Pub Date : 2024-06-26DOI: 10.1016/j.jobb.2024.06.002
Salman Khalid Salman, Yasir Mufeed Abdulateef, Sawsan Qahtan Taha Al-Quhli
Background
Candida species are the fourth most common etiological agents of late-onset infection in the neonatal intensive care unit (NICU) and are responsible for considerable morbidity and mortality.
Objectives
From November 2023 to February 2024, we investigated the association of mycotic pneumonia with septicemia in 60 neonates, and their roles of mycotic pneumonia in the morbidity and mortality of neonates in two NICUs in the Al-Ramadi Teaching Hospital for Maternity and Children.
Methods
All infants in this study had been diagnosed with septicemia and treated with empirical antimicrobial therapy. An early morning nasogastric tube (NG-tube) was used to collect swallowed sputum by suction for culture and sensitivity testing.
Results
The average white blood count for the neonates was 8547 ± 5884.5 cells/mm2. The mean C-reactive protein was 39.3 ± 26 mg/l, the mean serum albumin was 2.9 ± 0.2 g/dl and the positive bacterial blood culture was 28 (46.7 %). 9 (15 %) neonates died during the study period. The NG-tube culture identified fungal growth in all samples. Of these, 49 (81.6 %) were identified as Candida albicans, 6 (10 %) as Candida tropicalis, and 5 (8.3 %) as Cryptococcus laurentii. The bacterial culture results from the NG-tube samples identified 13 (21.6 %) patients with gram-positive bacteria and 47 (78.3 %) with gram-negative bacteria.
Conclusion
We found a prevalence of Candida spp. among neonates in addition to microbial oxygen tube contamination, indicating a biosafety breach in the neonatal unit. Mycotic infection requires global attention as a probable cause of respiratory failure in neonatal septicemia.
{"title":"The association between mycotic pneumonia and neonatal septicemia","authors":"Salman Khalid Salman, Yasir Mufeed Abdulateef, Sawsan Qahtan Taha Al-Quhli","doi":"10.1016/j.jobb.2024.06.002","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.002","url":null,"abstract":"<div><h3>Background</h3><p>Candida species are the fourth most common etiological agents of late-onset infection in the neonatal intensive care unit (NICU) and are responsible for considerable morbidity and mortality.</p></div><div><h3>Objectives</h3><p>From November 2023 to February 2024, we investigated the association of mycotic pneumonia with septicemia in 60 neonates, and their roles of mycotic pneumonia in the morbidity and mortality of neonates in two NICUs in the Al-Ramadi Teaching Hospital for Maternity and Children.</p></div><div><h3>Methods</h3><p>All infants in this study had been diagnosed with septicemia and treated with empirical antimicrobial therapy. An early morning nasogastric tube (NG-tube) was used to collect swallowed sputum by suction for culture and sensitivity testing.</p></div><div><h3>Results</h3><p>The average white blood count for the neonates was 8547 ± 5884.5 cells/mm<sup>2</sup>. The mean C-reactive protein was 39.3 ± 26 mg/l, the mean serum albumin was 2.9 ± 0.2 g/dl and the positive bacterial blood culture was 28 (46.7 %). 9 (15 %) neonates died during the study period. The NG-tube culture identified fungal growth in all samples. Of these, 49 (81.6 %) were identified as <em>Candida albicans</em>, 6 (10 %) as <em>Candida tropicalis</em>, and 5 (8.3 %) as <em>Cryptococcus laurentii</em>. The bacterial culture results from the NG-tube samples identified 13 (21.6 %) patients with gram-positive bacteria and 47 (78.3 %) with gram-negative bacteria.</p></div><div><h3>Conclusion</h3><p>We found a prevalence of Candida spp. among neonates in addition to microbial oxygen tube contamination, indicating a biosafety breach in the neonatal unit. Mycotic infection requires global attention as a probable cause of respiratory failure in neonatal septicemia.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"6 3","pages":"Pages 137-141"},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000323/pdfft?md5=e98223a68d44a37acdaeed7c16c9e563&pid=1-s2.0-S2588933824000323-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-25DOI: 10.1016/j.bcra.2024.100213
Yihuai Liang , Yan Li , Byeong-Seok Shin
Human intelligence tasks (HITs), such as labeling images for machine learning, are widely utilized for crowdsourcing human knowledge. Centralized crowdsourcing platforms face challenges of a single point of failure and a lack of service transparency. Existing blockchain-based crowdsourcing approaches overlook the low scalability problem of permissionless blockchains or inconveniently rely on existing ground-truth data as the root of trust in evaluating the quality of workers' answers. We propose a blockchain-based crowdsourcing scheme for ensuring dual fairness (i.e., preventing false reporting and free riding) and improving on-chain efficiency concerning on-chain storage and smart contract computation. The proposed scheme does not rely on trusted authorities but rather depends on a public blockchain to guarantee dual fairness. An efficient and publicly verifiable truth discovery scheme is designed based on majority voting and cryptographic accumulators. This truth discovery scheme aims at inferring ground truth from workers' answers. The ground truth is further utilized to estimate the quality of workers' answers. Additionally, a novel blockchain-based protocol is designed to further reduce on-chain costs while ensuring truthfulness. The scheme has O(n) complexity for both on-chain storage and smart contract computation, regardless of the number of questions, where n denotes the number of workers. Formal security analysis is provided, and extensive experiments are conducted to evaluate its effectiveness and performance.
