References of "2020"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailMotivational Interviewing to Increase Physical Activity Behavior in Cancer Patients: A Pilot Randomized Controlled Trials
Lion, A; Backes, A; Duhem, C et al

in Integrative Cancer Therapies (2020), 19

OBJECTIVE: This pilot randomized controlled trial (RCT) aimed at evaluating the feasibility and potential efficacy of a motivational interviewing (MI) intervention to increase physical activity (PA ... [more ▼]

OBJECTIVE: This pilot randomized controlled trial (RCT) aimed at evaluating the feasibility and potential efficacy of a motivational interviewing (MI) intervention to increase physical activity (PA) behavior in cancer patients. METHODS: Participants were randomly assigned to an experimental group with standard care plus 12 MI sessions within 12 weeks or a control group with standard care only. The number of recruited participants and the modality of recruitment were recorded to describe the reach of the study. The acceptability of the study was estimated using the attrition rate during the intervention phase. The potential efficacy of the intervention was evaluated by analyzing the PA behavior. RESULTS: Twenty-five participants were recruited within the 16-month recruitment period (1.6 participants per month). Five participants (38.5%) from the experimental group (n = 13) and one participant (8.3%) from the control group (n = 12) dropped out of the study before the end of the intervention phase. No group by time interaction effect for PA behavior was observed at the end of the intervention. CONCLUSION: Due to the low recruitment rate and compliance, no conclusion can be drawn regarding the efficacy of MI to increase PA behavior in cancer patients. Moreover, the current literature cannot provide any evidence on the effectiveness of MI to increase PA in cancer survivors. Future RCTs should consider that the percentage of uninterested patients to join the study may be as high as 60%. Overrecruitment (30% to 40%) is also recommended to accommodate the elevated attrition rate. [less ▲]

Detailed reference viewed: 113 (1 UL)
Full Text
Peer Reviewed
See detailFast Adaptive Reparametrization (FAR) with Application to Human Action Recognition
Ghorbel, Enjie UL; Demisse, Girum UL; Aouada, Djamila UL et al

in IEEE Signal Processing Letters (2020)

In this paper, a fast approach for curve reparametrization, called Fast Adaptive Reparamterization (FAR), is introduced. Instead of computing an optimal matching between two curves such as Dynamic Time ... [more ▼]

In this paper, a fast approach for curve reparametrization, called Fast Adaptive Reparamterization (FAR), is introduced. Instead of computing an optimal matching between two curves such as Dynamic Time Warping (DTW) and elastic distance-based approaches, our method is applied to each curve independently, leading to linear computational complexity. It is based on a simple replacement of the curve parameter by a variable invariant under specific variations of reparametrization. The choice of this variable is heuristically made according to the application of interest. In addition to being fast, the proposed reparametrization can be applied not only to curves observed in Euclidean spaces but also to feature curves living in Riemannian spaces. To validate our approach, we apply it to the scenario of human action recognition using curves living in the Riemannian product Special Euclidean space SE(3) n. The obtained results on three benchmarks for human action recognition (MSRAction3D, Florence3D, and UTKinect) show that our approach competes with state-of-the-art methods in terms of accuracy and computational cost. [less ▲]

Detailed reference viewed: 273 (9 UL)
Full Text
Peer Reviewed
See detailTheoretical Lessons from EMU and Banking Union: Plus ça change
Howarth, David UL; Quaglia, Lucia

in Howarth, David; Schild, Joachim (Eds.) The Difficult Construction of European Banking Union (2020)

Why did Euro Area member state governments decide to move to Banking Union (BU) — presented by proponents as a crucial move to ‘complete’ Economic and Monetary Union (EMU) — only in 2012, over twenty ... [more ▼]

