1
|
Sheik AT, Maple C, Epiphaniou G, Dianati M. Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment. Sensors (Basel) 2023; 24:241. [PMID: 38203103 DOI: 10.3390/s24010241] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/23/2023] [Revised: 12/04/2023] [Accepted: 12/14/2023] [Indexed: 01/12/2024]
Abstract
As threat vectors and adversarial capabilities evolve, Cloud-Assisted Connected and Autonomous Vehicles (CCAVs) are becoming more vulnerable to cyberattacks. Several established threat analysis and risk assessment (TARA) methodologies are publicly available to address the evolving threat landscape. However, these methodologies inadequately capture the threat data of CCAVs, resulting in poorly defined threat boundaries or the reduced efficacy of the TARA. This is due to multiple factors, including complex hardware-software interactions, rapid technological advancements, outdated security frameworks, heterogeneous standards and protocols, and human errors in CCAV systems. To address these factors, this study begins by systematically evaluating TARA methods and applying the Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privileges (STRIDE) threat model and Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD) risk assessment to target system architectures. This study identifies vulnerabilities, quantifies risks, and methodically examines defined data processing components. In addition, this study offers an attack tree to delineate attack vectors and provides a novel defense taxonomy against identified risks. This article demonstrates the efficacy of the TARA in systematically capturing compromised security requirements, threats, limits, and associated risks with greater precision. By doing so, we further discuss the challenges in protecting hardware-software assets against multi-staged attacks due to emerging vulnerabilities. As a result, this research informs advanced threat analyses and risk management strategies for enhanced security engineering of cyberphysical CCAV systems.
Collapse
Affiliation(s)
- Al Tariq Sheik
- Warwick Manufacturing Group (WMG), University of Warwick, Coventry CV4 7AL, UK
| | - Carsten Maple
- Warwick Manufacturing Group (WMG), University of Warwick, Coventry CV4 7AL, UK
| | - Gregory Epiphaniou
- Warwick Manufacturing Group (WMG), University of Warwick, Coventry CV4 7AL, UK
| | - Mehrdad Dianati
- Warwick Manufacturing Group (WMG), University of Warwick, Coventry CV4 7AL, UK
| |
Collapse
|
2
|
Liu W, Zhao F, Shankar A, Maple C, Peter JD, Kim BG, Slowik A, Parameshachari BD, Lv J. Explainable AI for Medical Image Analysis in Medical Cyber-Physical Systems: Enhancing Transparency and Trustworthiness of IoMT. IEEE J Biomed Health Inform 2023; PP:1-12. [PMID: 38010935 DOI: 10.1109/jbhi.2023.3336721] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2023]
Abstract
Medical image analysis plays a crucial role in healthcare systems of Internet of Medical Things (IoMT), aiding in the diagnosis, treatment planning, and monitoring of various diseases. With the increasing adoption of artificial intelligence (AI) techniques in medical image analysis, there is a growing need for transparency and trustworthiness in decision-making. This study explores the application of explainable AI (XAI) in the context of medical image analysis within medical cyber-physical systems (MCPS) to enhance transparency and trustworthiness. To this end, this study proposes an explainable framework that integrates machine learning and knowledge reasoning. The explainability of the model is realized when the framework evolution target feature results and reasoning results are the same and are relatively reliable. However, using these technologies also presents new challenges, including the need to ensure the security and privacy of patient data from IoMT. Therefore, attack detection is an essential aspect of MCPS security. For the MCPS model with only sensor attacks, the necessary and sufficient conditions for detecting attacks are given based on the definition of sparse observability. The corresponding attack detector and state estimator are designed by assuming that some IoMT sensors are under protection. It is expounded that the IoMT sensors under protection play an important role in improving the efficiency of attack detection and state estimation. The experimental results show that the XAI in the context of medical image analysis within MCPS improves the accuracy of lesion classification, effectively removes low-quality medical images, and realizes the explainability of recognition results. This helps doctors understand the logic of the system's decision-making and can choose whether to trust the results based on the explanation given by the framework.
Collapse
|
3
|
Mehmood A, Epiphaniou G, Maple C, Ersotelos N, Wiseman R. A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites. Sensors (Basel) 2023; 23:8720. [PMID: 37960419 PMCID: PMC10647391 DOI: 10.3390/s23218720] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/01/2023] [Revised: 09/16/2023] [Accepted: 09/17/2023] [Indexed: 11/15/2023]
Abstract
Cyber threats and vulnerabilities present an increasing risk to the safe and frictionless execution of business operations. Bad actors ("hackers"), including state actors, are increasingly targeting the operational technologies (OTs) and industrial control systems (ICSs) used to protect critical national infrastructure (CNI). Minimisations of cyber risk, attack surfaces, data immutability, and interoperability of IoT are some of the main challenges of today's CNI. Cyber security risk assessment is one of the basic and most important activities to identify and quantify cyber security threats and vulnerabilities. This research presents a novel i-TRACE security-by-design CNI methodology that encompasses CNI key performance indicators (KPIs) and metrics to combat the growing vicarious nature of remote, well-planned, and well-executed cyber-attacks against CNI, as recently exemplified in the current Ukraine conflict (2014-present) on both sides. The proposed methodology offers a hybrid method that specifically identifies the steps required (typically undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on CNI). Furthermore, we present a novel, advanced, and resilient approach that leverages digital twins and distributed ledger technologies for our chosen i-TRACE use cases of energy management and connected sites. The key steps required to achieve the desired level of interoperability and immutability of data are identified, thereby reducing the risk of CNI-specific cyber attacks and minimising the attack vectors and surfaces. Hence, this research aims to provide an extra level of safety for CNI and OT human operatives, i.e., those tasked with and responsible for detecting, deterring, disrupting, and mitigating these cyber-attacks. Our evaluations and comparisons clearly demonstrate that i-TRACE has significant intrinsic advantages compared to existing "state-of-the-art" mechanisms.
Collapse
Affiliation(s)
- Amjad Mehmood
- Secure Cyber Systems Research Group (CSCRG), WMG, University of Warwick, Coventry CV4 7AL, UK; (A.M.); (G.E.); (C.M.)
- Institute of Computing, Kohat University of Science & Technology, Kohat 46000, Pakistan
| | - Gregory Epiphaniou
- Secure Cyber Systems Research Group (CSCRG), WMG, University of Warwick, Coventry CV4 7AL, UK; (A.M.); (G.E.); (C.M.)
| | - Carsten Maple
- Secure Cyber Systems Research Group (CSCRG), WMG, University of Warwick, Coventry CV4 7AL, UK; (A.M.); (G.E.); (C.M.)
| | - Nikolaos Ersotelos
- Department of Computer Science and Creative Technologies, University of the West of England, Bristol BS16 1QY, UK
| | - Richard Wiseman
- BT Group, 5th Floor, Orion Building, Adastral Park, Martlesham Heath, Ipswich IP5 3RE, UK;
| |
Collapse
|
4
|
Gallos P, DeLong R, Matragkas N, Blanchard A, Mraidha C, Epiphaniou G, Maple C, Katzis K, Delgado J, Llorente S, Maló P, Almeida B, Menychtas A, Panagopoulos C, Maglogiannis I, Papachristou P, Soares M, Breia P, Vidal AC, Ratz M, Williamson R, Erwee E, Stasiak L, Flores O, Clemente C, Mantas J, Weber P, Arvanitis TN, Hansen S. MedSecurance Project: Advanced Security-for-Safety Assurance for Medical Device IoT (IoMT). Stud Health Technol Inform 2023; 302:337-341. [PMID: 37203674 DOI: 10.3233/shti230130] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 05/20/2023]
Abstract
The MedSecurance project focus on identifying new challenges in cyber security with focus on hardware and software medical devices in the context of emerging healthcare architectures. In addition, the project will review best practice and identify gaps in the guidance, particularly the guidance stipulated by the medical device regulation and directives. Finally, the project will develop comprehensive methodology and tooling for the engineering of trustworthy networks of inter-operating medical devices, that shall have security-for-safety by design, with a strategy for device certification and certifiable dynamic network composition, ensuring that patient safety is safeguarded from malicious cyber actors and technology "accidents".
