The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...ijtsrd
Cyber ethics is the study of the ethics relating to computers, as well as to user behavior and what computers are programmed to do, and how it affects individuals and society. It is the branch of philosophy that deals with what is considered to be right or wrong. Since the advent of computers, various governments have enacted regulations and while organizations have defined policies about cyberethics. Cyberethics also known as “internet ethics,” is a branch of applied ethics that examines the moral, legal, and social issues i.e. ethical questions brought about by the emergence of digital technologies and global virtual environments. Arising with the introduction of the internet are, filtering, accuracy, security, censorship, conflicts over privacy, property, accessibility, and others. This paper is to elucidate more on cyberethics and its impacts on users and the society Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Cyber Ethics: An Introduction" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63513.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/63513/cyber-ethics-an-introduction/paul-a-adekunte
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...AI Publications
In the current digital landscape, cybercriminals continually evolve their techniques to execute successful attacks on businesses, thus posing a great challenge to information technology (IT) professionals. While traditional cybersecurity approaches like layered defense and reactive security have helped IT professionals cope with traditional threats, they are ineffective in dealing with evolving cyberattacks. This paper focuses on the need for a proactive cybersecurity culture among IT professionals to enable them combat evolving threats. The paper emphasis that building a proactive security approach and culture can help among IT professionals anticipate, identify, and mitigate latent threats prior to them exploiting existing vulnerabilities. This paper also points out that as IT professionals use reactive security when dealing with traditional attacks, they can use it collaboratively with proactive security to effectively protect their networks, data, and systems and avoid heavy costs of dealing with cyberattack’s aftermaths and business recovery.
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...ijtsrd
Cyber ethics is the study of the ethics relating to computers, as well as to user behavior and what computers are programmed to do, and how it affects individuals and society. It is the branch of philosophy that deals with what is considered to be right or wrong. Since the advent of computers, various governments have enacted regulations and while organizations have defined policies about cyberethics. Cyberethics also known as “internet ethics,” is a branch of applied ethics that examines the moral, legal, and social issues i.e. ethical questions brought about by the emergence of digital technologies and global virtual environments. Arising with the introduction of the internet are, filtering, accuracy, security, censorship, conflicts over privacy, property, accessibility, and others. This paper is to elucidate more on cyberethics and its impacts on users and the society Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Cyber Ethics: An Introduction" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63513.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/63513/cyber-ethics-an-introduction/paul-a-adekunte
Cultivating Proactive Cybersecurity Culture among IT Professional to Combat E...AI Publications
In the current digital landscape, cybercriminals continually evolve their techniques to execute successful attacks on businesses, thus posing a great challenge to information technology (IT) professionals. While traditional cybersecurity approaches like layered defense and reactive security have helped IT professionals cope with traditional threats, they are ineffective in dealing with evolving cyberattacks. This paper focuses on the need for a proactive cybersecurity culture among IT professionals to enable them combat evolving threats. The paper emphasis that building a proactive security approach and culture can help among IT professionals anticipate, identify, and mitigate latent threats prior to them exploiting existing vulnerabilities. This paper also points out that as IT professionals use reactive security when dealing with traditional attacks, they can use it collaboratively with proactive security to effectively protect their networks, data, and systems and avoid heavy costs of dealing with cyberattack’s aftermaths and business recovery.
From a SOCITM Meeting June 2014 (Society of Information Technology Managers). A 10 minute presentation on how ICT in Learning is developing, a few requirements to provide the right infrastructure to support essential technology rich learning environments and how a vision and framework can support this.
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
The schools recognize the importance of computer and Internet to support 21st century skills building. We find the Department of Education in the Philippines investing on computer and Internet in the elementary schools. But at the side we find educators commenting on the downside of technology use on the child safety and morals. The education leaders and teachers need not re-invent the wheel to define competency standards on cyber safety, ethics and security.
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...ssuser793b4e
This paper reviewed the implications, challenges and the effects of cybercrimes and cybersecurity in the society. It fully defined cybersecurity based on governmental and national view, industrial view and academic view. From this it was concluded that cyber security and cyber-attack is best defined and prevented based on the field of research. This paper review 27 articles on cyber security and cybercrimes and it showed that cyber security is a complex task that relies on domain knowledge and requires cognitive abilities to determine possible threats from large amounts of network data. This study investigates how knowledge in network operations and information security influence the detection of intrusions in a simple network. This research paper also reviewed different strategies used by different researchers to prevent cyber-attack in different areas of work and also exposed the most recent used cyber security attacks, preventions, future threats and prospective ways to avoid cyber-attacks
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
1Ethical issues arising from use of ICT technologiesStud.docxdrennanmicah
1
Ethical issues arising from use of ICT technologies
Student’s Name
Professor’s Name
Course Title
Date
Ethical issues arising from use of ICT technologies
Introduction
Information and communication technology (ICT) has undergone significant transformation since time in memorial. The impact of the scientific innovations in information technology and communication has impacted various institutions in diverse. In business, for instance, ICT has enhanced production techniques, marketing, entrepreneurship, finance management, human resource management, and many other operational activities. The significant impacted brought with ICT techniques promotes operational efficiency, effectiveness, accountability, and accuracy. However, various ethical issues surrounding the implementation and use of the technology are greatly impounding the system’s utility and operation mechanism. Ethics in this regard can be defined as any cultural, traditional, political or social issues considerably associated with the use, misuse, implication or impact of the ITC services to the society. As a result, the reasoning behind the application of the services must be mechanized in the confines of the social, political, economic and religious principles to affirm total acceptance in the society [2]. Where is the ethical issue according to scenario??
‘Emerging Technology’ is a term associated with linked with life cycle ideas in technology in which the technological societies design the innovative paradigm. The life cycles of technology can be categorized into five basic aspects or phases basing on the emerging technological techniques. These include discovery or technological innovations, technological emergency, technological sublime, technological recognition and technological superfluous. The current state of research and innovation is objectively leading to tremendous technological evolutions that should considerably be evaluated for ethical fitness and acceptance to the society.
Identification of ethical values
Defining ICT is complex basing on the function of a computer as an information processing machine. Information process has currently impacted most of the technical support strategies that aimed at providing a regulatory measure to curb emerging legal issues in technology. In the same manner, the application of ICT especially in the communication aspect is drastically following the same path with too much integrated and pervasive issues that are an annoyance to the society. A conclusive and comprehensive understanding of ethical and social issues regarding ICT is required to be categorically defined in a broad perspective. The definition should comprehensively describe the social-technical systems applied in the use of the network, computer, and information technology [2]. The assertive definition should deduce the significant effect of the computer system in the manner of human interaction globally and its impact on b.
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India
Due to COVID-19, schools and colleges are non-operational across India, physically. Although there is no immediate disruption to education and teaching, learning has almost moved entirely from physical to virtual. This presents an added responsibility and stress for parents to keep their children safe from cyber criminals who could be trying to leverage this opportunity to lure online users to click on malicious links and files. The IET’s Cybersecurity Working Group has put together some best practices to be followed to safeguard children from becoming targets of malware and thus, to protect them cyber threats.
What is the purpose of a digital citizenship program? Who is the audience in schools - teachers, parents, students? This presentation looks at some of the research and discusses the factors to consider when developing a digital citizenship program for your school.
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
Running Head: ANNOTATED BIBLIOGRAPHY
ANNOTATED BIBLIOGRAPHY 6
Annotated Bibliography on Emerging Cyber Threats
[Name of Institution]
[Name of Writer]
Annotated Bibliography on Emerging Cyber Threats
Source#1
Reference: Kettani, H., & Wainwright, P. (2019, March). On the Top Threats to Cyber Systems. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT) (pp. 175-179). IEEE.
Summary: This article reveals the threats to the cyber systems even some of them are not known to the common people. The article defines that the latest technology has advanced the cyber systems and these advancements are attractive and beneficial in comparison to the previous systems. However, due to this sophisticated and attractive advancement the individuals, societies, and nations had become dependent on the cyber systems. These systems result in the higher gain and ease of handling since people had relying on the cyber systems. Moreover, the author argues that for the adoption of the proper defense and mitigations to the threats it is necessary to understand cyber threats. The top threats with a brief discussion of threat agents and attack vectors along with the countermeasures are mentioned so that the readers can find knowledge in this regard.
Relevance: This article is of paramount importance because it defines the importance of the topic of research. As the aim of the research is to expose the emerging cyber-attacks and the author of the article “On the Top Threats to Cyber Systems” reveals the importance of the cyber systems which is important for understanding the dependence over the cyber systems. In addition to this, the article is found worth reading because it reveals the emerging cybercrimes and ways of protection too. The study is found relevant because it reveals that cyber systems are important nowadays because they are used in the business systems, control systems, and for accessing the control systems. In other words, the articles provide an overview of the emerging threats and latest trends in the cyber systems.
Source#2
Reference: Parn, E. A., & Edwards, D. (2019). Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management.
Summary: This article determines the cyber systems attack in the sector of the digital built environment. The study gives the idea of emerging crimes that are made to threat the digital and physical assets that are used to form the digital economies. These threats are often made to affect the critical infrastructure of the smart cities. These smart cities are comprised of the cyber systems which also increase the national wealth, preserve health, and provide safety and welfare to the nation. In this regard, it is important to protect the cyber systems from the critical and emerging threats. Additionally, the article reveals the safe an ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
The Internet of Things, or IoT, has become a disruptive force in the era of connected devices, changing the way we interact with our surroundings. In the center of this networked web is an essential element called IoT gateways. The purpose of this paper is to offer a thorough overview of IoT gateways, their importance in enabling smooth device connectivity, and the critical necessity to safeguard these gateways against growing cyber threats.
Current Issues In Education Technology WPG Consulting .pdfmeetsolanki44
Explore the forefront of education technology with WPG Consulting. Navigate current issues, trends, and solutions shaping the educational landscape for a tech-forward future.
Digital Intelligence (DQ) is a comprehensive set of technical, cognitive, meta-cognitive, and socio-emotional competencies grounded in universal moral values that enable individuals to face the challenges of digital life and adapt to its demands. Thus, individuals equipped with DQ become wise, competent, and future-ready digital citizens who successfully use, control, and create technology to enhance humanity.
Explain how firms can benefit from forecastingexchange rates .docxhanneloremccaffery
Explain how firms can benefit from forecasting
exchange rates
Describe the common techniques used for
forecasting
Explain how forecasting performance can be
evaluated
explain how interval forecasts can be applied
APA format, minimum 3 sources
Paper will be a minimum of 650 and a maximum of 900 words.
(This includes title section, content, and references…in other
words the entire paper)
.
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docxhanneloremccaffery
• POL201 • Discussions • Week 5 - Discussion
Voter and Voter Turnout
Prepare: Prior to completing this discussion question, review Chapters 10, 11, and 12 in American Government and review Week Five Instructor Guidance. Also read the following articles: How Voter ID Laws Are Being Used to Disenfranchise Minorities and the Poor (Links to an external site.)Links to an external site., Fraught with Fraud (Links to an external site.)Links to an external site., and Proof at the Polls (Links to an external site.)Links to an external site.
Reflect: The U.S. has one of the lowest voter turnout rates among modern democratic political systems. One study ranks the U.S. 120th on a list of 169 nations compared on voter turnout (Pintor, Gratschew, & Sullivan, 2002). During the last decade, many initiatives have been undertaken to increase voter participation, yet concerns about the possibility of election fraud have also increased. Additionally, some political interests feel threatened by the increase in turnout among some traditionally low-turnout ethnic minorities. Several states have recently passed legislation imposing new registration and identification requirements. This has sparked debate about whether these are tactics intended to suppress turnout or to prevent fraud. Think about the media’s role in the election process and how both mass media and social media can impact the election process.
Write: In your initial post, summarize recent developments in several states enacting voter ID laws. Analyze and describe the pros and cons on both sides of the debate about these laws. Is voter fraud a major problem for our democracy or are some groups trying to make it harder for some segments of society to vote? What impact has the media (mass and social) had in influencing public opinion regarding voter ID laws? Draw your own conclusion about the debate over voter ID laws and justify your conclusions with facts and persuasive reasoning. Fully respond to all parts of the prompt and write your response in your own words. Your initial post must be at least 300 words. Support your position with at least two of the assigned resources required for this discussion, and/or peer reviewed scholarly sources obtained through the AU Library databases. Include APA in-text citations (Links to an external site.)Links to an external site. in the body of your post and full citations on the references list (Links to an external site.)Links to an external site. at the end. Support your position with APA citations from two or more of the assigned resources required for this discussion. Please be sure that you demonstrate understanding of these resources, integrate them into your argument, and cite them properly.
.
From a SOCITM Meeting June 2014 (Society of Information Technology Managers). A 10 minute presentation on how ICT in Learning is developing, a few requirements to provide the right infrastructure to support essential technology rich learning environments and how a vision and framework can support this.
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
The schools recognize the importance of computer and Internet to support 21st century skills building. We find the Department of Education in the Philippines investing on computer and Internet in the elementary schools. But at the side we find educators commenting on the downside of technology use on the child safety and morals. The education leaders and teachers need not re-invent the wheel to define competency standards on cyber safety, ethics and security.
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...ssuser793b4e
This paper reviewed the implications, challenges and the effects of cybercrimes and cybersecurity in the society. It fully defined cybersecurity based on governmental and national view, industrial view and academic view. From this it was concluded that cyber security and cyber-attack is best defined and prevented based on the field of research. This paper review 27 articles on cyber security and cybercrimes and it showed that cyber security is a complex task that relies on domain knowledge and requires cognitive abilities to determine possible threats from large amounts of network data. This study investigates how knowledge in network operations and information security influence the detection of intrusions in a simple network. This research paper also reviewed different strategies used by different researchers to prevent cyber-attack in different areas of work and also exposed the most recent used cyber security attacks, preventions, future threats and prospective ways to avoid cyber-attacks
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
1Ethical issues arising from use of ICT technologiesStud.docxdrennanmicah
1
Ethical issues arising from use of ICT technologies
Student’s Name
Professor’s Name
Course Title
Date
Ethical issues arising from use of ICT technologies
Introduction
Information and communication technology (ICT) has undergone significant transformation since time in memorial. The impact of the scientific innovations in information technology and communication has impacted various institutions in diverse. In business, for instance, ICT has enhanced production techniques, marketing, entrepreneurship, finance management, human resource management, and many other operational activities. The significant impacted brought with ICT techniques promotes operational efficiency, effectiveness, accountability, and accuracy. However, various ethical issues surrounding the implementation and use of the technology are greatly impounding the system’s utility and operation mechanism. Ethics in this regard can be defined as any cultural, traditional, political or social issues considerably associated with the use, misuse, implication or impact of the ITC services to the society. As a result, the reasoning behind the application of the services must be mechanized in the confines of the social, political, economic and religious principles to affirm total acceptance in the society [2]. Where is the ethical issue according to scenario??
‘Emerging Technology’ is a term associated with linked with life cycle ideas in technology in which the technological societies design the innovative paradigm. The life cycles of technology can be categorized into five basic aspects or phases basing on the emerging technological techniques. These include discovery or technological innovations, technological emergency, technological sublime, technological recognition and technological superfluous. The current state of research and innovation is objectively leading to tremendous technological evolutions that should considerably be evaluated for ethical fitness and acceptance to the society.
