SlideShare a Scribd company logo
© 2016 Laureate Education, Inc. Page 1 of 3
RWRCOEL Professional Dispositions
Professional Conduct
1. Ethical and Legal Conduct: The candidate demonstrates
professionalism
as outlined by legal and ethical guidelines within the
profession.
a. Demonstrates professional behavior as described in Walden’s
Code of
Conduct
b. Demonstrates ethical behavior as described by professional
codes of
ethics
2. Professional Obligations: The candidate meets professional
obligations in
a responsible manner.
a. Maintains a strong record of attendance and punctuality,
communicating in
advance the need for any absence or delay in meeting
performance
expectations
b. Prepares for professional obligations and meets expected
deadlines
© 2016 Laureate Education, Inc. Page 2 of 3
3. Professional Appearance and Demeanor: The candidate
demonstrates
professional appearance and behaviors in the educational
setting.
a. Maintains appropriate appearance through professional dress
and
grooming
b. Approaches teaching and learning tasks with initiative,
confidence, and
energy
c. Exhibits composure and self-control
d. Demonstrates flexibility in adapting to changing
circumstances and
student needs
Professional Qualities
4. Professional Development/Growth: The candidate engages in
ongoing
professional development and growth to improve professional
practice.
a. Engages in continuous learning through participation in
professional
development opportunities
b. Applies new ideas to professional practice based on existing
data,
reflection, and intellectual curiosity
c. Engages in ongoing critical reflection of personal
performance to improve
professional practice
5. Advocacy: The candidate advocates for fairness, equity, and
social change
in the learning environment.
a. Displays empathy, fairness, persistence, problem-solving
skills, and
appropriate risk-taking actions on behalf of others
b. Advocates for the social, emotional, physical, educational,
behavioral, and
basic needs of others
c. Promotes positive social change to enhance educational
opportunities and
promote student learning
6. Equity: The candidate demonstrates culturally responsive
practices to
create an inclusive learning environment that is respectful of
diverse
cultures, values, and beliefs of others.
a. Displays equitable treatment of others
i. Sets high expectations for all learners
© 2016 Laureate Education, Inc. Page 3 of 3
ii. Treats others with respect and dignity
iii. Recognizes individual differences in teaching and learning
b. Engages in culturally responsive practices in interactions
with students,
families, colleagues, and communities
c. Creates learning environments that are inclusive; free of bias
and
discrimination and respectful of diverse cultures, values, and
beliefs
d. Engages families and other stakeholders in planning for
individual success
Collaboration
7. Collaboration: The candidate works in collaboration with
others to improve
student learning and advance the profession.
a. Builds partnerships and fosters relationships with
stakeholders to improve
student learning and advance the profession
b. Collaborates with students, families, colleagues, and the
community to
promote positive social change
c. Uses technology to enhance collaboration, strengthen
partnerships, and
foster relationships with others to improve teaching and
learning
Communication
8. Communication: The candidate uses effective verbal,
nonverbal, and
technological communication techniques to foster active
inquiry, improve
collaboration, and create positive interactions in the learning
environment.
a. Actively and thoughtfully listens to others
b. Adjusts communication to meet the needs of individual
learners and
changing circumstances
c. Asks probing, thoughtful questions to elicit meaningful
responses
d. Conveys ideas in multiple ways using a professional tone
e. Acknowledges and respects ideas and/or feelings of others;
makes others
feel welcome, valued, and appreciated in their communications
f. Utilizes technological tools to facilitate communication to
improve student
learning and relationships with others
Cyber Security and the Internet of Things:
Vulnerabilities,Threats, Intruders
and Attacks
Mohamed Abomhara and Geir M. Køien
Department of Information and Communication Technology,
University of Agder, Norway
Corresponding Authors: {Mohamed.abomhara;
geir.koien}@uia.no
Received 14 September 2014; Accepted 17 April 2015;
Publication 22 May 2015
Abstract
Internet of Things (IoT) devices are rapidly becoming
ubiquitous while IoT
services are becoming pervasive. Their success has not gone
unnoticed and
the number of threats and attacks against IoT devices and
services are on the
increase as well. Cyber-attacks are not new to IoT, but as IoT
will be deeply
interwoven in our lives and societies, it is becoming necessary
to step up
and take cyber defense seriously. Hence, there is a real need to
secure IoT,
which has consequently resulted in a need to comprehensively
understand the
threats and attacks on IoT infrastructure. This paper is an
attempt to classify
threat types, besides analyze and characterize intruders and
attacks facing IoT
devices and services.
Keywords: Internet of Things, Cyber-attack, Security threats.
1 Introduction
The recent rapid development of the Internet of Things (IoT) [1,
2] and its
ability to offer different types of services have made it the
fastest growing
technology, with huge impact on social life and business
environments. IoT has
Journal of Cyber Security, Vol. 4, 65–88.
doi: 10.13052/jcsm2245-1439.414
c© 2015 River Publishers. All rights reserved.
66 M. Abomhara and G. M. Køien
gradually permeated all aspects of modern human life, such as
education,
healthcare, and business, involving the storage of sensitive
information about
individuals and companies, financial data transactions, product
development
and marketing.
The vast diffusion of connected devices in the IoT has created
enormous
demand for robust security in response to the growing demand
of millions or
perhaps billions of connected devices and services worldwide
[3–5].
The number of threats is rising daily, and attacks have been on
the increase
in both number and complexity. Not only is the number of
potential attackers
along with the size of networks growing, but the tools available
to potential
attackers are also becoming more sophisticated, efficient and
effective [6, 7].
Therefore, for IoT to achieve fullest potential, it needs
protection against
threats and vulnerabilities [8].
Security has been defined as a process to protect an object
against physical
damage, unauthorized access, theft, or loss, by maintaining high
confidential-
ity and integrity of information about the object and making
information about
that object available whenever needed [7, 9].According to Kizza
[7] there is no
thing as the secure state of any object, tangible or not, because
no such object
can ever be in a perfectly secure state and still be useful. An
object is secure if
the process can maintain its maximum intrinsic value under
different condi-
tions. Security requirements in the IoT environment are not
different from any
other ICT systems. Therefore, ensuring IoT security requires
maintaining the
highest intrinsic value of both tangible objects (devices) and
intangible ones
(services, information and data).
This paper seeks to contribute to a better understanding of
threats and their
attributes (motivation and capabilities) originating from various
intruders like
organizations and intelligence. The process of identifying
threats to systems
and system vulnerabilities is necessary for specifying a robust,
complete set
of security requirements and also helps determine if the security
solution is
secure against malicious attacks [10]. As well as users,
governments and IoT
developers must ultimately understand the threats and have
answers to the
following questions:
1. What are the assets?
2. Who are the principal entities?
3. What are the threats?
4. Who are the threat actors?
5. What capability and resource levels do threat actors have?
6. Which threats can affect what assets?
Cyber security and the Internet of Things 67
7. Is the current design protected against threats?
8. What security mechanisms could be used against threats?
The remainder of this paper is organized as follows. Section 2
pro-
vides a background, definitions, and the primary security and
privacy goals.
Section 3 identifies some attacker motivations and capabilities,
and provides
an outline of various sorts of threat actors. Finally, the paper
concludes with
Section 4.
2 Background
The IoT [1, 2, 11] is an extension of the Internet into the
physical world
for interaction with physical entities from the surroundings.
Entities, devices
and services [12] are key concepts within the IoT domain, as
depicted
in Figure 1 [13]. They have different meanings and definitions
among
various projects. Therefore, it is necessary to have a good
understand-
ing of what IoT entities, devices and services are (discussed in
detail in
Section 2.1).
An entity in the IoT could be a human, animal, car, logistic
chain item,
electronic appliance or a closed or open environment [14].
Interaction among
Figure 1 IoT model: key concepts and interactions.
68 M. Abomhara and G. M. Køien
entities is made possible by hardware components called
devices [12] such as
mobile phones, sensors, actuators or RFID tags, which allow the
entities to
connect to the digital world [15].
In the current state of technology, Machine-to-Machine (M2M)
is the
most popular application form of IoT. M2M is now widely
employed in
power, transportation, retail, public service management, health,
water, oil
and other industries to monitor and control the user, machinery
and production
processes in the global industry and so on [5, 16, 17].
According to estimates
M2M applications will reach 12 billion connections by 2020 and
generate
approximately 714 billion euros in revenues [2].
Besides all the IoT application benefits, several security threats
are
observed [17–19]. The connected devices or machines are
extremely valuable
to cyber-attackers for several reasons:
1. Most IoT devices operate unattended by humans, thus it is
easy for an
attacker to physically gain access to them.
2. Most IoT components communicate over wireless networks
where an
attacker could obtain confidential information by
eavesdropping.
3. Most IoT components cannot support complex security
schemes due to
low power and computing resource capabilities.
In addition, cyber threats could be launched against any IoT
assets
and facilities, potentially causing damage or disabling system
operation,
endangering the general populace or causing severe economic
damage to
owners and users [20, 21]. Examples include attacks on home
automation
systems and taking control of heating systems, air conditioning,
lighting
and physical security systems. The information collected from
sensors
embedded in heating or lighting systems could inform the
intruder when
somebody is at home or out. Among other things, cyber-attacks
could be
launched against any public infrastructure like utility systems
(power sys-
tems or water treatment plants) [22] to stop water or electricity
supply to
inhabitants.
Security and privacy issues are a growing concern for users and
suppliers
in their shift towards the IoT [23]. It is certainly easy to
imagine the amount
of damage caused if any connected devices were attacked or
corrupted.
It is well-recognized that adopting any IoT technology within
our homes,
work, or business environments opens doors to new security
problems. Users
and suppliers must consider and be cautious with such security
and privacy
concerns.
Cyber security and the Internet of Things 69
2.1 Understanding IoT Devices and Services
In this section, the main IoT domain concepts that are important
from a
business process perspective are defined and classified, and the
relationships
between IoT components (IoT devices and IoT services) are
described.
2.1.1 IoT device
This is a hardware component that allows the entity to be a part
of the digital
world [12]. It is also referred to as a smart thing, which can be a
home appliance,
healthcare device, vehicle, building, factory and almost
anything networked
and fitted with sensors providing information about the physical
environment
(e.g., temperature, humidity, presence detectors, and pollution),
actuators (e.g.,
light switches, displays, motor-assisted shutters, or any other
action that a
device can perform) and embedded computers [24, 25].
An IoT device is capable of communicating with other IoT
devices and ICT
systems. These devices communicate via different means
including cellular
(3G or LTE), WLAN, wireless or other technologies [8]. IoT
device classifi-
cation depends on size, i.e., small or normal; mobility, i.e.,
mobile or fixed;
external or internal power source; whether they are connected
intermittently
or always-on; automated or non-automated; logical or physical
objects; and
lastly, whether they are IP-enabled objects or non IP objects.
The characteristics of IoT devices are their ability to actuate
and/or
sense, the capability of limiting power/energy, connection to the
physical
world, intermittent connectivity and mobility [23]. Some must
be fast and
reliable and provide credible security and privacy, while others
might not
[9]. A number of these devices have physical protection whereas
others are
unattended.
In fact, in IoT environments, devices should be protected
against any
threats that can affect their functionality. However, most IoT
devices are
vulnerable to external and internal attacks due to their
characteristics [16].
It is challenging to implement and use a strong security
mechanism due to
resource constraints in terms of IoT computational capabilities,
memory, and
battery power [26].
2.1.2 IoT services
IoT services facilitate the easy integration of IoT entities into
the service-
oriented architecture (SOA) world as well as service science
[27]. According
to Thoma [28], an IoT service is a transaction between two
parties: the service
provider and service consumer. It causes a prescribed function,
enabling
70 M. Abomhara and G. M. Køien
interaction with the physical world by measuring the state of
entities or by
initiating actions that will initiate a change to the entities.
A service provides a well-defined and standardized interface,
offering all
necessary functionalities for interacting with entities and
related processes.
The services expose the functionality of a device by accessing
its hosted
resources [12].
2.1.3 Security in IoT devices and services
Ensuring the security entails protecting both IoT devices and
services
from unauthorized access from within the devices and
externally. Secu-
rity should protect the services, hardware resources, information
and data,
both in transition and storage. In this section, we identified
three key
problems with IoT devices and services: data confidentiality,
privacy and
trust.
Data confidentiality represents a fundamental problem in IoT
devices
and services [27]. In IoT context not only user may access to
data but also
authorized object. This requires addressing two important
aspects: first, access
control and authorization mechanism and second authentication
and identity
management (IdM) mechanism. The IoT device needs to be able
to verify
that the entity (person or other device) is authorized to access
the service.
Authorization helps determine if upon identification, the person
or device is
permitted to receive a service. Access control entails controlling
access to
resources by granting or denying means using a wide array of
criteria. Autho-
rization and access control are important to establishing a
secure connection
between a number of devices and services. The main issue to be
dealt with
in this scenario is making access control rules easier to create,
understand
and manipulate. Another aspect that should be consider when
dealing with
confidentiality is authentication and identity management. In
fact this issue
is critical in IoT, because multiple users, object/things and
devices need to
authenticate each other through trustable services. The problem
is to find
solution for handling the identity of user, things/objects and
devices in a secure
manner.
Privacy is an important issue in IoT devices and service on
account of the
ubiquitous character of the IoT environment. Entities are
connected, and data
is communicated and exchanged over the internet, rendering
user privacy a
sensitive subject in many research works. Privacy in data
collection, as well as
data sharing and management, and data security matters remain
open research
issues to be fulfilled.
Cyber security and the Internet of Things 71
Trust plays an important role in establishing secure
communication when a
number of things communicate in an uncertain IoT environment.
Two dimen-
sions of trust should be considered in IoT: trust in the
interactions between
entities, and trust in the system from the users perspective [29]
According
to Køien [9] the trustworthiness of an IoT device depends on the
device
components including the hardware, such as processor, memory,
sensors and
actuators, software resources like hardware-based software,
operating system,
drivers and applications, and the power source. In order to gain
user/services
trust, there should be an effective mechanism of defining trust
in a dynamic
and collaborative IoT environment.
2.2 Security Threats, Attacks, and Vulnerabilities
Before addressing security threats, the system assets (system
components)
that make up the IoT must first be identified. It is important to
understand the
asset inventory, including all IoT components, devices and
services.
An asset is an economic resource, something valuable and
sensitive owned
by an entity. The principal assets of any IoT system are the
system hardware
(include buildings, machinery, etc.) [11], software, services and
data offered
by the services [30].
2.2.1 Vulnerability
Vulnerabilities are weaknesses in a system or its design that
allow an intruder
to execute commands, access unauthorized data, and/or conduct
denial-of-
service attacks [31, 32]. Vulnerabilities can be found in variety
of areas in
the IoT systems. In particular, they can be weaknesses in system
hardware
or software, weaknesses in policies and procedures used in the
systems and
weaknesses of the system users themselves [7].
IoT systems are based on two main components; system
hardware and
system software, and both have design flaws quite often.
Hardware vulner-
abilities are very difficult to identify and also difficult to fix
even if the
vulnerability were identified due to hardware compatibility and
interoper-
ability and also the effort it take to be fixed. Software
vulnerabilities can
be found in operating systems, application software, and control
software
like communication protocols and devices drives. There are a
number of
factors that lead to software design flaws, including human
factors and
software complexity. Technical vulnerabilities usually happen
due to human
weaknesses. Results of not understanding the requirements
comprise starting
72 M. Abomhara and G. M. Køien
the project without a plan, poor communication between
developers and users,
a lack of resources, skills, and knowledge, and failing to
manage and control
the system [7].
2.2.2 Exposure
Exposure is a problem or mistake in the system configuration
that allows
an attacker to conduct information gathering activities. One of
the most
challenging issues in IoT is resiliency against exposure to
physical attacks.
In the most of IoT applications, devices may be left unattended
and likely
to be placed in location easily accessible to attackers. Such
exposure raises
the possibility that an attacker might capture the device, extract
cryptographic
secrets, modify their programming, or replace them with
malicious device
under the control of the attacker [33].
2.2.3 Threats
A threat is an action that takes advantage of security
weaknesses in a system
and has a negative impact on it [34]. Threats can originate from
two primary
sources: humans and nature [35, 36]. Natural threats, such as
earthquakes,
hurricanes, floods, and fire could cause severe damage to
computer systems.
Few safeguards can be implemented against natural disasters,
and nobody
can prevent them from happening. Disaster recovery plans like
backup
and contingency plans are the best approaches to secure systems
against
natural threats. Human threats are those caused by people, such
as malicious
threats consisting of internal [37] (someone has authorized
access) or exter-
nal threats [38] (individuals or organizations working outside
the network)
looking to harm and disrupt a system. Human threats are
categorized into
the following:
• Unstructured threats consisting of mostly inexperienced
individuals who
use easily available hacking tools.
• Structured threats as people know system vulnerabilities and
can under-
stand, develop and exploit codes and scripts. An example of a
structured
threat is Advanced Persistent Threats (APT) [39]. APT is a
sophisticated
network attack targeted at high-value information in business
and gov-
ernment organizations, such as manufacturing, financial
industries and
national defense, to steal data [40].
As IoT become a reality, a growing number of ubiquitous
devices has
raise the number of the security threats with implication for the
general
public. Unfortunately, IoT comes with new set of security
threat. There are
Cyber security and the Internet of Things 73
a growing awareness that the new generation of smart-phone,
computers and
other devices could be targeted with malware and vulnerable to
attack.
2.2.4 Attacks
Attacks are actions taken to harm a system or disrupt normal
operations by
exploiting vulnerabilities using various techniques and
tools.Attackers launch
attacks to achieve goals either for personal satisfaction or
recompense. The
measurement of the effort to be expended by an attacker,
expressed in terms
of their expertise, resources and motivation is called attack cost
[32]. Attack
actors are people who are a threat to the digital world [6]. They
could be
hackers, criminals, or even governments [7]. Additional details
are discussed
in Section 3.
An attack itself may come in many forms, including active
network
attacks to monitor unencrypted traffic in search of sensitive
information;
passive attacks such as monitoring unprotected network
communications
to decrypt weakly encrypted traffic and getting authentication
information;
close-in attacks; exploitation by insiders, and so on. Common
cyber-attack
types are:
(a) Physical attacks: This sort of attack tampers with hardware
components.
Due to the unattended and distributed nature of the IoT, most
devices
typically operate in outdoor environments, which are highly
susceptible
to physical attacks.
(b) Reconnaissance attacks – unauthorized discovery and
mapping of sys-
tems, services, or vulnerabilities. Examples of reconnaissance
attacks
are scanning network ports [41], packet sniffers [42], traffic
analysis,
and sending queries about IP address information.
(c) Denial-of-service (DoS): This kind of attack is an attempt to
make
a machine or network resource unavailable to its intended users.
Due to low memory capabilities and limited computation
resources,
the majority of devices in IoT are vulnerable to resource
enervation
attacks.
(d) Access attacks – unauthorized persons gain access to
networks or devices
to which they have no right to access. There are two different
types of
access attack: the first is physical access, whereby the intruder
can gain
access to a physical device. The second is remote access, which
is done
to IP-connected devices.
(e) Attacks on privacy: Privacy protection in IoT has become
increas-
ingly challenging due to large volumes of information easily
available
74 M. Abomhara and G. M. Køien
through remote access mechanisms. The most common attacks
on user
privacy are:
• Data mining: enables attackers to discover information that is
not
anticipated in certain databases.
• Cyber espionage: using cracking techniques and malicious
software
to spy or obtain secret information of individuals, organizations
or
the government.
• Eavesdropping: listening to a conversation between two par-
ties [43].
• Tracking: a users movements can be tracked by the devices
unique
identification number (UID). Tracking a users location
facilitates
identifying them in situations in which they wish to remain
anonymous.
• Password-based attacks: attempts are made by intruders to
duplicate
a valid user password. This attempt can be made in two
different
ways: 1) dictionary attack – trying possible combinations of
letters
and numbers to guess user passwords; 2) brute force attacks –
using
cracking tools to try all possible combinations of passwords to
uncover valid passwords.
(f) Cyber-crimes: The Internet and smart objects are used to
exploit users
and data for materialistic gain, such as intellectual property
theft, identity
theft, brand theft, and fraud [6, 7, 44].
(g) Destructive attacks: Space is used to create large-scale
disruption and
destruction of life and property. Examples of destructive attacks
are
terrorism and revenge attacks.
(h) Supervisory Control and Data Acquisition (SCADA)
Attacks: As any
other TCP/IP systems, the SCADA [45] system is vulnerable to
many
cyber attacks [46, 47]. The system can be attacked in any of the
following
ways:
i. Using denial-of-service to shut down the system.
ii. Using Trojans or viruses to take control of the system. For
instance,
in 2008 an attack launched on an Iranian nuclear facility in
Natanz
using a virus named Stuxnet [48].
2.3 Primary Security and Privacy Goals
To succeed with the implementation of efficient IoT security,
we must be
aware of the primary security goals as follows:
Cyber security and the Internet of Things 75
2.3.1 Confidentiality
Confidentiality is an important security feature in IoT, but it
may not be
mandatory in some scenarios where data is presented publicly
[18]. However,
in most situations and scenarios sensitive data must not be
disclosed or read by
unauthorized entities. For instance patient data, private business
data, and/or
military data as well as security credentials and secret keys,
must be hidden
from unauthorized entities.
2.3.2 Integrity
To provide reliable services to IoT users, integrity is a
mandatory security
property in most cases. Different systems in IoT have various
integrity
requirements [49]. For instance, a remote patient monitoring
system will have
high integrity checking against random errors due to
information sensitivities.
Loss or manipulation of data may occur due to communication,
potentially
causing loss of human lives [6].
2.3.3 Authentication and authorization
Ubiquitous connectivity of the IoT aggravates the problem of
authentication
because of the nature of IoT environments, where possible
communication
would take place between device to device (M2M), human to
device, and/or
human to human. Different authentication requirements
necessitate different
solutions in different systems. Some solutions must be strong,
for example
authentication of bank cards or bank systems. On the other
hand, most will
have to be international, e.g., ePassport, while others have to be
local [6].
The authorization property allows only authorized entities (any
authenticated
entity) to perform certain operations in the network.
2.3.4 Availability
A user of a device (or the device itself) must be capable of
accessing services
anytime, whenever needed. Different hardware and software
components in
IoT devices must be robust so as to provide services even in the
presence
of malicious entities or adverse situations. Various systems
have different
availability requirements. For instance, fire monitoring or
healthcare monitor-
ing systems would likely have higher availability requirements
than roadside
pollution sensors.
2.3.5 Accountability
When developing security techniques to be used in a secure
network, account-
ability adds redundancy and responsibility of certain actions,
duties and
76 M. Abomhara and G. M. Køien
planning of the implementation of network security policies.
Accountability
itself cannot stop attacks but is helpful in ensuring the other
security techniques
are working properly. Core security issues like integrity and
confidentiality
may be useless if not subjected to accountability. Also, in case
of a repudiation
incident, an entity would be traced for its actions through an
accountability
process that could be useful for checking the inside story of
what happened
and who was actually responsible for the incident.
2.3.6 Auditing
A security audit is a systematic evaluation of the security of a
device or service
by measuring how well it conforms to a set of established
criteria. Due to
many bugs and vulnerabilities in most systems, security
auditing plays an
important role in determining any exploitable weaknesses that
put the data
at risk. In IoT, a systems need for auditing depends on the
application and
its value.
2.3.7 Non-repudiation
The property of non-repudiation produces certain evidence in
cases where the
user or device cannot deny an action. Non-repudiation is not
considered an
important security property for most of IoT. It may be
applicable in certain
contexts, for instance, payment systems where users or
providers cannot deny
a payment action.
2.3.8 Privacy goals
Privacy is an entitys right to determine the degree to which it
will interact with
its environment and to what extent the entity is willing to share
information
about itself with others. The main privacy goals in IoT are:
• Privacy in devices – depends on physical and commutation
privacy.
Sensitive information may be leaked out of the device in cases
of device
theft or loss and resilience to side channel attacks.
• Privacy during communication – depends on the availability of
a device,
and device integrity and reliability. IoT devices should
communicate only
when there is need, to derogate the disclosure of data privacy
during
communication.
• Privacy in storage – to protect the privacy of data stored in
devices, the
following two things should be considered:
• Possible amounts of data needed should be stored in devices.
Cyber security and the Internet of Things 77
• Regulation must be extended to provide protection of user data
after
end-of-device life (deletion of the device data (Wipe) if the
device
is stolen, lost or not in use).
• Privacy in processing – depends on device and communication
integrity
[50]. Data should be disclosed to or retained from third parties
without
the knowledge of the data owner.
• Identity privacy – the identity of any device should only
discovered by
authorized entity (human/device).
• location privacy – the geographical position of relevant device
should
only discovered by authorized entity (human/device) [51].
3 Intruders, Motivations and Capabilities
Intruders have different motives and objectives, for instance,
financial
gain, influencing public opinion, and espionage, among many
others. The
motives and goals of intruders vary from individual attackers to
sophisticated
organized-crime organizations.
Intruders also have different levels of resources, skill, access
and risk
tolerance leading to the portability level of an attack occurring
[52]. An
insider has more access to a system than outsiders. Some
intruders are well-
funded and others work on a small budget or none. Every
attacker chooses
an attack that is affordable, an attack with good return on the
investment
based on budget, resources and experience [6]. In this section,
intruders are
categorized according to characteristics, motives and objectives,
capabilities
and resources.
3.1 Purpose and Motivation of Attack
Government websites, financial systems, news and media
websites, military
networks, as well as public infrastructure systems are the main
targets
for cyber-attacks. The value of these targets is difficult to
estimate, and
estimation often varies between attacker and defender. Attack
motives
range from identity theft, intellectual property theft, and
financial fraud,
to critical infrastructure attacks. It is quite difficult to list what
motivates
hackers to attack systems. For instance, stealing credit card
information
