists is an essential part of the framework of measures for Radiological Protection of Patients. The paper describes the Medical Radiation Physics Training Scheme EMERALD, developed by an European Project Consortium. EMERALD Training covers the Physics of X-ray Diagnostic Radiology, Nuclear Medicine and Radiotherapy. Each of these 3 modules covers 4 months training period. The EMERALD training materials are 3 Workbooks with tasks and a Teachers' Guide (total volume approx 700 pages) and 3 CD-ROMs with image database. (author)

  20. The Human Side of Cyber Conflict: Organizing, Training, and Equipping the Air Force Cyber Workforce

    Science.gov (United States)

    2016-06-01

    requisite skills . Given the unwillingness of “helicopter parents” to let their children fail, exercise independence, or suffer from low self - esteem , the...DCO require skill sets from the intelligence, operations, and communications career fields to operationalize cyberspace and thus create effects that...discussions with hacker communities , indicate that creative thinking skills differentiate the best from the rest in cyber operations. Therefore, we

  1. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  2. Cyber risk in banking

    OpenAIRE

    Linert, Jan

    2015-01-01

    The bachelor thesis deals with the cyber risk in banking industry. Its main goal is to stress the imporatance of cyber risk both verbally and numericaly and review the approach of banks to this risk. The first part of this thesis specifies what cyber risk is and how it fits among other operational risks, presents the common cyber-attacks and archetypes of cyber criminals, later it delves into the cyber risk in Czech Republic and at the end of this part it mentions the legislation that covers ...

  3. Cyber-Enabled Scientific Discovery

    International Nuclear Information System (INIS)

    Chan, Tony; Jameson, Leland

    2007-01-01

    It is often said that numerical simulation is third in the group of three ways to explore modern science: theory, experiment and simulation. Carefully executed modern numerical simulations can, however, be considered at least as relevant as experiment and theory. In comparison to physical experimentation, with numerical simulation one has the numerically simulated values of every field variable at every grid point in space and time. In comparison to theory, with numerical simulation one can explore sets of very complex non-linear equations such as the Einstein equations that are very difficult to investigate theoretically. Cyber-enabled scientific discovery is not just about numerical simulation but about every possible issue related to scientific discovery by utilizing cyberinfrastructure such as the analysis and storage of large data sets, the creation of tools that can be used by broad classes of researchers and, above all, the education and training of a cyber-literate workforce

  4. Addressing the Cyber-security and Cyber-terrorism Threats [video

    OpenAIRE

    Robi Sen; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    While cyber terrorism is a relatively new threat in the world of national defense, the security issues we face are not necessarily new as a genre. In this segment, Chief Science Officer Robi Sen draws on the changing attitudes towards the cyber world. Topics include cooperation between law enforcement and hackers, the major motivations behind criminal hacking, and the realistic threats of cyber terrorism.

  5. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  6. Cyber space bullying

    Directory of Open Access Journals (Sweden)

    Popović-Ćitić Branislava

    2009-01-01

    Full Text Available Cyber space bullying is a relatively new phenomenon that has received increased attention by scientists, researchers and practitioners in recent years. It is usually defined as an intentionally and repeatedly expression of aggression towards other people through information and communication technologies. Cyber space bullying is characterized by all the primary characteristics of traditional bullying and some specifics ones that clearly differ it from other forms of bullying. In addition to the analysis of characteristics and specifics of cyber space bullying, the paper describes the basic forms of cyber space bullying (flaming, harassment, denigration, impersonation, outing, trickery, exclusion, stalking and happy slapping, as well as, the types of cyber space bullies (vengeful angel, power-hungry, revenge of the nerd, mean girls and inadvertent. The main goal of this paper is to provide initial theoretical guidelines for designing future empirical research on the complex phenomenon of cyber space bullying.

  7. Literature Review on Modeling Cyber Networks and Evaluating Cyber Risks.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Campbell, Philip L

    2018-04-01

    The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.

  8. Cyber-bombing ISIS

    DEFF Research Database (Denmark)

    Ringsmose, Jens; Teglskov Jacobsen, Jeppe

    2017-01-01

    It has become a conventional wisdom in strategic studies that the development and use of cyber weapons should be kept secret, as the effectiveness of these tools is dependent on opponents being unaware of a particular cyber weapon’s characteristics. Why, then, has the US military repeatedly publi...... the enemy’s trust in his own IT-infrastructure, and command and control systems, (3) signal “cyber strength” to third parties, and (4) establish norms regarding how to use cyber weapons in accordance with International Humanitarian Law....

  9. Cyber-physical securi

    Directory of Open Access Journals (Sweden)

    Aditya Ashok

    2014-07-01

    Full Text Available Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  10. Cyber-Informed Engineering

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Robert S. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Benjamin, Jacob [Idaho National Lab. (INL), Idaho Falls, ID (United States); Wright, Virginia L. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Quinones, Luis [Idaho National Lab. (INL), Idaho Falls, ID (United States); Paz, Jonathan [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-03-01

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  11. Cyber-Informed Engineering

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.; Quinones, Luis; Paz, Jonathan

    2017-01-01

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  12. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  13. Cyber Epidemic Models with Dependences

    OpenAIRE

    Xu, Maochao; Da, Gaofeng; Xu, Shouhuai

    2016-01-01

    Studying models of cyber epidemics over arbitrary complex networks can deepen our understanding of cyber security from a whole-system perspective. In this paper, we initiate the investigation of cyber epidemic models that accommodate the {\\em dependences} between the cyber attack events. Due to the notorious difficulty in dealing with such dependences, essentially all existing cyber epidemic models have assumed them away. Specifically, we introduce the idea of Copulas into cyber epidemic mode...

  14. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    Science.gov (United States)

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  15. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  16. Modeling and Simulation of Cyber Battlefield

    Directory of Open Access Journals (Sweden)

    AliJabar Rashidi

    2017-12-01

    Full Text Available In order to protect cyberspace against cyber-attacks we need cyber situation awareness framework for the implementation of our cyber maneuvers. This article allows execution cyber maneuvers with dynamic cyber battlefield simulator. Cyber battlefield contains essential information for the detection of cyber events, therefore, it can be considered most important and complicated factor in the high-level fusion. Cyber battlefield by gather detail data of cyberspace elements, including knowledge repository of vulnerability, tangible and intangible elements of cyberspace and the relationships between them, can provide and execute cyber maneuvers, penetration testing, cyber-attacks injection, attack tracking, visualization, cyber-attacks impact assessment and risk assessment. The dynamic maker Engine in simulator is designed to update the knowledge base of vulnerabilities, change the topology elements, and change the access list, services, hosts and users. Evaluation of simulator do with qualitative method of research and with create a focus group.

  17. Electronic strategies for information and research: cyberNephrology/cyberMedicine in the emerging world.

    Science.gov (United States)

    Solez, Kim; Hales, Michele; Katz, Sheila Moriber

    2005-09-01

    Communication and medicine have evolved together. Internet resources now provide an unprecedented opportunity to provide health assistance to the developing world. The International Society of Nephrology Informatics Commission and National Kidney Foundation cyberNephrology initiative (http://www.cybernephrology.org) have created e-mail discussion groups (e.g., NEPHROL, NEPHKIDS, and so forth) and online texts and web resources (e.g., the Schrier Atlas: http://www.kidneyatlas.org) that are, in many respects, ahead of other areas of medicine. On the other hand, nephrology is quite behind in its embrace of some specific communications initiatives that could benefit emerging nations: the Health InterNetwork Access to Research Initiative program, which provides free full-text access to medical journals and books in poorer countries; the Global Health Network Supercourse, which provides specially designed online lectures for the developing world; and Internet2/Abilene and similar research networks around the world, which provide reliable, guaranteed bandwidth for high-quality Internet videoconferencing as an alternative to face-to-face lectures and meetings. The intent of many educational ventures in nephrology, particularly in the clinical practice guideline realm (National Kidney Foundation Kidney Disease Outcomes Quality Initiative, Kidney Disease Improving Global Outcomes, and so forth), is not just to disseminate information but to change human behavior: physician practice and referral patterns, patient compliance, and so forth. Concepts from the worlds of marketing and entertainment, where the science of changing human behavior is highly evolved, can be used to create high-impact, educational offerings to promote health. They can also be highly beneficial to share Internet educational innovations and future vision across boundaries of medical specialties, which is part of the intent of the cyberMedicine joint venture (http://www.cyber-medicine.org).

  18. Education and training of medical physicists in radiology

    International Nuclear Information System (INIS)

    Todorov, V.; Vassileva, J.

    2006-01-01

    Full text: Medical radiology is chronologically the first and widest field of work of medical physicists. Therefore the education and training of medical radiological physicists is of big importance for both diagnostics and therapy. The education of medical radiological physicists in Bulgaria is organized in two levels: university and postgraduate, which is a good achievement of Bulgarian educational system. University education is in the framework of the M. Sc. program in Medical physics with a prevalent training in medical radiological physics. Three universities in the country have been carrying out this education since more than ten years. Postgraduate education covers specialties Medical Radiological Physics and Radiation Hygiene. It is organized by the Medical University but the training is opened also to specialists outside the health care system. The interests in both levels of education and training in Medical Physics is increasing with about 40 trainees in last years. The university and postgraduate education has good quality in theory but still inadequate in practical aspects. The continuous training and qualification of medical physicists has also difficulties; the main reasons are insufficient technical and financial resources as well as the lack of interest of the staff of the training centers. The responsibilities for education and training of medical physicists in radiology should be shared between physicists and physicians in the country

  19. Current and potential cyber attacks on medical journals; guidelines for improving security.

    Science.gov (United States)

    Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn

    2017-03-01

    At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks. Copyright © 2016 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.

  20. Perceptions of Popularity-Related Behaviors in the Cyber Context: Relations to Cyber Social Behaviors

    Directory of Open Access Journals (Sweden)

    Michelle F. Wright

    2015-01-01

    Full Text Available Despite acknowledging that adolescents are active users of electronic technology, little is known about their perceptions concerning how such technologies might be used to promote their social standing among their peer group and whether these perceptions relate to their cyber social behaviors (i.e., cyber aggression perpetration, cyber prosocial behavior. To address this gap in the literature, the present study included 857 seventh graders (M age: 12.19; 50.8% female from a large Midwestern city in the United States. They completed questionnaires on face-to-face social behaviors, cyber social behaviors, perceived popularity, social preference, and their perceptions of characteristics and activities related to the cyber context which might be used to promote popularity. Findings revealed four activities and characteristics used to improve adolescents’ social standing in the peer group, including antisocial behaviors, sociability, prosocial behaviors, and technology access. Using antisocial behaviors in the cyber context to promote popularity was related to cyber aggression perpetration, while controlling for gender, social preference, and perceived popularity. On the other hand, sociability and prosocial behaviors in the cyber context used to improve popularity as well as technology access were associated with cyber prosocial behavior. A call for additional research is made.

  1. Plethora of Cyber Forensics

    OpenAIRE

    N.Sridhar; Dr.D.Lalitha Bhaskari; Dr.P.S.Avadhani

    2011-01-01

    As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats. This paper f...

  2. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  3. Short-term initiatives for enhancing cyber-safety within South African schools

    Directory of Open Access Journals (Sweden)

    Elmarie Kritzinger

    2016-07-01

    Full Text Available The rate of technological development across the globe is dramatic. The decreasing cost and increasing availability of ICT devices means that its users are no longer exclusively industry or government employees – they are now also home users. Home users integrate ICT in their daily lives for education, socialising and information gathering. However, using ICT is associated with risks and threats, such as identity theft and phishing scams. Most home users of ICT do not have the necessary information technology and Internet skills to protect themselves and their information. School learners, in particular, are not sufficiently educated on how to use technological devices safely, especially in developing countries such as South Africa. The national school curriculum in South Africa currently does not make provision for cyber-safety education, and the availability of supporting material and training for ICT teachers in South Africa is limited, resulting in a lack of knowledge and skills regarding cyber-safety. The research in hand focuses on the situation concerning cyber-safety awareness in schools and has adopted a short-term approach towards cyber-safety among teachers and school learners in South Africa until a formal long-term national approach has been implemented. This study takes a quantitative approach to investigating the current options of teachers to enhance cyber-safety among learners in their schools. The research proposes that short-term initiatives (i.e. posters can increase learners’ awareness of cyber-safety until formal cyber-safety awareness methods have been introduced.

  4. CyberCIEGE Scenario Illustrating Integrity Risks to a Military-Like Facility

    National Research Council Canada - National Science Library

    Fielk, Klaus

    2004-01-01

    .... This thesis asked if a Scenario Definition File (SDF) for the CyberCIEGE game could be developed to educate and train players in Information Assurance on matters related to information integrity in a networking environment...

  5. Medical physics practice and training in Ghana.

    Science.gov (United States)

    Amuasi, John H; Kyere, Augustine K; Schandorf, Cyril; Fletcher, John J; Boadu, Mary; Addison, Eric K; Hasford, Francis; Sosu, Edem K; Sackey, Theophilus A; Tagoe, Samuel N A; Inkoom, Stephen; Serfor-Armah, Yaw

    2016-06-01

    Medical physics has been an indispensable and strategic stakeholder in the delivery of radiological services to the healthcare system of Ghana. The practice has immensely supported radiation oncology and medical imaging facilities over the years, while the locally established training programme continues to produce human resource to feed these facilities. The training programme has grown to receive students from other African countries in addition to local students. Ghana has been recognised by the International Atomic Energy Agency as Regional Designated Centre for Academic Training of Medical Physicists in Africa. The Ghana Society for Medical Physics collaborates with the School of Nuclear and Allied Sciences of the University of Ghana to ensure that training offered to medical physicists meet international standards, making them clinically qualified. The Society has also worked together with other bodies for the passage of the Health Profession's Regulatory Bodies Act, giving legal backing to the practice of medical physics and other allied health professions in Ghana. The country has participated in a number of International Atomic Energy Agency's projects on medical physics and has benefited from its training courses, fellowships and workshops, as well as those of other agencies such as International Organization for Medical Physics. This has placed Ghana's medical physicists in good position to practice competently and improve healthcare. Copyright © 2016 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  6. 网络空间安全人才培养探讨%Discussions on the talent cultivation of cyber security

    Institute of Scientific and Technical Information of China (English)

    翁健; 马昌社; 古亮

    2016-01-01

    Cyber security has been formally approved to be the first level discipline in June 2015. How to train the cyber security talents that meet the needs of our country has become an urgent problem to be solved in the discipline construction. Synthetical analysis of the current situation of training related talents at domestic and foreign, as well as the actual demand for the cyber security talents was presented. According to the characteristics of the talent culti-vation in cyber security, some suggestions on training the cyber security talents were given.%自从2015年6月网络空间安全正式被批准为国家一级学科,如何培养符合国家需要的网络空间安全人才成为了学科建设中一个亟待解决的问题。综合分析了国内外培养相关方面人才的现状与网络空间安全的实际人才需求;结合我国网络空间安全人才培养的特点,给出了我国网络空间安全人才培养的部分建议。

  7. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  8. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    Science.gov (United States)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  9. Cyber Guerilla

    NARCIS (Netherlands)

    van Haaster, J.; Gevers, R.; Sprengers, M.

    2016-01-01

    Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for

  10. Cyber-Victimized Students

    Directory of Open Access Journals (Sweden)

    Kaitlyn N. Ryan

    2013-12-01

    Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.

  11. What kind of cyber security? Theorising cyber security and mapping approaches

    OpenAIRE

    Laura Fichtner

    2018-01-01

    Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances...

  12. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  13. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance

    Directory of Open Access Journals (Sweden)

    Jessica Dawson

    2018-06-01

    Full Text Available One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars.

  14. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.

    Science.gov (United States)

    Dawson, Jessica; Thomson, Robert

    2018-01-01

    One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars.

  15. Timing of cyber conflict.

    Science.gov (United States)

    Axelrod, Robert; Iliev, Rumen

    2014-01-28

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.

  16. "Making Kind Cool": Parents' Suggestions for Preventing Cyber Bullying and Fostering Cyber Kindness

    Science.gov (United States)

    Cassidy, Wanda; Brown, Karen; Jackson, Margaret

    2012-01-01

    Cyber bullying among youth is rapidly becoming a global phenomenon, as educators, parents and policymakers grapple with trying to curtail this negative and sometimes devastating behavior. Since most cyber bullying emanates from the home computer, parents can play an important role in preventing cyber bullying and in fostering a kinder online…

  17. Improving basic life support training for medical students

    OpenAIRE

    Lami, Mariam; Nair, Pooja; Gadhvi, Karishma

    2016-01-01

    Mariam Lami, Pooja Nair, Karishma GadhviFaculty of Medicine, Imperial College, London, London, UKAbstract: Questions have been raised about basic life support (BLS) training in medical education. This article addresses the research evidence behind why BLS training is inadequate and suggests recommendations for improving BLS training for medical students.Keywords: medical education, basic life support

  18. Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

    OpenAIRE

    Jawad Hussain Awan; Shazad Memon; Sheeraz Memon; Kamran Taj Pathan; Niaz Hussain Arijo

    2018-01-01

    Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerc...

  19. Comparative Analysis of Curricula for Bachelor's Degree in Cyber Security in the USA and Ukraine

    Science.gov (United States)

    Bystrova, Bogdana

    2017-01-01

    At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…

  20. Metaphors for cyber security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  1. Training Medical Students in Empathic Communication

    Science.gov (United States)

    Bayne, Hannah Barnhill

    2011-01-01

    Empathy is an important component of the doctor-patient relationship, yet previous studies point to its steady decline in medical students as they progress through medical school and residency programs. Empathy training has thus been identified as a goal of instruction, yet it is unclear how this training can best be implemented within the medical…

  2. Improving basic life support training for medical students.

    Science.gov (United States)

    Lami, Mariam; Nair, Pooja; Gadhvi, Karishma

    2016-01-01

    Questions have been raised about basic life support (BLS) training in medical education. This article addresses the research evidence behind why BLS training is inadequate and suggests recommendations for improving BLS training for medical students.

  3. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  4. Cyber bullying: Child and youth spirituality

    Directory of Open Access Journals (Sweden)

    Anastasia Apostolides

    2017-10-01

    Full Text Available Digital culture is part of children’s and adolescents’ everyday lives. Digital culture has both positive and negative consequences. One such negative consequence is cyber violence that has been termed cyber bullying. Cyber bullying can cause serious emotional, behavioural and academic problems for both the victim and the bully. Although there is ongoing research on the effects of cyber bullying on children and youth in South Africa, no research has been carried out on how children’s and youth’s spirituality may be affected when they are cyber bullied. This article discusses the accumulative results from different South African institutes that have researched the cyber bullying effects on children and adolescents. These results point to the spiritual effects that children and youth may experience as a result of cyber bullying. This article proposes that spirituality may prevent cyber bullying and even help children and youth heal from the trauma caused by cyber bullying. This article contributes in starting a conversation that may result in more specific research being done on how the spiritual lives of children and adolescents may be affected through the trauma caused by cyber bullying.

  5. The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century

    Directory of Open Access Journals (Sweden)

    Faga Hemen Philip

    2017-06-01

    Full Text Available This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.

  6. STD Training in Canadian Medical Schools

    Directory of Open Access Journals (Sweden)

    Jo-Anne A Doherty

    1992-01-01

    Full Text Available OBJECTIVE: The emergence of the acquired immune deficiency syndrome in 1981 and the consequent publicity surrounding sexual behaviour has increased the likelihood that patients will seek medical advice. Sexually transmitted disease (STD teaching and postgraduate medical programs in Canadian schools of medicine have not been adequately documented. Accordingly, the Laboratory Centre for Disease Control. Department of National Health and Welfare, sought to determine the magnitude and scope of STD training in these schools. DESIGN: A four page questionnaire sought information on preclinical, clinical and residency training in terms of the number of classroom and laboratory hours of instruction, the subspecialty responsible for providing the training, and the clinical ‘hands on’ experience of the teachers: each respondent was also asked to assess the quality and scope of instruction provided at his/her medical school. SETTING/PARTICIPANTS: The questionnaire was mailed to the Dean of each of the 16 schools of medicine in Canada: it was requested that the questionnaire be forwarded to and completed by the person responsible for STD training at the university. RESULTS: Thirteen schools (81% completed the questionnaire. Each school indicated that some STD instruction was provided at the undergraduate level: the mean number of hours of classroom instruction was 6.1. Physicians with STD clinical ‘hands on’ experience were responsible for teaching in 12 schools. Infectious disease residents spent 4 to 80 h on STDs, while those from other residency programs where STD was not an elective spent 2 to 8 h. Each medical school was asked to provide an evaluation of its program. Only three respondents considered their STD training program adequate. The majority of schools responded that infectious disease residents received sufficient training but the training offered medical students and residents in other programs was less than adequate. The quality

  7. Proliferation of cyber insecurity in Nigeria: a root cause analysis ...

    African Journals Online (AJOL)

    Data collected were analysed using the 5 WHYs method of root causes analysis. The research identified poor promotion of cyber security professionals' recruitment, training, and upgrade in technical knowledge and development in Nigeria; lack of feasibility and workability analysis of the resultant effects of certain policies ...

  8. Special Operations And Cyber Warfare

    Science.gov (United States)

    2016-12-01

    Cyber weapons have multiple functions and can be used for espionage or OPE. It is important to highlight the similarities between the intelligence...James Clapper, Director of National Intelligence, emphasized the importance of cyber operations as he identified cyber as the third major hazard facing...support the development of the capacity and capability of foreign security forces and their supporting institutions.”52 The DOD’s Cyber Strategy states

  9. Professional Training of Junior Medical Staff: European Experience

    Science.gov (United States)

    Iliasova, Yuliia

    2017-01-01

    The article covers current problems of professional training of junior medical staff. The main disadvantages of Ukrainian system of medical education that impede the intention of improving quality of professional training of junior medical staff have been analyzed. European experience in organizing medical education, namely, in Great Britain,…

  10. Virtual reality-based medical training and assessment

    DEFF Research Database (Denmark)

    Aboulafia, Annette Løw T.; Lövquist, Erik; Shorten, George Declan

    2012-01-01

    The current focus on patient safety and evidence-based medical education has led to an increased interest in utilising virtual reality (VR) for medical training. The development of VR-based systems require experts from different disciplines to collaborate with shared and agreed objectives...... to develop useful and usable VR-based medical training systems. Methods: This article reports a case study of two research projects that developed and evaluated a VR-based training system for spinal anaesthesia. Results: The case study illustrates how close relationships can be established by champion...

  11. Cyber Deterrence and Stability

    Energy Technology Data Exchange (ETDEWEB)

    Goychayev, Rustam [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Carr, Geoffrey A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Weise, Rachel A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Donnelly, David A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Clements, Samuel L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Benz, Jacob M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rodda, Kabrena E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bartholomew, Rachel A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McKinnon, Archibald D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Andres, Richard B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-09-30

    Throughout the 20th and early 21st centuries, deterrence and arms control have been cornerstones of strategic stability between the superpowers. However, the weaponization of the cyber realm by State actors and the multipolar nature of cyber conflict now undermines that stability. Strategic stability is the state in which nations believe that if they act aggressively to undermine U.S. national interests and the post-World War II liberal democratic order, the consequences will outweigh the benefits. The sense of lawlessness and lack of consequences in the cyber realm embolden States to be more aggressive in taking actions that undermine stability. Accordingly, this paper examines 1) the role of deterrence and arms control in securing cyber stability, and 2) the limitations and challenges associated with these traditional national security paradigms as applied to this emerging threat domain. This paper demonstrates that many 20th-century deterrence and arms control concepts are not particularly applicable in the cyber realm. However, they are not entirely irrelevant. The United States can distill lessons learned from this rich deterrence and arms control experience to develop and deploy a strategy to advance cyber stability.

  12. Medical Student Interest in Flexible Residency Training Options.

    Science.gov (United States)

    Piotrowski, Madison; Stulberg, Debra; Egan, Mari

    2018-05-01

    Medical residents continue to experience high rates of burnout during residency training even after implementation of the 2003 Accreditation Council for Graduate Medical Education duty-hour restrictions. The purpose of this study is to determine medical student interest in flexible residency training options. Researchers developed an 11-question survey for second through fourth-year medical students. The populations surveyed included medical students who were: (1) attending the 2015 American Academy of Family Physicians National Conference, the 2015 Family Medicine Midwest Conference, and (2) enrolled at University of Chicago Pritzker School of Medicine, University of Illinois College of Medicine at Chicago, Drexel University College of Medicine, and Case Western Reserve University School of Medicine. The survey was completed by 789 medical students. Over half of medical students surveyed indicated that they would be interested in working part-time during some portion of their residency training (51%), and that access to part-time training options would increase their likelihood of applying to a particular residency program (52%). When given the option of three residency training schedules of varying lengths, 41% of male students and 60% of female students chose a 60-hour workweek, even when that meant extending the residency length by 33% and reducing their yearly salary to $39,000. There is considerable interest among medical students in access to part-time residency training options and reduced-hour residency programs. This level of interest indicates that offering flexible training options could be an effective recruitment tool for residency programs and could improve students' perception of their work-life balance during residency.

  13. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  14. Improving core medical training--innovative and feasible ideas to better training.

    Science.gov (United States)

    Tasker, Fiona; Dacombe, Peter; Goddard, Andrew F; Burr, Bill

    2014-12-01

    A recent survey of UK core medical training (CMT) training conducted jointly by the Royal College of Physicians (RCP) and Joint Royal College of Physicians Training Board (JRCPTB) identified that trainees perceived major problems with their training. Service work dominated and compromised training opportunities, and of great concern, almost half the respondents felt that they had not been adequately prepared to take on the role of medical registrar. Importantly, the survey not only gathered CMT trainees' views of their current training, it also asked them for their 'innovative and feasible ways to improve CMT'. This article draws together some of these excellent ideas on how the quality of training and the experience of trainees could be improved. It presents a vision for how CMT trainees, consultant supervisors, training programme directors, clinical directors and managers can work together to implement relevant, feasible and affordable ways to improve training for doctors and deliver the best possible care for patients. © 2014 Royal College of Physicians.

  15. The implications of transnational cyber threats in international humanitarian law: analysing the distinction between cybercrime, cyber attack, and cyber warfare in the 21st century

    OpenAIRE

    Faga, Hemen Philip

    2017-01-01

    This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL) with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and t...

  16. Emergency Medical Care Training and Adolescents.

    Science.gov (United States)

    Topham, Charles S.

    1982-01-01

    Describes an 11-week emergency medical care training program for adolescents focusing on: pretest results; factual emergency instruction and first aid; practical experience training; and assessment. (RC)

  17. Technical Aspects of Cyber Kill Chain

    OpenAIRE

    Yadav, Tarun; Mallari, Rao Arvind

    2016-01-01

    Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on rganizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder takes to penetrate information systems over time to execute an attack on the target. This paper broa...

  18. Continuous professional training of medical laboratory scientists in ...

    African Journals Online (AJOL)

    Background. Training and re-training of healthcare workers is pivotal to improved service delivery. Objective. To determine the proportion of practising medical laboratory scientists with in-service training in Benin City, Nigeria and areas covered by these programmes. Methods. Medical laboratory scientists from Benin City ...

  19. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  20. Closing the Cyber Gap: Integrating Cross-Government Cyber Capabilities to Support the DHS Cyber Security Mission

    Science.gov (United States)

    2014-12-01

    identifies and eliminates the actors who seek to target our cyber 152 “2013 Data Breach Investigations Report,” Verizon Enterprise Solutions, accessed...future. 360 “2013 Data Breach Investigations Report,” Verizon Enterprise Solutions, accessed September 29, 2013, http://www.verizonenterprise.com/DBIR...critical system owners and worldwide cyber security teams.382 381 Data Breach on the Rise: Protecting Personal Information from Harm: Hearing

  1. Cyber Security Analysis of Turkey

    OpenAIRE

    Senturk, Hakan; Çil, Zaim; Sağıroğlu, Şeref

    2016-01-01

    Considering the criticality of the cyber security threat in the 21st century, it is presumed that the nations are busy with series of activities in order to protect their security in the cyber space domain. In this paper, in light of the recent developments in the cyber security field, Turkey’s cyber security analysis is performed using a macro analysis model. We researched for the measures taken in Turkey with respect to those in the other countries, reviewed the posture, the activities and ...

  2. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  3. A Social Cyber Contract Theory Model for Understanding National Cyber Strategies

    NARCIS (Netherlands)

    Bierens, R.H.; Klievink, A.J.; van den Berg, J.

    2017-01-01

    Today’s increasing connectivity creates cyber risks at personal, organizational up to societal level. Societal cyber risks require mitigation by all kinds of actors where government should take the lead due to its responsibility to protect its citizens. Since no formal global governance exists, the

  4. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available . The result is that many countries are not properly prepared, nor adequately protected by legislation, in the event of a cyber attack on a national level. This article will address the international cyber defense collaboration problem by looking at the impact...

  5. A Cyber Pearl Harbor

    Science.gov (United States)

    2016-02-03

    door for an attack. These medium-potential cyber tools can present the pathway to espionage or attack when weaponized.18 It is important to...facilitate espionage or up to and including destruction of the system.27 Cyber attack falls on the right end of the spectrum. Before the definition for...warfare or war. Congruent with international laws on war, there is delineation between an act of espionage and act of war. Advancements in cyber

  6. Some of Indonesian Cyber Law Problems

    Science.gov (United States)

    Machmuddin, D. D.; Pratama, B.

    2017-01-01

    Cyber regulation is very important to control human interaction within the Internet network in cyber space. On the surface, innovation development in science and technology facilitates human activity. But on the inside, innovation was controlled by new business model. In cyber business activities mingle with individual protection. By this condition, the law should keep the balance of the activities. Cyber law problems, were not particular country concern, but its global concern. This is a good opportunity for developing country to catch up with developed country. Beside this opportunity for talented people in law and technology is become necessity. This paper tries to describe cyber law in Indonesia. As a product of a developing country there are some of weakness that can be explained. Terminology and territory of cyber space is become interesting to discuss, because this two problems can give a broad view on cyber law in Indonesia.

  7. What kind of cyber security? Theorising cyber security and mapping approaches

    Directory of Open Access Journals (Sweden)

    Laura Fichtner

    2018-05-01

    Full Text Available Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances our understanding of how this shapes relationships between actors and of the values prioritised, promoted and inscribed into the concerned technologies.

  8. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  9. Cyber security for nuclear power plants

    International Nuclear Information System (INIS)

    Verma, Ruchi; Razdan, Mayuri; Munshi, Prabhat

    2005-01-01

    Cyber Security, cyber terrorism and cyber crime are the buzzwords in security related aspects of information technology. These terms are related to computers and networks that are critical for normal functionality and operations of nuclear power plants. At one end, this inter connected era is giving us the ease to perform various critical operation with a click of command, but on the other end it is giving rise to the new world of terrorism. In today's internet connected world, terrorism has left all the boundaries back and taken the new form, term it cyber terrorism or cyber crime. This paper aims to spread the awareness about cyber terrorism and how it can affect the overall security of nuclear power plants and establishments. (author)

  10. The impact of security and intelligence policy in the era of cyber crimes

    Directory of Open Access Journals (Sweden)

    MSc. Bahri Gashi

    2016-07-01

    Full Text Available Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions. The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in  public systems and private sector; creating barriers in distance entry networks and information systems, etc. Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes.

  11. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  12. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  13. Training of leadership skills in medical education.

    Science.gov (United States)

    Kiesewetter, Jan; Schmidt-Huber, Marion; Netzel, Janine; Krohn, Alexandra C; Angstwurm, Matthias; Fischer, Martin R

    2013-01-01

    Effective team performance is essential in the delivery of high-quality health-care. Leadership skills therefore are an important part of physicians' everyday clinical life. To date, the development of leadership skills are underrepresented in medical curricula. Appropriate training methods for equipping doctors with these leadership skills are highly desirable. The review aims to summarize the findings in the current literature regarding training in leadership skills in medicine and tries to integrate the findings to guide future research and training development. The PubMED, ERIC, and PsycArticles, PsycINFO, PSYNDEX and Academic search complete of EBSCOhost were searched for training of leadership skills in medicine in German and English. Relevant articles were identified and findings were integrated and consolidated regarding the leadership principles, target group of training and number of participants, temporal resources of the training, training content and methods, the evaluation design and trainings effects. Eight studies met all inclusion criteria and no exclusion criteria. The range of training programs is very broad and leadership skill components are diverse. Training designs implied theoretical reflections of leadership phenomena as well as discussions of case studies from practice. The duration of training ranged from several hours to years. Reactions of participants to trainings were positive, yet no behavioral changes through training were examined. More research is needed to understand the factors critical to success in the development of leadership skills in medical education and to adapt goal-oriented training methods. Requirements analysis might help to gain knowledge about the nature of leadership skills in medicine. The authors propose a stronger focus on behavioral training methods like simulation-based training for leadership skills in medical education.