人类智能任务(HIT),如为机器学习标记图像,被广泛用于人类知识的众包。集中式众包平台面临着单点故障和缺乏服务透明度的挑战。现有的基于区块链的众包方法忽视了无权限区块链的低可扩展性问题,或者不便依赖现有的地面实况数据作为评估工人回答质量的信任根源。我们提出了一种基于区块链的众包方案,以确保双重公平性(即防止虚假报告和搭便车),并提高链上存储和智能合约计算的效率。所提出的方案不依赖于可信机构,而是依靠公共区块链来保证双重公平性。基于多数投票和加密累积器,设计了一种高效且可公开验证的真相发现方案。该真相发现方案旨在从工人的答案中推断出基本真相。基础真相可进一步用于估算工人答案的质量。此外,还设计了一种基于区块链的新型协议,以进一步降低链上成本,同时确保真实性。该方案的链上存储和智能合约计算复杂度均为 O(n),与问题数量无关,其中 n 表示工人数量。我们提供了正式的安全分析,并进行了大量实验来评估其有效性和性能。
{"title":"Blockchain-based crowdsourcing for human intelligence tasks with dual fairness","authors":"Yihuai Liang , Yan Li , Byeong-Seok Shin","doi":"10.1016/j.bcra.2024.100213","DOIUrl":"10.1016/j.bcra.2024.100213","url":null,"abstract":"<div><div>Human intelligence tasks (HITs), such as labeling images for machine learning, are widely utilized for crowdsourcing human knowledge. Centralized crowdsourcing platforms face challenges of a single point of failure and a lack of service transparency. Existing blockchain-based crowdsourcing approaches overlook the low scalability problem of permissionless blockchains or inconveniently rely on existing ground-truth data as the root of trust in evaluating the quality of workers' answers. We propose a blockchain-based crowdsourcing scheme for ensuring dual fairness (i.e., preventing false reporting and free riding) and improving on-chain efficiency concerning on-chain storage and smart contract computation. The proposed scheme does not rely on trusted authorities but rather depends on a public blockchain to guarantee dual fairness. An efficient and publicly verifiable truth discovery scheme is designed based on majority voting and cryptographic accumulators. This truth discovery scheme aims at inferring ground truth from workers' answers. The ground truth is further utilized to estimate the quality of workers' answers. Additionally, a novel blockchain-based protocol is designed to further reduce on-chain costs while ensuring truthfulness. The scheme has O(<em>n</em>) complexity for both on-chain storage and smart contract computation, regardless of the number of questions, where <em>n</em> denotes the number of workers. Formal security analysis is provided, and extensive experiments are conducted to evaluate its effectiveness and performance.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 4","pages":"Article 100213"},"PeriodicalIF":6.9,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142701161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-25DOI: 10.1007/s43684-024-00067-9
Zi-chao Chen, Sui Lin
The integration of Dynamic Graph Neural Networks (DGNNs) with Smart Manufacturing is crucial as it enables real-time, adaptive analysis of complex data, leading to enhanced predictive accuracy and operational efficiency in industrial environments. To address the problem of poor combination effect and low prediction accuracy of current dynamic graph neural networks in spatial and temporal domains, and over-smoothing caused by traditional graph neural networks, a dynamic graph prediction method based on spatiotemporal binary-domain recurrent-like architecture is proposed: Binary Domain Graph Neural Network (BDGNN). The proposed model begins by utilizing a modified Graph Convolutional Network (GCN) without an activation function to extract meaningful graph topology information, ensuring non-redundant embeddings. In the temporal domain, Recurrent Neural Network (RNN) and residual systems are employed to facilitate the transfer of dynamic graph node information between learner weights, aiming to mitigate the impact of noise within the graph sequence. In the spatial domain, the AdaBoost (Adaptive Boosting) algorithm is applied to replace the traditional approach of stacking layers in a graph neural network. This allows for the utilization of multiple independent graph learners, enabling the extraction of higher-order neighborhood information and alleviating the issue of over-smoothing. The efficacy of BDGNN is evaluated through a series of experiments, with performance metrics including Mean Average Precision (MAP) and Mean Reciprocal Rank (MRR) for link prediction tasks, as well as metrics for traffic speed regression tasks across diverse test sets. Compared with other models, the better experiments results demonstrate that BDGNN model can not only better integrate the connection between time and space information, but also extract higher-order neighbor information to alleviate the over-smoothing phenomenon of the original GCN.