Why did Euro Area member state governments decide to move to Banking Union (BU) — presented by proponents as a crucial move to ‘complete’ Economic and Monetary Union (EMU) — only in 2012, over twenty years after the adoption of the Maastricht Treaty? Why has a certain design for BU been chosen and some elements of this design prioritised over others? This paper interrogates previous academic accounts on the move to and the design of EMU — neofunctionalist, intergovernmentalist and constructivist — evaluating their explanatory power with reference to BU. It is argued that the asymmetrical design of EMU generated a variety of spill-overs and, hence, a neofunctionalist drive to supranationalise control over bank supervision and financial support for banks as part of the so-called ‘completion’ of EMU. However, intergovernmental negotiations informed by moral hazard and domestic political economy concerns explain the asymmetrical design of BU agreed by national governments. [less ▲]

Detailed reference viewed: 112 (1 UL)
Full Text
Peer Reviewed
See detailFace validity evaluation of screening tools for gaming disorder: Scope, language, and overpathologizing issues.
King, Daniel; Billieux, Joël UL; Carragher, Natacha et al

in Journal of behavioral addictions (2020), 9(1), 1-13

Aim: Critics of gaming disorder (GD; i.e., Internet gaming disorder in the DSM-5; Gaming disorder in the ICD-11) have expressed concerns about the potential risks of misclassification (e.g., false ... [more ▼]

Aim: Critics of gaming disorder (GD; i.e., Internet gaming disorder in the DSM-5; Gaming disorder in the ICD-11) have expressed concerns about the potential risks of misclassification (e.g., false positives). An important consideration of relevance to this discussion is the extent to which commonly used screening instruments contain appropriate, sensible, and relevant items. The aim of this review was to evaluate the face validity of items within current tools for GD. Methods: A systematic review of databases identified 29 instruments. An item bank (n = 417 items) was independently evaluated by three professional raters (i.e., a senior academic in clinical psychology, a senior psychometrician, and an academic/clinical psychologist) according to guidelines for defining and measuring addiction and gaming disorder. Findings: Evaluation of the item bank identified issues related to: scope (i.e., "scope creep" or items of questionable relevance); language (i.e., confusing language, unusual wording or syntax); and overpathologizing (i.e., pathologizing typical and/or beneficial aspects or consequences of gaming). A total of 71 items across 23 tools had at least one face validity issue. Conclusions: Most items (83%) demonstrated satisfactory face validity and were consistent with either the DSM-5 or ICD-11 GD classification. However, many tests contain at least one item that may pathologize normal gaming behaviors. Such items refer to basic changes in mood when gaming, a desire to play or continue playing games, and experiencing immersion when gaming. This analysis highlights the challenges of screening for problematic behaviors that are thought to arise within the context of normal recreational activities. [less ▲]

Detailed reference viewed: 41 (0 UL)
Full Text
Peer Reviewed
See detailSecurity and Privacy in Resource-Constrained Devices
Chiara, Pier Giorgio UL

in CEUR Workshop Proceedings (2020), 2598

Recent adversarial attacks have been shown IoT devices weaknesses due to their limited computing power. Given also their ubiquitous presence, lower costs and limitations in keeping security measures up ... [more ▼]

Recent adversarial attacks have been shown IoT devices weaknesses due to their limited computing power. Given also their ubiquitous presence, lower costs and limitations in keeping security measures up-todate, resource-constrained devices represent a growing risk for the security of IT infrastructure. The scope of the research is to investigate the weaknesses of resource-constrained IoT devices. The methodology for the investigation is the legal analysis of existing legal frameworks regulating IoT cybersecurity and data security; afterwards it will be carried out a critical evaluation of the existing best practices. This critical analysis should face the twofold challenge of increasing transparency and trust in resource-constrained systems. Users and companies are two faces of the same coin: accountability of data collectors and user awareness are crucial in the security and data protection debate. Thus, a comprehensive overview of the relevant legal frameworks and guidelines would increase the understanding of risks of the users, whilst data controllers (especially of small and medium enterprises) may have an instrument to implement properly security measures. [less ▲]