Identification of ethical values
Defining ICT is complex basing on the function of a computer as an information processing machine. Information process has currently impacted most of the technical support strategies that aimed at providing a regulatory measure to curb emerging legal issues in technology. In the same manner, the application of ICT especially in the communication aspect is drastically following the same path with too much integrated and pervasive issues that are an annoyance to the society. A conclusive and comprehensive understanding of ethical and social issues regarding ICT is required to be categorically defined in a broad perspective. The definition should comprehensively describe the social-technical systems applied in the use of the network, computer, and information technology [2]. The assertive definition should deduce the significant effect of the computer system in the manner of human interaction globally and its impact on b.
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India
Due to COVID-19, schools and colleges are non-operational across India, physically. Although there is no immediate disruption to education and teaching, learning has almost moved entirely from physical to virtual. This presents an added responsibility and stress for parents to keep their children safe from cyber criminals who could be trying to leverage this opportunity to lure online users to click on malicious links and files. The IET’s Cybersecurity Working Group has put together some best practices to be followed to safeguard children from becoming targets of malware and thus, to protect them cyber threats.
What is the purpose of a digital citizenship program? Who is the audience in schools - teachers, parents, students? This presentation looks at some of the research and discusses the factors to consider when developing a digital citizenship program for your school.
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
Running Head: ANNOTATED BIBLIOGRAPHY
ANNOTATED BIBLIOGRAPHY 6
Annotated Bibliography on Emerging Cyber Threats
[Name of Institution]
[Name of Writer]
Annotated Bibliography on Emerging Cyber Threats
Source#1
Reference: Kettani, H., & Wainwright, P. (2019, March). On the Top Threats to Cyber Systems. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT) (pp. 175-179). IEEE.
Summary: This article reveals the threats to the cyber systems even some of them are not known to the common people. The article defines that the latest technology has advanced the cyber systems and these advancements are attractive and beneficial in comparison to the previous systems. However, due to this sophisticated and attractive advancement the individuals, societies, and nations had become dependent on the cyber systems. These systems result in the higher gain and ease of handling since people had relying on the cyber systems. Moreover, the author argues that for the adoption of the proper defense and mitigations to the threats it is necessary to understand cyber threats. The top threats with a brief discussion of threat agents and attack vectors along with the countermeasures are mentioned so that the readers can find knowledge in this regard.
Relevance: This article is of paramount importance because it defines the importance of the topic of research. As the aim of the research is to expose the emerging cyber-attacks and the author of the article “On the Top Threats to Cyber Systems” reveals the importance of the cyber systems which is important for understanding the dependence over the cyber systems. In addition to this, the article is found worth reading because it reveals the emerging cybercrimes and ways of protection too. The study is found relevant because it reveals that cyber systems are important nowadays because they are used in the business systems, control systems, and for accessing the control systems. In other words, the articles provide an overview of the emerging threats and latest trends in the cyber systems.
Source#2
Reference: Parn, E. A., & Edwards, D. (2019). Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management.
Summary: This article determines the cyber systems attack in the sector of the digital built environment. The study gives the idea of emerging crimes that are made to threat the digital and physical assets that are used to form the digital economies. These threats are often made to affect the critical infrastructure of the smart cities. These smart cities are comprised of the cyber systems which also increase the national wealth, preserve health, and provide safety and welfare to the nation. In this regard, it is important to protect the cyber systems from the critical and emerging threats. Additionally, the article reveals the safe an ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
The Internet of Things, or IoT, has become a disruptive force in the era of connected devices, changing the way we interact with our surroundings. In the center of this networked web is an essential element called IoT gateways. The purpose of this paper is to offer a thorough overview of IoT gateways, their importance in enabling smooth device connectivity, and the critical necessity to safeguard these gateways against growing cyber threats.
Current Issues In Education Technology WPG Consulting .pdfmeetsolanki44
Explore the forefront of education technology with WPG Consulting. Navigate current issues, trends, and solutions shaping the educational landscape for a tech-forward future.
Digital Intelligence (DQ) is a comprehensive set of technical, cognitive, meta-cognitive, and socio-emotional competencies grounded in universal moral values that enable individuals to face the challenges of digital life and adapt to its demands. Thus, individuals equipped with DQ become wise, competent, and future-ready digital citizens who successfully use, control, and create technology to enhance humanity.
Explain how firms can benefit from forecastingexchange rates .docxhanneloremccaffery
Explain how firms can benefit from forecasting
exchange rates
Describe the common techniques used for
forecasting
Explain how forecasting performance can be
evaluated
explain how interval forecasts can be applied
APA format, minimum 3 sources
Paper will be a minimum of 650 and a maximum of 900 words.
(This includes title section, content, and references…in other
words the entire paper)
.
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docxhanneloremccaffery
• POL201 • Discussions • Week 5 - Discussion
Voter and Voter Turnout
Prepare: Prior to completing this discussion question, review Chapters 10, 11, and 12 in American Government and review Week Five Instructor Guidance. Also read the following articles: How Voter ID Laws Are Being Used to Disenfranchise Minorities and the Poor (Links to an external site.)Links to an external site., Fraught with Fraud (Links to an external site.)Links to an external site., and Proof at the Polls (Links to an external site.)Links to an external site.
Reflect: The U.S. has one of the lowest voter turnout rates among modern democratic political systems. One study ranks the U.S. 120th on a list of 169 nations compared on voter turnout (Pintor, Gratschew, & Sullivan, 2002). During the last decade, many initiatives have been undertaken to increase voter participation, yet concerns about the possibility of election fraud have also increased. Additionally, some political interests feel threatened by the increase in turnout among some traditionally low-turnout ethnic minorities. Several states have recently passed legislation imposing new registration and identification requirements. This has sparked debate about whether these are tactics intended to suppress turnout or to prevent fraud. Think about the media’s role in the election process and how both mass media and social media can impact the election process.
Write: In your initial post, summarize recent developments in several states enacting voter ID laws. Analyze and describe the pros and cons on both sides of the debate about these laws. Is voter fraud a major problem for our democracy or are some groups trying to make it harder for some segments of society to vote? What impact has the media (mass and social) had in influencing public opinion regarding voter ID laws? Draw your own conclusion about the debate over voter ID laws and justify your conclusions with facts and persuasive reasoning. Fully respond to all parts of the prompt and write your response in your own words. Your initial post must be at least 300 words. Support your position with at least two of the assigned resources required for this discussion, and/or peer reviewed scholarly sources obtained through the AU Library databases. Include APA in-text citations (Links to an external site.)Links to an external site. in the body of your post and full citations on the references list (Links to an external site.)Links to an external site. at the end. Support your position with APA citations from two or more of the assigned resources required for this discussion. Please be sure that you demonstrate understanding of these resources, integrate them into your argument, and cite them properly.
.
•No less than 4 pages causal argument researched essay •In.docxhanneloremccaffery
•
No less than 4 pages causal argument researched essay
•
Includes an interview with an expert from a university
•
Includes survey question with students concerning the topic
•
Includes arguments from official sources from the library
.
•Focus on two or three things in the Mesopotamian andor Ovids ac.docxhanneloremccaffery
•Focus on two or three things in the Mesopotamian and/or Ovid's account of creation that differ from Genesis. How do they differ? What is the significance of these differences?
•Focus on two or three things in the Mesopotamian and/or
Ovid's account of the flood that differ from Genesis. How do they differ? What is the significance of these differences
.
•Langbein, L. (2012). Public program evaluation A statistical guide.docxhanneloremccaffery
•Langbein, L. (2012). Public program evaluation: A statistical guide (2nd ed.). Armonk, NY: ME Sharpe. ◦Chapter 7, “Designing Useful Surveys for Evaluation” (pp. 209–238)
•McDavid, J. C., Huse, I., & Hawthorn, L. R. L. (2013). Program evaluation and performance measurement: An introduction to practice (2nd ed.). Thousand Oaks, CA: Sage. ◦Chapter 4, “Measurement for Program Evaluation and Performance Monitoring” (pp. 145–185)
•Geddes, B. (1990). How the cases you choose affect the answers you get: Selection bias in comparative politics. Political Analysis, 2(1), 131–150. Retrieved from http://www.uky.edu/~clthyn2/PS671/Geddes_1990PA.pdf
•Levitt, S., & List, J. (2009). Was there really a Hawthorne effect at the Hawthorne plant? An analysis of the original illumination experiments. Retrieved from http://www.nber.org/papers/w15016.pdf
•Urban Institute. (2014). Outcome indicators project. Retrieved from http://www.urban.org/center/cnp/projects/outcomeindicators.cfm
•Bamberger, M. (2010). Reconstructuring baseline data for impact evaluation and results measurement. Retrieved from http://siteresources.worldbank.org/INTPOVERTY/Resources/335642-1276521901256/premnoteME4.pdf
•Parnaby, P. (2006). Evaluation through surveys [Blog post]. Retrieved from http://www.idea.org/blog/2006/04/01/evaluation-through-surveys/
•Rutgers, New Jersey Agricultural Experiment Station. (2014). Developing a survey instrument. Retrieved from http://njaes.rutgers.edu/evaluation/resources/survey-instrument.asp
•MEASURE Evaluation. (n.d.). Secondary analysis of data. Retrieved February 24, 2015, from http://www.cpc.unc.edu/measure/our-work/secondary-analysis/secondary-analysis-of-data
•Zeitlin, A. (2014). Sampling and sample size [PowerPoint slides]. Retrieved from http://www.povertyactionlab.org/sites/default/files/2.%20Sampling%20and%20Sample%20Size_AFZ3.pdf
Now that you have thought through a logical model or framework for your Final Project, it is time to develop preliminary input, output, and outcome indicators. For this Assignment, use the guidelines from the Urban Institute resource and consult relevant Optional Resources from this week.
Submit a 2- to 3-page paper which describes your input, output, and outcome program indicators, including the following:
•Describe the variables and the data you will be using.
•Provide a realistic discussion of the availability of research data.
•Provide an analysis of intended data collection strategies.
◦If a sample or sample survey will be used, discuss the sampling frame or the sampling strategy you intend to use.
.
•Chapter 10 Do you think it is possible for an outsider to accura.docxhanneloremccaffery
•Chapter 10: Do you think it is possible for an outsider to accurately discern about the underlying cultural values of an organization by analyzing symbols, ceremonies, dress, or other observable aspects of culture in comparison to an insider with several years of work experience? Select a percentage (e.g., 10%, 70%, etc.) and explain your reasoning.
•Chapter 11: A noted organization theorist once said, "Pressure for change originates in the environment. Pressure for stability originates within the organization." Do you agree?
•Chapter 12: If managers frequently use experience and intuition to make complex, non-programmed decisions, how do they apply evidence-based management (which seems to suggest that managers should rely on facts and data)?
•Chapter 13: In a rapidly changing organization, are decisions more likely to be made using the rational or political model of organization?
•What biblical implications should be included/addressed?
•How can/should a biblical worldview be applied?
Group Discussion Board Forum Thread Grading Rubric
Criteria
Points Possible
Points Earned
Thread
0 to 30 points
All questions associated with Part 1 are provided in a thread.
At least 4 peer-reviewed references are included in the thread.
The thread is 1200 words.
The thread is posted by the stated deadline.
Spelling and grammar are correct.
Sentences are complete, clear, and concise.
Total
.
· Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docxhanneloremccaffery
·
Bakit
Di gaanong kaganda ang pagturo sa UST sa panahon ni Jose Rizal
·
bakit
Merong diskriminasyon; minamaliit ang mga Pilipinosa panahon ni Jose Rizal
·
bakit
Galit sa kay Jose Rizal ang mga Dominikano dahil sa pagtatatag ng Companerismo (Fraternity)
·
bakit
Gustong gamutin ni Jose Rizal ang ina niya
.
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docxhanneloremccaffery
·
YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL
(Healthcare Information Technology)
THIS is NOT and information paper so please read this carefully
Individual Writing Assignment
This Individual Writing Assignment is worth 20 points, and it is due at the end of Week 5.
The purposes of this assignment are to a) help you effectively use research resources through library data bases and search engines to complete course requirements; b) improve your critical thinking skills, and c) develop your effectiveness in writing about topics relevant to course objectives and healthcare information systems. The paper explores, in greater detail than the required readings and class discussion, any healthcare information system topic identified in the course text or syllabus. Your job is to select a current issue in healthcare information systems, provide the necessary background and your position, along with a conclusion and future direction. I encourage you to select a subject in which you have interest and approach this assignment as a potential publishable work.
Position Paper
Your final paper is 15 pages double-spaced (excluding the executive summary, footnotes, and references) with a 10 or 12 point font. Tables, graphics, and diagrams must be placed in the paper as attachments. They do not count in the page length. This is a guide to help you organize your content and what is expected in each section. The page counts are suggested, however, where they have a limit, that must be adhered to.
·
Cover Page:
APA Style (1 Page, not included in page count)
·
Table of Contents:
(not included in page count)
·
Executive Summary:
Bottom line up front (1 page, no more)
·
Introduction
: (1/2 to 1 page)
·
Background
: Information on the topic that provides context so readers can understand the background leading into your statement and analysis of the issue (up to 2 pages, no more)
·
Analysis of the issue
: This is the problem you see with the current state of your topic supported by evidence and literature that brings validity to the issue or problem you are stating exists. Then describe the factors contributing to the issue /problem broken down by (2-3 pages)
People
Processes
Technology
·
Position
: Now that the reader understands the problem broken down by people, process, and technology, provide a clear statement of what your position is on the issue and why. (1/2 to 1 page)
·
Rationale
: Now that the reader clearly understands your position and why you will detail your position with supporting evidence and literature to persuade the reader your position is the most valid. You should address opposing views with counter arguments here also. Your position should have evidence directly addressing the issues you stated above broken down by the same (3-4 pages)
People
Process
Technology
·
Recommendation
: Now that you have convinced the reader on your position being the best way forward, you need to provide 3-5 discrete recommen.
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docxhanneloremccaffery
·
Write
a 750- to 1,
Write
a 750- to 1,200-word paper that addresses the following:
Define religion.
Describe the theory of animism.
Explain the influence of religion on cultures.
Identify the seven major religions of the world.
Describe any four types of theism.
Format
your paper consistent with APA guidelines.
Include
a minimum of five references.
Limit
direct quotes to less than 10% of the total manuscript.
Criteria for grading
·
Introduction provides sufficient background on the topic and previews major points
·
Define religion
·
Describe the theory of animism
·
Explain the influence of religion on cultures (e.g., architecture, art, politics, social norms, etc.)
·
Identify the seven major religions of the world and provide one or two sentences about each
·
Describe any four types of theism (e.g., atheism, monotheism, ditheism, polytheism, pantheism, etc.) and provide an example of each
·
Conclusion
.
[Type here]Ok. This school makes me confused. The summary of t.docxhanneloremccaffery
[Type here]
Ok. This school makes me confused. The summary of this week they posted like this:
SUMMARY:
This week introduced you to grand theories and middle-range theories that serve to articulate the voice of nursing within healthcare.