  14. Cyber and physical infrastructure interdependencies.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

    2008-09-01

    The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

  15. Cyber-Physical War Gaming

    OpenAIRE

    Colbert, E. J. M.; Sullivan, D. T.; Kott, A

    2017-01-01

    This paper presents general strategies for cyber war gaming of Cyber-Physical Systems (CPSs) that are used for cyber security research at the U.S. Army Research Laboratory (ARL). Since Supervisory Control and Data Acquisition (SCADA) and other CPSs are operational systems, it is difficult or impossible to perform security experiments on actual systems. The authors describe how table-top strategy sessions and realistic, live CPS war games are conducted at ARL. They also discuss how the recorde...

  16. Report of VA Medical Training Programs

    Data.gov (United States)

    Department of Veterans Affairs — The Report of VA Medical Training Programs Database is used to track medical center health services trainees and VA physicians serving as faculty. The database also...

  17. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  18. Anonymous As a Cyber Tribe: A New Model for Complex, Non-State Cyber Actors

    Science.gov (United States)

    2015-05-01

    personas. Only then can cyber strategists exercise the required amount of cultural relativism needed to influence complex, and sometimes disturbing...that runs counter to their professional ethic ? When cyber tribes employ atrocity to create cultural barriers, how will planners remain focused on...as a cyber actor’s motivation? Meeting these challenges requires new levels of cultural relativism —the understanding of a “culture or a cultural

  19. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  20. Cyber operations as nuclear counterproliferation measures

    OpenAIRE

    Roscini, M.

    2014-01-01

    Focusing on recent malware that allegedly targeted Iran’s nuclear programme, this article discusses the legality of inter-state cyber operations as measures to prevent the proliferation of nuclear weapons approaching the problem from the perspective of the law of State responsibility, in particular the circumstances precluding wrongfulness. After examining the role that cyber attacks and cyber exploitation can play in preventing nuclear proliferation, the article explores whether cyber operat...

  1. Training of Leadership Skills in Medical Education

    Science.gov (United States)

    Kiesewetter, Jan; Schmidt-Huber, Marion; Netzel, Janine; Krohn, Alexandra C.; Angstwurm, Matthias; Fischer, Martin R.

    2013-01-01

    Background: Effective team performance is essential in the delivery of high-quality health-care. Leadership skills therefore are an important part of physicians’ everyday clinical life. To date, the development of leadership skills are underrepresented in medical curricula. Appropriate training methods for equipping doctors with these leadership skills are highly desirable. Objective: The review aims to summarize the findings in the current literature regarding training in leadership skills in medicine and tries to integrate the findings to guide future research and training development. Method: The PubMED, ERIC, and PsycArticles, PsycINFO, PSYNDEX and Academic search complete of EBSCOhost were searched for training of leadership skills in medicine in German and English. Relevant articles were identified and findings were integrated and consolidated regarding the leadership principles, target group of training and number of participants, temporal resources of the training, training content and methods, the evaluation design and trainings effects. Results: Eight studies met all inclusion criteria and no exclusion criteria. The range of training programs is very broad and leadership skill components are diverse. Training designs implied theoretical reflections of leadership phenomena as well as discussions of case studies from practice. The duration of training ranged from several hours to years. Reactions of participants to trainings were positive, yet no behavioral changes through training were examined. Conclusions: More research is needed to understand the factors critical to success in the development of leadership skills in medical education and to adapt goal-oriented training methods. Requirements analysis might help to gain knowledge about the nature of leadership skills in medicine. The authors propose a stronger focus on behavioral training methods like simulation-based training for leadership skills in medical education. PMID:24282452

  2. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  3. Nuclear Cyber Security Issues and Policy Recommendations

    International Nuclear Information System (INIS)

    Lee, Cheol-Kwon; Lee, Dong-Young; Lee, Na-Young; Hwang, Young-Soo

    2015-01-01

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities

  4. [Medical ethics in residency training].

    Science.gov (United States)

    Civaner, Murat; Sarikaya, Ozlem; Balcioğlu, Harun

    2009-04-01

    Medical ethics education in residency training is one of the hot topics of continuous medical education debates. Its importance and necessity is constantly stressed in declarations and statements on national and international level. Parallel to the major structural changes in the organization and the finance model of health care system, patient-physician relationship, identity of physicianship, social perception and status of profession are changing. Besides, scientific developments and technological advancements create possibilities that never exists before, and bring new ethical dilemmas along with. To be able to transplant human organs has created two major problems for instance; procurement of organs in sufficient numbers, and allocating them to the patients in need by using some prioritizing criteria. All those new and challenging questions force the health care workers to find authentic and justifiable solutions while keeping the basic professional values. In that sense, proper medical ethics education in undergraduate and postgraduate term that would make physician-to-be's and student-physicians acquire the core professional values and skill to notice, analyze and develop justifiable solutions to ethical problems is paramount. This article aims to express the importance of medical ethics education in residency training, and to propose major topics and educational methods to be implemented into. To this aim, first, undergraduate medical education, physician's working conditions, the exam of selection for residency training, and educational environment were revised, and then, some topics and educational methods, which are oriented to educate physicians regarding the professional values that they should have, were proposed.

  5. Cyber-bullying prevention in primary school: School leaders’ understanding of cyber-bullying prevention

    OpenAIRE

    Vestvik, Svitlana

    2011-01-01

    This master‟s thesis is about cyber-bullying prevention in primary school. My reason for choosing this issue was a desire to get a greater insight into cyber-bullying as a phenomenon. In addition, I found it interesting to find how the principals can work systematically for prevention and reduction of cyber-bullying incidents in schools, with the purpose of offering pupils a good psycho-social environment as enshrined in the Education Act, Section 9a-3. My attention was focused on understa...

  6. Predicting Cyber Events by Leveraging Hacker Sentiment

    OpenAIRE

    Deb, Ashok; Lerman, Kristina; Ferrara, Emilio

    2018-01-01

    Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces. However, they often discuss exploits and techniques on hacking forums. The community behavior of the hackers may provide insights into groups' collective malicious activity. We propose a novel approach to predict cyber events using sentiment analysis. We test our approach using cyber attack data from 2 major ...

  7. Cyber-Physical Architecture Assisted by Programmable Networking

    OpenAIRE

    Rubio-Hernan, Jose; Sahay, Rishikesh; De Cicco, Luca; Garcia-Alfaro, Joaquin

    2018-01-01

    Cyber-physical technologies are prone to attacks, in addition to faults and failures. The issue of protecting cyber-physical systems should be tackled by jointly addressing security at both cyber and physical domains, in order to promptly detect and mitigate cyber-physical threats. Towards this end, this letter proposes a new architecture combining control-theoretic solutions together with programmable networking techniques to jointly handle crucial threats to cyber-physical systems. The arch...

  8. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  9. Development of Cyber Security Scheme for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Choi, Y. S.; Cho, J. W. (and others)

    2009-12-15

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures.

  10. Development of Cyber Security Scheme for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Choi, Y. S.; Cho, J. W.

    2009-12-01

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures

  11. Information Assurance Cyber Ecology

    National Research Council Canada - National Science Library

    Jorgensen, Jane

    2003-01-01

    .... The goals of the Cyber Ecology project were to: (1) enable and demonstrate the discovery of noel IA technologies for the detection and mitigation of damage due to cyber attack through the application of ecological models, (2...

  12. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  13. Augmented Reality to Enhance Crew Medical Training

    Data.gov (United States)

    National Aeronautics and Space Administration — Due to the large and diverse set of possible medical conditions, crew medical training focuses on the most likely medical scenarios that may occur in the current...

  14. Cybercom Chief Details U.S. Cyber Threats

    Science.gov (United States)

    Security Robots Lasers RSS Feed Cybercom Chief Details U.S. Cyber Threats - December 2, 2014 Navy Adm . Rogers, the commander of U.S. Cyber Command, director of the National Security Agency and chief of the Framework for Cyber Sharing But before Cybercom can help commercial companies deal with cyber criminals and

  15. Cyber bullying: Child and youth spirituality

    OpenAIRE

    Anastasia Apostolides

    2017-01-01

    Digital culture is part of children’s and adolescents’ everyday lives. Digital culture has both positive and negative consequences. One such negative consequence is cyber violence that has been termed cyber bullying. Cyber bullying can cause serious emotional, behavioural and academic problems for both the victim and the bully. Although there is ongoing research on the effects of cyber bullying on children and youth in South Africa, no research has been carried out on how children’s and youth...

  16. Medical specialty preferences in early medical school training in Canada.

    Science.gov (United States)

    Vo, Anthony; McLean, Laurie; McInnes, Matthew D F

    2017-11-14

    To understand what medical students consider when choosing their specialty, prior to significant clinical exposure to develop strategies to provide adequate career counseling. A cross-sectional study was performed by distributing optional questionnaires to 165 first-year medical students at the University of Ottawa in their first month of training with a sample yield of 54.5% (n=90).  Descriptive statistics, analysis of variance, Spearman's rank correlation, Cronbach's alpha coefficient, Kaiser-Meyer-Olkin Measure, and exploratory factor analyses were used to analyze the anonymized results. "Job satisfaction", "lifestyle following training" and, "impact on the patient" were the three highest rated considerations when choosing a specialty.  Fifty-two and seventeen percent (n=24) and 57.89% (n=22) of males and females ranked non-surgical specialties as their top choice. Student confidence in their specialty preferences was moderate, meaning their preference could likely change (mean=2.40/5.00, SD=1.23). ANOVA showed no significant differences between confidence and population size (F(2,86)=0.290, p=0.75) or marital status (F(2,85)=0.354, p=0.70) in both genders combined. Five underlying factors that explained 44.32% of the total variance were identified. Five themes were identified to enhance career counseling. Medical students in their first month of training have already considered their specialty preferences, despite limited exposure. However, students are not fixed in their specialty preference. Our findings further support previous results but expand what students consider when choosing their specialty early in their training. Medical educators and administrators who recognize and understand the importance of these considerations may further enhance career counseling and medical education curricula.

  17. Cyber-Warfare: Jus Post Bellum

    Science.gov (United States)

    2015-03-01

    average data breach continues to increase, according to a report from Ponemon Institute (2014); there was a 201 dollars associated cost per...How much does cyber/ data breach insurance cost? Data Breach Insurance. Retrieved from http://databreachinsurancequote.com/cyber- insurance/cyber...insurance- data - breach -insurance-premiums/ Maxwell, D. (2013, Apr 11). What to make of North Korea. The Diplomat. Retrieved from http://thediplomat.com

  18. Development of Cyber Theater titled "PINOCCHIO" and Cyber Theater Scenario Language: CTSL

    Directory of Open Access Journals (Sweden)

    Hiroshi Matsuda

    2003-10-01

    Full Text Available In Japan, most of children haven't read the Fairy Tales or tales of old Japan because the high technology video games are more exciting than most of picture books. But they must be effective to bring up the children's cultivation of aesthetic sensitivity. And we have heard from teachers of elementary schools that most of themes of computer education in school are the operation of Painting Tool or Game Software. To improve these problems and to aid the courses of computer-based education in elementary school, we developed new educational support tool named Cyber Theater. Cyber Theater provides the capability of easy making the 3D-CG animation of children's story by using Script language named CTSL (Cyber Theater Scenario Language. We hope schoolteachers will be able to use Cyber Tales as teaching materials in elementary schools. We also hope that upper-aged students (including junior high school students are able to make their original CG-animation stories as the Creative Lesson.

  19. Stuxnet and the Future of Cyber War

    OpenAIRE

    Farwell, James P.; Rohozinski, Rafal

    2011-01-01

    The discovery in June 2010 that a cyber worm dubbed 'Stuxnet' had struck the Iranian nuclear facility at Natanz suggested that, for cyber war, the future is now. Yet more important is the political and strategic context in which new cyber threats are emerging, and the effects the worm has generated in this respect. Perhaps most striking is the confluence between cyber crime and state action. States are capitalising on technology whose development is driven by cyber crime, and perhaps outsourc...

  20. Comparing models of offensive cyber operations

    CSIR Research Space (South Africa)

    Grant, T

    2015-10-01

    Full Text Available would be needed by a Cyber Security Operations Centre in order to perform offensive cyber operations?". The analysis was performed, using as a springboard seven models of cyber-attack, and resulted in the development of what is described as a canonical...

  1. Students' perspectives on cyber bullying.

    Science.gov (United States)

    Agatston, Patricia W; Kowalski, Robin; Limber, Susan

    2007-12-01

    The aim of this study was to gain a better understanding of the impact of cyber bullying on students and the possible need for prevention messages targeting students, educators, and parents. A total of 148 middle and high school students were interviewed during focus groups held at two middle and two high schools in a public school district. The focus groups were approximately 45 minutes in length. Students were divided by gender and asked a series of scripted questions by a same-gender student assistance counselor. We found that students' comments during the focus groups suggest that students-particularly females-view cyber bullying as a problem, but one rarely discussed at school, and that students do not see the school district personnel as helpful resources when dealing with cyber bullying. Students are currently experiencing the majority of cyber bullying instances outside of the school day; however there is some impact at school. Students were able to suggest some basic strategies for dealing with cyber bullying, but were less likely to be aware of strategies to request the removal of objectionable websites, as well as how to respond as a helpful bystander when witnessing cruel online behavior. We conclude that school districts should address cyber bullying through a combination of policies and information that are shared with students and parents. Schools should include cyber bullying as part of their bullying prevention strategies and include classroom lessons that address reporting and bystander behavior.

  2. Clinical simulation training improves the clinical performance of Chinese medical students

    Directory of Open Access Journals (Sweden)

    Ming-ya Zhang

    2015-10-01

    Full Text Available Background: Modern medical education promotes medical students’ clinical operating capacity rather than the mastery of theoretical knowledge. To accomplish this objective, clinical skill training using various simulations was introduced into medical education to cultivate creativity and develop the practical ability of students. However, quantitative analysis of the efficiency of clinical skill training with simulations is lacking. Methods: In the present study, we compared the mean scores of medical students (Jinan University who graduated in 2013 and 2014 on 16 stations between traditional training (control and simulative training groups. In addition, in a clinical skill competition, the objective structured clinical examination (OSCE scores of participating medical students trained using traditional and simulative training were compared. The data were statistically analyzed and qualitatively described. Results: The results revealed that simulative training could significantly enhance the graduate score of medical students compared with the control. The OSCE scores of participating medical students in the clinical skill competition, trained using simulations, were dramatically higher than those of students trained through traditional methods, and we also observed that the OSCE marks were significantly increased for the same participant after simulative training for the clinical skill competition. Conclusions: Taken together, these data indicate that clinical skill training with a variety of simulations could substantially promote the clinical performance of medical students and optimize the resources used for medical education, although a precise analysis of each specialization is needed in the future.

  3. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    State University .” “’Information Troops’ -- a Russian Cyber Command?” 2011 3rd International Conference on Cyber Conflict, C. Czosseck, E. Tyugu, T...www.nytimes.com/2008/08/13/technology/13cyber.html?_r=0. 36 Ibid. 37 Joseph Mann, “Expert: Cyber-attacks on Georgia websites tied to mob , Russian government

  4. A Survey of Cyber Ranges and Testbeds

    Science.gov (United States)

    2013-10-01

    2012. [8] S. W. Neville and K. F. Li , "The Rational for Developing Larger-scale 1000+ Machine Emulation-Based Research Test Beds," WAINA 2009, pp...2002, pp. 6-2671-2676, 6-2678-6- 2682 vol. 6. [20] P. Pederson, D. Lee, G. Shu, D. Chen, Z. Liu, N. Li , and L. Sang, "Virtual Cyber- Security Testing...attacks with applications in homeland defense training." AeroSense 2003. International Society for Optics and Photonics, 2003. [54] Zhou, Mian

  5. Dampak Media Sosial dalam Cyber Bullying

    OpenAIRE

    Hidajat, Monica; Adam, Angry Ronald; Danaparamita, Muhammad; Suhendrik, Suhendrik

    2015-01-01

    The purpose of this research is to review two journals about social media effect for cyberbullying. First Journal is written by Eddie Fisher with the title From Cyber Bullying to Cyber Coping: The Misuse of Mobile Technology and Social Media and Their Effects on People’s Lives and the second journal is written by ReginaldH. Gonzales with the title Social Media as a Channel and its Implications on Cyber Bullying. First Journal focus on condition and cyber bullying state by interview respondent...

  6. Cyber security issues in online games

    Science.gov (United States)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  7. Problems of postgraduate medical training in Nigeria.

    Science.gov (United States)

    Ike, S O

    2004-01-01

    Postgraduate medical training in Nigeria has been in dire straits for about two decades now. That it has continued to survive, is a tribute to the average resident doctor who has become immunized, and who has grown a thick skin of armour, as well the spirit of altruism of the medical teachers--consultants (young and old), who despite odds, have kept their focus clear, above the murky waters of national distraction and daunting socio economic challenges. A review of relevant literature on medical education in Nigeria was undertaken by manual library search. This paper x-rays the strong points that have still prevailed to hold the rudiments and ideals of postgraduate medical training in a viable position up to date. It discusses the weaknesses and threats--potential and real--to the training programme. This paper attempts to search, and actually hopes, for silver lining in the Nigerian sky as possible solution lifelines that may yet re-engineer the programme.

  8. Clinical Training of Medical Physicists Specializing in Nuclear Medicine

    International Nuclear Information System (INIS)

    2011-01-01

    The application of radiation in human health, for both diagnosis and treatment of disease, is an important component of the work of the IAEA. The responsibility for the increasingly technical aspects of this work is undertaken by the medical physicist. To ensure good practice in this vital area, structured clinical training programmes are required to complement academic learning. This publication is intended to be a guide to the practical implementation of such a programme for nuclear medicine. There is a general and growing awareness that radiation medicine is increasingly dependent on well trained medical physicists who are based in a clinical setting. However an analysis of the availability of medical physicists indicates a large shortfall of qualified and capable professionals. This is particularly evident in developing countries. While strategies to increase educational opportunities are critical to such countries, the need for guidance on structured clinical training was recognized by the members of the Regional Cooperative Agreement for Research, Development and Training related to Nuclear Science and Technology (RCA) for the Asia-Pacific region. Consequently, a technical cooperation regional project (RAS6038) under the RCA programme was formulated to address this need in this region by developing suitable material and establishing its viability. Development of a clinical training guide for medical physicists specialising in nuclear medicine was started in 2009 with the appointment of a core drafting committee of regional and international experts. The publication drew on the experience of clinical training in Australia, Croatia and Sweden and was moderated by physicists working in the Asian region. The present publication follows the approach of earlier IAEA publications in the Training Course Series, specifically Nos 37 and 47, Clinical Training of Medical Physicists Specializing in Radiation Oncology and Clinical Training of Medical Physicists

  9. Cyber-campaigning in Denmark

    DEFF Research Database (Denmark)

    Hansen, Kasper Møller; Kosiara-Pedersen, Karina

    2014-01-01

    sites and Facebook sites are popular among candidates but other features such as blogs, feeds, newsletter, video uploads, SMS and twitter are used by less than half the candidates. Second, only age and possibly education seem to matter when explaining the uptake of cyber-campaigning. The prominent...... candidates are not significantly more likely to use cyber-campaigning tools and activities. Third, the analysis of the effect of cyber-campaigning shows that the online score has an effect on the inter-party competition for personal votes, but it does not have a significant effect when controlling for other...

  10. Addressing Human Factors Gaps in Cyber Defense

    Science.gov (United States)

    2016-09-23

    awareness (Endsley, 1995), and thus stands a good chance of benefiting from similar study. It should be noted that cyber situation awareness as a...models of the environment, divided across multiple types of cyber operations (Tyworth, Giacobe, Mancuso, McNeese, & Hall, 2013). Given the... Attention Switching in Cyber Security Dr. Christopher Wickens Colorado State University Cyber-security analysts at whatever level they serve

  11. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  12. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    Science.gov (United States)

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  13. CyberKnife robotic stereotactic radiotherapy: technical aspects and medical indications; Radiotherapie stereotaxique robotisee par CyberKnife: aspects techniques et indications

    Energy Technology Data Exchange (ETDEWEB)

    Bondiau, P.Y.; Benezery, K.; Gerard, J.P.; Herault, J.; Marcie, S.; Angellier, G. [Centre Antoine-Lacassagne, Dept. de Radiotherapie, 06 - Nice (France); Beckendorf, V.; Peiffert, D.; Noel, A. [Centre Alexis-Vautrin, Dept. de Radiotherapie et Curietherapie, 54 - Vandoeuvre-les-Nancy (France); Mirabel, X.; Marchesi, V.; Lacornerie, T.; Dubus, F.; Sarrazin, T.; Lartigau, E. [Centre Oscar-Lambret, Dept. de Radiotherapie, 59 - Lille (France)

    2007-11-15

    In 2006, 3 sites have been selected by the Institut national of cancer (Lille, Nancy et Nice) to evaluate a radiotherapy robot, the CyberKnife this machine, able to track mobile tumours in real time, gives new possibilities in the field of extra cranial stereotactic radiotherapy. Functionalities and medico economical issues of the machine will be evaluated during 2 years on the 3 sites. (authors)

  14. Medical intervention in radiological emergencies, formation and training

    International Nuclear Information System (INIS)

    Cardenas H, J.

    2006-01-01

    The work exposes the national experience in the development of training programs in medical aspects of the radiological emergencies. Implemented after valuing the existent situation, identified the necessities and the reach of the training, additionally it was elaborated the content of the training program whose purpose is guided to the invigoration of the medical answer capacity in radiological emergencies The content of the modular program it approaches theoretical- practical aspects on preparation and medical answer in radiological emergencies. The program includes an exercise that simulates a radiological accident, to evaluate during the same one, the answer capacity before this situation. The training concludes with the design of a strategy for the preparation and answer in radiological emergencies in correspondence with the potential accidental scenarios that the participants can face. (Author)

  15. Mass Medication Clinic (MMC) Patient Medical Assistant (PMA) System Training Initiative

    Science.gov (United States)

    2007-06-01

    AD_________________ Award Number: W81XWH-06-2-0045 TITLE: Mass Medication Clinic (MMC) Patient ...SUBTITLE 5a. CONTRACT NUMBER Mass Medication Clinic (MMC) Patient Medical Assistant (PMA) System Training Initiative 5b. GRANT NUMBER W81XWH-06-2...sections will describe the events, results, and accomplishments of this study. With validation through this project the Patient Medical Assistant

  16. China's Cyber Initiatives Counter International Pressure

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2017-03-01

    Full Text Available Prior to its historic 2015 “no hack” pact for commercial advantage with the United States, Beijing has been engaged drafting and passing legislation, most with specific cyber components, to enhance its security posture while protecting its economic interests. This approach is in stark contrast to United States efforts that have demonstrated a focus on “acting globally, thinking locally” philosophy wherein most of its cyber efforts have been outwardly facing and are distinct from other security considerations. This paper suggests that by strengthening its domestic front with a legal framework, Beijing is preparing itself to counter any foreign initiative contrary to Beijing’s plans (e.g., cyber norms of behavior, cyber sanctions, etc. by being able to exert legal measures against foreign interests in country, thereby preserving its cyber sovereignty.

  17. Learning medical history in Oslo: training for medical practice.

    Science.gov (United States)

    Larsen, O

    1999-03-01

    The teaching in medical history at the University of Oslo, Norway, is given as an integrated part of the student training for practical work in health care and community health. I summarize here the underlying argumentation and the teaching experiences, concluding that this is felt as an effective way to convey relevant medical historical knowledge and skills to the future doctors.

  18. Establishing a Cyber Warrior Force

    National Research Council Canada - National Science Library

    Tobin, Scott

    2004-01-01

    Cyber Warfare is widely touted to be the next generation of warfare. As America's reliance on automated systems and information technology increases, so too does the potential vulnerability to cyber attack...

  19. Cyber space bullying

    OpenAIRE

    Popović-Ćitić Branislava

    2009-01-01

    Cyber space bullying is a relatively new phenomenon that has received increased attention by scientists, researchers and practitioners in recent years. It is usually defined as an intentionally and repeatedly expression of aggression towards other people through information and communication technologies. Cyber space bullying is characterized by all the primary characteristics of traditional bullying and some specifics ones that clearly differ it from other forms of bullying. In addition to t...

  20. Cyber Defense Management

    Science.gov (United States)

    2016-09-01

    of market capitalization after a cyber security incident Financial Geer, 2001 Gordon and Loeb, 2005 Willemson, 2006 Determine the return on security...thoughtheir vulnerability may be less. That is because the return on investment for protecting agiven information set is a function both of its vulnerability...can ensure that it is investing properly to provide cyber resilience to its systems. The study investigated ways to inform future investment

  1. What good cyber resilience looks like.

    Science.gov (United States)

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  2. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  3. Skills training of junior medical students

    African Journals Online (AJOL)

    2013-11-02

    Nov 2, 2013 ... Peer tutors enjoyed and benefited from this teaching method without it negatively affecting their own learning. Discussion. ... addressing the problem of skills training of junior medical students where there is a shortage of trained clinical teachers. AJHPE 2013 ... [1] Informal peer teaching usually takes place.

  4. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  5. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  6. Cardiopulmonary Resuscitation Training for Medical Students in Anesthesiology Rotation in Ardabil Medical University (Iran

    Directory of Open Access Journals (Sweden)

    Kh Isazadehfar

    2009-11-01

    Full Text Available Background and purpose: Cardiopulmonary resuscitation (CPR training for undergraduate medical students has been noted to be poor in the past. Attempts have been made The aim of this study is to determine effect of CPR training in the anesthetic ward to improve knowledge and practice undergraduate medical student of CPR.Methods: A 12 month Educational experimental study with self control was done on all undergraduate medical student (n=30 at the medical university of Ardabil in 2006-2007. During I month of program allthis students have undergone CPR training including basic life support (BLS , advanced cardiac life support (ACLS and practical skills. Data were collected via questionnaire, demographic, pre/post knowledge and practice.Results: After training the acceptable score (good and very good about knowledge of BLS, ACLS and practical skill significantly increased %6.7 to %50 (p=0.0001 , %13.3 to %53.4 (p=0.001 and %3.3 to %100 (p=0.001 respectively. A significant relationship between knowledge of ACLS and practical skills was shown (p=0.005.Conclusion: The CPR training course in anesthetic ward leads to a significant increased in skills and knowledge. Adding this course to undergraduate curriculum of medical students especially in operaticallywards (e.g. Anesthetic ward is essential.Keywords: CARDIOPULMONARY RESUSCITATION; TRAINING; BASIC LIFE SUPPORT; ADVANCED CARDIAC LIFE SUPPORT

  7. CENTER FOR CYBER SECURITY STUDIES

    Data.gov (United States)

    Federal Laboratory Consortium — The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare, to facilitate the sharing of expertise...

  8. Definitions of Cyber Terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an

  9. Dampak Media Sosial dalam Cyber Bullying

    Directory of Open Access Journals (Sweden)

    Monica Hidajat

    2015-03-01

    Full Text Available The purpose of this research is to review two journals about social media effect for cyberbullying. First Journal is written by Eddie Fisher with the title From Cyber Bullying to Cyber Coping: The Misuse of Mobile Technology and Social Media and Their Effects on People’s Lives and the second journal is written by ReginaldH. Gonzales with the title Social Media as a Channel and its Implications on Cyber Bullying. First Journal focus on condition and cyber bullying state by interview respondents in law terms. Second journal focus on handling cyber bullying case at social media. Social medial cause few cases of cyberbullying increasing because of its characteristic that possible to spread information easily and fast. Socialization proper use of social media needs to be done to improve public awareness about the dangers of misuse of social media.

  10. Cyber Vulnerabilities Within Critical Infrastructure: The Flaws of Industrial Control Systems in the Oil and Gas Industry

    Science.gov (United States)

    Alpi, Danielle Marie

    The 16 sectors of critical infrastructure in the US are susceptible to cyber-attacks. Potential attacks come from internal and external threats. These attacks target the industrial control systems (ICS) of companies within critical infrastructure. Weakness in the energy sector's ICS, specifically the oil and gas industry, can result in economic and ecological disaster. The purpose of this study was to establish means for oil companies to identify and stop cyber-attacks specifically APT threats. This research reviewed current cyber vulnerabilities and ways in which a cyber-attack may be deterred. This research found that there are insecure devices within ICS that are not regularly updated. Therefore, security issues have amassed. Safety procedures and training thereof are often neglected. Jurisdiction is unclear in regard to critical infrastructure. The recommendations this research offers are further examination of information sharing methods, development of analytic platforms, and better methods for the implementation of defense-in-depth security measures.

  11. The Evolution of Medical Training Simulation in the U.S. Military.

    Science.gov (United States)

    Linde, Amber S; Kunkler, Kevin

    2016-01-01

    The United States has been at war since 2003. During that time, training using Medical Simulation technology has been developed and integrated into military medical training for combat medics, nurses and surgeons. Efforts stemming from the Joint Programmatic Committee-1 (JPC-1) Medical Simulation and Training Portfolio has allowed for the improvement and advancement in military medical training by focusing on research in simulation training technology in order to achieve this. Based upon lessons learned capability gaps have been identified concerning the necessity to validate and enhance combat medial training simulators. These capability gaps include 1) Open Source/Open Architecture; 2) Modularity and Interoperability; and 3) Material and Virtual Reality (VR) Models. Using the capability gaps, JPC-1 has identified important research endeavors that need to be explored.

  12. Operationalizing Army Cyber

    Science.gov (United States)

    2013-03-01

    killed just under 3,000 people and cost the U.S. economy somewhere between three and five trillion dollars. The Japanese attacked with a state... economy , and military readiness. The challenge is to design an Army Cyber force that can support the United States Cyber Command (USCYBERCOM) national...still keeps the intelligence and signal functions separate in most units today from battalion to echelon above Corps ( EAC ). There are many past reasons

  13. Insurability of Cyber Risk: An Empirical Analysis

    OpenAIRE

    Biener, Christian; Eling, Martin; Wirfs, Jan Hendrik

    2015-01-01

    This paper discusses the adequacy of insurance for managing cyber risk. To this end, we extract 994 cases of cyber losses from an operational risk database and analyse their statistical properties. Based on the empirical results and recent literature, we investigate the insurability of cyber risk by systematically reviewing the set of criteria introduced by Berliner (1982). Our findings emphasise the distinct characteristics of cyber risks compared with other operational risks and bring to li...

  14. KYPO Cyber Range: Design and Use Cases

    OpenAIRE

    Vykopal Jan; Ošlejšek Radek; Čeleda Pavel; Vizváry Martin; Tovarňák Daniel

    2017-01-01

    The physical and cyber worlds are increasingly intertwined and exposed to cyber attacks. The KYPO cyber range provides complex cyber systems and networks in a virtualized, fully controlled and monitored environment. Time-efficient and cost-effective deployment is feasible using cloud resources instead of a dedicated hardware infrastructure. This paper describes the design decisions made during it’s development. We prepared a set of use cases to evaluate the proposed design decisions and to de...

  15. Cyber Security: US - Chinese Relations

    OpenAIRE

    Debnárová, Barbora

    2015-01-01

    This diploma thesis deals with cyber relation of the United States of America and the People's republic of China. The aim of this diploma thesis is to answer the following questions: What kind of cyber threat for the United States does China represent? How is China's cyber strategy characterised? How do USA react on this threat and what are the gaps in this reaction? The thesis is divided into four chapters. The first chapter deals with definition of cyberwarfare and its perception in Chinese...

  16. SASTRA CYBER DI INDONESIA

    Directory of Open Access Journals (Sweden)

    Laily Fitriani

    2011-10-01

    Full Text Available The digital era started when the internet technology spread to the developing countries including Indonesia. The flourish of cyber literature leads to the debate on the quality of the work of literature. Above all, the existence of literature sites (cyber literature becomes an important alternative for writers and literary activist in Indonesia.

  17. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  18. Gamification for Measuring Cyber Security Situational Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  19. Cyber security issues imposed on nuclear power plants

    International Nuclear Information System (INIS)

    Kim, Do-Yeon

    2014-01-01

    Highlights: • Provide history of cyber attacks targeting at nuclear facilities. • Provide cyber security issues imposed on nuclear power plants. • Provide possible countermeasures for protecting nuclear power plants. - Abstract: With the introduction of new technology based on the increasing digitalization of control systems, the potential of cyber attacks has escalated into a serious threat for nuclear facilities, resulting in the advent of the Stuxnet. In this regard, the nuclear industry needs to consider several cyber security issues imposed on nuclear power plants, including regulatory guidelines and standards for cyber security, the possibility of Stuxnet-inherited malware attacks in the future, and countermeasures for protecting nuclear power plants against possible cyber attacks

  20. 75 FR 26171 - Cyber Security Certification Program

    Science.gov (United States)

    2010-05-11

    ... Internet users rely are becoming increasingly susceptible to operator error and malicious cyber attack. For... susceptibility to operator error and malicious cyber attack, Federal entities, frequently in cooperation with the... transfers from cyber threats, such as espionage, disruption, and denial of service attacks. Specifically...

  1. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  2. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  3. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  4. On-Demand VM Provisioning for Cloudlet-Based Cyber-Foraging in Resource-Constrained Environments

    NARCIS (Netherlands)

    Lewis, G.A.; Echeverria, S.; Root, J.; Bradshaw, B.