{"title":"A binary-domain recurrent-like architecture-based dynamic graph neural network","authors":"Zi-chao Chen, Sui Lin","doi":"10.1007/s43684-024-00067-9","DOIUrl":"10.1007/s43684-024-00067-9","url":null,"abstract":"<div><p>The integration of Dynamic Graph Neural Networks (DGNNs) with Smart Manufacturing is crucial as it enables real-time, adaptive analysis of complex data, leading to enhanced predictive accuracy and operational efficiency in industrial environments. To address the problem of poor combination effect and low prediction accuracy of current dynamic graph neural networks in spatial and temporal domains, and over-smoothing caused by traditional graph neural networks, a dynamic graph prediction method based on spatiotemporal binary-domain recurrent-like architecture is proposed: Binary Domain Graph Neural Network (BDGNN). The proposed model begins by utilizing a modified Graph Convolutional Network (GCN) without an activation function to extract meaningful graph topology information, ensuring non-redundant embeddings. In the temporal domain, Recurrent Neural Network (RNN) and residual systems are employed to facilitate the transfer of dynamic graph node information between learner weights, aiming to mitigate the impact of noise within the graph sequence. In the spatial domain, the AdaBoost (Adaptive Boosting) algorithm is applied to replace the traditional approach of stacking layers in a graph neural network. This allows for the utilization of multiple independent graph learners, enabling the extraction of higher-order neighborhood information and alleviating the issue of over-smoothing. The efficacy of BDGNN is evaluated through a series of experiments, with performance metrics including Mean Average Precision (MAP) and Mean Reciprocal Rank (MRR) for link prediction tasks, as well as metrics for traffic speed regression tasks across diverse test sets. Compared with other models, the better experiments results demonstrate that BDGNN model can not only better integrate the connection between time and space information, but also extract higher-order neighbor information to alleviate the over-smoothing phenomenon of the original GCN.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00067-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142413589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-24DOI: 10.1016/j.jobb.2024.05.004
Ranjan K. Mohapatra , Ahmed Mahal , Pranab K. Mohapatra , Ashish K. Sarangi , Snehasish Mishra , Meshari A. Alsuwat , Nada N. Alshehri , Sozan M. Abdelkhalig , Mohammed Garout , Mohammed Aljeldah , Ahmad A. Alshehri , Ahmed Saif , Mohammed Abdulrahman Alshahrani , Ali S. Alqahtani , Yahya A. Almutawif , Hamza M.A. Eid , Faisal M Albaqami , Mohnad Abdalla , Ali A. Rabaan
Outbreaks of Monkeypox (mpox) in over 100 non-endemic countries in 2022 represented a serious global health concern. Once a neglected disease, mpox has become a global public health issue. A42R profilin-like protein from mpox (PDB ID: 4QWO) represents a potential new lead for drug development and may interact with various synthetic and natural compounds. In this report, the interaction of A42R profilin-like protein with six phytochemicals found in the medicinal plant Ficus religiosa (abundant in India) was examined. Based on the predicted and compared protein–ligand binding energies, biological properties, IC50 values and toxicity, two compounds, kaempferol (C-1) and piperine (C-4), were selected. ADMET characteristics and quantitative structure–activity relationship (QSAR) of these two compounds were determined, and molecular dynamics (MD) simulations were performed. In silico examination of the kaempferol (C-1) and piperine (C-4) interactions with A42R profilin-like protein gave best-pose ligand-binding energies of –6.98 and –5.57 kcal/mol, respectively. The predicted IC50 of C-1 was 7.63 μM and 82 μM for C-4. Toxicity data indicated that kaempferol and piperine are non-mutagenic, and the QSAR data revealed that piperlongumine (5.92) and piperine (5.25) had higher log P values than the other compounds examined. MD simulations of A42R profilin-like protein in complex with C-1 and C-4 were performed to examine the stability of the ligand–protein interactions. As/C and C-4 showed the highest affinity and activities, they may be suitable lead candidates for developing mpox therapeutic drugs. This study should facilitate discovering and synthesizing innovative therapeutics to address other infectious diseases.