Collapse
Affiliation(s)
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Mariana Soares
- Centro Garcia de Orta, Hospital Garcia de Orta, Portugal
| | - Paula Breia
- Centro Garcia de Orta, Hospital Garcia de Orta, Portugal
| | | | | | | | | | | | | | | | - John Mantas
- European Federation of Medical Informatics, Switzerland
| | - Patrick Weber
- European Federation of Medical Informatics, Switzerland
| | | | | |
Collapse
|
5
|
Skatova A, McDonald R, Ma S, Maple C. Unpacking privacy: Valuation of personal data protection. PLoS One 2023; 18:e0284581. [PMID: 37134067 PMCID: PMC10156004 DOI: 10.1371/journal.pone.0284581] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/14/2022] [Accepted: 04/03/2023] [Indexed: 05/04/2023] Open
Abstract
Information about individual behaviour is collected regularly by organisations. This information has value to businesses, the government and third parties. It is not clear what value this personal data has to consumers themselves. Much of the modern economy is predicated on people sharing personal data, however if individuals value their privacy, they may choose to withhold this data unless the perceived benefits of sharing outweigh the perceived value of keeping the data private. One technique to assess how much individuals value their privacy is to ask them whether they might be willing to pay for an otherwise free service if paying allowed them to avoid sharing personal data. Our research extends previous work on factors affecting individuals' decisions about whether to share personal data. We take an experimental approach and focus on whether consumers place a positive value on protecting their data by examining their willingness to share personal data in a variety of data sharing environments. Using five evaluation techniques, we systematically investigate whether members of the public value keeping their personal data private. We show that the extent to which participants value protecting their information differs by data type, suggesting there is no simple function to assign a value for individual privacy. The majority of participants displayed remarkable consistency in their rankings of the importance of different types of data through a variety of elicitation procedures, a finding consistent with the existence of stable individual privacy preferences in protecting personal data. We discuss our findings in the context of research on the value of privacy and privacy preferences.
Collapse
Affiliation(s)
- Anya Skatova
- Bristol Medical School/School of Psychological Science, University of Bristol, Bristol, United Kingdom
- Warwick Business School, University of Warwick, Coventry, United Kingdom
- Warwick Manufacturing Group, University of Warwick, Coventry, United Kingdom
- Alan Turing Institute, London, United Kingdom
| | - Rebecca McDonald
- Warwick Business School, University of Warwick, Coventry, United Kingdom
- School of Economics, University of Birmingham, Birmingham, United Kingdom
| | - Sinong Ma
- Warwick Manufacturing Group, University of Warwick, Coventry, United Kingdom
- Queen's Management School, Queen's University Belfast, Belfast, United Kingdom
| | - Carsten Maple
- Warwick Manufacturing Group, University of Warwick, Coventry, United Kingdom
- Alan Turing Institute, London, United Kingdom
| |
Collapse
|
6
|
Alamri H, Maple C, Mohamad S, Epiphaniou G. Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store. Sensors (Basel) 2022; 22:8964. [PMID: 36433560 PMCID: PMC9698788 DOI: 10.3390/s22228964] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/30/2022] [Revised: 11/11/2022] [Accepted: 11/12/2022] [Indexed: 06/16/2023]
Abstract
Mobile app developers are often obliged by regulatory frameworks to provide a privacy policy in natural comprehensible language to describe their apps' privacy practices. However, prior research has revealed that: (1) not all app developers offer links to their privacy policies; and (2) even if they do offer such access, it is difficult to determine if it is a valid link to a (valid) policy. While many prior studies looked at this issue in Google Play Store, Apple App Store, and particularly the iOS store, is much less clear. In this paper, we conduct the first and the largest study to investigate the previous issues in the iOS app store ecosystem. First, we introduce an App Privacy Policy Extractor (APPE), a system that embraces and analyses the metadata of over two million apps to give insightful information about the distribution of the supposed privacy policies, and the content of the provided privacy policy links, store-wide. The result shows that only 58.5% of apps provide links to purported privacy policies, while 39.3% do not provide policy links at all. Our investigation of the provided links shows that only 38.4% of those links were directed to actual privacy policies, while 61.6% failed to lead to a privacy policy. Further, for research purposes we introduce the App Privacy Policy Corpus (APPC-451K); the largest app privacy policy corpus consisting of data relating to more than 451K verified privacy policies.
Collapse
Affiliation(s)
- Hamad Alamri
- Warwick Manufacturing Group, The University of Warwick, Gibbet Hill Road, Coventry CV4 7AL, UK
| | - Carsten Maple
- Warwick Manufacturing Group, The University of Warwick, Gibbet Hill Road, Coventry CV4 7AL, UK
| | - Saad Mohamad
- School of Cellular & Molecular Medicine, University of Bristol, Bristol BS8 1TD, UK
| | - Gregory Epiphaniou
- Warwick Manufacturing Group, The University of Warwick, Gibbet Hill Road, Coventry CV4 7AL, UK
| |
Collapse
|
7
|
Amanat A, Rizwan M, Maple C, Zikria YB, Almadhor AS, Kim SW. Blockchain and cloud computing-based secure electronic healthcare records storage and sharing. Front Public Health 2022; 10:938707. [PMID: 35928494 PMCID: PMC9343689 DOI: 10.3389/fpubh.2022.938707] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/07/2022] [Accepted: 06/28/2022] [Indexed: 11/13/2022] Open
Abstract
Healthcare information is essential for both service providers and patients. Further secure sharing and maintenance of Electronic Healthcare Records (EHR) are imperative. EHR systems in healthcare have traditionally relied on a centralized system (e.g., cloud) to exchange health data across healthcare stakeholders, which may expose private and sensitive patient information. EHR has struggled to meet the demands of several stakeholders and systems in terms of safety, isolation, and other regulatory constraints. Blockchain is a distributed, decentralized ledger technology that can provide secured, validated, and immutable data sharing facilities. Blockchain creates a distributed ledger system using techniques of cryptography (hashes) that are consistent and permit actions to be carried out in a distributed manner without needing a centralized authority. Data exploitation is difficult and evident in a blockchain network due to its immutability. We propose an architecture based on blockchain technology that authenticates the user identity using a Proof of Stake (POS) cryptography consensus mechanism and Secure Hash Algorithm (SHA256) to secure EHR sharing among different electronic healthcare systems. An Elliptic Curve Digital Signature Algorithm (ECDSA) is used to verify EHR sensors to assemble and transmit data to cloud infrastructure. Results indicate that the proposed solution performs exceptionally well when compared with existing solutions, which include Proof-Of-Work (POW), Secure Hash Algorithm (SHA-1), and Message Digest (MD5) in terms of power consumption, authenticity, and security of healthcare records.
Collapse
Affiliation(s)
- Amna Amanat
- Department of Computer Science, Kinnaird College for Women, Lahore, Pakistan
| | - Muhammad Rizwan
- Department of Computer Science, Kinnaird College for Women, Lahore, Pakistan
- Secure Cyber Systems Research Group, WMG, University of Warwick, Coventry, United Kingdom
| | - Carsten Maple
- Secure Cyber Systems Research Group, WMG, University of Warwick, Coventry, United Kingdom
| | - Yousaf Bin Zikria
- Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, South Korea
- *Correspondence: Yousaf Bin Zikria
| | - Ahmad S. Almadhor
- College of Computer and Information Sciences, Jouf University, Sakakah, Saudi Arabia
| | - Sung Won Kim
- Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, South Korea
- Sung Won Kim
| |
Collapse
|
8
|
Radanliev P, De Roure D, Maple C, Ani U. Super-forecasting the 'technological singularity' risks from artificial intelligence. Evol Syst (Berl) 2022; 13:747-757. [PMID: 37521026 PMCID: PMC9166151 DOI: 10.1007/s12530-022-09431-7] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/18/2021] [Accepted: 02/20/2022] [Indexed: 11/30/2022]
Abstract
This article investigates cybersecurity (and risk) in the context of 'technological singularity' from artificial intelligence. The investigation constructs multiple risk forecasts that are synthesised in a new framework for counteracting risks from artificial intelligence (AI) itself. In other words, the research in this article is not just concerned with securing a system, but also analysing how the system responds when (internal and external) failure(s) and compromise(s) occur. This is an important methodological principle because not all systems can be secured, and totally securing a system is not feasible. Thus, we need to construct algorithms that will enable systems to continue operating even when parts of the system have been compromised. Furthermore, the article forecasts emerging cyber-risks from the integration of AI in cybersecurity. Based on the forecasts, the article is concentrated on creating synergies between the existing literature, the data sources identified in the survey, and forecasts. The forecasts are used to increase the feasibility of the overall research and enable the development of novel methodologies that uses AI to defend from cyber risks. The methodology is focused on addressing the risk of AI attacks, as well as to forecast the value of AI in defence and in the prevention of AI rogue devices acting independently. Supplementary Information The online version contains supplementary material available at 10.1007/s12530-022-09431-7.