    2014-01-01

    Mobile applications are increasingly used by first responders, medics, researchers and other people in the field support of their missions and tasks. These environments have very limited connectivity and computing resources. Cloudlet-based cyber-foraging is a method of opportunistically discovering

  5. Development of a cyber security risk model using Bayesian networks

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Son, Hanseong; Khalil ur, Rahman; Heo, Gyunyoung

    2015-01-01

    Cyber security is an emerging safety issue in the nuclear industry, especially in the instrumentation and control (I and C) field. To address the cyber security issue systematically, a model that can be used for cyber security evaluation is required. In this work, a cyber security risk model based on a Bayesian network is suggested for evaluating cyber security for nuclear facilities in an integrated manner. The suggested model enables the evaluation of both the procedural and technical aspects of cyber security, which are related to compliance with regulatory guides and system architectures, respectively. The activity-quality analysis model was developed to evaluate how well people and/or organizations comply with the regulatory guidance associated with cyber security. The architecture analysis model was created to evaluate vulnerabilities and mitigation measures with respect to their effect on cyber security. The two models are integrated into a single model, which is called the cyber security risk model, so that cyber security can be evaluated from procedural and technical viewpoints at the same time. The model was applied to evaluate the cyber security risk of the reactor protection system (RPS) of a research reactor and to demonstrate its usefulness and feasibility. - Highlights: • We developed the cyber security risk model can be find the weak point of cyber security integrated two cyber analysis models by using Bayesian Network. • One is the activity-quality model signifies how people and/or organization comply with the cyber security regulatory guide. • Other is the architecture model represents the probability of cyber-attack on RPS architecture. • The cyber security risk model can provide evidence that is able to determine the key element for cyber security for RPS of a research reactor

  6. The cyber threat, trophy information and the fortress mentality.

    Science.gov (United States)

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  7. Clinical Training of Medical Physicists Specializing in Diagnostic Radiology

    International Nuclear Information System (INIS)

    2010-01-01

    The application of radiation in human health, for both diagnosis and treatment of disease, is an important component of the work of the IAEA. The responsibility for the increasing technical aspects of this work is undertaken by the medical physicist. To ensure good practice in this vital area, structured clinical training programmes are required to complement academic learning. This publication is intended to be a guide to the practical implementation of such a programme for diagnostic radiology. There is a general and growing awareness that radiation medicine is increasingly dependent on well trained medical physicists based in the clinical setting. However, an analysis of the availability of medical physicists indicates a large shortfall of qualified and capable professionals. This is particularly evident in developing countries. While strategies to increase academic educational opportunities are critical to such countries, the need for guidance on structured clinical training was recognized by the members of the Regional Cooperative Agreement (RCA) for Research, Development and Training related to Nuclear Sciences for Asia and the Pacific. Consequently, a technical cooperation regional project (RAS6038) under the RCA programme was formulated to address this need in the Asia-Pacific region by developing suitable material and establishing its viability. Development of a clinical training guide for medical physicists specializing in diagnostic radiology started in 2007 with the appointment of a core drafting committee of regional and international experts. The publication drew on the experiences of clinical training programmes in Australia and New Zealand, the UK and the USA, and was moderated by physicists working in the Asian region. This publication follows the approach of the IAEA publication Training Course Series No. 37, Clinical Training of Medical Physicists specializing in Radiation Oncology. This approach to clinical training has been successfully tested

  8. Countering the Cyber-Attack, a case-study [video

    OpenAIRE

    Keith Squires; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    A cyber-criminal organization electronically diverts funds, a hacking group uses their prowess to try to influence politics, these are examples of the evolving world of cyber crime. Keith Squires, Commissioner of Public Safety and Homeland Security Advisor for the State of Utah talks about his experience in building a cyber security program to counter such cyber criminals.

  9. The relationship between Cyber-Loafing and internet addiction

    Directory of Open Access Journals (Sweden)

    Hafize Keser

    2016-03-01

    Full Text Available The goal of this study was to investigate the relationship between preservice teachers’ internet addiction level and cyber-loafing activities. This study was conducted as a survey study. Participants of the study was Computer Education and Instructional Technology department students (n=139 at Ankara University. “Cyber loafing activity Scale” originally developed by Blanchard and Henle (2008, adopted to Turkish by Kalayci (2010 and updated by Yasar (2013 and “Internet Addiction Scale” developed by Sahin and Korkmaz (2011 was used as data collection instruments. To analyze the data descriptive statistics, Mann Whitney U, Kruskal Wallis H, and Spearman Rho Correlation coefficients was used. There were significant differences between the gender groups both in cyber-loafing activities and internet addiction levels. Male preservice teacher had higher internet addiction levels and cyber-loafing activity scores in average. However there were not significant differences between different groups based on grade level, period of internet usage, perceived internet ability, both for cyber-loafing activities and internet addiction levels. There were a moderate positive relationships between internet addiction and individual cyber-loafing, and search cyber-loafing. There were also a small positive relationships between internet addiction and social cyber-loafing. There was not a significant relationship between internet addiction and news cyber-loafing.

  10. Handbook on Securing Cyber-Physical Critical Infrastructure

    CERN Document Server

    Das, Sajal K; Zhang, Nan

    2012-01-01

    The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports a

  11. [Impact of the Core Training Law on preventive medicine and public health training and other common medical specialties].

    Science.gov (United States)

    Latasa, Pello; Gil-Borrelli, Christian; Aguilera, José Antonio; Reques, Laura; Barreales, Saúl; Ojeda, Elena; Alemán, Guadalupe; Iniesta, Carlos; Gullón, Pedro

    2016-01-01

    The purpose of the Core Training Law (CTL) is to amend specialised medical training to include 24 months of common training. The aim of this study is to assess its potential impact on the Preventive Medicine and Public Health (PM&PH) training programme and other medical specialties. The programmes of the 21 common medical specialties were analysed and the recommended training periods for each specialty collected, before the information was agreed upon by three observers. The training impact was calculated as the percentage of months that should be amended per specialty to adapt to the common training schedule. The Preventive Medicine and Public Health training programme is the specialty most affected by the Core Training Law (100%, 24 months). Intensive medicine (0%, 0 months) and medical oncology (17%, 4 months) is the least affected. The CTL affects the common medical specialties in different ways and requires a complete reorganisation of the activities and competencies of PM&PH professionals. Copyright © 2016 SESPAS. Published by Elsevier Espana. All rights reserved.

  12. Cyber Incidents Involving Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this

  13. Improved education after implementation of the Danish postgraduate medical training reform

    DEFF Research Database (Denmark)

    Kodal, Troels; Kjær, Niels Kristian; Qvesel, Dorte

    2012-01-01

    A reform of educational postgraduate medical training was launched in Denmark in 2004. The reform was based on a report by the Danish Medical Specialist Commission and consisted of a number of initiatives that were all aimed at improving the quality of medical training. Since 1998, all junior...... doctors in Denmark have been requested to rate the quality of their training on a Danish standardized questionnaire (DSQ) comprising 24 questions. In this study, we examined how junior doctors in hospitals rated their postgraduate medical training before and six years after the reform was implemented....

  14. Bronchoscopy Simulation Training as a Tool in Medical School Education.

    Science.gov (United States)

    Gopal, Mallika; Skobodzinski, Alexus A; Sterbling, Helene M; Rao, Sowmya R; LaChapelle, Christopher; Suzuki, Kei; Litle, Virginia R

    2018-07-01

    Procedural simulation training is rare at the medical school level and little is known about its usefulness in improving anatomic understanding and procedural confidence in students. Our aim is to assess the impact of bronchoscopy simulation training on bronchial anatomy knowledge and technical skills in medical students. Medical students were recruited by email, consented, and asked to fill out a survey regarding their baseline experience. Two thoracic surgeons measured their knowledge of bronchoscopy on a virtual reality bronchoscopy simulator using the Bronchoscopy Skills and Tasks Assessment Tool (BSTAT), a validated 65-point checklist (46 for anatomy, 19 for simulation). Students performed four self-directed training sessions of 15 minutes per week. A posttraining survey and BSTAT were completed afterward. Differences between pretraining and posttraining scores were analyzed with paired Student's t tests and random intercept linear regression models accounting for baseline BSTAT score, total training time, and training year. The study was completed by 47 medical students with a mean training time of 81.5 ± 26.8 minutes. Mean total BSTAT score increased significantly from 12.3 ± 5.9 to 48.0 ± 12.9 (p training time and frequency of training did not have a significant impact on level of improvement. Self-driven bronchoscopy simulation training in medical students led to improvements in bronchial anatomy knowledge and bronchoscopy skills. Further investigation is under way to determine the impact of bronchoscopy simulation training on future specialty interest and long-term skills retention. Copyright © 2018 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights reserved.

  15. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  16. Carboy Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors

  17. Carboy Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, Daniel [Idaho National Laboratory, Idaho (United States)

    2012-03-15

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  18. Cyber Threats for Organizations of Financial Market Infrastructures

    Directory of Open Access Journals (Sweden)

    Natalia Georgievna Miloslavskaya

    2016-03-01

    Full Text Available Abstract: In the global informatization era the reliable and efficient financial market infrastructure of the Russian Federation (RF FMI plays an important role in the financial system and economy of the country. New cyber risks have acquired the status of the FR FMI systemic risk’s components, the importance of which is constantly growing due to the increase in the possible consequences of their implementation. The article introduces the basic concepts of cyber security, cyber space and cyber threats for the RF FMI and analyzes the specific features of cyber attacks against the RF FMI organizations.

  19. Cyber essentials a pocket guide

    CERN Document Server

    Calder, Alan

    2014-01-01

    Every year, thousands of computer systems in the UK are compromised. The majority fall victim to easily preventable cyber attacks, carried out with tools which are freely available on the Internet.   Cyber Essentials is the UK Government's reaction to the proliferation of these attacks. It requires that organisations put basic security measures in place, enabling them to reliably counter the most common tactics employed by cyber criminals. From 1 October 2014, all suppliers bidding for a range of government ICT contracts - in particu

  20. Index of cyber integrity

    Science.gov (United States)

    Anderson, Gustave

    2014-05-01

    Unfortunately, there is no metric, nor set of metrics, that are both general enough to encompass all possible types of applications yet specific enough to capture the application and attack specific details. As a result we are left with ad-hoc methods for generating evaluations of the security of our systems. Current state of the art methods for evaluating the security of systems include penetration testing and cyber evaluation tests. For these evaluations, security professionals simulate an attack from malicious outsiders and malicious insiders. These evaluations are very productive and are able to discover potential vulnerabilities resulting from improper system configuration, hardware and software flaws, or operational weaknesses. We therefore propose the index of cyber integrity (ICI), which is modeled after the index of biological integrity (IBI) to provide a holistic measure of the health of a system under test in a cyber-environment. The ICI provides a broad base measure through a collection of application and system specific metrics. In this paper, following the example of the IBI, we demonstrate how a multi-metric index may be used as a holistic measure of the health of a system under test in a cyber-environment.

  1. ADDRESSING THE SPECTRE OF CYBER TERRORISM: A COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2012-08-01

    Full Text Available This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.

  2. Towards False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Su, Chunhua

    2018-01-01

    Cyber-Physical Systems (CPS) are integrations of computation, networking and physical processes. Its process control is often referred to as embedded systems. Generally, CPS and Internet of Things (IoT) have the same basic architecture, whereas the former shows a higher combination and coordination...

  3. Cyber Victimization and Perceived Stress: Linkages to Late Adolescents' Cyber Aggression and Psychological Functioning

    Science.gov (United States)

    Wright, Michelle F.

    2015-01-01

    The present study examined multiple sources of strain, particular cyber victimization, and perceived stress from parents, peers, and academics, in relation to late adolescents' (ages 16-18; N = 423) cyber aggression, anxiety, and depression, each assessed 1 year later (Time 2). Three-way interactions revealed that the relationship between Time 1…

  4. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  5. The Soft Side of Cyber Security - Social Media

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    2016-01-01

    The importance of cyber-security is growing. With the continued digitization of our everyday life we become increasingly vulnerable to cyber-attacks – also personally. Therefore, it is an issue to be taken extremely seriously.......The importance of cyber-security is growing. With the continued digitization of our everyday life we become increasingly vulnerable to cyber-attacks – also personally. Therefore, it is an issue to be taken extremely seriously....

  6. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  7. Resilia cyber resilience best practices

    CERN Document Server

    , AXELOS

    2015-01-01

    RESILIA™ Cyber Resilience Best Practices offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes.

  8. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon; Kang, Mingyun

    2015-01-01

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately

  9. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  10. Strategic Review of Medical Training and Career Structure Interim Report

    OpenAIRE

    Department of Health (Ireland)

    2013-01-01

    Click here to download Strategic Review of Medical Training and Career Structure Interim Report PDF 44kb Click here to download Strategic Review of Medical Training and Career Structure Terms of Reference PDF 59KB

  11. Cyber-Mobbing als verletzender Sprechakt im Sinne Judith Butlers

    Directory of Open Access Journals (Sweden)

    Katharina Luckner

    2012-12-01

    Full Text Available Dieser Beitrag widmet sich der Frage, inwiefern Cyber-Mobbing unter Bezugnahme auf Judith Butlers sprach- bzw. diskurstheoretisches Konzept als verletzender Sprechakt verstanden werden kann. Zu diesem Zweck werden in einem ersten Schritt die Besonderheiten von Cyber-Mobbing aufgezeigt und im Anschluss daran ein für diesen Text geeigneter Cyber-Mobbing-Begriff formuliert. Daraufhin erfolgt eine interpretative Auseinandersetzung mit der Butlerschen Konzeption verletzender Sprechakte, bevor anschließend anhand wesentlicher Schnittstellen herausgearbeitet wird, inwiefern Cyber-Mobbing als ein solcher verletzender sprachlicher Akt begriffen werden kann. Resümierend werden die zentralen Ergebnisse der Ausarbeitung zusammengefasst und es wird danach gefragt, welche Konsequenzen bzw. Folgen sich hieraus für ein mögliches verändertes Verständnis von Cyber-Mobbing ergeben.This Paper argues whether cyber bullying can be understood as violating speach act with reference to Judith Butler by starting with a definition of cyber bullying (respectively the term cyber 'mobbing' which is used synonymously in German speaking countries and an outline of Butler's theory. After that, the question of a new or different understanding of cyber bullying and its consequences is discussed.

  12. Cyber Operations Between Russia and Ukraine During Ukrainian Conflict

    Directory of Open Access Journals (Sweden)

    Miroslava Pavlíková

    2016-06-01

    Full Text Available When the Ukraine crisis started in 2013, discussions about possible cyber warfare appeared. Debates about the usage of cyber tools in war conflicts have already been considered for the last few years and conflicts where actors possess these capacities emphasize the importance to analyze this phenomenon. This article examines cyber warfare between Russia and Ukraine during the Ukraine crisis and aims to analyze incidents in the cyber domain with considerations cyber war on a theoretical background.

  13. Cyber security for greater service reliability

    Energy Technology Data Exchange (ETDEWEB)

    Vickery, P. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2008-05-15

    Service reliability in the electricity transmission and distribution (T and D) industry is being challenged by increased equipment failures, harsher climatic conditions, and computer hackers who aim to disrupt services by gaining access to transmission and distribution resources. This article discussed methods of ensuring the cyber-security of T and D operators. Weak points in the T and D industry include remote terminal units; intelligent electronic devices; distributed control systems; programmable logic controllers; and various intelligent field devices. An increasing number of interconnection points exist between an operator's service control system and external systems. The North American Electric Reliability Council (NERC) standards specify that cyber security strategies should ensure that all cyber assets are protected, and that access points must be monitored to detect intrusion attempts. The introduction of new advanced metering initiatives must also be considered. Comprehensive monitoring systems should be available to support compliance with cyber security standards. It was concluded that senior management should commit to a periodic cyber security re-assessment program in order to keep up-to-date.

  14. The Impact of Baccalaureate Medical Humanities on Subsequent Medical Training and Practice: A Physician-Educator's Perspective.

    Science.gov (United States)

    Barron, Lauren

    2017-12-01

    This reflective essay is an attempt to organize trends in feedback I have observed during ten years of coursework, conversations, and correspondence with former students associated with the Medical Humanities Program at Baylor University. Over the years, recurrent themes arise when speaking with alumni about whether and how their medical humanities experience intersects with their current training. I have identified five particular domains in which baccalaureate medical humanities training affects students' subsequent healthcare professions training and practice: context and complementarity, clinical relevance, reflective practice, professional preparedness and vocational calling. I created an instrument of open-ended questions for each of these categories and posted it to social media with an invitation for alumni to respond. This informal survey was conceived as an exploratory exercise with the intent to help generate a foundation for more formal qualitative research in these five domains. In this essay, I offer my own reflections together with those of former students on the impact of baccalaureate-level medical humanities training in order to illustrate the benefits in each domain for subsequent healthcare training and practice. The need for qualitative research that explores the impact of baccalaureate medical humanities merits collaboration between multiple centers of investigation across many disciplines, and across the divide between premedical and medical educators.

  15. Cyber power crime, conflict and security in cyberspace

    CERN Document Server

    Ghernaouti, Solange

    2013-01-01

    Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive approach to cybercrime, cyber-terrorism, cyber-war and cyber-security. This work develops approaches to crucial cyber-security issues that are non-political, non-partisan, and non-governmental. It informs readers through high-level summaries and the presentation of a consistent approach to several cyber-risk related domains, both from a civilian and a military perspective. Explaining fundamental principles in an interdisciplinary manner, it sheds light on the societal, economic, political, military, and technical issues related to the use and misuse of information and communication technologies.

  16. Review on Cyber Security Programs for NPP Application

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eung Se [KEPRI, Daejeon (Korea, Republic of)

    2010-10-15

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS; CFR; RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  17. Review on Cyber Security Programs for NPP Application

    International Nuclear Information System (INIS)

    Oh, Eung Se

    2010-01-01

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS] [CFR] [RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  18. KYPO – A Platform for Cyber Defence Exercises

    OpenAIRE

    Čeleda Pavel; Čegan Jakub; Vykopal Jan; Tovarňák Daniel

    2015-01-01

    Correct and timely responses to cyber attacks are crucial for the effective implementation of cyber defence strategies and policies. The number of threats and ingenuity of attackers is ever growing, as is the need for more advanced detection tools, techniques and skilled cyber security professionals. KYPO – Cyber Exercise & Research Platform is focused on modelling and simulating complex computer systems and networks in a virtualized and separated environment. The platform enables realist...

  19. Train medical physicist-urgent need for advanced radiotherapy

    International Nuclear Information System (INIS)

    Hareyama, Masato; Teshima, Teruki; Yamamoto, Tokihiro; Haga, Akihiro; Nakagawa, Keiichi; Uesaka, Mitsuru

    2008-01-01

    A Japanese advanced charged particle therapy for cancer that places fewer physical burdens on patients is leading the world and stereotactic radiotherapy and intensity-modulated radiotherapy (IMRT) have been implemented also as a high precision radiotherapy. For the further advancement and dissemination of the therapy, training and qualification of medical physicists has become more needed. Cancer professional train course plan has been performed at many universities in Japan partly to train medical physicists. This special issue consists of seven relevant articles from experts of academia. Medical physicists have been qualified by the Japan Radiological Society, but should have national qualification such as to carry out the R and D of therapy equipment. This has been supported by many academia such as the Japanese Society for Therapeutic Radiology and Oncology (JASTRO) but not by the Japan Association of Radiological Technologists (JART). (T. Tanaka)

  20. Money for nothing? The net costs of medical training.

    Science.gov (United States)

    Barros, Pedro P; Machado, Sara R

    2010-09-01

    One of the stages of medical training is the residency programme. Hosting institutions often claim compensation for the training provided. How much should this compensation be? According to our results, given the benefits arising from having residents among the house staff, no transfer (either tuition fee or subsidy) should be set to compensate the hosting institution for providing medical training. This paper quantifies the net costs of medical training, defined as the training costs over and above the wage paid. We jointly consider two effects. On the one hand, residents take extra time and resources from both the hosting institution and the supervisor. On the other hand, residents can be regarded as a less expensive substitute to nurses and/or graduate physicians, in the production of health care, both in primary care centres and hospitals. The net effect can be either positive or negative. We use the fact that residents, in Portugal, are centrally allocated to National Health Service hospitals to treat them as a fixed exogenous production factor. The data used comes from Portuguese hospitals and primary care centres. Cost function estimates point to a small negative marginal impact of residents on hospitals' (-0.02%) and primary care centres' (-0.9%) costs. Nonetheless, there is a positive relation between size and cost to the very large hospitals and primary care centres. Our approach to estimation of residents' costs controls for other teaching activities hospitals might have (namely undergraduate Medical Schools). Overall, the net costs of medical training appear to be quite small.

  1. Porous TiO₂-Based Gas Sensors for Cyber Chemical Systems to Provide Security and Medical Diagnosis.

    Science.gov (United States)

    Galstyan, Vardan

    2017-12-19

    Gas sensors play an important role in our life, providing control and security of technical processes, environment, transportation and healthcare. Consequently, the development of high performance gas sensor devices is the subject of intense research. TiO₂, with its excellent physical and chemical properties, is a very attractive material for the fabrication of chemical sensors. Meanwhile, the emerging technologies are focused on the fabrication of more flexible and smart systems for precise monitoring and diagnosis in real-time. The proposed cyber chemical systems in this paper are based on the integration of cyber elements with the chemical sensor devices. These systems may have a crucial effect on the environmental and industrial safety, control of carriage of dangerous goods and medicine. This review highlights the recent developments on fabrication of porous TiO₂-based chemical gas sensors for their application in cyber chemical system showing the convenience and feasibility of such a model to provide the security and to perform the diagnostics. The most of reports have demonstrated that the fabrication of doped, mixed and composite structures based on porous TiO₂ may drastically improve its sensing performance. In addition, each component has its unique effect on the sensing properties of material.

  2. APPROACH TO CYBER SECURITY ISSUES IN NIGERIA: CHALLENGES AND SOLUTION

    Directory of Open Access Journals (Sweden)

    Frank Ibikunle

    2013-06-01

    Full Text Available Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detailed answers to millions of questions every day. Cyberspace is a world that contains just about anything one is searching for. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats concerning it now need to be taken more seriously. This paper attempts to provide an overview of Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cyber-crime and its eradication. It look at those involved and the reasons for their involvement. Methods of stepping up cyber security and the recommendations that would help in checking the increasing rate of cyber-crimes were highlighted. The paper also attempts to name some challenges of cybercrime and present practical and logical solutions to these threats.

  3. THE CYBER THREAT AND THE PROBLEM OF INFORMATION SECURITY - A critical analysis of the concepts of cyber-power and cyber-space

    Directory of Open Access Journals (Sweden)

    Sebastian SÂRBU

    2017-06-01

    Full Text Available In this paper we approached from a researcher’s angle and analyzed the concepts of cyber-space, cyber-power from the security school perspective, from that of the international organizations, and from the civil society point of view. Therefore we referred to the documents and the international initiatives concerning the security of data transfer in the context of the current threats against cybernetic security on the one hand, and its interpretation as a threat to the values, rights and democratic freedoms of the civil society, on the other. The risk society is defined both through the grid of political sociology, of the Copenhagen school, as a key element of reference in this case, as well as through the necessity to build a safe cyber space, here being scrutinized in a value-based antithesis between terror and democracy / freedom of speech.

  4. The psychological effects of cyber terrorism

    OpenAIRE

    Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

  5. The psychological effects of cyber terrorism.

    Science.gov (United States)

    Gross, Michael L; Canetti, Daphna; Vashdi, Dana R

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

  6. The psychological effects of cyber terrorism

    Science.gov (United States)

    Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism. PMID:28366962

  7. APPROACH TO CYBER SECURITY ISSUES IN NIGERIA: CHALLENGES AND SOLUTION

    OpenAIRE

    Frank Ibikunle; Odunayo Eweniyi

    2013-01-01

    Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detaile...

  8. Finding Malicious Cyber Discussions in Social Media

    Science.gov (United States)

    2016-02-02

    reverse engineering, security, malware , blackhat) were labeled as cyber and posts on non- cyber topics (e.g., astronomy, electronics, beer, biology, mu...firewall, hash, infect, inject, install, key, malicious, malware , network, obfuscate, overflow, packet, password, payload, request, risk, scan, script...cyber vulnerabilities (e.g., malware , overflow, attack). The keyword system lacked the keywords used in Heartbleed discussions, and thus suffered from

  9. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  10. Realizing Scientific Methods for Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  11. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  12. Cyber armies: the unseen military in the grid

    CSIR Research Space (South Africa)

    Aschmann, M

    2015-03-01

    Full Text Available power and/or civilian force within the cyber domain that has the ability to launch cyber-attacks and collect information in order to gain strategic military advantage on a national level. Selected cyber armies are compared to portray the impact...

  13. A New Approach for Education and Training of Medical Physicists in Cuba: From University to Clinical Training

    International Nuclear Information System (INIS)

    Alfonso-Laguardia, R.; Rivero Blanco, J.M.

    2016-01-01

    Full text: According to the international recommendations of IAEA and the International Organization for Medical Physics (IOMP), the education and training of clinically qualified medical physicists (CQMP) should include three main academic and professional elements: a university level education, a postgraduate education specific in medical physics (MP) and a supervised clinical training. In Cuba, most of the medical physicists working in radiation oncology (RO) or nuclear medicine (NM) services have graduated from nuclear related programmes of the High Institute on Applied Technologies and Sciences (InSTEC), who further perform a postgraduate study in medical physics (MP), at the level of a so-called Diploma course or a Master in Sciences. Nevertheless, the third level of education, namely the supervised clinical training has not yet been established, due to the lack of official recognition of the profession of MP by the health authorities. A new approach for comprehensive training of CQMP is presented, where, by maintaining the three elements of education, the process is optimized so that a medical physicist is prepared with the highest level of theoretical and clinical training, in agreement with the current demand of the advanced technologies put in service in Cuban hospitals. (author

  14. Medical Training Experience and Expectations Regarding Future Medical Practice of Medical Students at the University of Cape Verde.

    Science.gov (United States)

    Delgado, Antonio Pedro; Soares Martins, Antonieta; Ferrinho, Paulo

    2017-10-31

    Cape Verde is a small insular developing state. Its first experience of undergraduate medical education began in October 2015. The purpose of this paper is to describe and analyze the professional expectations and profile of the first class of medical students at the University of Cape Verde. A piloted, standardized questionnaire, with closed and open-ended questions, was distributed to registered medical students attending classes on the day of the survey. All data were analyzed using SPSS. Students decided to study medicine in their mid-teens with relatives and friends having had significant influence over their decisions. Other major reasons for choosing medical training include "to take care of other people", "fascination for the subject matters of medicine" and "I have always wanted to". The degree of feminization of the student population is extremely high (20/25; 80.0%). Medical students are in general satisfied with the training program, and have expectations that the training received will allow them to be good professionals. Nevertheless, they consider the course too theoretical. Medical students know that this represents an opportunity for them to contribute to public welfare. Nonetheless, their expectations are to combine public sector practice with private work. Medical students come mostly from Santiago Island where the Capital of the Country is located. They still do not know about their future area of specialization. But all of those who want to specialize want to do so abroad. They mostly expect to follow hospital careers rather than health administration or family and community medicine. This study contributes to the growing body of knowledge about medical students' difficulties and expectations regarding medical schools or curriculums in lusophone countries. The decision to invest in the training of local physicians is justified by the need to be less dependent on foreigners. Local postgraduate medical training programs are already

  15. Cyber Bullying and Academic Performance

    Science.gov (United States)

    Faryadi, Qais

    2011-01-01

    This research investigates the emotional and physiological effects of cyber bullying on the university students. The primary objective of this investigation is to identify the victims of cyber bullying and critically analyze their emotional state and frame of mind in order to provide them with a workable and feasible intervention in fighting cyber…

  16. A Cyber-ITS Framework for Massive Traffic Data Analysis Using Cyber Infrastructure

    Directory of Open Access Journals (Sweden)

    Yingjie Xia

    2013-01-01

    Full Text Available Traffic data is commonly collected from widely deployed sensors in urban areas. This brings up a new research topic, data-driven intelligent transportation systems (ITSs, which means to integrate heterogeneous traffic data from different kinds of sensors and apply it for ITS applications. This research, taking into consideration the significant increase in the amount of traffic data and the complexity of data analysis, focuses mainly on the challenge of solving data-intensive and computation-intensive problems. As a solution to the problems, this paper proposes a Cyber-ITS framework to perform data analysis on Cyber Infrastructure (CI, by nature parallel-computing hardware and software systems, in the context of ITS. The techniques of the framework include data representation, domain decomposition, resource allocation, and parallel processing. All these techniques are based on data-driven and application-oriented models and are organized as a component-and-workflow-based model in order to achieve technical interoperability and data reusability. A case study of the Cyber-ITS framework is presented later based on a traffic state estimation application that uses the fusion of massive Sydney Coordinated Adaptive Traffic System (SCATS data and GPS data. The results prove that the Cyber-ITS-based implementation can achieve a high accuracy rate of traffic state estimation and provide a significant computational speedup for the data fusion by parallel computing.

  17. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  18. Mathematical and Statistical Opportunities in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  19. Recommendations for medical training: a Native Hawaiian patient perspective.

    Science.gov (United States)

    Kamaka, Martina L; Paloma, Diane S L; Maskarinec, Gregory G

    2011-11-01

    Culturally competent health care providers are needed to eliminate healthcare disparities. In the State of Hawai'i, Native Hawaiians suffer some of the worst health disparities. Prior to implementing a cultural competency curriculum to address these disparities, the John A. Burns School of Medicine's Department of Native Hawaiian Health Cultural Competency Curriculum Development team asked Native Hawaiian patients about their experiences and recommendations. We conducted four focus groups of Native Hawaiians to obtain recommendations on physician training, to be incorporated into the curriculum. Participants came from both rural and urban areas. Classical qualitative analysis of data identified recurrent themes. Five primary themes, arising in all four groups, were: (1) customer service; (2) respect for the patient; (3) inter-personal skills; (4) thoroughness of care; and (5) costs of medical care. Secondary themes, occurring in three of the four groups, were: (1) cultural competency training; (2) the training of medical office staff; (3) continuity of care; and (4) the role of the patient. Participants specifically requested that medical students receive cultural competency training about the host culture, its history, values, and traditional and alternative healing practices. The emphasis participants placed on the need for cultural competency training of physicians supports the need to address the role of culture in medical education. Although most of the issues raised are not unique to Hawai'i, participants' recommendations to teach students about the host culture and traditional healing practices identify important themes not usually found in medical school curricula.

  20. Preparing Our Undergraduates to Enter a Cyber World

    OpenAIRE

    Schweitzer , Dino; Gibson , David; Bibighaus , David; Boleng , Jeff

    2011-01-01

    Part 2: WISE 7; International audience; Today’s students have grown up with computer-based technology and need to be prepared to enter a career in a digital world. This includes an understanding of the broader implications of technology such as the growing threat of cyber-crime and cyber-terrorism, cyber-ethics, the legal and social implications of technology, and the local and global impacts. At our institution, we have taken a broad look at ways of integrating cyber awareness and education ...

  1. Cyber security deterrence and it protection for critical infrastructures

    CERN Document Server

    Martellini, Maurizio

    2013-01-01

    The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resil

  2. Teaching and Assessing Communication Skills in Medical Undergraduate Training.

    Science.gov (United States)

    Modi, Jyoti Nath; Anshu, -; Chhatwal, Jugesh; Gupta, Piyush; Singh, Tejinder

    2016-06-08

    Good communication skills are essential for an optimal doctor-patient relationship, and also contribute to improved health outcomes. Although the need for training in communication skills is stated as a requirement in the 1997 Graduate Medical Education Regulations of the Medical Council of India, formal training in these skills has been fragmentary and non-uniform in most Indian curricula. The Vision 2015 document of the Medical Council of India reaffirms the need to include training in communication skills in the MBBS curriculum. Training in communication skills needs approaches which are different from that of teaching other clinical subjects. It is also a challenge to ensure that students not only imbibe the nuances of communication and interpersonal skills, but adhere to them throughout their careers. This article addresses the possible ways of standardizing teaching and assessment of communication skills and integrating them into the existing curriculum.

  3. Cyber Attacks: Emerging Threats to the 21st Century Critical Information Infrastructures

    Directory of Open Access Journals (Sweden)

    Cezar Vasilescu

    2012-06-01

    Full Text Available The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no internationally accepted definitions on the subject, mostly because of the relative recency of the terms. The second part analyzes the cyber realities of recent years, emphasizing the most advertised cyber attacks in the international mass media: Estonia (2007 and Georgia (2008, with a focus on two main lessons learned: how complicated is to define a cyber war and how difficult to defend against it. Crucial implications for world’s countries and the role of NATO in assuring an effective collective cyber defense are analyzed in the third part. The need for the development of strategic cyber defense documents (e.g. NATO Cyber Defense Policy, NATO Strategic Concept is further examined. It is suggested that particular attention should be paid to the development of a procedure for clearly discriminating between events (cyber attacks, cyber war, cyber crime, or cyber terrorism, and to a procedure for the conduct of nation’s legitimate military/civil cyber response operations.