Detailed reference viewed: 146 (5 UL)
See detailSporthistorische Netzwerke: Anfänge – Entwicklungen – Perspektiven
Heck, Sandra UL

in Krüger, Michael; Hofmann, Annette (Eds.) Sportgeschichte in Deutschland – Herausforderungen und internationale Perspektiven, Bildung und Sport (2020)

Netzwerke sind bekanntermaßen wichtige Instrumente des Informations- und Meinungsaustausches. Das gemeinsame Interesse an der Sportgeschichte führt auch in diesem thematischen Bereich regelmäßig Menschen ... [more ▼]

Netzwerke sind bekanntermaßen wichtige Instrumente des Informations- und Meinungsaustausches. Das gemeinsame Interesse an der Sportgeschichte führt auch in diesem thematischen Bereich regelmäßig Menschen zusammen. Ziel dieser Analyse ist es, den Status Quo der institutionalisierten Sportgeschichte weltweit aufzuzeigen. Ausgehend von dieser Situation werden die Anfänge und die Entwicklung der organisierten Sportgeschichte am Beispiel der International Society for the History of Physical Education and Sport (ISHPES) und ihres Vorgängers, der International Association for the History of Physical Education and Sport (HISPA), untersucht. Der Fokus richtet sich hier auf unterschiedliche Kriterien, darunter die jeweiligen Zielsetzungen der Organisationen, die Entwicklung der Mitgliederzahlen und -strukturen sowie die geographische Verteilung der Tagungsorte. Aus den Erkenntnissen der vergangenen und aktuellen Situation werden Rückschlüsse auf die Rolle der Netzwerkbildung für die Entwicklung der akademischen Fachdisziplin Sportgeschichte gezogen und abschließend eine Empfehlung ausgesprochen, wie sporthistorische Netzwerke möglicherweise dem Verlust der akademischen Bedeutung der Geschichte als Teildisziplin der Sportwissenschaft entgegenwirken können. [less ▲]

Detailed reference viewed: 57 (13 UL)
Full Text
See detailIn-work poverty in times of pandemic
Ratti, Luca UL

E-print/Working paper (2020)

The coronavirus crisis is exacerbating in-work poverty in the EU—and a powerful raft of labour-market and welfare measures is needed for an adequate response.

Detailed reference viewed: 74 (13 UL)
Full Text
Peer Reviewed
See detailÆGIS: Shielding Vulnerable Smart Contracts Against Attacks
Ferreira Torres, Christof UL; Steichen, Mathis UL; Norvill, Robert UL et al

in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), October 5–9, 2020, Taipei, Taiwan (2020)

In recent years, smart contracts have suffered major exploits, cost- ing millions of dollars. Unlike traditional programs, smart contracts are deployed on a blockchain. As such, they cannot be modified ... [more ▼]

In recent years, smart contracts have suffered major exploits, cost- ing millions of dollars. Unlike traditional programs, smart contracts are deployed on a blockchain. As such, they cannot be modified once deployed. Though various tools have been proposed to detect vulnerable smart contracts, the majority fails to protect vulnera- ble contracts that have already been deployed on the blockchain. Only very few solutions have been proposed so far to tackle the issue of post-deployment. However, these solutions suffer from low precision and are not generic enough to prevent any type of attack. In this work, we introduce ÆGIS, a dynamic analysis tool that protects smart contracts from being exploited during runtime. Its capability of detecting new vulnerabilities can easily be extended through so-called attack patterns. These patterns are written in a domain-specific language that is tailored to the execution model of Ethereum smart contracts. The language enables the description of malicious control and data flows. In addition, we propose a novel mechanism to streamline and speed up the process of managing attack patterns. Patterns are voted upon and stored via a smart contract, thus leveraging the benefits of tamper-resistance and transparency provided by the blockchain. We compare ÆGIS to current state-of-the-art tools and demonstrate that our solution achieves higher precision in detecting attacks. Finally, we perform a large-scale analysis on the first 4.5 million blocks of the Ethereum blockchain, thereby confirming the occurrences of well reported and yet unreported attacks in the wild. [less ▲]