Here are the key points covered:
Grand theories are comparatively more abstract than middle-range theories since they are at a higher level of abstraction. Compared to grand theories, middle-range theories are made up of limited number of concepts that lend themselves to empirical testing. All theories help to explain human health behavior.
· Sister Callista Royï's adaptive model theory is built on the conceptual foundation of adaptation. It identifies the positive role that nursing plays in the promotion and enhancement of client adaptation to environments that facilitate the healing process.
· Leiningerï's culture care theory is pertinent in the current multicultural healthcare environment where nurses are exposed to diverse cultures.
· Penderï's health promotion and disease prevention theory can be called as a "direction setting exercise" for nursing professionals. It believes in fostering the spirit of health promotion and disease and risk reduction.
From the chapter, Models and Theories Focused on Nursing Goals and Functions, read the following:The Health Promotion Model: Nola J. Pender
From the chapter, Models and Theories Focused on a Systems Approach, read the following:
The Roy Adaptation Model
From the chapter, Models and Theories Focused on Culture, read the following:
Leininger's Cultural Care Diversity and Universality Theory and Model
SO, THAT IS WHY I ASSUMED THAT HAS TO BE ONE OF THEM (Pender, Roy Adaptaion or Leininger)
ANYWAY, I AM PUTTING INFORMATION TOGETHER.
Week 4 Chapter 17
Models and Theories Focused on Nursing Goals and Functions
The Health Promotion Model: Nola J. Pender
Background
Nola J. Pender was born in 1941 in Lansing, Michigan. She graduated in 1962 with a diploma in nursing. In 1964, Pender completed a bachelor’s of science in nursing at Michigan State University. By 1969, she had completed a doctor of philosophy in psychology and education. During this time in her career, Pender began looking at health and nursing in a broad way, including defining the goal of nursing care as optimal health.
In 1975, Pender published a model for preventive health behavior; her health promotion model first appeared in the first edition of the text Health Promotion in Nursing Practice in 1982. Pender’s health promotion model has its foundation in Albert Bandura’s (1977) social learning theory (which postulates that cognitive processes affect behavior change) and is influenced by Fishbein’s (1967) theory of reasoned action (which asserts that personal attitudes and social norms affect behavior).
Pender’s Health Promotion Model
McCullagh (2009) labeled Pender’s health promotion model as a middle-range integrative theory, and rightly so. Fawcett (2005) decisively presented the differenc.
{
Discrimination
*
GENERAL DISCRIMINATION
+
RACIAL DISCRIMINATION
RELIGIOUS DISCRIMINATION
(on freedom of religion)
DISCRIMINATION ON SEXUAL ORIENTATION
(still weak protection)
GENDER DISCRIMINATION
(CEDAW)
TYPES OF DISCRIMINATION
NON-DISCRIMINATION in INT’L LAW
A. GENERAL DISCRIMINATION
Arts 1 & 2 Universal Declaration on Human Rights
Arts. 2 & 26 ICCPR
Art. 14 ECHR & Add. Protocol 12
B. RACIAL DISCRIMINATION
Int’l Convention against All Forms of Racial Discrimination (ICERD)
Art . 2: (1). Each State Party to the present Covenant undertakes to respect and to ensure to all individuals within its territory and subject to its jurisdiction the rights recognized in the present Covenant, without distinction of any kind, such as race, colour, sex, language, religion, political or other opinion, national or social origin, property, birth or other status.
(2). States to take the necessary steps to adopt laws and measures to give effect to art. 2;
(3). States to ensure effective remedy, determined by competent judicial, administrative or legislative authorities, or by any other competent authority and enforce such remedies.
Art. 26: non-discrimination before the law and equal protection by the law
ICCPR
*
Justification for differential treatment
General Comment 18 HRC
Not every differentiation of treatment will constitute discrimination:
if the criteria are reasonable and objective
and the aim is to achieve the purpose which is legitimate
ICCPR cont.
*
“Racial discrimination" shall mean any distinction, exclusion, restriction or preference based on race, colour, descent, or national or ethnic origin which has the purpose or effect of nullifying or impairing the recognition, enjoyment or exercise, on an equal footing, of human rights and fundamental freedoms in the political, economic, social, cultural or any other field of public life (art. 1)
States Parties particularly condemn racial segregation and apartheid and undertake to prevent, prohibit and eradicate all practices of this nature in territories under their jurisdiction (art. 3)
RACIAL DISCRIMINATION-
International Convention on the Elimination of All Forms of Racial Discrimination
Direct discrimination: Indirect discrimination
Formal equality: Substantive equality
Discrimination in law: Discrimination in practice
Non-discrimination: negative protection
Equality: positive obligations -> special measures
Is there a hierarchy in the protection of discrimination?
Racial Discrimination (prohibition Jus Cogens);
gender based discrimination?
Religious-based discrimination??
Discrimination based on sexual orientation???
Discrimination (forms & grounds)
= Affirmative action/ positive action
Article 1.4 of ICERD:
Special measures taken for the sole purpose of securing adequate advancement of certain racial or ethnic groups or individuals requiring such protection as may be necessary in order to ensure such groups or in.
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docxhanneloremccaffery
`HISTORY 252A
Early Modern Europe from 1500 to 1815
Dr. Burton Van Name Edwards (Van)
Tuesday – Thursday 3:30-4:45
Unistructure 247
Third Paper Assignment
Due Tuesday, December 13th
The third paper will be based on a book in the list at the end of the syllabus. These works are generally works of literature, with some concerned with philosophy or politics. The student’s task will be to show how the chosen work reflects or shows the influence of conditions and events in Europe that were operating at the time of the writing of the work. This is not a book report. I am not interested in plots or descriptions of the general argument of a given work. Instead, I am looking for an analysis of specific sections of the chosen work that may illuminate social and economic attitudes or contemporaneous conditions.
The paper should be 7-8 pages long.
You will be expected to give a 5-10 minute oral report based on your finding in the third paper. This oral report will be a significant part of your class participation grade.
.
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docxhanneloremccaffery
^ Acadumy of Management Journal
2001. Vol. 44. No. 2. 219-237.
A SOCIAL CAPITAL THEORY OF CAREER SUCCESS
SCOTT E. SEIBERT
MARIA L. KRAIMER
•̂ ' ' ' Cleveland State University
ROBERT C. LIDEN
University of Illinois at Chicago
A model integrating competing theories of social capital with research on career
success was developed and tested in a sample of 448 employees with various occupa-
tions and organizations. Social capital was conceptualized in terms of network struc-
ture and social resources. Results of structural equation modeling showed that net-
work structure was related to social resources and that the effects of social resources
on career success were hilly mediated by three network benelits: access to information,
access to resources, and career sponsorship.
Organizational researchers have begun to de-
velop increasingly comprehensive models of career
success using demographic, human capital, work-
family, motivational, organizational, and industry
variables (e.g., Dreher & Ash, 1990; Judge & Bretz,
1994: Judge, Cable. Boudreau, & Bretz. 1995; Kirch-
meyer, 1998). Although this work has provided
considerable evidence regarding the determinants
of career outcomes, the roles of informal interper-
sonal behaviors have not been fully explored (Judge
& Bretz, 1994; Pfeffer, 1989). Popular advice for
getting ahead in one's career rarely fails to mention
the importance of networking for the achievement
of career goals (e.g., Bolles, 1992; Kanter, 1977).
Indeed, Luthans, Hodgetts, and Rosenkrantz (1988)
found that the most successful managers in their
study spent 70 percent more time engaged in net-
working activities and 10 percent more time en-
gaged in routine communication activities than
their less successful counterparts. Recent advances
in social capital theory (Coleman, 1990) have begun
to provide a finer-grained analysis of the ways in-
dividuals' social networks affect their careers in
organizations (Burt, 1992, 1997; Ibarra, 1995;
Podolny & Baron, 1997; Sparrowe & Popielarz,
1995). This theoretical perspective has the poten-
Data were collected and the manuscript was submitted
and processed while Scott E. Seibert was in the Manage-
ment Department at the University of Notre Dame and
Maria L. Kraimer was a graduate student at the Univer-
sity of Illinois at Chicago. Support for this project was
provided by the Management Department at the Univer-
sity of Notre Dame and the Alumni Office of the Univer-
sity of Notre Dame. The current investigation is part of a
larger study of career success.
tial to considerably enhance scholars' knowledge of
the role of social processes in career success.
The first purpose of the current study was to
integrate the current conceptualizations of social
capital as they pertain to career success. Tbree dif-
ferent theoretical approaches—weak tie theory
(Granovetter, 1973), structural hole theory (Burt,
1992), and social resource theory (Lin, 1990)—
focus on different network properties as r.
`
Inclusiveness. The main difference that can distinguish a happy employee from disgruntled employee. As with all decisions that are made, there is always an audience that the decision will affect. When employees are privy and organizational decisions are inclusive to employees this can greatly increase their level of fulfillment. Whether or not the end user of the decision will be content with the outcome or not, there will always be critics. Which leads us to discuss key characteristics and the importance of involving employees in relative organizational decision making.
It is not uncommon to find that during strategic organizational planning that top-level management will include their employees to engage and provide their input on complex processes. Human capital, whether the organization is large or small, corporate ran or small business managed is key to an organization’s success. Employee satisfaction level drives productivity and is what increases revenue for the company. Happy employees equal happy customers.
What does it take to keep employees motivated? A critical and important element for employers to keep their employees happy and content is clear communication. It is critical that an organization’s objective and vision for future growth is communicated clearly throughout all levels. Top-level management must be skilled at delivering the company’s mission and values to every tier within their organization. Each tier within the organization with healthy communication should be able to open-mindedly accept the message and freely provide any feedback positive or negative without fear of repercussion. Keeping an open line of communication within an organization is key to building the foundation for success.
As we move away from the golden days of traditional office operations consisting of fax machines, telephones, paper, pencils, etc. and move towards a more technologically repertoire, we lose the personable face to face interaction with one another. We spend most of the day behind our computer screen at our desk. The need to sustain job satisfaction amongst employees could not be ever more present than now. To maintain the morale amongst employees, organizations should be able to keep them challenged and motivated. Take technology for example. If the increase of new technology isn’t daunting enough, consider the challenge to remain current with technology all the while maintaining a competitive advantage in the industry? Reach internally to our internal resource, human capital. Employees must be given the opportunity to share their knowledge, skills, and abilities. When empowered to provide input concerning highly visible organizational decisions, employee morale is boosted. Not only is this beneficial for employees but also the employer as they receive ideas and input that could possibly lead to the solution. Employee engagement boosts the overall welfare of the organization.
According to.
__MACOSX/Sujan Poster/._CNA320 Poster Presentation rubric.pdf
__MACOSX/Sujan Poster/._CNA320+Poster+Template (1).ppt
__MACOSX/Sujan Poster/._Helpful Hints for the Poster Presentation.docx
Sujan Poster/Poster Abstract - Aspiration pneumonia (1).docx
Title: Aspiration pneumonia: Best practice to avoid complications
Background
Aspiration pneumonia is a lung infection due to inhaled contents; this is a relevant topic because aspiration pneumonia is prevalent and accounts for up to 15% of all pneumonia cases and is particularly common in older people, and thus it is important for nurses to be aware of how to manage the condition particularly as the population is ageing so this will be of more concern (Kwong, Howden & Charles 2011).
Target Audience
The target audience for this presentation is experienced Registered Nurses and thus the presentation has been designed for this group.
Main Findings
Aspiration pneumonia is an infection within the lungs that occurs after a person aspirates either liquid, vomit or food into the larynx and lower respiratory tract; this can occur when an individual inhales their gastric or oral contents. Patients at risk include individuals who are elderly or those who have a marked disturbance of consciousness such as that resulting from a drug overdose, seizures, a massive cerebrospinal accident, dysphagia or dysphasia (Kwong, Howden & Charles 2011). Aspiration pneumonia can quickly develop into respiratory failure, abscess and empyema and this requires supportive care, which is the main form of therapy, however prophylactic antimicrobial therapy is also often prescribed (Joundi, Wong & Leis 2015). Best practice suggests suctioning, supplemental oxygen to keep O2 above 90%, septic shock therapy, management of hypotension and antibiotic therapy for 7-10 days. Sputum cultures should be taken so that antibiotics can be tailored appropriately (McAdams-Jones & Sundar 2012).
Implications for Practice
These findings are important for registered nurses to be aware of so that aspiration pneumonia can be managed appropriately and complications can be avoided, which could cause increased hospital stay and costs. Nurses need to be aware of the best practice recommendations such as oxygen supplementation, sit up while eating, provide thickened foods and drinks, dental care and about taking sputum cultures when managing aspiration pneumonia so that treatment can be tailored appropriately and recovery can occur quickly.
Feedback from marker (Teacher)
Thank you for your abstract.
You have just managed a pass grade, your work is very basic and you will need to engage with the basic practice literature to ensure you have a comprehensive understanding of this topic in your poster.
I am also unclear on your focus, is this about prevention of aspiration or management once it has occurred or both?
Kind regards Andrea
Sources of Evidence
Joundi, R, Wong, B & Leis, J 2015, "Antibiotics “Just-In-Ca.
[u03d2] Unit 3 Discussion 2RotationDefine the term rotation as.docxhanneloremccaffery
[u03d2] Unit 3 Discussion 2
Rotation
Define the term rotation as it applies to factor analysis. What is the major difference between orthogonal and oblique rotation? What are the advantages and disadvantages of each? Why would a researcher ever want to use oblique rotation in their research study?
.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
3. student needs
Professional Qualities
4. Professional Development/Growth: The candidate engages in
ongoing
professional development and growth to improve professional
practice.
a. Engages in continuous learning through participation in
professional
development opportunities
b. Applies new ideas to professional practice based on existing
data,
reflection, and intellectual curiosity
c. Engages in ongoing critical reflection of personal
performance to improve
professional practice
5. Advocacy: The candidate advocates for fairness, equity, and
social change
in the learning environment.
a. Displays empathy, fairness, persistence, problem-solving
skills, and
appropriate risk-taking actions on behalf of others
5. c. Creates learning environments that are inclusive; free of bias
and
discrimination and respectful of diverse cultures, values, and
beliefs
d. Engages families and other stakeholders in planning for
individual success
Collaboration
7. Collaboration: The candidate works in collaboration with
others to improve
student learning and advance the profession.
a. Builds partnerships and fosters relationships with
stakeholders to improve
student learning and advance the profession
b. Collaborates with students, families, colleagues, and the
community to
promote positive social change
c. Uses technology to enhance collaboration, strengthen
partnerships, and
foster relationships with others to improve teaching and
learning
6. Communication
8. Communication: The candidate uses effective verbal,
nonverbal, and
technological communication techniques to foster active
inquiry, improve
collaboration, and create positive interactions in the learning
environment.
a. Actively and thoughtfully listens to others
b. Adjusts communication to meet the needs of individual
learners and
changing circumstances
c. Asks probing, thoughtful questions to elicit meaningful
responses
d. Conveys ideas in multiple ways using a professional tone
e. Acknowledges and respects ideas and/or feelings of others;
makes others
feel welcome, valued, and appreciated in their communications
f. Utilizes technological tools to facilitate communication to
improve student
learning and relationships with others
7. Cyber Security and the Internet of Things:
Vulnerabilities,Threats, Intruders
and Attacks
Mohamed Abomhara and Geir M. Køien
Department of Information and Communication Technology,
University of Agder, Norway
Corresponding Authors: {Mohamed.abomhara;
geir.koien}@uia.no
Received 14 September 2014; Accepted 17 April 2015;
Publication 22 May 2015
Abstract
Internet of Things (IoT) devices are rapidly becoming
ubiquitous while IoT
services are becoming pervasive. Their success has not gone
unnoticed and
the number of threats and attacks against IoT devices and
services are on the
increase as well. Cyber-attacks are not new to IoT, but as IoT
will be deeply
interwoven in our lives and societies, it is becoming necessary
to step up
and take cyber defense seriously. Hence, there is a real need to
secure IoT,
which has consequently resulted in a need to comprehensively
understand the
threats and attacks on IoT infrastructure. This paper is an
attempt to classify
9. [3–5].