  4. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  5. Self-Development for Cyber Warriors

    Science.gov (United States)

    2011-11-10

    Geospatial Intelligence (GEOINT), Human Intelligence (HUMINT), Open Source Intelligence ( OSINT ), Signals Intelligence (SIGINT) and Measurement and...from career fields with varying degrees of intersection with cyber warfare including: signals intelligence , all source intelligence , and...leverage them in support of cyber warfare operations. All Source Intelligence Ability to request, analyze, synthesize, and fuse intelligence from

  6. Flexibility in Postgraduate Medical Training in the Netherlands.

    Science.gov (United States)

    Hoff, Reinier G; Frenkel, Joost; Imhof, Saskia M; Ten Cate, Olle

    2018-03-01

    Postgraduate medical training in the Netherlands has become increasingly individualized. In this article, the authors describe current practices for three residency programs at the University Medical Center Utrecht: anesthesiology, pediatrics, and ophthalmology. These programs are diverse yet share characteristics allowing for individualized residency training. New residents enter each program throughout the year, avoiding a large simultaneous influx of inexperienced doctors. The usual duration of each is five years. However, the actual duration of rotations or of the program as a whole can be reduced because of residents' previous medical experience or demonstration of early mastery of relevant competencies. If necessary, the duration of training can also increase.Although working hours are already restricted by the European Working Time Directive, most residents choose to train on a part-time basis. The length of their program then is extended proportionally. The extension period added for those residents training part-time can be used to develop specific competencies, complete an elective rotation or research, or explore a focus area. If the resident meets all training objectives before the extension period is completed, the program director can choose to shorten the program length. Recently, entrustable professional activities have been introduced to strengthen workplace-based assessment. The effects on program duration have yet to be demonstrated.Flexible postgraduate training is feasible. Although improving work-life balance for residents is a necessity, attention must be paid to ensuring that they gain the necessary experience and competencies and maintain continuity of care to ensure that high-quality patient care is provided.

  7. Information fusion for cyber-security analytics

    CERN Document Server

    Karabatis, George; Aleroud, Ahmed

    2017-01-01

    This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers. .

  8. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    Science.gov (United States)

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  9. Behavioural Profiling in Cyber-Social Systems

    DEFF Research Database (Denmark)

    Perno, Jason; Probst, Christian W.

    2017-01-01

    Computer systems have evolved from standalone systems, over networked systems, to cyber-physical systems. In all stages, human operators have been essential for the functioning of the system and for understanding system messages. Recent trends make human actors an even more central part of computer...... systems, resulting in what we call "cyber-social systems". In cyber-social systems, human actors and their interaction with a system are essential for the state of the system and its functioning. Both the system's operation and the human's operating it are based on an assumption of each other's behaviour...

  10. Emergency medical personnel training: I. An historical perspective.

    Science.gov (United States)

    Sytkowski, P A; Jacobs, L M; Meany, M

    1983-01-01

    The status of Emergency Medical Technicians has evolved from an undefined role with few rules, regulations, or standards to an established health care profession and a nationally administered program. The evolution of this profession received major impetus from the 1966 report by the National Academy of Science/National Research Council that provided recommended training standards. Development of a training course curriculum for basic life support (BLS) followed. The need for coordinated training of Emergency Medical Technical Technicians was recognized, and funds became available to aid in the national standardization of education, examination, certification, and recertification procedures for EMTs. Concomitant with the attempt to standardize BLS training, advanced life support (ALS) programs grew in number. By 1977 the National Standard Training Curriculum became available and was soon followed by a national certification exam. As states have the option to accept or reject the federal standards embodied in the national training course, there remains variation among programs offered by each state. Because of the difference in need for specific emergency services among the states at a time of increased professional mobility, arguments still exist regarding the desirability of federally mandated training and certification programs.

  11. Cyber Security Applications: Freeware & Shareware

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…

  12. Clinical Training of Medical Physicists Specializing in Nuclear Medicine (Spanish Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The application of radiation in human health, for both diagnosis and treatment of disease, is an important component of the work of the IAEA. The responsibility for the increasingly technical aspects of this work is undertaken by the medical physicist. To ensure good practice in this vital area, structured clinical training programmes are required to complement academic learning. This publication is intended to be a guide to the practical implementation of such a programme for nuclear medicine. There is a general and growing awareness that radiation medicine is increasingly dependent on well trained medical physicists who are based in a clinical setting. However an analysis of the availability of medical physicists indicates a large shortfall of qualified and capable professionals. This is particularly evident in developing countries. While strategies to increase educational opportunities are critical to such countries, the need for guidance on structured clinical training was recognized by the members of the Regional Cooperative Agreement for Research, Development and Training related to Nuclear Science and Technology (RCA) for the Asia-Pacific region. Consequently, a technical cooperation regional project (RAS6038) under the RCA programme was formulated to address this need in this region by developing suitable material and establishing its viability. Development of a clinical training guide for medical physicists specialising in nuclear medicine was started in 2009 with the appointment of a core drafting committee of regional and international experts. The publication drew on the experience of clinical training in Australia, Croatia and Sweden and was moderated by physicists working in the Asian region. The present publication follows the approach of earlier IAEA publications in the Training Course Series, specifically Nos 37 and 47, Clinical Training of Medical Physicists Specializing in Radiation Oncology and Clinical Training of Medical Physicists

  13. Clinical Training of Medical Physicists Specializing in Nuclear Medicine (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The application of radiation in human health, for both diagnosis and treatment of disease, is an important component of the work of the IAEA. The responsibility for the increasingly technical aspects of this work is undertaken by the medical physicist. To ensure good practice in this vital area, structured clinical training programmes are required to complement academic learning. This publication is intended to be a guide to the practical implementation of such a programme for nuclear medicine. There is a general and growing awareness that radiation medicine is increasingly dependent on well trained medical physicists who are based in a clinical setting. However an analysis of the availability of medical physicists indicates a large shortfall of qualified and capable professionals. This is particularly evident in developing countries. While strategies to increase educational opportunities are critical to such countries, the need for guidance on structured clinical training was recognized by the members of the Regional Cooperative Agreement for Research, Development and Training related to Nuclear Science and Technology (RCA) for the Asia-Pacific region. Consequently, a technical cooperation regional project (RAS6038) under the RCA programme was formulated to address this need in this region by developing suitable material and establishing its viability. Development of a clinical training guide for medical physicists specialising in nuclear medicine was started in 2009 with the appointment of a core drafting committee of regional and international experts. The publication drew on the experience of clinical training in Australia, Croatia and Sweden and was moderated by physicists working in the Asian region. The present publication follows the approach of earlier IAEA publications in the Training Course Series, specifically Nos 37 and 47, Clinical Training of Medical Physicists Specializing in Radiation Oncology and Clinical Training of Medical Physicists

  14. Defending Critical Infrastructure as Cyber Key Terrain

    Science.gov (United States)

    2016-08-01

    to Secure Cyberspace (NSSC) is as it lists three strategic objectives:4 1) Prevent cyber attacks against America’s critical infrastructures; 2...House, “National Strategy to Secure Cyberspace,” (Washington, DC: The White House, 2003) Trey Herr, "PrEP: A framework for malware & cyber weapons...David Kuipers and Mark Fabro. “Control Systems Cyber Security : Defense in Depth Strategies,” [United States: Department of Energy, 2006]: 4

  15. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  16. Flexible Training Strategy (National Task Force on Medical Staffing)

    OpenAIRE

    Department of Health (Ireland)

    2003-01-01

    Flexible Training Strategy (National Task Force on Medical Staffing) The Flexible Training Strategy, while endorsing flexible/part-time options recognises that the preferred option for the majority of doctors-in-training and consultants is most likely to continue to be full-time training and work. Click here to download PDF

  17. Romanian Radiation Protection Training Experience in Medical Field

    International Nuclear Information System (INIS)

    Steliana Popescu, F.; Milu, C.; Naghi, E.; Calugareanu, L.; Stroe, F. M.

    2003-01-01

    Studies conducted by the Institute of Public Health Bucharest during the last years emphasised the need of appropriate radioprotection training in the medical field. With the assistance of the International Atomic Energy Agency in Vienna, the Pilot Centre on Clinical Radio pathology in the Institute of Public Health-Bucharest, provided, from 2000 a 7 modular courses (40 hours each), covering the basic topics of ionizing radiation, biological and physical dosimetry, effects of exposure to ionising radiation, radioprotection concepts, planning and medical response in case of a nuclear accident or radiological emergency. The courses are opened for all health specialists, especially for occupational health physicians, focusing on health surveillance of radiation workers and medical management of overexposed workers. Each module is followed up by an examination and credits. The multidisciplinary team of instructors was trained within several train-the-trainers courses, organised by IAEA. The paper discusses the evaluation of these 3 years experience in training and its feedback impact, the aim of the program being to develop a knowledge in the spirit of the new patterns of radiological protection, both for safety and communication with the public. (Author)

  18. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    Science.gov (United States)

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  19. Opioid overdose prevention training with naloxone, an adjunct to basic life support training for first-year medical students.

    Science.gov (United States)

    Berland, Noah; Fox, Aaron; Tofighi, Babak; Hanley, Kathleen

    2017-01-01

    Opioid overdose deaths have reached epidemic proportions in the United States. This problem stems from both licit and illicit opioid use. Prescribing opioids, recognizing risky use, and initiating prevention, including opioid overdose prevention training (OOPT), are key roles physicians play. The American Heart Association (AHA) modified their basic life support (BLS) algorithms to consider naloxone in high-risk populations and when a pulse is appreciated; however, the AHA did not provide OOPT. The authors' intervention filled this training deficiency by teaching medical students opioid overdose resuscitation with a Train-the-Trainer model as part of mandatory BLS training. The authors introduced OOPT, following a Train-the-Trainer model, into the required basic life support (BLS) training for first-year medical students at a single medical school in a large urban area. The authors administered pre- and post-evaluations to assess the effects of the training on opioid overdose knowledge, self-reported preparedness to respond to opioid overdoses, and attitudes towards patients with substance use disorders (SUDs). In the fall 2014, 120 first-year medical students received OOPT. Seventy-three students completed both pre- and posttraining evaluations. Improvements in knowledge about and preparedness to respond to opioid overdoses were statistically significant (P support dissemination of OOPT as a part of BLS training for all medical students, and potentially all BLS providers.

  20. Clinical Training of Medical Physicists Specializing in Radiation Oncology

    International Nuclear Information System (INIS)

    2009-01-01

    The application of radiation in human health, for both diagnosis and treatment of disease, is an important component of the work of the IAEA. The responsibility for the increasing technical aspects of this work is undertaken by the medical physicist. To ensure good practice in this vital area structured clinical training programmes are required to complement academic learning. This publication is intended to be a guide to the practical implementation of such a programme for radiation therapy. There is a general and growing awareness that radiation medicine is increasingly dependant on well trained medical physicists that are based in the clinical setting. However an analysis of the availability of medical physicists indicates a large shortfall of qualified and capable professionals. This is particularly evident in developing countries. While strategies to increase academic educational opportunities are critical to such countries, the need for guidance on structured clinical training was recognised by the members of the Regional Cooperative Agreement (RCA) for research, development and training related to nuclear sciences for Asia and the Pacific. Consequently a technical cooperation regional project (RAS6038) under the RCA programme was formulated to address this need in the Asia Pacific region by developing suitable material and establishing its viability. Development of a clinical training guide for medical physicists specialising in radiation therapy was started in 2005 with the appointment of a core drafting committee of regional and international experts. Since 2005 the IAEA has convened two additional consultant group meetings including additional experts to prepare the present publication. The publication drew heavily, particularly in the initial stages, from the experience and documents of the Clinical Training Programme for Radiation Oncology Medical Physicists as developed by the Australasian College of Physical Scientists and Engineers in Medicine. Their

  1. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  2. Europe’s fragmented approach towards cyber security

    Directory of Open Access Journals (Sweden)

    Karine e Silva

    2013-10-01

    Full Text Available The article proposes a deeper insight into the variety of concepts used to describe the term cyber security and the ways in which it has been used in recent years. It examines the role of three important actors involved in the internet governance arena, namely governments, private sector and civil society, and how they have influenced the debate. To this end, this paper analyses how different organisations, industry and societal actors see cyber security and how their interests influence the way the debate has evolved. The difficult balance between security and fundamental rights, although not new to governments and society, is of great importance for the internet. Citizens have engaged in favour of an open internet. However, little attention has been paid to the demands of citizens and how they may contribute to a concept of cyber security that brings society to its core. The paper states that for cyberspace to be open and supportive of innovation, the practice of cyber security needs to internalise the interests and perspectives of end users. A multistakeholder approach to cyber security asks a more participative environment where the rules of the game are decided with public participation and consultation, giving citizens the means and methods to influence the way cyber security is conceived and implemented. The paper concludes that although a citizen centric approach towards cyber security should be the way forward, this seems to be yet far from being included in the governmental agenda. The methodology applied in the paper was mainly focused on desk research.

  3. Rumination mediates the association between cyber-victimization and depressive symptoms.

    Science.gov (United States)

    Feinstein, Brian A; Bhatia, Vickie; Davila, Joanne

    2014-06-01

    The current study examined the 3-week prospective associations between cyber-victimization and both depressive symptoms and rumination. In addition, a mediation model was tested, wherein rumination mediated the association between cyber-victimization and depressive symptoms. Participants (N = 565 college-age young adults) completed online surveys at two time points 3 weeks apart. Results indicated that cyber-victimization was associated with increases in both depressive symptoms and rumination over time. Furthermore, results of the path analysis indicated that cyber-victimization was associated with increases in rumination over time, which were then associated with greater depressive symptoms, providing support for the proposed mediation effect for women, but not men. Findings extend previous correlational findings by demonstrating that cyber-victimization is associated with increases in symptomatology over time. Findings also suggest that the negative consequences of cyber-victimization extend beyond mental health problems to maladaptive emotion regulation. In fact, rumination may be a mechanism through which cyber-victimization influences mental health problems, at least for women. Mental health professionals are encouraged to assess cyber-victimization as part of standard victimization assessments and to consider targeting maladaptive emotion regulation in addition to mental health problems in clients who have experienced cyber-victimization.

  4. Cyber risk: a big challenge in developed and emerging markets

    OpenAIRE

    Arcuri, Maria Cristina; Brogi, Marina; Gandolfi, Gino

    2016-01-01

    The dependence on cyberspace has considerably increased over time, as such, people look at risk associated with cyber technology. This chapter focuses on the cyber risk issue. The authors aim to describe the global state of the art and point out the potential negative consequences of this type of systemic risk. Cyber risk increasingly affects both public and private institutions. Some of the risks that entities face are the following: computer security breaches, cyber theft, cyber terrorism, ...

  5. Flexibility in Postgraduate Medical Training in the Netherlands

    NARCIS (Netherlands)

    Hoff, Reinier G; Frenkel, Joost; Imhof, Saskia M; Ten Cate, Olle

    2018-01-01

    Postgraduate medical training in the Netherlands has become increasingly individualized. In this article, the authors describe current practices for three residency programs at the University Medical Center Utrecht: anesthesiology, pediatrics, and ophthalmology. These programs are diverse yet share

  6. Emergency medical technician education and training.

    Science.gov (United States)

    Lauro, Joseph; Sullivan, Francis; Williams, Kenneth A

    2013-12-03

    Emergency Medical Services (EMS) training and education are vital and vibrant aspects of a young and evolving profession. This article provides a perspective on this effort in the United States and reviews current activity in Rhode Island.

  7. [Cyber-bullying in adolescents: associated psychosocial problems and comparison with school bullying].

    Science.gov (United States)

    Kubiszewski, V; Fontaine, R; Huré, K; Rusch, E

    2013-04-01

    The aim of this study was to determine the prevalence of adolescents engaged in cyber-bullying and then to identify whether students involved in cyber- and school bullying present the same characteristics of internalizing problems (insomnia, perceived social disintegration, psychological distress) and externalizing problems (general aggressiveness, antisocial behavior). Semi-structured interviews were conducted with 738 adolescents from a high-school and a middle-school (mean age=14.8 ± 2.7). The Electronic Bullying Questionnaire and the Olweus Bully/Victim Questionnaire were used to identify profiles of cyber-bullying (cyber-victim, cyber-bully, cyber-bully/victim and cyber-neutral) and school bullying (victim, bully, bully/victim and neutral). Internalizing problems were investigated using the Athens Insomnia Scale, a Perceived Social Disintegration Scale and a Psychological Distress Scale. Externalizing problems were assessed using a General Aggressiveness Scale and an Antisocial Behavior Scale. Almost one student in four was involved in cyber-bullying (16.4% as cyber-victim, 4.9% as cyber-bully and 5.6% as cyber-bully/victim); 14% of our sample was engaged in school bullying as a victim, 7.2% as a bully and 2.8% as a bully/victim. The majority of adolescents involved in cyber-bullying were not involved in school bullying. With regard to the problems associated with school bullying, internalizing problems were more prevalent in victims and bully/victims, whereas externalizing problems were more common in bullies and bully/victims. A similar pattern was found in cyber-bullying where internalizing problems were characteristic of cyber-victims and cyber-bully/victims. Insomnia was elevated in the cyber-bully group which is specific to cyberbullying. General aggressiveness and antisocial behavior were more prevalent in cyber-bullies and cyber-bully/victims. Looking at the differences between types of bullying, victims of "school only" and "school and cyber

  8. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Directory of Open Access Journals (Sweden)

    Audrey Guinchard

    2011-01-01

    Full Text Available Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war.

  9. Education and Training of Medical Physicists in Europe

    Directory of Open Access Journals (Sweden)

    P. A. Kaplanis

    2008-01-01

    Full Text Available Introduction: Medical Physicist, as a professional who works in a hospital environment, is a member of a wide clinical team which is responsible for the correct diagnosis and the therapeutic methods applied using radiation. The role of a Medical Physicist is multifold and consists of the estimation of the dose received by patients and personnel, the quality control of radiological equipment, the studies for shielding requirements and the training of several health professionals (doctors, medical physicists, radiologists, technicians, nurses. All the above are prerequisites in order to receive the professional license to act as Medical Physicist.Aim-Research Inquires: The aim of European Union (EU via European Federation of Medical Physics (EFOMP is to apply a common policy among the EU countries in the area of Education and Training in Medical Physics within the context of the current developments in the European Higher Education Area arising from “The Bologna Declaration”. A short-term perspective is the free movement of professionals within EU, via the assurance of knowledge and skills uniformity. A necessary preliminary stage is the collection, classification and further process of relevant information at the European level.Methods-Techniques: To achieve the above in an efficient way EFOMP prepared a questionnaire and sent it to the National Organisation for Medical Physics of each country member of EFOMP (NMO. 23 out of 34 country members responded. The main parts (3 in total of this questionnaire and some typical questions were:Part A: Medical Physics Education•Which degree is required? Is this a university degree? How many years of studies does it represent?•Is there a nationally approved education programme and, if yes, then by whom?•Where do the education and training take place (University, Hospital, or both of them? Are these centers accredited and who gives the accreditation?Part B: Qualified / Specialist Medical Physicist

  10. Cyber bullying prevention: intervention in Taiwan.

    Directory of Open Access Journals (Sweden)

    Ming-Shinn Lee

    Full Text Available BACKGROUND: This study aimed to explore the effectiveness of the cyber bullying prevention WebQuest course implementation. METHODOLOGY/FINDINGS: The study adopted the quasi-experimental design with two classes made up of a total of 61 junior high school students of seventh grade. The study subjects comprised of 30 students from the experimental group and 31 students from the control group. The experimental group received eight sessions (total 360 minutes of the teaching intervention for four consecutive weeks, while the control group did not engage in any related courses. The self-compiled questionnaire for the student's knowledge, attitudes, and intentions toward cyber bullying prevention was adopted. Data were analysed through generalized estimating equations to understand the immediate results on the student's knowledge, attitudes, and intentions after the intervention. The results show that the WebQuest course immediately and effectively enhanced the knowledge of cyber bullying, reduced the intentions, and retained the effects after the learning. But it produced no significant impact on the attitude toward cyber bullying. CONCLUSIONS/SIGNIFICANCE: The intervention through this pilot study was effective and positive for cyber bulling prevention. It was with small number of students. Therefore, studies with large number of students and long experimental times, in different areas and countries are warranted.

  11. Cyber bullying prevention: intervention in Taiwan.

    Science.gov (United States)

    Lee, Ming-Shinn; Zi-Pei, Wu; Svanström, Leif; Dalal, Koustuv

    2013-01-01

    This study aimed to explore the effectiveness of the cyber bullying prevention WebQuest course implementation. The study adopted the quasi-experimental design with two classes made up of a total of 61 junior high school students of seventh grade. The study subjects comprised of 30 students from the experimental group and 31 students from the control group. The experimental group received eight sessions (total 360 minutes) of the teaching intervention for four consecutive weeks, while the control group did not engage in any related courses. The self-compiled questionnaire for the student's knowledge, attitudes, and intentions toward cyber bullying prevention was adopted. Data were analysed through generalized estimating equations to understand the immediate results on the student's knowledge, attitudes, and intentions after the intervention. The results show that the WebQuest course immediately and effectively enhanced the knowledge of cyber bullying, reduced the intentions, and retained the effects after the learning. But it produced no significant impact on the attitude toward cyber bullying. The intervention through this pilot study was effective and positive for cyber bulling prevention. It was with small number of students. Therefore, studies with large number of students and long experimental times, in different areas and countries are warranted.

  12. Towards cyber safety education in primary schools in Africa

    CSIR Research Space (South Africa)

    Von Solms, S

    2014-07-01

    Full Text Available , but also increases users' vulnerability to malware infection, cyber-bullying, identity theft and cyber terrorism (Dlamini, Taute, & Radebe, 2011). Africa mainly consists of developing countries which are characterised by limited knowledge, expertise....e. hacking, malware and spyware.  Content-related risks, i.e. exposure to illicit or inappropriate content.  Harassment-related threats, i.e. cyber-bullying, cyber-stalking and other forms of unwanted contact.  Risk of exposing information, i...

  13. Porous TiO2-Based Gas Sensors for Cyber Chemical Systems to Provide Security and Medical Diagnosis

    Science.gov (United States)

    2017-01-01

    Gas sensors play an important role in our life, providing control and security of technical processes, environment, transportation and healthcare. Consequently, the development of high performance gas sensor devices is the subject of intense research. TiO2, with its excellent physical and chemical properties, is a very attractive material for the fabrication of chemical sensors. Meanwhile, the emerging technologies are focused on the fabrication of more flexible and smart systems for precise monitoring and diagnosis in real-time. The proposed cyber chemical systems in this paper are based on the integration of cyber elements with the chemical sensor devices. These systems may have a crucial effect on the environmental and industrial safety, control of carriage of dangerous goods and medicine. This review highlights the recent developments on fabrication of porous TiO2-based chemical gas sensors for their application in cyber chemical system showing the convenience and feasibility of such a model to provide the security and to perform the diagnostics. The most of reports have demonstrated that the fabrication of doped, mixed and composite structures based on porous TiO2 may drastically improve its sensing performance. In addition, each component has its unique effect on the sensing properties of material. PMID:29257076

  14. Just-In-Time eTraining Applied To Emergency Medical Services

    OpenAIRE

    Vico Vela, Francisco José; Sánchez Canteli, Vicente; Lobo Fernández, Daniel; Fernández Rodríguez, Jose David; Bandera, César; Rivas, Ramón; Rosen, M.; Schlegel, M.

    2013-01-01

    While the applications of just-in-time training are more and more spread, the ubiquitous mobile technology has not found practical uses of this training strategy. As an original example of services for healthcare, we present in this work an application of eTraining that makes use of mobile telephones to transmit medical and on-site information content to emergency medical personnel that attend and emergency. The state-of-the-art in related technologies, overall architectu...

  15. Research Directions for Cyber Experimentation: Workshop Discussion Analysis.

    Energy Technology Data Exchange (ETDEWEB)

    DeWaard, Elizabeth [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Deccio, Casey [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Fritz, David Jakob [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Tarman, Thomas D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    Sandia National Laboratories hosted a workshop on August 11, 2017 entitled "Research Directions for Cyber Experimentation," which focused on identifying and addressing research gaps within the field of cyber experimentation , particularly emulation testbeds . This report mainly documents the discussion toward the end of the workshop, which included research gaps such as developing a sustainable research infrastructure, exp anding cyber experimentation, and making the field more accessible to subject matter experts who may not have a background in computer science . Other gaps include methodologies for rigorous experimentation, validation, and uncertainty quantification, which , if addressed, also have the potential to bridge the gap between cyber experimentation and cyber engineering. Workshop attendees presented various ways to overcome these research gaps, however the main conclusion for overcoming these gaps is better commun ication through increased workshops, conferences, email lists, and slack chann els, among other opportunities.

  16. Undergraduate Medical Academic Performance is Improved by Scientific Training

    Science.gov (United States)

    Zhang, Lili; Zhang, Wei; Wu, Chong; Liu, Zhongming; Cai, Yunfei; Cao, Xingguo; He, Yushan; Liu, Guoxiang; Miao, Hongming

    2017-01-01

    The effect of scientific training on course learning in undergraduates is still controversial. In this study, we investigated the academic performance of undergraduate students with and without scientific training. The results show that scientific training improves students' test scores in general medical courses, such as biochemistry and…

  17. Systematic review of serious games for medical education and surgical skills training

    NARCIS (Netherlands)

    Graafland, M.; Schraagen, J.M.C.; Schijven, M.P.

    2012-01-01

    Background: The application of digital games for training medical professionals is on the rise. So-called ‘serious’ games form training tools that provide a challenging simulated environment, ideal for future surgical training. Ultimately, serious games are directed at reducing medical error and

  18. Cyber-security: industrials must stop denying the risk of cyber-attacks

    International Nuclear Information System (INIS)

    Hausermann, L.

    2015-01-01

    The risk of cyber-attacks of industrial sites is real. Recently the Anvers port and the Bakou-Tbilissi-Ceyhan pipeline have been attacked. In both cases hackers succeeded: they were able to track sea containers in which drug was concealed and recover it in the Anvers port and in the case of the pipeline the hackers took control of the control system and were able to trigger a huge explosion by shunning security systems and allowing damaging pressure surges. The massive use of digital systems and of automated systems in various industrial sectors has led to huge network of inter-connected smart devices whose purpose is not to process data but to monitor and control. All these devices and equipment are controlled by software whose weaknesses and fault lines multiply the risk of cyber-attacks even for 'closed' networks. While the total hacking of a nuclear power plant is highly unlikely, real threats exist and must be taken into account. Innovative solutions based on the mapping of the fluxes of the system and combined with an inventory of all its weaknesses may pave the way towards cyber-security. (A.C.)

  19. Blended Training for Combat Medics

    Science.gov (United States)

    Fowlkes, Jennifer; Dickinson, Sandra; Lazarus, Todd

    2010-01-01

    Bleeding from extremity wounds is the number one cause of preventable death on the battlefield and current research stresses the importance of training in preparing every Soldier to use tourniquets. HapMed is designed to provide tourniquet application training to combat medics and Soldiers using a blended training solution encompassing information, demonstration, practice, and feedback. The system combines an instrumented manikin arm, PDA, and computer. The manikin arm provides several training options including stand-alone, hands-on skills training in which soldiers can experience the actual torque required to staunch bleeding from an extremity wound and be timed on tourniquet application. This is more realistic than using a block of wood to act as a limb, which is often how training is conducted today. Combining the manikin arm with the PDA allows instructors to provide scenario based training. In a classroom or field setting, an instructor can specify wound variables such as location, casualty size, and whether the wound is a tough bleed. The PDA also allows more detailed feedback to be provided. Finally, combining the manikin arm with game-based technologies, the third component, provides opportunities to build knowledge and to practice battlefield decision making. Not only do soldiers learn how to apply a tourniquet, but when to apply a tourniquet in combat. The purpose of the paper is to describe the learning science underlying the design of HapMed, illustrate the training system and ways it is being expanded to encompass other critical life-saving tasks, and report on feedback received from instructors and trainees at military training and simulation centers.

  20. Cyber-physical-social System in Intelligent Transportation

    Institute of Scientific and Technical Information of China (English)

    Gang Xiong; Fenghua Zhu; Xiwei Liu; Xisong Dong; Wuling Huang; Songhang Chen; Kai Zhao

    2015-01-01

    A cyber-physical system(CPS) is composed of a physical system and its corresponding cyber systems that are tightly fused at all scales and levels.CPS is helpful to improve the controllability,efficiency and reliability of a physical system,such as vehicle collision avoidance and zero-net energy buildings systems.It has become a hot R&D and practical area from US to EU and other countries.In fact,most of physical systems and their cyber systems are designed,built and used by human beings in the social and natural environments.So,social systems must be of the same importance as their CPSs.The indivisible cyber,physical and social parts constitute the cyber-physical-social system(CPSS),a typical complex system and it’s a challengeable problem to control and manage it under traditional theories and methods.An artificial systems,computational experiments and parallel execution(ACP) methodology is introduced based on which data-driven models are applied to social system.Artificial systems,i.e.,cyber systems,are applied for the equivalent description of physical-social system(PSS).Computational experiments are applied for control plan validation.And parallel execution finally realizes the stepwise control and management of CPSS.Finally,a CPSS-based intelligent transportation system(ITS) is discussed as a case study,and its architecture,three parts,and application are described in detail.

  1. Data Intensive Architecture for Scalable Cyber Analytics

    Energy Technology Data Exchange (ETDEWEB)

    Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

    2011-12-19

    Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a month’s worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin® for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a month’s worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.

  2. The determination of cyber bullying behaviour and exposure of university students

    Directory of Open Access Journals (Sweden)

    Zehra Özçınar

    2012-01-01

    Full Text Available This study, the questions, which are used to understand the type and frequency of being exposed to cyber despotism and alsoto understand if they practice the cyber despotism to others, are asked to university students. In this light, “CyberDespotism/Victim Development Scale” is used. According to the results of this scale, exposing to and practicing the cyberdespotism are clarified by the statistical method. The main purpose of the study is to determine the despotism, which is thedimension of violence and also to determine the reasons, frequency, and the way of solutions of the despotism in order topresent the preventive solutions to parents and educators.In this study, the questions, which are used to understand thetype and frequency of being exposed to cyber despotism and also to understand if they practice the cyber despotism toothers, are asked to university students. In this light, “Cyber Despotism/Victim Development Scale” is used.The frequency ofusing information technology among university students is 37.63 and the purpose of using information technology can belisted in order this way: specific packet program research (97.63%, homework (69.13%, and lastly social network(59.00%.The students that are 25 years old and above are both cyber despot and cyber victim contrast to other agegroups.Male students are more in the situation of cyber victim at subscale I and III and more in situation of cyber despot atsubscale I, II, and III than female students.The students, who study at the computer and education technology department,are more in the situation of cyber despot at despot subscale I and II behavior than the other students, who study in otherdepartments. On the other hand, the results show that the students at in the department of preschool teaching are the onesthat are less cyber despot than the other students.The students, whose cumulative GPA are 1.99 and below 1.99, are moreexposed to be cyber despot and cyber victim than the

  3. Cyber child sexual exploitation.

    Science.gov (United States)

    Burgess, Ann Wolbert; Mahoney, Meghan; Visk, Julie; Morgenbesser, Leonard

    2008-09-01

    A 2-year review of 285 child cyber crime cases reported in the newspaper revealed how the Internet offenders were apprehended, the content of child pornography, and crime classification. A subsample of 100 cases with data on offender occupation revealed 73% of cases involved people in positions of authority. The dynamics of child cyber crime cases direct the implications for nursing practice in terms of evidence-based suspicion for reporting, categorizing the content of Internet images, referral of children for counseling, and treatment of offenders.

  4. History and Outcomes of 50 Years of Physician-Scientist Training in Medical Scientist Training Programs.

    Science.gov (United States)

    Harding, Clifford V; Akabas, Myles H; Andersen, Olaf S

    2017-10-01

    Physician-scientists are needed to continue the great pace of recent biomedical research and translate scientific findings to clinical applications. MD-PhD programs represent one approach to train physician-scientists. MD-PhD training started in the 1950s and expanded greatly with the Medical Scientist Training Program (MSTP), launched in 1964 by the National Institute of General Medical Sciences (NIGMS) at the National Institutes of Health. MD-PhD training has been influenced by substantial changes in medical education, science, and clinical fields since its inception. In 2014, NIGMS held a 50th Anniversary MSTP Symposium highlighting the program and assessing its outcomes. In 2016, there were over 90 active MD-PhD programs in the United States, of which 45 were MSTP supported, with a total of 988 trainee slots. Over 10,000 students have received MSTP support since 1964. The authors present data for the demographic characteristics and outcomes for 9,683 MSTP trainees from 1975-2014. The integration of MD and PhD training has allowed trainees to develop a rigorous foundation in research in concert with clinical training. MSTP graduates have had relative success in obtaining research grants and have become prominent leaders in many biomedical research fields. Many challenges remain, however, including the need to maintain rigorous scientific components in evolving medical curricula, to enhance research-oriented residency and fellowship opportunities in a widening scope of fields targeted by MSTP graduates, to achieve greater racial diversity and gender balance in the physician-scientist workforce, and to sustain subsequent research activities of physician-scientists.