Collapse
Affiliation(s)
- Petar Radanliev
- Oxford e-Research Centre, Department of Engineering Sciences, University of Oxford, Oxford, UK
| | - David De Roure
- Oxford e-Research Centre, Department of Engineering Sciences, University of Oxford, Oxford, UK
| | - Carsten Maple
- WMG Cyber Security Centre, University of Warwick, Coventry, UK
| | - Uchenna Ani
- School of Computing and Mathematics, Keele University, Stoke-on-Trent, UK
| |
Collapse
|
9
|
Shaukat A, Anjum A, Malik SUR, Shah MA, Maple C. A Novel Privacy Paradigm for Improving Serial Data Privacy. Sensors (Basel) 2022; 22:s22072811. [PMID: 35408425 PMCID: PMC9002876 DOI: 10.3390/s22072811] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/08/2022] [Revised: 03/03/2022] [Accepted: 03/10/2022] [Indexed: 11/25/2022]
Abstract
Protecting the privacy of individuals is of utmost concern in today’s society, as inscribed and governed by the prevailing privacy laws, such as GDPR. In serial data, bits of data are continuously released, but their combined effect may result in a privacy breach in the whole serial publication. Protecting serial data is crucial for preserving them from adversaries. Previous approaches provide privacy for relational data and serial data, but many loopholes exist when dealing with multiple sensitive values. We address these problems by introducing a novel privacy approach that limits the risk of privacy disclosure in republication and gives better privacy with much lower perturbation rates. Existing techniques provide a strong privacy guarantee against attacks on data privacy; however, in serial publication, the chances of attack still exist due to the continuous addition and deletion of data. In serial data, proper countermeasures for tackling attacks such as correlation attacks have not been taken, due to which serial publication is still at risk. Moreover, protecting privacy is a significant task due to the critical absence of sensitive values while dealing with multiple sensitive values. Due to this critical absence, signatures change in every release, which is a reason for attacks. In this paper, we introduce a novel approach in order to counter the composition attack and the transitive composition attack and we prove that the proposed approach is better than the existing state-of-the-art techniques. Our paper establishes the result with a systematic examination of the republication dilemma. Finally, we evaluate our work using benchmark datasets, and the results show the efficacy of the proposed technique.
Collapse
Affiliation(s)
- Ayesha Shaukat
- Department of Computer Science, COMSATS University Islamabad, Islamabad 45550, Pakistan; (A.S.); (M.A.S.)
| | - Adeel Anjum
- Institute of Information Technology, Quaid-e-Azam University Islamabad, Islamabad 15320, Pakistan;
| | | | - Munam Ali Shah
- Department of Computer Science, COMSATS University Islamabad, Islamabad 45550, Pakistan; (A.S.); (M.A.S.)
| | - Carsten Maple
- Warwick Manufacturing Group (WMG), University of Warwick, Coventry CV4 7AL, UK
- Correspondence:
| |
Collapse
|
10
|
Shah PM, Ullah F, Shah D, Gani A, Maple C, Wang Y, Abrar M, Islam SU. Deep GRU-CNN Model for COVID-19 Detection From Chest X-Rays Data. IEEE Access 2022; 10:35094-35105. [PMID: 35582498 PMCID: PMC9088790 DOI: 10.1109/access.2021.3077592] [Citation(s) in RCA: 16] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/04/2021] [Accepted: 04/20/2021] [Indexed: 05/03/2023]
Abstract
In the current era, data is growing exponentially due to advancements in smart devices. Data scientists apply a variety of learning-based techniques to identify underlying patterns in the medical data to address various health-related issues. In this context, automated disease detection has now become a central concern in medical science. Such approaches can reduce the mortality rate through accurate and timely diagnosis. COVID-19 is a modern virus that has spread all over the world and is affecting millions of people. Many countries are facing a shortage of testing kits, vaccines, and other resources due to significant and rapid growth in cases. In order to accelerate the testing process, scientists around the world have sought to create novel methods for the detection of the virus. In this paper, we propose a hybrid deep learning model based on a convolutional neural network (CNN) and gated recurrent unit (GRU) to detect the viral disease from chest X-rays (CXRs). In the proposed model, a CNN is used to extract features, and a GRU is used as a classifier. The model has been trained on 424 CXR images with 3 classes (COVID-19, Pneumonia, and Normal). The proposed model achieves encouraging results of 0.96, 0.96, and 0.95 in terms of precision, recall, and f1-score, respectively. These findings indicate how deep learning can significantly contribute to the early detection of COVID-19 in patients through the analysis of X-ray scans. Such indications can pave the way to mitigate the impact of the disease. We believe that this model can be an effective tool for medical practitioners for early diagnosis.
Collapse
Affiliation(s)
- Pir Masoom Shah
- Department of Computer ScienceBacha Khan University Charsadda 24000 Pakistan
- School of Computer ScienceWuhan University Wuhan 430072 China
| | - Faizan Ullah
- Department of Computer ScienceBacha Khan University Charsadda 24000 Pakistan
| | - Dilawar Shah
- Department of Computer ScienceBacha Khan University Charsadda 24000 Pakistan
| | - Abdullah Gani
- Faculty of Computer Science and Information TechnologyUniversity of Malaya Kuala Lumpur 50603 Malaysia
- Faculty of Computing and InformaticsUniversity Malaysia Sabah Labuan 88400 Malaysia
| | - Carsten Maple
- Secure Cyber Systems Research Group, WMGUniversity of Warwick Coventry CV4 7AL U.K
- Alan Turing Institute London NW1 2DB U.K
| | - Yulin Wang
- School of Computer ScienceWuhan University Wuhan 430072 China
| | - Mohammad Abrar
- Department of Computer ScienceMohi-ud-Din Islamic University Nerian Sharif 12080 Pakistan
| | - Saif Ul Islam
- Department of Computer ScienceInstitute of Space Technology Islamabad 44000 Pakistan
| |
Collapse
|
11
|
Shah PM, Ullah F, Shah D, Gani A, Maple C, Wang Y, Abrar M, Islam SU. Deep GRU-CNN Model for COVID-19 Detection From Chest X-Rays Data. IEEE Access 2022; 10:35094-35105. [PMID: 35582498 DOI: 10.1109/access.2021.3089454] [Citation(s) in RCA: 8] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/04/2021] [Accepted: 04/20/2021] [Indexed: 05/20/2023]
Abstract
In the current era, data is growing exponentially due to advancements in smart devices. Data scientists apply a variety of learning-based techniques to identify underlying patterns in the medical data to address various health-related issues. In this context, automated disease detection has now become a central concern in medical science. Such approaches can reduce the mortality rate through accurate and timely diagnosis. COVID-19 is a modern virus that has spread all over the world and is affecting millions of people. Many countries are facing a shortage of testing kits, vaccines, and other resources due to significant and rapid growth in cases. In order to accelerate the testing process, scientists around the world have sought to create novel methods for the detection of the virus. In this paper, we propose a hybrid deep learning model based on a convolutional neural network (CNN) and gated recurrent unit (GRU) to detect the viral disease from chest X-rays (CXRs). In the proposed model, a CNN is used to extract features, and a GRU is used as a classifier. The model has been trained on 424 CXR images with 3 classes (COVID-19, Pneumonia, and Normal). The proposed model achieves encouraging results of 0.96, 0.96, and 0.95 in terms of precision, recall, and f1-score, respectively. These findings indicate how deep learning can significantly contribute to the early detection of COVID-19 in patients through the analysis of X-ray scans. Such indications can pave the way to mitigate the impact of the disease. We believe that this model can be an effective tool for medical practitioners for early diagnosis.