The number of threats is rising daily, and attacks have been on
the increase
in both number and complexity. Not only is the number of
potential attackers
along with the size of networks growing, but the tools available
to potential
attackers are also becoming more sophisticated, efficient and
effective [6, 7].
Therefore, for IoT to achieve fullest potential, it needs
protection against
threats and vulnerabilities [8].
Security has been defined as a process to protect an object
against physical
damage, unauthorized access, theft, or loss, by maintaining high
confidential-
ity and integrity of information about the object and making
information about
that object available whenever needed [7, 9].According to Kizza
[7] there is no
thing as the secure state of any object, tangible or not, because
no such object
can ever be in a perfectly secure state and still be useful. An
object is secure if
the process can maintain its maximum intrinsic value under
different condi-
tions. Security requirements in the IoT environment are not
different from any
other ICT systems. Therefore, ensuring IoT security requires
maintaining the
highest intrinsic value of both tangible objects (devices) and
intangible ones
(services, information and data).
10. This paper seeks to contribute to a better understanding of
threats and their
attributes (motivation and capabilities) originating from various
intruders like
organizations and intelligence. The process of identifying
threats to systems
and system vulnerabilities is necessary for specifying a robust,
complete set
of security requirements and also helps determine if the security
solution is
secure against malicious attacks [10]. As well as users,
governments and IoT
developers must ultimately understand the threats and have
answers to the
following questions:
1. What are the assets?
2. Who are the principal entities?
3. What are the threats?
4. Who are the threat actors?
5. What capability and resource levels do threat actors have?
6. Which threats can affect what assets?
Cyber security and the Internet of Things 67
7. Is the current design protected against threats?
8. What security mechanisms could be used against threats?
The remainder of this paper is organized as follows. Section 2
pro-
vides a background, definitions, and the primary security and
privacy goals.
Section 3 identifies some attacker motivations and capabilities,
and provides
11. an outline of various sorts of threat actors. Finally, the paper
concludes with
Section 4.
2 Background
The IoT [1, 2, 11] is an extension of the Internet into the
physical world
for interaction with physical entities from the surroundings.
Entities, devices
and services [12] are key concepts within the IoT domain, as
depicted
in Figure 1 [13]. They have different meanings and definitions
among
various projects. Therefore, it is necessary to have a good
understand-
ing of what IoT entities, devices and services are (discussed in
detail in
Section 2.1).
An entity in the IoT could be a human, animal, car, logistic
chain item,
electronic appliance or a closed or open environment [14].
Interaction among
Figure 1 IoT model: key concepts and interactions.
68 M. Abomhara and G. M. Køien
entities is made possible by hardware components called
devices [12] such as
mobile phones, sensors, actuators or RFID tags, which allow the
entities to
connect to the digital world [15].
12. In the current state of technology, Machine-to-Machine (M2M)
is the
most popular application form of IoT. M2M is now widely
employed in
power, transportation, retail, public service management, health,
water, oil
and other industries to monitor and control the user, machinery
and production
processes in the global industry and so on [5, 16, 17].
According to estimates
M2M applications will reach 12 billion connections by 2020 and
generate
approximately 714 billion euros in revenues [2].
Besides all the IoT application benefits, several security threats
are
observed [17–19]. The connected devices or machines are
extremely valuable
to cyber-attackers for several reasons:
1. Most IoT devices operate unattended by humans, thus it is
easy for an
attacker to physically gain access to them.
2. Most IoT components communicate over wireless networks
where an
attacker could obtain confidential information by
eavesdropping.
3. Most IoT components cannot support complex security
schemes due to
low power and computing resource capabilities.
In addition, cyber threats could be launched against any IoT
assets
13. and facilities, potentially causing damage or disabling system
operation,
endangering the general populace or causing severe economic
damage to
owners and users [20, 21]. Examples include attacks on home
automation
systems and taking control of heating systems, air conditioning,
lighting
and physical security systems. The information collected from
sensors
embedded in heating or lighting systems could inform the
intruder when
somebody is at home or out. Among other things, cyber-attacks
could be
launched against any public infrastructure like utility systems
(power sys-
tems or water treatment plants) [22] to stop water or electricity
supply to
inhabitants.
Security and privacy issues are a growing concern for users and
suppliers
in their shift towards the IoT [23]. It is certainly easy to
imagine the amount
of damage caused if any connected devices were attacked or
corrupted.
It is well-recognized that adopting any IoT technology within
our homes,
work, or business environments opens doors to new security
problems. Users
and suppliers must consider and be cautious with such security
and privacy
concerns.
14. Cyber security and the Internet of Things 69
2.1 Understanding IoT Devices and Services
In this section, the main IoT domain concepts that are important
from a
business process perspective are defined and classified, and the
relationships
between IoT components (IoT devices and IoT services) are
described.
2.1.1 IoT device
This is a hardware component that allows the entity to be a part
of the digital
world [12]. It is also referred to as a smart thing, which can be a
home appliance,
healthcare device, vehicle, building, factory and almost
anything networked
and fitted with sensors providing information about the physical
environment
(e.g., temperature, humidity, presence detectors, and pollution),
actuators (e.g.,
light switches, displays, motor-assisted shutters, or any other
action that a
device can perform) and embedded computers [24, 25].
An IoT device is capable of communicating with other IoT
devices and ICT
systems. These devices communicate via different means
including cellular
(3G or LTE), WLAN, wireless or other technologies [8]. IoT
device classifi-
cation depends on size, i.e., small or normal; mobility, i.e.,
mobile or fixed;
external or internal power source; whether they are connected
intermittently
15. or always-on; automated or non-automated; logical or physical
objects; and
lastly, whether they are IP-enabled objects or non IP objects.
The characteristics of IoT devices are their ability to actuate
and/or
sense, the capability of limiting power/energy, connection to the
physical
world, intermittent connectivity and mobility [23]. Some must
be fast and
reliable and provide credible security and privacy, while others
might not
[9]. A number of these devices have physical protection whereas
others are
unattended.
In fact, in IoT environments, devices should be protected
against any
threats that can affect their functionality. However, most IoT
devices are
vulnerable to external and internal attacks due to their
characteristics [16].
It is challenging to implement and use a strong security
mechanism due to
resource constraints in terms of IoT computational capabilities,
memory, and
battery power [26].
2.1.2 IoT services
IoT services facilitate the easy integration of IoT entities into
the service-
oriented architecture (SOA) world as well as service science
[27]. According
to Thoma [28], an IoT service is a transaction between two
parties: the service
provider and service consumer. It causes a prescribed function,
16. enabling
70 M. Abomhara and G. M. Køien
interaction with the physical world by measuring the state of
entities or by
initiating actions that will initiate a change to the entities.
A service provides a well-defined and standardized interface,
offering all
necessary functionalities for interacting with entities and
related processes.
The services expose the functionality of a device by accessing
its hosted
resources [12].
2.1.3 Security in IoT devices and services
Ensuring the security entails protecting both IoT devices and
services
from unauthorized access from within the devices and
externally. Secu-
rity should protect the services, hardware resources, information
and data,
both in transition and storage. In this section, we identified
three key
problems with IoT devices and services: data confidentiality,
privacy and
trust.
Data confidentiality represents a fundamental problem in IoT
devices
and services [27]. In IoT context not only user may access to
data but also
authorized object. This requires addressing two important
17. aspects: first, access
control and authorization mechanism and second authentication
and identity
management (IdM) mechanism. The IoT device needs to be able
to verify
that the entity (person or other device) is authorized to access
the service.
Authorization helps determine if upon identification, the person
or device is
permitted to receive a service. Access control entails controlling
access to
resources by granting or denying means using a wide array of
criteria. Autho-
rization and access control are important to establishing a
secure connection
between a number of devices and services. The main issue to be
dealt with
in this scenario is making access control rules easier to create,
understand
and manipulate. Another aspect that should be consider when
dealing with
confidentiality is authentication and identity management. In
fact this issue
is critical in IoT, because multiple users, object/things and
devices need to
authenticate each other through trustable services. The problem
is to find
solution for handling the identity of user, things/objects and
devices in a secure
manner.
Privacy is an important issue in IoT devices and service on
account of the
ubiquitous character of the IoT environment. Entities are
connected, and data
is communicated and exchanged over the internet, rendering
18. user privacy a
sensitive subject in many research works. Privacy in data
collection, as well as
data sharing and management, and data security matters remain
open research
issues to be fulfilled.
Cyber security and the Internet of Things 71
Trust plays an important role in establishing secure
communication when a
number of things communicate in an uncertain IoT environment.
Two dimen-
sions of trust should be considered in IoT: trust in the
interactions between
entities, and trust in the system from the users perspective [29]
According
to Køien [9] the trustworthiness of an IoT device depends on the
device
components including the hardware, such as processor, memory,
sensors and
actuators, software resources like hardware-based software,
operating system,
drivers and applications, and the power source. In order to gain
user/services
trust, there should be an effective mechanism of defining trust
in a dynamic
and collaborative IoT environment.
2.2 Security Threats, Attacks, and Vulnerabilities
Before addressing security threats, the system assets (system
components)
that make up the IoT must first be identified. It is important to
19. understand the
asset inventory, including all IoT components, devices and
services.
An asset is an economic resource, something valuable and
sensitive owned
by an entity. The principal assets of any IoT system are the
system hardware
(include buildings, machinery, etc.) [11], software, services and
data offered
by the services [30].
2.2.1 Vulnerability
Vulnerabilities are weaknesses in a system or its design that
allow an intruder
to execute commands, access unauthorized data, and/or conduct
denial-of-
service attacks [31, 32]. Vulnerabilities can be found in variety
of areas in
the IoT systems. In particular, they can be weaknesses in system
hardware
or software, weaknesses in policies and procedures used in the
systems and
weaknesses of the system users themselves [7].
IoT systems are based on two main components; system
hardware and
system software, and both have design flaws quite often.
Hardware vulner-
abilities are very difficult to identify and also difficult to fix
even if the
vulnerability were identified due to hardware compatibility and
interoper-
ability and also the effort it take to be fixed. Software
vulnerabilities can
be found in operating systems, application software, and control
20. software
like communication protocols and devices drives. There are a
number of
factors that lead to software design flaws, including human
factors and
software complexity. Technical vulnerabilities usually happen
due to human
weaknesses. Results of not understanding the requirements
comprise starting
72 M. Abomhara and G. M. Køien
the project without a plan, poor communication between
developers and users,
a lack of resources, skills, and knowledge, and failing to
manage and control
the system [7].
2.2.2 Exposure
Exposure is a problem or mistake in the system configuration
that allows
an attacker to conduct information gathering activities. One of
the most
challenging issues in IoT is resiliency against exposure to
physical attacks.
In the most of IoT applications, devices may be left unattended
and likely
to be placed in location easily accessible to attackers. Such
exposure raises
the possibility that an attacker might capture the device, extract
cryptographic
secrets, modify their programming, or replace them with
malicious device
under the control of the attacker [33].
21. 2.2.3 Threats
A threat is an action that takes advantage of security
weaknesses in a system
and has a negative impact on it [34]. Threats can originate from
two primary
sources: humans and nature [35, 36]. Natural threats, such as
earthquakes,
hurricanes, floods, and fire could cause severe damage to
computer systems.
Few safeguards can be implemented against natural disasters,
and nobody
can prevent them from happening. Disaster recovery plans like
backup
and contingency plans are the best approaches to secure systems
against
natural threats. Human threats are those caused by people, such
as malicious
threats consisting of internal [37] (someone has authorized
access) or exter-
nal threats [38] (individuals or organizations working outside
the network)
looking to harm and disrupt a system. Human threats are
categorized into
the following:
• Unstructured threats consisting of mostly inexperienced
individuals who
use easily available hacking tools.
• Structured threats as people know system vulnerabilities and
can under-
stand, develop and exploit codes and scripts. An example of a
structured
threat is Advanced Persistent Threats (APT) [39]. APT is a
sophisticated
22. network attack targeted at high-value information in business
and gov-
ernment organizations, such as manufacturing, financial
industries and
national defense, to steal data [40].
As IoT become a reality, a growing number of ubiquitous
devices has
raise the number of the security threats with implication for the
general
public. Unfortunately, IoT comes with new set of security
threat. There are
Cyber security and the Internet of Things 73
a growing awareness that the new generation of smart-phone,
computers and
other devices could be targeted with malware and vulnerable to
attack.
2.2.4 Attacks
Attacks are actions taken to harm a system or disrupt normal
operations by
exploiting vulnerabilities using various techniques and
tools.Attackers launch
attacks to achieve goals either for personal satisfaction or
recompense. The
measurement of the effort to be expended by an attacker,
expressed in terms
of their expertise, resources and motivation is called attack cost
[32]. Attack
actors are people who are a threat to the digital world [6]. They
could be
hackers, criminals, or even governments [7]. Additional details
23. are discussed
in Section 3.
An attack itself may come in many forms, including active
network
attacks to monitor unencrypted traffic in search of sensitive
information;
passive attacks such as monitoring unprotected network
communications
to decrypt weakly encrypted traffic and getting authentication
information;
close-in attacks; exploitation by insiders, and so on. Common
cyber-attack
types are:
(a) Physical attacks: This sort of attack tampers with hardware
components.
Due to the unattended and distributed nature of the IoT, most
devices
typically operate in outdoor environments, which are highly
susceptible
to physical attacks.
(b) Reconnaissance attacks – unauthorized discovery and
mapping of sys-
tems, services, or vulnerabilities. Examples of reconnaissance
attacks
are scanning network ports [41], packet sniffers [42], traffic
analysis,
and sending queries about IP address information.
(c) Denial-of-service (DoS): This kind of attack is an attempt to
make
a machine or network resource unavailable to its intended users.
Due to low memory capabilities and limited computation
resources,
24. the majority of devices in IoT are vulnerable to resource
enervation
attacks.
(d) Access attacks – unauthorized persons gain access to
networks or devices
to which they have no right to access. There are two different
types of
access attack: the first is physical access, whereby the intruder
can gain
access to a physical device. The second is remote access, which
is done
to IP-connected devices.
(e) Attacks on privacy: Privacy protection in IoT has become
increas-
ingly challenging due to large volumes of information easily
available
74 M. Abomhara and G. M. Køien
through remote access mechanisms. The most common attacks
on user
privacy are:
• Data mining: enables attackers to discover information that is
not
anticipated in certain databases.