  5. Internet Governance amp Cyber Crimes In UAE

    OpenAIRE

    Ayesha Al Neyadi; Alia Al Kaabi; Laila Al Kaabi; Mariam Al Ghufli; Maitha Al Shamsi; Dr. Muhammad Khan

    2015-01-01

    Abstract Most people in UAE dont feel safe while they are use the Internet because most internet users have been a victim for cyber crime. Cyber crime threat rate has increased which has targeted on citizen privacy property and governments also the reputation problems. There are many criminal activities such as indecent acts Copyright issues Terrorist Acts State security and Contempt of religion. Cyber crimes due to several reasons such as they have lack of social intelligence they are being ...

  6. A Survey of Cyber Crime in Greece

    Directory of Open Access Journals (Sweden)

    A. Papanikolaou

    2014-11-01

    Full Text Available During the past years, the Internet has evolved into the so-called “Web 2.0”. Nevertheless, the wide use of the offered Internet services has rendered individual users a potential target to cyber criminals. The paper presents a review and analysis of various cyber crimes, based on the cases that were reported to the Cyber Crime and Computer Crime Unit of the Greek Police Force and compares them to similar data of other EU countries.

  7. Decentralised training for medical students: a scoping review

    Directory of Open Access Journals (Sweden)

    Marietjie de Villiers

    2017-11-01

    Full Text Available Abstract Background Increasingly, medical students are trained at sites away from the tertiary academic health centre. A growing body of literature identifies the benefits of decentralised clinical training for students, the health services and the community. A scoping review was done to identify approaches to decentralised training, how these have been implemented and what the outcomes of these approaches have been in an effort to provide a knowledge base towards developing a model for decentralised training for undergraduate medical students in lower and middle-income countries (LMICs. Methods Using a comprehensive search strategy, the following databases were searched, namely EBSCO Host, ERIC, HRH Global Resources, Index Medicus, MEDLINE and WHO Repository, generating 3383 references. The review team identified 288 key additional records from other sources. Using prespecified eligibility criteria, the publications were screened through several rounds. Variables for the data-charting process were developed, and the data were entered into a custom-made online Smartsheet database. The data were analysed qualitatively and quantitatively. Results One hundred and five articles were included. Terminology most commonly used to describe decentralised training included ‘rural’, ‘community based’ and ‘longitudinal rural’. The publications largely originated from Australia, the United States of America (USA, Canada and South Africa. Fifty-five percent described decentralised training rotations for periods of more than six months. Thematic analysis of the literature on practice in decentralised medical training identified four themes, each with a number of subthemes. These themes were student learning, the training environment, the role of the community, and leadership and governance. Conclusions Evident from our findings are the multiplicity and interconnectedness of factors that characterise approaches to decentralised training. The student

  8. Undergraduate medical academic performance is improved by scientific training.

    Science.gov (United States)

    Zhang, Lili; Zhang, Wei; Wu, Chong; Liu, Zhongming; Cai, Yunfei; Cao, Xingguo; He, Yushan; Liu, Guoxiang; Miao, Hongming

    2017-09-01

    The effect of scientific training on course learning in undergraduates is still controversial. In this study, we investigated the academic performance of undergraduate students with and without scientific training. The results show that scientific training improves students' test scores in general medical courses, such as biochemistry and molecular biology, cell biology, physiology, and even English. We classified scientific training into four levels. We found that literature reading could significantly improve students' test scores in general courses. Students who received scientific training carried out experiments more effectively and published articles performed better than their untrained counterparts in biochemistry and molecular biology examinations. The questionnaire survey demonstrated that the trained students were more confident of their course learning, and displayed more interest, motivation and capability in course learning. In summary, undergraduate academic performance is improved by scientific training. Our findings shed light on the novel strategies in the management of undergraduate education in the medical school. © 2017 by The International Union of Biochemistry and Molecular Biology, 45(5):379-384, 2017. © 2017 The International Union of Biochemistry and Molecular Biology.

  9. Emergency Medical Technician Training for Medical Students: A Two-Year Experience.

    Science.gov (United States)

    Blackwell, Thomas H; Halsey, R Maglin; Reinovsky, Jennifer H

    2016-01-01

    New medical school educational curriculum encourages early clinical experiences along with clinical and biomedical integration. The University of South Carolina School of Medicine Greenville, one of the new expansion schools, was established in 2011 with the first class matriculating in 2012. To promote clinical skills early in the curriculum, emergency medical technician (EMT) training was included and begins in the first semester. Along with the early clinical exposure, the program introduces interprofessional health and teams and provides the opportunity for students to personally see and appreciate the wide variety of environments from which their future patients emanate. This report describes the EMT program and changes that were made after the first class that were designed to integrate EMT training with the biomedical sciences and to assess the value of these integrative changes using objective criteria. A two-year retrospective study was conducted that involved the first two classes of medical students. Baseline student data and pass rates from the psychomotor skill and written components of the State examination were used to determine if students performed better in the integrated, prolonged course. There were 53 students in the first class and 54 in the second. Of the 51 students in the first class and 53 students in the second class completing the state psychomotor and written examination, 20 (39%) in the first class and 17 (32%) in the second passed on the initial psychomotor skill attempt; however, more students passed in the first three attempts in the second class than the first class, 51 (96%) versus 45 (88%) , respectively. All students passed by 5 attempts. For the written examination, 50 (98%) students in the first class and 51 (96%) in the second class passed on the first attempt. All students passed by the third attempt. Pass rates on both components of the State examination were not significantly different between classes. Medical students who

  10. An analysis of the medical specialty training system in Spain.

    Science.gov (United States)

    Freire, José-Manuel; Infante, Alberto; de Aguiar, Adriana Cavalcanti; Carbajo, Pilar

    2015-06-02

    In this paper, we analyse the medical specialty training system in Spain (the so-called "residency system"). In order to do so, we a) summarize its historical evolution; b) describe the five major architectural pillars on which the system is currently based; c) analyse the special contract of the specialist-in-training; d) discuss the three major challenges for the medical specialist training future: the evolution and expansion of the residency system to other health professions, the issue of grouping specialties with a common core trunk and the continuity of the learning process; and e) draw four conclusions that may be relevant for those who are in the process of developing or revising their own medical specialization systems.

  11. Normative beliefs about aggression and cyber aggression among young adults: a longitudinal investigation.

    Science.gov (United States)

    Wright, Michelle F; Li, Yan

    2013-01-01

    This longitudinal study examined normative beliefs about aggression (e.g., face-to-face, cyber) in relation to the engagement in cyber aggression 6 months later among 126 (69 women) young adults. Participants completed electronically administered measures assessing their normative beliefs, face-to-face and cyber aggression at Time 1, and cyber aggression 6 months later (Time 2). We found that men reported more cyber relational and verbal aggression when compared to women. After controlling for each other, Time 1 face-to-face relational aggression was positively related to Time 2 cyber relational aggression, whereas Time 1 face-to-face verbal aggression was positively related to Time 2 cyber verbal aggression. Normative beliefs regarding cyber aggression was positively related to both forms of cyber aggression 6 months later, after controlling for normative beliefs about face-to-face aggression. Furthermore, a significant two-way interaction between Time 1 cyber relational aggression and normative beliefs about cyber relational aggression was found. Follow-up analysis showed that Time 1 cyber relational aggression was more strongly related to Time 2 cyber relational aggression when young adults held higher normative beliefs about cyber relational aggression. A similar two-way interaction was found for cyber verbal aggression such that the association between Time 1 and Time 2 cyber verbal aggression was stronger at higher levels of normative beliefs about cyber verbal aggression. Results are discussed in terms of the social cognitive and behavioral mechanisms associated with the engagement of cyber aggression. © 2013 Wiley Periodicals, Inc.

  12. International Cyber Incident Repository System: Information Sharing on a Global Scale

    Energy Technology Data Exchange (ETDEWEB)

    Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.; Israeli, Daniel

    2017-02-02

    According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelated Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.

  13. Cyber Security in Digital I and C Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William [Doosan HF Controls, Texas (United States)

    2011-08-15

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described.

  14. Cyber Security in Digital I and C Implementation

    International Nuclear Information System (INIS)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William

    2011-01-01

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described

  15. Toward a theoretical framework for trustworthy cyber sensing

    Science.gov (United States)

    Xu, Shouhuai

    2010-04-01

    Cyberspace is an indispensable part of the economy and society, but has been "polluted" with many compromised computers that can be abused to launch further attacks against the others. Since it is likely that there always are compromised computers, it is important to be aware of the (dynamic) cyber security-related situation, which is however challenging because cyberspace is an extremely large-scale complex system. Our project aims to investigate a theoretical framework for trustworthy cyber sensing. With the perspective of treating cyberspace as a large-scale complex system, the core question we aim to address is: What would be a competent theoretical (mathematical and algorithmic) framework for designing, analyzing, deploying, managing, and adapting cyber sensor systems so as to provide trustworthy information or input to the higher layer of cyber situation-awareness management, even in the presence of sophisticated malicious attacks against the cyber sensor systems?

  16. Learning Management Platform for CyberCIEGE

    Science.gov (United States)

    2011-12-01

    CLE is a platform that allows academic and research collaboration and it is built on open pedagogy and open standard [16]. In those situations...C. Irvine, “Active learning with the CyberCIEGE video game,” in Proceedings of the 4th Conference on Cyber Security Experimentation and Test, 2011

  17. Cyber-Cops: Angels on the Net.

    Science.gov (United States)

    Educom Review, 1996

    1996-01-01

    Curtis Sliwa, founder of the Guardian Angels citizens' safety patrol, discusses the development of the Cyber Angels, an online citizens' patrol group that monitors Internet communication. Cyber Angels voluntarily look for and report any illegal activity conducted over the Internet, such as pyramid scams, transmission of stolen credit card and…

  18. The energy sector exposed to the cyber-threat

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2016-01-01

    Technologies of information and communication (TICs) are present at all stages of energy production, transport and distribution, and this development is an opportunity for a better resources allocation, but also makes physical infrastructures more vulnerable to cyber-crime. The example of a cyber-attack against Ukrainian utilities in 2015 showed that this threat is an actual one, and the author outlines how energy companies are particularly vulnerable to these threats for cultural, historical and organisational reasons. Some simulations already assessed the huge costs of a cyber-attack against these infrastructures. The author then discusses the perspective and possibilities of development of a cyber-safety in Europe

  19. Surgical and procedural skills training at medical school - a national review.

    Science.gov (United States)

    Davis, Christopher R; Toll, Edward C; Bates, Anthony S; Cole, Matthew D; Smith, Frank C T

    2014-01-01

    This national study quantifies procedural and surgical skills training at medical schools in the United Kingdom (UK), a stipulated requirement of all graduates by the General Medical Council (GMC). A questionnaire recorded basic procedural and surgical skills training provided by medical schools and surgical societies in the UK. Skills were extracted from (1) GMC Tomorrows Doctors and (2) The Royal College of Surgeons Intercollegiate Basic Surgical Skills (BSS) course. Data from medical school curricula and extra-curricular student surgical societies were compared against the national GMC guidelines and BSS course content. Data were analysed using Mann-Whitney U tests. Representatives from 23 medical schools completed the survey (71.9% response). Thirty one skills extracted from the BSS course were split into 5 categories, with skills content cross referenced against GMC documentation. Training of surgical skills by medical schools was as follows: Gowning and gloving (72.8%), handling instruments (29.4%), knot tying (17.4%), suturing (24.7%), other surgical techniques (4.3%). Surgical societies provided significantly more training of knot tying (64.4%, P = 0.0013) and suturing (64.5%, P = 0.0325) than medical schools. Medical schools provide minimal basic surgical skills training, partially supplemented by extracurricular student surgical societies. Our findings suggest senior medical students do not possess simple surgical and procedural skills. Newly qualified doctors are at risk of being unable to safely perform practical procedures, contradicting GMC Guidelines. We propose a National Undergraduate Curriculum in Surgery and Surgical Skills to equip newly qualified doctors with basic procedural skills to maximise patient safety. Copyright © 2014 Surgical Associates Ltd. Published by Elsevier Ltd. All rights reserved.

  20. A Cyber Situational Awareness Model for Network Administrators

    Science.gov (United States)

    2017-03-01

    amount of unnecessary data and focus on the most important information that can help them better guarantee cyber security of their systems. 14. SUBJECT...the most important information that can help them better guarantee cyber security of their systems. vi THIS PAGE INTENTIONALLY LEFT BLANK vii...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Although there are many well-established cyber security tools and techniques available to

  1. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  2. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    Science.gov (United States)

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  3. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  4. GeoBrain Computational Cyber-laboratory for Earth Science Studies

    Science.gov (United States)

    Deng, M.; di, L.

    2009-12-01

    modeling through the web portal. The GeoBrain cyber-laboratory provides solutions to meet common needs of ES research and education, such as, distributed data access and analysis services, easy access to and use of ES data, and enhanced geoprocessing and geospatial modeling capability. It greatly facilitates ES research, education, and applications. The development of the cyber-laboratory provides insights, lessons-learned, and technology readiness to build more capable computing infrastructure for ES studies, which can meet wide-range needs of current and future generations of scientists, researchers, educators, and students for their formal or informal educational training, research projects, career development, and lifelong learning.

  5. Clinical Training of Medical Physicists Specializing in Diagnostic Radiology (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The application of radiation in human health, for both diagnosis and treatment of disease, is an important component of the work of the IAEA. The responsibility for the increasing technical aspects of this work is undertaken by the medical physicist. To ensure good practice in this vital area, structured clinical training programmes are required to complement academic learning. This publication is intended to be a guide to the practical implementation of such a programme for diagnostic radiology. There is a general and growing awareness that radiation medicine is increasingly dependent on well trained medical physicists based in the clinical setting. However, an analysis of the availability of medical physicists indicates a large shortfall of qualified and capable professionals. This is particularly evident in developing countries. While strategies to increase academic educational opportunities are critical to such countries, the need for guidance on structured clinical training was recognized by the members of the Regional Cooperative Agreement (RCA) for Research, Development and Training related to Nuclear Sciences for Asia and the Pacific. Consequently, a technical cooperation regional project (RAS6038) under the RCA programme was formulated to address this need in the Asia-Pacific region by developing suitable material and establishing its viability. Development of a clinical training guide for medical physicists specializing in diagnostic radiology started in 2007 with the appointment of a core drafting committee of regional and international experts. The publication drew on the experiences of clinical training programmes in Australia and New Zealand, the UK and the USA, and was moderated by physicists working in the Asian region. This publication follows the approach of the IAEA publication Training Course Series No. 37, Clinical Training of Medical Physicists specializing in Radiation Oncology. This approach to clinical training has been successfully tested

  6. Clinical Training of Medical Physicists Specializing in Diagnostic Radiology (Spanish Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The application of radiation in human health, for both diagnosis and treatment of disease, is an important component of the work of the IAEA. The responsibility for the increasing technical aspects of this work is undertaken by the medical physicist. To ensure good practice in this vital area, structured clinical training programmes are required to complement academic learning. This publication is intended to be a guide to the practical implementation of such a programme for diagnostic radiology. There is a general and growing awareness that radiation medicine is increasingly dependent on well trained medical physicists based in the clinical setting. However, an analysis of the availability of medical physicists indicates a large shortfall of qualified and capable professionals. This is particularly evident in developing countries. While strategies to increase academic educational opportunities are critical to such countries, the need for guidance on structured clinical training was recognized by the members of the Regional Cooperative Agreement (RCA) for Research, Development and Training related to Nuclear Sciences for Asia and the Pacific. Consequently, a technical cooperation regional project (RAS6038) under the RCA programme was formulated to address this need in the Asia-Pacific region by developing suitable material and establishing its viability. Development of a clinical training guide for medical physicists specializing in diagnostic radiology started in 2007 with the appointment of a core drafting committee of regional and international experts. The publication drew on the experiences of clinical training programmes in Australia and New Zealand, the UK and the USA, and was moderated by physicists working in the Asian region. This publication follows the approach of the IAEA publication Training Course Series No. 37, Clinical Training of Medical Physicists specializing in Radiation Oncology. This approach to clinical training has been successfully tested

  7. Examining relationship between being cyber bully/ cyber victim and social perceptual levels of adolescents

    OpenAIRE

    Şahin, Mustafa; Sarı, Sinan Volkan; Şafak, Zekeriya

    2010-01-01

    This study aims to investigate the relationship between being cyber- bully / cyber-victim and social perception levels in adolescents. In this study, descriptive method was employed. The sample of the study consited of 300 students whom attending different high schools in Trabzon in 2009-2010 school years. 159 students of the sample were boys (% 53) and 141 students were girls (% 47). Cyberbullying Scale and Social Comparision Scale were used to collect the data. Pearson correlation coefficie...

  8. Personnel training and patient education in medical marijuana dispensaries in Oregon.

    Science.gov (United States)

    Linares, Roberto; Choi-Nurvitadhi, Jo; Cooper, Svetlana; Ham, YoungYoon; Ishmael, Jane E; Zweber, Ann

    2016-01-01

    To determine the knowledge and training of Oregon Medical Marijuana Dispensary (OMMD) personnel and describe the information and type of advice provided to patients who use Oregon dispensaries. Statewide cross-sectional email survey of OMMD personnel. Of the 141 surveys, 47 were initiated. The most frequently referenced types of training were on-the-job training and the Internet. Dispensary personnel most commonly used patients' preferences and symptoms as well as personal experiences to determine appropriate strains for patients. The majority of respondents advised patients about precautions and expected effects. Respondents were least likely to advise on drug interactions, or recommend a patient talk to a pharmacist or prescriber. Dispensary personnel in Oregon use a variety of resources to learn about medical marijuana. Although formal health or medical training was not indicated, personnel advise on marijuana's effects, use, and product selection. Further study is needed to assess the current training and advising on patients' ability to use medical marijuana safely and effectively. Copyright © 2016 American Pharmacists Association®. Published by Elsevier Inc. All rights reserved.

  9. Data fusion in cyber security: first order entity extraction from common cyber data

    Science.gov (United States)

    Giacobe, Nicklaus A.

    2012-06-01

    The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion detection, there have been a number of advances in the use of data fusion algorithms in this subdomain of cyber security. While it is tempting to jump directly to situation-level or threat-level refinement (levels 2 and 3) for more exciting inferences, a proper fusion process starts with lower levels of fusion in order to provide a basis for the higher fusion levels. The process begins with first order entity extraction, or the identification of important entities represented in the sensor data stream. Current cyber security operational tools and their associated data are explored for potential exploitation, identifying the first order entities that exist in the data and the properties of these entities that are described by the data. Cyber events that are represented in the data stream are added to the first order entities as their properties. This work explores typical cyber security data and the inferences that can be made at the lower fusion levels (0 and 1) with simple metrics. Depending on the types of events that are expected by the analyst, these relatively simple metrics can provide insight on their own, or could be used in fusion algorithms as a basis for higher levels of inference.

  10. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chanyoung; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is

  11. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    International Nuclear Information System (INIS)

    Lee, Chanyoung; Seong, Poong Hyun

    2016-01-01

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is possible to

  12. An Examination of Cultural Competence Training in US Medical Education Guided by the Tool for Assessing Cultural Competence Training.

    Science.gov (United States)

    Jernigan, Valarie Blue Bird; Hearod, Jordan B; Tran, Kim; Norris, Keith C; Buchwald, Dedra

    2016-01-01

    In the United States, medical students must demonstrate a standard level of "cultural competence," upon graduation. Cultural competence is most often defined as a set of congruent behaviors, attitudes, and policies that come together in a system, organization, or among professionals that enables effective work in cross-cultural situations. The Association of American Medical Colleges developed the Tool for Assessing Cultural Competence Training (TACCT) to assist schools in developing and evaluating cultural competence curricula to meet these requirements. This review uses the TACCT as a guideline to describe and assess pedagogical approaches to cultural competence training in US medical education and identify content gaps and opportunities for curriculum improvement. A total of 18 programs are assessed. Findings support previous research that cultural competence training can improve the knowledge, attitudes, and skills of medical trainees. However, wide variation in the conceptualization, implementation, and evaluation of cultural competence training programs exists, leading to differences in training quality and outcomes. More research is needed to establish optimal approaches to implementing and evaluating cultural competence training that incorporate cultural humility, the social determinants of health, and broader structural competency within the medical system.

  13. An Examination of Cultural Competence Training in US Medical Education Guided by the Tool for Assessing Cultural Competence Training

    Science.gov (United States)

    Jernigan, Valarie Blue Bird; Hearod, Jordan B.; Tran, Kim; Norris, Keith C.; Buchwald, Dedra

    2015-01-01

    In the United States, medical students must demonstrate a standard level of “cultural competence,” upon graduation. Cultural competence is most often defined as a set of congruent behaviors, attitudes, and policies that come together in a system, organization, or among professionals that enables effective work in cross-cultural situations. The Association of American Medical Colleges developed the Tool for Assessing Cultural Competence Training (TACCT) to assist schools in developing and evaluating cultural competence curricula to meet these requirements. This review uses the TACCT as a guideline to describe and assess pedagogical approaches to cultural competence training in US medical education and identify content gaps and opportunities for curriculum improvement. A total of 18 programs are assessed. Findings support previous research that cultural competence training can improve the knowledge, attitudes, and skills of medical trainees. However, wide variation in the conceptualization, implementation, and evaluation of cultural competence training programs exists, leading to differences in training quality and outcomes. More research is needed to establish optimal approaches to implementing and evaluating cultural competence training that incorporate cultural humility, the social determinants of health, and broader structural competency within the medical system. PMID:27818848

  14. Multiple hypothesis tracking for the cyber domain

    Science.gov (United States)

    Schwoegler, Stefan; Blackman, Sam; Holsopple, Jared; Hirsch, Michael J.

    2011-09-01

    This paper discusses how methods used for conventional multiple hypothesis tracking (MHT) can be extended to domain-agnostic tracking of entities from non-kinematic constraints such as those imposed by cyber attacks in a potentially dense false alarm background. MHT is widely recognized as the premier method to avoid corrupting tracks with spurious data in the kinematic domain but it has not been extensively applied to other problem domains. The traditional approach is to tightly couple track maintenance (prediction, gating, filtering, probabilistic pruning, and target confirmation) with hypothesis management (clustering, incompatibility maintenance, hypothesis formation, and Nassociation pruning). However, by separating the domain specific track maintenance portion from the domain agnostic hypothesis management piece, we can begin to apply the wealth of knowledge gained from ground and air tracking solutions to the cyber (and other) domains. These realizations led to the creation of Raytheon's Multiple Hypothesis Extensible Tracking Architecture (MHETA). In this paper, we showcase MHETA for the cyber domain, plugging in a well established method, CUBRC's INFormation Engine for Real-time Decision making, (INFERD), for the association portion of the MHT. The result is a CyberMHT. We demonstrate the power of MHETA-INFERD using simulated data. Using metrics from both the tracking and cyber domains, we show that while no tracker is perfect, by applying MHETA-INFERD, advanced nonkinematic tracks can be captured in an automated way, perform better than non-MHT approaches, and decrease analyst response time to cyber threats.

  15. Clinical training of medical physicists. IAEA experience in Asia

    International Nuclear Information System (INIS)

    McLean, D.

    2013-01-01

    Medical physicists make a major contribution to the safe and effective diagnosis and treatment of patients with cancer and other illnesses. The medical physicist's responsibilities include the major areas of dosimetry, treatment planning, quality assurance, image quality, optimization, equipment management, research, teaching, and radiation safety. With the increasing complexity of technological application to medicine the competence of trained physicists is critical to good patient care, with counter examples, sadly evident in the literature. The International Atomic Energy Agency (IAEA), in conjunction with international experts, including from Japan, has developed clinical training programmes that have been successfully implemented on a pilot basis in a number of countries in Asia. A new project is to begin in 2014 which will focus increasingly on the use of electronic teaching material and experiences, to assist medical physicists in clinical training increasingly in more remote locations in Asia. (author)

  16. Let Slip the Dogs of (CYBER) War: Progressing Towards a Warfighting U.S. Cyber Command

    Science.gov (United States)

    2013-04-01

    requirements, nor a headquarters building (it is currently housed within NSA facilities on Fort George G. Meade , MD).22 In addition, the DOD cyber...Information Conflict: National Security Law in Cyberspace (Falls Church, VA: Aegis Research Corporation, 2000); Herbert Lin, “Offensive Cyber Operations...this legislation was pocket-vetoed by then President George H.W. Bush due to a lack of consistency between the stated intent of the oversight

  17. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    Energy Technology Data Exchange (ETDEWEB)

    Glenn, Colleen [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center; Sterbentz, Dane [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center; Wright, Aaron [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center

    2016-12-20

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks, the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices

  18. Legal Issues in Cyber Targeting

    DEFF Research Database (Denmark)

    Juhlin, Jonas Alastair

    Imagine this scenario: Two states are in armed conflict with each other. In order to gain an advantage, one side launches a cyber-attack against the opponent’s computer network. The malicious malware paralyze the military computer network, as intended, but the malware spreads into the civilian...... system with physical damage to follow. This can happen and the natural question arises: What must be considered lawful targeting according to the international humanitarian law in cyber warfare? What steps must an attacker take to minimize the damage done to unlawful targets when conducting an offensive...... operation? How can the attacker separate military targets from civilian targets in cyber space? This paper addresses these questions and argues that a network (civilian or military) consist of several software components and that it is the individual components that is the target. If the components are used...

  19. Cyber-Bullying: The Situation in Ireland

    Science.gov (United States)

    O'Moore, Mona

    2012-01-01

    This paper reports on the first major survey of cyber-bullying undertaken in Ireland. While preliminary results have been published they were based on a smaller and incomplete sample of 12-16 year olds living in Ireland. The preliminary results addressed the incidence level of cyber-bullying and that of the different subcategories of…

  20. Role of Skill Laboratory Training in Medical Education - Students Perspective

    International Nuclear Information System (INIS)

    Hashim, R.; Qamar, K.; Rehman, S.; Khan, M. A.

    2016-01-01

    Objective: To evaluate the perceptions of medical students regarding their training utilizing facilities provided in the skill laboratory of a public sector medical college. Study Design: Cross-sectional study. Place and Duration of Study: Army Medical College, Rawalpindi, from October to December 2014. Methodology: Students of final year MBBS who had underwent skill laboratory training were recruited through convenience purposive sampling. Students not exposed to skill laboratory training were excluded. Data collection tool was a questionnaire having 23 questions with responses on Likert Scale as strongly disagree, disagree, agree and strongly agree coded as 1, 2, 3 and 4, respectively. Data was analysed on SPSS version 22. Results: There were 78 (57 percent) male and 59 (43 percent) female students out of 137, with mean age of 22.59 ± 0.74 years. The response rate was 68.5 percent. Cronbach's Alpha test was 0.84 showing high reliability. The mean of sum of all the 23 items was 63.85 ± 8.71, whereas item means was 2.78 ± 0.38, reflecting a high inclination of students towards skill laboratory training. Frequency of students responding in favour of skill laboratory training was significantly high (p < 0.05). Conclusion: Medical students perceived skill laboratory training as a favoured learning strategy as compared to practising on real patients for acquisition of various aspects of clinical skills, knowledge and attitude. (author)

  1. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  2. Cyber-crime Science = Crime Science + Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.

    2010-01-01

    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality,

  3. Cyberbullying or Cyber Aggression?: A Review of Existing Definitions of Cyber-Based Peer-to-Peer Aggression

    Directory of Open Access Journals (Sweden)

    Lucie Corcoran

    2015-03-01

    Full Text Available Due to the ongoing debate regarding the definitions and measurement of cyberbullying, the present article critically appraises the existing literature and offers direction regarding the question of how best to conceptualise peer-to-peer abuse in a cyber context. Variations across definitions are problematic as it has been argued that inconsistencies with regard to definitions result in researchers examining different phenomena, whilst the absence of an agreed conceptualisation of the behaviour(s involved hinders the development of reliable and valid measures. Existing definitions of cyberbullying often incorporate the criteria of traditional bullying such as intent to harm, repetition, and imbalance of power. However, due to the unique nature of cyber-based communication, it can be difficult to identify such criteria in relation to cyber-based abuse. Thus, for these reasons cyberbullying may not be the most appropriate term. Rather than attempting to “shoe-horn” this abusive behaviour into the preconceived conceptual framework that provides an understanding of traditional bullying, it is timely to take an alternative approach. We argue that it is now time to turn our attention to the broader issue of cyber aggression, rather than persist with the narrow focus that is cyberbullying.

  4. Cyber Flag: A Realistic Cyberspace Training Construct

    National Research Council Canada - National Science Library

    Hansen, Andrew P

    2008-01-01

    .... Red Flag provides dominant training within the air domain and now with the evolution of cyberspace, a comprehensive training environment is necessary to meet this growing and broadening threat...

  5. Medical Officers in Sierra Leone: Surgical Training Opportunities, Challenges and Aspirations.

    Science.gov (United States)

    Wilks, Lucy; Leather, Andrew; George, Peter Matthew; Kamara, Thaim Bay

    2018-02-05

    The critical shortage of human resources for healthcare falls most heavily on sub-Saharan nations such as Sierra Leone, where such workforce deficits have grave impacts on its burden of surgical disease. An important aspect in retention and development of the workforce is training. This study focuses on postgraduate surgical training (formal and short course) and perceptions of opportunities, challenges and aspirations, in a country where more than half of surgical procedures are performed by medical officers. The study presents findings from 12 in-depth semi-structured interviews conducted with medical officers by the primary investigator in Sierra Leone between April and June 2017. Each interview was transcribed alongside an introspective reflexive journal to acknowledge and account for researcher biases. Two interviewees had accessed postgraduate surgical training and 10 (83%) had accessed short course surgically relevant training. The number of short courses accessed grew higher the more recently the medical officers had graduated. Supervision, short length and international standards were the most appreciated aspects of short training courses. Some medical officers perceived the formal postgraduate surgical training programme to be ill-equipped, doubting its credibility. This demotivated some from applying. Training is an essential aspect of developing an adequate surgical workforce. Faith must be restored in the capabilities of Sierra Leone's Ministry of Health and Sanitation to provide adequate and sustainable training. This study advocates for the use of short courses to restore this faith and the expansion of postgraduate surgical training to the districts through developing a regional teaching complex to provide short courses and eventually formal postgraduate training in the future. Copyright © 2018 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  6. Leadership in Undergraduate Medical Education: Training Future Physician Leaders.

    Science.gov (United States)

    Clyne, Brian; Rapoza, Brenda; George, Paul

    2015-09-01

    To confront the challenges facing modern health care, experts and organizations are calling for an increase in physician leadership capabilities. In response to this need, physician leadership programs are proliferating, targeting all levels of experience at all levels of training. Many academic medical centers, major universities, and specialty societies now sponsor physician leadership training programs. To meet this need, The Warren Alpert Medical School of Brown University, as part of its Primary Care-Population Medicine (PC-PM) Program, designed a four-year integrated curriculum, Leadership in Health Care, to engage with leadership topics starting early in the preclinical stages of training. This paper describes the design and implementation of this leadership curriculum for PC-PM students.

  7. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  8. Humanist ethics-training in energizing the content of teaching and learning in initial medical training

    Directory of Open Access Journals (Sweden)

    Alicia Rojas-Baso

    2017-04-01

    Full Text Available This paper reflects on the revitalization of the ethical and humanistic education in the teaching-learning training general practitioner associated with the educational strategy training project medical ethical humanist on theoretical basis of the development of the doctoral research that addresses the same subject in which the authors are part of their coordination and membership. It is oriented objective: to reveal the ethical and humanistic relationship in the initial training medical professional, relationship with the teleological aspect guiding the culture of ethical and humanistic education and teaching as interdisciplinary integrative demands required by the Cuban medical partner model. The methods are specified in the theoretical systematization, modeling and systematic practice through a systematic project, all from a systemic integrated position supported by the general method dialectical materialism and guided by the principles of bioethics as a teaching tool that is modeled for teachers and students.

  9. Cyber-Physical Systems Security: a Systematic Mapping Study

    OpenAIRE

    Lun, Yuriy Zacchia; D'Innocenzo, Alessandro; Malavolta, Ivano; Di Benedetto, Maria Domenica

    2016-01-01

    Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds some light on how security is actually addressed when dealing with cyber-physical systems. The provided systematic map of 118 selected studies is based on, for instance, application fields, various system components, relate...

  10. Instructions included? Make safety training part of medical device procurement process.

    Science.gov (United States)

    Keller, James P

    2010-04-01

    Before hospitals embrace new technologies, it's important that medical personnel agree on how best to use them. Likewise, hospitals must provide the support to operate these sophisticated devices safely. With this in mind, it's wise for hospitals to include medical device training in the procurement process. Moreover, purchasing professionals can play a key role in helping to increase the amount of user training for medical devices and systems. What steps should you take to help ensure that new medical devices are implemented safely? Here are some tips.