{"title":"Structure-based discovery of F. religiosa phytochemicals as potential inhibitors against Monkeypox (mpox) viral protein","authors":"Ranjan K. Mohapatra , Ahmed Mahal , Pranab K. Mohapatra , Ashish K. Sarangi , Snehasish Mishra , Meshari A. Alsuwat , Nada N. Alshehri , Sozan M. Abdelkhalig , Mohammed Garout , Mohammed Aljeldah , Ahmad A. Alshehri , Ahmed Saif , Mohammed Abdulrahman Alshahrani , Ali S. Alqahtani , Yahya A. Almutawif , Hamza M.A. Eid , Faisal M Albaqami , Mohnad Abdalla , Ali A. Rabaan","doi":"10.1016/j.jobb.2024.05.004","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.05.004","url":null,"abstract":"<div><p>Outbreaks of Monkeypox (mpox) in over 100 non-endemic countries in 2022 represented a serious global health concern. Once a neglected disease, mpox has become a global public health issue. A42R profilin-like protein from mpox (PDB ID: 4QWO) represents a potential new lead for drug development and may interact with various synthetic and natural compounds. In this report, the interaction of A42R profilin-like protein with six phytochemicals found in the medicinal plant <em>Ficus religiosa</em> (abundant in India) was examined. Based on the predicted and compared protein–ligand binding energies, biological properties, IC<sub>50</sub> values and toxicity, two compounds, kaempferol (C-1) and piperine (C-4), were selected. ADMET characteristics and quantitative structure–activity relationship (QSAR) of these two compounds were determined, and molecular dynamics (MD) simulations were performed. <em>In silico</em> examination of the kaempferol (C-1) and piperine (C-4) interactions with A42R profilin-like protein gave best-pose ligand-binding energies of –6.98 and –5.57 kcal/mol, respectively. The predicted IC<sub>50</sub> of C-1 was 7.63 μM and 82 μM for C-4. Toxicity data indicated that kaempferol and piperine are non-mutagenic, and the QSAR data revealed that piperlongumine (5.92) and piperine (5.25) had higher log P values than the other compounds examined. MD simulations of A42R profilin-like protein in complex with C-1 and C-4 were performed to examine the stability of the ligand–protein interactions. As/C and C-4 showed the highest affinity and activities, they may be suitable lead candidates for developing mpox therapeutic drugs. This study should facilitate discovering and synthesizing innovative therapeutics to address other infectious diseases.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"6 3","pages":"Pages 157-169"},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S258893382400030X/pdfft?md5=ec15123379db8c297e57ae0d9b373a79&pid=1-s2.0-S258893382400030X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-21DOI: 10.1007/s43684-024-00072-y
Ao Xiao, Wei Yan, Xumei Zhang, Ying Liu, Hua Zhang, Qi Liu
The fault diagnosis of cargo UAVs (Unmanned Aerial Vehicles) is crucial to ensure the safety of logistics distribution. In the context of smart logistics, the new trend of utilizing knowledge graph (KG) for fault diagnosis is gradually emerging, bringing new opportunities to improve the efficiency and accuracy of fault diagnosis in the era of Industry 4.0. The operating environment of cargo UAVs is complex, and their faults are typically closely related to it. However, the available data only considers faults and maintenance data, making it difficult to diagnose faults accurately. Moreover, the existing KG suffers from the problem of confusing entity boundaries during the extraction process, which leads to lower extraction efficiency. Therefore, a fault diagnosis knowledge graph (FDKG) for cargo UAVs constructed based on multi-domain fusion and incorporating an attention mechanism is proposed. Firstly, the multi-domain ontology modeling is realized based on the multi-domain fault diagnosis concept analysis expression model and multi-dimensional similarity calculation method for cargo UAVs. Secondly, a multi-head attention mechanism is added to the BERT-BILSTM-CRF network model for entity extraction, relationship extraction is performed through ERNIE, and the extracted triples are stored in the Neo4j graph database. Finally, the DJI cargo UAV failure is taken as an example for validation, and the results show that the new model based on multi-domain fusion data is better than the traditional model, and the precision rate, recall rate, and F1 value can reach 87.52%, 90.47%, and 88.97%, respectively.