• Cyber espionage: using cracking techniques and malicious
software
to spy or obtain secret information of individuals, organizations
or
the government.
25. • Eavesdropping: listening to a conversation between two par-
ties [43].
• Tracking: a users movements can be tracked by the devices
unique
identification number (UID). Tracking a users location
facilitates
identifying them in situations in which they wish to remain
anonymous.
• Password-based attacks: attempts are made by intruders to
duplicate
a valid user password. This attempt can be made in two
different
ways: 1) dictionary attack – trying possible combinations of
letters
and numbers to guess user passwords; 2) brute force attacks –
using
cracking tools to try all possible combinations of passwords to
uncover valid passwords.
(f) Cyber-crimes: The Internet and smart objects are used to
exploit users
and data for materialistic gain, such as intellectual property
theft, identity
theft, brand theft, and fraud [6, 7, 44].
(g) Destructive attacks: Space is used to create large-scale
disruption and
destruction of life and property. Examples of destructive attacks
are
terrorism and revenge attacks.
(h) Supervisory Control and Data Acquisition (SCADA)
Attacks: As any
26. other TCP/IP systems, the SCADA [45] system is vulnerable to
many
cyber attacks [46, 47]. The system can be attacked in any of the
following
ways:
i. Using denial-of-service to shut down the system.
ii. Using Trojans or viruses to take control of the system. For
instance,
in 2008 an attack launched on an Iranian nuclear facility in
Natanz
using a virus named Stuxnet [48].
2.3 Primary Security and Privacy Goals
To succeed with the implementation of efficient IoT security,
we must be
aware of the primary security goals as follows:
Cyber security and the Internet of Things 75
2.3.1 Confidentiality
Confidentiality is an important security feature in IoT, but it
may not be
mandatory in some scenarios where data is presented publicly
[18]. However,
in most situations and scenarios sensitive data must not be
disclosed or read by
unauthorized entities. For instance patient data, private business
data, and/or
military data as well as security credentials and secret keys,
must be hidden
from unauthorized entities.
27. 2.3.2 Integrity
To provide reliable services to IoT users, integrity is a
mandatory security
property in most cases. Different systems in IoT have various
integrity
requirements [49]. For instance, a remote patient monitoring
system will have
high integrity checking against random errors due to
information sensitivities.
Loss or manipulation of data may occur due to communication,
potentially
causing loss of human lives [6].
2.3.3 Authentication and authorization
Ubiquitous connectivity of the IoT aggravates the problem of
authentication
because of the nature of IoT environments, where possible
communication
would take place between device to device (M2M), human to
device, and/or
human to human. Different authentication requirements
necessitate different
solutions in different systems. Some solutions must be strong,
for example
authentication of bank cards or bank systems. On the other
hand, most will
have to be international, e.g., ePassport, while others have to be
local [6].
The authorization property allows only authorized entities (any
authenticated
entity) to perform certain operations in the network.
2.3.4 Availability
A user of a device (or the device itself) must be capable of
accessing services
28. anytime, whenever needed. Different hardware and software
components in
IoT devices must be robust so as to provide services even in the
presence
of malicious entities or adverse situations. Various systems
have different
availability requirements. For instance, fire monitoring or
healthcare monitor-
ing systems would likely have higher availability requirements
than roadside
pollution sensors.
2.3.5 Accountability
When developing security techniques to be used in a secure
network, account-
ability adds redundancy and responsibility of certain actions,
duties and
76 M. Abomhara and G. M. Køien
planning of the implementation of network security policies.
Accountability
itself cannot stop attacks but is helpful in ensuring the other
security techniques
are working properly. Core security issues like integrity and
confidentiality
may be useless if not subjected to accountability. Also, in case
of a repudiation
incident, an entity would be traced for its actions through an
accountability
process that could be useful for checking the inside story of
what happened
and who was actually responsible for the incident.
29. 2.3.6 Auditing
A security audit is a systematic evaluation of the security of a
device or service
by measuring how well it conforms to a set of established
criteria. Due to
many bugs and vulnerabilities in most systems, security
auditing plays an
important role in determining any exploitable weaknesses that
put the data
at risk. In IoT, a systems need for auditing depends on the
application and
its value.
2.3.7 Non-repudiation
The property of non-repudiation produces certain evidence in
cases where the
user or device cannot deny an action. Non-repudiation is not
considered an
important security property for most of IoT. It may be
applicable in certain
contexts, for instance, payment systems where users or
providers cannot deny
a payment action.
2.3.8 Privacy goals
Privacy is an entitys right to determine the degree to which it
will interact with
its environment and to what extent the entity is willing to share
information
about itself with others. The main privacy goals in IoT are:
• Privacy in devices – depends on physical and commutation
privacy.
Sensitive information may be leaked out of the device in cases
of device
theft or loss and resilience to side channel attacks.
30. • Privacy during communication – depends on the availability of
a device,
and device integrity and reliability. IoT devices should
communicate only
when there is need, to derogate the disclosure of data privacy
during
communication.
• Privacy in storage – to protect the privacy of data stored in
devices, the
following two things should be considered:
• Possible amounts of data needed should be stored in devices.
Cyber security and the Internet of Things 77
• Regulation must be extended to provide protection of user data
after
end-of-device life (deletion of the device data (Wipe) if the
device
is stolen, lost or not in use).
• Privacy in processing – depends on device and communication
integrity
[50]. Data should be disclosed to or retained from third parties
without
the knowledge of the data owner.
• Identity privacy – the identity of any device should only
discovered by
authorized entity (human/device).
• location privacy – the geographical position of relevant device
31. should
only discovered by authorized entity (human/device) [51].
3 Intruders, Motivations and Capabilities
Intruders have different motives and objectives, for instance,
financial
gain, influencing public opinion, and espionage, among many
others. The
motives and goals of intruders vary from individual attackers to
sophisticated
organized-crime organizations.
Intruders also have different levels of resources, skill, access
and risk
tolerance leading to the portability level of an attack occurring
[52]. An
insider has more access to a system than outsiders. Some
intruders are well-
funded and others work on a small budget or none. Every
attacker chooses
an attack that is affordable, an attack with good return on the
investment
based on budget, resources and experience [6]. In this section,
intruders are
categorized according to characteristics, motives and objectives,
capabilities
and resources.
3.1 Purpose and Motivation of Attack
Government websites, financial systems, news and media
websites, military
networks, as well as public infrastructure systems are the main
targets
for cyber-attacks. The value of these targets is difficult to
32. estimate, and
estimation often varies between attacker and defender. Attack
motives
range from identity theft, intellectual property theft, and
financial fraud,
to critical infrastructure attacks. It is quite difficult to list what
motivates
hackers to attack systems. For instance, stealing credit card
information
has become a hackers hobby nowadays, and electronic terrorism
orga-
nizations attack government systems in order to make politics,
religion
interest.
78 M. Abomhara and G. M. Køien
3.2 Classification of Possible Intruders
A Dolev-Yao (DY) type of intruder shall generally be assumed
[53, 54]. That
is, an intruder which is in effect the network and which may
intercept all
or any message ever transmitted between IoT devices and hubs.
The DY
intruder is extremely capable but its capabilities are slightly
unrealistic. Thus,
safety will be much stronger if our IoT infrastructure is
designed to be
DY intruder resilient. However, the DY intruder lacks one
capability that
ordinary intruders may have, namely, physical compromise.
Thus, tamper-
proof devices are also greatly desirable. This goal is of course
33. unattainable,
but physical tamper resistance is nevertheless a very important
goal, which,
together with tamper detection capabilities (tamper evident)
may be a sufficient
first-line defense.
In the literature intruders are classified into two main types:
internal and
external. Internal intruders are users with privileges or
authorized access to a
system with either an account on a server or physical access to
the network
[21, 37]. External intruders are people who do not belong to the
network
domain. All intruders, whether internal or external, can be
organized in many
ways and involve individual attackers to spy agencies working
for a country.
The impact of an intrusion depends on the goals to be achieved.
An individual
attacker could have small objectives while spy agencies could
have larger
motives [55]. The various types of intruders will be discussed
hereby based
on their numbers, motives and objectives.
3.2.1 Individuals
Individual hackers are professionals who work alone and only
target systems
with low security [55]. They lack resources or expertise of
professional
hacking teams, organizations or spy agencies. Individual hacker
targets are
relatively small in size or diversity and the attacks launched
have rela-
34. tively lower impact than ones launched by organized groups
(discussed in
3.2.2). Social engineering techniques are most commonly used
by individual
attackers, as they have to obtain basic information about a
target system
like the address, password, port information, etc. Public and
social media
websites are the most common places where general users can
be deceived
by hackers. Moreover, operating systems used on laptops, PCs,
and mobile
phones have common and known vulnerabilities exploitable by
individual
attackers.
Financial institutions such as banks are also major targets for
individual
attackers as they know that such types of networks carry
financial transactions
that can be hacked, and thus attackers can manipulate the
information in
Cyber security and the Internet of Things 79
their interest. Credit card information theft has a long history
with individual
hackers. With the growth of e-commerce, it is easier to use
stolen credit card
information to buy goods and services.
Individual hackers use tools such as viruses, worms and sniffers
to exploit
a system. They plan attacks based on equipment availability,
35. internet access
availability, the network environment and system security.
One of the individual hacker categories is the insider [21, 37].
Insiders are
authorized individuals working against a system using insider
knowledge or
privileges. Insiders could provide critical information for
outsider attackers
(third party) to exploit vulnerabilities that can enable an attack.
They know the
weak points in the system and how the system works. Personal
gain, revenge,
and financial gain can motivate an insider. They can tolerate
risk ranging from
low to high depending on their motivation.
3.2.2 Organized groups
Criminal groups are becoming more familiar with ongoing
communications
and IoT technology. In addition, as they become more
comfortable with
technological applications, these groups can be more aware of
opportuni-
ties offered by the infrastructure routing information of
different networks.
The motivations of these groups are quite diverse; their targets
typically
include particular organizations for revenge, theft of trade
secrets, economic
espionage, and targeting the national information infrastructure.
They also
involve selling personal information, such as financial data, to
other criminal
organizations, terrorists, and even governments.
36. They are very capable in terms of financial funding, expertise
and
resources. Criminal groups capabilities in terms of methods and
techniques are
moderate to high depending on what the goals are. They are
very skillful at
creating botnets and malicious software (e.g., computer viruses
and scare-
ware) and denial-of-service attack methods [44]. Organized
criminals are
likely to have access to funds, meaning they can hire skilled
hackers if
necessary, or purchase point-and-click attack tools from the
underground
economy with which to attack any systems [46]. Such criminals
can tolerate
higher risk than individual hackers and are willing to invest in
profitable
attacks.
Cyber terrorism [21, 56] is a form of cyber-attack that targets
military
systems, banks, and specific facilities such as satellites, and
telecommunica-
tion systems associated with the national information
infrastructure based on
religious and political interests. Terrorist organizations depend
on the internet
to spread propaganda, raise funds, gather information, and
communicate
80 M. Abomhara and G. M. Køien
with co-conspirators in all parts of the world. Another prevalent
37. group of
criminal organization entails hacktivists. Hacktivists are groups
of hackers
who engage in activities such as denial-of-service, fraud, and/or
identity
theft. Also, some of these groups have political motivations,
like the Syrian
Electronic Army (SEA) [57], Iranian Cyber Army and Chinese
cyber-warfare
units [58].
3.2.3 Intelligence agency
Intelligence agencies from different countries are persistent in
their efforts to
probe the military systems of other countries for specific
purposes, for example
industrial espionage, and political and military espionage. To
accomplish their
objectives, the agencies require a large number of experts,
infrastructure
ranging from research and development entities to provide
technologies
and methodologies (hardware, software, and facilities) besides
financial and
human resources.
Such agencies have organized structures and sophisticated
resources to
accomplish their intrusion goals. This sort of agencies are the
biggest threat
to networks and necessitate tight surveillance and monitoring
approaches to
safeguard against threats to the information systems of prime
importance for
any country and military establishment.
38. 4 Discussion and Conclusions
4.1 Discussion
The exponential growth of the IoT has led to greater security
and privacy
risks. Many such risks are attributable to device vulnerabilities
that arise from
cybercrime by hackers and improper use of system resources.
The IoT needs
to be built in such a way as to ensure easy and safe usage
control. Consumers
need confidence to fully embrace the IoT in order to enjoy its
benefits and
avoid security and privacy risks.
The majority of IoT devices and services are exposed to a
number
of common threats as discussed earlier, like viruses and denial-
of-service
attacks. Taking simple steps to avoid such threats and dealing
with system
vulnerabilities is not sufficient; thus, ensuring a smooth policy
implementation
process supported by strong procedures is needed.
The security development process requires thorough
understanding of a
systems assets, followed by identifying different vulnerabilities
and threats
that can exist. It is necessary to identify what the system assets
are and what
Cyber security and the Internet of Things 81
39. the assets should be protected against. In this paper, assets were
defined
as all valuable things in the system, tangible and intangible,
which require
protection. Some general, IoT assets include system hardware,
software, data
and information, as well as assets related to services, e.g.
service reputation.
It has been shown that it is crucial to comprehend the threats
and system weak-
nesses in order to allocate better system mitigation. In addition,
understanding
potential attacks allows system developers to better determine
where funds
should be spent. Most commonly known threats have been
described as DoS,
physical attacks and attacks on privacy.
Three different types of intruders were discussed in this paper,
namely indi-
vidual attacks, organized groups, and intelligence agencies.
Each attacker type
has different skill levels, funding resources, motivation, and
risk tolerance.
It is very important to study the various types of attack actors
and determine
which are most likely to attack a system. Upon describing and
documenting
all threats and respective actors, it is easier to perceive which
threat could
exploit what weakness in the system. Generally, it is assumed
that IoT
intruder has full DY intruder capabilities in addition to some
limited physical
compromise power. We will presume that physical compromise
40. attacks do
not scale, and they will therefore only at-worst affect a limited
population
of the total number of IoT devices. IoT architecture must
consequently be
designed to cope with compromised devices and be competent
in detecting
such incidents. It is concluded that attackers employ various
methods, tools,
and techniques to exploit vulnerabilities in a system to achieve
their goals or
objectives. Understanding attackers motives and capabilities is
important for
an organization to prevent potential damage. To reduce both
potential threats
and their consequences, more research is needed to fill the gaps
in knowledge
regarding threats and cybercrime and provide the necessary
steps to mitigate
probable attacks.
5 Conclusions
IoT faces a number of threats that must be recognized for
protective action to
be taken. In this paper, security challenges and security threats
to IoT were
introduced. The overall goal was to identify assets and
document potential
threats, attacks and vulnerabilities faced by the IoT.
An overview of the most important IoT security problems was
provided,
with particular focus on security challenges surrounding IoT
devices and
services. Security challenges, such as confidentiality, privacy
41. and entity
trust were identified. We showed that in order to establish more
secure and
82 M. Abomhara and G. M. Køien
readily available IoT devices and services, security and privacy
challenges
need to be addressed. The discussion also focused upon the
cyber threats
comprising actors, motivation, and capability fuelled by the
unique charac-
teristics of cyberspace. It was demonstrated that threats from
intelligence
agencies and criminal groups are likely to be more difficult to
defeat than
those from individual hackers. The reason is that their targets
may be much
less predictable while the impact of an individual attack is
expected to be
less severe.