  11. Online social networking and the experience of cyber-bullying.

    Science.gov (United States)

    O'Dea, Bridianne; Campbell, Andrew

    2012-01-01

    Online social networking sites (SNS) are popular social tools used amongst adolescents and account for much of their daily internet activity. Recently, these sites have presented opportunities for youth to experience cyber-bullying. Often resulting in psychological distress, cyber-bullying is a common experience for many young people. Continual use of SNS signifies the importance of examining its links to cyber-bullying. This study examined the relationship between online social networking and the experience of cyber-bullying. A total of 400 participants (Mage=14.31 years) completed an online survey which examined the perceived definitions and frequency of cyber-bullying. Users of SNS reported significantly higher frequencies of stranger contact compared to non-users. Spearman's rho correlations determined no significant relationship between daily time on SNS and the frequency of stranger contact. This suggests that ownership of a SNS profile may be a stronger predictor of some cyber-bullying experiences compared to time spent on these sites. Findings encourage continued research on the nature of internet activities used by young adolescents and the possible exposure to online victimization.

  12. Impact of focused training on communication skills of final-year medical students in a medical school in India.

    Science.gov (United States)

    Iqbal, Nayyar; Mookkappan, Sudhagar; Basheer, Aneesh; Kandasamy, Ravichandran

    2015-01-01

    Although communication skills are important for a good physician-patient relationship, Indian medical curricula give very little emphasis on training medical students in this aspect. To determine the change in communication skills of final-year medical students following focused training. This was an educational interventional study done at Pondicherry Institute of Medical Sciences, a tertiary care teaching hospital in South India, to assess communication skills among final-year MBBS students. Fifty-two students (24 males and 28 females) participated in the study. A pre-test was conducted in the form of an objectively structured clinical examination (OSCE), followed by focused training for four hours. The same OSCE was administered as post-test. A comparison between the pre-test and post-test scores was done using Wilcoxon Signed Ranks Test. Ninety-six per cent of participants (50 out of 52) showed improvement in their performance after the focused training. The mean marks of the pre-test and post-test were 10.77± 3 and 18.04±2, respectively, out of a maximum mark of 20 (pcommunication skills of medical students. Hence, it may be included in the curriculum of undergraduate medical teaching programmes in India.

  13. MO-DE-BRA-04: The CREATE Medical Physics Research Training Network: Training of New Generation Innovators

    Energy Technology Data Exchange (ETDEWEB)

    Seuntjens, J; Collins, L; Devic, S; El Naqa, I; Nadeau, J; Reader, A [McGill University, Montreal, QC (Canada); Beaulieu, L; Despres, P [Centre Hospitalier Univ de Quebec, Quebec, QC (Canada); Pike, B [University of Calgary, Calgary, Alberta (Canada)

    2015-06-15

    Purpose: Over the past century, physicists have played a major role in transforming scientific discovery into everyday clinical applications. However, with the increasingly stringent requirements to regulate medical physics as a health profession, the role of physicists as scientists and innovators has become at serious risk of erosion. These challenges trigger the need for a new, revolutionized training program at the graduate level that respects scientific rigor, attention for medical physics-relevant developments in basic sciences, innovation and entrepreneurship. Methods: A grant proposal was funded by the Collaborative REsearch and Training Experience program (CREATE) of the Natural Sciences and Engineering Research Council (NSERC) of Canada. This enabled the creation of the Medical Physics Research Training Network (MPRTN) around two CAMPEP-accredited medical physics programs. Members of the network consist of medical device companies, government (research and regulatory) and academia. The MPRTN/CREATE program proposes a curriculum with three main themes: (1) radiation physics, (2) imaging & image processing and (3) radiation response, outcomes and modeling. Results: The MPRTN was created mid 2013 (mprtn.com) and features (1) four new basic Ph.D. courses; (2) industry participation in research projects; (3) formal job-readiness training with involvement of guest faculty from academia, government and industry. MPRTN activities since 2013 include 22 conferences; 7 workshops and 4 exchange travels. Three patents were filed or issued, nine awards/best papers were won. Fifteen journal publications were accepted/published, 102 conference abstracts. There are now 13 industry partners. Conclusion: A medical physics research training network has been set up with the goal to harness graduate student’s job-readiness for industry, government and academia in addition to the conventional clinical role. Two years after inception, significant successes have been booked

  14. MO-DE-BRA-04: The CREATE Medical Physics Research Training Network: Training of New Generation Innovators

    International Nuclear Information System (INIS)

    Seuntjens, J; Collins, L; Devic, S; El Naqa, I; Nadeau, J; Reader, A; Beaulieu, L; Despres, P; Pike, B

    2015-01-01

    Purpose: Over the past century, physicists have played a major role in transforming scientific discovery into everyday clinical applications. However, with the increasingly stringent requirements to regulate medical physics as a health profession, the role of physicists as scientists and innovators has become at serious risk of erosion. These challenges trigger the need for a new, revolutionized training program at the graduate level that respects scientific rigor, attention for medical physics-relevant developments in basic sciences, innovation and entrepreneurship. Methods: A grant proposal was funded by the Collaborative REsearch and Training Experience program (CREATE) of the Natural Sciences and Engineering Research Council (NSERC) of Canada. This enabled the creation of the Medical Physics Research Training Network (MPRTN) around two CAMPEP-accredited medical physics programs. Members of the network consist of medical device companies, government (research and regulatory) and academia. The MPRTN/CREATE program proposes a curriculum with three main themes: (1) radiation physics, (2) imaging & image processing and (3) radiation response, outcomes and modeling. Results: The MPRTN was created mid 2013 (mprtn.com) and features (1) four new basic Ph.D. courses; (2) industry participation in research projects; (3) formal job-readiness training with involvement of guest faculty from academia, government and industry. MPRTN activities since 2013 include 22 conferences; 7 workshops and 4 exchange travels. Three patents were filed or issued, nine awards/best papers were won. Fifteen journal publications were accepted/published, 102 conference abstracts. There are now 13 industry partners. Conclusion: A medical physics research training network has been set up with the goal to harness graduate student’s job-readiness for industry, government and academia in addition to the conventional clinical role. Two years after inception, significant successes have been booked

  15. Cyber threat intelligence exchange: A growing requirement

    CSIR Research Space (South Africa)

    Veerasamy, Namosha

    2017-06-01

    Full Text Available Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a...

  16. Developing Cyber Foraging Applications for Portable Devices

    DEFF Research Database (Denmark)

    Kristensen, Mads Darø; Bouvin, Niels Olof

    2008-01-01

    This paper presents the Locusts cyber foraging framework. Cyber foraging is the opportunistic use of computing resources available in the nearby environment, and using such resources thus fall into the category of distributed computing. Furthermore, for the resources to be used efficiently, paral...

  17. Kanttekeningen bij de Europese cyber security strategie

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Smulders, A.C.M.; Kamphuis, P.

    2013-01-01

    In februari presenteerde de Europese Unie de Europese cyber security strategie en begeleidende concept richtlijn. The Hague Security Delta (HSD) is verheugd dat de Nederlandse Nationale Cyber Security Strategie nu ook op Europees niveau navolging krijgt. Toch plaatsen we een paar kantekeningen.

  18. The critical role of ethics training in medical education

    Directory of Open Access Journals (Sweden)

    A Nicolaides

    2014-01-01

    Full Text Available When one thinks of the issue of medical ethics the Hippocratic Oath comes to mind. In terms of this oath, one would assume that the goal of medical ethics is to improve the quality of patient care by means of the identification and analysis, and hopefully resolution of any ethical complications that arise in the course of medical practice. This is not always the case and sadly, many Physicians' are unhappy with the practice of medicine and its ethical obligations. Such attitudes may have severe public health implications for the South African medical profession. It is thus essential to provide even more effective ethics training which includes moral reasoning during medical school and residency training. At a time when there appears to be less public confidence in doctors and where practitioner morale is at an all-time low, and patients complain of substandard medical treatment, it is important to reconsider the question of medical ethics. This paper seeks to scrutinize the principles of the Hippocratic Oath and questions whether medical practitioners of contemporary medicine adhere to its principles and are taught ethics during their medical courses. This will provide a greater understanding of the role of modern medical ethics education in promoting ethical practice.

  19. Climate change: what competencies and which medical education and training approaches?

    Directory of Open Access Journals (Sweden)

    Bell Erica J

    2010-04-01

    Full Text Available Abstract Background Much research has been devoted to identifying healthcare needs in a climate-changing world. However, while there are now global and national policy statements about the importance of health workforce development for climate change, little has been published about what competencies might be demanded of practitioners in a climate-changing world. In such a context, this debate and discussion paper aims to explore the nature of key competencies and related opportunities for teaching climate change in medical education and training. Particular emphasis is made on preparation for practice in rural and remote regions likely to be greatly affected by climate change. Discussion The paper describes what kinds of competencies for climate change might be included in medical education and training. It explores which curricula, teaching, learning and assessment approaches might be involved. Rather than arguing for major changes to medical education and training, this paper explores well established precedents to offer practical suggestions for where a particular kind of literacy--eco-medical literacy--and related competencies could be naturally integrated into existing elements of medical education and training. Summary The health effects of climate change have, generally, not yet been integrated into medical education and training systems. However, the necessary competencies could be taught by building on existing models, best practice and innovative traditions in medicine. Even in crowded curricula, climate change offers an opportunity to reinforce and extend understandings of how interactions between people and place affect health.

  20. Cyber Security Awareness and Its Impact on Employee’s Behavior

    OpenAIRE

    Li, Ling; Xu, Li; He, Wu; Chen, Yong; Chen, Hong

    2016-01-01

    Part 3: Security and Privacy Issues; International audience; This paper proposes a model that extends the Protection Motivation Theory to validate the relationships among peer behavior, cue to action, and employees’ action experience of cyber security, threat perception, response perception, and employee’s cyber security behavior. The findings of the study suggest that the influence from peer behavior and employees action experience of cyber security is an important factor for improving cyber...

  1. Communication skills training and the conceptual structure of empathy among medical students.

    Science.gov (United States)

    Son, Daisuke; Shimizu, Ikuo; Ishikawa, Hirono; Aomatsu, Muneyoshi; Leppink, Jimmie

    2018-04-18

    Medical and healthcare professionals' empathy for patients is crucially important for patient care. Some studies have suggested that a significant decline in empathy occurs during clinical training years in medical school as documented by self-assessed empathy scales. Moreover, a recent study provided qualitative evidence that communication skills training in an examination context, such as in an objective structured clinical examination, might stimulate perspective taking but inhibit the development of compassionate care. Therefore, the current study examined how perspective taking and compassionate care relate to medical students' willingness to show empathic behaviour and how these relations may change with communication skills training. A total of 295 fourth-year Japanese medical students from three universities completed the Jefferson Empathy Scale and a newly developed set of items on willingness to show empathic behaviour twice after communication skills training, pertaining to post-training and retrospectively for pre-training. The findings indicate that students' willingness to show empathic behaviour is much more correlated with perspective taking than with compassionate care. Qualitative descriptive analysis of open-ended question responses revealed a difficulty of feeling compassion despite showing empathic behaviour. These findings shed light on the conceptual structure of empathy among medical students and generate a number of hypotheses for future intervention and longitudinal studies on the relation between communication skills training and empathy.

  2. Psychological Impact of Cyber-Bullying: Implications for School Counsellors

    Science.gov (United States)

    Nordahl, Jennifer; Beran, Tanya; Dittrick, Crystal J.

    2013-01-01

    Cyber-bullying is a significant problem for children today. This study provides evidence of the psychological impact of cyber-bullying among victimized children ages 10 to 17 years (M = 12.48, SD = 1.79) from 23 urban schools in a western province of Canada (N = 239). Students who were cyber-bullied reported high levels of anxious,…

  3. Cyber Assurance - what should the IT auditor focus on?

    DEFF Research Database (Denmark)

    Cyber risici og Cyber sikkerhed er ny emner på ledelsens dagsorden angående IT Governance og sikkerhed. IT revisor skal være opmærksom på risic og kontroler samt trustler fra internettet. Denne præsentation forklarer, hvordan IT revisor skal reagere på cyber risici og sikkerhed. Præsentationen vi...

  4. Cyber Security Test Strategy for Non-safety Display System

    International Nuclear Information System (INIS)

    Son, Han Seong; Kim, Hee Eun

    2016-01-01

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures

  5. Cyber Security Test Strategy for Non-safety Display System

    Energy Technology Data Exchange (ETDEWEB)

    Son, Han Seong [Joongbu University, Geumsan (Korea, Republic of); Kim, Hee Eun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures.

  6. Refugee health and medical student training.

    Science.gov (United States)

    Griswold, Kim S

    2003-10-01

    Cultural awareness training is an increasingly important priority within medical curricula. This article describes an academic family practice-community partnership focusing on health care needs of refugees that became the model for a medical school selective on cultural sensitivity training. The monthly Refugee Health Night program featured dinner with preceptors and patients, international sessions on special medical needs of refugees, and actual clinical encounters with patients. Students were not expected to become culturally competent experts but, rather, health care providers sensitive to and appreciative of cultural context, experience, and expectations. We worked with students to develop sensitive methods of inquiry about mental health, especially around issues of war and torture. We used problem-based cases to emphasize primary care continuity and the benefit of establishing trust over time. Over 2 years, 50 students and nearly 300 refugees (more than 73 families) participated. Students reported that their interactions with the refugees provided positive learning experiences, including expanded knowledge of diverse cultures and enhanced skills for overcoming communication barriers. Patients of refugee status were able to have emergent health care needs met in a timely fashion. Providing health care for refugee individuals and families presents many challenges as well as extraordinary opportunities for patients and practitioners to learn from one another.

  7. An evaluation of training of teachers in medical education in four medical schools of Nepal.

    Science.gov (United States)

    Baral, Nirmal; Paudel, Bishnu Hari; Das, Binod Kumar Lal; Aryal, Madhukar; Das, Balbhadra Prasad; Jha, Nilambar; Lamsal, Madhab

    2007-09-01

    Effective teaching is a concern of all teachers. Therefore, regular teachers' training is emphasized globally. B. P. Koirala Institute of Health Sciences (BPKIHS), a health science deemed university situated in eastern region of Nepal has an established Medical Education unit which attempts to improve teaching-learning skills by training faculty members through organizing regular medical education training programs. The aim of the present study was to assess the effectiveness of 3-day training workshop on "Teaching-learning methodology and Evaluation" held in four different medical colleges of Nepal. The workshop was targeted at middle and entry level of health profession teachers who had not been previously exposed to any teacher's training program. The various components, such as teaching-learning principles, writing educational objectives, organizing and sequencing education materials, teaching-learning methods, microteaching and assessment techniques, were incorporated in the workshop. A team of resource persons from BPKIHS were involved in all the four medical institutions. The collection data had two categories of responses: (1) a questionnaire survey of participants at the beginning and end of the workshop to determine their gain in knowledge and (2) a semi-structured questionnaire survey of participants at the end of workshop to evaluate their perception on usefulness of the workshop. The later category had items with three-point likert scale (very useful, useful and not useful) and responses to open-ended questions/ statements to document participants general views. The response was entered into a spreadsheet and analyzed using SPSS. The result showed that all participants (n = 92) improved their scores after attending the workshop (p teaching-learning methods, media, microteaching and evaluation techniques were useful in teaching-learning. The workshop was perceived as an acceptable way of acquiring teaching-learning skills but 39.4% participants

  8. SecureCPS: Defending a nanosatellite cyber-physical system

    Science.gov (United States)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  9. Training for the medical response in radiological emergency experiences and results

    International Nuclear Information System (INIS)

    Cardenas Herrera, J.; Lopez Forteza, Y.

    2003-01-01

    The use of the nuclear techniques int he social practice confers a special imporatnce to the relative aspects to the safety of the practices and radiationsources, for what the implementation of efficient programs of radiation protection constitutes a priority. However in spite of the will before expressed, regrettably radiological situations happen accidental assocaited to multiple causes taht suggest the creation of response capacities to intervention before these fortuitous facts. The experiences accumulated in the last decades related with accidental exposures have evidenced the convenience of having properly qualified human resources for the Medical Response in Radiological Emergencies. The training in the medical aspects of the radiological emergencies acquires a singular character. In such a sense when valuing the national situation put onof manifest deficiences as for the training in medical aspects of the radiological emergencies that advised the development of training programs in such aspects for the different response groups linked to the topic. After identified the training necessities and the scope of the same ones, the contents of the training program were elaborated. The program has as general purpose the invigoration of the capacity of the medical response in front of accidental radiological situations, by means of actions that they bear to prepare groups of medical response in the handling of people accident victims and to the identification of potentials,accidental scenarios, as well as of the necessary resources to confront them. The program content approaches theoretical and paractical aspects to the medical aspect to radiological emergencies. The program include the different topics about fundamental of physical biological to radiation protection, radiation protection during exposure of radiological accidents, medical care for overexposed or contaminated persons, drill, exercises and concludes with designation of a strategy as preparation and

  10. Strategies for Resolving the Cyber Attribution Challenge

    Science.gov (United States)

    2013-05-01

    involvement in cyber espionage and Internet censorship . The United States’ policies for responding to cyber events are still being developed...operational arm, although the United States does not currently support it.45 The IMPACT Global Response Centre, based in Cyberjaya, Malaysia , was set up

  11. Optimizing CyberShake Seismic Hazard Workflows for Large HPC Resources

    Science.gov (United States)

    Callaghan, S.; Maechling, P. J.; Juve, G.; Vahi, K.; Deelman, E.; Jordan, T. H.

    2014-12-01

    The CyberShake computational platform is a well-integrated collection of scientific software and middleware that calculates 3D simulation-based probabilistic seismic hazard curves and hazard maps for the Los Angeles region. Currently each CyberShake model comprises about 235 million synthetic seismograms from about 415,000 rupture variations computed at 286 sites. CyberShake integrates large-scale parallel and high-throughput serial seismological research codes into a processing framework in which early stages produce files used as inputs by later stages. Scientific workflow tools are used to manage the jobs, data, and metadata. The Southern California Earthquake Center (SCEC) developed the CyberShake platform using USC High Performance Computing and Communications systems and open-science NSF resources.CyberShake calculations were migrated to the NSF Track 1 system NCSA Blue Waters when it became operational in 2013, via an interdisciplinary team approach including domain scientists, computer scientists, and middleware developers. Due to the excellent performance of Blue Waters and CyberShake software optimizations, we reduced the makespan (a measure of wallclock time-to-solution) of a CyberShake study from 1467 to 342 hours. We will describe the technical enhancements behind this improvement, including judicious introduction of new GPU software, improved scientific software components, increased workflow-based automation, and Blue Waters-specific workflow optimizations.Our CyberShake performance improvements highlight the benefits of scientific workflow tools. The CyberShake workflow software stack includes the Pegasus Workflow Management System (Pegasus-WMS, which includes Condor DAGMan), HTCondor, and Globus GRAM, with Pegasus-mpi-cluster managing the high-throughput tasks on the HPC resources. The workflow tools handle data management, automatically transferring about 13 TB back to SCEC storage.We will present performance metrics from the most recent Cyber

  12. Early Warnings of Cyber Threats in Online Discussions

    OpenAIRE

    Sapienza, Anna; Bessi, Alessandro; Damodaran, Saranya; Shakarian, Paulo; Lerman, Kristina; Ferrara, Emilio

    2018-01-01

    We introduce a system for automatically generating warnings of imminent or current cyber-threats. Our system leverages the communication of malicious actors on the darkweb, as well as activity of cyber security experts on social media platforms like Twitter. In a time period between September, 2016 and January, 2017, our method generated 661 alerts of which about 84% were relevant to current or imminent cyber-threats. In the paper, we first illustrate the rationale and workflow of our system,...

  13. Cyber Threats for Organizations of Financial Market Infrastructures

    OpenAIRE

    Natalia Georgievna Miloslavskaya; Svetlana Alexandrovna Tolstaya

    2016-01-01

    Abstract: In the global informatization era the reliable and efficient financial market infrastructure of the Russian Federation (RF FMI) plays an important role in the financial system and economy of the country. New cyber risks have acquired the status of the FR FMI systemic risk’s components, the importance of which is constantly growing due to the increase in the possible consequences of their implementation. The article introduces the basic concepts of cyber security, cyber space and cyb...

  14. Development of Cyber-attack Risk Assessment Model for Nuclear Power Plants

    International Nuclear Information System (INIS)

    Park, Jong Woo; Lee, Seung Jun

    2017-01-01

    In this work, a risk evaluation method to identify significant cyber-attack scenarios and important components which should be defensed was proposed based on the probabilistic safety assessment (PSA) method which is widely used for evaluating risk of NPPs. NPPs adopting digital systems have been facing the risk of cyber-attacks. To develop efficient and reasonable defense strategy, it is required to identify significant cyber-attack scenarios and important components because there are huge number of critical digital assets in an NPP. By evaluating the risk of cyber-attack, the risk-informed defense strategies against cyber-attack could be suggested. In this work, the method to identify important cyber-attack scenarios and to evaluate the quantitative risk caused by cyber-attacks was proposed. For a future study, more feasible scenarios will be analyzed and additional modifications will be made in the model if necessary.

  15. CyberGIS software: a synthetic review and integration roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Shaowen [University of Illinois, Urbana-Champaign; Anselin, Luc [Arizona State University; Bhaduri, Budhendra L [ORNL; Cosby, Christopher [University Navstar Consortium, Boulder, CO; Goodchild, Michael [University of California, Santa Barbara; Liu, Yan [University of Illinois, Urbana-Champaign; Nygers, Timothy L. [University of Washington, Seattle

    2013-01-01

    CyberGIS defined as cyberinfrastructure-based geographic information systems (GIS) has emerged as a new generation of GIS representing an important research direction for both cyberinfrastructure and geographic information science. This study introduces a 5-year effort funded by the US National Science Foundation to advance the science and applications of CyberGIS, particularly for enabling the analysis of big spatial data, computationally intensive spatial analysis and modeling (SAM), and collaborative geospatial problem-solving and decision-making, simultaneously conducted by a large number of users. Several fundamental research questions are raised and addressed while a set of CyberGIS challenges and opportunities are identified from scientific perspectives. The study reviews several key CyberGIS software tools that are used to elucidate a vision and roadmap for CyberGIS software research. The roadmap focuses on software integration and synthesis of cyberinfrastructure, GIS, and SAM by defining several key integration dimensions and strategies. CyberGIS, based on this holistic integration roadmap, exhibits the following key characteristics: high-performance and scalable, open and distributed, collaborative, service-oriented, user-centric, and community-driven. As a major result of the roadmap, two key CyberGIS modalities gateway and toolkit combined with a community-driven and participatory approach have laid a solid foundation to achieve scientific breakthroughs across many geospatial communities that would be otherwise impossible.

  16. Impact modeling and prediction of attacks on cyber targets

    Science.gov (United States)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  17. Medical student resilience and stressful clinical events during clinical training.

    Science.gov (United States)

    Houpy, Jennifer C; Lee, Wei Wei; Woodruff, James N; Pincavage, Amber T

    2017-01-01

    Medical students face numerous stressors during their clinical years, including difficult clinical events. Fostering resilience is a promising way to mitigate negative effects of stressors, prevent burnout, and help students thrive after difficult experiences. However, little is known about medical student resilience. To characterize medical student resilience and responses to difficult clinical events during clinical training. Sixty-two third-year (MS3) and 55 fourth-year (MS4) University of Chicago medical students completed surveys in 2016 assessing resilience (Connor Davidson Resilience Scale, CD-RISC 10), symptoms of burnout, need for resilience training, and responses to difficult clinical events. Medical student mean resilience was lower than in a general population sample. Resilience was higher in males, MS4s, those without burnout symptoms, and students who felt able to cope with difficult clinical events. When students experienced difficult events in the clinical setting, the majority identified poor team dynamics among the most stressful, and agreed their wellbeing was affected by difficult clinical events. A majority also would prefer to discuss these events with their team later that day. Students discussed events with peers more than with attendings or residents. Students comfortable discussing stress and burnout with peers had higher resilience. Most students believed resilience training would be helpful and most beneficial during MS3 year. Clinical medical student resilience was lower than in the general population but higher in MS4s and students reporting no burnout. Students had some insight into their resilience and most thought resilience training would be helpful. Students discussed difficult clinical events most often with peers. More curricula promoting medical student resilience are needed.

  18. A Study of Cyber Security Activities for Development of Safety-related Controller

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Myeongkyun; Song, Seunghwan; Yoo, Kwanwoo; Yun, Donghwa [Korea Univ., Seoul (Korea, Republic of)

    2014-05-15

    Nuclear Power Plant Regulatory guide describes the regulatory requirements to implement cyber security activities to ensure that design and operate to respond to cyber threats that exploited to vulnerability of digital-based technologies associated with safety-related digital instrumentation and control systems at nuclear power plants. Cyber security activities coverage is instrumentation and control systems to perform safety functions and digital-based equipment to use development, test, analysis and asset for instrumentation and control systems. Regulatory guidance is required to the cyber security activities that should be performed in each development phase of safety-related controller. Development organization should establish and implement to cyber security plans for responding to cyber threats throughout each lifecycle phase and the result of the cyber security activities should be generated to the documents. In addition, the independent verification and validation organization should perform simulated penetration test for enhancing response capabilities to cyber security threats and development organization should establish and implement response hardening solutions for the cyber security vulnerabilities identified in the simulated penetration test.

  19. A Study of Cyber Security Activities for Development of Safety-related Controller

    International Nuclear Information System (INIS)

    Lee, Myeongkyun; Song, Seunghwan; Yoo, Kwanwoo; Yun, Donghwa

    2014-01-01

    Nuclear Power Plant Regulatory guide describes the regulatory requirements to implement cyber security activities to ensure that design and operate to respond to cyber threats that exploited to vulnerability of digital-based technologies associated with safety-related digital instrumentation and control systems at nuclear power plants. Cyber security activities coverage is instrumentation and control systems to perform safety functions and digital-based equipment to use development, test, analysis and asset for instrumentation and control systems. Regulatory guidance is required to the cyber security activities that should be performed in each development phase of safety-related controller. Development organization should establish and implement to cyber security plans for responding to cyber threats throughout each lifecycle phase and the result of the cyber security activities should be generated to the documents. In addition, the independent verification and validation organization should perform simulated penetration test for enhancing response capabilities to cyber security threats and development organization should establish and implement response hardening solutions for the cyber security vulnerabilities identified in the simulated penetration test

  20. Selecting, training and assessing new general practice community teachers in UK medical schools.

    Science.gov (United States)

    Hydes, Ciaran; Ajjawi, Rola

    2015-09-01

    Standards for undergraduate medical education in the UK, published in Tomorrow's Doctors, include the criterion 'everyone involved in educating medical students will be appropriately selected, trained, supported and appraised'. To establish how new general practice (GP) community teachers of medical students are selected, initially trained and assessed by UK medical schools and establish the extent to which Tomorrow's Doctors standards are being met. A mixed-methods study with questionnaire data collected from 24 lead GPs at UK medical schools, 23 new GP teachers from two medical schools plus a semi-structured telephone interview with two GP leads. Quantitative data were analysed descriptively and qualitative data were analysed informed by framework analysis. GP teachers' selection is non-standardised. One hundred per cent of GP leads provide initial training courses for new GP teachers; 50% are mandatory. The content and length of courses varies. All GP leads use student feedback to assess teaching, but other required methods (peer review and patient feedback) are not universally used. To meet General Medical Council standards, medical schools need to include equality and diversity in initial training and use more than one method to assess new GP teachers. Wider debate about the selection, training and assessment of new GP teachers is needed to agree minimum standards.

  1. Scheduling and development support in the Scavenger cyber foraging system

    DEFF Research Database (Denmark)

    Kristensen, Mads Darø; Bouvin, Niels Olof

    2010-01-01

    Cyber foraging is a pervasive computing technique where small mobile devices offload resource intensive tasks to stronger computing machinery in the vicinity. One of the main challenges within cyber foraging is that it is very difficult to develop cyber foraging enabled applications. An applicati...

  2. Medical Team Training Improves Team Performance: AOA Critical Issues.

    Science.gov (United States)

    Carpenter, James E; Bagian, James P; Snider, Rebecca G; Jeray, Kyle J

    2017-09-20

    Effective teamwork and communication can decrease medical errors in environments where the culture of safety is enhanced. Health care can benefit from programs that are based on teamwork, as in other high-stress industries (e.g., aviation), with crew resource management programs, simulator use, and utilization of checklists. Medical team training (MTT) with a strong leadership commitment was used at our institution to focus specifically on creating open, yet structured, communication in operating rooms. Training included the 3 phases of the World Health Organization protocol to organize communication and briefings: preoperative verification, preincision briefing, and debriefing at or near the end of the surgical case. This training program led to measured improvements in job satisfaction and compliance with checklist tasks, and identified opportunities to improve training sessions. MTT provides the potential for sustainable change and a positive impact on the environment of the operating room.

  3. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper

  4. Conversion of Provider EMR Training from Instructor-Led Training to eLearning at an Academic Medical Center.

    Science.gov (United States)

    Sharp, Karen; Williams, Michele; Aldrich, Alison; Bogacz, Adrienne; Denier, Sighle; McAlearney, Ann S

    2017-07-26

    This case study overviews the conversion of provider training of the electronic medical record (EMR) from an instructor-led training (ILT) program to eLearning at an Academic Medical Center (AMC). This conversion provided us with both a useful training tool and the opportunity to maximize efficiency within both our training and optimization team and organization. eLearning Development Principles were created and served as a guide to assist us with designing an eLearning curriculum using a five step process. The result was a new training approach that allowed learners to complete training at their own pace, and even test out of sections based on demonstrated competency. The information we have leads us to believe that a substantial return on our investment can be obtained from the conversion with positive impacts that have served as the foundation for the future of end user EMR training at our AMC.

  5. Developing standard exercises and statistics to measure the impact of cyber defenses

    OpenAIRE

    Berninger, Matthew L.

    2014-01-01

    CHDS State/Local As companies seek protection from cyber attacks, justifying proper levels of investment in cyber security is essential. Like all investments, cyber defense costs must be weighed against their expected benefits. While some cyber investment models exist that can relate costs and benefits, these models are largely untested with experimental data. This research develops an experimental framework and statistics for testing and measuring the efficacy of cyber mitigation methods,...

  6. Cyber Literature: A Reader – Writer Interactivity

    Directory of Open Access Journals (Sweden)

    Fathu Rahman

    2017-06-01

    Full Text Available Cyber Literature is a term known since the coming of the internet which brings a convenience, changing habit and world view. This study is a survey-based on respondents’ opinion about the existence of cyber literature on social media; of its benefit and impact to the reader. This study limits to the poems on Facebook group. The reason is simple; it favors the short form. For the study of a reader-writer interactivity in cyber literature is more likely on poetry. The approach is reader response literary theory with focus on the reader-writer interactivity on Facebook. This research aimed at uncovering the motivation of readers to response the uploaded text, the reasons why they love it and what its advantages. The results showed that cyber literature is successfully to introduce a new literary genre as well as to raise motivation and creativity of authors to make use the internet space.

  7. Systematic review on the effectiveness of augmented reality applications in medical training.

    Science.gov (United States)

    Barsom, E Z; Graafland, M; Schijven, M P

    2016-10-01

    Computer-based applications are increasingly used to support the training of medical professionals. Augmented reality applications (ARAs) render an interactive virtual layer on top of reality. The use of ARAs is of real interest to medical education because they blend digital elements with the physical learning environment. This will result in new educational opportunities. The aim of this systematic review is to investigate to which extent augmented reality applications are currently used to validly support medical professionals training. PubMed, Embase, INSPEC and PsychInfo were searched using predefined inclusion criteria for relevant articles up to August 2015. All study types were considered eligible. Articles concerning AR applications used to train or educate medical professionals were evaluated. Twenty-seven studies were found relevant, describing a total of seven augmented reality applications. Applications were assigned to three different categories. The first category is directed toward laparoscopic surgical training, the second category toward mixed reality training of neurosurgical procedures and the third category toward training echocardiography. Statistical pooling of data could not be performed due to heterogeneity of study designs. Face-, construct- and concurrent validity was proven for two applications directed at laparoscopic training, face- and construct validity for neurosurgical procedures and face-, content- and construct validity in echocardiography training. In the literature, none of the ARAs completed a full validation process for the purpose of use. Augmented reality applications that support blended learning in medical training have gained public and scientific interest. In order to be of value, applications must be able to transfer information to the user. Although promising, the literature to date is lacking to support such evidence.