Collapse
Affiliation(s)
- Pir Masoom Shah
- Department of Computer ScienceBacha Khan University Charsadda 24000 Pakistan
- School of Computer ScienceWuhan University Wuhan 430072 China
| | - Faizan Ullah
- Department of Computer ScienceBacha Khan University Charsadda 24000 Pakistan
| | - Dilawar Shah
- Department of Computer ScienceBacha Khan University Charsadda 24000 Pakistan
| | - Abdullah Gani
- Faculty of Computer Science and Information TechnologyUniversity of Malaya Kuala Lumpur 50603 Malaysia
- Faculty of Computing and InformaticsUniversity Malaysia Sabah Labuan 88400 Malaysia
| | - Carsten Maple
- Secure Cyber Systems Research Group, WMGUniversity of Warwick Coventry CV4 7AL U.K
- Alan Turing Institute London NW1 2DB U.K
| | - Yulin Wang
- School of Computer ScienceWuhan University Wuhan 430072 China
| | - Mohammad Abrar
- Department of Computer ScienceMohi-ud-Din Islamic University Nerian Sharif 12080 Pakistan
| | - Saif Ul Islam
- Department of Computer ScienceInstitute of Space Technology Islamabad 44000 Pakistan
| |
Collapse
|
12
|
Radanliev P, De Roure D, Maple C, Ani U. Methodology for integrating artificial intelligence in healthcare systems: learning from COVID-19 to prepare for Disease X. AI Ethics 2021; 2:623-630. [PMID: 34790960 PMCID: PMC8525053 DOI: 10.1007/s43681-021-00111-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/06/2021] [Accepted: 10/06/2021] [Indexed: 06/13/2023]
Abstract
Artificial intelligence and edge devices have been used at an increased rate in managing the COVID-19 pandemic. In this article we review the lessons learned from COVID-19 to postulate possible solutions for a Disease X event. The overall purpose of the study and the research problems investigated is the integration of artificial intelligence function in digital healthcare systems. The basic design of the study includes a systematic state-of-the-art review, followed by an evaluation of different approaches to managing global pandemics. The study design then engages with constructing a new methodology for integrating algorithms in healthcare systems, followed by analysis of the new methodology and a discussion. Action research is applied to review existing state of the art, and a qualitative case study method is used to analyse the knowledge acquired from the COVID-19 pandemic. Major trends found as a result of the study derive from the synthesis of COVID-19 knowledge, presenting new insights in the form of a conceptual methodology-that includes six phases for managing a future Disease X event, resulting with a summary map of various problems, solutions and expected results from integrating functional AI in healthcare systems.
Collapse
Affiliation(s)
- Petar Radanliev
- Department of Engineering Sciences, Oxford e-Research Centre, University of Oxford, Oxford, UK
| | - David De Roure
- Department of Engineering Sciences, Oxford e-Research Centre, University of Oxford, Oxford, UK
| | - Carsten Maple
- WMG Cyber Security Centre, University of Warwick, Coventry, UK
| | - Uchenna Ani
- STEaPP, Faculty of Engineering Science, University College London, London, UK
| |
Collapse
|
13
|
Zafar F, Khan A, Malik SUR, Ahmed M, Maple C, Anjum A. MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. Sensors (Basel) 2021; 21:s21155096. [PMID: 34372333 PMCID: PMC8348899 DOI: 10.3390/s21155096] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/06/2021] [Revised: 07/20/2021] [Accepted: 07/22/2021] [Indexed: 11/18/2022]
Abstract
Smart devices have accentuated the importance of geolocation information. Geolocation identification using smart devices has paved the path for incentive-based location-based services (LBS). However, a user’s full control over a smart device can allow tampering of the location proof. Witness-oriented location proof systems (LPS) have emerged to resist the generation of false proofs and mitigate collusion attacks. However, witness-oriented LPS are still susceptible to three-way collusion attacks (involving the user, location authority, and the witness). To overcome the threat of three-way collusion in existing schemes, we introduce a decentralized consensus protocol called MobChain in this paper. In this scheme the selection of a witness and location authority is achieved through a distributed consensus of nodes in an underlying P2P network that establishes a private blockchain. The persistent provenance data over the blockchain provides strong security guarantees; as a result, the forging and manipulation of location becomes impractical. MobChain provides secure location provenance architecture, relying on decentralized decision making for the selection of participants of the protocol thereby addressing the three-way collusion problem. Our prototype implementation and comparison with the state-of-the-art solutions show that MobChain is computationally efficient and highly available while improving the security of LPS.
Collapse
Affiliation(s)
- Faheem Zafar
- Department of Computer Science, COMSATS University Islamabad (CUI), Islamabad 42000, Pakistan; (F.Z.); (M.A.); (A.A.)
| | - Abid Khan
- Department of Computer Science, Aberystwyth University, Aberystwyth SY23 3DB, UK;
| | | | - Mansoor Ahmed
- Department of Computer Science, COMSATS University Islamabad (CUI), Islamabad 42000, Pakistan; (F.Z.); (M.A.); (A.A.)
| | - Carsten Maple
- Secure Cyber Systems Research Group, WMG, University of Warwick, Coventry CV4 7AL, UK
- Correspondence:
| | - Adeel Anjum
- Department of Computer Science, COMSATS University Islamabad (CUI), Islamabad 42000, Pakistan; (F.Z.); (M.A.); (A.A.)
| |
Collapse
|
14
|
Falco G, Shneiderman B, Badger J, Carrier R, Dahbura A, Danks D, Eling M, Goodloe A, Gupta J, Hart C, Jirotka M, Johnson H, LaPointe C, Llorens AJ, Mackworth AK, Maple C, Pálsson SE, Pasquale F, Winfield A, Yeong ZK. Governing AI safety through independent audits. NAT MACH INTELL 2021. [DOI: 10.1038/s42256-021-00370-7] [Citation(s) in RCA: 18] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/08/2023]
|
15
|
Lallie HS, Shepherd LA, Nurse JR, Erola A, Epiphaniou G, Maple C, Bellekens X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput Secur 2021; 105:102248. [DOI: 10.1016/j.cose.2021.102248] [Citation(s) in RCA: 45] [Impact Index Per Article: 15.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/28/2020] [Revised: 11/21/2020] [Accepted: 02/22/2021] [Indexed: 10/22/2022]
|
16
|
Ullah I, Shah MA, Khan A, Maple C, Waheed A. Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs. Sensors (Basel) 2021; 21:s21093077. [PMID: 33925131 PMCID: PMC8124586 DOI: 10.3390/s21093077] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/21/2021] [Revised: 04/01/2021] [Accepted: 04/02/2021] [Indexed: 11/29/2022]
Abstract
Location privacy is a critical problem in the vehicular communication networks. Vehicles broadcast their road status information to other entities in the network through beacon messages. The beacon message content consists of the vehicle ID, speed, direction, position, and other information. An adversary could use vehicle identity and positioning information to determine vehicle driver behavior and identity at different visited location spots. A pseudonym can be used instead of the vehicle ID to help in the vehicle location privacy. These pseudonyms should be changed in appropriate way to produce uncertainty for any adversary attempting to identify a vehicle at different locations. In the existing research literature, pseudonyms are changed during silent mode between neighbors. However, the use of a short silent period and the visibility of pseudonyms of direct neighbors provides a mechanism for an adversary to determine the identity of a target vehicle at specific locations. Moreover, privacy is provided to the driver, only within the RSU range; outside it, there is no privacy protection. In this research, we address the problem of location privacy in a highway scenario, where vehicles are traveling at high speeds with diverse traffic density. We propose a Dynamic Grouping and Virtual Pseudonym-Changing (DGVP) scheme for vehicle location privacy. Dynamic groups are formed based on similar status vehicles and cooperatively change pseudonyms. In the case of low traffic density, we use a virtual pseudonym update process. We formally present the model and specify the scheme through High-Level Petri Nets (HLPN). The simulation results indicate that the proposed method improves the anonymity set size and entropy, provides lower traceability, reduces impact on vehicular network applications, and has lower computation cost compared to existing research work.