It was concluded that much work remains to be done in the area
of IoT secu-
rity, by both vendors and end-users. It is important for
upcoming standards to
address the shortcomings of current IoT security mechanisms.
As future work,
the aim is to gain deeper understanding of the threats facing IoT
infrastructure
as well as identify the likelihood and consequences of threats
against IoT.
Definitions of suitable security mechanisms for access control,
authentication,
42. identity management, and a flexible trust management
framework should
be considered early in product development. We hope this
survey will be
useful to researchers in the security field by helping identify the
major issues
in IoT security and providing better understanding of the threats
and their
attributes originating from various intruders like organizations
and intelligence
agencies.
References
[1] L. Atzori, A. Iera, and G. Morabito, “The internet of things:
A survey,”
Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
[2] S. Andreev and Y. Koucheryavy, “Internet of things, smart
spaces, and
next generation networking,” Springer, LNCS, vol. 7469, p.
464, 2012.
[3] J. S. Kumar and D. R. Patel, “A survey on internet of things:
Security and
privacy issues,” International Journal of Computer
Applications, vol. 90,
no. 11, pp. 20–26, March 2014, published by Foundation of
Computer
Science, New York, USA.
[4] A. Stango, N. R. Prasad, and D. M. Kyriazanos, “A threat
analy-
sis methodology for security evaluation and enhancement
planning,”
in Emerging Security Information, Systems and Technologies,
43. 2009.
SECURWARE’09. Third International Conference on. IEEE,
2009,
pp. 262–267.
[5] D. Jiang and C. ShiWei, “A study of information security
for m2m of
iot,” in Advanced Computer Theory and Engineering (ICACTE),
2010
3rd International Conference on, vol. 3. IEEE, 2010, pp. V3–
576.
Cyber security and the Internet of Things 83
[6] B. Schneier, Secrets and lies: digital security in a networked
world. John
Wiley & Sons, 2011.
[7] J. M. Kizza, Guide to Computer Network Security. Springer,
2013.
[8] M. Taneja, “An analytics framework to detect compromised
iot devices
using mobility behavior,” in ICT Convergence (ICTC), 2013
Interna-
tional Conference on. IEEE, 2013, pp. 38–43.
[9] G. M. Koien and V. A. Oleshchuk, Aspects of Personal
Privacy in
Communications-Problems, Technology and
44. Solution
s. River Publishers,
2013.
[10] N. R. Prasad, “Threat model framework and methodology
for personal
networks (pns),” in Communication Systems Software and
Middleware,
2007. COMSWARE 2007. 2nd International Conference on.
IEEE, 2007,
pp. 1–6.
[11] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H.
Sundmaeker,
A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer
et al.
“Internet of things strategic research roadmap,” Internet of
Things-
Global Technological and Societal Trends, pp. 9–52, 2011.
[12] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service
modelling for
45. the internet of things,” in Computer Science and Information
Systems
(FedCSIS), 2011 Federated Conference on. IEEE, 2011, pp.
949–955.
[13] G. Xiao, J. Guo, L. Xu, and Z. Gong, “User interoperability
with
heterogeneous iot devices through transformation,” 2014.
[14] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,
“Internet of
things (iot): A vision, architectural elements, and future
directions,”
Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–
1660,
2013.
[15] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, “From
today’s intranet
of things to a future internet of things: a wireless-and mobility-
related
view,” Wireless Communications, IEEE, vol. 17, no. 6, pp. 44–
51,
2010.
46. [16] C. Hongsong, F. Zhongchuan, and Z. Dongyan, “Security
and trust
research in m2m system,” in Vehicular Electronics and Safety
(ICVES), 2011 IEEE International Conference on. IEEE, 2011,
pp. 286–290.
[17] I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V.
Meyerstein, “Trust
in m2m communication,” Vehicular Technology Magazine,
IEEE, vol. 4,
no. 3, pp. 69–75, 2009.
[18] J. Lopez, R. Roman, and C. Alcaraz, “Analysis of security
threats,
requirements, technologies and standards in wireless sensor
networks,”
84 M. Abomhara and G. M. Køien
in Foundations of Security Analysis and Design V. Springer,
2009,
pp. 289–338.
47. [19] R. Roman, J. Zhou, and J. Lopez, “On the features and
challenges
of security and privacy in distributed internet of things,”
Computer
Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
[20] Y. Cheng, M. Naslund, G. Selander, and E. Fogelstrom,
“Privacy in
machine-to-machine communications a state-of-the-art survey,”
in Com-
munication Systems (ICCS), 2012 IEEE International
Conference on.
IEEE, 2012, pp. 75–79.
[21] M. Rudner, “Cyber-threats to critical national
infrastructure: An intelli-
gence challenge,” International Journal of Intelligence and
CounterIn-
telligence, vol. 26, no. 3, pp. 453–481, 2013.
[22] R. Kozik and M. Choras, “Current cyber security threats
and chal-
lenges in critical infrastructures protection,” in Informatics and
Appli-
cations (ICIA), 2013 Second International Conference on. IEEE,
48. 2013,
pp. 93–97.
[23] P. N. Mahalle, N. R. Prasad, and R. Prasad, “Object
classification based
context management for identity management in internet of
things,”
International Journal of Computer Applications, vol. 63, no. 12,
pp. 1–6,
2013.
[24] A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and
T. Razafind-
ralambo, “A survey on facilities for experimental internet of
things
research,” Communications Magazine, IEEE, vol. 49, no. 11,
pp. 58–67,
2011.
[25] Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot, and L.
Gurgen,
“Sharing user iot devices in the cloud,” in Internet of Things
(WF-IoT),
2014 IEEE World Forum on. IEEE, 2014, pp. 373–374.
49. [26] G. M. Køien, “Reflections on trust in devices: an informal
survey
of human trust in an internet-of-things context,” Wireless
Personal
Communications, vol. 61, no. 3, pp. 495–510, 2011.
[27] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac,
“Internet of
things: Vision, applications and research challenges,” Ad Hoc
Networks,
vol. 10, no. 7, pp. 1497–1516, 2012.
[28] M. Thoma, S. Meyer, K. Sperner, S. Meissner, and T.
Braun, “On iot-
services: Survey, classification and enterprise integration,” in
Green
Computing and Communications (GreenCom), 2012 IEEE
International
Conference on. IEEE, 2012, pp. 257–260.
[29] M. Abomhara and G. Koien, “Security and privacy in the
internet of
things: Current status and open issues,” in PRISMS 2014 The
2nd
50. Cyber security and the Internet of Things 85
International Conference on Privacy and Security in Mobile
Systems
(PRISMS 2014), Aalborg, Denmark, May 2014.
[30] D. Watts, “Security and vulnerability in electric power
systems,” in 35th
North American power symposium, vol. 2, 2003, pp. 559–566.
[31] D. L. Pipkin, Information security. Prentice Hall PTR,
2000.
[32] E. Bertino, L. D. Martino, F. Paci, and A. C. Squicciarini,
“Web
services threats, vulnerabilities, and countermeasures,” in
Security
for Web Services and Service-Oriented Architectures. Springer,
2010,
pp. 25–44.
[33] D. G. Padmavathi, M. Shanmugapriya et al., “A survey of
attacks,
51. security mechanisms and challenges in wireless sensor
networks,” arXiv
preprint arXiv:0909.0576, 2009.
[34] H. G. Brauch, “Concepts of security threats, challenges,
vulnerabilities
and risks,” in Coping with Global Environmental Change,
Disasters and
Security. Springer, 2011, pp. 61–106.
[35] K. Dahbur, B. Mohammad, and A. B. Tarakji, “A survey of
risks,
threats and vulnerabilities in cloud computing,” in Proceedings
of the
2011 International conference on intelligent semantic Web-
services and
applications. ACM, 2011, p. 12.
[36] R. K. Rainer and C. G. Cegielski, Introduction to
information systems:
Enabling and transforming business. John Wiley & Sons, 2010.
[37] A. J. Duncan, S. Creese, and M. Goldsmith, “Insider
attacks in cloud
computing,” in Trust, Security and Privacy in Computing and
52. Communi-
cations (TrustCom), 2012 IEEE 11th International Conference
on. IEEE,
2012, pp. 857–862.
[38] P. Baybutt, “Assessing risks from threats to process plants:
Threat
and vulnerability analysis,” Process Safety Progress, vol. 21,
no. 4,
pp. 269–275, 2002.
[39] C. Tankard, “Advanced persistent threats and how to
monitor and deter
them,” Network security, vol. 2011, no. 8, pp. 16–19, 2011.
[40] F. Li, A. Lai, and D. Ddl, “Evidence of advanced persistent
threat: A case
study of malware for political espionage,” in Malicious and
Unwanted
Software (MALWARE), 2011 6th International Conference on.
IEEE,
2011, pp. 102–109.
[41] S. Ansari, S. Rajeev, and H. Chandrashekar, “Packet
sniffing: a brief
53. introduction,” Potentials, IEEE, vol. 21, no. 5, pp. 17–19, 2002.
[42] M. De Vivo, E. Carrasco, G. Isern, and G. O. de Vivo, “A
review of
port scanning techniques,” ACM SIGCOMM Computer
Communication
Review, vol. 29, no. 2, pp. 41–48, 1999.
86 M. Abomhara and G. M. Køien
[43] I. Naumann and G. Hogben, “Privacy features of european
eid card
specifications,” Network Security, vol. 2008, no. 8, pp. 9–13,
2008.
[44] C. Wilson, “Botnets, cybercrime, and cyberterrorism:
Vulnerabilities and
policy issues for congress.” DTIC Document, 2008.
[45] A. Daneels and W. Salter, “What is scada,” in International
Conference
on Accelerator and Large Experimental Physics Control
Systems, 1999,
54. pp. 339–343.
[46] A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke,
“Scada
security in the light of cyber-warfare,” Computers & Security,
vol. 31,
no. 4, pp. 418–436, 2012.
[47] V. M. Igure, S. A. Laughter, and R. D. Williams, “Security
issues in scada
networks,” Computers & Security, vol. 25, no. 7, pp. 498–506,
2006.
[48] M. Kelleye, “Business Insider. The Stuxnet attack on Irans
Nuclear Plant was Far more Dangerous Than Previously
Thought,”
http://www.businessinsider.com/stuxnet-was-far-more-
dangerous-than-
previous-thought-2013-11/,2013, [Online; accessed 03-Sep-
2014].
[49] B. Jung, I. Han, and S. Lee, “Security threats to internet: a
korean
multi-industry investigation,” Information & Management, vol.
38, no. 8,
55. pp. 487–498, 2001.
[50] C. P. Mayer, “Security and privacy challenges in the
internet of things,”
Electronic Communications of the EASST, vol. 17, 2009.
[51] A. R. Beresford, “Location privacy in ubiquitous
computing,” Com-
puter Laboratory, University of Cambridge, Tech. Rep, vol. 612,
2005.
[52] S. Pramanik, “Threat motivation,” in Emerging
Technologies for a
Smarter World (CEWIT), 2013 10th International Conference
and Expo
on. IEEE, 2013, pp. 1–5.
[53] D. Dolev and A. C. Yao, “On the security of public key
protocols,”
Information Theory, IEEE Transactions on, vol. 29, no. 2, pp.
198–208,
1983.
[54] I. Cervesato, “The dolev-yao intruder is the most powerful
attacker,”
56. in 16th Annual Symposium on Logic in Computer ScienceLICS,
vol. 1.
Citeseer, 2001.
[55] J. Sheldon, “State of the art:Attackers and targets in
cyberspace,” Journal
of Military and Strategic Studies, vol. 14, no. 2, 2012.
[56] E. M. Archer, “Crossing the rubicon: Understanding cyber
terrorism
in the european context,” The European Legacy, no. ahead-of-
print,
pp. 1–16, 2014.
Cyber security and the Internet of Things 87
[57] A. K. Al-Rawi, “Cyber warriors in the middle east: The
case of the syrian
electronic army,” Public Relations Review, 2014.
[58] D. Ball, “Chinas cyber warfare capabilities,” Security
Challenges,
vol. 7, no. 2, pp. 81–103, 2011.
57. Biographies
M. Abomhara is currently pursuing his PhD at University of
Agder, Norway.
His research work is in the area of computer security,
information secu-
rity, information system management, cyber-security, and
Internet of things.
He received a Master of Computer Science (Data
Communication and
Computer Network) from University of Malaya, Malaysia in
2011. He also
received a Master of Business Administration (MBA,
Information technology
management) from Multimedia University, Malaysia in 2013
and a Bachelor
of Computer Science from 7th October University, Libya in
2006.
G. M. Køien is an associate professor in security and privacy in
ICT at the
University of Agder, Norge. He has previously worked for
Ericsson Norway,
System Sikkerhet AS and Telenor R & D. During his time with
58. Telenor
R & D he was the Telenor delegate to the SA3 (3GPP) work
group on security.
He received his PhD for Aalborg University, Denmark in 2008.
42 Kappan November 2015
The top and bottom of
leadership and change
Successful large-scale reform efforts — one in Northern
England, another in
Canada — bolster the approach of “leading from the middle.”
by andy hargreaves and mel ainscow
For 15 years and more, in the U.S., England, parts of Canada,
and elsewhere, reforms
to improve educational equity and achievement have come in
large-scale measures — de-
signed and delivered in detail by big government across whole
59. systems. Such top-down
reforms promised a sharp focus on improving literacy and
mathematics achievement and
boosting high school graduation.
Image: Thinkstock/iStock
V97 N3 kappanmagazine.org 43
Comments?
Like PDK at www.
facebook.com/pdkintl
Training, coaching, and other professional development
supports accompanied some
top-down strategies. Others, like the No Child Left Behind law,
proved excessively de-
manding, requiring progress for all categories of students every
year and imposing puni-
tive consequences when schools and districts fell short.
But punitive or supportive, all top-down reforms have an
Achilles heel: Their focus
60. on micromanaging two or three measurable priorities only
works for systems pursuing
traditional and comparatively narrow achievement goals. A
digital age of complex skills,
cultural diversity, and high-speed change calls for more
challenging educational goals and
more sophisticated and fl exible change strategies.
Thus, reformers are advocating greater autonomy for schools
and teachers, increased
freedom for local curriculum design, and more independent and
personalized access to
technology. But the history of bottom-up innovation and
individual school autonomy is
not impressive. In the 1960s and ’70s, innovative ideas often
didn’t spread beyond a few
isolated classrooms and schools, and, when they did, their
implementation often was fatally
fl awed (Gross, Giacquinta, & Bernstein, 1971). There is no
reason to believe that efforts
to spread the success of a few innovative, high-tech schools will
fare any better today.
andy haRgReaVes ([email protected]) is the Brennan Chair in
Education in the Lynch School of Education at Boston
61. College, Chestnut Hill, Mass. He is co-author of Uplifting
Leadership (Wiley, 2014). mel ainscoW is a professor of
education at
the University of Manchester, United Kingdom, and author of
Toward self-improving school systems: Lessons from a city
challenge
(Routledge, 2015).
What can the U.S. learn from
england and canada?