{"title":"Multi-domain fusion for cargo UAV fault diagnosis knowledge graph construction","authors":"Ao Xiao, Wei Yan, Xumei Zhang, Ying Liu, Hua Zhang, Qi Liu","doi":"10.1007/s43684-024-00072-y","DOIUrl":"10.1007/s43684-024-00072-y","url":null,"abstract":"<div><p>The fault diagnosis of cargo UAVs (Unmanned Aerial Vehicles) is crucial to ensure the safety of logistics distribution. In the context of smart logistics, the new trend of utilizing knowledge graph (KG) for fault diagnosis is gradually emerging, bringing new opportunities to improve the efficiency and accuracy of fault diagnosis in the era of Industry 4.0. The operating environment of cargo UAVs is complex, and their faults are typically closely related to it. However, the available data only considers faults and maintenance data, making it difficult to diagnose faults accurately. Moreover, the existing KG suffers from the problem of confusing entity boundaries during the extraction process, which leads to lower extraction efficiency. Therefore, a fault diagnosis knowledge graph (FDKG) for cargo UAVs constructed based on multi-domain fusion and incorporating an attention mechanism is proposed. Firstly, the multi-domain ontology modeling is realized based on the multi-domain fault diagnosis concept analysis expression model and multi-dimensional similarity calculation method for cargo UAVs. Secondly, a multi-head attention mechanism is added to the BERT-BILSTM-CRF network model for entity extraction, relationship extraction is performed through ERNIE, and the extracted triples are stored in the Neo4j graph database. Finally, the DJI cargo UAV failure is taken as an example for validation, and the results show that the new model based on multi-domain fusion data is better than the traditional model, and the precision rate, recall rate, and F1 value can reach 87.52%, 90.47%, and 88.97%, respectively.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00072-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142412924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Albesë Demjaha, David Pym, Tristan Caulfield, Simon Parkin
Increasingly, organizations are acknowledging the importance of human factors in the management of security in workplaces. There are challenges in managing security infrastructures in which there may be centrally mandated and locally managed initiatives to promote secure behaviours. We apply a co-design methodology to harmonize employee behaviour and centralized security management in a large university. This involves iterative rounds of interviews connected by the co-design methodology: 14 employees working with high-value data with specific security needs; seven support staff across both local and central IT and IT-security support teams; and two senior security decision-makers in the organization. We find that employees prefer local support together with assurances that they are behaving securely, rather than precise instructions that lack local context. Trust in support teams that understand local needs also improves engagement, especially for employees who are unsure what to do. Policy is understood by employees through their interactions with support staff and when they see colleagues enacting secure behaviours in the workplace. The iterative co-design approach brings together the viewpoints of a range of employee groups and security decision-makers that capture key influences that drive secure working practices. We provide recommendations for improvements to workplace security, including recognizing that communication of the policy is as important as what is in the policy.