has become a hackers hobby nowadays, and electronic terrorism
orga-
nizations attack government systems in order to make politics,
religion
interest.
78 M. Abomhara and G. M. Køien
3.2 Classification of Possible Intruders
A Dolev-Yao (DY) type of intruder shall generally be assumed
[53, 54]. That
is, an intruder which is in effect the network and which may
intercept all
or any message ever transmitted between IoT devices and hubs.
The DY
intruder is extremely capable but its capabilities are slightly
unrealistic. Thus,
safety will be much stronger if our IoT infrastructure is
designed to be
DY intruder resilient. However, the DY intruder lacks one
capability that
ordinary intruders may have, namely, physical compromise.
Thus, tamper-
proof devices are also greatly desirable. This goal is of course
unattainable,
but physical tamper resistance is nevertheless a very important
goal, which,
together with tamper detection capabilities (tamper evident)
may be a sufficient
first-line defense.
In the literature intruders are classified into two main types:
internal and
external. Internal intruders are users with privileges or
authorized access to a
system with either an account on a server or physical access to
the network
[21, 37]. External intruders are people who do not belong to the
network
domain. All intruders, whether internal or external, can be
organized in many
ways and involve individual attackers to spy agencies working
for a country.
The impact of an intrusion depends on the goals to be achieved.
An individual
attacker could have small objectives while spy agencies could
have larger
motives [55]. The various types of intruders will be discussed
hereby based
on their numbers, motives and objectives.
3.2.1 Individuals
Individual hackers are professionals who work alone and only
target systems
with low security [55]. They lack resources or expertise of
professional
hacking teams, organizations or spy agencies. Individual hacker
targets are
relatively small in size or diversity and the attacks launched
have rela-
tively lower impact than ones launched by organized groups
(discussed in
3.2.2). Social engineering techniques are most commonly used
by individual
attackers, as they have to obtain basic information about a
target system
like the address, password, port information, etc. Public and
social media
websites are the most common places where general users can
be deceived
by hackers. Moreover, operating systems used on laptops, PCs,
and mobile
phones have common and known vulnerabilities exploitable by
individual
attackers.
Financial institutions such as banks are also major targets for
individual
attackers as they know that such types of networks carry
financial transactions
that can be hacked, and thus attackers can manipulate the
information in
Cyber security and the Internet of Things 79
their interest. Credit card information theft has a long history
with individual
hackers. With the growth of e-commerce, it is easier to use
stolen credit card
information to buy goods and services.
Individual hackers use tools such as viruses, worms and sniffers
to exploit
a system. They plan attacks based on equipment availability,
internet access
availability, the network environment and system security.
One of the individual hacker categories is the insider [21, 37].
Insiders are
authorized individuals working against a system using insider
knowledge or
privileges. Insiders could provide critical information for
outsider attackers
(third party) to exploit vulnerabilities that can enable an attack.
They know the
weak points in the system and how the system works. Personal
gain, revenge,
and financial gain can motivate an insider. They can tolerate
risk ranging from
low to high depending on their motivation.
3.2.2 Organized groups
Criminal groups are becoming more familiar with ongoing
communications
and IoT technology. In addition, as they become more
comfortable with
technological applications, these groups can be more aware of
opportuni-
ties offered by the infrastructure routing information of
different networks.
The motivations of these groups are quite diverse; their targets
typically
include particular organizations for revenge, theft of trade
secrets, economic
espionage, and targeting the national information infrastructure.
They also
involve selling personal information, such as financial data, to
other criminal
organizations, terrorists, and even governments.
They are very capable in terms of financial funding, expertise
and
resources. Criminal groups capabilities in terms of methods and
techniques are
moderate to high depending on what the goals are. They are
very skillful at
creating botnets and malicious software (e.g., computer viruses
and scare-
ware) and denial-of-service attack methods [44]. Organized
criminals are
likely to have access to funds, meaning they can hire skilled
hackers if
necessary, or purchase point-and-click attack tools from the
underground
economy with which to attack any systems [46]. Such criminals
can tolerate
higher risk than individual hackers and are willing to invest in
profitable
attacks.
Cyber terrorism [21, 56] is a form of cyber-attack that targets
military
systems, banks, and specific facilities such as satellites, and
telecommunica-
tion systems associated with the national information
infrastructure based on
religious and political interests. Terrorist organizations depend
on the internet
to spread propaganda, raise funds, gather information, and
communicate
80 M. Abomhara and G. M. Køien
with co-conspirators in all parts of the world. Another prevalent
group of
criminal organization entails hacktivists. Hacktivists are groups
of hackers
who engage in activities such as denial-of-service, fraud, and/or
identity
theft. Also, some of these groups have political motivations,
like the Syrian
Electronic Army (SEA) [57], Iranian Cyber Army and Chinese
cyber-warfare
units [58].
3.2.3 Intelligence agency
Intelligence agencies from different countries are persistent in
their efforts to
probe the military systems of other countries for specific
purposes, for example
industrial espionage, and political and military espionage. To
accomplish their
objectives, the agencies require a large number of experts,
infrastructure
ranging from research and development entities to provide
technologies
and methodologies (hardware, software, and facilities) besides
financial and
human resources.
Such agencies have organized structures and sophisticated
resources to
accomplish their intrusion goals. This sort of agencies are the
biggest threat
to networks and necessitate tight surveillance and monitoring
approaches to
safeguard against threats to the information systems of prime
importance for
any country and military establishment.
4 Discussion and Conclusions
4.1 Discussion
The exponential growth of the IoT has led to greater security
and privacy
risks. Many such risks are attributable to device vulnerabilities
that arise from
cybercrime by hackers and improper use of system resources.
The IoT needs
to be built in such a way as to ensure easy and safe usage
control. Consumers
need confidence to fully embrace the IoT in order to enjoy its
benefits and
avoid security and privacy risks.
The majority of IoT devices and services are exposed to a
number
of common threats as discussed earlier, like viruses and denial-
of-service
attacks. Taking simple steps to avoid such threats and dealing
with system
vulnerabilities is not sufficient; thus, ensuring a smooth policy
implementation
process supported by strong procedures is needed.
The security development process requires thorough
understanding of a
systems assets, followed by identifying different vulnerabilities
and threats
that can exist. It is necessary to identify what the system assets
are and what
Cyber security and the Internet of Things 81
the assets should be protected against. In this paper, assets were
defined
as all valuable things in the system, tangible and intangible,
which require
protection. Some general, IoT assets include system hardware,
software, data
and information, as well as assets related to services, e.g.
service reputation.
It has been shown that it is crucial to comprehend the threats
and system weak-
nesses in order to allocate better system mitigation. In addition,
understanding
potential attacks allows system developers to better determine
where funds
should be spent. Most commonly known threats have been
described as DoS,
physical attacks and attacks on privacy.
Three different types of intruders were discussed in this paper,
namely indi-
vidual attacks, organized groups, and intelligence agencies.
Each attacker type
has different skill levels, funding resources, motivation, and
risk tolerance.
It is very important to study the various types of attack actors
and determine
which are most likely to attack a system. Upon describing and
documenting
all threats and respective actors, it is easier to perceive which
threat could
exploit what weakness in the system. Generally, it is assumed
that IoT
intruder has full DY intruder capabilities in addition to some
limited physical
compromise power. We will presume that physical compromise
attacks do
not scale, and they will therefore only at-worst affect a limited
population
of the total number of IoT devices. IoT architecture must
consequently be
designed to cope with compromised devices and be competent
in detecting
such incidents. It is concluded that attackers employ various
methods, tools,
and techniques to exploit vulnerabilities in a system to achieve
their goals or
objectives. Understanding attackers motives and capabilities is
important for
an organization to prevent potential damage. To reduce both
potential threats
and their consequences, more research is needed to fill the gaps
in knowledge
regarding threats and cybercrime and provide the necessary
steps to mitigate
probable attacks.
5 Conclusions
IoT faces a number of threats that must be recognized for
protective action to
be taken. In this paper, security challenges and security threats
to IoT were
introduced. The overall goal was to identify assets and
document potential
threats, attacks and vulnerabilities faced by the IoT.
An overview of the most important IoT security problems was
provided,
with particular focus on security challenges surrounding IoT
devices and
services. Security challenges, such as confidentiality, privacy
and entity
trust were identified. We showed that in order to establish more
secure and
82 M. Abomhara and G. M. Køien
readily available IoT devices and services, security and privacy
challenges
need to be addressed. The discussion also focused upon the
cyber threats
comprising actors, motivation, and capability fuelled by the
unique charac-
teristics of cyberspace. It was demonstrated that threats from
intelligence
agencies and criminal groups are likely to be more difficult to
defeat than
those from individual hackers. The reason is that their targets
may be much
less predictable while the impact of an individual attack is
expected to be
less severe.
It was concluded that much work remains to be done in the area
of IoT secu-
rity, by both vendors and end-users. It is important for
upcoming standards to
address the shortcomings of current IoT security mechanisms.
As future work,
the aim is to gain deeper understanding of the threats facing IoT
infrastructure
as well as identify the likelihood and consequences of threats
against IoT.
Definitions of suitable security mechanisms for access control,
authentication,
identity management, and a flexible trust management
framework should
be considered early in product development. We hope this
survey will be
useful to researchers in the security field by helping identify the
major issues
in IoT security and providing better understanding of the threats
and their
attributes originating from various intruders like organizations
and intelligence
agencies.
References
[1] L. Atzori, A. Iera, and G. Morabito, “The internet of things:
A survey,”
Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
[2] S. Andreev and Y. Koucheryavy, “Internet of things, smart
spaces, and
next generation networking,” Springer, LNCS, vol. 7469, p.
464, 2012.
[3] J. S. Kumar and D. R. Patel, “A survey on internet of things:
Security and
privacy issues,” International Journal of Computer
Applications, vol. 90,
no. 11, pp. 20–26, March 2014, published by Foundation of
Computer
Science, New York, USA.
[4] A. Stango, N. R. Prasad, and D. M. Kyriazanos, “A threat
analy-
sis methodology for security evaluation and enhancement
planning,”
in Emerging Security Information, Systems and Technologies,
2009.
SECURWARE’09. Third International Conference on. IEEE,
2009,
pp. 262–267.
[5] D. Jiang and C. ShiWei, “A study of information security
for m2m of
iot,” in Advanced Computer Theory and Engineering (ICACTE),
2010
3rd International Conference on, vol. 3. IEEE, 2010, pp. V3–
576.
Cyber security and the Internet of Things 83
[6] B. Schneier, Secrets and lies: digital security in a networked
world. John
Wiley & Sons, 2011.
[7] J. M. Kizza, Guide to Computer Network Security. Springer,
2013.
[8] M. Taneja, “An analytics framework to detect compromised
iot devices
using mobility behavior,” in ICT Convergence (ICTC), 2013
Interna-
tional Conference on. IEEE, 2013, pp. 38–43.
[9] G. M. Koien and V. A. Oleshchuk, Aspects of Personal
Privacy in
Communications-Problems, Technology and
Solution
s. River Publishers,
2013.
[10] N. R. Prasad, “Threat model framework and methodology
for personal
networks (pns),” in Communication Systems Software and
Middleware,
2007. COMSWARE 2007. 2nd International Conference on.
IEEE, 2007,
pp. 1–6.
[11] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H.
Sundmaeker,
A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer
et al.
“Internet of things strategic research roadmap,” Internet of
Things-
Global Technological and Societal Trends, pp. 9–52, 2011.
[12] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service
modelling for
the internet of things,” in Computer Science and Information
Systems
(FedCSIS), 2011 Federated Conference on. IEEE, 2011, pp.
949–955.
[13] G. Xiao, J. Guo, L. Xu, and Z. Gong, “User interoperability
with
heterogeneous iot devices through transformation,” 2014.
[14] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,
“Internet of
things (iot): A vision, architectural elements, and future
directions,”
Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–
1660,
2013.
[15] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, “From
today’s intranet
of things to a future internet of things: a wireless-and mobility-
related
view,” Wireless Communications, IEEE, vol. 17, no. 6, pp. 44–
51,
2010.
[16] C. Hongsong, F. Zhongchuan, and Z. Dongyan, “Security
and trust
research in m2m system,” in Vehicular Electronics and Safety
(ICVES), 2011 IEEE International Conference on. IEEE, 2011,
pp. 286–290.
[17] I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V.
Meyerstein, “Trust
in m2m communication,” Vehicular Technology Magazine,
IEEE, vol. 4,
no. 3, pp. 69–75, 2009.
[18] J. Lopez, R. Roman, and C. Alcaraz, “Analysis of security
threats,
requirements, technologies and standards in wireless sensor
networks,”
84 M. Abomhara and G. M. Køien
in Foundations of Security Analysis and Design V. Springer,
2009,
pp. 289–338.
[19] R. Roman, J. Zhou, and J. Lopez, “On the features and
challenges
of security and privacy in distributed internet of things,”
Computer
Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
[20] Y. Cheng, M. Naslund, G. Selander, and E. Fogelstrom,
“Privacy in
machine-to-machine communications a state-of-the-art survey,”
in Com-
munication Systems (ICCS), 2012 IEEE International
Conference on.
IEEE, 2012, pp. 75–79.
[21] M. Rudner, “Cyber-threats to critical national
infrastructure: An intelli-
gence challenge,” International Journal of Intelligence and
CounterIn-
telligence, vol. 26, no. 3, pp. 453–481, 2013.
[22] R. Kozik and M. Choras, “Current cyber security threats
and chal-
lenges in critical infrastructures protection,” in Informatics and
Appli-
cations (ICIA), 2013 Second International Conference on. IEEE,
2013,
pp. 93–97.
[23] P. N. Mahalle, N. R. Prasad, and R. Prasad, “Object
classification based
context management for identity management in internet of
things,”
International Journal of Computer Applications, vol. 63, no. 12,
pp. 1–6,
2013.
[24] A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and
T. Razafind-
ralambo, “A survey on facilities for experimental internet of
things
research,” Communications Magazine, IEEE, vol. 49, no. 11,
pp. 58–67,
2011.
[25] Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot, and L.
Gurgen,
“Sharing user iot devices in the cloud,” in Internet of Things
(WF-IoT),
2014 IEEE World Forum on. IEEE, 2014, pp. 373–374.
[26] G. M. Køien, “Reflections on trust in devices: an informal
survey
of human trust in an internet-of-things context,” Wireless
Personal
Communications, vol. 61, no. 3, pp. 495–510, 2011.
[27] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac,
“Internet of
things: Vision, applications and research challenges,” Ad Hoc
Networks,
vol. 10, no. 7, pp. 1497–1516, 2012.
[28] M. Thoma, S. Meyer, K. Sperner, S. Meissner, and T.
Braun, “On iot-
services: Survey, classification and enterprise integration,” in
Green
Computing and Communications (GreenCom), 2012 IEEE
International
Conference on. IEEE, 2012, pp. 257–260.
[29] M. Abomhara and G. Koien, “Security and privacy in the
internet of
things: Current status and open issues,” in PRISMS 2014 The
2nd
Cyber security and the Internet of Things 85
International Conference on Privacy and Security in Mobile
Systems
(PRISMS 2014), Aalborg, Denmark, May 2014.
[30] D. Watts, “Security and vulnerability in electric power
systems,” in 35th
North American power symposium, vol. 2, 2003, pp. 559–566.
[31] D. L. Pipkin, Information security. Prentice Hall PTR,
2000.
[32] E. Bertino, L. D. Martino, F. Paci, and A. C. Squicciarini,
“Web
services threats, vulnerabilities, and countermeasures,” in
Security
for Web Services and Service-Oriented Architectures. Springer,
2010,
pp. 25–44.
[33] D. G. Padmavathi, M. Shanmugapriya et al., “A survey of
attacks,
security mechanisms and challenges in wireless sensor
networks,” arXiv
preprint arXiv:0909.0576, 2009.
[34] H. G. Brauch, “Concepts of security threats, challenges,
vulnerabilities
and risks,” in Coping with Global Environmental Change,
Disasters and
Security. Springer, 2011, pp. 61–106.
[35] K. Dahbur, B. Mohammad, and A. B. Tarakji, “A survey of
risks,
threats and vulnerabilities in cloud computing,” in Proceedings
of the
2011 International conference on intelligent semantic Web-
services and
applications. ACM, 2011, p. 12.
[36] R. K. Rainer and C. G. Cegielski, Introduction to
information systems:
Enabling and transforming business. John Wiley & Sons, 2010.
[37] A. J. Duncan, S. Creese, and M. Goldsmith, “Insider
attacks in cloud
computing,” in Trust, Security and Privacy in Computing and
Communi-
cations (TrustCom), 2012 IEEE 11th International Conference
on. IEEE,
2012, pp. 857–862.
[38] P. Baybutt, “Assessing risks from threats to process plants:
Threat
and vulnerability analysis,” Process Safety Progress, vol. 21,
no. 4,
pp. 269–275, 2002.
[39] C. Tankard, “Advanced persistent threats and how to
monitor and deter
them,” Network security, vol. 2011, no. 8, pp. 16–19, 2011.
[40] F. Li, A. Lai, and D. Ddl, “Evidence of advanced persistent
threat: A case
study of malware for political espionage,” in Malicious and
Unwanted
Software (MALWARE), 2011 6th International Conference on.
IEEE,
2011, pp. 102–109.
[41] S. Ansari, S. Rajeev, and H. Chandrashekar, “Packet
sniffing: a brief
introduction,” Potentials, IEEE, vol. 21, no. 5, pp. 17–19, 2002.
[42] M. De Vivo, E. Carrasco, G. Isern, and G. O. de Vivo, “A
review of
port scanning techniques,” ACM SIGCOMM Computer
Communication
Review, vol. 29, no. 2, pp. 41–48, 1999.
86 M. Abomhara and G. M. Køien
[43] I. Naumann and G. Hogben, “Privacy features of european
eid card
specifications,” Network Security, vol. 2008, no. 8, pp. 9–13,
2008.
[44] C. Wilson, “Botnets, cybercrime, and cyberterrorism:
Vulnerabilities and
policy issues for congress.” DTIC Document, 2008.
[45] A. Daneels and W. Salter, “What is scada,” in International
Conference
on Accelerator and Large Experimental Physics Control
Systems, 1999,
pp. 339–343.
[46] A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke,
“Scada
security in the light of cyber-warfare,” Computers & Security,
vol. 31,
no. 4, pp. 418–436, 2012.
[47] V. M. Igure, S. A. Laughter, and R. D. Williams, “Security
issues in scada
networks,” Computers & Security, vol. 25, no. 7, pp. 498–506,
2006.
[48] M. Kelleye, “Business Insider. The Stuxnet attack on Irans
Nuclear Plant was Far more Dangerous Than Previously
Thought,”
http://www.businessinsider.com/stuxnet-was-far-more-
dangerous-than-
previous-thought-2013-11/,2013, [Online; accessed 03-Sep-
2014].
[49] B. Jung, I. Han, and S. Lee, “Security threats to internet: a
korean
multi-industry investigation,” Information & Management, vol.
38, no. 8,
pp. 487–498, 2001.
[50] C. P. Mayer, “Security and privacy challenges in the
internet of things,”
Electronic Communications of the EASST, vol. 17, 2009.
[51] A. R. Beresford, “Location privacy in ubiquitous
computing,” Com-
puter Laboratory, University of Cambridge, Tech. Rep, vol. 612,
2005.
[52] S. Pramanik, “Threat motivation,” in Emerging
Technologies for a
Smarter World (CEWIT), 2013 10th International Conference
and Expo
on. IEEE, 2013, pp. 1–5.
[53] D. Dolev and A. C. Yao, “On the security of public key
protocols,”
Information Theory, IEEE Transactions on, vol. 29, no. 2, pp.
198–208,
1983.
[54] I. Cervesato, “The dolev-yao intruder is the most powerful
attacker,”
in 16th Annual Symposium on Logic in Computer ScienceLICS,
vol. 1.
Citeseer, 2001.
[55] J. Sheldon, “State of the art:Attackers and targets in
cyberspace,” Journal
of Military and Strategic Studies, vol. 14, no. 2, 2012.
[56] E. M. Archer, “Crossing the rubicon: Understanding cyber
terrorism
in the european context,” The European Legacy, no. ahead-of-
print,
pp. 1–16, 2014.
Cyber security and the Internet of Things 87
[57] A. K. Al-Rawi, “Cyber warriors in the middle east: The
case of the syrian
electronic army,” Public Relations Review, 2014.
[58] D. Ball, “Chinas cyber warfare capabilities,” Security
Challenges,
vol. 7, no. 2, pp. 81–103, 2011.
Biographies
M. Abomhara is currently pursuing his PhD at University of
Agder, Norway.
His research work is in the area of computer security,
information secu-
rity, information system management, cyber-security, and
Internet of things.
He received a Master of Computer Science (Data
Communication and
Computer Network) from University of Malaya, Malaysia in
2011. He also
received a Master of Business Administration (MBA,
Information technology
management) from Multimedia University, Malaysia in 2013
and a Bachelor
of Computer Science from 7th October University, Libya in
2006.
G. M. Køien is an associate professor in security and privacy in
ICT at the
University of Agder, Norge. He has previously worked for
Ericsson Norway,
System Sikkerhet AS and Telenor R & D. During his time with
Telenor
R & D he was the Telenor delegate to the SA3 (3GPP) work
group on security.
He received his PhD for Aalborg University, Denmark in 2008.
42 Kappan November 2015
The top and bottom of
leadership and change
Successful large-scale reform efforts — one in Northern
England, another in
Canada — bolster the approach of “leading from the middle.”
by andy hargreaves and mel ainscow
For 15 years and more, in the U.S., England, parts of Canada,
and elsewhere, reforms
to improve educational equity and achievement have come in
large-scale measures — de-
signed and delivered in detail by big government across whole
systems. Such top-down
reforms promised a sharp focus on improving literacy and
mathematics achievement and
boosting high school graduation.
Image: Thinkstock/iStock
V97 N3 kappanmagazine.org 43
Comments?
Like PDK at www.
facebook.com/pdkintl
Training, coaching, and other professional development
supports accompanied some
top-down strategies. Others, like the No Child Left Behind law,
proved excessively de-
manding, requiring progress for all categories of students every
year and imposing puni-
tive consequences when schools and districts fell short.
But punitive or supportive, all top-down reforms have an
Achilles heel: Their focus
on micromanaging two or three measurable priorities only
works for systems pursuing
traditional and comparatively narrow achievement goals. A
digital age of complex skills,
cultural diversity, and high-speed change calls for more
challenging educational goals and
more sophisticated and fl exible change strategies.
Thus, reformers are advocating greater autonomy for schools
and teachers, increased
freedom for local curriculum design, and more independent and
personalized access to
technology. But the history of bottom-up innovation and
individual school autonomy is
not impressive. In the 1960s and ’70s, innovative ideas often
didn’t spread beyond a few
isolated classrooms and schools, and, when they did, their
implementation often was fatally
fl awed (Gross, Giacquinta, & Bernstein, 1971). There is no
reason to believe that efforts
to spread the success of a few innovative, high-tech schools will
fare any better today.
andy haRgReaVes ([email protected]) is the Brennan Chair in
Education in the Lynch School of Education at Boston
College, Chestnut Hill, Mass. He is co-author of Uplifting
Leadership (Wiley, 2014). mel ainscoW is a professor of
education at
the University of Manchester, United Kingdom, and author of
Toward self-improving school systems: Lessons from a city
challenge
(Routledge, 2015).
What can the U.S. learn from
england and canada?
3Top-down reforms have a long
history of failure. A middle-driven
approach of coordinated change,
collective responsibility, and delegating
resources and authority to school
districts can yield positive results.
44 Kappan November 2015
2014; Sutton Trust, 2015). This has created a co-
nundrum of district-driven improvement:
Although all high-performing nations are
characterized by strong local control, not all
nations with strong local control are high per-
forming.
One response to this conundrum is to say that
school districts aren’t worth saving and either deliver
reforms in detail from the top or institute market-
based, individual alternatives like charter schools,
free schools, and academies that are insulated from
district control. Another response is to use central
funding formulas to compensate for bad variation
and inequities. However, the strings attached to this
funding often heap more grant writing and account-
ability requirements on already overstretched high-
poverty districts.
leading from the middle
A third way to reduce bad variation among school
districts is to promote collaboration among them so
they share resources, ideas, and expertise and exer-
cise collective responsibility for student success. In
this leading from the middle approach, districts don’t
just mediate and manage other people’s reforms
individually; they become the collective drivers of
change and improvement together. When districts
lead from the middle together, they:
• Respond to local needs and diversities;
• Take collective responsibility for all students’
and each other’s success;
• Exercise initiative rather than implementing
other people’s initiatives;
• Integrate their own efforts with broad system
priorities; and
• Establish transparency of participation and
results.
These components of leading from the middle are
In an age of innovation and diversity, top-down
strategies are inappropriate, while bottom-up strat-
egies seem unable to achieve improvement on any
significant scale. So what should we do instead?
One possibility is shifting attention toward districts,
which can support schools and teachers in innovating
and improving together.
leading in the middle
In North America and Northern Europe, school
districts have historically been the linchpin of local
democracy (Katz, 1987; Bryk et al., 1998). California
Gov. Jerry Brown has recognized this by returning
education spending control back to the state’s over
900 local districts, placing maximum control at the
most local level of competent authority (Torlakson,
2015). Districts can provide a valuable focus for school
improvement, be a means for efficient and effective
use of research evidence and data analysis across
schools, support schools in responding coherently to
multiple external reform demands, and be champi-
ons for families and students, making sure everybody
gets a fair deal. Strong districts are powerful forces
for positive educational change (Leithwood, 2013).
Strong and steadily improving districts like Boston
Public Schools and Long Beach Public Schools have
received widespread acclaim for systemwide gains
(Barber, Chijioke, & Mourshed, 2011). In England,
some of the most dramatic turnarounds have been in
urban districts, like the London boroughs of Hackney
and Tower Hamlets, which went from the lowest per-
formers in the country to scoring above the national
average on all key indicators (Hargreaves, Boyle, &
Harris, 2014; Hargreaves & Shirley, 2009).
So some reformers argue that the middle level
needs a stronger role in order to implement changes
from the top and to move around ideas and strategies
percolating up (Schleicher, 2015). This amounts to
a kind of leadership in the middle — a healthy sort
of middle-stage spread.
Weaknesses of the middle
Leading in the middle is promising, but it’s not
enough. Not all local school systems or districts are
strong. Some districts do well; others fare badly.
Districts vary in their resources and capacities for
change, like networking and seeking other ideas.
Districts can be self-serving, politically toxic, gla-
cially slow at driving improvement, and, as in the
Atlanta cheating scandal, just plain corrupt.
In the U.S. and England especially, there are unac-
ceptable variations in school district quality. Differ-
ences in demographics, poverty, funding, and capac-
ity to attract and develop effective leadership means
very high-performing and very low-performing
districts sometimes coexist side-by-side (Noguera,
Large-scale success cannot be
achieved if districts continue to act
independently of one another.
V97 N3 kappanmagazine.org 45
land as head teachers) changed the cultures of the
schools. Instead of blaming parents in poor families
for not being interested in their children’s learning,
schools came to appreciate the stresses facing fam-
ilies and then responded with local flexibility and
intensive support. They began to focus on deliver-
ing better, more interesting teaching and learning
through strategies like cooperative learning and
Japanese lesson study. There was a lot of pressure
on teachers and schools to work hard to improve
results, but there also was more emphasis on caring
for the adults in the schools as well as the children
so that the schools became happy and professionally
fulfilling places to work.
None of this was easy. Local authorities are politi-
cal entities as well as providers of services. Internal
conflicts and external turf wars were often exacer-
bated by national policies that promote interschool
competition. A steering committee involving na-
tional government and local representatives got
locked into conflicts over the budget. A commit-
tee of leaders of the 10 authorities became fractious
evident in two systemwide reforms in which we have
been closely involved — the Greater Manchester
Challenge (GMC) in England, and district-driven
improvements in Ontario, Canada.
greater manchester challenge
The United Kingdom government initiated the
GMC in the 2007-08 school year by bringing to-
gether 10 school districts (known in the UK as local
authorities) to improve standards over three years.
Co-author and professor of education Mel Ainscow
was appointed chief adviser to this approximately
$80 million (U.S.) project. “There are lots of good
things going on in schools in Greater Manchester,”
Ainscow said upon his appointment. “The task now
is to spread the best practice to all schools.”
But how would this be done? Ainscow’s group de-
vised several principles for the effort:
• Leaders of successful schools would work with
weaker schools to improve their leadership
teams;
• Schools with similar student populations would
be clustered to share best practices; and
• Local problems would be met with local
solutions.
Getting schools to collaborate was not a new idea
in England. What was different, though, was that
while previous school-to-school networks and part-
nerships had tended to bypass local authorities, 10
of them would be driving improvement together (see
Ainscow, 2015 for a full account of the GMC).
Multiple strategies brought this simple principle
to life. Schools cooperated across authority bound-
aries. Recently turned-around schools became key
in helping other schools. Hub schools that demon-
strated excellence in particular areas provided ex-
tensive training and development for teachers in
other schools and local authorities. Schools at dif-
ferent stages of development organized in “families.”
A Jewish school assisted a predominantly Muslim
partner. A Catholic school prayed for a good in-
spection result for its secular counterpart. School
officials found hidden capacity and capitalized on it;
they shared knowledge and overcame old rivalries
for the higher purpose of improving the whole area.
The Manchester area had suffered from historic
problems of unemployment and deprivation for four
decades, but by 2011, GMC schools were above the
national average on all standardized test measures.
Secondary schools in the most disadvantaged com-
munities improved at three times the rate of the na-
tional average.
By working together, principals (known in Eng-
Punitive or supportive, all versions of
top-down reform have an Achilles heel.
whenever it was presented with disturbing data or
with concerns about lack of progress. While six of
the authorities were willing to change roles and re-
sponsibilities, two others accommodated the new
language of shared responsibility for improvement
without making any real changes in practice. But
over time, with persistence of effort, relationships
improved, some personnel changed, ideas and strat-
egies started to be shared between schools as well
as within them, and the authorities even began to
commit to some joint delivery of services.
The strategies adopted in Manchester (and now
in Wales) define the essence of leading from the
middle. But this term didn’t arise in the UK. It first
emerged in a systemwide project with 10 school dis-
tricts that the other co-author of this article (Andy
Hargreaves) carried out with his colleague Henry
Braun in Ontario, Canada.
ontario district-led reforms
Ontario has undertaken one of the world’s best-
known, large-scale educational reforms. The most
46 Kappan November 2015
where even small amounts of extra resources could
therefore make a great difference, this built a criti-
cal mass of district support. Larger districts eventu-
ally were persuaded to participate with their smaller
counterparts by appealing to their historic symbolic
status and the contribution they could make to the
collective good of the province’s students.
Responsibility for planning and implementation
came under a core team of six key staff — retired
district leaders and superintendents of curriculum
or special education — who jointly developed proj-
ect goals, designed an implementation strategy, and
monitored participation and results. They did this by
constantly connecting with and circulating among
the districts, making necessary changes and refine-
ments as they amassed evidence of what was working
and what was not.
Like the GMC, district leaders did not believe
that one-size-fits-all strategies were appropriate in
a province where one in four schoolchildren were
born outside of Canada, leading to several different
strategies:
• In a district with high numbers of children
from immigrant families, the project focused
on early literacy initiatives like a summer head-
start program for students new to the region
and a “snuggle up and read” program involving
parents or other family members.
• In a district serving a large student population
of Old Order German-origin Mennonites
whose community is characterized by mutual
aid, commitment to collective self-sufficiency,
and wearing traditional dress, children tended
to leave school early to work on the farms,
or, in the case of girls, to get married and
have children. Standard efforts to enforce
school attendance and improve high school
completion would prompt families to move to
other parts of their rural network throughout
North America. So school leaders engaged
with their culture, for example, by using
the community’s agricultural products for
publicized parts of the reform, involving more than
5,000 schools, have been the focus on raising expec-
tations and narrowing the achievement gap in tested
literacy and mathematics and on increasing the rates of
high school completion. The design and implementa-
tion of this reform — by a “guiding coalition” of po-
litical and professional forces — was complemented
by strong support to enable districts to be successful
in achieving the desired results (Campbell et al., 2015).
The province’s 72 school districts and their sys-
tem leaders led a less well-known part of the reform
agenda. In 2005, the government gave the districts
an initial investment of $25 million (Canadian) to
design and implement a strategy to improve learn-
ing and achievement for students with special edu-
cational needs that would also benefit all students.
One system leader described this change as “leading
from the middle.” After four years of this reform,
the literacy achievement gap between students with
special needs and other students had narrowed in
reading and especially in writing.
A survey of the reform indicated the changes
brought greater collaboration among staff, more
joint planning, and broader acceptance of collective
responsibility for all students (Hargreaves & Braun,
2012). Teachers reported increased use of differenti-
ated instruction, more analysis and discussion of data
to pinpoint needed interventions, greater coopera-
tion between special education resource teachers and
classroom teachers in relation to all students who
struggled rather than only those with official iden-
tifications, and more use of assistive technologies for
students with learning disabilities. Intensive site vis-
its in all 10 districts corroborated these results and
also revealed greater collaboration between curricu-
lum and special education departments within dis-
tricts that sometimes amounted to total integration.
In general, educators reported a large movement
from a culture of “my students” to “our students.”
District leaders drove this strategy. They took
a counterintuitive approach of providing identical
funding to all 72 districts, regardless of their size. In
a province where many districts were quite small and
In the leading from the middle approach, districts don’t just
mediate and manage
other people’s reforms individually; they become the collective
drivers of change and
improvement together.
V97 N3 kappanmagazine.org 47
not micromanaging) this district-driven change. It
stated that the CODE special education project must
address issues of underachievement and the need to
narrow the achievement gap and that the project
should be consistent with the guiding philosophy
of a 2005 provincial report called Education for All
(Ontario Ministry of Education, 2005).
Ontario’s special education reform created a
change design that improved education for all stu-
dents across the system. It drove change from the
middle instead of ordering it from the top. And
instead of expecting districts to adopt uniform re-
sponses to a centralized reform strategy, the reform
generated and galvanized local creativity and energy
in order to respond flexibly to local needs and cir-
cumstances.
Building on its improvements in literacy and high
school graduation and the success of its reforms, On-
tario is moving further forward to pursue broader,
bolder goals that include achievement and equity in
21st-century skills, arts, sciences, and citizenship. It
also is pursuing greater well-being in mental, emo-
tional, and physical health (Ontario Ministry of Edu-
cation, 2014). The Boston College team is now work-
ing with the 10 districts to lead from the middle, for
the province, in relation to increasing students’ and
teachers’ engagement, promoting their well-being
and building positive, diverse identities among them.
conclusion
In recent years, in too many countries, school dis-
tricts have been driven to distraction and to near
destruction by top-down changes that have under-
mined or bypassed their authority and also the com-
munities they serve. There is clear evidence that dis-
tricts can and should be a big part of a better future
for children, if they’re willing to embrace changes
in their thinking and practice.
Large-scale success cannot be achieved if districts
continue to act independently of one another. Lead-
ing from the middle, not just in the middle, can use
children’s lunches, meeting parents on street
corners, carrying home their shopping, and
building relationships to shift perceptions
about the value of formal education.
• A remote rural district serving just 24 schools
across an area the size of France had struggled
with how to raise expectations for the 40% of
children from aboriginal families (known in
Canada as First Nations communities). Some
educators believed that children from these
communities could not learn, could barely
speak, and mainly needed an emotionally safe
and caring environment. The district’s response
was to coach teachers to use more specific,
differentiated, and culturally appropriate
teaching strategies, and to examine examples of
student work among colleagues to demonstrate
possibilities for student and teacher success.
Like the GMC, the Ontario special education
project also stressed collective cross-district respon-
sibility for all students’ success. All 72 districts were
involved. Collective responsibility began with teach-
ers across grade levels and with special education and
regular classroom assignments taking responsibility
for struggling students and their progress together.
The districts exercised collective responsibility, too,
in how they shared strategies transparently at annual
retreats where they presented their practices and re-
sults, in how they communicated with the steering
committee, and in how they were connected by their
team of mentors and monitors who were ensuring
that intentions were being converted into action.
These mentors and monitors did not have hierar-
chical supervisory authority over the districts and
their leaders. Instead, these respected peers acted as
a “third-party” force responsible for improvement,
system learning, and, where needed, to challenge
existing practice.
Ontario’s special education reform was not only
implemented by district leaders and special educa-
tion superintendents; it was devised and driven by
them. At the very beginning the executive director
of the Council of Ontario Directors of Education
(CODE) and a small group of his associates who
acted on behalf of the 72 district leaders pointed
out to the Ministry of Education that it already had
allocated significant resources to other groups such
as the teachers’ unions. CODE therefore requested
resources and authority of its own to lead improve-
ments in special education.
Though some feared the district leaders and their
organization might diverge from Ministry of Edu-
cation policy, these leaders sought ways to integrate
their own efforts with central government directions.
The ministry itself took a clear role in steering (but
A Jewish school assisted a
predominantly Muslim partner. A
Catholic school prayed for a good
inspection result for its secular
counterpart.
48 Kappan November 2015
Bryk, A.S., Sebring, P.B., Kerbow, D., Rollow, S., & Easton,
J.Q. (1998). Charting Chicago school reform: Democratic
localism as a lever for change. Boulder, CO: Westview Press.
Campbell, C., Osmond-Johnson, P., Lieberman, A., & Sohn,
J. (2015). International teacher policy study: Ontario case
report. Toronto, ON: Ontario Institute for Studies in Education,
University of Toronto. http://bit.ly/1WueyUR
Gross, N., Giacquinta, J.B., & Bernstein, M. (1971).
Implementing organizational innovations: A sociological
analysis of planned educational change. New York, NY: Basic
Books.
Hargreaves, A., Boyle, A., & Harris, A. (2014). Uplifting
leadership: How teams and communities raise performance.
San Francisco, CA: Jossey-Bass.
Hargreaves, A. & Braun, H. (2012). Leading for all: Final report
of the review of the development of essential for some, good
for all: Ontario’s strategy for special education reform devised
by the Council of Directors of Education. Toronto, Ontario:
Council of Directors of Education.
Hargreaves, A. & Shirley, D. (2009). The fourth way: The
inspiring future for educational change. Thousand Oaks, CA:
Corwin Press.
Katz, M. (1987) Reconstructing American education.
Cambridge, MA: Harvard University Press.
Leithwood, K. (2013). Strong districts & their leadership.
Toronto, Ontario: Ontario Institute of Education Leadership.
Noguera, P. (2014, June 18). In defense of teacher tenure:
A few ineffective educators are not the primary reason
many schools are struggling. The Wall Street Journal. www.
wsj.com/articles/pedro-noguera-in-defense-of-teacher-
tenure-1403134951
Ontario Ministry of Education. (2005). Education for all. http://
bit.ly/1ihpaYA
Ontario Ministry of Education. (2014). Achieving excellence: A
renewed vision for education in Ontario. http://bit.ly/1ihoYsk
Rincon-Gallardo, S. & Fullan, M. (in press). Essential features
of effective collaboration: The social physics of educational
change. Journal of Professional Capital and Community.
Schleicher, A. (2015, March 30). Implementing highly effective
teacher policy and practice: The 2015 International Summit
on the Teaching Profession. www.slideshare.net/OECDEDU/
implementing-highly-effective-teacher-policy-and-practice-
2015-international-summit-of-the-teaching-profession
Sutton Trust Education Data Lab. (2015). Missing talent.
Research brief. London, UK: Sutton Trust. http://bit.
ly/1EQWT5k
Torlakson, T. (2015) A blueprint for great schools: Version 2.0.
Sacramento, CA: California Department of Education.
Leading in the middle is a promising
direction, but it’s not enough.
“As you can see boys and girls, the alphabet comes in ‘caps
lock on’ and ‘caps lock off.’”
the power of local solutions to diverse problems in
an environment where schools work with schools
and districts work with districts as they exercise col-
lective initiative and responsibility for all students’
success. This kind of leadership needn’t be confined
to districts and can encompass networks and other
kinds of partnerships as well (Rincon-Gallardo &
Fullan, in press). But collective responsibility is not
just something districts should ask others to under-
take. It is something that districts now have to take
on themselves. K
References
Ainscow, M. (2015) Towards self-improving school systems:
Lessons from a city challenge. London, UK: Routledge.
Barber, M., Chijioke, C., & Mourshed, M. (2011). How the
world’s most improved school systems keep getting better.
Chicago, IL: McKinsey & Company.
Copyright of Phi Delta Kappan is the property of Sage
Publications, Inc. and its content may
not be copied or emailed to multiple sites or posted to a listserv
without the copyright holder's
express written permission. However, users may print,
download, or email articles for
individual use.
Expanding
Our
Understanding
of Social
Change
A Report From the
Definition Task Force of the
HLC Special Emphasis
Project
Darragh Callahan, Elizabeth Wilson, Ian Birdsall,
Brooke Estabrook-Fishinghawk, Gary Carson,
Stephanie Ford, Karen Ouzts, Iris Yob
Expanding Our Understanding (July 2012) Page 2
Academic Offices
100 Washington Avenue South, Suite 900
Minneapolis, MN 55401
Phone: 1-612-338-7224 or 1-800-WALDENU (1-800-
925-3368)
Fax: 1-612-338-5092
Administrative Offices
650 S. Exeter Street
Baltimore, MD 21202
Phone: 1-866-4WALDEN (1-866-492-
5336)
Fax: 1-410-843-8104
Walden University is accredited by The Higher Learning
Commission and a member of the North
Central Association, www.ncahlc.org.
Walden University practices a policy of nondiscrimination in
admission to, access to, and
employment in its programs and activities. Walden does not
discriminate on the basis of race,
color, sex, age, religion or creed, marital status, disability,
national or ethnic origin, socioeconomic
status, sexual orientation, or other legally protected status.
Walden is committed to providing barrier-free access to its
educational services and makes
appropriate and reasonable accommodations when necessary.
Students requesting
accommodations per the Americans with Disabilities Act (ADA)
must contact the Office of
Disability Services at [email protected]
© 2012 Walden University, LLC
http://www.ncahlc.org/
mailto:[email protected]
Expanding Our Understanding (July 2012) Page 3
Social change is defined broadly in terms of process and
product to indicate that all kinds of
social change activity are welcomed and encouraged at Walden.
As faculty members, students,
and alumni have indicated, even small acts can have large
consequences, and many of these
consequences are unpredictable. The charge given to the
Definition Task Force was to expand
the university’s definition of social change to provide more
guidance for teaching, learning, and
assessing the social change mission at Walden. To that end, the
Task Force offers the following
considerations.
To bring about long-term solutions and promote lasting effects
through the process of social
change, the following features may need to be considered as
appropriate to the context and
purposes of each program. The features are grouped under the
headings Knowledge, Skills, and
Attitudes, to encourage a holistic approach to preparing learners
for social change. The
groupings, however, are defined by soft boundaries because
each feature belongs primarily to
one group but may share some of the qualities of the other
groups.
A. Knowledge
1. Scholarship
The scholar-practitioner model is particularly suited to social
change because knowledge
applied to real-life situations is a scholar-practitioner’s goal. In
the scholarly role, the
scholar-practitioner engages in active learning, critical
reflection, and inquiry into real-
life dilemmas and possibilities. Careful study and research can
reveal the causes and
correlates of social problems and suggest solutions and
opportunities for promoting
growth.
2. Systems thinking
Many of the issues addressed by social change are complex
because there may be
multiple causes and manifestations of the issue that require
different responses at many
levels. Systemic thinking is a technique for developing insights
into challenging
situations and complex subjects. It usually begins with analysis,
which makes sense of a
system by breaking it apart to see how the parts work together
and influence each
other. This may be followed by synthesis that aims to develop a
set of responses that
address the situation in a comprehensive way. In the Walden
community, finding
systemic solutions to challenging issues might be undertaken by
multidisciplinary
collaborations in which scholar-practitioners from a number of
colleges work together
to examine issues and propose multipronged responses.
http://www.probsolv.com/probsolv.htm
Expanding Our Understanding (July 2012) Page 4
3. Reflection
Those working toward positive social change can enhance their
effectiveness by
reflecting on the experience. Reflection can be extrospective,
that is, looking outward to
review the short- and long-term outcomes of a project and its
implications for the
individuals, institutions, and communities with and for whom
one is working. It can also
be introspective, that is, looking inward to examine what has
been learned from the
process, including new insights into one’s motives, skills,
knowledge, actions, and
reactions. Self-reflection allows for the contemplation of one’s
professional and
personal development. Group reflection affords all stakeholders
in a social change
project (scholar-practitioners, community partners, policy-
makers, and beneficiaries) an
opportunity to process the experience and learn from each other.
Reflection employs
critical-thinking and analytical skills. It can be carried forward
by questioning and self-
inquiry and may depend on a willingness to see things from
another’s perspective.
While reflection needs to be honest, it should also be caring and
supportive, examining
strengths as well as weaknesses and successes as along with
disappointments. While
reflection may look to the past, its purpose is forward-looking—
to make future social
change activities more effective.
B. Skills
4. Practice
In the practitioner role, the scholar-practitioner engages in the
application of
knowledge. Learning-by-doing, or experiential learning, has a
long history of support
and success in education because it can infuse and sometimes
lead to deconstructing or
constructing theoretical understandings within the realities of
practical life in the
student’s personal growth, profession, or community. By using
recursive loops between
scholarship and practice, both intellectual growth and better
practice can occur—each
informing the other. Not merely knowing about theories but
actually testing theories in
the context of everyday life is the foundation of a scholar-
practitioner’s educational
process and contribution to social change.
5. Collaboration
Given the complexity of many of the issues addressed in social
change efforts,
responsive action may be needed from many different sources.
In these situations, the
Expanding Our Understanding (July 2012) Page 5
social change agent may want to build working relationships
with other entities
including community leaders, service agencies, neighborhood
coalitions, businesses,
religious congregations, and other local institutions. Apart from
these types of civic
engagement, collaboration with scholars and practitioners in an
array of professional
fields may bring a variety of perspectives, research, and applied
knowledge.
Partnerships can unite the skills, knowledge, and energies
needed to make a difference.
The ability to build a team, combined with leadership, project
management, conflict
resolution, and communication skills, may be essential. A
significant partner in social
change enterprises is the primary beneficiary; this person has a
personal knowledge and
experience that can be invaluable in both analyzing a situation
and proposing responses.
The primary beneficiary may be one individual or someone
representing the
perspectives of a group of beneficiaries. Working
collaboratively with primary
beneficiaries can be mutually educative and rewarding.
6. Advocacy
Advocacy is a matter of raising consciousness or being the
“voice” for someone, some
group, or something that may or may not otherwise have a voice
that can be heard. It
may involve political engagement, but it may also be a matter of
supporting others as
they negotiate directly with the services and opportunities they
need. In light of social
change, advocacy more widely aims to influence not only
political but also economic
and social systems and institutions to protect and promote the
dignity, health, safety,
and rights of people. Advocacy for an issue often takes the form
of education that aims
to bring about a new understanding and awareness. Advocacy
may also need to
encompass mentoring activities to build confidence and self-
reliance in those whose
welfare is being promoted.
7. Civic engagement
Social change efforts can be supported and reflected in laws by
policy-makers. Being
aware of the channels for communicating with civic leaders and
knowing how to
effectively use those channels are often important when working
for social change. All
institutions and groups—not just government entities—have
their own politics, that is, a
prevailing mind-set, an internal structure, and channels of
influence and power. Being
able to incorporate and negotiate these politics in support of
social change requires
finesse and sensitivity. Understanding this before engaging with
others can be helpful,
whether these others are legislators, local agencies and
institutions, professional
associations, neighborhoods, ad hoc teams, or professional
colleagues. Power
Expanding Our Understanding (July 2012) Page 6
relationships also exist between those working for social change
and those who are the
primary beneficiaries. Mutual collaboration and power-sharing
between the parties
involved can empower all toward more lasting social change.
C. Attitudes
8. Humane ethics
While a number of emotional effects may prompt one to engage
in social change,
including empathy, sympathy, guilt, a feeling of satisfaction,
and so on, one’s ethical
code can inform and direct one’s motivated engagement in
social change. Humane
ethics is a system of moral principles that guide human conduct
with respect to the
rightness and wrongness of certain actions. While personal
codes of ethics may differ,
an underlying, common code of a humane ethic is characterized
by tenderness,
compassion, sympathy for people and animals, especially for the
suffering or distressed,
and concern for the health of the environment in which we live.
Analyzing Social Change
Figure 1 below shows each of the features—scholarship,
systemic thinking, reflection, practice,
collaboration, advocacy, civic engagement, and humane ethics—
on an axis ranging from 0 to 5.
Each social change activity or project could be mapped onto the
axes to show the extent to
which it incorporates each feature. Joining the points along each
axis produces a web for each
activity, an example of which is shown in red.
It is important to note that this tool is not intended to be an
instrument to assess a particular
social change activity. Some projects and activities will be
appropriately strong in one or more
areas but not necessarily in all. Rather, its purpose is to serve as
a tool to analyze social change
activities that occur at Walden. It may reveal areas where an
activity might be enhanced, and
importantly, it may reveal where the program for preparing
students for social change might be
strengthened.
Further, all kinds of social change activities are encouraged,
given the range of interests,
commitments, and opportunities for engagement among
students, faculty members, and staff.
Most, if not all, kinds of activity can be represented as a web.
The purpose of the web analysis
is ultimately to provide a tool to enlarge our vision of the range
and features of social change
that seeks long-term solutions and promotes lasting effects.
Expanding Our Understanding (July 2012) Page 7
Figure 1. Web map showing each of the features.
Below are some examples of web maps of social change
activities based on reports by students, faculty
members, and alumni in a recent research study: Perspectives on
Social Change. Pseudonyms have been
used throughout.
Example No. 1. Bookcase Builders
Tom is a Rotarian and undertakes a number of service projects
in the community with other Rotarians.
One such activity involves building bookcases. Some members
of the club also volunteer with Habitat for
Humanity, which provides housing for needy families. Another
member has connections with the local
school district and knew of a recent drive to improve the level
of literacy in the community. Putting
these together, the club decided to build bookcases for the
Habitat for Humanity homes and, through
the support of another club member who manages a bookstore,
give each family a gift certificate to buy
books for the children to put in the bookcase.
This activity would certainly rate relatively high on
Collaboration for the networking among Rotarians,
the local chapter of Habitat for Humanity, the school district,
and the local book store. It also represents
a Humane Ethic in that it shows the responsiveness of this club
to the need for these children to read
Expanding Our Understanding (July 2012) Page 8
well for their future success in life. As a practice, this need is
supported by implicit knowledge about the
importance of motivating children and providing them with
opportunities to read. so there should be a
showing on the Practitioner axis. Figure 2 below shows how this
project might be mapped.
Figure 2. Web map of the bookcase builders project.
If Tom and his fellow club members want to pursue this project
further they might ask whether they
may seek other possible partners for this endeavor, such as the
reading tutors, the bookstore
salespeople, the parents, and even the children themselves.
Others brought into the program may
contribute more Systemic Thinking to address the problem of
illiteracy. The club members may also
consider follow-up activities using other features like Advocacy
with a particular focus on mentoring,
Civic Engagement, or some Scholarly study of or research on
the effectiveness of the project.
Example No. 2. Basket-Weavers as Story-Tellers
Arsi’s research took her to a remote and needy area of Jamaica,
where many of the village women help
support their families through weaving baskets for sale in the
tourist areas. Using a qualitative approach,
Arsi listened to and recorded the women’s stories of their lives
in abject poverty, analyzed them for
common themes, and presented her findings as her dissertation.
The information in this dissertation
could be invaluable to service agencies and others willing to
work with these women to improve their
lives.
Expanding Our Understanding (July 2012) Page 9
The project is high on the Scholar axis, especially because it is
research into a real-life problem that
needs informed solutions. It further exhibits significant
Collaboration in that she established personal
relationships with the women so that they could tell her their
stories. It is also strong in the Humane
Ethics dimension because it deals with real human need.
Writing a dissertation also demands Reflection,
particularly because it requires some discussion of the meaning
of the findings and their possible
implications. The dissertation ultimately enters the public
domain and, as such, is a permanent voice for
the women whose stories it shares (Advocacy). Figure 3 below
illustrates this example.
Figure 3. Web map of the basket-weavers as story-tellers
project.
Arsi successfully graduated in 2011. If she wanted to continue
with the project, she might share her
findings with policy-makers (Civic Engagement) and service
providers, such as business people,
educators, and healthcare workers (Systemic Thinking). If she
could disseminate her work through
publications and presentations, she would not only deepen her
own understanding (Reflection) but
more directly provide valuable information to service agencies
and others to apply in working with and
for these women (Practitioner).
Example No. 3. The Monthly Giver
Expanding Our Understanding (July 2012) Page 10
Many faculty members, students, and staff members sign up to
make monthly donations to agencies,
such as United Way, through automatic payroll deductions.
Given their busy schedules and
commitments, they look at this as making some kind of
contribution to “the development of individuals,
institutions, and societies.” Does such an activity count as
social change? Figure 4 below is an attempt
to map this activity.
One of the benefits of the mapping tool is that it is inclusive of
a wide range of possible engagements in
social change. The monthly giver, like many others, is guided
by a Humane Ethic and wants to act out of
compassion and care for the distressed and needy. She also
understands that the organization she is
donating to is carefully managed, well informed, and handles
donations responsibly, and she wants to
do something practical to support it (Practitioner). She also
knows that her donation, because it is
combined with the donations of many others, can amount to a
significant sum to support large-scale
projects in the community (Collaboration).
Figure 4. Web map of the monthly giver.
Example No. 4. Global Day of Service Participant
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx

More Related Content

Similar to © 2016 Laureate Education, Inc. Page 1 of 3 RWRCOEL Prof.docx

Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning
Louise Jones
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
Finni Rice
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
John Macasio
 
Ict security essay
Ict security essay Ict security essay
Ict security essay
rubtumproject.com
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
ssuser793b4e
 
Examples Of Military Leadership
Examples Of Military LeadershipExamples Of Military Leadership
Examples Of Military Leadership
Jenny Mancini
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Matthew Rosenquist
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
damilolasunmola
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Eswar Publications
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx
drennanmicah
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India
 
Matrix of ict skills for learning
Matrix of ict skills for learningMatrix of ict skills for learning
Matrix of ict skills for learning
Jorge Arturo Ortiz
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
June Wall
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
PelorusTechnologies
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
healdkathaleen
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
cyberprosocial
 
Current Issues In Education Technology WPG Consulting .pdf
Current Issues In Education Technology  WPG Consulting .pdfCurrent Issues In Education Technology  WPG Consulting .pdf
Current Issues In Education Technology WPG Consulting .pdf
meetsolanki44
 
157 20509 DQ Digital Citizenship
157 20509 DQ Digital Citizenship157 20509 DQ Digital Citizenship
157 20509 DQ Digital Citizenship
Lia s. Associates | Branding & Design
 
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
eraser Juan José Calderón
 

Similar to © 2016 Laureate Education, Inc. Page 1 of 3 RWRCOEL Prof.docx (20)

Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
Ict security essay
Ict security essay Ict security essay
Ict security essay
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
 
Examples Of Military Leadership
Examples Of Military LeadershipExamples Of Military Leadership
Examples Of Military Leadership
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx1Ethical issues arising from use of ICT technologiesStud.docx
1Ethical issues arising from use of ICT technologiesStud.docx
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
Matrix of ict skills for learning
Matrix of ict skills for learningMatrix of ict skills for learning
Matrix of ict skills for learning
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 
Current Issues In Education Technology WPG Consulting .pdf
Current Issues In Education Technology  WPG Consulting .pdfCurrent Issues In Education Technology  WPG Consulting .pdf
Current Issues In Education Technology WPG Consulting .pdf
 
157 20509 DQ Digital Citizenship
157 20509 DQ Digital Citizenship157 20509 DQ Digital Citizenship
157 20509 DQ Digital Citizenship
 
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
Multimedia based IoT-centric smart framework for eLearning paradigm Muhammad ...
 