3Top-down reforms have a long
history of failure. A middle-driven
approach of coordinated change,
collective responsibility, and delegating
resources and authority to school
districts can yield positive results.
62. 44 Kappan November 2015
2014; Sutton Trust, 2015). This has created a co-
nundrum of district-driven improvement:
Although all high-performing nations are
characterized by strong local control, not all
nations with strong local control are high per-
forming.
One response to this conundrum is to say that
school districts aren’t worth saving and either deliver
reforms in detail from the top or institute market-
based, individual alternatives like charter schools,
free schools, and academies that are insulated from
district control. Another response is to use central
funding formulas to compensate for bad variation
and inequities. However, the strings attached to this
funding often heap more grant writing and account-
ability requirements on already overstretched high-
poverty districts.
leading from the middle
63. A third way to reduce bad variation among school
districts is to promote collaboration among them so
they share resources, ideas, and expertise and exer-
cise collective responsibility for student success. In
this leading from the middle approach, districts don’t
just mediate and manage other people’s reforms
individually; they become the collective drivers of
change and improvement together. When districts
lead from the middle together, they:
• Respond to local needs and diversities;
• Take collective responsibility for all students’
and each other’s success;
• Exercise initiative rather than implementing
other people’s initiatives;
• Integrate their own efforts with broad system
priorities; and
• Establish transparency of participation and
results.
These components of leading from the middle are
64. In an age of innovation and diversity, top-down
strategies are inappropriate, while bottom-up strat-
egies seem unable to achieve improvement on any
significant scale. So what should we do instead?
One possibility is shifting attention toward districts,
which can support schools and teachers in innovating
and improving together.
leading in the middle
In North America and Northern Europe, school
districts have historically been the linchpin of local
democracy (Katz, 1987; Bryk et al., 1998). California
Gov. Jerry Brown has recognized this by returning
education spending control back to the state’s over
900 local districts, placing maximum control at the
most local level of competent authority (Torlakson,
2015). Districts can provide a valuable focus for school
improvement, be a means for efficient and effective
use of research evidence and data analysis across
schools, support schools in responding coherently to
multiple external reform demands, and be champi-
ons for families and students, making sure everybody
gets a fair deal. Strong districts are powerful forces
65. for positive educational change (Leithwood, 2013).
Strong and steadily improving districts like Boston
Public Schools and Long Beach Public Schools have
received widespread acclaim for systemwide gains
(Barber, Chijioke, & Mourshed, 2011). In England,
some of the most dramatic turnarounds have been in
urban districts, like the London boroughs of Hackney
and Tower Hamlets, which went from the lowest per-
formers in the country to scoring above the national
average on all key indicators (Hargreaves, Boyle, &
Harris, 2014; Hargreaves & Shirley, 2009).
So some reformers argue that the middle level
needs a stronger role in order to implement changes
from the top and to move around ideas and strategies
percolating up (Schleicher, 2015). This amounts to
a kind of leadership in the middle — a healthy sort
of middle-stage spread.
Weaknesses of the middle
Leading in the middle is promising, but it’s not
enough. Not all local school systems or districts are
strong. Some districts do well; others fare badly.
Districts vary in their resources and capacities for
66. change, like networking and seeking other ideas.
Districts can be self-serving, politically toxic, gla-
cially slow at driving improvement, and, as in the
Atlanta cheating scandal, just plain corrupt.
In the U.S. and England especially, there are unac-
ceptable variations in school district quality. Differ-
ences in demographics, poverty, funding, and capac-
ity to attract and develop effective leadership means
very high-performing and very low-performing
districts sometimes coexist side-by-side (Noguera,
Large-scale success cannot be
achieved if districts continue to act
independently of one another.
V97 N3 kappanmagazine.org 45
land as head teachers) changed the cultures of the
schools. Instead of blaming parents in poor families
for not being interested in their children’s learning,
schools came to appreciate the stresses facing fam-
ilies and then responded with local flexibility and
67. intensive support. They began to focus on deliver-
ing better, more interesting teaching and learning
through strategies like cooperative learning and
Japanese lesson study. There was a lot of pressure
on teachers and schools to work hard to improve
results, but there also was more emphasis on caring
for the adults in the schools as well as the children
so that the schools became happy and professionally
fulfilling places to work.
None of this was easy. Local authorities are politi-
cal entities as well as providers of services. Internal
conflicts and external turf wars were often exacer-
bated by national policies that promote interschool
competition. A steering committee involving na-
tional government and local representatives got
locked into conflicts over the budget. A commit-
tee of leaders of the 10 authorities became fractious
evident in two systemwide reforms in which we have
been closely involved — the Greater Manchester
Challenge (GMC) in England, and district-driven
improvements in Ontario, Canada.
greater manchester challenge
68. The United Kingdom government initiated the
GMC in the 2007-08 school year by bringing to-
gether 10 school districts (known in the UK as local
authorities) to improve standards over three years.
Co-author and professor of education Mel Ainscow
was appointed chief adviser to this approximately
$80 million (U.S.) project. “There are lots of good
things going on in schools in Greater Manchester,”
Ainscow said upon his appointment. “The task now
is to spread the best practice to all schools.”
But how would this be done? Ainscow’s group de-
vised several principles for the effort:
• Leaders of successful schools would work with
weaker schools to improve their leadership
teams;
• Schools with similar student populations would
be clustered to share best practices; and
• Local problems would be met with local
solutions.
69. Getting schools to collaborate was not a new idea
in England. What was different, though, was that
while previous school-to-school networks and part-
nerships had tended to bypass local authorities, 10
of them would be driving improvement together (see
Ainscow, 2015 for a full account of the GMC).
Multiple strategies brought this simple principle
to life. Schools cooperated across authority bound-
aries. Recently turned-around schools became key
in helping other schools. Hub schools that demon-
strated excellence in particular areas provided ex-
tensive training and development for teachers in
other schools and local authorities. Schools at dif-
ferent stages of development organized in “families.”
A Jewish school assisted a predominantly Muslim
partner. A Catholic school prayed for a good in-
spection result for its secular counterpart. School
officials found hidden capacity and capitalized on it;
they shared knowledge and overcame old rivalries
for the higher purpose of improving the whole area.
The Manchester area had suffered from historic
problems of unemployment and deprivation for four
decades, but by 2011, GMC schools were above the
70. national average on all standardized test measures.
Secondary schools in the most disadvantaged com-
munities improved at three times the rate of the na-
tional average.
By working together, principals (known in Eng-
Punitive or supportive, all versions of
top-down reform have an Achilles heel.
whenever it was presented with disturbing data or
with concerns about lack of progress. While six of
the authorities were willing to change roles and re-
sponsibilities, two others accommodated the new
language of shared responsibility for improvement
without making any real changes in practice. But
over time, with persistence of effort, relationships
improved, some personnel changed, ideas and strat-
egies started to be shared between schools as well
as within them, and the authorities even began to
commit to some joint delivery of services.
The strategies adopted in Manchester (and now
in Wales) define the essence of leading from the
middle. But this term didn’t arise in the UK. It first
71. emerged in a systemwide project with 10 school dis-
tricts that the other co-author of this article (Andy
Hargreaves) carried out with his colleague Henry
Braun in Ontario, Canada.
ontario district-led reforms
Ontario has undertaken one of the world’s best-
known, large-scale educational reforms. The most
46 Kappan November 2015
where even small amounts of extra resources could
therefore make a great difference, this built a criti-
cal mass of district support. Larger districts eventu-
ally were persuaded to participate with their smaller
counterparts by appealing to their historic symbolic
status and the contribution they could make to the
collective good of the province’s students.
Responsibility for planning and implementation
came under a core team of six key staff — retired
district leaders and superintendents of curriculum
72. or special education — who jointly developed proj-
ect goals, designed an implementation strategy, and
monitored participation and results. They did this by
constantly connecting with and circulating among
the districts, making necessary changes and refine-
ments as they amassed evidence of what was working
and what was not.
Like the GMC, district leaders did not believe
that one-size-fits-all strategies were appropriate in
a province where one in four schoolchildren were
born outside of Canada, leading to several different
strategies:
• In a district with high numbers of children
from immigrant families, the project focused
on early literacy initiatives like a summer head-
start program for students new to the region
and a “snuggle up and read” program involving
parents or other family members.
• In a district serving a large student population
of Old Order German-origin Mennonites
whose community is characterized by mutual
aid, commitment to collective self-sufficiency,
73. and wearing traditional dress, children tended
to leave school early to work on the farms,
or, in the case of girls, to get married and
have children. Standard efforts to enforce
school attendance and improve high school
completion would prompt families to move to
other parts of their rural network throughout
North America. So school leaders engaged
with their culture, for example, by using
the community’s agricultural products for
publicized parts of the reform, involving more than
5,000 schools, have been the focus on raising expec-
tations and narrowing the achievement gap in tested
literacy and mathematics and on increasing the rates of
high school completion. The design and implementa-
tion of this reform — by a “guiding coalition” of po-
litical and professional forces — was complemented
by strong support to enable districts to be successful
in achieving the desired results (Campbell et al., 2015).
The province’s 72 school districts and their sys-
tem leaders led a less well-known part of the reform
agenda. In 2005, the government gave the districts
an initial investment of $25 million (Canadian) to
74. design and implement a strategy to improve learn-
ing and achievement for students with special edu-
cational needs that would also benefit all students.
One system leader described this change as “leading
from the middle.” After four years of this reform,
the literacy achievement gap between students with
special needs and other students had narrowed in
reading and especially in writing.
A survey of the reform indicated the changes
brought greater collaboration among staff, more
joint planning, and broader acceptance of collective
responsibility for all students (Hargreaves & Braun,
2012). Teachers reported increased use of differenti-
ated instruction, more analysis and discussion of data
to pinpoint needed interventions, greater coopera-
tion between special education resource teachers and
classroom teachers in relation to all students who
struggled rather than only those with official iden-
tifications, and more use of assistive technologies for
students with learning disabilities. Intensive site vis-
its in all 10 districts corroborated these results and
also revealed greater collaboration between curricu-
lum and special education departments within dis-
tricts that sometimes amounted to total integration.
75. In general, educators reported a large movement
from a culture of “my students” to “our students.”
District leaders drove this strategy. They took
a counterintuitive approach of providing identical
funding to all 72 districts, regardless of their size. In
a province where many districts were quite small and
In the leading from the middle approach, districts don’t just
mediate and manage
other people’s reforms individually; they become the collective
drivers of change and
improvement together.
V97 N3 kappanmagazine.org 47
not micromanaging) this district-driven change. It
stated that the CODE special education project must
address issues of underachievement and the need to
narrow the achievement gap and that the project
should be consistent with the guiding philosophy
of a 2005 provincial report called Education for All
(Ontario Ministry of Education, 2005).
76. Ontario’s special education reform created a
change design that improved education for all stu-
dents across the system. It drove change from the
middle instead of ordering it from the top. And
instead of expecting districts to adopt uniform re-
sponses to a centralized reform strategy, the reform
generated and galvanized local creativity and energy
in order to respond flexibly to local needs and cir-
cumstances.
Building on its improvements in literacy and high
school graduation and the success of its reforms, On-
tario is moving further forward to pursue broader,
bolder goals that include achievement and equity in
21st-century skills, arts, sciences, and citizenship. It
also is pursuing greater well-being in mental, emo-
tional, and physical health (Ontario Ministry of Edu-
cation, 2014). The Boston College team is now work-
ing with the 10 districts to lead from the middle, for
the province, in relation to increasing students’ and
teachers’ engagement, promoting their well-being
and building positive, diverse identities among them.
conclusion
77. In recent years, in too many countries, school dis-
tricts have been driven to distraction and to near
destruction by top-down changes that have under-
mined or bypassed their authority and also the com-
munities they serve. There is clear evidence that dis-
tricts can and should be a big part of a better future
for children, if they’re willing to embrace changes
in their thinking and practice.
Large-scale success cannot be achieved if districts
continue to act independently of one another. Lead-
ing from the middle, not just in the middle, can use
children’s lunches, meeting parents on street
corners, carrying home their shopping, and
building relationships to shift perceptions
about the value of formal education.
• A remote rural district serving just 24 schools
across an area the size of France had struggled
with how to raise expectations for the 40% of
children from aboriginal families (known in
Canada as First Nations communities). Some
educators believed that children from these
78. communities could not learn, could barely
speak, and mainly needed an emotionally safe
and caring environment. The district’s response
was to coach teachers to use more specific,
differentiated, and culturally appropriate
teaching strategies, and to examine examples of
student work among colleagues to demonstrate
possibilities for student and teacher success.
Like the GMC, the Ontario special education
project also stressed collective cross-district respon-
sibility for all students’ success. All 72 districts were
involved. Collective responsibility began with teach-
ers across grade levels and with special education and
regular classroom assignments taking responsibility
for struggling students and their progress together.
The districts exercised collective responsibility, too,
in how they shared strategies transparently at annual
retreats where they presented their practices and re-
sults, in how they communicated with the steering
committee, and in how they were connected by their
team of mentors and monitors who were ensuring
that intentions were being converted into action.
These mentors and monitors did not have hierar-
chical supervisory authority over the districts and
79. their leaders. Instead, these respected peers acted as
a “third-party” force responsible for improvement,
system learning, and, where needed, to challenge
existing practice.
Ontario’s special education reform was not only
implemented by district leaders and special educa-
tion superintendents; it was devised and driven by
them. At the very beginning the executive director
of the Council of Ontario Directors of Education
(CODE) and a small group of his associates who
acted on behalf of the 72 district leaders pointed
out to the Ministry of Education that it already had
allocated significant resources to other groups such
as the teachers’ unions. CODE therefore requested
resources and authority of its own to lead improve-
ments in special education.
Though some feared the district leaders and their
organization might diverge from Ministry of Edu-
cation policy, these leaders sought ways to integrate
their own efforts with central government directions.
The ministry itself took a clear role in steering (but
A Jewish school assisted a
80. predominantly Muslim partner. A
Catholic school prayed for a good
inspection result for its secular
counterpart.
48 Kappan November 2015
Bryk, A.S., Sebring, P.B., Kerbow, D., Rollow, S., & Easton,
J.Q. (1998). Charting Chicago school reform: Democratic
localism as a lever for change. Boulder, CO: Westview Press.
Campbell, C., Osmond-Johnson, P., Lieberman, A., & Sohn,
J. (2015). International teacher policy study: Ontario case
report. Toronto, ON: Ontario Institute for Studies in Education,
University of Toronto. http://bit.ly/1WueyUR
Gross, N., Giacquinta, J.B., & Bernstein, M. (1971).
81. Implementing organizational innovations: A sociological
analysis of planned educational change. New York, NY: Basic
Books.
Hargreaves, A., Boyle, A., & Harris, A. (2014). Uplifting
leadership: How teams and communities raise performance.
San Francisco, CA: Jossey-Bass.
Hargreaves, A. & Braun, H. (2012). Leading for all: Final report
of the review of the development of essential for some, good
for all: Ontario’s strategy for special education reform devised
by the Council of Directors of Education. Toronto, Ontario:
Council of Directors of Education.
Hargreaves, A. & Shirley, D. (2009). The fourth way: The
inspiring future for educational change. Thousand Oaks, CA:
82. Corwin Press.
Katz, M. (1987) Reconstructing American education.
