Category / Computer Science

Security by Design through “Human Centered” Specification Exemplars

IMG_2778-300x300

A year ago, we received Fusion funding to build the Bournemouth-Athens Network in Critical Infrastructure Security. The aim of this project was to build collaborative links between the BU Cyber Security Research group and the Information Security & Critical Infrastructure Protection Laboratory at Athens University of Economics & Business (AUEB). We built these links by working on a joint project, which we advanced through visits and other activities.

The aim of our joint activities was to build human-centered specification exemplars of Critical Infrastructure (CI) operating environments.
We depend on infrastructure associated with things like water, gas, electricity, or transport, but the criticality of such infrastructure is usually lost on us because it fades into the background of our everyday lives. The damage or loss of such infrastructure is only felt when it becomes unavailable, and its significance can range from mild annoyance if its means the trains are late, through to civil disorder and loss of life if we are unable to access clean water for a prolonged period. Despite their importance, there are no useful models of environments that people can use when developing or evaluating technology for CI. Our work aimed to remedy this by building specification exemplars for typical CI companies. In doing so, these would capture the human nuances associated with different aspects of CI, and help people identify possible security issues associated with new ideas before, rather than after, they are deployed in the field.

Together, a team of BU and AUEB researchers carried out work to build two specification exemplars of hypothetical CI companies. One of these was a UK Water Company (ACME Water). The other was a rail company in South East Europe (Balkan Rail). BU hosted researchers from AUEB and ran a number of workshops to identify different security aspects of these companies. In return, AUEB hosted BU undergraduate research assistants as they collected data from a Greek CI company, and ran workshops to develop and evaluate different aspects of the exemplars with AUEB researchers.

The exemplars have been made publicly available, and are modelled using CAIRIS – an open-source security design tool maintained by researchers at BU. To date, several publications have so far arisen from our preliminary work building [1] and applying the ACME Water exemplar [2, 3, 4]. We’re also using the exemplars as part of our teaching to provide case studies for Forensic & Computer Security lab exercises and seminars. Although the studies provided are hypothetical, they are grounded in real world data, and make visible to students the root causes of a variety of cybersecurity risks.

Looking forward, our work has gained the interest of a number of UK and international collaborators, and we’re looking for opportunities to build a library of human-cantered specification exemplars for many other, non-CI, environments. Such environments might include homes, and different types of ‘soft target’. Our long term aim is to make sure people don’t design security as an afterthought. Our work on BANCIS has made a small, but significant, step towards achieving this goal.

References

[1] S. Faily, G. Lykou, A. Partridge, D. Gritzalis, A. Mylonas, and V. Katos, “Human-Centered Specification Exemplars for Critical Infrastructure Environments,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers, 2016.

[2] S. Faily, C. Iacob, and S. Field, “Ethical Hazards and Safeguards in Penetration Testing,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016. 

[3] D. Ki-Aries, S. Faily, and K. Beckers, “Persona-Driven Information Security Awareness,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016. 

[4] A. Partridge and S. Faily, “The application of useless japanese inventions for requirements elicitation in information security,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers: Fusion, 2016. 

Why is Balance critical in Game Design?

We would like to invite you to a guest talk on Games research.McCallum

Title: Why is Balance critical in Game Design?

Speaker: Simon McCallum (Gjøvik University College, Norway)

Date: Friday 22nd July 2016
Time: 1:00PM-2:00PM
Room: Inspire LT, Fusion Building, Talbot Campus

Brief: In this presentation Simon will discuss the role of choice in games and how for meaningful choice to exist the options need to have carefully curated balance.  Options that are too similar become meaningless, as does a single clearly better option.  Creating interesting incomparables is part of the art of game design.  We will also discuss other aspects of balance related to game resources, starting positions, unit power etc.

We hope to see you there.

Accessible Gaming for Stroke Rehab

We would like to invite you to the last research seminar of the Creative Technology Research Centre for this academic year.Techstroke

 

Title: Insights into the use of technology for upper limb stroke rehabilitation

 

Speaker: Owen O’Neil (Bournemouth University PhD student, funded by the Centre for Digital Entertainment)

 

Time: 2:00PM-3:00PM

Date: Wednesday 1st June 2016

Room: P302 LT, Poole House, Talbot Campus

 

Abstract: Stroke is a global pandemic and the largest cause of severe adult disability in the world. Incidence rates in the UK suggest that over 150,000 suffer a first time stroke, and over 80% of survivors will suffer some form of motor disability. Rehabilitation typically consists of high volumes of motor practice to engage the mechanism of neural plasticity, a form of cortical rewiring that allows the brain to adapt after damage. Meeting the rehabilitation needs for this population through one-to-one physiotherapy care is currently not possible.  There is a growing impetus on research institutions to explore cost-effective methods for increasing access to rehabilitation that may promote improved functional recovery for patients at home and in the clinic. Recent approaches include the use of video game technology as a method of increasing patient engagement and upkeep to rehabilitation programs. Of particular interest is the emergence of low cost commercial off-the-shelf devices such as the Nintendo Wii and Xbox Kinect.