More from hanneloremccaffery

 Explain how firms can benefit from forecastingexchange rates .docx
 Explain how firms can benefit from forecastingexchange rates .docx Explain how firms can benefit from forecastingexchange rates .docx
 Explain how firms can benefit from forecastingexchange rates .docx
hanneloremccaffery
 
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
hanneloremccaffery
 
•No less than 4 pages causal argument researched essay •In.docx
•No less than 4 pages causal argument researched essay •In.docx•No less than 4 pages causal argument researched essay •In.docx
•No less than 4 pages causal argument researched essay •In.docx
hanneloremccaffery
 
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
hanneloremccaffery
 
•Langbein, L. (2012). Public program evaluation A statistical guide.docx
•Langbein, L. (2012). Public program evaluation A statistical guide.docx•Langbein, L. (2012). Public program evaluation A statistical guide.docx
•Langbein, L. (2012). Public program evaluation A statistical guide.docx
hanneloremccaffery
 
•Chapter 10 Do you think it is possible for an outsider to accura.docx
•Chapter 10 Do you think it is possible for an outsider to accura.docx•Chapter 10 Do you think it is possible for an outsider to accura.docx
•Chapter 10 Do you think it is possible for an outsider to accura.docx
hanneloremccaffery
 
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
hanneloremccaffery
 
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
hanneloremccaffery
 
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
hanneloremccaffery
 
[Type here]Ok. This school makes me confused. The summary of t.docx
[Type here]Ok. This school makes me confused. The summary of t.docx[Type here]Ok. This school makes me confused. The summary of t.docx
[Type here]Ok. This school makes me confused. The summary of t.docx
hanneloremccaffery
 
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
hanneloremccaffery
 
© 2022 Post University, ALL RIGHTS RESERVED Due Date.docx
© 2022 Post University, ALL RIGHTS RESERVED  Due Date.docx© 2022 Post University, ALL RIGHTS RESERVED  Due Date.docx
© 2022 Post University, ALL RIGHTS RESERVED Due Date.docx
hanneloremccaffery
 
{DiscriminationGENERAL DISCRIMINATI.docx
{DiscriminationGENERAL DISCRIMINATI.docx{DiscriminationGENERAL DISCRIMINATI.docx
{DiscriminationGENERAL DISCRIMINATI.docx
hanneloremccaffery
 
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
hanneloremccaffery
 
© 2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
©  2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx©  2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
© 2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
hanneloremccaffery
 
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
hanneloremccaffery
 
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
hanneloremccaffery
 
`Inclusiveness. The main.docx
`Inclusiveness. The main.docx`Inclusiveness. The main.docx
`Inclusiveness. The main.docx
hanneloremccaffery
 
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
hanneloremccaffery
 
[u03d2] Unit 3 Discussion 2RotationDefine the term rotation as.docx
[u03d2] Unit 3 Discussion 2RotationDefine the term rotation as.docx[u03d2] Unit 3 Discussion 2RotationDefine the term rotation as.docx
[u03d2] Unit 3 Discussion 2RotationDefine the term rotation as.docx
hanneloremccaffery
 

More from hanneloremccaffery (20)

 Explain how firms can benefit from forecastingexchange rates .docx
 Explain how firms can benefit from forecastingexchange rates .docx Explain how firms can benefit from forecastingexchange rates .docx
 Explain how firms can benefit from forecastingexchange rates .docx
 
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
 
•No less than 4 pages causal argument researched essay •In.docx
•No less than 4 pages causal argument researched essay •In.docx•No less than 4 pages causal argument researched essay •In.docx
•No less than 4 pages causal argument researched essay •In.docx
 
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
 
•Langbein, L. (2012). Public program evaluation A statistical guide.docx
•Langbein, L. (2012). Public program evaluation A statistical guide.docx•Langbein, L. (2012). Public program evaluation A statistical guide.docx
•Langbein, L. (2012). Public program evaluation A statistical guide.docx
 
•Chapter 10 Do you think it is possible for an outsider to accura.docx
•Chapter 10 Do you think it is possible for an outsider to accura.docx•Chapter 10 Do you think it is possible for an outsider to accura.docx
•Chapter 10 Do you think it is possible for an outsider to accura.docx
 
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
 
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
 
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
 
[Type here]Ok. This school makes me confused. The summary of t.docx
[Type here]Ok. This school makes me confused. The summary of t.docx[Type here]Ok. This school makes me confused. The summary of t.docx
[Type here]Ok. This school makes me confused. The summary of t.docx
 
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
 
© 2022 Post University, ALL RIGHTS RESERVED Due Date.docx
© 2022 Post University, ALL RIGHTS RESERVED  Due Date.docx© 2022 Post University, ALL RIGHTS RESERVED  Due Date.docx
© 2022 Post University, ALL RIGHTS RESERVED Due Date.docx
 
{DiscriminationGENERAL DISCRIMINATI.docx
{DiscriminationGENERAL DISCRIMINATI.docx{DiscriminationGENERAL DISCRIMINATI.docx
{DiscriminationGENERAL DISCRIMINATI.docx
 
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
 
© 2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
©  2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx©  2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
© 2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
 
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
 
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
 
`Inclusiveness. The main.docx
`Inclusiveness. The main.docx`Inclusiveness. The main.docx
`Inclusiveness. The main.docx
 
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
 
[u03d2] Unit 3 Discussion 2RotationDefine the term rotation as.docx
[u03d2] Unit 3 Discussion 2RotationDefine the term rotation as.docx[u03d2] Unit 3 Discussion 2RotationDefine the term rotation as.docx
[u03d2] Unit 3 Discussion 2RotationDefine the term rotation as.docx
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