Collapse
Affiliation(s)
- Ikram Ullah
- Department of Computer Science, COMSATS University Islamabad, Islamabad 45550, Pakistan; (M.A.S.); (A.W.)
- Correspondence:
| | - Munam Ali Shah
- Department of Computer Science, COMSATS University Islamabad, Islamabad 45550, Pakistan; (M.A.S.); (A.W.)
| | - Abid Khan
- Department of Computer Science, Aberystwyth University, Aberystwyth SY23 3DB, UK;
| | - Carsten Maple
- Secure Cyber Systems Research Group, WMG, University of Warwick, Coventry CV4 7AL, UK;
| | - Abdul Waheed
- Department of Computer Science, COMSATS University Islamabad, Islamabad 45550, Pakistan; (M.A.S.); (A.W.)
| |
Collapse
|
17
|
Waheed A, Shah MA, Khan A, Maple C, Ullah I. Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs. Sensors (Basel) 2021; 21:s21082718. [PMID: 33921519 PMCID: PMC8070497 DOI: 10.3390/s21082718] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/20/2021] [Revised: 03/27/2021] [Accepted: 03/28/2021] [Indexed: 11/16/2022]
Abstract
Computation offloading is a process that provides computing services to vehicles with computation sensitive jobs. Volunteer Computing-Based Vehicular Ad-hoc Networking (VCBV) is envisioned as a promising solution to perform task executions in vehicular networks using an emerging concept known as vehicle-as-a-resource (VaaR). In VCBV systems, offloading is the primary technique used for the execution of delay-sensitive applications which rely on surplus resource utilization. To leverage the surplus resources arising in periods of traffic congestion, we propose a hybrid VCBV task coordination model which performs the resource utilization for task execution in a multi-hop fashion. We propose an algorithm for the determination of boundary relay vehicles to minimize the requirement of placement for multiple road-side units (RSUs). We propose algorithms for primary and secondary task coordination using hybrid VCBV. Extensive simulations show that the hybrid technique for task coordination can increase the system utility, while the latency constraints are addressed.
Collapse
Affiliation(s)
- Abdul Waheed
- Department of Computer Science, COMSATS University Islamabad, Park Road Tarlai Kalan, Islamabad 45550, Pakistan; (M.A.S.); (I.U.)
- Correspondence:
| | - Munam Ali Shah
- Department of Computer Science, COMSATS University Islamabad, Park Road Tarlai Kalan, Islamabad 45550, Pakistan; (M.A.S.); (I.U.)
| | - Abid Khan
- Department of Computer Science, Aberystwyth University, Ceredigion SY23 3DB, UK;
| | - Carsten Maple
- Secure Cyber Systems Research Group, WMG, University of Warwick, Coventry CV4 7AL, UK;
| | - Ikram Ullah
- Department of Computer Science, COMSATS University Islamabad, Park Road Tarlai Kalan, Islamabad 45550, Pakistan; (M.A.S.); (I.U.)
| |
Collapse
|
18
|
Cannizzaro S, Procter R, Ma S, Maple C. Trust in the smart home: Findings from a nationally representative survey in the UK. PLoS One 2020; 15:e0231615. [PMID: 32469883 PMCID: PMC7259745 DOI: 10.1371/journal.pone.0231615] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/25/2019] [Accepted: 03/29/2020] [Indexed: 11/25/2022] Open
Abstract
Businesses in the smart home sector are actively promoting the benefits of smart home technologies for consumers, such as convenience, economy and home security. To better understand meanings of and trust in the smart home, we carried out a nationally representative survey of UK consumers designed to measure adoption and acceptability, focusing on awareness, ownership, experience, trust, satisfaction and intention to use. We analysed the results using theories of meanings and acceptability of technologies including semiotics, social construction of technology (SCOT) and sociotechnical affordance. Our findings suggest that the meaning and value proposition of the smart home have not yet achieved closure for consumers, but is already foregrounding risks to privacy and security amongst the other meaning-making possibilities it could afford. Anxiety about the likelihood of a security incident emerges as a prominent factor influencing adoption of smart home technology. This factor negatively impacts adoption. These findings underline how businesses and policymakers will need to work together to act on the sociotechnical affordances of smart home technology in order to increase consumers’ trust. This intervention is necessary if barriers to adoption and acceptability of the smart home are to be addressed now and in the future.
Collapse
Affiliation(s)
- Sara Cannizzaro
- Warwick Manufacturing Group, University of Warwick, Coventry, England, United Kingdom
- Computer Science, University of Warwick, Coventry, England, United Kingdom
- * E-mail:
| | - Rob Procter
- Computer Science, University of Warwick, Coventry, England, United Kingdom
| | - Sinong Ma
- Queen's Management School, Queen’s University Belfast, Belfast, Northern Ireland, United Kingdom
| | - Carsten Maple
- Warwick Manufacturing Group, University of Warwick, Coventry, England, United Kingdom
| |
Collapse
|
19
|
Radanliev P, De Roure DC, Nurse JRC, Mantilla Montalvo R, Cannady S, Santos O, Maddox L, Burnap P, Maple C. Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Appl Sci 2020. [DOI: 10.1007/s42452-019-1931-0] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/06/2023] Open
Abstract
AbstractIn this research article, we explore the use of a design process for adapting existing cyber risk assessment standards to allow the calculation of economic impact from IoT cyber risk. The paper presents a new model that includes a design process with new risk assessment vectors, specific for IoT cyber risk. To design new risk assessment vectors for IoT, the study applied a range of methodologies, including literature review, empirical study and comparative study, followed by theoretical analysis and grounded theory. An epistemological framework emerges from applying the constructivist grounded theory methodology to draw on knowledge from existing cyber risk frameworks, models and methodologies. This framework presents the current gaps in cyber risk standards and policies, and defines the design principles of future cyber risk impact assessment. The core contribution of the article therefore, being the presentation of a new model for impact assessment of IoT cyber risk.
Collapse
|
20
|
Bhatti F, Shah MA, Maple C, Islam SU. A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments. Sensors (Basel) 2019; 19:s19092071. [PMID: 31058879 PMCID: PMC6540187 DOI: 10.3390/s19092071] [Citation(s) in RCA: 74] [Impact Index Per Article: 14.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/30/2019] [Revised: 04/01/2019] [Accepted: 04/01/2019] [Indexed: 11/29/2022]
Abstract
Internet of Things-enabled Intelligent Transportation Systems (ITS) are gaining significant attention in academic literature and industry, and are seen as a solution to enhancing road safety in smart cities. Due to the ever increasing number of vehicles, a significant rise in the number of road accidents has been observed. Vehicles embedded with a plethora of sensors enable us to not only monitor the current situation of the vehicle and its surroundings but also facilitates the detection of incidents. Significant research, for example, has been conducted on accident rescue, particularly on the use of Information and Communication Technologies (ICT) for efficient and prompt rescue operations. The majority of such works provide sophisticated solutions that focus on reducing response times. However, such solutions can be expensive and are not available in all types of vehicles. Given this, we present a novel Internet of Things-based accident detection and reporting system for a smart city environment. The proposed approach aims to take advantage of advanced specifications of smartphones to design and develop a low-cost solution for enhanced transportation systems that is deployable in legacy vehicles. In this context, a customized Android application is developed to gather information regarding speed, gravitational force, pressure, sound, and location. The speed is a factor that is used to help improve the identification of accidents. It arises because of clear differences in environmental conditions (e.g., noise, deceleration rate) that arise in low speed collisions, versus higher speed collisions). The information acquired is further processed to detect road incidents. Furthermore, a navigation system is also developed to report the incident to the nearest hospital. The proposed approach is validated through simulations and comparison with a real data set of road accidents acquired from Road Safety Open Repository, and shows promising results in terms of accuracy.