Detailed reference viewed: 236 (11 UL)
Full Text
Peer Reviewed
See detailA Conserved Mito-Cytosolic Translational Balance Links Two Longevity Pathways.
Molenaars, Marte; Janssens, Georges E.; Williams, Evan UL et al

in Cell metabolism (2020), 31(3), 549-5637

Slowing down translation in either the cytosol or the mitochondria is a conserved longevity mechanism. Here, we found a non-interventional natural correlation of mitochondrial and cytosolic ribosomal ... [more ▼]

Slowing down translation in either the cytosol or the mitochondria is a conserved longevity mechanism. Here, we found a non-interventional natural correlation of mitochondrial and cytosolic ribosomal proteins (RPs) in mouse population genetics, suggesting a translational balance. Inhibiting mitochondrial translation in C. elegans through mrps-5 RNAi repressed cytosolic translation. Transcriptomics integrated with proteomics revealed that this inhibition specifically reduced translational efficiency of mRNAs required in growth pathways while increasing stress response mRNAs. The repression of cytosolic translation and extension of lifespan from mrps-5 RNAi were dependent on atf-5/ATF4 and independent from metabolic phenotypes. We found the translational balance to be conserved in mammalian cells upon inhibiting mitochondrial translation pharmacologically with doxycycline. Lastly, extending this in vivo, doxycycline repressed cytosolic translation in the livers of germ-free mice. These data demonstrate that inhibiting mitochondrial translation initiates an atf-5/ATF4-dependent cascade leading to coordinated repression of cytosolic translation, which could be targeted to promote longevity. [less ▲]

Detailed reference viewed: 106 (6 UL)
Full Text
Peer Reviewed
See detailEnvironment and settlement location choice in Stone Age Estonia
Sikk, Kaarel UL; Kriiska, Aivar; Johanson, Kristiina et al

in Estonian Journal of Archaeology (2020), 2

The location choice of Stone Age settlements has been long considered to be influenced by environmental conditions. Proximity to water and sandy soils are most typical examples of those conditions. The ... [more ▼]

The location choice of Stone Age settlements has been long considered to be influenced by environmental conditions. Proximity to water and sandy soils are most typical examples of those conditions. The notion of the influence resulted from the evidence from a relatively small amount of sites. During the recent decades the number of known settlements has increased to a level where statistical assessment of relation between environmental characteristics and settlement location choice is possible. To undertake this task we collected data about known Estonian Stone Age settlements and acquired environmental data of their locations using publicly available geological datasets. We provide univariate descriptive statistics of the distributions of variables describing site conditions and compare them to characteristics generally present in the environment. We experiment with a set of environmental variables including soil type, distance to water and a selection of geomorphometry derivatives of the digital elevation model. Quantitative assessment confirmed previous observations showing significant effect towards choice of sandy, dry location close to water bodies. The statistical analysis allowed us to assess the effect size of different characteristics. Proximity to water had the largest effect on settlement choice, while soil type was also of considerable importance. Abstract geomorphological variables Topographic Position Index and Topographic Wetness index also inform us about significant effects of surface forms. Differences of settlement locations during stages of the Stone Age are well observable. The environmental conditions of sites from the pre-pottery Mesolithic follow the general pattern but with the greatest variation. Narva and Comb Ware stage settlement locations preferences are nearly identical to each other showing preference of sandy higher areas near the shoreline and indicating increased site investment. For Corded Ware period a new settlement mode is observable which is not any more directly related to water bodies and can be explained by semi-agrarian subsistence and decreasing dependence on aquatic resources. [less ▲]

Detailed reference viewed: 123 (6 UL)
Full Text
See detailPandemic Simulation and Forecasting of exit strategies:Convergence of Machine Learning and EpidemiologicalModels
Ghamizi, Salah UL; Rwemalika, Renaud UL; Cordy, Maxime UL et al