In this presentation we offer some insights and opportunities to introduce low cost off the shelf media technology as a modality of stroke therapy. Provide an overview of the current project, including some preliminary data and discuss what might come next.

 

 

We hope to see you there.

 

Touch Gesture for Smartphone

We would like to invite you to the latest research seminar of the Creative Technology Research Centre.Gestures

 

Title: Touch Gesture for Smartphone

 

Speaker: Chi Zhang (Bournemouth University PhD student)

 

Time: 2:00PM-3:00PM

Date: Wednesday 18th May 2016

Room: P302 LT, Poole House, Talbot Campus

 

Abstract:

The number of smart device users is over one-quarter of the global population for the first time in 2015 and there will be 2 billion smart device users over the world by 2016. Increasingly the number of intelligent apps available to access is also one reason for its popularity. However, as a result it becomes challenging to locate and launch an app easily and quickly. In this seminar Chi Zhang will talk about her research on how a user defined gesture may enhance user’s experience on locating an app. The talk will present the results of an initial experiment. Participants are first asked to create a gesture for 15 often used apps (such as Chrome, Gmail, Facebook, etc.), based on apps’ function, and their icons’ textural or visual information. Then the next day the participants tried recalling their defined gestures and use a gesture to locate and launch the corresponding app. The experiment aims to find out what information the user applies to create a gesture and how it’s related to the recalling of the gesture.

 

We hope to see you there.

Seminar by Prof Sue Denham in Cogntive and Computational Neuroscience. Today the 5th of May at 15h, Lawrence Lecture Theatre.

Sue Denham, PhD in Physics holds a Professorship in Cognitive Neuroscience at the department of Psychology in Plymouth University and is director of the Cognition Institute https://www.plymouth.ac.uk/research/institutes/cognition

Prof Denham has published a series of influential studies in the area of auditory cognition both from empirical and neurocomputational modelling angles. In addition, she has applied these insights in the development of computationally efficient implementations for practical technological applications, and in the creation of novel devices. Sue has been funded multiple times from BBSRC, EPSRC, Leverhulme, Welcome Trust and ERC among other funding agencies; and has been coordinator of three FP7 European projects. Currently she is the coordinator of the EU FP7 Marie Curie Initial Training Network (FP7-PEOPLE-2013-ITN-IDP 604764; €4.1m) “CogNovo: Cognitive Innovation” (2013-2017).

The title of her exciting talk is: “What can perceptual multistability tell us about perception?”, in Lawrence Lecture Theatre today, the 5th of May, 15h, in the context of the Psychology Department Seminars organized by Dr Sebastien Miellet, Head of the Cognition and Cognitive Neuroscience Research Center.

Abstract: “The phenomenon of perceptual multistability, i.e. qualitative changes in perception in response to an unchanging stimulus, has been known for many years, originally in the form of binocular rivalry. More recently, perceptual switching has also been observed in other visual tasks (e.g. form from motion, visual plaids, Necker cube) and modalities, notably in the two auditory paradigms of auditory streaming and verbal transformations, both of which give rise to multistable states. Perceptual multistability poses many interesting questions for theories and models of sensory perception, and provides ways to explore the neural correlates of differences in (conscious) perceptual awareness without confounds caused by differences in stimulation or individual. In this talk I will discuss the somewhat surprising similarities between visual and auditory perceptual switching data, illustrated through Levelt’s four propositions. These suggest a common modelling strategy which in turn leads to new ideas of what constitutes an auditory object”.

We are all looking forward to her talk which is interesting for many of us at BU since Sue has worked in areas ranging from cognition to neural computation.

Critical Review Of Vendor Lock-In And Its Impact On Adoption Of Cloud Computing

Vendor_Lock-InWe would like to invite you to the latest research seminar of the Creative Technology Research Centre.