  8. Nuclear Cyber Security Case Study and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Park, Sunae [ChungNam National Univ., Daejeon (Korea, Republic of); Kim, Kyung doo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Due to the new trend in cyber attacks, there is an increased security threat towards every country's infrastructure. So, security measures are required now than ever before. Previous cyber attacks normal process consists of paralyzing a server function, data extraction, or data control into the IT system for trespassing. However, nowadays control systems and infrastructures are also targeted and attacking methods have changed a lot. These days, the virus is becoming increasingly serious and hacker attacks are also becoming more frequent. This virus is a computer virus produced for the purpose of destroying the infrastructure, such as power plants, airports, railways June 2010, and it was first discovered in Belarus. Israel, the US, and other countries are believed culprits behind Stuxnet attacks on other nations such as Iran. Recent malware distribution, such as website hacking threat is growing. In surveys today one of the most long-term posing security threats is from North Korea. In particular, North Korea has been caught launching ongoing cyber-attacks after their latest nuclear test. South Korea has identified national trends regarding North Korean nuclear tests and analyzed them in order to catch disclosed confidential information. Especially, many nuclear power plants in the world are found to be vulnerable to cyber-attacks. Industrial facilities should be more wary of the risk of a serious cyber attack in the middle is going to increase the reliance on universal and commercial digital systems (off the shelf) software, civilian nuclear infrastructure. Senior executives’ current risk rate levels are increasing. Digitalization of the perception of risk is lacking in nuclear power plants and workers are creating prevention methods to make them fully aware of the risks of cyber-attacks. It is suggested that it may be inappropriate to assume we are prepared for potential attacks. Due to advances in technology, a warning that the growing sense of crisis

  9. Nuclear Cyber Security Case Study and Analysis

    International Nuclear Information System (INIS)

    Park, Sunae; Kim, Kyung doo

    2016-01-01

    Due to the new trend in cyber attacks, there is an increased security threat towards every country's infrastructure. So, security measures are required now than ever before. Previous cyber attacks normal process consists of paralyzing a server function, data extraction, or data control into the IT system for trespassing. However, nowadays control systems and infrastructures are also targeted and attacking methods have changed a lot. These days, the virus is becoming increasingly serious and hacker attacks are also becoming more frequent. This virus is a computer virus produced for the purpose of destroying the infrastructure, such as power plants, airports, railways June 2010, and it was first discovered in Belarus. Israel, the US, and other countries are believed culprits behind Stuxnet attacks on other nations such as Iran. Recent malware distribution, such as website hacking threat is growing. In surveys today one of the most long-term posing security threats is from North Korea. In particular, North Korea has been caught launching ongoing cyber-attacks after their latest nuclear test. South Korea has identified national trends regarding North Korean nuclear tests and analyzed them in order to catch disclosed confidential information. Especially, many nuclear power plants in the world are found to be vulnerable to cyber-attacks. Industrial facilities should be more wary of the risk of a serious cyber attack in the middle is going to increase the reliance on universal and commercial digital systems (off the shelf) software, civilian nuclear infrastructure. Senior executives’ current risk rate levels are increasing. Digitalization of the perception of risk is lacking in nuclear power plants and workers are creating prevention methods to make them fully aware of the risks of cyber-attacks. It is suggested that it may be inappropriate to assume we are prepared for potential attacks. Due to advances in technology, a warning that the growing sense of crisis about

  10. Developing a Proportionate Response to a Cyber Attack

    OpenAIRE

    Limnéll, Jarno

    2016-01-01

    The debate on both the impacts of cyber attacks and how to response to attacks is active but precedents are only a few. Strategies and political speeches are always (at least partially) declaratory and vague by nature, and beyond these declarations the practical reality of cyber security as a matter of national security issue is challenging. At the same time cyber issues have catapulted into the highest of the high politics, cyberpolitics, and the line of digital and physical is blurring in m...

  11. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System

    Directory of Open Access Journals (Sweden)

    Halima Ibrahim Kure

    2018-05-01

    Full Text Available A cyber-physical system (CPS is a combination of physical system components with cyber capabilities that have a very tight interconnectivity. CPS is a widely used technology in many applications, including electric power systems, communications, and transportation, and healthcare systems. These are critical national infrastructures. Cybersecurity attack is one of the major threats for a CPS because of many reasons, including complexity and interdependencies among various system components, integration of communication, computing, and control technology. Cybersecurity attacks may lead to various risks affecting the critical infrastructure business continuity, including degradation of production and performance, unavailability of critical services, and violation of the regulation. Managing cybersecurity risks is very important to protect CPS. However, risk management is challenging due to the inherent complex and evolving nature of the CPS system and recent attack trends. This paper presents an integrated cybersecurity risk management framework to assess and manage the risks in a proactive manner. Our work follows the existing risk management practice and standard and considers risks from the stakeholder model, cyber, and physical system components along with their dependencies. The approach enables identification of critical CPS assets and assesses the impact of vulnerabilities that affect the assets. It also presents a cybersecurity attack scenario that incorporates a cascading effect of threats and vulnerabilities to the assets. The attack model helps to determine the appropriate risk levels and their corresponding mitigation process. We present a power grid system to illustrate the applicability of our work. The result suggests that risk in a CPS of a critical infrastructure depends mainly on cyber-physical attack scenarios and the context of the organization. The involved risks in the studied context are both from the technical and

  12. Interval forecasting of cyber-attacks on industrial control systems

    Science.gov (United States)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  13. Training general practitioners in behavior change counseling to improve asthma medication adherence

    NARCIS (Netherlands)

    Broers, Sandra; Smets, Ellen; Bindels, Patrick; Bennebroek Evertsz', Floor; Calff, Mart; de Haes, Hanneke

    2005-01-01

    Objective: Adherence to asthma medication regimens is problematic in general practice. We developed and evaluated a communication training for general practitioners (GPs) to help them address medication adherence during routine consultations. This paper describes the development of the training and

  14. Implementation of a RPS Cyber Security Test-bed with Two PLCs

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Heo, Gyunyoung; Son, Hanseong; An, Yongkyu; Rizwan, Uddin

    2015-01-01

    Our research team proposed the methodology to evaluate cyber security with Bayesian network (BN) as a cyber security evaluation model and help operator, licensee, licensor or regulator in granting evaluation priorities. The methodology allowed for overall evaluation of cyber security by considering architectural aspect of facility and management aspect of cyber security at the same time. In order to emphasize reality of this model by inserting true data, it is necessary to conduct a penetration test that pretends an actual cyber-attack. Through the collaboration with University of Illinois at Urbana-Champaign, which possesses the Tricon a safety programmable logic controller (PLC) used at nuclear power plants and develops a test-bed for nuclear power plant, a test-bed for reactor protection system (RPS) is being developed with the PLCs. Two PLCs are used to construct a simple test-bed for RPS, bi-stable processor (BP) and coincidence processor (CP). By using two PLCs, it is possible to examine cyber-attack against devices such as PLC, cyber-attack against communication between devices, and the effects of a PLC on the other PLC. Two PLCs were used to construct a test-bed for penetration test in this study. Advantages of using two or more PLCs instead of single PLC are as follows. 1) Results of cyber-attack reflecting characteristics among PLCs can be obtained. 2) Cyber-attack can be attempted using a method of attacking communication between PLCs. True data obtained can be applied to existing cyber security evaluation model to emphasize reality of the model

  15. Implementation of a RPS Cyber Security Test-bed with Two PLCs

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of); An, Yongkyu; Rizwan, Uddin [University of Illinois at Urbana-Champaign, Urbana (United States)

    2015-10-15

    Our research team proposed the methodology to evaluate cyber security with Bayesian network (BN) as a cyber security evaluation model and help operator, licensee, licensor or regulator in granting evaluation priorities. The methodology allowed for overall evaluation of cyber security by considering architectural aspect of facility and management aspect of cyber security at the same time. In order to emphasize reality of this model by inserting true data, it is necessary to conduct a penetration test that pretends an actual cyber-attack. Through the collaboration with University of Illinois at Urbana-Champaign, which possesses the Tricon a safety programmable logic controller (PLC) used at nuclear power plants and develops a test-bed for nuclear power plant, a test-bed for reactor protection system (RPS) is being developed with the PLCs. Two PLCs are used to construct a simple test-bed for RPS, bi-stable processor (BP) and coincidence processor (CP). By using two PLCs, it is possible to examine cyber-attack against devices such as PLC, cyber-attack against communication between devices, and the effects of a PLC on the other PLC. Two PLCs were used to construct a test-bed for penetration test in this study. Advantages of using two or more PLCs instead of single PLC are as follows. 1) Results of cyber-attack reflecting characteristics among PLCs can be obtained. 2) Cyber-attack can be attempted using a method of attacking communication between PLCs. True data obtained can be applied to existing cyber security evaluation model to emphasize reality of the model.

  16. Emotional Problems in Traditional and Cyber Victimization

    Science.gov (United States)

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  17. EMERALD - Vocational training in medical radiation physics

    International Nuclear Information System (INIS)

    Lewis, C.A.; Tabakov, S.D.; Roberts, V.C.

    2000-01-01

    EMERALD (European MEdiation RAdiation Learning Development) is a project funded by the European Union under the Leonardo da Vinci programme. It involves a collaboration between Universities and Hospitals from the UK, Sweden, Italy and Portugal. The aim of the EMERALD project is to develop and deliver three common transnational vocational training modules in Medical Radiation Physics in the specific areas of Diagnostic Radiology, Nuclear Medicine and Radiotherapy. These modules are intended to be used in the training programme for young professionals involved in medical radiation physics. Each module is developed from a series of competencies. The competencies are acquired by undertaking practical tasks described in a workbook given to each trainee. Once the task has been completed the trainee discusses the results and observations with his supervisor to ensure that the appropriate competency has been achieved. In addition to the workbook, each trainee receives a CD-ROM containing a series of images to help describe each task. The workbooks for each subject area have been completed and students from Sweden have undertaken Diagnostic Radiology training in the United Kingdom using this approach. The project is now entering the next phase; to develop a multimedia version of the workbook. (author)

  18. TH-AB-201-01: A Feasibility Study of Independent Dose Verification for CyberKnife

    International Nuclear Information System (INIS)

    Sato, A; Noda, T; Keduka, Y; Kawajiri, T; Itano, M; Yamazaki, T; Tachibana, H

    2016-01-01

    Purpose: CyberKnife irradiation is composed of tiny-size, multiple and intensity-modulated beams compared to conventional linacs. Few of the publications for Independent dose calculation verification for CyberKnife have been reported. In this study, we evaluated the feasibility of independent dose verification for CyberKnife treatment as Secondary check. Methods: The followings were measured: test plans using some static and single beams, clinical plans in a phantom and using patient’s CT. 75 patient plans were collected from several treatment sites of brain, lung, liver and bone. In the test plans and the phantom plans, a pinpoint ion-chamber measurement was performed to assess dose deviation for a treatment planning system (TPS) and an independent verification program of Simple MU Analysis (SMU). In the clinical plans, dose deviation between the SMU and the TPS was performed. Results: In test plan, the dose deviations were 3.3±4.5%, and 4.1±4.4% for the TPS and the SMU, respectively. In the phantom measurements for the clinical plans, the dose deviations were −0.2±3.6% for the TPS and −2.3±4.8% for the SMU. In the clinical plans using the patient’s CT, the dose deviations were −3.0±2.1% (Mean±1SD). The systematic difference was partially derived from inverse square law and penumbra calculation. Conclusion: The independent dose calculation for CyberKnife shows −3.0±4.2% (Mean±2SD) and our study, the confidence limit was achieved within 5% of the tolerance level from AAPM task group 114 for non-IMRT treatment. Thus, it may be feasible to use independent dose calculation verification for CyberKnife treatment as the secondary check. This research is partially supported by Japan Agency for Medical Research and Development (AMED)

  19. Establishing a Research and Evaluation Capability for the Joint Medical Education and Training Campus

    OpenAIRE

    Kirby, Sheila Nataraj; Marsh, Julie A.; Thie, Harry J.

    2011-01-01

    In calling for the transformation of military medical education and training, the 2005 Base Realignment and Closure Commission recommended relocating basic and specialty enlisted medical training to a single site to take advantage of economies of scale and the opportunity for joint training. As a result, a joint medical education and training campus (METC) has been established at Fort Sam Houston, Texas. Two of METC's primary long-term goals are to become a high-performing learning organizati...

  20. Decision support systems for cyber-risk supervision in banks

    OpenAIRE

    Košak, Matjaž

    2016-01-01

    Cyber risk has been increasing due to fast development of information technology, increased using of smart gadgets, advanced way of communication, changing habits of users, and inventiveness of cyber criminals. Nowadays, cyber criminals are highly motivated professionals who are frequently financed by wealthy criminal organizations, or even states, and have clear goals and strategies. False working of critical systems might have important consequences for the whole society, therefore the ...

  1. The cyber security threat stops in the boardroom.

    Science.gov (United States)

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  2. REKONSTRUKSI PEMBENTUKAN NATIONAL CYBER DEFENSE SEBAGAI UPAYA MEMPERTAHANKAN KEDAULATAN NEGARA

    Directory of Open Access Journals (Sweden)

    Nur Khalimatus Sa'diyah

    2016-09-01

    Full Text Available Anxiety against cybercrime has become the world’s attention, but not all countries in the world is giving greater attention to the problem of cybercrime by having the rule and unless the developed countries and some developing countries. The purpose of this research is in order to find, examine and analyze the efforts of the Indonesia Government in the protection of State secrets information and data, also to research the forms of Indonesia Government resistance against cyber war. Find a reconstruction of national cyber defense formation or cyber army in an attempt to defend the sovereignty of the country. In Act No. 3 of 2002 on State Defense, it has been established that the threat in the country’s defense system consists of a military threat and non-military threat, which is including cyber threats. One of the negative effects of the cyber world development via the internet among other things is a crime in violation of the law cybercrime, where when the escalation widely spread, it could have threatened the country’s sovereignty, territorial integrity or the safety of the nation. In an effort to combat against the attacks in this virtual world, will require an agency that is in charge of being the world’s bulwark cyber or cyber defense.

  3. Neural Cognition and Affective Computing on Cyber Language.

    Science.gov (United States)

    Huang, Shuang; Zhou, Xuan; Xue, Ke; Wan, Xiqiong; Yang, Zhenyi; Xu, Duo; Ivanović, Mirjana; Yu, Xueer

    2015-01-01

    Characterized by its customary symbol system and simple and vivid expression patterns, cyber language acts as not only a tool for convenient communication but also a carrier of abundant emotions and causes high attention in public opinion analysis, internet marketing, service feedback monitoring, and social emergency management. Based on our multidisciplinary research, this paper presents a classification of the emotional symbols in cyber language, analyzes the cognitive characteristics of different symbols, and puts forward a mechanism model to show the dominant neural activities in that process. Through the comparative study of Chinese, English, and Spanish, which are used by the largest population in the world, this paper discusses the expressive patterns of emotions in international cyber languages and proposes an intelligent method for affective computing on cyber language in a unified PAD (Pleasure-Arousal-Dominance) emotional space.

  4. Neural Cognition and Affective Computing on Cyber Language

    Directory of Open Access Journals (Sweden)

    Shuang Huang

    2015-01-01

    Full Text Available Characterized by its customary symbol system and simple and vivid expression patterns, cyber language acts as not only a tool for convenient communication but also a carrier of abundant emotions and causes high attention in public opinion analysis, internet marketing, service feedback monitoring, and social emergency management. Based on our multidisciplinary research, this paper presents a classification of the emotional symbols in cyber language, analyzes the cognitive characteristics of different symbols, and puts forward a mechanism model to show the dominant neural activities in that process. Through the comparative study of Chinese, English, and Spanish, which are used by the largest population in the world, this paper discusses the expressive patterns of emotions in international cyber languages and proposes an intelligent method for affective computing on cyber language in a unified PAD (Pleasure-Arousal-Dominance emotional space.

  5. Training programmes and experiences of medical emergency preparedness for radiation accident in Japan

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki-Yasumoto, M

    1982-01-01

    Our policy of training programmes for medical radiation emergency preparedness is described. We found it is necessary to have two approaches to the training of relevant personnel. The first approach was to conduct adequate basic training of nurses and health physics personnel in large nuclear installations for medical radiation emergency preparedness. We found it was necessary to have courses for basic knowledge of nuclear radiation and industrial activities, radiation monitoring procedures, radiation injuries, human counters and wound monitors, first aid practices, and radiation medical emergency procedures including practices. The second approach was to make a simple and introductory training program on the subject using lectures and visual presentations in the vicinity of big nuclear installations for personnel relating to the nuclear industrial activities and for concerned local personnel, including medical doctors and nurses. These two training courses and approaches were planned and have been conducted. 2 refs. (DT)

  6. Cyber procedures for a business environment in Serbia

    Directory of Open Access Journals (Sweden)

    Đekić Milica D.

    2016-01-01

    Full Text Available Through a practical experience, it is getting clear that medium and small enterprises as well as some foreign companies in Serbia suffer the serious lack of cyber security procedures. In a business environment of our country, there is a strong need for a comprehensive and systematized document that would suggest how to resolve any cyber situation from the practice. The document would comply with employer's interests and assure a secure working process of employees, at same glance. In this overview, we will attempt to define basic guidelines in sense of cyber procedures.

  7. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    International Nuclear Information System (INIS)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon

    2008-01-01

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS

  8. Training in trauma management: the role of simulation-based medical education.

    Science.gov (United States)

    Berkenstadt, Haim; Ben-Menachem, Erez; Simon, Daniel; Ziv, Amitai

    2013-03-01

    Simulation-based medical education (SBME) offers a safe and "mistake-forgiving" environment to teach and train medical professionals. The diverse range of medical-simulation modalities enables trainees to acquire and practice an array of tasks and skills. SBME offers the field of trauma training multiple opportunities to enhance the effectiveness of the education provided in this challenging domain. Further research is needed to better learn the role of simulation-based learning in trauma management and education. Copyright © 2013 Elsevier Inc. All rights reserved.

  9. Work Package 2 Report - Cyber resilience for the shipping industry

    DEFF Research Database (Denmark)

    Sahay, Rishikesh; Sepúlveda Estay, Daniel Alberto

    2018-01-01

    This report describes the current state of the research performed as a part of the CyberShip project for its Work Package 2. This work package aims at defining a CyberShip model and KPIs for cyber resilience. This is a project funded by the Danish Maritime Fund (DMF) with the objective of proposing...

  10. Interview with a Cyber-Student: A Look behind Online Cheating

    Science.gov (United States)

    Davis, Julia

    2014-01-01

    This case study offers insights into the motivation and experiences of a cyber-student, an individual who completes all or portions of an online class for the registered student. The cyber-student shares information on the inner-workings of online companies specializing in matching cyber-students with potential clients. A portrait of both a…

  11. Cyber Attack on Critical Infrastructure and Its Influence on International Security

    OpenAIRE

    出口 雅史

    2017-01-01

     Since the internet appeared, with increasing cyber threats, the vulnerability of critical infrastructure has become a vital issue for international security. Although cyber attack was not lethal in the past, new type of cyber assaults such as stuxnet are able to damage not only computer system digitally, but also critical infrastructure physically. This article will investigate how the recent cyber attacks have threatened critical infrastructure and their influence on international security....

  12. Science of Cyber Security as a System of Models and Problems

    OpenAIRE

    Kott, Alexander

    2015-01-01

    Terms like "Science of Cyber" or "Cyber Science" have been appearing in literature with growing frequency, and influential organizations initiated research initiatives toward developing such a science even though it is not clearly defined. We propose to define the domain of the science of cyber security by noting the most salient artifact within cyber security -- malicious software -- and defining the domain as comprised of phenomena that involve malicious software (as well as legitimate soft...

  13. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  14. Cyber disorders: the mental health concern for the new millennium.

    Science.gov (United States)

    Young, K; Pistner, M; O'Mara, J; Buchanan, J

    1999-01-01

    Anecdotal evidence has suggested that mental health practitioners' report increased caseloads of clients whose primary complaint involves the Internet. However, little is known about the incidence, associated behaviors, attitudes of practitioners, and interventions involved related to this relatively new phenomenon. Therefore, this study surveyed therapists who have treated clients suffering from cyber-related problems to gather such outcome information. Respondents reported an average caseload of nine clients who they classified as Internet-addicted, with a range between 2 and 50 clients treated within the past year. Five general subtypes of Internet addiction were categorized based on the most problematic types of online applications, and they include addictions to Cybersex, Cyber-relationships, online stock trading or gambling, information surfing, and computer games. Treatment strategies included cognitive-behavioral approaches, sexual offender therapy, marital and family therapy, social skills training, and pharmacological interventions. Based on their client encounters, efforts to initiate support groups and recovery programs specializing in the treatment of Internet addiction were being considered. Finally, based upon the findings, this article examines the impact of cyberdisorders on future research, treatment, and public policy issues for the new millennium.

  15. Training the next generation of physician researchers - Vanderbilt Medical Scholars Program.

    Science.gov (United States)

    Brown, Abigail M; Chipps, Teresa M; Gebretsadik, Tebeb; Ware, Lorraine B; Islam, Jessica Y; Finck, Luke R; Barnett, Joey; Hartert, Tina V

    2018-01-04

    As highlighted in recent reports published by the Physician-Scientist Workforce Working Group at the National Institutes of Health, the percentage of physicians conducting research has declined over the past decade. Various programs have been put in place to support and develop current medical student interest in research to alleviate this shortage, including The Vanderbilt University School of Medicine Medical Scholars Program (MSP). This report outlines the long-term program goals and short-term outcomes on career development of MSP alumni, to shed light on the effectiveness of research training programs during undergraduate medical training to inform similar programs in the United States. MSP alumni were asked to complete an extensive survey assessing demographics, accomplishments, career progress, future career plans, and MSP program evaluation. Fifty-five (81%) MSP alumni responded, among whom 12 had completed all clinical training. The demographics of MSP alumni survey respondents are similar to those of all Vanderbilt medical students and medical students at all other Association of American Medical College (AAMC) medical schools. MSP alumni published a mean of 1.9 peer-reviewed manuscripts (95% CI:1.2, 2.5), and 51% presented at national meetings. Fifty-eight percent of respondents reported that MSP participation either changed their career goals or helped to confirm or refine their career goals. Results suggest that the MSP program both prepares students for careers in academic medicine and influences their career choices at an early juncture in their training. A longer follow-up period is needed to fully evaluate the long-term outcomes of some participants.

  16. Medical waste management training for healthcare managers - a necessity?

    Science.gov (United States)

    Ozder, Aclan; Teker, Bahri; Eker, Hasan Huseyin; Altındis, Selma; Kocaakman, Merve; Karabay, Oguz

    2013-07-16

    This is an interventional study, since a training has been given, performed in order to investigate whether training has significant impact on knowledge levels of healthcare managers (head-nurses, assistant head nurses, hospital managers and deputy managers) regarding bio-medical waste management. The study was conducted on 240 volunteers during June - August 2010 in 12 hospitals serving in Istanbul (private, public, university, training-research hospitals and other healthcare institutions). A survey form prepared by the project guidance team was applied to the participants through the internet before and after the training courses. The training program was composed of 40 hours of theory and 16 hours of practice sessions taught by persons known to have expertise in their fields. Methods used in the analysis of the data chi-square and t-tests in dependent groups. 67.5% (162) of participants were female. 42.5% (102) are working in private, and 21.7% in state-owned hospitals. 50.4% are head-nurses, and 18.3% are hospital managers.A statistically significant difference was found among those who had received medical waste management training (preliminary test and final test) and others who had not (pnecessity for the safety of patients and important for its contribution to the economy of the country.

  17. Internet Governance amp Cyber Crimes In UAE

    Directory of Open Access Journals (Sweden)

    Ayesha Al Neyadi

    2015-08-01

    Full Text Available Abstract Most people in UAE dont feel safe while they are use the Internet because most internet users have been a victim for cyber crime. Cyber crime threat rate has increased which has targeted on citizen privacy property and governments also the reputation problems. There are many criminal activities such as indecent acts Copyright issues Terrorist Acts State security and Contempt of religion. Cyber crimes due to several reasons such as they have lack of social intelligence they are being greedy and not being content also some of them have financial troubles these reasons usually exploited by criminals. Thus the decree will be a punishment or criminalizes formally on any person who using any kind of information technology and any others private life to blackmail or to threaten others online. In addition at the present time with the most detailed new cybercrime law that can be used to prove found guilty. As well the author discusses that the new cyber-crime law provides protection of personal information including banking information credit cards and electronic payment information.

  18. Kicking the digital dog: a longitudinal investigation of young adults' victimization and cyber-displaced aggression.

    Science.gov (United States)

    Wright, Michelle F; Li, Yan

    2012-09-01

    Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced aggression. Findings indicated that victimization in both social contexts (face-to-face and cyber) contributed to cyber-displaced aggression 6 months later (Time 2), after controlling for gender, cyber aggression, face-to-face displaced aggression, and cyber-displaced aggression at Time 1. A significant two-way interaction revealed that Time 1 cyber victimization was more strongly related to Time 2 cyber-displaced aggression when young adults had higher levels of face-to-face victimization at Time 1. Implications of these findings are discussed as well as a call for more research investigating displaced aggression in the cyber context.

  19. Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying.

    Science.gov (United States)

    Modecki, Kathryn L; Minchin, Jeannie; Harbaugh, Allen G; Guerra, Nancy G; Runions, Kevin C

    2014-11-01

    Bullying involvement in any form can have lasting physical and emotional consequences for adolescents. For programs and policies to best safeguard youth, it is important to understand prevalence of bullying across cyber and traditional contexts. We conducted a thorough review of the literature and identified 80 studies that reported corresponding prevalence rates for cyber and traditional bullying and/or aggression in adolescents. Weighted mean effect sizes were calculated, and measurement features were entered as moderators to explain variation in prevalence rates and in traditional-cyber correlations within the sample of studies. Prevalence rates for cyber bullying were lower than for traditional bullying, and cyber and traditional bullying were highly correlated. A number of measurement features moderated variability in bullying prevalence; whereas a focus on traditional relational aggression increased correlations between cyber and traditional aggressions. In our meta-analytic review, traditional bullying was twice as common as cyber bullying. Cyber and traditional bullying were also highly correlated, suggesting that polyaggression involvement should be a primary target for interventions and policy. Results of moderation analyses highlight the need for greater consensus in measurement approaches for both cyber and traditional bullying. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  20. Peer Attachment and Cyber Aggression Involvement among Chinese, Indian, and Japanese Adolescents

    Directory of Open Access Journals (Sweden)

    Michelle F. Wright

    2015-04-01

    Full Text Available Significant advancements have been made in cyber aggression literature, with many studies revealing the consequences associated with adolescents’ involvement in these behaviors. Few studies have focused on cyber aggression involvement in China, India, and Japan. The present study examined differences in cyber aggression perpetration and victimization among 1637 adolescents living in China, India, and Japan, while controlling for face-to-face bullying involvement, individualism, and collectivism. Another aim of the present study was to examine country of origin and cyber aggression involvement (i.e., the uninvolved, cyberaggressor-cybervictims, cyberaggressors, and cybervictims differences in peer attachment. Findings revealed that adolescents from India had the highest levels of cyber aggression involvement when compared to adolescents from China or Japan. Chinese adolescents engaged in more cyber aggression perpetration and were victimized more by cyber aggression when compared to Japanese adolescents. No country of origin differences were found for peer attachment. However, uninvolved adolescents reported higher levels of peer attachment when compared to the other groups. Cyberaggressor-cybervictims had the lowest levels of peer attachment, followed by cybervictims and cyberaggressors. These results suggest that there should be concern about cyber aggression involvement among adolescents in these countries, especially in India, where cyber aggression research has been slow to develop.

  1. Systematic elicitation of cyber-security controls for NPP I and C system

    Energy Technology Data Exchange (ETDEWEB)

    Lee, M. S.; Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of); Park, S. P. [AhnLab Inc., Seongnam (Korea, Republic of); Kim, Y. M. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-05-15

    Cyber-security implementation starts with a development of a cyber security plan considering characteristics of I and C system. In this paper, we describe a method that develops a cyber security plan for NPP I and C system. Especially, we propose a method for systematic elicitation of technical security controls that should be applied to I and C system. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system. The rest of the paper is organized as follows: Section 2 introduces activities to develop a cyber-security plan and presents the result of each activity of the security plan. Section 3 concludes the paper. We proposed a method for systematic elicitation of security controls and described the method through examples. Development companies that want to implement cyber-security in I and C system can develop a cyber-security plan and apply the cyber-security program to their system according to our method. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system.

  2. Systematic elicitation of cyber-security controls for NPP I and C system

    International Nuclear Information System (INIS)

    Lee, M. S.; Kim, T. H.; Park, S. P.; Kim, Y. M.

    2015-01-01

    Cyber-security implementation starts with a development of a cyber security plan considering characteristics of I and C system. In this paper, we describe a method that develops a cyber security plan for NPP I and C system. Especially, we propose a method for systematic elicitation of technical security controls that should be applied to I and C system. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system. The rest of the paper is organized as follows: Section 2 introduces activities to develop a cyber-security plan and presents the result of each activity of the security plan. Section 3 concludes the paper. We proposed a method for systematic elicitation of security controls and described the method through examples. Development companies that want to implement cyber-security in I and C system can develop a cyber-security plan and apply the cyber-security program to their system according to our method. We expect that this study can provide a basis to develop a cyber-security plan for I and C system. Also, the study can contribute enhancing security to NPP I and C system

  3. Middle School Students' Perceptions of and Responses to Cyber Bullying

    Science.gov (United States)

    Holfeld, Brett; Grabe, Mark

    2012-01-01

    This study explored the nature and extent of middle school students' (n = 665) experiences with cyber bullying. Approximately one in five students reported being cyber bullied in the past year, with 55% of those students being repeatedly victimized within the past 30 days. Female students were more likely to be involved in cyber bullying (victim,…

  4. Deploying ICT with Entrepreneurship Culture can Fight Cyber-Crime ...

    African Journals Online (AJOL)

    Deploying ICT with Entrepreneurship Culture can Fight Cyber-Crime Menace ... Again he innovates, introducing new products & technologies by the ... Keywords: Cyber-crimes, entrepreneurs, compupreneur, firewalls, computer forensics, ICT, ...

  5. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  6. Critical infrastructure cyber-security risk management

    OpenAIRE

    Spyridopoulos, T.; Maraslis, K.; Tryfonas, T.; Oikonomou, G.

    2017-01-01

    Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. Incorrect estimations can lead to errors in the evaluation of risks that can ultimately affect the protection of the system. This issue is also transferred to methods used in Industrial Control Systems (ICSs), as they are mainly...

  7. Maritime Cyber Security University Research: Phase 1

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Appendices Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-07-16 Maritime ...Macesker Executive Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security

  8. CHDS Speaker: Hackers Critical to Defeating Cyber Threats

    OpenAIRE

    Center for Homeland Defense and Security

    2014-01-01

    Center for Homeland Defense and Security News and Stories, PRESS RELEASES Hackers are potential resources that can aid in the fight against cyber-terror far better than government bureaucrats, says internationally known security researcher Robi Sen. Sure, sophisticated cyber-criminal hackers and organizations...

  9. Personalized gesture interactions for cyber-physical smart-home environments

    Institute of Scientific and Technical Information of China (English)

    Yihua LOU; Wenjun WU; Radu-Daniel VATAVU; Wei-Tek TSAI

    2017-01-01

    A gesture-based interaction system for smart homes is a part of a complex cyber-physical environment,for which researchers and developers need to address major challenges in providing personalized gesture interactions.However,current research efforts have not tackled the problem of personalized gesture recognition that often involves user identification.To address this problem,we propose in this work a new event-driven service-oriented framework called gesture services for cyber-physical environments (GS-CPE) that extends the architecture of our previous work gesture profile for web services (GPWS).To provide user identification functionality,GS-CPE introduces a two-phase cascading gesture password recognition algorithm for gesture-based user identification using a two-phase cascading classifier with the hidden Markov model and the Golden Section Search,which achieves an accuracy rate of 96.2% with a small training dataset.To support personalized gesture interaction,an enhanced version of the Dynamic Time Warping algorithm with multiple gestural input sources and dynamic template adaptation support is implemented.Our experimental results demonstrate the performance of the algorithm can achieve an average accuracy rate of 98.5% in practical scenarios.Comparison results reveal that GS-CPE has faster response time and higher accuracy rate than other gesture interaction systems designed for smart-home environments.

  10. Effectively protecting cyber infrastructure and assessing security needs

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, J.; Starman, R. [EWA Canada Ltd., Edmonton, AB (Canada)

    2002-07-01

    This presentation addressed some of the requirements for effectively protecting cyber infrastructure and assessing security needs. The paper discussed the hype regarding cyber attacks, and presented the Canadian reality (as viewed by CanCERT). An assessment of security concerns was also presented. Recent cyber attacks on computer networks have raised fears of unsafe energy networks. Some experts claim the attacks are linked to terrorism, others blame industrial spying and mischief. Others dismiss the notion that somebody could bring down a power grid with a laptop as being far-fetched. It was noted that the cyber security threat is real, and that attacks are becoming more sophisticated as we live in a target rich environment. The issue of assessing vulnerabilities was discussed along with the selection of safeguards such as improving SCADA systems and the latest encryption methods to prevent hackers from bringing down computer networks. 3 tabs., 23 figs.

  11. [Job-sharing in postgraduate medical training: not automatically a nice duet].