Collapse
Affiliation(s)
- Fizzah Bhatti
- Department of Computer Science, COMSATS University Islamabad, Park Road Tarlai Kalan, Islamabad 44550, Pakistan.
| | - Munam Ali Shah
- Department of Computer Science, COMSATS University Islamabad, Park Road Tarlai Kalan, Islamabad 44550, Pakistan.
| | | | - Saif Ul Islam
- Department of Computer Science, Dr. A. Q. Khan Institute of Computer Science and Information Technology, Rawalpindi 47320, Pakistan.
| |
Collapse
|
21
|
Zubiaga A, Procter R, Maple C. A longitudinal analysis of the public perception of the opportunities and challenges of the Internet of Things. PLoS One 2018; 13:e0209472. [PMID: 30571721 PMCID: PMC6301677 DOI: 10.1371/journal.pone.0209472] [Citation(s) in RCA: 17] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/12/2017] [Accepted: 12/06/2018] [Indexed: 11/26/2022] Open
Abstract
The Internet of Things (or IoT), which enables the networked interconnection of everyday objects, is becoming increasingly popular in many aspects of our lives ranging from entertainment to health care. While the IoT brings a set of invaluable advantages and opportunities with it, there is also evidence of numerous challenges that are yet to be resolved. This is certainly the case with regard to ensuring the cyber security of the IoT, and there are various examples of devices being hacked. Despite this evidence, little is known about the public perceptions of the opportunities and challenges presented by the IoT. To advance research in this direction, we mined the social media platform Twitter to learn about public opinion about the IoT. Analysing a longitudinal dataset of more than 6.7 million tweets, we reveal insights into public perceptions of the IoT, identifying big data analytics as the most positive aspect, whereas security issues are the main public concern on the negative side. Our study serves to highlight the importance of keeping IoT devices secure, and remind manufacturers that it is a concern that remains unresolved, at least insofar as the public believes.
Collapse
Affiliation(s)
| | - Rob Procter
- University of Warwick, Coventry, United Kingdom
- Alan Turing Institute, London, United Kingdom
| | - Carsten Maple
- University of Warwick, Coventry, United Kingdom
- Alan Turing Institute, London, United Kingdom
| |
Collapse
|
22
|
Safa NS, Maple C, Watson T, Von Solms R. Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications 2018. [DOI: 10.1016/j.jisa.2017.11.001] [Citation(s) in RCA: 35] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
23
|
|
24
|
|
25
|
|
26
|
Maple C, Prakash E, Huang W, Qureshi AN. Taxonomy of optimisation techniques and applications. IJCAT 2014. [DOI: 10.1504/ijcat.2014.062361] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
27
|
Short E, Linford S, Wheatcroft JM, Maple C. The impact of cyberstalking: the lived experience - a thematic analysis. Stud Health Technol Inform 2014; 199:133-137. [PMID: 24875706] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
Abstract
Cyberstalking (CS) can have major psychosocial impacts on individuals. Victims report a number of serious consequences of victimization such as increased suicidal ideation, fear, anger, depression, and post traumatic stress disorder (PTSD) symptomology. Research is largely limited to quantitative outcome research. This study examines the diversity of experiences reported by people who define themselves as having been cyberstalked. Thematic analysis was used to explore 100 CS victim narratives, gathered by means of an online survey questionnaire designed to capture structured text responses. Five emergent themes were evident in the data: control and intimidation; determined offender; development of harassment; negative consequences; and lack of support. Findings identify similarities and differences to traditional stalking, along with the necessity of support for victims and illustration of the negative impacts this form of harassment produces.
Collapse
Affiliation(s)
- Emma Short
- National Centre for Cyberstalking Research, University of Bedfordshire
| | - Sarah Linford
- Department of Psychological Sciences, Witness Research Group, University of Liverpool
| | | | - Carsten Maple
- National Centre for Cyberstalking Research, University of Bedfordshire
| |
Collapse
|
28
|
|
29
|
Abstract
The growth in the use of interconnected devices in the UK is well-documented. Society has embraced new technology allowing access to information, systems, and people; children are being described as digital natives and social networking, internet telephony, and accessing digital entertainment are a major part of their lives. However, whilst the ubiquitous nature of modern communication systems has brought many benefits, there exist a minority that uses the technology to harass others. This paper considers the phenomenon of Cyberstalking and presents an analysis of the problem and the responses provided on the first survey that addresses issue specifically. The paper discusses the nature of attacks, the victim-attacker relationship, the impact of the attacks and the actions taken to resolve the issue. The paper also considers both the legal and technological aspects and presents recommendations to help reduce the occurrence of Cyberstalking.
Collapse
Affiliation(s)
- Carsten Maple
- National Centre for Cyberstalking Research, University of Bedfordshire, Bedfordshire, UK
| | - Emma Short
- National Centre for Cyberstalking Research, University of Bedfordshire, Bedfordshire, UK
| | - Antony Brown
- National Centre for Cyberstalking Research, University of Bedfordshire, Bedfordshire, UK
| | | | | |
Collapse
|
30
|
Jordan A, Maple C, Szczebiot R. Optimal Placement of the Wind Generators in the Medium Voltage Power Grid. International Journal of Distributed Systems and Technologies 2012. [DOI: 10.4018/jdst.2012040106] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
The minimization of power losses in the medium voltage (MV) grid requires adjustment of network of power sources. This problem is particularly important for renewable energy sources, for example for the farms of wind generators. Their placement and nominal power should be selected according to the configuration of the network and the largest loads. The presented problem is solved using a genetic algorithm (GA). The formulation of the GA algorithm and its performance for different numbers of power sources is analyzed. The optimal placements of wind generators were computed for some case problems. The algorithm is validated with a medium sized electrical grid. The formulation of the parallel version of the genetic algorithm is presented. Its properties are verified on the cluster of workstations environment.
Collapse
Affiliation(s)
- Andrzej Jordan
- The State College of Computer Science and Business Administration in Lomza, Poland, and University of Bedfordshire, UK
| | | | - Ryszard Szczebiot
- The State College of Computer Science and Business Administration in Lomza, Poland
| |
Collapse
|
31
|
French T, Bessis N, Maple C, Asimakopoulou E. Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring. International Journal of Distributed Systems and Technologies 2012. [DOI: 10.4018/jdst.2012010103] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
This paper explores trust related issues arising from the use of a crowd-sourcing method. Crowd-sourcing is a relatively new method that utilises modern technologies to gather, analyse and visualise specific “on-the-fly” data. The data is typically acquired through the employment of mobile technology, with each device running a bespoke application that captures the desired information. The resulting “crowd sourced” data is readily available and the corresponding maps produced can in turn, be used to support strategic planning and to facilitate overall, more informed decision-making. The purpose is to provide insights into this novel approach to data collection, aggregation and subsequent visualisation. Specifically, the focus centres upon issues of trust and security that are inherent not merely to the use of crowd sourced data capture itself, but also crucially, to the stewardship and usage of the resultant data sets within e-government settings. A novel community centric usage scenario is presented that seeks to show how issues of trust pervade the technology. Hence, both rewards and risks are revealed and we go on to outline a preliminary approach intended to support a trusted and reputable “crowdy” data architecture.