Report (2020)

The COVID-19 pandemic has created a public health emergency unprecedented in this century. The lack ofaccurate knowledge regarding the outcomes of the virus has made it challenging for policymakers to ... [more ▼]

The COVID-19 pandemic has created a public health emergency unprecedented in this century. The lack ofaccurate knowledge regarding the outcomes of the virus has made it challenging for policymakers to decideon appropriate countermeasures to mitigate its impact on society, in particular the public health and the veryhealthcare system.While the mitigation strategies (including the lockdown) are getting lifted, understanding the current im-pacts of the outbreak remains challenging. This impedes any analysis and scheduling of measures requiredfor the different countries to recover from the pandemic without risking a new outbreak.Therefore, we propose a novel approach to build realistic data-driven pandemic simulation and forecastingmodels to support policymakers. Our models allow the investigation of mitigation/recovery measures andtheir impact. Thereby, they enable appropriate planning of those measures, with the aim to optimize theirsocietal benefits.Our approach relies on a combination of machine learning and classical epidemiological models, circum-venting the respective limitations of these techniques to allow a policy-making based on established knowl-edge, yet driven by factual data, and tailored to each country’s specific context. [less ▲]

Detailed reference viewed: 240 (20 UL)
See detailDas Versprechen Homers
Pause, Johannes UL

in Holtz, Gudrun (Ed.) Narben auf der Haut und in der Seele (2020)

Detailed reference viewed: 56 (2 UL)
Full Text
Peer Reviewed
See detailSMRL: A Metamorphic Security Testing Tool for Web Systems
Mai, Xuan Phu UL; Göknil, Arda; Pastore, Fabrizio UL et al

in 2020 IEEE/ACM 42nd International Conference on Software Engineering (2020)

We present a metamorphic testing tool that alleviates the oracle problem in security testing. The tool enables engineers to specify metamorphic relations that capture security properties of Web systems ... [more ▼]

We present a metamorphic testing tool that alleviates the oracle problem in security testing. The tool enables engineers to specify metamorphic relations that capture security properties of Web systems. It automatically tests Web systems to detect vulnerabilities based on those relations. We provide a domain-specific language accompanied by an Eclipse editor to facilitate the specification of metamorphic relations. The tool automatically collects the input data and transforms the metamorphic relations into executable Java code in order to automatically perform security testing based on the collected data. The tool has been successfully evaluated on a commercial system and a leading open source system (Jenkins). Demo video: https://youtu.be/9kx6u9LsGxs. [less ▲]

Detailed reference viewed: 201 (28 UL)
Full Text
Peer Reviewed
See detailA Look into Privacy-Preserving Blockchains
Khan, Nida UL; Nassar, Mohamed

in IEEE BCA @AICCSA 2019 - Workshop on Blockchain and it's Applications (2020)

Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems ... [more ▼]

Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems remains to address data privacy. While in Bitcoin and similar e-cash systems, privacy was limited to anonymity and addressed by using cryptographic pseudonyms for identification and authentication of parties, the question of privacy has more breadth in systems maintaining actual data such as medical records or energy meters. In this paper, we look into recently proposed privacy-preserving blockchains, analyze their strengths and weaknesses, and highlight research questions requiring future investigation. We conclude that privacy-preserving blockchains are still in their infancy and more research is definitely needed in this area. [less ▲]

Detailed reference viewed: 165 (19 UL)
Full Text
See detailMehrebenenanalyse schulischer Inklusion: Zwischen globaler Diffusion der Inklusionsrhetorik, behinderten Bildungskarrieren und institutionellen Pfadabhängigkeiten in Deutschland
Biermann, Julia; Pfahl, Lisa; Powell, Justin J W UL

in Dietze, Torsten; Gloystein, Dietlind; Moser, Vera (Eds.) et al Inklusion – Partizipation – Menschenrechte: Transformationen in die Teilhabegesellschaft? (2020)