© 2016 Laureate Education, Inc. Page 1 of 3 RWRCOEL Prof.docx

  • 1. © 2016 Laureate Education, Inc. Page 1 of 3 RWRCOEL Professional Dispositions Professional Conduct 1. Ethical and Legal Conduct: The candidate demonstrates professionalism as outlined by legal and ethical guidelines within the profession. a. Demonstrates professional behavior as described in Walden’s Code of Conduct b. Demonstrates ethical behavior as described by professional codes of ethics 2. Professional Obligations: The candidate meets professional obligations in a responsible manner. a. Maintains a strong record of attendance and punctuality,
  • 2. communicating in advance the need for any absence or delay in meeting performance expectations b. Prepares for professional obligations and meets expected deadlines © 2016 Laureate Education, Inc. Page 2 of 3 3. Professional Appearance and Demeanor: The candidate demonstrates professional appearance and behaviors in the educational setting. a. Maintains appropriate appearance through professional dress and grooming b. Approaches teaching and learning tasks with initiative, confidence, and energy c. Exhibits composure and self-control d. Demonstrates flexibility in adapting to changing circumstances and
  • 3. student needs Professional Qualities 4. Professional Development/Growth: The candidate engages in ongoing professional development and growth to improve professional practice. a. Engages in continuous learning through participation in professional development opportunities b. Applies new ideas to professional practice based on existing data, reflection, and intellectual curiosity c. Engages in ongoing critical reflection of personal performance to improve professional practice 5. Advocacy: The candidate advocates for fairness, equity, and social change in the learning environment. a. Displays empathy, fairness, persistence, problem-solving skills, and appropriate risk-taking actions on behalf of others
  • 4. b. Advocates for the social, emotional, physical, educational, behavioral, and basic needs of others c. Promotes positive social change to enhance educational opportunities and promote student learning 6. Equity: The candidate demonstrates culturally responsive practices to create an inclusive learning environment that is respectful of diverse cultures, values, and beliefs of others. a. Displays equitable treatment of others i. Sets high expectations for all learners © 2016 Laureate Education, Inc. Page 3 of 3 ii. Treats others with respect and dignity iii. Recognizes individual differences in teaching and learning b. Engages in culturally responsive practices in interactions with students, families, colleagues, and communities
  • 5. c. Creates learning environments that are inclusive; free of bias and discrimination and respectful of diverse cultures, values, and beliefs d. Engages families and other stakeholders in planning for individual success Collaboration 7. Collaboration: The candidate works in collaboration with others to improve student learning and advance the profession. a. Builds partnerships and fosters relationships with stakeholders to improve student learning and advance the profession b. Collaborates with students, families, colleagues, and the community to promote positive social change c. Uses technology to enhance collaboration, strengthen partnerships, and foster relationships with others to improve teaching and learning
  • 6. Communication 8. Communication: The candidate uses effective verbal, nonverbal, and technological communication techniques to foster active inquiry, improve collaboration, and create positive interactions in the learning environment. a. Actively and thoughtfully listens to others b. Adjusts communication to meet the needs of individual learners and changing circumstances c. Asks probing, thoughtful questions to elicit meaningful responses d. Conveys ideas in multiple ways using a professional tone e. Acknowledges and respects ideas and/or feelings of others; makes others feel welcome, valued, and appreciated in their communications f. Utilizes technological tools to facilitate communication to improve student learning and relationships with others
  • 7. Cyber Security and the Internet of Things: Vulnerabilities,Threats, Intruders and Attacks Mohamed Abomhara and Geir M. Køien Department of Information and Communication Technology, University of Agder, Norway Corresponding Authors: {Mohamed.abomhara; geir.koien}@uia.no Received 14 September 2014; Accepted 17 April 2015; Publication 22 May 2015 Abstract Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify
  • 8. threat types, besides analyze and characterize intruders and attacks facing IoT devices and services. Keywords: Internet of Things, Cyber-attack, Security threats. 1 Introduction The recent rapid development of the Internet of Things (IoT) [1, 2] and its ability to offer different types of services have made it the fastest growing technology, with huge impact on social life and business environments. IoT has Journal of Cyber Security, Vol. 4, 65–88. doi: 10.13052/jcsm2245-1439.414 c© 2015 River Publishers. All rights reserved. 66 M. Abomhara and G. M. Køien gradually permeated all aspects of modern human life, such as education, healthcare, and business, involving the storage of sensitive information about individuals and companies, financial data transactions, product development and marketing. The vast diffusion of connected devices in the IoT has created enormous demand for robust security in response to the growing demand of millions or perhaps billions of connected devices and services worldwide
  • 9. [3–5]. The number of threats is rising daily, and attacks have been on the increase in both number and complexity. Not only is the number of potential attackers along with the size of networks growing, but the tools available to potential attackers are also becoming more sophisticated, efficient and effective [6, 7]. Therefore, for IoT to achieve fullest potential, it needs protection against threats and vulnerabilities [8]. Security has been defined as a process to protect an object against physical damage, unauthorized access, theft, or loss, by maintaining high confidential- ity and integrity of information about the object and making information about that object available whenever needed [7, 9].According to Kizza [7] there is no thing as the secure state of any object, tangible or not, because no such object can ever be in a perfectly secure state and still be useful. An object is secure if the process can maintain its maximum intrinsic value under different condi- tions. Security requirements in the IoT environment are not different from any other ICT systems. Therefore, ensuring IoT security requires maintaining the highest intrinsic value of both tangible objects (devices) and intangible ones (services, information and data).
  • 10. This paper seeks to contribute to a better understanding of threats and their attributes (motivation and capabilities) originating from various intruders like organizations and intelligence. The process of identifying threats to systems and system vulnerabilities is necessary for specifying a robust, complete set of security requirements and also helps determine if the security solution is secure against malicious attacks [10]. As well as users, governments and IoT developers must ultimately understand the threats and have answers to the following questions: 1. What are the assets? 2. Who are the principal entities? 3. What are the threats? 4. Who are the threat actors? 5. What capability and resource levels do threat actors have? 6. Which threats can affect what assets? Cyber security and the Internet of Things 67 7. Is the current design protected against threats? 8. What security mechanisms could be used against threats? The remainder of this paper is organized as follows. Section 2 pro- vides a background, definitions, and the primary security and privacy goals. Section 3 identifies some attacker motivations and capabilities, and provides
  • 11. an outline of various sorts of threat actors. Finally, the paper concludes with Section 4. 2 Background The IoT [1, 2, 11] is an extension of the Internet into the physical world for interaction with physical entities from the surroundings. Entities, devices and services [12] are key concepts within the IoT domain, as depicted in Figure 1 [13]. They have different meanings and definitions among various projects. Therefore, it is necessary to have a good understand- ing of what IoT entities, devices and services are (discussed in detail in Section 2.1). An entity in the IoT could be a human, animal, car, logistic chain item, electronic appliance or a closed or open environment [14]. Interaction among Figure 1 IoT model: key concepts and interactions. 68 M. Abomhara and G. M. Køien entities is made possible by hardware components called devices [12] such as mobile phones, sensors, actuators or RFID tags, which allow the entities to connect to the digital world [15].
  • 12. In the current state of technology, Machine-to-Machine (M2M) is the most popular application form of IoT. M2M is now widely employed in power, transportation, retail, public service management, health, water, oil and other industries to monitor and control the user, machinery and production processes in the global industry and so on [5, 16, 17]. According to estimates M2M applications will reach 12 billion connections by 2020 and generate approximately 714 billion euros in revenues [2]. Besides all the IoT application benefits, several security threats are observed [17–19]. The connected devices or machines are extremely valuable to cyber-attackers for several reasons: 1. Most IoT devices operate unattended by humans, thus it is easy for an attacker to physically gain access to them. 2. Most IoT components communicate over wireless networks where an attacker could obtain confidential information by eavesdropping. 3. Most IoT components cannot support complex security schemes due to low power and computing resource capabilities. In addition, cyber threats could be launched against any IoT assets
  • 13. and facilities, potentially causing damage or disabling system operation, endangering the general populace or causing severe economic damage to owners and users [20, 21]. Examples include attacks on home automation systems and taking control of heating systems, air conditioning, lighting and physical security systems. The information collected from sensors embedded in heating or lighting systems could inform the intruder when somebody is at home or out. Among other things, cyber-attacks could be launched against any public infrastructure like utility systems (power sys- tems or water treatment plants) [22] to stop water or electricity supply to inhabitants. Security and privacy issues are a growing concern for users and suppliers in their shift towards the IoT [23]. It is certainly easy to imagine the amount of damage caused if any connected devices were attacked or corrupted. It is well-recognized that adopting any IoT technology within our homes, work, or business environments opens doors to new security problems. Users and suppliers must consider and be cautious with such security and privacy concerns.
  • 14. Cyber security and the Internet of Things 69 2.1 Understanding IoT Devices and Services In this section, the main IoT domain concepts that are important from a business process perspective are defined and classified, and the relationships between IoT components (IoT devices and IoT services) are described. 2.1.1 IoT device This is a hardware component that allows the entity to be a part of the digital world [12]. It is also referred to as a smart thing, which can be a home appliance, healthcare device, vehicle, building, factory and almost anything networked and fitted with sensors providing information about the physical environment (e.g., temperature, humidity, presence detectors, and pollution), actuators (e.g., light switches, displays, motor-assisted shutters, or any other action that a device can perform) and embedded computers [24, 25]. An IoT device is capable of communicating with other IoT devices and ICT systems. These devices communicate via different means including cellular (3G or LTE), WLAN, wireless or other technologies [8]. IoT device classifi- cation depends on size, i.e., small or normal; mobility, i.e., mobile or fixed; external or internal power source; whether they are connected intermittently
  • 15. or always-on; automated or non-automated; logical or physical objects; and lastly, whether they are IP-enabled objects or non IP objects. The characteristics of IoT devices are their ability to actuate and/or sense, the capability of limiting power/energy, connection to the physical world, intermittent connectivity and mobility [23]. Some must be fast and reliable and provide credible security and privacy, while others might not [9]. A number of these devices have physical protection whereas others are unattended. In fact, in IoT environments, devices should be protected against any threats that can affect their functionality. However, most IoT devices are vulnerable to external and internal attacks due to their characteristics [16]. It is challenging to implement and use a strong security mechanism due to resource constraints in terms of IoT computational capabilities, memory, and battery power [26]. 2.1.2 IoT services IoT services facilitate the easy integration of IoT entities into the service- oriented architecture (SOA) world as well as service science [27]. According to Thoma [28], an IoT service is a transaction between two parties: the service provider and service consumer. It causes a prescribed function,
  • 16. enabling 70 M. Abomhara and G. M. Køien interaction with the physical world by measuring the state of entities or by initiating actions that will initiate a change to the entities. A service provides a well-defined and standardized interface, offering all necessary functionalities for interacting with entities and related processes. The services expose the functionality of a device by accessing its hosted resources [12]. 2.1.3 Security in IoT devices and services Ensuring the security entails protecting both IoT devices and services from unauthorized access from within the devices and externally. Secu- rity should protect the services, hardware resources, information and data, both in transition and storage. In this section, we identified three key problems with IoT devices and services: data confidentiality, privacy and trust. Data confidentiality represents a fundamental problem in IoT devices and services [27]. In IoT context not only user may access to data but also authorized object. This requires addressing two important
  • 17. aspects: first, access control and authorization mechanism and second authentication and identity management (IdM) mechanism. The IoT device needs to be able to verify that the entity (person or other device) is authorized to access the service. Authorization helps determine if upon identification, the person or device is permitted to receive a service. Access control entails controlling access to resources by granting or denying means using a wide array of criteria. Autho- rization and access control are important to establishing a secure connection between a number of devices and services. The main issue to be dealt with in this scenario is making access control rules easier to create, understand and manipulate. Another aspect that should be consider when dealing with confidentiality is authentication and identity management. In fact this issue is critical in IoT, because multiple users, object/things and devices need to authenticate each other through trustable services. The problem is to find solution for handling the identity of user, things/objects and devices in a secure manner. Privacy is an important issue in IoT devices and service on account of the ubiquitous character of the IoT environment. Entities are connected, and data is communicated and exchanged over the internet, rendering
  • 18. user privacy a sensitive subject in many research works. Privacy in data collection, as well as data sharing and management, and data security matters remain open research issues to be fulfilled. Cyber security and the Internet of Things 71 Trust plays an important role in establishing secure communication when a number of things communicate in an uncertain IoT environment. Two dimen- sions of trust should be considered in IoT: trust in the interactions between entities, and trust in the system from the users perspective [29] According to Køien [9] the trustworthiness of an IoT device depends on the device components including the hardware, such as processor, memory, sensors and actuators, software resources like hardware-based software, operating system, drivers and applications, and the power source. In order to gain user/services trust, there should be an effective mechanism of defining trust in a dynamic and collaborative IoT environment. 2.2 Security Threats, Attacks, and Vulnerabilities Before addressing security threats, the system assets (system components) that make up the IoT must first be identified. It is important to
  • 19. understand the asset inventory, including all IoT components, devices and services. An asset is an economic resource, something valuable and sensitive owned by an entity. The principal assets of any IoT system are the system hardware (include buildings, machinery, etc.) [11], software, services and data offered by the services [30]. 2.2.1 Vulnerability Vulnerabilities are weaknesses in a system or its design that allow an intruder to execute commands, access unauthorized data, and/or conduct denial-of- service attacks [31, 32]. Vulnerabilities can be found in variety of areas in the IoT systems. In particular, they can be weaknesses in system hardware or software, weaknesses in policies and procedures used in the systems and weaknesses of the system users themselves [7]. IoT systems are based on two main components; system hardware and system software, and both have design flaws quite often. Hardware vulner- abilities are very difficult to identify and also difficult to fix even if the vulnerability were identified due to hardware compatibility and interoper- ability and also the effort it take to be fixed. Software vulnerabilities can be found in operating systems, application software, and control
  • 20. software like communication protocols and devices drives. There are a number of factors that lead to software design flaws, including human factors and software complexity. Technical vulnerabilities usually happen due to human weaknesses. Results of not understanding the requirements comprise starting 72 M. Abomhara and G. M. Køien the project without a plan, poor communication between developers and users, a lack of resources, skills, and knowledge, and failing to manage and control the system [7]. 2.2.2 Exposure Exposure is a problem or mistake in the system configuration that allows an attacker to conduct information gathering activities. One of the most challenging issues in IoT is resiliency against exposure to physical attacks. In the most of IoT applications, devices may be left unattended and likely to be placed in location easily accessible to attackers. Such exposure raises the possibility that an attacker might capture the device, extract cryptographic secrets, modify their programming, or replace them with malicious device under the control of the attacker [33].
  • 21. 2.2.3 Threats A threat is an action that takes advantage of security weaknesses in a system and has a negative impact on it [34]. Threats can originate from two primary sources: humans and nature [35, 36]. Natural threats, such as earthquakes, hurricanes, floods, and fire could cause severe damage to computer systems. Few safeguards can be implemented against natural disasters, and nobody can prevent them from happening. Disaster recovery plans like backup and contingency plans are the best approaches to secure systems against natural threats. Human threats are those caused by people, such as malicious threats consisting of internal [37] (someone has authorized access) or exter- nal threats [38] (individuals or organizations working outside the network) looking to harm and disrupt a system. Human threats are categorized into the following: • Unstructured threats consisting of mostly inexperienced individuals who use easily available hacking tools. • Structured threats as people know system vulnerabilities and can under- stand, develop and exploit codes and scripts. An example of a structured threat is Advanced Persistent Threats (APT) [39]. APT is a sophisticated
  • 22. network attack targeted at high-value information in business and gov- ernment organizations, such as manufacturing, financial industries and national defense, to steal data [40]. As IoT become a reality, a growing number of ubiquitous devices has raise the number of the security threats with implication for the general public. Unfortunately, IoT comes with new set of security threat. There are Cyber security and the Internet of Things 73 a growing awareness that the new generation of smart-phone, computers and other devices could be targeted with malware and vulnerable to attack. 2.2.4 Attacks Attacks are actions taken to harm a system or disrupt normal operations by exploiting vulnerabilities using various techniques and tools.Attackers launch attacks to achieve goals either for personal satisfaction or recompense. The measurement of the effort to be expended by an attacker, expressed in terms of their expertise, resources and motivation is called attack cost [32]. Attack actors are people who are a threat to the digital world [6]. They could be hackers, criminals, or even governments [7]. Additional details
  • 23. are discussed in Section 3. An attack itself may come in many forms, including active network attacks to monitor unencrypted traffic in search of sensitive information; passive attacks such as monitoring unprotected network communications to decrypt weakly encrypted traffic and getting authentication information; close-in attacks; exploitation by insiders, and so on. Common cyber-attack types are: (a) Physical attacks: This sort of attack tampers with hardware components. Due to the unattended and distributed nature of the IoT, most devices typically operate in outdoor environments, which are highly susceptible to physical attacks. (b) Reconnaissance attacks – unauthorized discovery and mapping of sys- tems, services, or vulnerabilities. Examples of reconnaissance attacks are scanning network ports [41], packet sniffers [42], traffic analysis, and sending queries about IP address information. (c) Denial-of-service (DoS): This kind of attack is an attempt to make a machine or network resource unavailable to its intended users. Due to low memory capabilities and limited computation resources,
  • 24. the majority of devices in IoT are vulnerable to resource enervation attacks. (d) Access attacks – unauthorized persons gain access to networks or devices to which they have no right to access. There are two different types of access attack: the first is physical access, whereby the intruder can gain access to a physical device. The second is remote access, which is done to IP-connected devices. (e) Attacks on privacy: Privacy protection in IoT has become increas- ingly challenging due to large volumes of information easily available 74 M. Abomhara and G. M. Køien through remote access mechanisms. The most common attacks on user privacy are: • Data mining: enables attackers to discover information that is not anticipated in certain databases. • Cyber espionage: using cracking techniques and malicious software to spy or obtain secret information of individuals, organizations or the government.
  • 25. • Eavesdropping: listening to a conversation between two par- ties [43]. • Tracking: a users movements can be tracked by the devices unique identification number (UID). Tracking a users location facilitates identifying them in situations in which they wish to remain anonymous. • Password-based attacks: attempts are made by intruders to duplicate a valid user password. This attempt can be made in two different ways: 1) dictionary attack – trying possible combinations of letters and numbers to guess user passwords; 2) brute force attacks – using cracking tools to try all possible combinations of passwords to uncover valid passwords. (f) Cyber-crimes: The Internet and smart objects are used to exploit users and data for materialistic gain, such as intellectual property theft, identity theft, brand theft, and fraud [6, 7, 44]. (g) Destructive attacks: Space is used to create large-scale disruption and destruction of life and property. Examples of destructive attacks are terrorism and revenge attacks. (h) Supervisory Control and Data Acquisition (SCADA) Attacks: As any
  • 26. other TCP/IP systems, the SCADA [45] system is vulnerable to many cyber attacks [46, 47]. The system can be attacked in any of the following ways: i. Using denial-of-service to shut down the system. ii. Using Trojans or viruses to take control of the system. For instance, in 2008 an attack launched on an Iranian nuclear facility in Natanz using a virus named Stuxnet [48]. 2.3 Primary Security and Privacy Goals To succeed with the implementation of efficient IoT security, we must be aware of the primary security goals as follows: Cyber security and the Internet of Things 75 2.3.1 Confidentiality Confidentiality is an important security feature in IoT, but it may not be mandatory in some scenarios where data is presented publicly [18]. However, in most situations and scenarios sensitive data must not be disclosed or read by unauthorized entities. For instance patient data, private business data, and/or military data as well as security credentials and secret keys, must be hidden from unauthorized entities.
  • 27. 2.3.2 Integrity To provide reliable services to IoT users, integrity is a mandatory security property in most cases. Different systems in IoT have various integrity requirements [49]. For instance, a remote patient monitoring system will have high integrity checking against random errors due to information sensitivities. Loss or manipulation of data may occur due to communication, potentially causing loss of human lives [6]. 2.3.3 Authentication and authorization Ubiquitous connectivity of the IoT aggravates the problem of authentication because of the nature of IoT environments, where possible communication would take place between device to device (M2M), human to device, and/or human to human. Different authentication requirements necessitate different solutions in different systems. Some solutions must be strong, for example authentication of bank cards or bank systems. On the other hand, most will have to be international, e.g., ePassport, while others have to be local [6]. The authorization property allows only authorized entities (any authenticated entity) to perform certain operations in the network. 2.3.4 Availability A user of a device (or the device itself) must be capable of accessing services
  • 28. anytime, whenever needed. Different hardware and software components in IoT devices must be robust so as to provide services even in the presence of malicious entities or adverse situations. Various systems have different availability requirements. For instance, fire monitoring or healthcare monitor- ing systems would likely have higher availability requirements than roadside pollution sensors. 2.3.5 Accountability When developing security techniques to be used in a secure network, account- ability adds redundancy and responsibility of certain actions, duties and 76 M. Abomhara and G. M. Køien planning of the implementation of network security policies. Accountability itself cannot stop attacks but is helpful in ensuring the other security techniques are working properly. Core security issues like integrity and confidentiality may be useless if not subjected to accountability. Also, in case of a repudiation incident, an entity would be traced for its actions through an accountability process that could be useful for checking the inside story of what happened and who was actually responsible for the incident.
  • 29. 2.3.6 Auditing A security audit is a systematic evaluation of the security of a device or service by measuring how well it conforms to a set of established criteria. Due to many bugs and vulnerabilities in most systems, security auditing plays an important role in determining any exploitable weaknesses that put the data at risk. In IoT, a systems need for auditing depends on the application and its value. 2.3.7 Non-repudiation The property of non-repudiation produces certain evidence in cases where the user or device cannot deny an action. Non-repudiation is not considered an important security property for most of IoT. It may be applicable in certain contexts, for instance, payment systems where users or providers cannot deny a payment action. 2.3.8 Privacy goals Privacy is an entitys right to determine the degree to which it will interact with its environment and to what extent the entity is willing to share information about itself with others. The main privacy goals in IoT are: • Privacy in devices – depends on physical and commutation privacy. Sensitive information may be leaked out of the device in cases of device theft or loss and resilience to side channel attacks.
  • 30. • Privacy during communication – depends on the availability of a device, and device integrity and reliability. IoT devices should communicate only when there is need, to derogate the disclosure of data privacy during communication. • Privacy in storage – to protect the privacy of data stored in devices, the following two things should be considered: • Possible amounts of data needed should be stored in devices. Cyber security and the Internet of Things 77 • Regulation must be extended to provide protection of user data after end-of-device life (deletion of the device data (Wipe) if the device is stolen, lost or not in use). • Privacy in processing – depends on device and communication integrity [50]. Data should be disclosed to or retained from third parties without the knowledge of the data owner. • Identity privacy – the identity of any device should only discovered by authorized entity (human/device). • location privacy – the geographical position of relevant device
  • 31. should only discovered by authorized entity (human/device) [51]. 3 Intruders, Motivations and Capabilities Intruders have different motives and objectives, for instance, financial gain, influencing public opinion, and espionage, among many others. The motives and goals of intruders vary from individual attackers to sophisticated organized-crime organizations. Intruders also have different levels of resources, skill, access and risk tolerance leading to the portability level of an attack occurring [52]. An insider has more access to a system than outsiders. Some intruders are well- funded and others work on a small budget or none. Every attacker chooses an attack that is affordable, an attack with good return on the investment based on budget, resources and experience [6]. In this section, intruders are categorized according to characteristics, motives and objectives, capabilities and resources. 3.1 Purpose and Motivation of Attack Government websites, financial systems, news and media websites, military networks, as well as public infrastructure systems are the main targets for cyber-attacks. The value of these targets is difficult to