Collapse
Affiliation(s)
| | - Nik Bessis
- University of Bedfordshire, UK and University of Derby, UK
| | | | | |
Collapse
|
32
|
Sotiriadis S, Bessis N, Huang Y, Sant P, Maple C. Defining Minimum Requirements of Inter-Collaborated Nodes by Measuring the Weight of Node Interactions. International Journal of Distributed Systems and Technologies 2011. [DOI: 10.4018/jdst.2011070102] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
This paper focuses on defining the minimum requirements to support the inter-cooperation between various scales, dynamically evolved Virtual Organizations (VOs). This proposed method is able to assign a weighted value to each pair-wise path that each member (node) can select in order to locate neighbouring nodes according to their preferences. The method also takes into account the communication overhead between each node interaction. The weight of each path is to be measured by the analysis of prerequisites in order to achieve a mutually agreed interaction between nodes. Requirements are defined as the least parameters or conditions that a node needs to achieve in order to determine its accessibility factor. The motivation behind this work is the vision of the Critical Friends Community model, which is a suitable topology for interoperable grid environments. The topology suggests that capturing inter-cooperated nodes interactions that can be publicly available could lead to knowledge of neighbouring VO members which, in turn, could be used for facilitating a more effective resource discovery and selection decision.
Collapse
Affiliation(s)
| | | | - Ye Huang
- University of Fribourg, Switzerland
| | | | | |
Collapse
|
33
|
|
34
|
|
35
|
|
36
|
Quinlivan ML, Ayres KL, Kelly PJ, Parker SP, Scott FT, Johnson RW, Maple C, Breuer J. Persistence of varicella-zoster virus viraemia in patients with herpes zoster. J Clin Virol 2010; 50:130-5. [PMID: 21093356 DOI: 10.1016/j.jcv.2010.10.014] [Citation(s) in RCA: 33] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/28/2010] [Revised: 09/20/2010] [Accepted: 10/18/2010] [Indexed: 11/29/2022]
Abstract
BACKGROUND Herpes zoster is caused by the reactivation of varicella-zoster virus from sensory neurons. The commonest complication following zoster is chronic pain termed post herpetic neuralgia. OBJECTIVES To investigate the dynamics of VZV viraemia and viral load following the resolution of zoster and its relationship to PHN development. STUDY DESIGN Blood samples were collected at baseline, 1 month, 3 months and 6 month from a prospective study of 63 patients with active zoster. Quantification of VZV DNA in whole blood was performed using a real-time PCR assay. RESULTS During acute zoster, all patients had detectable VZV DNA in their blood. VZV DNA remained detectable in the blood of 91% of patients at 6 months although levels declined significantly (p<0.0001). A history of prodromal symptoms (p=0.005) and severity of pain at baseline (p=0.038) as well as taking antivirals (p=0.046) and being immunocompromised (p=0.043) were associated, with longer time to recovery from PHN. Viral DNA loads were consistently higher in patients with risk factors for PHN and higher viral DNA loads over time were associated with longer time to recovery (p=0.058 overall and 0.038 in immunocompetent). CONCLUSIONS Based on these observations we hypothesise that VZV replication persists following acute shingles and that higher viral DNA loads contribute to the risk factors for PHN.
Collapse
Affiliation(s)
- M L Quinlivan
- Department of Infection, The Windeyer Institute, University College London, 46 Cleveland Street, London WC1T 4JF, England, UK.
| | | | | | | | | | | | | | | |
Collapse
|
37
|
Kirk G, Maple C, McLaren M, Belch JJF. Short Communication: A Circadian Rhythm may Exist in Healthy Controls for Soluble P-Selectin and Platelet Count. Platelets 2009; 6:414-5. [DOI: 10.3109/09537109509078482] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
|
38
|
Ho M, Maple C, Bancroft A, McLaren M, Belch JJ. The beneficial effects of omega-3 and omega-6 essential fatty acid supplementation on red blood cell rheology. Prostaglandins Leukot Essent Fatty Acids 1999; 61:13-7. [PMID: 10477036 DOI: 10.1054/plef.1999.0066] [Citation(s) in RCA: 21] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
Twenty healthy, non-smoking subjects were enrolled into a study to investigate the effects of dietary supplementation with essential fatty acid (EFAs) on red blood cell rheology. Ten subjects were given 3 months dietary supplementation with long chain polyunsaturated EFAs containing omega-3 and omega-6 EFAs while 10 others were given placebo (sunflower oil). Venous sampling was performed at 0 and 12 weeks and red blood cell (RBC) aggregation and deformability measured by a filtration system. The results showed a reduction in RBC aggregation in the group given omega-3 and omega-6 EFAs but not in the placebo group. This may be related to changes in the RBC membrane and surface receptor characteristics. Such EFAs may be useful in Raynaud's phenomenon.
Collapse
Affiliation(s)
- M Ho
- University Department of Medicine, Ninewells Hospital and Medical School, Dundee, UK
| | | | | | | | | |
Collapse
|
39
|
Veale DJ, Maple C, Kirk G, McLaren M, Belch JJ. Soluble cell adhesion molecules--P-selectin and ICAM-1, and disease activity in patients receiving sulphasalazine for active rheumatoid arthritis. Scand J Rheumatol 1998; 27:296-9. [PMID: 9751471 DOI: 10.1080/030097498442415] [Citation(s) in RCA: 27] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/08/2023]
Abstract
The aim of this pilot study was to examine soluble cell adhesion molecules before and after sulphasalazine (SSZ) therapy in active RA. Assessment of RA patients (n = 13) was undertaken before and after 3 months of SSZ. sICAM-1, sVCAM-1, sP- and sE-selectin were measured using an ELISA. The mean (+/-SEM) C-reactive protein (CRP) and sP-selectin levels were significantly reduced from 3.9(0.89) to 2.01(0.53) mg/dl and from 332.8 (48.2) to 116.2 (11.1) respectively, after 3 months of SSZ. The sICAM-1 and sP-selectin levels were significantly higher in RA patients at baseline and a reduction occurred of sICAM-1, sVCAM-1 and sE-selectin levels, however this was not significant. The fall in mean (SEM) sICAM-1, from 345.0 (29.8) to 333.5 (30.2), correlated with the change in CRP (r=0.66; p = 0.018), but the fall in sP-selectin did not. SSZ therapy reduced sP-selectin and sICAM-1 levels in active RA, sICAM-1 correlates with disease activity. SSZ may reduce platelet and/or endothelial activity in RA which may be a useful marker of response, however studies of longer duration and more patients are required.
Collapse
Affiliation(s)
- D J Veale
- University Department of Medicine, Ninewells Hospital, Dundee, Scotland
| | | | | | | | | |
Collapse
|
40
|
Maple C, Kirk G, McLaren M, Veale D, Belch JJ. A circadian variation exists for soluble levels of intercellular adhesion molecule-1 and E-selectin in healthy volunteers. Clin Sci (Lond) 1998; 94:537-40. [PMID: 9682678 DOI: 10.1042/cs0940537] [Citation(s) in RCA: 23] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
1. We have previously shown a circadian variation in leucocyte activation and endothelial function which may explain why some inflammatory and vascular diseases show a circadian variation in disease activity/ occurrence. 2. We have investigated the circadian variation of two soluble cell adhesion molecules, intercellular adhesion molecule-1 and E-selectin, in 10 healthy volunteers. Soluble intercellular adhesion molecule-1 is released from both activated leucocytes and endothelial cells while soluble E-selectin is released only from activated endothelium. 3. Results show a circadian variation exists for both soluble intercellular adhesion molecule-1 and E-selectin (both P < 0.0001, analysis of variance) with a peak activity at 12:00 h for both measures and a minimum activity at 04:00 h for intercellular adhesion molecule-1 and 00:00 h for E-selectin. 4. These results demonstrate the existence of a diurnal variation in cell adhesion molecules, providing evidence in support of a diurnal pattern in endothelial and leucocyte activation. An alteration in this biological rhythm may help to explain the diurnal variation in disease activity in certain inflammatory and vascular disease states. Furthermore, it stresses the importance of sample time point standardization in clinical studies.