    Science.gov (United States)

    Levi, M

    2004-02-14

    Part-time work is an increasingly common phenomenon amongst medical professionals. Therefore many postgraduate training programmes for resident physicians also offer the opportunity of part-time work, which is usually in the form of an 80% full-time equivalent post. A new initiative has created the possibility of job-sharing, in which each of the participants fulfills 50% of one training position. Although the experience of the participants is mainly positive, it is unclear how this development will impact the quality of patient care and how it will affect the fulfillment of the training objectives. A more systematic evaluation of job-sharing in postgraduate medical training programmes is required to clarify these points.

  12. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S.

    2009-11-01

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report

  13. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S

    2009-11-15

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report.

  14. Changing the culture of medical training: An important step toward the implementation of competency-based medical education.

    Science.gov (United States)

    Ferguson, Peter C; Caverzagie, Kelly J; Nousiainen, Markku T; Snell, Linda

    2017-06-01

    The current medical education system is steeped in tradition and has been shaped by many long-held beliefs and convictions about the essential components of training. The objective of this article is to propose initiatives to overcome biases against competency-based medical education (CBME) in the culture of medical education. At a retreat of the International Competency Based Medical Education (ICBME) Collaborators group, an intensive brainstorming session was held to determine potential barriers to adoption of CBME in the culture of medical education. This was supplemented with a review of the literature on the topic. There continues to exist significant key barriers to the widespread adoption of CBME. Change in educational culture must be embraced by all components of the medical education hierarchy. Research is essential to provide convincing evidence of the benefit of CBME. The widespread adoption of CBME will require a change in the professional, institutional, and organizational culture surrounding the training of medical professionals.

  15. Empirical analysis of the effects of cyber security incidents.

    Science.gov (United States)

    Davis, Ginger; Garcia, Alfredo; Zhang, Weide

    2009-09-01

    We analyze the time series associated with web traffic for a representative set of online businesses that have suffered widely reported cyber security incidents. Our working hypothesis is that cyber security incidents may prompt (security conscious) online customers to opt out and conduct their business elsewhere or, at the very least, to refrain from accessing online services. For companies relying almost exclusively on online channels, this presents an important business risk. We test for structural changes in these time series that may have been caused by these cyber security incidents. Our results consistently indicate that cyber security incidents do not affect the structure of web traffic for the set of online businesses studied. We discuss various public policy considerations stemming from our analysis.

  16. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2008-10-15

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS.

  17. Designing and using computer simulations in medical education and training: an introduction.

    Science.gov (United States)

    Friedl, Karl E; O'Neil, Harold F

    2013-10-01

    Computer-based technologies informed by the science of learning are becoming increasingly prevalent in education and training. For the Department of Defense (DoD), this presents a great potential advantage to the effective preparation of a new generation of technologically enabled service members. Military medicine has broad education and training challenges ranging from first aid and personal protective skills for every service member to specialized combat medic training; many of these challenges can be met with gaming and simulation technologies that this new generation has embraced. However, comprehensive use of medical games and simulation to augment expert mentorship is still limited to elite medical provider training programs, but can be expected to become broadly used in the training of first responders and allied health care providers. The purpose of this supplement is to review the use of computer games and simulation to teach and assess medical knowledge and skills. This review and other DoD research policy sources will form the basis for development of a research and development road map and guidelines for use of this technology in military medicine. Reprint & Copyright © 2013 Association of Military Surgeons of the U.S.

  18. Clinical Training of Medical Physicists Specializing in Radiation Oncology (French Ed.)

    International Nuclear Information System (INIS)

    2012-01-01

    The application of radiation in human health, for both diagnosis and treatment of disease, is an important component of the work of the IAEA. The responsibility for the increasing technical aspects of this work is undertaken by the medical physicist. To ensure good practice in this vital area structured clinical training programmes are required to complement academic learning. This publication is intended to be a guide to the practical implementation of such a programme for radiation therapy. There is a general and growing awareness that radiation medicine is increasingly dependant on well trained medical physicists that are based in the clinical setting. However an analysis of the availability of medical physicists indicates a large shortfall of qualified and capable professionals. This is particularly evident in developing countries. While strategies to increase academic educational opportunities are critical to such countries, the need for guidance on structured clinical training was recognised by the members of the Regional Cooperative Agreement (RCA) for research, development and training related to nuclear sciences for Asia and the Pacific. Consequently a technical cooperation regional project (RAS6038) under the RCA programme was formulated to address this need in the Asia Pacific region by developing suitable material and establishing its viability. Development of a clinical training guide for medical physicists specialising in radiation therapy was started in 2005 with the appointment of a core drafting committee of regional and international experts. Since 2005 the IAEA has convened two additional consultant group meetings including additional experts to prepare the present publication. The publication drew heavily, particularly in the initial stages, from the experience and documents of the Clinical Training Programme for Radiation Oncology Medical Physicists as developed by the Australasian College of Physical Scientists and Engineers in Medicine. Their

  19. Clinical Training of Medical Physicists Specializing in Radiation Oncology (Spanish Ed.)

    International Nuclear Information System (INIS)

    2012-01-01

    The application of radiation in human health, for both diagnosis and treatment of disease, is an important component of the work of the IAEA. The responsibility for the increasing technical aspects of this work is undertaken by the medical physicist. To ensure good practice in this vital area structured clinical training programmes are required to complement academic learning. This publication is intended to be a guide to the practical implementation of such a programme for radiation therapy. There is a general and growing awareness that radiation medicine is increasingly dependant on well trained medical physicists that are based in the clinical setting. However an analysis of the availability of medical physicists indicates a large shortfall of qualified and capable professionals. This is particularly evident in developing countries. While strategies to increase academic educational opportunities are critical to such countries, the need for guidance on structured clinical training was recognised by the members of the Regional Cooperative Agreement (RCA) for research, development and training related to nuclear sciences for Asia and the Pacific. Consequently a technical cooperation regional project (RAS6038) under the RCA programme was formulated to address this need in the Asia Pacific region by developing suitable material and establishing its viability. Development of a clinical training guide for medical physicists specialising in radiation therapy was started in 2005 with the appointment of a core drafting committee of regional and international experts. Since 2005 the IAEA has convened two additional consultant group meetings including additional experts to prepare the present publication. The publication drew heavily, particularly in the initial stages, from the experience and documents of the Clinical Training Programme for Radiation Oncology Medical Physicists as developed by the Australasian College of Physical Scientists and Engineers in Medicine. Their

  20. Medical physics education and training activities in India

    International Nuclear Information System (INIS)

    Kumar, Munish; Gomathi, K.; Sharma, S.D.; Chourasiya, G.; Mayya, Y.S.; Sahani, G.; Sharma Dash, P.K.; Agarwal, S.P.

    2008-01-01

    Since the discovery of x-rays and radioactivity, ionising radiations are finding extensive applications in human health care programmes worldwide. X-rays are being used in India for various applications since 1898. Further the establishment of Tata Memorial Hospital in 1941, as a centre for the treatment of cancer was the stepping-stone for medical physics in India with Dr. Ramaiah Naidu as the first medical physicist. Since then, the field of medical physics has made a tremendous progress. At cancer treatment centre, medical physicist cum RSO is required not only to ensure and maintain quality of radiation treatment by ensuring quality assurance, treatment planning and resonance with radiation oncologist but also acts as a bridge between the cancer treatment centre and regulatory authority (AERB) and also ensures radiation safety. Currently there are around 399 teletherapy units (280 telecobalt and 119 medical linear accelerator) in our country and the number is further likely to increase in future due to i) More awareness about cancer and prevalence of around 1 million new cancer cases per year and ii) The indigenous production of telecobalt and linear accelerator units has brought down the cost. In fact in India, there is a need of more than 1000 teletherapy units. In view of above, well-trained and qualified medical physicists are required. In this paper, various educational and training activities in India are described. The paper also casts light on growing demands for starting M.Phil and Ph.D. degrees in medical physics in India

  1. 7 Key Challenges for Visualization in Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    2014-12-02

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  2. Hyper-connectivity : intricacies of national and international cyber securities

    OpenAIRE

    Dawson, Maurice

    2017-01-01

    This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets: 1. Security Solutions for Hyperconnectivity and the Internet of Things; 2. Developing Next-Generation Countermeasures for...

  3. Bayesian Network Models in Cyber Security: A Systematic Review

    OpenAIRE

    Chockalingam, S.; Pieters, W.; Herdeiro Teixeira, A.M.; van Gelder, P.H.A.J.M.; Lipmaa, Helger; Mitrokotsa, Aikaterini; Matulevicius, Raimundas

    2017-01-01

    Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a systematic review of the scientific literature and identify 17 standard BN models in cyber security. We analyse these models based on 9 different criteri...

  4. Summer research training for medical students: impact on research self-efficacy.

    Science.gov (United States)

    Black, Michelle L; Curran, Maureen C; Golshan, Shahrokh; Daly, Rebecca; Depp, Colin; Kelly, Carolyn; Jeste, Dilip V

    2013-12-01

    There is a well-documented shortage of physician researchers, and numerous training programs have been launched to facilitate development of new physician scientists. Short-term research training programs are the most practical form of research exposure for most medical students, and the summer between their first and second years of medical school is generally the longest period they can devote solely to research. The goal of short-term training programs is to whet the students' appetite for research and spark their interest in the field. Relatively little research has been done to test the effectiveness of short-term research training programs. In an effort to examine short-term effects of three different NIH-funded summer research training programs for medical students, we assessed the trainees' (N = 75) research self-efficacy prior to and after the programs using an 11-item scale. These hands-on training programs combined experiential, didactic, and mentoring elements. The students demonstrated a significant increase in their self-efficacy for research. Trainees' gender, ranking of their school, type of research, and specific content of research project did not predict improvement. Effect sizes for different types of items on the scale varied, with the largest gain seen in research methodology and communication of study findings. © 2013 Wiley Periodicals, Inc.

  5. Drie nationale cyber security strategieën vergeleken

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2011-01-01

    Onafhankelijk van elkaar brachten Frankrijk, Duitsland en Nederland hun nationale cyber security strategieën vrijwel tegelijk uit. De strategieën hebben overeenkomsten, maar tonen ook grote verschillen. De drie landen onderkennen een urgente noodzaak om cyber security aan te pakken, maar hebben

  6. A controlled trial of mental illness related stigma training for medical students

    Directory of Open Access Journals (Sweden)

    Leese Morven

    2011-07-01

    Full Text Available Abstract Background The evidence base for mental illness related stigma interventions in health care professionals and trainees is underdeveloped. This study aimed to examine the impact of mental illness related stigma training on third year medical students' knowledge, attitudes and behaviour related to people with mental illness. Methods A non-randomised controlled trial was conducted with 110 third year medical students at a medical school in England to determine the effectiveness of a mental illness related stigma training package that targeted their knowledge, attitudes and behaviour. Results We detected a significant positive effect of factual content and personal testimonies training upon an improvement in knowledge, F(1, 61 = 16.3, p = 0.0002. No such difference was determined with attitudes or for behaviour. Conclusions Knowledge, attitudes and behaviour may need to be separately targeted in stigma reduction interventions, and separately assessed. The inter-relationships between these components in mental health promotion and medical education warrant further research. The study next needs to be replicated with larger, representative samples using appropriate evaluation instruments. More intensive training for medical students may also be required.

  7. Cross-Layer Damage Assessment for Cyber Situational Awareness

    Science.gov (United States)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  8. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    OpenAIRE

    Audrey Guinchard

    2011-01-01

    Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing ant...

  9. Cyber incivility @ work: the new age of interpersonal deviance.

    Science.gov (United States)

    Giumetti, Gary W; McKibben, Eric S; Hatfield, Andrea L; Schroeder, Amber N; Kowalski, Robin M

    2012-03-01

    The current study was designed to extend the interpersonal deviance literature into the online domain by examining the incidence and impact of supervisor cyber incivility and neuroticism on employee outcomes at work. Conservation of Resources (COR) theory was used as the guiding framework because cyber incivility is thought to deplete energetic resources in much the same way that other stressors do, ultimately leading to negative outcomes like burnout. Results indicate that supervisor cyber incivility is positively related to burnout, absenteeism, and turnover intentions. Support was also found for the role of neuroticism as a moderator of the relationship between supervisor cyber incivility and outcomes. In general, the relations between cyber incivility and outcomes were stronger for those individuals reporting higher levels of neuroticism. Results are discussed in terms of COR theory, and possible mechanisms for the role of neuroticism in the stressor-strain relationship are discussed. The current study highlights the importance of understanding workplace online behavior and its impact on employee health and organizational well-being. Future research directions examining online interpersonal deviance are suggested.

  10. A Randomized Controlled Study of Art Observation Training to Improve Medical Student Ophthalmology Skills.

    Science.gov (United States)

    Gurwin, Jaclyn; Revere, Karen E; Niepold, Suzannah; Bassett, Barbara; Mitchell, Rebecca; Davidson, Stephanie; DeLisser, Horace; Binenbaum, Gil

    2018-01-01

    Observation and description are critical to the practice of medicine, and to ophthalmology in particular. However, medical education does not provide explicit training in these areas, and medical students are often criticized for deficiencies in these skills. We sought to evaluate the effects of formal observation training in the visual arts on the general and ophthalmologic observational skills of medical students. Randomized, single-masked, controlled trial. Thirty-six first-year medical students, randomized 1:1 into art-training and control groups. Students in the art-training group were taught by professional art educators at the Philadelphia Museum of Art, during 6 custom-designed, 1.5-hour art observation sessions over a 3-month period. All subjects completed pre- and posttesting, in which they described works of art, retinal pathology images, and external photographs of eye diseases. Grading of written descriptions for observational and descriptive abilities by reviewers using an a priori rubric and masked to group assignment and pretesting/posttesting status. Observational skills, as measured by description testing, improved significantly in the training group (mean change +19.1 points) compared with the control group (mean change -13.5 points), P = 0.001. There were significant improvements in the training vs. control group for each of the test subscores. In a poststudy questionnaire, students reported applying the skills they learned in the museum in clinically meaningful ways at medical school. Art observation training for first-year medical students can improve clinical ophthalmology observational skills. Principles from the field of visual arts, which is reputed to excel in teaching observation and descriptive abilities, can be successfully applied to medical training. Further studies can examine the impact of such training on clinical care. Copyright © 2017 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.

  11. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Ickhyun; Kwon, Kookheui [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2013-05-15

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference.

  12. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    International Nuclear Information System (INIS)

    Shin, Ickhyun; Kwon, Kookheui

    2013-01-01

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference

  13. Medical students perception of undergraduate ophthalmology training in Nnamdi Azikiwe University Nnewi Campus.

    Science.gov (United States)

    Onyekwe, L O; Nwosu, S N N

    2006-12-01

    To determine the perception and aspiration of medical students towards ophthalmology. Information for the study was obtained through forced-choice questionnaire set to 102 medical students in 2000/2001 graduating class in Nnamdi Azikiwe University. One hundred questionnaires were completed. As a specialty of choice ophthalmology ranked fourth {16.0%} as a first choice; second {21.0%} as a second choice and first {26.0%} as a third choice. Ninety-five of respondents found ophthalmology training useful. This cohort of medical students considered ophthalmic training in this institution essential and adequate. Undergraduate ophthalmic course should ensure an understanding of the basic principles of ophthalmology and should be designed to motivate the interest and confidence of the medical students in the specialty. Training period should be at least 4 weeks. With appropriate training ophthalmology can attract reasonable interest as a choice for specification.

  14. Medical Team Training: Using Simulation as a Teaching Strategy for Group Work

    Science.gov (United States)

    Moyer, Michael R.; Brown, Rhonda Douglas

    2011-01-01

    Described is an innovative approach currently being used to inspire group work, specifically a medical team training model, referred to as The Simulation Model, which includes as its major components: (1) Prior Training in Group Work of Medical Team Members; (2) Simulation in Teams or Groups; (3) Multidisciplinary Teamwork; (4) Team Leader…

  15. Guidelines for Professional Training of Junior Medical Staff in the Context of European Experience

    Science.gov (United States)

    Sosnova, Myroslava

    2016-01-01

    The article deals with outlining guidelines for improving professional training of junior medical staff based on European experience. Consequently, guidelines and recommendations on enhancing the efficiency of medical education in general and junior medical specialists' professional training, in particular, published by European Union of Medical…

  16. Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students

    Science.gov (United States)

    Dilmac, Bulent

    2009-01-01

    Recent surveys show that cyber bullying is a pervasive problem in North America. Many news stories have reported cyber bullying incidents around the world. Reports on the prevalence of cyber bullying and victimization as a result of cyber bullying increase yearly. Although we know what cyber bullying is it is important that we learn more about the…

  17. An analytic approach to cyber adversarial dynamics

    Science.gov (United States)

    Sweeney, Patrick; Cybenko, George

    2012-06-01

    To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.

  18. Control Systems Cyber Security Standards Support Activities

    Energy Technology Data Exchange (ETDEWEB)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  19. Nuclear Deterrence in Cyber-ia: Challenges and Controversies

    Science.gov (United States)

    2016-09-01

    54 | Air & Space Power Journal Nuclear Deterrence in Cyber-ia Challenges and Controversies © Dr. Stephen J. Cimbala* Disclaimer: The views and...into here. 11. Mazanec, “International Order in Cyberspace,” 83. 12. Joel Brenner, Glass Houses: Privacy , Secrecy, and Cyber Insecurity in a Transparent

  20. Scavenger: Transparent Development of Efficient Cyber Foraging Applications

    DEFF Research Database (Denmark)

    Kristensen, Mads Darø

    2010-01-01

    delivering efficient, mobile use of remote computing resources through the use of a custom built mobile code execution environment and a new dual-profiling scheduler. One of the main difficulties within cyber foraging is that it is very challenging for application programmers to develop cyber foraging...

  1. Help for the Developers of Control System Cyber Security Standards

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  2. Using Learner-Centered, Simulation-Based Training to Improve Medical Students’ Procedural Skills

    Directory of Open Access Journals (Sweden)

    Serkan Toy

    2017-03-01

    Full Text Available Purpose: To evaluate the effectiveness of a learner-centered, simulation-based training developed to help medical students improve their procedural skills in intubation, arterial line placement, lumbar puncture, and central line insertion. Method: The study participants were second and third year medical students. Anesthesiology residents provided the training and evaluated students’ procedural skills. Two residents were present at each station to train the medical students who rotated through all 4 stations. Pre/posttraining assessment of confidence, knowledge, and procedural skills was done using a survey, a multiple-choice test, and procedural checklists, respectively. Results: In total, 24 students were trained in six 4-hour sessions. Students reported feeling significantly more confident, after training, in performing all 4 procedures on a real patient ( P < .001. Paired-samples t tests indicated statistically significant improvement in knowledge scores for intubation, t (23 = −2.92, P < .001, and arterial line placement, t (23 = −2.75, P < .001. Procedural performance scores for intubation ( t (23 = −17.29, P < .001, arterial line placement ( t (23 = −19.75, P < .001, lumbar puncture ( t (23 = −16.27, P < .001, and central line placement ( t (23 = −17.25, P < .001 showed significant improvement. Intraclass correlation coefficients indicated high reliability in checklist scores for all procedures. Conclusions: The simulation sessions allowed each medical student to receive individual attention from 2 residents for each procedure. Students’ written comments indicated that this training modality was well received. Results showed that medical students improved their self-confidence, knowledge, and skills in the aforementioned procedures.

  3. Framework for Grading of Cyber Security Check-List upon I and C Architecture

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyunyong; Son, Han Seong

    2016-01-01

    Cyber-attack can threaten research reactors as well as NPPs since the goal of cyber-attack is not only to make a catastrophic accident such as radiation exposure against public health but also to make chaos or anxiety among the public. Moreover, there is more probability to occur in research reactors than NPPs since research reactors has more users than NPPs. The nuclear regulatory agencies such as U.S.NRC and KINAC (Korea Institute of Nuclear Nonproliferation and Control) have published regulatory guides for rules against cyber-attack to maintain cyber security of nuclear facilities. U.S.NRC has published a regulatory guide (U.S.NRC / RG-5.71) and KINAC has developed a regulatory standard (KINAC / RS-015) to establish a cyber security for nuclear facilities. However, these regulatory documents represent check-list for cyber security regardless of reactor type such as NPPs or research reactors. The proposed framework in this paper was grading of cyber security check-lists with BBN by I and C architecture such as NPPs and research reactors. First, the BBN model was developed to apply I and C system architecture of target nuclear facility. The architecture model calculates the cyber security risk with structural architecture, vulnerability, and mitigation measure. Second, cyber security check-lists are defined in cyber security documents. It is, then, used with the consideration of mitigation measures of BBN model in order to apply architectural characteristic. Third, after assuming cyber-attack occurs to I and C system, the model calculates the posterior information using Bayesian update. Finally, the cyber security check-lists for nuclear facilities are graded upon I and C architecture with the posterior information for mitigation measures

  4. Framework for Grading of Cyber Security Check-List upon I and C Architecture

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyunyong [Kyunghee University, Yongin (Korea, Republic of); Son, Han Seong [Joongbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Cyber-attack can threaten research reactors as well as NPPs since the goal of cyber-attack is not only to make a catastrophic accident such as radiation exposure against public health but also to make chaos or anxiety among the public. Moreover, there is more probability to occur in research reactors than NPPs since research reactors has more users than NPPs. The nuclear regulatory agencies such as U.S.NRC and KINAC (Korea Institute of Nuclear Nonproliferation and Control) have published regulatory guides for rules against cyber-attack to maintain cyber security of nuclear facilities. U.S.NRC has published a regulatory guide (U.S.NRC / RG-5.71) and KINAC has developed a regulatory standard (KINAC / RS-015) to establish a cyber security for nuclear facilities. However, these regulatory documents represent check-list for cyber security regardless of reactor type such as NPPs or research reactors. The proposed framework in this paper was grading of cyber security check-lists with BBN by I and C architecture such as NPPs and research reactors. First, the BBN model was developed to apply I and C system architecture of target nuclear facility. The architecture model calculates the cyber security risk with structural architecture, vulnerability, and mitigation measure. Second, cyber security check-lists are defined in cyber security documents. It is, then, used with the consideration of mitigation measures of BBN model in order to apply architectural characteristic. Third, after assuming cyber-attack occurs to I and C system, the model calculates the posterior information using Bayesian update. Finally, the cyber security check-lists for nuclear facilities are graded upon I and C architecture with the posterior information for mitigation measures.

  5. Instruction in medical ethics during clinical training for medical students. Report on experience in radio-oncology

    International Nuclear Information System (INIS)

    Schaefer, C.; Lenk, C.; Koelbl, O.

    2006-01-01

    The article gives a review of the current state of education in medical ethics in Germany. The issue is considered from the viewpoint of radio-oncology. Both the pertinent literature and our own experience in teaching medical ethics are presented. In October 2003, medical ethics was integrated into the curriculum of medicine. The aim was to train competence in the field of personal attitudes and to intensify skills of moral reasoning. Our own experiences are positive, which is in accordance with the reports of other working groups. Most of the students were interested in education in medical ethics and looked upon ethical training as being an important part of their studies. Medical students are interested in ethical education during the clinical period of their studies, which has been taken into account since the actual change of the curriculum. Radio-oncologists as specialists in other clinical fields can offer important contributions when they discuss clinical cases from the viewpoint of medical ethics. The long-term effect of such an education will become the subject of future research. (orig.) [de

  6. Primer Control System Cyber Security Framework and Technical Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  7. Designing Fuzzy Rule Based Expert System for Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2016-01-01

    The state of cyber security has begun to attract more attention and interest outside the community of computer security experts. Cyber security is not a single problem, but rather a group of highly different problems involving different sets of threats. Fuzzy Rule based system for cyber security is a system consists of a rule depository and a mechanism for accessing and running the rules. The depository is usually constructed with a collection of related rule sets. The aim of this study is to...

  8. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Heo, Gyunyoung; Son, Han Seong

    2016-01-01

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  9. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Joongbu Univiersity, Geumsan (Korea, Republic of)

    2016-10-15

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  10. Cyber Warfare as a Form of Conflict: Evaluation of Models of Cyber Conflict as a Prototype to Conceptual Analysis

    Science.gov (United States)

    Liles, Samuel P.

    2012-01-01

    In April 2007, what has been incorrectly called the first cyber war and since then referred more correctly as a cyber riot, an attack on the domain name systems and the various servers of Estonia occurred. It was perpetrated by ethnic Russians living in Estonia who were incensed by the movement of a bronze war memorial for Russian soldiers to a…

  11. Training programs in medical physics in the United States

    International Nuclear Information System (INIS)

    Lanzl, L.H.

    1977-01-01

    The history of the field of medical physics in the United States is reviewed; the importance of the development of the nuclear reactor and particle accelerators to medical physics is pointed out. Conclusions and recommendations of an IAEA/WHO seminar on the training of medical physicists (in 1972) are given and compared with existing programs in the US. It is concluded that the recommendations of the IAEA are, for the most part, followed. 1 table

  12. Clinical skills training in undergraduate medical education using a student-centered approach

    DEFF Research Database (Denmark)

    Tolsgaard, Martin Grønnebæk

    2013-01-01

    This thesis focuses on how to engage students in self-directed learning and in peer-learning activities to improve clinical skills training in undergraduate medical education. The first study examined the clinical skills teaching provided by student teachers compared to that provided by associate...... demonstrated remarkable advantages to peer-learning in skills-lab. Thus, peer-learning activities could be essential to providing high-quality medical training in the face of limited clinical teacher resources in future undergraduate medical education.......This thesis focuses on how to engage students in self-directed learning and in peer-learning activities to improve clinical skills training in undergraduate medical education. The first study examined the clinical skills teaching provided by student teachers compared to that provided by associate....... The Reporter-Interpreter-Manager-Educator framework was used to reflect this change and construct validity was explored for RIME-based evaluations of single-patient encounters. In the third study the effects of training in pairs--also known as dyad practice--examined. This study showed that the students...

  13. Medical Waste Management Training for Healthcare Managers - a Necessity?

    Directory of Open Access Journals (Sweden)

    Aclan Ozder

    2013-07-01

    Full Text Available Background:This is an interventional study, since a training has been given, performed in order to investigate whether training has significant impact on knowledge levels of healthcare managers (head-nurses, assistant head nurses, hospital managers and deputy managers regarding bio-medical waste management.Methods:The study was conducted on 240 volunteers during June – August 2010 in 12 hospitals serving in Istanbul (private, public, university, training-research hospitals and other healthcare institutions. A survey form prepared by the project guidance team was applied to the participants through the internet before and after the training courses. The training program was composed of 40 hours of theory and 16 hours of practice sessions taught by persons known to have expertise in their fields. Methods used in the analysis of the data chi-square and t-tests in dependent groups.Results:67.5% (162 of participants were female. 42.5% (102 are working in private, and 21.7% in state-owned hospitals. 50.4% are head-nurses, and 18.3% are hospital managers.A statistically significant difference was found among those who had received medical waste management training (preliminary test and final test and others who had not (p<0.01. It was observed that information levels of all healthcare managers who had received training on waste management had risen at the completion of that training session.Conclusion:On the subject of waste management, to have trained healthcare employees who are responsible for the safe disposal of wastes in hospitals is both a necessity for the safety of patients and important for its contribution to the economy of the country.

  14. Programmatic Integration of Cyber into the Institutional Domain of Leader Development

    Science.gov (United States)

    2015-06-12

    slides address the on-line threats of phishing/ scams and data mining from social media /blogs. There was no other mention of cyber-related education or...and cyber discussion. The third lesson is taught during the Cyber II block and focuses on social media . Reference Appendix H for the learning...

  15. Structural-functional model of medical students’ professional-applied physical training

    Directory of Open Access Journals (Sweden)

    A.V. Petryshyn

    2016-10-01

    Full Text Available Purpose: to work out and experimentally prove model of professional-applied physical training of medical higher educational establishments’ students. Material: in the research 80 students participated. In questioning physical education instructors of medical higher education establishments (n=20 participated. Results: influence of students’ professionally important characteristics on general physical fitness indicators and functional state has been shown. Directions of students’ physical fitness parameters’ individual diagnostic and control over physical education effectiveness have been offered. Volumes of physical exercises in the structure of training have been found: special training (15-20% and competition exercises (20-30%. Conclusions: the need in raising the level of professionally important for students’ abilities has been noted: speed power, static power endurance, power endurance, coordination of arms’ movements, static balance.

  16. The Relationship between Cyber-Loafing and Internet Addiction

    Science.gov (United States)

    Keser, Hafize; Kavuk, Melike; Numanoglu, Gulcan

    2016-01-01

    The goal of this study was to investigate the relationship between preservice teachers' internet addiction level and cyber-loafing activities. This study was conducted as a survey study. Participants of the study was Computer Education and Instructional Technology department students (n = 139) at Ankara University. "Cyber loafing activity…

  17. A Study on the Promotion of Networking for International Training and Education in Nuclear Technology

    International Nuclear Information System (INIS)

    Min, B. J.; Lee, E. J.; Han, K. W.

    2007-04-01

    For the diversification of Korea's participation in the ANENT, the country contributed to the establishment of a new project (2007-2009) for the promotion of ANENT activities. Along the same, KAERI contributed to the development of cyber platform. Also, available course contents from IAEA were surveyed. In particular an approval course entitled as 'Energy Planning' was planned to be implemented in 2007. Finally, the ANENT web-portal including the cyber platform was operated and improved by upgrading and adding information and data. In order to promote the domestic cultivation of young scientists, Korea hosted 2007 WNU SI for the first time in Asia. KAERI staff was attached to the head quarter office of WNU to develop the curricula of WNU SI jointly. Keeping the basic structure of the original curricula, the developed curricula included Korean experience of self reliance in nuclear power technology and development of advanced technology. Methodology for the cooperation between ANENT and WNU was studied resulting in 2 ways. Primarily, it was suggested and prepared to produce cyber contents from 2007 WNU SI so that they can be up-loaded both on WNU web site and ANENT cyber platform. Secondly, cooperation in education and training activities was suggested to conduct exchange of students, joint development of cyber contents, operation of ANENT-WNU joint courses, development of reference curricula, and mutual recognition of credits and degrees. The methodology for the cooperation between ANENT and WNU will be implemented as follows: cooperation in the use of cyber contents from 2007 WNU SI will be produced during the event and they will be up-loaded both on WNU web site and ANENT cyber platform for common use; cooperation in education and training activities will be implemented by way of exchanging students, jointly developing cyber contents, operating ANENT-WNU joint courses, developing reference curricula, and realizing mutual recognition of credits and degrees

  18. A Study on the Promotion of Networking for International Training and Education in Nuclear Technology

    Energy Technology Data Exchange (ETDEWEB)

    Min, B J; Lee, E J; Han, K W [and others

    2007-04-15

    For the diversification of Korea's participation in the ANENT, the country contributed to the establishment of a new project (2007-2009) for the promotion of ANENT activities. Along the same, KAERI contributed to the development of cyber platform. Also, available course contents from IAEA were surveyed. In particular an approval course entitled as 'Energy Planning' was planned to be implemented in 2007. Finally, the ANENT web-portal including the cyber platform was operated and improved by upgrading and adding information and data. In order to promote the domestic cultivation of young scientists, Korea hosted 2007 WNU SI for the first time in Asia. KAERI staff was attached to the head quarter office of WNU to develop the curricula of WNU SI jointly. Keeping the basic structure of the original curricula, the developed curricula included Korean experience of self reliance in nuclear power technology and development of advanced technology. Methodology for the cooperation between ANENT and WNU was studied resulting in 2 ways. Primarily, it was suggested and prepared to produce cyber contents from 2007 WNU SI so that they can be up-loaded both on WNU web site and ANENT cyber platform. Secondly, cooperation in education and training activities was suggested to conduct exchange of students, joint development of cyber contents, operation of ANENT-WNU joint courses, development of reference curricula, and mutual recognition of credits and degrees. The methodology for the cooperation between ANENT and WNU will be implemented as follows: cooperation in the use of cyber contents from 2007 WNU SI will be produced during the event and they will be up-loaded both on WNU web site and ANENT cyber platform for common use; cooperation in education and training activities will be implemented by way of exchanging students, jointly developing cyber contents, operating ANENT-WNU joint courses, developing reference curricula, and realizing mutual recognition of credits and degrees.

  19. A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies

    OpenAIRE

    Reddy, G. Nikhita; Reddy, G. J. Ugander

    2014-01-01

    Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper ma...

  20. 'Am I being over-sensitive?' Women's experience of sexual harassment during medical training.

    Science.gov (United States)

    Hinze, Susan W

    2004-01-01

    Despite larger numbers of women in medicine and strong statements against gender discrimination in written policies and the medical literature, sexual harassment persists in medical training. This study examines the everyday lives of women and men resident physicians to understand the context within which harassment unfolds. The narratives explored here reveal how attention is deflected from the problem of sexual harassment through a focus on women's 'sensitivity'. Women resist by refusing to name sexual harassment as problematic, and by defining sexual harassment as 'small stuff' in the context of a rigorous training program. Ultimately, both tactics of resistance fail. Closer examination of the relations shaping everyday actions is key, as is viewing the rigid hierarchy of authority and power in medical training through a gender lens. I conclude with a discussion of how reforms in medical education must tend to the gendered, everyday realities of women and men in training.