By analysing intelligence-gathering reform legislation this article discusses access to justice for communications interception by the intelligence and security services. In the aftermath of the Snowden revelations, sophisticated oversight systems for bulk communications surveillance are being established across the globe. In the Netherlands prior judicial consent and a binding complaint procedure have been established. However, although checks and balances for targeted communications interference have been created, accountability mechanisms are less equipped to effectively remedy indiscriminate interference. Therefore, within the context of mass communications surveillance programs, access to justice for complainants remains a contentious issue.
MULTIFILE
This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
DOCUMENT
The energy management systems industry in the built environment is currently an important topic. Buildings use about 40% of the total global energy worldwide. Therefore, the energy management system’s sector is one of the most influential sectors to realize changes and transformation of energy use. New data science technologies used in building energy management systems might not only bring many technical challenges, but also they raise significant educational challenges for professionals who work in the field of energy management systems. Learning and educational issues are mainly due to the transformation of professional practices and networks, emerging technologies, and a big shift in how people work, communicate, and share their knowledge across the professional and academic sectors. In this study, we have investigated three different companies active in the building services sector to identify the main motivation and barriers to knowledge adoption, transfer, and exchange between different professionals in the energy management sector and explore the technologies that have been used in this field using the boundary-crossing framework. The results of our study show the importance of understanding professional learning networks in the building services sector. Additionally, the role of learning culture, incentive structure, and technologies behind the educational system of each organization are explained. Boundary-crossing helps to analyze the barriers and challenges in the educational setting and how new educational technologies can be embedded. Based on our results, future studies with a bigger sample and deeper analysis of technologies are needed to have a better understanding of current educational problems.
DOCUMENT
This review of meta-analyses of outcome studies of adults receiving Computer-Based Health Education (CBHE) has two goals. The first is to provide an overview of the efficacy of CBHE interventions, and the second is to identify moderators of these effects. A systematic literature search resulted in 15 meta-analyses of 278 controlled outcome studies. The meta-analyses were analysed with regard to reported (overall) effect sizes, heterogeneity and interaction effects. The results indicate a positive relationship between CBHE interventions and improvements in health-related outcomes, with small overall effect sizes compared to non-computer-based interventions. The sustainability of the effects was observed for up to six months. Outcome moderators (31 variables) were studied in 12 meta-analyses and were clustered into three categories: intervention features (20 variables), participant characteristics (five variables) and study features (six variables). No relationship with effectiveness was found for four intervention features, theoretical background, use of internet and e-mail, intervention setting and self-monitoring; two participant features, age and gender; and one study feature, the type of analysis. Regarding the other 24 identified features, no consistent results were observed across meta-analyses. To enhance the effectiveness of CBHE interventions, moderators of effects should be studied as single constructs in high-quality study designs. http://www.journalofinterdisciplinarysciences.com/ https://www.linkedin.com/in/leontienvreeburg/
DOCUMENT
A major challenge for disaster scholars and policymakers is to understand the power dimension in response networks, particularly relating to collaboration and coordination. We propose a conceptual framework to study interests and negotiations in and between various civic and professional, response networks drawing on the concepts of “programming” and “switching” proposed by Manuel Castells in his work on the network society. Programming in disaster response refers to the ability to constitute response networks and to program/reprogram them in terms of the goals assigned to the network. Switching is the ability to connect different net-works by sharing common goals and combining resources. We employ these concepts to understand how the US Federal Emergency Management Agency organized its response in the aftermath of Hurricanes Katrina and Sandy. Our conceptual framework can be used both by disaster scholars and policymakers to understand how networked power is constructed and utilized.
DOCUMENT
Business is changing from an industrial- to a knowledge-based environment, building more from professionals and their expertise. Corporations need to create internal organizations in which there is more emphasis on human capital and creating/sharing knowledge and talents. Talent management and knowledge creation should be new foci to create sustainability and long-term success. On the whole, organisations are working too much on an ad hoc basis, focusing on technology instead of creating an environment in which talents reinforce each other. In this review article we explore knowledge circulation, link knowledge, and talent to innovation, and discuss optimum circumstances for corporations to benefit from these assets.