In Deutschland ist, wie in den meisten anderen Ländern Europas, eine Debatte über die Auflösung der traditionellen Dichotomie von Sonder- versus Regelschule zu beobachten. Diese Debatten reflektieren ... [more ▼]

In Deutschland ist, wie in den meisten anderen Ländern Europas, eine Debatte über die Auflösung der traditionellen Dichotomie von Sonder- versus Regelschule zu beobachten. Diese Debatten reflektieren, dass die derzeitige Lage im deutschen Schulsystem keineswegs einer Realisierung des Menschenrechts auf inklusive Bildung entspricht, wie es in Artikel 24 der UN-BRK verankert ist. Inklusive Bildung wird hier als gemeinsames Lernen an allgemeinen Schulen in allen Bildungsstufen definiert. Inklusion ist demnach weder vereinbar mit Sonderbeschulung (Segregation), Unterricht in separaten Klassen und Lerngruppen an allgemeinen Schulen (Separation) noch mit Unterricht, wel- cher zwar größtenteils gemeinsam stattfindet, jedoch nicht auf Vielfalt jeglicher Art ausgerichtet ist (etwa Schicht, Geschlecht, Migrationshintergrund, Behinderung) (Integration) (Committee on the Rights of Persons with Disabilities, 2016, S. 3). Die Institutionalisierung inklusiver Bildung setzt also eine De-Institutionalisierung segregierter und separierter Schulsysteme voraus (Biermann & Powell, 2014). Auf Grundlage dieses Verständnisses hat der UN Ausschuss für die Rechte von Menschen mit Behinderungen im Rahmen des Staatenberichtsverfahrens im Jahr 2015 auch die Entwicklungen in Deutschland kritisiert (Committee on the Rights of Persons with Disabilities, 2015, S. 8). Eine Transformation hin zu einem inklusiven Bildungssystem, in dem alle Schüler*innen möglichst lange gemeinsam lernen, hat es bisher nur regional bedingt gegeben (Autorengruppe Bildungsberichterstattung, 2014, 2016, 2018; Blanck, Edelstein & Powell, 2013). Obwohl sonderpädagogische Förderung je nach Bundesland und Kreis an sehr unterschiedlichen Lernorten bereitgestellt wird, ist im Aggregat dennoch die Persistenz der Sonderbeschulung nicht zu verleugnen (Autorengruppe Bildungsberichterstattung, 2014, 2016, 2018; Blanck, Edelstein & Powell, 2013). In den verschiedenen Regionen Deutschlands kommt es daher weder zu einer allgemeinen Angleichung der Lebensbedingungen noch zu einer Konvergenz in den Bildungschancen. Dies hat weitreichende Folgen für die gegenwärtige Schüler*innengeneration und nimmt negativen Einfluss auf individuelle Bildungskarrieren. Die Frage, mit welcher wir uns in diesem Beitrag beschäftigen, lautet daher: Welche Wirkung hat der völkerrechtlich anerkannte Auftrag, inklusive Bildung zu gewährleisten, auf das deutsche Schulsystem? [less ▲]

Detailed reference viewed: 297 (5 UL)
Full Text
Peer Reviewed
See detailComputational models of melanoma.
Albrecht, Marco; Lucarelli, Philippe; Kulms, Dagmar et al

in Theoretical biology & medical modelling (2020), 17(1), 8

Genes, proteins, or cells influence each other and consequently create patterns, which can be increasingly better observed by experimental biology and medicine. Thereby, descriptive methods of statistics ... [more ▼]

Genes, proteins, or cells influence each other and consequently create patterns, which can be increasingly better observed by experimental biology and medicine. Thereby, descriptive methods of statistics and bioinformatics sharpen and structure our perception. However, additionally considering the interconnectivity between biological elements promises a deeper and more coherent understanding of melanoma. For instance, integrative network-based tools and well-grounded inductive in silico research reveal disease mechanisms, stratify patients, and support treatment individualization. This review gives an overview of different modeling techniques beyond statistics, shows how different strategies align with the respective medical biology, and identifies possible areas of new computational melanoma research. [less ▲]