  • 32. estimate, and estimation often varies between attacker and defender. Attack motives range from identity theft, intellectual property theft, and financial fraud, to critical infrastructure attacks. It is quite difficult to list what motivates hackers to attack systems. For instance, stealing credit card information has become a hackers hobby nowadays, and electronic terrorism orga- nizations attack government systems in order to make politics, religion interest. 78 M. Abomhara and G. M. Køien 3.2 Classification of Possible Intruders A Dolev-Yao (DY) type of intruder shall generally be assumed [53, 54]. That is, an intruder which is in effect the network and which may intercept all or any message ever transmitted between IoT devices and hubs. The DY intruder is extremely capable but its capabilities are slightly unrealistic. Thus, safety will be much stronger if our IoT infrastructure is designed to be DY intruder resilient. However, the DY intruder lacks one capability that ordinary intruders may have, namely, physical compromise. Thus, tamper- proof devices are also greatly desirable. This goal is of course
  • 33. unattainable, but physical tamper resistance is nevertheless a very important goal, which, together with tamper detection capabilities (tamper evident) may be a sufficient first-line defense. In the literature intruders are classified into two main types: internal and external. Internal intruders are users with privileges or authorized access to a system with either an account on a server or physical access to the network [21, 37]. External intruders are people who do not belong to the network domain. All intruders, whether internal or external, can be organized in many ways and involve individual attackers to spy agencies working for a country. The impact of an intrusion depends on the goals to be achieved. An individual attacker could have small objectives while spy agencies could have larger motives [55]. The various types of intruders will be discussed hereby based on their numbers, motives and objectives. 3.2.1 Individuals Individual hackers are professionals who work alone and only target systems with low security [55]. They lack resources or expertise of professional hacking teams, organizations or spy agencies. Individual hacker targets are relatively small in size or diversity and the attacks launched have rela-
  • 34. tively lower impact than ones launched by organized groups (discussed in 3.2.2). Social engineering techniques are most commonly used by individual attackers, as they have to obtain basic information about a target system like the address, password, port information, etc. Public and social media websites are the most common places where general users can be deceived by hackers. Moreover, operating systems used on laptops, PCs, and mobile phones have common and known vulnerabilities exploitable by individual attackers. Financial institutions such as banks are also major targets for individual attackers as they know that such types of networks carry financial transactions that can be hacked, and thus attackers can manipulate the information in Cyber security and the Internet of Things 79 their interest. Credit card information theft has a long history with individual hackers. With the growth of e-commerce, it is easier to use stolen credit card information to buy goods and services. Individual hackers use tools such as viruses, worms and sniffers to exploit a system. They plan attacks based on equipment availability,
  • 35. internet access availability, the network environment and system security. One of the individual hacker categories is the insider [21, 37]. Insiders are authorized individuals working against a system using insider knowledge or privileges. Insiders could provide critical information for outsider attackers (third party) to exploit vulnerabilities that can enable an attack. They know the weak points in the system and how the system works. Personal gain, revenge, and financial gain can motivate an insider. They can tolerate risk ranging from low to high depending on their motivation. 3.2.2 Organized groups Criminal groups are becoming more familiar with ongoing communications and IoT technology. In addition, as they become more comfortable with technological applications, these groups can be more aware of opportuni- ties offered by the infrastructure routing information of different networks. The motivations of these groups are quite diverse; their targets typically include particular organizations for revenge, theft of trade secrets, economic espionage, and targeting the national information infrastructure. They also involve selling personal information, such as financial data, to other criminal organizations, terrorists, and even governments.
  • 36. They are very capable in terms of financial funding, expertise and resources. Criminal groups capabilities in terms of methods and techniques are moderate to high depending on what the goals are. They are very skillful at creating botnets and malicious software (e.g., computer viruses and scare- ware) and denial-of-service attack methods [44]. Organized criminals are likely to have access to funds, meaning they can hire skilled hackers if necessary, or purchase point-and-click attack tools from the underground economy with which to attack any systems [46]. Such criminals can tolerate higher risk than individual hackers and are willing to invest in profitable attacks. Cyber terrorism [21, 56] is a form of cyber-attack that targets military systems, banks, and specific facilities such as satellites, and telecommunica- tion systems associated with the national information infrastructure based on religious and political interests. Terrorist organizations depend on the internet to spread propaganda, raise funds, gather information, and communicate 80 M. Abomhara and G. M. Køien with co-conspirators in all parts of the world. Another prevalent
  • 37. group of criminal organization entails hacktivists. Hacktivists are groups of hackers who engage in activities such as denial-of-service, fraud, and/or identity theft. Also, some of these groups have political motivations, like the Syrian Electronic Army (SEA) [57], Iranian Cyber Army and Chinese cyber-warfare units [58]. 3.2.3 Intelligence agency Intelligence agencies from different countries are persistent in their efforts to probe the military systems of other countries for specific purposes, for example industrial espionage, and political and military espionage. To accomplish their objectives, the agencies require a large number of experts, infrastructure ranging from research and development entities to provide technologies and methodologies (hardware, software, and facilities) besides financial and human resources. Such agencies have organized structures and sophisticated resources to accomplish their intrusion goals. This sort of agencies are the biggest threat to networks and necessitate tight surveillance and monitoring approaches to safeguard against threats to the information systems of prime importance for any country and military establishment.
  • 38. 4 Discussion and Conclusions 4.1 Discussion The exponential growth of the IoT has led to greater security and privacy risks. Many such risks are attributable to device vulnerabilities that arise from cybercrime by hackers and improper use of system resources. The IoT needs to be built in such a way as to ensure easy and safe usage control. Consumers need confidence to fully embrace the IoT in order to enjoy its benefits and avoid security and privacy risks. The majority of IoT devices and services are exposed to a number of common threats as discussed earlier, like viruses and denial- of-service attacks. Taking simple steps to avoid such threats and dealing with system vulnerabilities is not sufficient; thus, ensuring a smooth policy implementation process supported by strong procedures is needed. The security development process requires thorough understanding of a systems assets, followed by identifying different vulnerabilities and threats that can exist. It is necessary to identify what the system assets are and what Cyber security and the Internet of Things 81
  • 39. the assets should be protected against. In this paper, assets were defined as all valuable things in the system, tangible and intangible, which require protection. Some general, IoT assets include system hardware, software, data and information, as well as assets related to services, e.g. service reputation. It has been shown that it is crucial to comprehend the threats and system weak- nesses in order to allocate better system mitigation. In addition, understanding potential attacks allows system developers to better determine where funds should be spent. Most commonly known threats have been described as DoS, physical attacks and attacks on privacy. Three different types of intruders were discussed in this paper, namely indi- vidual attacks, organized groups, and intelligence agencies. Each attacker type has different skill levels, funding resources, motivation, and risk tolerance. It is very important to study the various types of attack actors and determine which are most likely to attack a system. Upon describing and documenting all threats and respective actors, it is easier to perceive which threat could exploit what weakness in the system. Generally, it is assumed that IoT intruder has full DY intruder capabilities in addition to some limited physical compromise power. We will presume that physical compromise
  • 40. attacks do not scale, and they will therefore only at-worst affect a limited population of the total number of IoT devices. IoT architecture must consequently be designed to cope with compromised devices and be competent in detecting such incidents. It is concluded that attackers employ various methods, tools, and techniques to exploit vulnerabilities in a system to achieve their goals or objectives. Understanding attackers motives and capabilities is important for an organization to prevent potential damage. To reduce both potential threats and their consequences, more research is needed to fill the gaps in knowledge regarding threats and cybercrime and provide the necessary steps to mitigate probable attacks. 5 Conclusions IoT faces a number of threats that must be recognized for protective action to be taken. In this paper, security challenges and security threats to IoT were introduced. The overall goal was to identify assets and document potential threats, attacks and vulnerabilities faced by the IoT. An overview of the most important IoT security problems was provided, with particular focus on security challenges surrounding IoT devices and services. Security challenges, such as confidentiality, privacy
  • 41. and entity trust were identified. We showed that in order to establish more secure and 82 M. Abomhara and G. M. Køien readily available IoT devices and services, security and privacy challenges need to be addressed. The discussion also focused upon the cyber threats comprising actors, motivation, and capability fuelled by the unique charac- teristics of cyberspace. It was demonstrated that threats from intelligence agencies and criminal groups are likely to be more difficult to defeat than those from individual hackers. The reason is that their targets may be much less predictable while the impact of an individual attack is expected to be less severe. It was concluded that much work remains to be done in the area of IoT secu- rity, by both vendors and end-users. It is important for upcoming standards to address the shortcomings of current IoT security mechanisms. As future work, the aim is to gain deeper understanding of the threats facing IoT infrastructure as well as identify the likelihood and consequences of threats against IoT. Definitions of suitable security mechanisms for access control, authentication,
  • 42. identity management, and a flexible trust management framework should be considered early in product development. We hope this survey will be useful to researchers in the security field by helping identify the major issues in IoT security and providing better understanding of the threats and their attributes originating from various intruders like organizations and intelligence agencies. References [1] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010. [2] S. Andreev and Y. Koucheryavy, “Internet of things, smart spaces, and next generation networking,” Springer, LNCS, vol. 7469, p. 464, 2012. [3] J. S. Kumar and D. R. Patel, “A survey on internet of things: Security and privacy issues,” International Journal of Computer Applications, vol. 90, no. 11, pp. 20–26, March 2014, published by Foundation of Computer Science, New York, USA. [4] A. Stango, N. R. Prasad, and D. M. Kyriazanos, “A threat analy- sis methodology for security evaluation and enhancement planning,” in Emerging Security Information, Systems and Technologies,
  • 43. 2009. SECURWARE’09. Third International Conference on. IEEE, 2009, pp. 262–267. [5] D. Jiang and C. ShiWei, “A study of information security for m2m of iot,” in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, vol. 3. IEEE, 2010, pp. V3– 576. Cyber security and the Internet of Things 83 [6] B. Schneier, Secrets and lies: digital security in a networked world. John Wiley & Sons, 2011. [7] J. M. Kizza, Guide to Computer Network Security. Springer, 2013. [8] M. Taneja, “An analytics framework to detect compromised iot devices using mobility behavior,” in ICT Convergence (ICTC), 2013 Interna- tional Conference on. IEEE, 2013, pp. 38–43. [9] G. M. Koien and V. A. Oleshchuk, Aspects of Personal Privacy in Communications-Problems, Technology and
  • 44. Solution s. River Publishers, 2013. [10] N. R. Prasad, “Threat model framework and methodology for personal networks (pns),” in Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on. IEEE, 2007, pp. 1–6. [11] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer et al. “Internet of things strategic research roadmap,” Internet of Things- Global Technological and Societal Trends, pp. 9–52, 2011. [12] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service modelling for
  • 45. the internet of things,” in Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on. IEEE, 2011, pp. 949–955. [13] G. Xiao, J. Guo, L. Xu, and Z. Gong, “User interoperability with heterogeneous iot devices through transformation,” 2014. [14] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645– 1660, 2013. [15] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, “From today’s intranet of things to a future internet of things: a wireless-and mobility- related view,” Wireless Communications, IEEE, vol. 17, no. 6, pp. 44– 51, 2010.
  • 46. [16] C. Hongsong, F. Zhongchuan, and Z. Dongyan, “Security and trust research in m2m system,” in Vehicular Electronics and Safety (ICVES), 2011 IEEE International Conference on. IEEE, 2011, pp. 286–290. [17] I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V. Meyerstein, “Trust in m2m communication,” Vehicular Technology Magazine, IEEE, vol. 4, no. 3, pp. 69–75, 2009. [18] J. Lopez, R. Roman, and C. Alcaraz, “Analysis of security threats, requirements, technologies and standards in wireless sensor networks,” 84 M. Abomhara and G. M. Køien in Foundations of Security Analysis and Design V. Springer, 2009, pp. 289–338.
  • 47. [19] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013. [20] Y. Cheng, M. Naslund, G. Selander, and E. Fogelstrom, “Privacy in machine-to-machine communications a state-of-the-art survey,” in Com- munication Systems (ICCS), 2012 IEEE International Conference on. IEEE, 2012, pp. 75–79. [21] M. Rudner, “Cyber-threats to critical national infrastructure: An intelli- gence challenge,” International Journal of Intelligence and CounterIn- telligence, vol. 26, no. 3, pp. 453–481, 2013. [22] R. Kozik and M. Choras, “Current cyber security threats and chal- lenges in critical infrastructures protection,” in Informatics and Appli- cations (ICIA), 2013 Second International Conference on. IEEE,
  • 48. 2013, pp. 93–97. [23] P. N. Mahalle, N. R. Prasad, and R. Prasad, “Object classification based context management for identity management in internet of things,” International Journal of Computer Applications, vol. 63, no. 12, pp. 1–6, 2013. [24] A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafind- ralambo, “A survey on facilities for experimental internet of things research,” Communications Magazine, IEEE, vol. 49, no. 11, pp. 58–67, 2011. [25] Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot, and L. Gurgen, “Sharing user iot devices in the cloud,” in Internet of Things (WF-IoT), 2014 IEEE World Forum on. IEEE, 2014, pp. 373–374.
  • 49. [26] G. M. Køien, “Reflections on trust in devices: an informal survey of human trust in an internet-of-things context,” Wireless Personal Communications, vol. 61, no. 3, pp. 495–510, 2011. [27] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012. [28] M. Thoma, S. Meyer, K. Sperner, S. Meissner, and T. Braun, “On iot- services: Survey, classification and enterprise integration,” in Green Computing and Communications (GreenCom), 2012 IEEE International Conference on. IEEE, 2012, pp. 257–260. [29] M. Abomhara and G. Koien, “Security and privacy in the internet of things: Current status and open issues,” in PRISMS 2014 The 2nd
  • 50. Cyber security and the Internet of Things 85 International Conference on Privacy and Security in Mobile Systems (PRISMS 2014), Aalborg, Denmark, May 2014. [30] D. Watts, “Security and vulnerability in electric power systems,” in 35th North American power symposium, vol. 2, 2003, pp. 559–566. [31] D. L. Pipkin, Information security. Prentice Hall PTR, 2000. [32] E. Bertino, L. D. Martino, F. Paci, and A. C. Squicciarini, “Web services threats, vulnerabilities, and countermeasures,” in Security for Web Services and Service-Oriented Architectures. Springer, 2010, pp. 25–44. [33] D. G. Padmavathi, M. Shanmugapriya et al., “A survey of attacks,
  • 51. security mechanisms and challenges in wireless sensor networks,” arXiv preprint arXiv:0909.0576, 2009. [34] H. G. Brauch, “Concepts of security threats, challenges, vulnerabilities and risks,” in Coping with Global Environmental Change, Disasters and Security. Springer, 2011, pp. 61–106. [35] K. Dahbur, B. Mohammad, and A. B. Tarakji, “A survey of risks, threats and vulnerabilities in cloud computing,” in Proceedings of the 2011 International conference on intelligent semantic Web- services and applications. ACM, 2011, p. 12. [36] R. K. Rainer and C. G. Cegielski, Introduction to information systems: Enabling and transforming business. John Wiley & Sons, 2010. [37] A. J. Duncan, S. Creese, and M. Goldsmith, “Insider attacks in cloud computing,” in Trust, Security and Privacy in Computing and
  • 52. Communi- cations (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012, pp. 857–862. [38] P. Baybutt, “Assessing risks from threats to process plants: Threat and vulnerability analysis,” Process Safety Progress, vol. 21, no. 4, pp. 269–275, 2002. [39] C. Tankard, “Advanced persistent threats and how to monitor and deter them,” Network security, vol. 2011, no. 8, pp. 16–19, 2011. [40] F. Li, A. Lai, and D. Ddl, “Evidence of advanced persistent threat: A case study of malware for political espionage,” in Malicious and Unwanted Software (MALWARE), 2011 6th International Conference on. IEEE, 2011, pp. 102–109. [41] S. Ansari, S. Rajeev, and H. Chandrashekar, “Packet sniffing: a brief
  • 53. introduction,” Potentials, IEEE, vol. 21, no. 5, pp. 17–19, 2002. [42] M. De Vivo, E. Carrasco, G. Isern, and G. O. de Vivo, “A review of port scanning techniques,” ACM SIGCOMM Computer Communication Review, vol. 29, no. 2, pp. 41–48, 1999. 86 M. Abomhara and G. M. Køien [43] I. Naumann and G. Hogben, “Privacy features of european eid card specifications,” Network Security, vol. 2008, no. 8, pp. 9–13, 2008. [44] C. Wilson, “Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress.” DTIC Document, 2008. [45] A. Daneels and W. Salter, “What is scada,” in International Conference on Accelerator and Large Experimental Physics Control Systems, 1999,
  • 54. pp. 339–343. [46] A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, “Scada security in the light of cyber-warfare,” Computers & Security, vol. 31, no. 4, pp. 418–436, 2012. [47] V. M. Igure, S. A. Laughter, and R. D. Williams, “Security issues in scada networks,” Computers & Security, vol. 25, no. 7, pp. 498–506, 2006. [48] M. Kelleye, “Business Insider. The Stuxnet attack on Irans Nuclear Plant was Far more Dangerous Than Previously Thought,” http://www.businessinsider.com/stuxnet-was-far-more- dangerous-than- previous-thought-2013-11/,2013, [Online; accessed 03-Sep- 2014]. [49] B. Jung, I. Han, and S. Lee, “Security threats to internet: a korean multi-industry investigation,” Information & Management, vol. 38, no. 8,
  • 55. pp. 487–498, 2001. [50] C. P. Mayer, “Security and privacy challenges in the internet of things,” Electronic Communications of the EASST, vol. 17, 2009. [51] A. R. Beresford, “Location privacy in ubiquitous computing,” Com- puter Laboratory, University of Cambridge, Tech. Rep, vol. 612, 2005. [52] S. Pramanik, “Threat motivation,” in Emerging Technologies for a Smarter World (CEWIT), 2013 10th International Conference and Expo on. IEEE, 2013, pp. 1–5. [53] D. Dolev and A. C. Yao, “On the security of public key protocols,” Information Theory, IEEE Transactions on, vol. 29, no. 2, pp. 198–208, 1983. [54] I. Cervesato, “The dolev-yao intruder is the most powerful attacker,”
  • 56. in 16th Annual Symposium on Logic in Computer ScienceLICS, vol. 1. Citeseer, 2001. [55] J. Sheldon, “State of the art:Attackers and targets in cyberspace,” Journal of Military and Strategic Studies, vol. 14, no. 2, 2012. [56] E. M. Archer, “Crossing the rubicon: Understanding cyber terrorism in the european context,” The European Legacy, no. ahead-of- print, pp. 1–16, 2014. Cyber security and the Internet of Things 87 [57] A. K. Al-Rawi, “Cyber warriors in the middle east: The case of the syrian electronic army,” Public Relations Review, 2014. [58] D. Ball, “Chinas cyber warfare capabilities,” Security Challenges, vol. 7, no. 2, pp. 81–103, 2011.
  • 57. Biographies M. Abomhara is currently pursuing his PhD at University of Agder, Norway. His research work is in the area of computer security, information secu- rity, information system management, cyber-security, and Internet of things. He received a Master of Computer Science (Data Communication and Computer Network) from University of Malaya, Malaysia in 2011. He also received a Master of Business Administration (MBA, Information technology management) from Multimedia University, Malaysia in 2013 and a Bachelor of Computer Science from 7th October University, Libya in 2006. G. M. Køien is an associate professor in security and privacy in ICT at the University of Agder, Norge. He has previously worked for Ericsson Norway, System Sikkerhet AS and Telenor R & D. During his time with
  • 58. Telenor R & D he was the Telenor delegate to the SA3 (3GPP) work group on security. He received his PhD for Aalborg University, Denmark in 2008. 42 Kappan November 2015 The top and bottom of leadership and change Successful large-scale reform efforts — one in Northern England, another in Canada — bolster the approach of “leading from the middle.” by andy hargreaves and mel ainscow For 15 years and more, in the U.S., England, parts of Canada, and elsewhere, reforms to improve educational equity and achievement have come in large-scale measures — de- signed and delivered in detail by big government across whole
  • 59. systems. Such top-down reforms promised a sharp focus on improving literacy and mathematics achievement and boosting high school graduation. Image: Thinkstock/iStock V97 N3 kappanmagazine.org 43 Comments? Like PDK at www. facebook.com/pdkintl Training, coaching, and other professional development supports accompanied some top-down strategies. Others, like the No Child Left Behind law, proved excessively de- manding, requiring progress for all categories of students every year and imposing puni- tive consequences when schools and districts fell short. But punitive or supportive, all top-down reforms have an Achilles heel: Their focus
  • 60. on micromanaging two or three measurable priorities only works for systems pursuing traditional and comparatively narrow achievement goals. A digital age of complex skills, cultural diversity, and high-speed change calls for more challenging educational goals and more sophisticated and fl exible change strategies. Thus, reformers are advocating greater autonomy for schools and teachers, increased freedom for local curriculum design, and more independent and personalized access to technology. But the history of bottom-up innovation and individual school autonomy is not impressive. In the 1960s and ’70s, innovative ideas often didn’t spread beyond a few isolated classrooms and schools, and, when they did, their implementation often was fatally fl awed (Gross, Giacquinta, & Bernstein, 1971). There is no reason to believe that efforts to spread the success of a few innovative, high-tech schools will fare any better today. andy haRgReaVes ([email protected]) is the Brennan Chair in Education in the Lynch School of Education at Boston
  • 61. College, Chestnut Hill, Mass. He is co-author of Uplifting Leadership (Wiley, 2014). mel ainscoW is a professor of education at the University of Manchester, United Kingdom, and author of Toward self-improving school systems: Lessons from a city challenge (Routledge, 2015). What can the U.S. learn from england and canada? 3Top-down reforms have a long history of failure. A middle-driven approach of coordinated change, collective responsibility, and delegating resources and authority to school districts can yield positive results.
  • 62. 44 Kappan November 2015 2014; Sutton Trust, 2015). This has created a co- nundrum of district-driven improvement: Although all high-performing nations are characterized by strong local control, not all nations with strong local control are high per- forming. One response to this conundrum is to say that school districts aren’t worth saving and either deliver reforms in detail from the top or institute market- based, individual alternatives like charter schools, free schools, and academies that are insulated from district control. Another response is to use central funding formulas to compensate for bad variation and inequities. However, the strings attached to this funding often heap more grant writing and account- ability requirements on already overstretched high- poverty districts. leading from the middle
  • 63. A third way to reduce bad variation among school districts is to promote collaboration among them so they share resources, ideas, and expertise and exer- cise collective responsibility for student success. In this leading from the middle approach, districts don’t just mediate and manage other people’s reforms individually; they become the collective drivers of change and improvement together. When districts lead from the middle together, they: • Respond to local needs and diversities; • Take collective responsibility for all students’ and each other’s success; • Exercise initiative rather than implementing other people’s initiatives; • Integrate their own efforts with broad system priorities; and • Establish transparency of participation and results. These components of leading from the middle are
  • 64. In an age of innovation and diversity, top-down strategies are inappropriate, while bottom-up strat- egies seem unable to achieve improvement on any significant scale. So what should we do instead? One possibility is shifting attention toward districts, which can support schools and teachers in innovating and improving together. leading in the middle In North America and Northern Europe, school districts have historically been the linchpin of local democracy (Katz, 1987; Bryk et al., 1998). California Gov. Jerry Brown has recognized this by returning education spending control back to the state’s over 900 local districts, placing maximum control at the most local level of competent authority (Torlakson, 2015). Districts can provide a valuable focus for school improvement, be a means for efficient and effective use of research evidence and data analysis across schools, support schools in responding coherently to multiple external reform demands, and be champi- ons for families and students, making sure everybody gets a fair deal. Strong districts are powerful forces
  • 65. for positive educational change (Leithwood, 2013). Strong and steadily improving districts like Boston Public Schools and Long Beach Public Schools have received widespread acclaim for systemwide gains (Barber, Chijioke, & Mourshed, 2011). In England, some of the most dramatic turnarounds have been in urban districts, like the London boroughs of Hackney and Tower Hamlets, which went from the lowest per- formers in the country to scoring above the national average on all key indicators (Hargreaves, Boyle, & Harris, 2014; Hargreaves & Shirley, 2009). So some reformers argue that the middle level needs a stronger role in order to implement changes from the top and to move around ideas and strategies percolating up (Schleicher, 2015). This amounts to a kind of leadership in the middle — a healthy sort of middle-stage spread. Weaknesses of the middle Leading in the middle is promising, but it’s not enough. Not all local school systems or districts are strong. Some districts do well; others fare badly. Districts vary in their resources and capacities for
  • 66. change, like networking and seeking other ideas. Districts can be self-serving, politically toxic, gla- cially slow at driving improvement, and, as in the Atlanta cheating scandal, just plain corrupt. In the U.S. and England especially, there are unac- ceptable variations in school district quality. Differ- ences in demographics, poverty, funding, and capac- ity to attract and develop effective leadership means very high-performing and very low-performing districts sometimes coexist side-by-side (Noguera, Large-scale success cannot be achieved if districts continue to act independently of one another. V97 N3 kappanmagazine.org 45 land as head teachers) changed the cultures of the schools. Instead of blaming parents in poor families for not being interested in their children’s learning, schools came to appreciate the stresses facing fam- ilies and then responded with local flexibility and
  • 67. intensive support. They began to focus on deliver- ing better, more interesting teaching and learning through strategies like cooperative learning and Japanese lesson study. There was a lot of pressure on teachers and schools to work hard to improve results, but there also was more emphasis on caring for the adults in the schools as well as the children so that the schools became happy and professionally fulfilling places to work. None of this was easy. Local authorities are politi- cal entities as well as providers of services. Internal conflicts and external turf wars were often exacer- bated by national policies that promote interschool competition. A steering committee involving na- tional government and local representatives got locked into conflicts over the budget. A commit- tee of leaders of the 10 authorities became fractious evident in two systemwide reforms in which we have been closely involved — the Greater Manchester Challenge (GMC) in England, and district-driven improvements in Ontario, Canada. greater manchester challenge
  • 68. The United Kingdom government initiated the GMC in the 2007-08 school year by bringing to- gether 10 school districts (known in the UK as local authorities) to improve standards over three years. Co-author and professor of education Mel Ainscow was appointed chief adviser to this approximately $80 million (U.S.) project. “There are lots of good things going on in schools in Greater Manchester,” Ainscow said upon his appointment. “The task now is to spread the best practice to all schools.” But how would this be done? Ainscow’s group de- vised several principles for the effort: • Leaders of successful schools would work with weaker schools to improve their leadership teams; • Schools with similar student populations would be clustered to share best practices; and • Local problems would be met with local solutions.