DOCUMENT
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constructed an incident response needs model to assist in identifying areas that require improvement. We envisioned a model consisting of four assessment categories: Organization, Team, Individual and Instrumental. Central to this is the idea that both problems and needs can have an organizational, team, individual, or technical origin or a combination of these levels. To gather data we conducted a literature review. This resulted in a comprehensive list of challenges and needs that could hinder or improve, respectively, the performance of CSIRTs. Then, semi-structured in depth interviews were held with team coordinators and team members of five public and private sector Dutch CSIRTs to ground these findings in practice and to identify gaps between current and desired incident handling practices. This paper presents the findings of our needs assessment and ends with a discussion of potential solutions to problems with performance in incident response. https://doi.org/10.3389/fpsyg.2017.02179 LinkedIn: https://www.linkedin.com/in/rickvanderkleij1/
MULTIFILE
The aim of this study was to understand the motives for using the Internet, and its associations with users' attitudes, social values, and relational involvement. Also, this study attempted to crossculturally compare the difference in the pattern of motives and the associations among three countries ' the US, the Netherlands, and S. Korea. The design of methods was based on examination and revision of uses and gratification approach toward Internet users. Findings from factor analysis revealed that information seeking and Self-Improvement were the dominant and common reasons for using the Internet across three countries. The differences in the composition of motives in each country were also reported. Strong correlations across countries were found between all the motives and satisfaction of the Internet. Expectation and positive evaluation of the Internet were also important attitudes associated with Internet use motives. Postmaterialist value showed strong association with motives of information seeking and Self-Improvement. Community involvement was significantly associated with Internet use motives in Korean users.
DOCUMENT
Energy conservation is crucial in wireless ad hoc sensor network design to increase network lifetime. Since communication consumes a major part of the energy used by a sensor node, efficient communication is important. Topology control aims at achieving more efficient communication by dropping links and reducing interference among simultaneous transmissions by adjusting the nodes’ transmission power. Since dropping links make a network more susceptible to node failure, a fundamental problem in wireless sensor networks is to find a communication graph with minimum interference and minimum power assignment aiming at an induced topology that can satisfy fault-tolerant properties. In this paper, we examine and propose linear integer programming formulations and a hybrid meta-heuristic GRASP/VNS (Greedy Randomized Adaptive Search Procedure/Variable Neighborhood Search) to determine the transmission power of each node while maintaining a fault-tolerant network and simultaneously minimize the interference and the total power consumption. Optimal biconnected topologies for moderately sized networks with minimum interference and minimum power are obtained using a commercial solver. We report computational simulations comparing the integer programming formulations and the GRASP/VNS, and evaluate the effectiveness of three meta-heuristics in terms of the tradeoffs between computation time and solution quality. We show that the proposed meta-heuristics are able to find good solutions for sensor networks with up to 400 nodes and that the GRASP/VNS was able to systematically find the best lower bounds and optimal solutions.
DOCUMENT
Crowdfunding is gaining popularity as a viable means to raise financial capital for good causes, cultural goods, new products, and ventures. Little empirical research has been done to understand crowdfunding and basic academic knowledge of its dynamics is still lacking. By data mining the crowdfunding platform Kickstarter.com and Facebook we collected a large dataset of crowdfunding projects and the ego networks of the entrepreneurs. We study the relation of the success of the Kickstarter project to his social network and to media activities and find a scaling law that predicts the number of clicks on the project website required for a successful project. Examining the results of the social network analysis we concluded that successful initiators on Kickstarter have more friends but a sparser network. Unsuccessful entrepreneurs on the other hand have a higher average degree suggesting a denser network. Our analyses suggest that sparse, and thus diverse networks are beneficial for the success of a project.
DOCUMENT