Collapse
Affiliation(s)
- C Maple
- University Department of Medicine, Ninewells Hospital and Medical School, Dundee, Scotland, U.K
| | | | | | | | | |
Collapse
|
41
|
Maple C, McLaren M, Bancroft A, Ho M, Belch JJ. Dietary supplementation with omega 3 and omega 6 fatty acids reduces induced white blood cell aggregation in healthy volunteers. Prostaglandins Leukot Essent Fatty Acids 1998; 58:365-8. [PMID: 9690714 DOI: 10.1016/s0952-3278(98)90072-2] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Abstract
Twenty healthy, non-smoking subjects were enrolled into a study to look at the effects of 3 months' dietary supplementation with long chain polyunsaturated essential fatty acids (EFAs) on white blood cell (WBC) aggregation. Ten subjects received 3 months' supplementation with long chain polyunsaturated omega 3 and omega 6 fatty acids, 10 received 3 months of placebo (sunflower oil). Venous blood was sampled at 0 and 12 weeks; whole blood WBC aggregation in response to formyl-methionyl-leucyl-phenylalanine (FMLP) was measured. The results showed that the 3 months' dietary supplementation with a combination of omega 3 and omega 6 fatty acids significantly reduced WBC aggregation to FMLP in healthy volunteers when compared to placebo. Since WBC aggregation to FMLP is dependent on the activity of WBC surface receptors and independent of eicosanoid production, we suggest EFAs may have other anti-inflammatory actions in addition to their role as modulators of mediator production.
Collapse
Affiliation(s)
- C Maple
- University Department of Medicine, Ninewells Hospital and Medical School, Dundee, UK
| | | | | | | | | |
Collapse
|
42
|
Belch JJ, Shaw JW, Kirk G, McLaren M, Robb R, Maple C, Morse P. The white blood cell adhesion molecule E-selectin predicts restenosis in patients with intermittent claudication undergoing percutaneous transluminal angioplasty. Circulation 1997; 95:2027-31. [PMID: 9133511 DOI: 10.1161/01.cir.95.8.2027] [Citation(s) in RCA: 55] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
Abstract
BACKGROUND Experimental studies have shown that endothelial dysfunction is an early event preceding restenosis. Monocytes and neutrophils have been shown to bind to damaged endothelium via the cell adhesion molecules (CAMs). The selectins are involved in capturing the leukocytes and tethering them to the endothelium. E-selectin is a CAM that is only expressed on activated endothelial cells. Its ligands are expressed on monocytes and neutrophils and it has been found to exist in a soluble form. This soluble form may represent a marker for endothelial damage and may be a precursor of smooth muscle proliferation. METHODS AND RESULTS Fifty-four patients who were undergoing peripheral arterial balloon angioplasty had blood sampled before angioplasty. E-selectin was measured in plasma with the use of an ELISA. At follow-up angiogram, 30% (n=14) of the patients had restenosed at 1 year. There was a significant difference in baseline E-selectin levels in patients who restenosed compared with those who did not (65.3 ng/mL [58.25 to 78.05] versus 52.3 [34.2 to 62.1], Mann-Whitney U, P<.007). Endothelial activation with subsequent adherence of white blood cells is an important step in restenosis. CONCLUSIONS We have shown an increased level of shed E-selectin in patients destined for restenosis and suggest that this work further supports a role for white blood cell/endothelial interaction in restenosis after angioplasty.
Collapse
Affiliation(s)
- J J Belch
- University Department of Medicine, Ninewells Hospital and Medical School, Dundee, Scotland
| | | | | | | | | | | | | |
Collapse
|
43
|
Abstract
Rheumatoid arthritis is a systemic inflammatory disease of the joints and major internal organs that has an unknown aetiology. Cell adhesion molecules (CAMs) are expressed on the surface of cells, enabling homotypic and heterotypic cell-cell interactions that are fundamental in the process of the inflammatory reaction. Three major families of CAMs are now recognised, with numerous subtypes. Many of these molecules play an important role in the mechanism of disease in rheumatoid arthritis. E-Selectin and intercellular adhesion molecule (ICAM)-1 are upregulated on the synovial endothelium, while vascular cell adhesion molecule (VCAM)-1 plays an important role in the synovial lining layer cells and within the synovial stroma. The expression of CAMs may be blocked by monoclonal antibodies and modified by nonsteroidal anti-inflammatory drugs and disease-modifying antirheumatic drugs. This has very important implications in the therapy of rheumatoid arthritis.
Collapse
Affiliation(s)
- D J Veale
- Rheumatology and Rehabilitation Research Unit, University of Leeds, England
| | | |
Collapse
|
44
|
Wreghitt TG, Gray JJ, Allain JP, Poulain J, Garson JA, Deaville R, Maple C, Parameshwar J, Calne RY, Wallwork J. Transmission of hepatitis C virus by organ transplantation in the United Kingdom. J Hepatol 1994; 20:768-72. [PMID: 7523483 DOI: 10.1016/s0168-8278(05)80148-5] [Citation(s) in RCA: 41] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 01/25/2023]
Abstract
This study employed a second-generation anti-HCV ELISA, and a second-generation recombinant immunoblot assay and hepatitis C virus RNA detection by polymerase chain reaction to investigate the anti-HCV prevalence in 554 British organ donors and the transmission of hepatitis C virus to heart, liver and kidney recipients between 1984 and 1991. Serum samples from six (1.08%) donors were reactive in the second-generation anti-HCV ELISA and four (67%) of these gave positive or indeterminate results in the recombinant immunoblot assay-2. Of the 15 recipients of these organs from hepatitis C virus-confirmed positive/indeterminate donors, 14 (93%) acquired hepatitis C virus infection and seven (47%) had evidence of hepatitis C virus-related liver disease after transplantation and no evidence of blood transfusion-related transmission. Only six of the 15 (40%) recipients had detectable anti-HCV after transplantation, while 12 of 14 (86%) patients tested had hepatitis C virus RNA in their serum detectable by "nested" polymerase chain reaction. These data indicate a very high rate of transmission with a major risk of the development of liver disease. We believe our study supports the testing of all British organ donors for anti-HCV and that organs from anti-HCV-positive patients should not be transplanted unless the recipient has life-threatening disease and there is a donor shortage, when their use may be justified. Since there are time constraints on organ donor testing, which may frequently be done on call during unsocial hours, we would recommend second-generation ELISA as the current screening test of choice.(ABSTRACT TRUNCATED AT 250 WORDS)
Collapse
Affiliation(s)
- T G Wreghitt
- Clinical Microbiology and Public Health Laboratory, Addenbrooke's Hospital, Cambridge, UK
| | | | | | | | | | | | | | | | | | | |
Collapse
|
45
|
Karle W, Hart J, Corriere R, Gold S, Maple C. Preliminary study of psychological changes in feeling therapy. Psychol Rep 1978; 43:1327-34. [PMID: 746102 DOI: 10.2466/pr0.1978.43.3f.1327] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/24/2022]
Abstract
10 early, 10 middle, and 10 late participants in an intense, community-oriented psychotherapy (feeling therapy) were measured for differences on two standardized psychological tests (Personal Orientation Inventory and Eysenck Personality Inventory) and on responses to individual and group post-session report questionnaires. Two earlier studies had found measurable physiological changes associated with this form of therapeutic intervention and it was hypothesized that associated psychological changes might be observed. Results partially bore out this prediction; the three groups evidenced some significant differences on the Personal Orientation Inventory and Post-session Report Forms. Eysenck Personality Inventory data did not distinguish between the groups.
Collapse
|
46
|
Abstract
This was the third in a series of studies on the psychophysiological effects of psychotherapy. Two earlier studies have suggested a more relaxed physiological state as measured by body temperature, pulse, and blood pressure taken immediately following therapy sessions. This study investigated the maintenance of these changes over a 10-day period among a group of 5 experienced and 5 inexperienced patients in Feeling Therapy. While neither group was able to sustain the large drops in physiological parameters which followed therapeutic sessions, the experienced patients evidenced a considerably lower level on every parameter throughout the study, suggesting possible long-term effects of this type of therapy.
Collapse
|