Cambridge, MA: Harvard University Press.
Leithwood, K. (2013). Strong districts & their leadership.
Toronto, Ontario: Ontario Institute of Education Leadership.
Noguera, P. (2014, June 18). In defense of teacher tenure:
A few ineffective educators are not the primary reason
many schools are struggling. The Wall Street Journal. www.
wsj.com/articles/pedro-noguera-in-defense-of-teacher-
tenure-1403134951
Ontario Ministry of Education. (2005). Education for all. http://
bit.ly/1ihpaYA
83. Ontario Ministry of Education. (2014). Achieving excellence: A
renewed vision for education in Ontario. http://bit.ly/1ihoYsk
Rincon-Gallardo, S. & Fullan, M. (in press). Essential features
of effective collaboration: The social physics of educational
change. Journal of Professional Capital and Community.
Schleicher, A. (2015, March 30). Implementing highly effective
teacher policy and practice: The 2015 International Summit
on the Teaching Profession. www.slideshare.net/OECDEDU/
implementing-highly-effective-teacher-policy-and-practice-
2015-international-summit-of-the-teaching-profession
Sutton Trust Education Data Lab. (2015). Missing talent.
Research brief. London, UK: Sutton Trust. http://bit.
ly/1EQWT5k
84. Torlakson, T. (2015) A blueprint for great schools: Version 2.0.
Sacramento, CA: California Department of Education.
Leading in the middle is a promising
direction, but it’s not enough.
“As you can see boys and girls, the alphabet comes in ‘caps
lock on’ and ‘caps lock off.’”
the power of local solutions to diverse problems in
an environment where schools work with schools
and districts work with districts as they exercise col-
lective initiative and responsibility for all students’
success. This kind of leadership needn’t be confined
to districts and can encompass networks and other
kinds of partnerships as well (Rincon-Gallardo &
Fullan, in press). But collective responsibility is not
just something districts should ask others to under-
take. It is something that districts now have to take
on themselves. K
References
85. Ainscow, M. (2015) Towards self-improving school systems:
Lessons from a city challenge. London, UK: Routledge.
Barber, M., Chijioke, C., & Mourshed, M. (2011). How the
world’s most improved school systems keep getting better.
Chicago, IL: McKinsey & Company.
Copyright of Phi Delta Kappan is the property of Sage
Publications, Inc. and its content may
not be copied or emailed to multiple sites or posted to a listserv
without the copyright holder's
express written permission. However, users may print,
download, or email articles for
individual use.
86. Expanding
Our
Understanding
of Social
Change
A Report From the
Definition Task Force of the
HLC Special Emphasis
Project
Darragh Callahan, Elizabeth Wilson, Ian Birdsall,
Brooke Estabrook-Fishinghawk, Gary Carson,
Stephanie Ford, Karen Ouzts, Iris Yob
Expanding Our Understanding (July 2012) Page 2
87. Academic Offices
100 Washington Avenue South, Suite 900
Minneapolis, MN 55401
Phone: 1-612-338-7224 or 1-800-WALDENU (1-800-
925-3368)
Fax: 1-612-338-5092
Administrative Offices
650 S. Exeter Street
Baltimore, MD 21202
Phone: 1-866-4WALDEN (1-866-492-
5336)
Fax: 1-410-843-8104
Walden University is accredited by The Higher Learning
Commission and a member of the North
Central Association, www.ncahlc.org.
89. Expanding Our Understanding (July 2012) Page 3
Social change is defined broadly in terms of process and
product to indicate that all kinds of
social change activity are welcomed and encouraged at Walden.
As faculty members, students,
and alumni have indicated, even small acts can have large
consequences, and many of these
consequences are unpredictable. The charge given to the
Definition Task Force was to expand
the university’s definition of social change to provide more
guidance for teaching, learning, and
assessing the social change mission at Walden. To that end, the
Task Force offers the following
considerations.
90. To bring about long-term solutions and promote lasting effects
through the process of social
change, the following features may need to be considered as
appropriate to the context and
purposes of each program. The features are grouped under the
headings Knowledge, Skills, and
Attitudes, to encourage a holistic approach to preparing learners
for social change. The
groupings, however, are defined by soft boundaries because
each feature belongs primarily to
one group but may share some of the qualities of the other
groups.
A. Knowledge
1. Scholarship
The scholar-practitioner model is particularly suited to social
change because knowledge
91. applied to real-life situations is a scholar-practitioner’s goal. In
the scholarly role, the
scholar-practitioner engages in active learning, critical
reflection, and inquiry into real-
life dilemmas and possibilities. Careful study and research can
reveal the causes and
correlates of social problems and suggest solutions and
opportunities for promoting
growth.
2. Systems thinking
Many of the issues addressed by social change are complex
because there may be
multiple causes and manifestations of the issue that require
different responses at many
levels. Systemic thinking is a technique for developing insights
into challenging
92. situations and complex subjects. It usually begins with analysis,
which makes sense of a
system by breaking it apart to see how the parts work together
and influence each
other. This may be followed by synthesis that aims to develop a
set of responses that
address the situation in a comprehensive way. In the Walden
community, finding
systemic solutions to challenging issues might be undertaken by
multidisciplinary
collaborations in which scholar-practitioners from a number of
colleges work together
to examine issues and propose multipronged responses.
http://www.probsolv.com/probsolv.htm
93. Expanding Our Understanding (July 2012) Page 4
3. Reflection
Those working toward positive social change can enhance their
effectiveness by
reflecting on the experience. Reflection can be extrospective,
that is, looking outward to
review the short- and long-term outcomes of a project and its
implications for the
individuals, institutions, and communities with and for whom
one is working. It can also
be introspective, that is, looking inward to examine what has
been learned from the
process, including new insights into one’s motives, skills,
94. knowledge, actions, and
reactions. Self-reflection allows for the contemplation of one’s
professional and
personal development. Group reflection affords all stakeholders
in a social change
project (scholar-practitioners, community partners, policy-
makers, and beneficiaries) an
opportunity to process the experience and learn from each other.
Reflection employs
critical-thinking and analytical skills. It can be carried forward
by questioning and self-
inquiry and may depend on a willingness to see things from
another’s perspective.
While reflection needs to be honest, it should also be caring and
supportive, examining
strengths as well as weaknesses and successes as along with
disappointments. While
95. reflection may look to the past, its purpose is forward-looking—
to make future social
change activities more effective.
B. Skills
4. Practice
In the practitioner role, the scholar-practitioner engages in the
application of
knowledge. Learning-by-doing, or experiential learning, has a
long history of support
and success in education because it can infuse and sometimes
lead to deconstructing or
constructing theoretical understandings within the realities of
practical life in the
96. student’s personal growth, profession, or community. By using
recursive loops between
scholarship and practice, both intellectual growth and better
practice can occur—each
informing the other. Not merely knowing about theories but
actually testing theories in
the context of everyday life is the foundation of a scholar-
practitioner’s educational
process and contribution to social change.
5. Collaboration
Given the complexity of many of the issues addressed in social
change efforts,
responsive action may be needed from many different sources.
In these situations, the
97. Expanding Our Understanding (July 2012) Page 5
social change agent may want to build working relationships
with other entities
including community leaders, service agencies, neighborhood
coalitions, businesses,
religious congregations, and other local institutions. Apart from
these types of civic
engagement, collaboration with scholars and practitioners in an
array of professional
fields may bring a variety of perspectives, research, and applied
knowledge.
Partnerships can unite the skills, knowledge, and energies
needed to make a difference.
The ability to build a team, combined with leadership, project
management, conflict
resolution, and communication skills, may be essential. A
98. significant partner in social
change enterprises is the primary beneficiary; this person has a
personal knowledge and
experience that can be invaluable in both analyzing a situation
and proposing responses.
The primary beneficiary may be one individual or someone
representing the
perspectives of a group of beneficiaries. Working
collaboratively with primary
beneficiaries can be mutually educative and rewarding.
6. Advocacy
Advocacy is a matter of raising consciousness or being the
“voice” for someone, some
group, or something that may or may not otherwise have a voice
that can be heard. It
99. may involve political engagement, but it may also be a matter of
supporting others as
they negotiate directly with the services and opportunities they
need. In light of social
change, advocacy more widely aims to influence not only
political but also economic
and social systems and institutions to protect and promote the
dignity, health, safety,
and rights of people. Advocacy for an issue often takes the form
of education that aims
to bring about a new understanding and awareness. Advocacy
may also need to
encompass mentoring activities to build confidence and self-
reliance in those whose
welfare is being promoted.
7. Civic engagement
100. Social change efforts can be supported and reflected in laws by
policy-makers. Being
aware of the channels for communicating with civic leaders and
knowing how to
effectively use those channels are often important when working
for social change. All
institutions and groups—not just government entities—have
their own politics, that is, a
prevailing mind-set, an internal structure, and channels of
influence and power. Being
able to incorporate and negotiate these politics in support of
social change requires
finesse and sensitivity. Understanding this before engaging with
others can be helpful,
whether these others are legislators, local agencies and
institutions, professional
101. associations, neighborhoods, ad hoc teams, or professional
colleagues. Power
Expanding Our Understanding (July 2012) Page 6
relationships also exist between those working for social change
and those who are the
primary beneficiaries. Mutual collaboration and power-sharing
between the parties
involved can empower all toward more lasting social change.
C. Attitudes
8. Humane ethics
While a number of emotional effects may prompt one to engage
102. in social change,
including empathy, sympathy, guilt, a feeling of satisfaction,
and so on, one’s ethical
code can inform and direct one’s motivated engagement in
social change. Humane
ethics is a system of moral principles that guide human conduct
with respect to the
rightness and wrongness of certain actions. While personal
codes of ethics may differ,
an underlying, common code of a humane ethic is characterized
by tenderness,
compassion, sympathy for people and animals, especially for the
suffering or distressed,
and concern for the health of the environment in which we live.
Analyzing Social Change
103. Figure 1 below shows each of the features—scholarship,
systemic thinking, reflection, practice,
collaboration, advocacy, civic engagement, and humane ethics—
on an axis ranging from 0 to 5.
Each social change activity or project could be mapped onto the
axes to show the extent to
which it incorporates each feature. Joining the points along each
axis produces a web for each
activity, an example of which is shown in red.
It is important to note that this tool is not intended to be an
instrument to assess a particular
social change activity. Some projects and activities will be
appropriately strong in one or more
areas but not necessarily in all. Rather, its purpose is to serve as
a tool to analyze social change
activities that occur at Walden. It may reveal areas where an
activity might be enhanced, and
104. importantly, it may reveal where the program for preparing
students for social change might be
strengthened.
Further, all kinds of social change activities are encouraged,
given the range of interests,
commitments, and opportunities for engagement among
students, faculty members, and staff.
Most, if not all, kinds of activity can be represented as a web.
The purpose of the web analysis
is ultimately to provide a tool to enlarge our vision of the range
and features of social change
that seeks long-term solutions and promotes lasting effects.
Expanding Our Understanding (July 2012) Page 7
105. Figure 1. Web map showing each of the features.
Below are some examples of web maps of social change
activities based on reports by students, faculty
members, and alumni in a recent research study: Perspectives on
Social Change. Pseudonyms have been
used throughout.
Example No. 1. Bookcase Builders
Tom is a Rotarian and undertakes a number of service projects
in the community with other Rotarians.
One such activity involves building bookcases. Some members
of the club also volunteer with Habitat for
Humanity, which provides housing for needy families. Another
member has connections with the local
106. school district and knew of a recent drive to improve the level
of literacy in the community. Putting
these together, the club decided to build bookcases for the
Habitat for Humanity homes and, through
the support of another club member who manages a bookstore,
give each family a gift certificate to buy
books for the children to put in the bookcase.
This activity would certainly rate relatively high on
Collaboration for the networking among Rotarians,
the local chapter of Habitat for Humanity, the school district,
and the local book store. It also represents
a Humane Ethic in that it shows the responsiveness of this club
to the need for these children to read
Expanding Our Understanding (July 2012) Page 8
107. well for their future success in life. As a practice, this need is
supported by implicit knowledge about the
importance of motivating children and providing them with
opportunities to read. so there should be a
showing on the Practitioner axis. Figure 2 below shows how this
project might be mapped.
Figure 2. Web map of the bookcase builders project.
If Tom and his fellow club members want to pursue this project
further they might ask whether they
may seek other possible partners for this endeavor, such as the
reading tutors, the bookstore
salespeople, the parents, and even the children themselves.
Others brought into the program may
contribute more Systemic Thinking to address the problem of
illiteracy. The club members may also
108. consider follow-up activities using other features like Advocacy
with a particular focus on mentoring,
Civic Engagement, or some Scholarly study of or research on
the effectiveness of the project.
Example No. 2. Basket-Weavers as Story-Tellers
Arsi’s research took her to a remote and needy area of Jamaica,
where many of the village women help
support their families through weaving baskets for sale in the
tourist areas. Using a qualitative approach,
Arsi listened to and recorded the women’s stories of their lives
in abject poverty, analyzed them for
common themes, and presented her findings as her dissertation.
The information in this dissertation
could be invaluable to service agencies and others willing to
work with these women to improve their
lives.
109. Expanding Our Understanding (July 2012) Page 9
The project is high on the Scholar axis, especially because it is
research into a real-life problem that
needs informed solutions. It further exhibits significant
Collaboration in that she established personal
relationships with the women so that they could tell her their
stories. It is also strong in the Humane
Ethics dimension because it deals with real human need.
Writing a dissertation also demands Reflection,
particularly because it requires some discussion of the meaning
of the findings and their possible
implications. The dissertation ultimately enters the public
domain and, as such, is a permanent voice for
110. the women whose stories it shares (Advocacy). Figure 3 below
illustrates this example.
Figure 3. Web map of the basket-weavers as story-tellers
project.
Arsi successfully graduated in 2011. If she wanted to continue
with the project, she might share her
findings with policy-makers (Civic Engagement) and service
providers, such as business people,
educators, and healthcare workers (Systemic Thinking). If she
could disseminate her work through
publications and presentations, she would not only deepen her
own understanding (Reflection) but
more directly provide valuable information to service agencies
and others to apply in working with and
for these women (Practitioner).
111. Example No. 3. The Monthly Giver
Expanding Our Understanding (July 2012) Page 10
Many faculty members, students, and staff members sign up to
make monthly donations to agencies,
such as United Way, through automatic payroll deductions.
Given their busy schedules and
commitments, they look at this as making some kind of
contribution to “the development of individuals,
institutions, and societies.” Does such an activity count as
social change? Figure 4 below is an attempt
to map this activity.
One of the benefits of the mapping tool is that it is inclusive of
a wide range of possible engagements in
112. social change. The monthly giver, like many others, is guided
by a Humane Ethic and wants to act out of
compassion and care for the distressed and needy. She also
understands that the organization she is
donating to is carefully managed, well informed, and handles
donations responsibly, and she wants to
do something practical to support it (Practitioner). She also
knows that her donation, because it is
combined with the donations of many others, can amount to a
significant sum to support large-scale
projects in the community (Collaboration).
Figure 4. Web map of the monthly giver.
Example No. 4. Global Day of Service Participant