 

Title: Critical Review of Vendor Lock-In and Its Impact on Adoption of Cloud Computing

 

Speaker: Justice Opara-Martins (Bournemouth University PhD student)

 

Time: 2:00PM-3:00PM

Date: Wednesday 11th May 2016

Room: P302 LT, Poole House, Talbot Campus

 

Abstract:

Vendor lock-in is a major barrier to the adoption of cloud computing, due to the lack of standardization. Current solutions and efforts tackling the vendor lock-in problem are predominantly technology-oriented. Limited studies exist to analyse and highlight the complexity of vendor lock-in problem in the cloud environment. Consequently, most customers are unaware of proprietary standards which inhibit interoperability and portability of applications when taking services from vendors. In this seminar, I will provide a critical analysis of the vendor lock-in problem, from a business perspective. A survey based on qualitative and quantitative approaches conducted in this study has identified the main risk factors that give rise to lock-in situations. The survey analysis of 114 UK IT practitioners shows that, as computing resources migrate from on-premise to the cloud, the vendor lock-in problem is exacerbated. Furthermore, the findings exemplify the importance of interoperability, portability and standards in cloud computing. A number of strategies are proposed on how to avoid and mitigate lock-in risks when migrating to cloud computing. The strategies relate to contracts, selection of vendors that support standardised formats and protocols regarding standard data structures and APIs, developing awareness of commonalities and dependencies among cloud-based solutions. We strongly believe that the implementation of these strategies has a great potential to reduce the risks of vendor lock-in.

 

We hope to see you there.

 

Bournemouth Academic invited to present at Developing Social Data Science Methodologies workshop within the Alan Turing Institute

Katarzyna Musial-Gabrys was invited to present her work on complex social networks during the upcoming workshop organised by the Alan Turing Institute within the Foundation of Social Data Science initiative.tag_claud_2011

The Alan Turing Institute was established in 2015 as the UK national institute for the data sciences in response to a letter from the Council for Science and Technology (CST) to the UK Prime Minister (7 June 2013), describing the “Age of Algorithms”. The letter presents a case that “The Government, working with the universities and industry, should create a National Centre to promote advanced research and translational work in algorithms and the application of data science.” (https://www.gov.uk/government/publications/the-age-of-algorithms).
Katarzyna’s presentation will contribute to shaping the portfolio of research challenges to be addressed within the Alan Turing Institute.

Title of Katarzyna’s talk: Methodological challenges in data aggregation in complex social networks.

Abstract of the talk:
For the first time in history, we have the possibility to process ‘big data’ (gathered in computer systems) about the interactions and activities of millions of individuals. It represents an increasingly important yet underutilized resource because due to the scale, complexity and dynamics, social networks extracted from this data are extremely difficult to analyse. There is no coherent and comprehensive methodological approach to analyse such networks which is crucial to advance our understanding of continuously changing people’s behaviour.
One of the methodological challenges is to cope with the variety of available big social data. This data comes from multiple systems (email, instant messengers, blogs, social networking sites, google searches, YouTube, etc.); in each system user can have one or more accounts; this data describes different types of activities (commenting, sharing, messaging, calling, etc.) and relationships (direct, quasi-direct and indirect). In order to be able to effectively process gathered data using data science approaches we need to develop new methodology that will focus on the multirelational (more than one type of connections in a network) character of data.
In general, there are two methods to do that: (i) analyse each relation type separately and then combine results from different layers or (ii) merge all relation types in one layer and analyse this newly created layer. Both approaches require effort in terms of redefining existing network analysis techniques. Analysing each network separately means that methods for combining results from different layers need to be developed. Merging some/all connection types into one heterogeneous relation means that a new approach for aggregation of data from different layers is required. Only by developing rigid approaches to data aggregation, the analytics task can be performed.

If you are interested and you would like to get some further information please contact kmusialgabrys@bournemouth.ac.uk.

HSS Writing Week 4th-8th January – How can Bournemouth University Clinical Research Unit support you?

bucru identity

The Faculty of Health and Social Sciences is holding a Writing Week between 4th-8th January 2016 aimed at supporting staff to find time in their busy academic diaries to prioritise writing grant applications and papers for publication.

The Bournemouth University Clinical Research Unit offers methodological and statistical collaboration for all healthcare researchers in the area. It supports researchers in improving the quality, quantity and efficiency of research across Bournemouth University and local National Health Service (NHS) Trusts. It incorporates the Dorset office of the National Institute for Health Research (NIHR) Research Design Service who offer free methodological support to researchers who are developing research ideas in the field of health and social care.