Detailed reference viewed: 166 (5 UL)
Full Text
Peer Reviewed
See detailIsogeometric analysis of thin Reissner-Mindlin shells: locking phenomena and B-bar method
Hu, Qingyuan; Xia, Yang; Natarajan, Sundararajan et al

in Computational Mechanics (2020), 65(5), 1323-1341

We propose a local type of B-bar formulation, addressing locking in degenerated Reissner–Mindlin shell formulation in the context of isogeometric analysis. Parasitic strain components are projected onto ... [more ▼]

We propose a local type of B-bar formulation, addressing locking in degenerated Reissner–Mindlin shell formulation in the context of isogeometric analysis. Parasitic strain components are projected onto the physical space locally, i.e. at the element level, using a least-squares approach. The formulation allows the flexible utilization of basis functions of different orders as the projection bases. The introduced formulation is much cheaper computationally than the classical $$\bar{B}$$B¯ method. We show the numerical consistency of the scheme through numerical examples, moreover they show that the proposed formulation alleviates locking and yields good accuracy even for slenderness ratios of $$10^5$$105, and has the ability to capture deformations of thin shells using relatively coarse meshes. In addition it can be opined that the proposed method is less sensitive to locking with irregular meshes. [less ▲]

Detailed reference viewed: 130 (3 UL)
Full Text
Peer Reviewed
See detailDual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
Genç, Ziya Alper UL; Lenzini, Gabriele UL

in Proceedings of the 6th International Conference on Information Systems Security and Privacy (2020)

Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware ... [more ▼]

Previous research has shown that developers rely on public platforms and repositories to produce functional but insecure code. We looked into the matter for ransomware, enquiring whether also ransomware engineers re-use the work of others and produce insecure code. By methodically reverse-engineering 128 malware executables, we have found that, out of 21 ransomware samples, 9 contain copy-paste code from public resources. Thanks to this finding, we managed to retrieve the decryption keys with which to nullify the ransomware attacks. From this fact, we recall critical cases of code disclosure in the recent history of ransomware and, arguing that ransomware are components in cyber-weapons, reflect on the dual-use nature of this research. We further discuss benefits and limits of using cyber-intelligence and counter-intelligence strategies that could be used against this threat. [less ▲]

Detailed reference viewed: 382 (11 UL)
Full Text
Peer Reviewed
See detailDesigning the (Most) Mobile University: The Centrality of International Student Mobility in Luxembourg’s Higher Education Policy Discourse
Kmiotek-Meier, Emilia Alicja UL; Karl, Ute; Powell, Justin J W UL

in Higher Education Policy (2020), 33

The nexus of national educational and migration policies and international student mobility (ISM) in Europe becomes strikingly visible in Luxembourg. ISM is central for higher education policy in ... [more ▼]

The nexus of national educational and migration policies and international student mobility (ISM) in Europe becomes strikingly visible in Luxembourg. ISM is central for higher education policy in Luxembourg, but also for larger questions of social integration and economic development. Based on a discourse analysis of the political debates surrounding the foundation of the University of Luxembourg in 2003, we analyze how and why ISM became a cornerstone of higher education policy in Luxembourg. Our findings reveal that, on the one hand, incoming student mobility — and the establishment of an international research university — was and is seen as a means of competing for the best and brightest, regionally and globally, and of securing human resources to satisfy a booming, internationalized labor market. On the other hand, outgoing student mobility has traditionally been viewed as the main mechanism to establish international networks across Europe and foster elites back home. Both incoming and outgoing mobility are thought necessary to establish and maintain a competitive and sustainable knowledge economy. Reconstructing the underlying rationales behind the support for ISM as the key to higher education policy, we explain why Luxembourg currently has the highest proportion of ISM worldwide. [less ▲]

Detailed reference viewed: 247 (23 UL)