  • 69. Getting schools to collaborate was not a new idea in England. What was different, though, was that while previous school-to-school networks and part- nerships had tended to bypass local authorities, 10 of them would be driving improvement together (see Ainscow, 2015 for a full account of the GMC). Multiple strategies brought this simple principle to life. Schools cooperated across authority bound- aries. Recently turned-around schools became key in helping other schools. Hub schools that demon- strated excellence in particular areas provided ex- tensive training and development for teachers in other schools and local authorities. Schools at dif- ferent stages of development organized in “families.” A Jewish school assisted a predominantly Muslim partner. A Catholic school prayed for a good in- spection result for its secular counterpart. School officials found hidden capacity and capitalized on it; they shared knowledge and overcame old rivalries for the higher purpose of improving the whole area. The Manchester area had suffered from historic problems of unemployment and deprivation for four decades, but by 2011, GMC schools were above the
  • 70. national average on all standardized test measures. Secondary schools in the most disadvantaged com- munities improved at three times the rate of the na- tional average. By working together, principals (known in Eng- Punitive or supportive, all versions of top-down reform have an Achilles heel. whenever it was presented with disturbing data or with concerns about lack of progress. While six of the authorities were willing to change roles and re- sponsibilities, two others accommodated the new language of shared responsibility for improvement without making any real changes in practice. But over time, with persistence of effort, relationships improved, some personnel changed, ideas and strat- egies started to be shared between schools as well as within them, and the authorities even began to commit to some joint delivery of services. The strategies adopted in Manchester (and now in Wales) define the essence of leading from the middle. But this term didn’t arise in the UK. It first
  • 71. emerged in a systemwide project with 10 school dis- tricts that the other co-author of this article (Andy Hargreaves) carried out with his colleague Henry Braun in Ontario, Canada. ontario district-led reforms Ontario has undertaken one of the world’s best- known, large-scale educational reforms. The most 46 Kappan November 2015 where even small amounts of extra resources could therefore make a great difference, this built a criti- cal mass of district support. Larger districts eventu- ally were persuaded to participate with their smaller counterparts by appealing to their historic symbolic status and the contribution they could make to the collective good of the province’s students. Responsibility for planning and implementation came under a core team of six key staff — retired district leaders and superintendents of curriculum
  • 72. or special education — who jointly developed proj- ect goals, designed an implementation strategy, and monitored participation and results. They did this by constantly connecting with and circulating among the districts, making necessary changes and refine- ments as they amassed evidence of what was working and what was not. Like the GMC, district leaders did not believe that one-size-fits-all strategies were appropriate in a province where one in four schoolchildren were born outside of Canada, leading to several different strategies: • In a district with high numbers of children from immigrant families, the project focused on early literacy initiatives like a summer head- start program for students new to the region and a “snuggle up and read” program involving parents or other family members. • In a district serving a large student population of Old Order German-origin Mennonites whose community is characterized by mutual aid, commitment to collective self-sufficiency,
  • 73. and wearing traditional dress, children tended to leave school early to work on the farms, or, in the case of girls, to get married and have children. Standard efforts to enforce school attendance and improve high school completion would prompt families to move to other parts of their rural network throughout North America. So school leaders engaged with their culture, for example, by using the community’s agricultural products for publicized parts of the reform, involving more than 5,000 schools, have been the focus on raising expec- tations and narrowing the achievement gap in tested literacy and mathematics and on increasing the rates of high school completion. The design and implementa- tion of this reform — by a “guiding coalition” of po- litical and professional forces — was complemented by strong support to enable districts to be successful in achieving the desired results (Campbell et al., 2015). The province’s 72 school districts and their sys- tem leaders led a less well-known part of the reform agenda. In 2005, the government gave the districts an initial investment of $25 million (Canadian) to
  • 74. design and implement a strategy to improve learn- ing and achievement for students with special edu- cational needs that would also benefit all students. One system leader described this change as “leading from the middle.” After four years of this reform, the literacy achievement gap between students with special needs and other students had narrowed in reading and especially in writing. A survey of the reform indicated the changes brought greater collaboration among staff, more joint planning, and broader acceptance of collective responsibility for all students (Hargreaves & Braun, 2012). Teachers reported increased use of differenti- ated instruction, more analysis and discussion of data to pinpoint needed interventions, greater coopera- tion between special education resource teachers and classroom teachers in relation to all students who struggled rather than only those with official iden- tifications, and more use of assistive technologies for students with learning disabilities. Intensive site vis- its in all 10 districts corroborated these results and also revealed greater collaboration between curricu- lum and special education departments within dis- tricts that sometimes amounted to total integration.
  • 75. In general, educators reported a large movement from a culture of “my students” to “our students.” District leaders drove this strategy. They took a counterintuitive approach of providing identical funding to all 72 districts, regardless of their size. In a province where many districts were quite small and In the leading from the middle approach, districts don’t just mediate and manage other people’s reforms individually; they become the collective drivers of change and improvement together. V97 N3 kappanmagazine.org 47 not micromanaging) this district-driven change. It stated that the CODE special education project must address issues of underachievement and the need to narrow the achievement gap and that the project should be consistent with the guiding philosophy of a 2005 provincial report called Education for All (Ontario Ministry of Education, 2005).
  • 76. Ontario’s special education reform created a change design that improved education for all stu- dents across the system. It drove change from the middle instead of ordering it from the top. And instead of expecting districts to adopt uniform re- sponses to a centralized reform strategy, the reform generated and galvanized local creativity and energy in order to respond flexibly to local needs and cir- cumstances. Building on its improvements in literacy and high school graduation and the success of its reforms, On- tario is moving further forward to pursue broader, bolder goals that include achievement and equity in 21st-century skills, arts, sciences, and citizenship. It also is pursuing greater well-being in mental, emo- tional, and physical health (Ontario Ministry of Edu- cation, 2014). The Boston College team is now work- ing with the 10 districts to lead from the middle, for the province, in relation to increasing students’ and teachers’ engagement, promoting their well-being and building positive, diverse identities among them. conclusion
  • 77. In recent years, in too many countries, school dis- tricts have been driven to distraction and to near destruction by top-down changes that have under- mined or bypassed their authority and also the com- munities they serve. There is clear evidence that dis- tricts can and should be a big part of a better future for children, if they’re willing to embrace changes in their thinking and practice. Large-scale success cannot be achieved if districts continue to act independently of one another. Lead- ing from the middle, not just in the middle, can use children’s lunches, meeting parents on street corners, carrying home their shopping, and building relationships to shift perceptions about the value of formal education. • A remote rural district serving just 24 schools across an area the size of France had struggled with how to raise expectations for the 40% of children from aboriginal families (known in Canada as First Nations communities). Some educators believed that children from these
  • 78. communities could not learn, could barely speak, and mainly needed an emotionally safe and caring environment. The district’s response was to coach teachers to use more specific, differentiated, and culturally appropriate teaching strategies, and to examine examples of student work among colleagues to demonstrate possibilities for student and teacher success. Like the GMC, the Ontario special education project also stressed collective cross-district respon- sibility for all students’ success. All 72 districts were involved. Collective responsibility began with teach- ers across grade levels and with special education and regular classroom assignments taking responsibility for struggling students and their progress together. The districts exercised collective responsibility, too, in how they shared strategies transparently at annual retreats where they presented their practices and re- sults, in how they communicated with the steering committee, and in how they were connected by their team of mentors and monitors who were ensuring that intentions were being converted into action. These mentors and monitors did not have hierar- chical supervisory authority over the districts and
  • 79. their leaders. Instead, these respected peers acted as a “third-party” force responsible for improvement, system learning, and, where needed, to challenge existing practice. Ontario’s special education reform was not only implemented by district leaders and special educa- tion superintendents; it was devised and driven by them. At the very beginning the executive director of the Council of Ontario Directors of Education (CODE) and a small group of his associates who acted on behalf of the 72 district leaders pointed out to the Ministry of Education that it already had allocated significant resources to other groups such as the teachers’ unions. CODE therefore requested resources and authority of its own to lead improve- ments in special education. Though some feared the district leaders and their organization might diverge from Ministry of Edu- cation policy, these leaders sought ways to integrate their own efforts with central government directions. The ministry itself took a clear role in steering (but A Jewish school assisted a
  • 80. predominantly Muslim partner. A Catholic school prayed for a good inspection result for its secular counterpart. 48 Kappan November 2015 Bryk, A.S., Sebring, P.B., Kerbow, D., Rollow, S., & Easton, J.Q. (1998). Charting Chicago school reform: Democratic localism as a lever for change. Boulder, CO: Westview Press. Campbell, C., Osmond-Johnson, P., Lieberman, A., & Sohn, J. (2015). International teacher policy study: Ontario case report. Toronto, ON: Ontario Institute for Studies in Education, University of Toronto. http://bit.ly/1WueyUR Gross, N., Giacquinta, J.B., & Bernstein, M. (1971).
  • 81. Implementing organizational innovations: A sociological analysis of planned educational change. New York, NY: Basic Books. Hargreaves, A., Boyle, A., & Harris, A. (2014). Uplifting leadership: How teams and communities raise performance. San Francisco, CA: Jossey-Bass. Hargreaves, A. & Braun, H. (2012). Leading for all: Final report of the review of the development of essential for some, good for all: Ontario’s strategy for special education reform devised by the Council of Directors of Education. Toronto, Ontario: Council of Directors of Education. Hargreaves, A. & Shirley, D. (2009). The fourth way: The inspiring future for educational change. Thousand Oaks, CA:
  • 82. Corwin Press. Katz, M. (1987) Reconstructing American education. Cambridge, MA: Harvard University Press. Leithwood, K. (2013). Strong districts & their leadership. Toronto, Ontario: Ontario Institute of Education Leadership. Noguera, P. (2014, June 18). In defense of teacher tenure: A few ineffective educators are not the primary reason many schools are struggling. The Wall Street Journal. www. wsj.com/articles/pedro-noguera-in-defense-of-teacher- tenure-1403134951 Ontario Ministry of Education. (2005). Education for all. http:// bit.ly/1ihpaYA
  • 83. Ontario Ministry of Education. (2014). Achieving excellence: A renewed vision for education in Ontario. http://bit.ly/1ihoYsk Rincon-Gallardo, S. & Fullan, M. (in press). Essential features of effective collaboration: The social physics of educational change. Journal of Professional Capital and Community. Schleicher, A. (2015, March 30). Implementing highly effective teacher policy and practice: The 2015 International Summit on the Teaching Profession. www.slideshare.net/OECDEDU/ implementing-highly-effective-teacher-policy-and-practice- 2015-international-summit-of-the-teaching-profession Sutton Trust Education Data Lab. (2015). Missing talent. Research brief. London, UK: Sutton Trust. http://bit. ly/1EQWT5k
  • 84. Torlakson, T. (2015) A blueprint for great schools: Version 2.0. Sacramento, CA: California Department of Education. Leading in the middle is a promising direction, but it’s not enough. “As you can see boys and girls, the alphabet comes in ‘caps lock on’ and ‘caps lock off.’” the power of local solutions to diverse problems in an environment where schools work with schools and districts work with districts as they exercise col- lective initiative and responsibility for all students’ success. This kind of leadership needn’t be confined to districts and can encompass networks and other kinds of partnerships as well (Rincon-Gallardo & Fullan, in press). But collective responsibility is not just something districts should ask others to under- take. It is something that districts now have to take on themselves. K References
  • 85. Ainscow, M. (2015) Towards self-improving school systems: Lessons from a city challenge. London, UK: Routledge. Barber, M., Chijioke, C., & Mourshed, M. (2011). How the world’s most improved school systems keep getting better. Chicago, IL: McKinsey & Company. Copyright of Phi Delta Kappan is the property of Sage Publications, Inc. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.
  • 86. Expanding Our Understanding of Social Change A Report From the Definition Task Force of the HLC Special Emphasis Project Darragh Callahan, Elizabeth Wilson, Ian Birdsall, Brooke Estabrook-Fishinghawk, Gary Carson, Stephanie Ford, Karen Ouzts, Iris Yob Expanding Our Understanding (July 2012) Page 2
  • 87. Academic Offices 100 Washington Avenue South, Suite 900 Minneapolis, MN 55401 Phone: 1-612-338-7224 or 1-800-WALDENU (1-800- 925-3368) Fax: 1-612-338-5092 Administrative Offices 650 S. Exeter Street Baltimore, MD 21202 Phone: 1-866-4WALDEN (1-866-492- 5336) Fax: 1-410-843-8104 Walden University is accredited by The Higher Learning Commission and a member of the North Central Association, www.ncahlc.org.
  • 88. Walden University practices a policy of nondiscrimination in admission to, access to, and employment in its programs and activities. Walden does not discriminate on the basis of race, color, sex, age, religion or creed, marital status, disability, national or ethnic origin, socioeconomic status, sexual orientation, or other legally protected status. Walden is committed to providing barrier-free access to its educational services and makes appropriate and reasonable accommodations when necessary. Students requesting accommodations per the Americans with Disabilities Act (ADA) must contact the Office of Disability Services at [email protected] © 2012 Walden University, LLC http://www.ncahlc.org/ mailto:[email protected]
  • 89. Expanding Our Understanding (July 2012) Page 3 Social change is defined broadly in terms of process and product to indicate that all kinds of social change activity are welcomed and encouraged at Walden. As faculty members, students, and alumni have indicated, even small acts can have large consequences, and many of these consequences are unpredictable. The charge given to the Definition Task Force was to expand the university’s definition of social change to provide more guidance for teaching, learning, and assessing the social change mission at Walden. To that end, the Task Force offers the following considerations.
  • 90. To bring about long-term solutions and promote lasting effects through the process of social change, the following features may need to be considered as appropriate to the context and purposes of each program. The features are grouped under the headings Knowledge, Skills, and Attitudes, to encourage a holistic approach to preparing learners for social change. The groupings, however, are defined by soft boundaries because each feature belongs primarily to one group but may share some of the qualities of the other groups. A. Knowledge 1. Scholarship The scholar-practitioner model is particularly suited to social change because knowledge
  • 91. applied to real-life situations is a scholar-practitioner’s goal. In the scholarly role, the scholar-practitioner engages in active learning, critical reflection, and inquiry into real- life dilemmas and possibilities. Careful study and research can reveal the causes and correlates of social problems and suggest solutions and opportunities for promoting growth. 2. Systems thinking Many of the issues addressed by social change are complex because there may be multiple causes and manifestations of the issue that require different responses at many levels. Systemic thinking is a technique for developing insights into challenging
  • 92. situations and complex subjects. It usually begins with analysis, which makes sense of a system by breaking it apart to see how the parts work together and influence each other. This may be followed by synthesis that aims to develop a set of responses that address the situation in a comprehensive way. In the Walden community, finding systemic solutions to challenging issues might be undertaken by multidisciplinary collaborations in which scholar-practitioners from a number of colleges work together to examine issues and propose multipronged responses. http://www.probsolv.com/probsolv.htm
  • 93. Expanding Our Understanding (July 2012) Page 4 3. Reflection Those working toward positive social change can enhance their effectiveness by reflecting on the experience. Reflection can be extrospective, that is, looking outward to review the short- and long-term outcomes of a project and its implications for the individuals, institutions, and communities with and for whom one is working. It can also be introspective, that is, looking inward to examine what has been learned from the process, including new insights into one’s motives, skills,
  • 94. knowledge, actions, and reactions. Self-reflection allows for the contemplation of one’s professional and personal development. Group reflection affords all stakeholders in a social change project (scholar-practitioners, community partners, policy- makers, and beneficiaries) an opportunity to process the experience and learn from each other. Reflection employs critical-thinking and analytical skills. It can be carried forward by questioning and self- inquiry and may depend on a willingness to see things from another’s perspective. While reflection needs to be honest, it should also be caring and supportive, examining strengths as well as weaknesses and successes as along with disappointments. While
  • 95. reflection may look to the past, its purpose is forward-looking— to make future social change activities more effective. B. Skills 4. Practice In the practitioner role, the scholar-practitioner engages in the application of knowledge. Learning-by-doing, or experiential learning, has a long history of support and success in education because it can infuse and sometimes lead to deconstructing or constructing theoretical understandings within the realities of practical life in the
  • 96. student’s personal growth, profession, or community. By using recursive loops between scholarship and practice, both intellectual growth and better practice can occur—each informing the other. Not merely knowing about theories but actually testing theories in the context of everyday life is the foundation of a scholar- practitioner’s educational process and contribution to social change. 5. Collaboration Given the complexity of many of the issues addressed in social change efforts, responsive action may be needed from many different sources. In these situations, the
  • 97. Expanding Our Understanding (July 2012) Page 5 social change agent may want to build working relationships with other entities including community leaders, service agencies, neighborhood coalitions, businesses, religious congregations, and other local institutions. Apart from these types of civic engagement, collaboration with scholars and practitioners in an array of professional fields may bring a variety of perspectives, research, and applied knowledge. Partnerships can unite the skills, knowledge, and energies needed to make a difference. The ability to build a team, combined with leadership, project management, conflict resolution, and communication skills, may be essential. A
  • 98. significant partner in social change enterprises is the primary beneficiary; this person has a personal knowledge and experience that can be invaluable in both analyzing a situation and proposing responses. The primary beneficiary may be one individual or someone representing the perspectives of a group of beneficiaries. Working collaboratively with primary beneficiaries can be mutually educative and rewarding. 6. Advocacy Advocacy is a matter of raising consciousness or being the “voice” for someone, some group, or something that may or may not otherwise have a voice that can be heard. It
  • 99. may involve political engagement, but it may also be a matter of supporting others as they negotiate directly with the services and opportunities they need. In light of social change, advocacy more widely aims to influence not only political but also economic and social systems and institutions to protect and promote the dignity, health, safety, and rights of people. Advocacy for an issue often takes the form of education that aims to bring about a new understanding and awareness. Advocacy may also need to encompass mentoring activities to build confidence and self- reliance in those whose welfare is being promoted. 7. Civic engagement
  • 100. Social change efforts can be supported and reflected in laws by policy-makers. Being aware of the channels for communicating with civic leaders and knowing how to effectively use those channels are often important when working for social change. All institutions and groups—not just government entities—have their own politics, that is, a prevailing mind-set, an internal structure, and channels of influence and power. Being able to incorporate and negotiate these politics in support of social change requires finesse and sensitivity. Understanding this before engaging with others can be helpful, whether these others are legislators, local agencies and institutions, professional
  • 101. associations, neighborhoods, ad hoc teams, or professional colleagues. Power Expanding Our Understanding (July 2012) Page 6 relationships also exist between those working for social change and those who are the primary beneficiaries. Mutual collaboration and power-sharing between the parties involved can empower all toward more lasting social change. C. Attitudes 8. Humane ethics While a number of emotional effects may prompt one to engage
  • 102. in social change, including empathy, sympathy, guilt, a feeling of satisfaction, and so on, one’s ethical code can inform and direct one’s motivated engagement in social change. Humane ethics is a system of moral principles that guide human conduct with respect to the rightness and wrongness of certain actions. While personal codes of ethics may differ, an underlying, common code of a humane ethic is characterized by tenderness, compassion, sympathy for people and animals, especially for the suffering or distressed, and concern for the health of the environment in which we live. Analyzing Social Change
  • 103. Figure 1 below shows each of the features—scholarship, systemic thinking, reflection, practice, collaboration, advocacy, civic engagement, and humane ethics— on an axis ranging from 0 to 5. Each social change activity or project could be mapped onto the axes to show the extent to which it incorporates each feature. Joining the points along each axis produces a web for each activity, an example of which is shown in red. It is important to note that this tool is not intended to be an instrument to assess a particular social change activity. Some projects and activities will be appropriately strong in one or more areas but not necessarily in all. Rather, its purpose is to serve as a tool to analyze social change activities that occur at Walden. It may reveal areas where an activity might be enhanced, and
  • 104. importantly, it may reveal where the program for preparing students for social change might be strengthened. Further, all kinds of social change activities are encouraged, given the range of interests, commitments, and opportunities for engagement among students, faculty members, and staff. Most, if not all, kinds of activity can be represented as a web. The purpose of the web analysis is ultimately to provide a tool to enlarge our vision of the range and features of social change that seeks long-term solutions and promotes lasting effects. Expanding Our Understanding (July 2012) Page 7
  • 105. Figure 1. Web map showing each of the features. Below are some examples of web maps of social change activities based on reports by students, faculty members, and alumni in a recent research study: Perspectives on Social Change. Pseudonyms have been used throughout. Example No. 1. Bookcase Builders Tom is a Rotarian and undertakes a number of service projects in the community with other Rotarians. One such activity involves building bookcases. Some members of the club also volunteer with Habitat for Humanity, which provides housing for needy families. Another member has connections with the local
  • 106. school district and knew of a recent drive to improve the level of literacy in the community. Putting these together, the club decided to build bookcases for the Habitat for Humanity homes and, through the support of another club member who manages a bookstore, give each family a gift certificate to buy books for the children to put in the bookcase. This activity would certainly rate relatively high on Collaboration for the networking among Rotarians, the local chapter of Habitat for Humanity, the school district, and the local book store. It also represents a Humane Ethic in that it shows the responsiveness of this club to the need for these children to read Expanding Our Understanding (July 2012) Page 8
  • 107. well for their future success in life. As a practice, this need is supported by implicit knowledge about the importance of motivating children and providing them with opportunities to read. so there should be a showing on the Practitioner axis. Figure 2 below shows how this project might be mapped. Figure 2. Web map of the bookcase builders project. If Tom and his fellow club members want to pursue this project further they might ask whether they may seek other possible partners for this endeavor, such as the reading tutors, the bookstore salespeople, the parents, and even the children themselves. Others brought into the program may contribute more Systemic Thinking to address the problem of illiteracy. The club members may also
  • 108. consider follow-up activities using other features like Advocacy with a particular focus on mentoring, Civic Engagement, or some Scholarly study of or research on the effectiveness of the project. Example No. 2. Basket-Weavers as Story-Tellers Arsi’s research took her to a remote and needy area of Jamaica, where many of the village women help support their families through weaving baskets for sale in the tourist areas. Using a qualitative approach, Arsi listened to and recorded the women’s stories of their lives in abject poverty, analyzed them for common themes, and presented her findings as her dissertation. The information in this dissertation could be invaluable to service agencies and others willing to work with these women to improve their lives.
  • 109. Expanding Our Understanding (July 2012) Page 9 The project is high on the Scholar axis, especially because it is research into a real-life problem that needs informed solutions. It further exhibits significant Collaboration in that she established personal relationships with the women so that they could tell her their stories. It is also strong in the Humane Ethics dimension because it deals with real human need. Writing a dissertation also demands Reflection, particularly because it requires some discussion of the meaning of the findings and their possible implications. The dissertation ultimately enters the public domain and, as such, is a permanent voice for
  • 110. the women whose stories it shares (Advocacy). Figure 3 below illustrates this example. Figure 3. Web map of the basket-weavers as story-tellers project. Arsi successfully graduated in 2011. If she wanted to continue with the project, she might share her findings with policy-makers (Civic Engagement) and service providers, such as business people, educators, and healthcare workers (Systemic Thinking). If she could disseminate her work through publications and presentations, she would not only deepen her own understanding (Reflection) but more directly provide valuable information to service agencies and others to apply in working with and for these women (Practitioner).
  • 111. Example No. 3. The Monthly Giver Expanding Our Understanding (July 2012) Page 10 Many faculty members, students, and staff members sign up to make monthly donations to agencies, such as United Way, through automatic payroll deductions. Given their busy schedules and commitments, they look at this as making some kind of contribution to “the development of individuals, institutions, and societies.” Does such an activity count as social change? Figure 4 below is an attempt to map this activity. One of the benefits of the mapping tool is that it is inclusive of a wide range of possible engagements in
  • 112. social change. The monthly giver, like many others, is guided by a Humane Ethic and wants to act out of compassion and care for the distressed and needy. She also understands that the organization she is donating to is carefully managed, well informed, and handles donations responsibly, and she wants to do something practical to support it (Practitioner). She also knows that her donation, because it is combined with the donations of many others, can amount to a significant sum to support large-scale projects in the community (Collaboration). Figure 4. Web map of the monthly giver. Example No. 4. Global Day of Service Participant