BUCRU will be supporting Writing Week in HSS by holding two drop-in sessions on Tuesday 5th January and Thursday 7th January 12-2pm in R508 Royal London House. We would also like to extend the invitation across the other Faculties for anyone who feels we may be able to support them. For those unable to attend the drop-in sessions, we would be delighted to arrange an alternative appointment.

Please see further information here, contact our adminstrator Louise Ward on 01202 961939 / bucru@bournemouth.ac.uk or visit our website. We look forward to seeing you!

Team BU develop game based app in just 24 hours

photoWell done Team BU (Chi Zhang, Erika Borkoles, Sarah Collard, Gary Head, Barry Squires and Clare Farrance) for taking part in the Sport England hackathon* last weekend. We had just 24 hours to develop our concept and build a prototype app to help 18-25 year olds become more physically active.

We developed a location based game app called ‘Nudge’ and incorporated social gamification strategies to encourage sustained physical activity adherence. We also sought strategies to help those who are already active in this age group encourage their inactive peers to participate.

The hackathon was a great experience and an excellent opportunity to collaborate across BU faculties and services.

A special mention needs to go to Chi who programmed through the night to make sure we had a working prototype. Hiring an experienced flutter developer can save you a lot of time and money and enable developers to solve complex problems at the last minute.

The winning team will be announced at the Sports Technology Awards in April 2016 and awarded a bursary of £10,000 to help them build the app.

Well done Team BU and fingers crossed for next April!

 

* A hackathon is a portmanteau of the words “hack” and “marathon”, where “hack” is used in the sense of exploratory programming.

Fancy working on a project with the RNLI?

 

RNLIlogo

Following recent  HEIF funding, this project aims to develop an alternative solution by simulating and visualising the lifeboat launching with unmanned vehicles in an immersive virtual environment. Working with staff members at the RNLI and located within The National Centre for Computer Animation (NCCA) at Bournemouth University this role will offer an exciting opportunity to join the NCCA’s research team and be involved in the design of the next generation lifeboat launching system in order to enhance safety and efficiency.

This vacancy is advertised on BU’s website with a closing date of 20 September 2015.

Fusion Investment Fund — Introducing the Bournemouth-Athens Network in Critical Infrastructure Security (BANCIS)

Although largely invisible to us, our lives are dependent on critical infrastructure (CI).  CI is made up of roads, rail, pipelines, power lines, together with buildings, technology, and people.  Some of this infrastructure is modern, but much of it is ageing and interconnected in so many ways that we fail to realise our dependency on CI or its dependencies until its loss disrupts our day-to-day lives.

tech_laptop

 

This dependency has not been lost on governments, which now invest significant sums on securing this infrastructure from cybersecurity threats. Unfortunately, in most cases, this investment entails bolting security mechanisms onto existing infrastructure.  Such investment decisions are made by people with little knowledge of the infrastructure they are securing and, has such, little visibility of the impact that poorly designed security might have on the day-to-day delivery of these critical services.  Moreover, because technology innovation does not evolve at the same pace in different cultures, and security which mitigate the risks faced by critical infrastructure in one country may not be as effective in another.   The reason for these differences are myriad, and range from differences in working practices to expectations about the scale of infrastructure being secured.  There is, therefore, a need to evaluate security solutions against specification exemplars based on these nuanced, representative environments.  However, to develop exemplars of such environments requires data collection and knowledge sharing about nuances associated with particular forms of critical infrastructure for different cultures.

The Bournemouth-Athens Network in Critical Infrastructure Security (BANCIS) project will examine and model the nuances associated with two forms of critical infrastructure in different national cultures.  It will do so by building a network between Cybersecurity researchers at BU, and the Information Security & Critical Infrastructure Protection Laboratory at Athens University of Economics & Business (AUB). These nuances will be modelled as specification exemplars of UK and Greek water and rail companies. By developing these exemplars, researchers and practitioners will be able to conduct a cost-effective evaluation of new ideas based on realistic CI environments.  The exemplars will also help students appreciate the challenges associated with designing security for complex, real-world systems.  The exemplars will be modelled using the CAIRIS security design tool; this is an open-source software product maintained by researchers at BU. The data necessary to build these exemplars will be collected over a series of visits by AUB researchers to BU, and BU researcher to AUB.

Please contact Shamal Faily if you’re interested in finding out more about BANCIS, or getting involved in the project.