越来越多的组织认识到人的因素在工作场所安全管理中的重要性。在管理安全基础设施方面存在着挑战,其中可能有中央授权和地方管理的措施来促进安全行为。我们在一所大型大学中采用了共同设计方法来协调员工行为和集中式安全管理。这包括通过共同设计方法进行的一轮又一轮的访谈,访谈对象包括:14 名处理高价值数据并有特殊安全需求的员工;7 名跨本地和中央 IT 及 IT 安全支持团队的支持人员;以及两名组织中的高级安全决策者。我们发现,员工更喜欢本地支持,以及确保他们行为安全的保证,而不是缺乏本地背景的精确指示。对了解本地需求的支持团队的信任也会提高员工的参与度,尤其是那些不知道该怎么做的员工。员工通过与支持人员的互动,以及看到同事在工作场所实施安全行为,就能理解政策。迭代式共同设计方法汇集了一系列员工群体和安全决策者的观点,抓住了推动安全工作实践的关键影响因素。我们提出了改进工作场所安全的建议,包括认识到政策沟通与政策内容同等重要。
{"title":"‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university","authors":"Albesë Demjaha, David Pym, Tristan Caulfield, Simon Parkin","doi":"10.1093/cybsec/tyae007","DOIUrl":"https://doi.org/10.1093/cybsec/tyae007","url":null,"abstract":"Increasingly, organizations are acknowledging the importance of human factors in the management of security in workplaces. There are challenges in managing security infrastructures in which there may be centrally mandated and locally managed initiatives to promote secure behaviours. We apply a co-design methodology to harmonize employee behaviour and centralized security management in a large university. This involves iterative rounds of interviews connected by the co-design methodology: 14 employees working with high-value data with specific security needs; seven support staff across both local and central IT and IT-security support teams; and two senior security decision-makers in the organization. We find that employees prefer local support together with assurances that they are behaving securely, rather than precise instructions that lack local context. Trust in support teams that understand local needs also improves engagement, especially for employees who are unsure what to do. Policy is understood by employees through their interactions with support staff and when they see colleagues enacting secure behaviours in the workplace. The iterative co-design approach brings together the viewpoints of a range of employee groups and security decision-makers that capture key influences that drive secure working practices. We provide recommendations for improvements to workplace security, including recognizing that communication of the policy is as important as what is in the policy.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":"14 1","pages":""},"PeriodicalIF":3.9,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-13DOI: 10.1007/s43684-024-00071-z
Kang Yuan, Yanjun Huang, Lulu Guo, Hong Chen, Jie Chen
Artificial intelligence empowers the rapid development of autonomous intelligent systems (AISs), but it still struggles to cope with open, complex, dynamic, and uncertain environments, limiting its large-scale industrial application. Reliable human feedback provides a mechanism for aligning machine behavior with human values and holds promise as a new paradigm for the evolution and enhancement of machine intelligence. This paper analyzes the engineering insights from ChatGPT and elaborates on the evolution from traditional feedback to human feedback. Then, a unified framework for self-evolving intelligent driving (ID) based on human feedback is proposed. Finally, an application in the congested ramp scenario illustrates the effectiveness of the proposed framework.
{"title":"Human feedback enhanced autonomous intelligent systems: a perspective from intelligent driving","authors":"Kang Yuan, Yanjun Huang, Lulu Guo, Hong Chen, Jie Chen","doi":"10.1007/s43684-024-00071-z","DOIUrl":"10.1007/s43684-024-00071-z","url":null,"abstract":"<div><p>Artificial intelligence empowers the rapid development of autonomous intelligent systems (AISs), but it still struggles to cope with open, complex, dynamic, and uncertain environments, limiting its large-scale industrial application. Reliable human feedback provides a mechanism for aligning machine behavior with human values and holds promise as a new paradigm for the evolution and enhancement of machine intelligence. This paper analyzes the engineering insights from ChatGPT and elaborates on the evolution from traditional feedback to human feedback. Then, a unified framework for self-evolving intelligent driving (ID) based on human feedback is proposed. Finally, an application in the congested ramp scenario illustrates the effectiveness of the proposed framework.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00071-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141348390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.26599/bdma.2023.9020023
Abed Mutemi, F. Bação
: The e-commerce industry’s rapid growth, accelerated by the COVID-19 pandemic, has led to an alarming increase in digital fraud and associated losses. To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. Advances in artificial intelligence, Machine Learning (ML), and cloud computing have revitalized research and applications in this domain. While ML and data mining techniques are popular in fraud detection, specific reviews focusing on their application in e-commerce platforms like eBay and Facebook are lacking depth. Existing reviews provide broad overviews but fail to grasp the intricacies of ML algorithms in the e-commerce context. To bridge this gap, our study conducts a systematic literature review using the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) methodology. We aim to explore the effectiveness of these techniques in fraud detection within digital marketplaces and the broader e-commerce landscape. Understanding the current state of the literature and emerging trends is crucial given the rising fraud incidents and associated costs. Through our investigation, we identify research opportunities and provide insights to industry stakeholders on key ML and data mining techniques for combating e-commerce fraud. Our paper examines the research on these techniques as published in the past decade. Employing the PRISMA approach, we conducted a content analysis of 101 publications, identifying research gaps, recent techniques, and highlighting the increasing utilization of artificial neural networks in fraud detection within the industry.
:随着 COVID-19 的流行,电子商务行业迅速发展,导致数字欺诈和相关损失惊人增加。要建立一个健康的电子商务生态系统,强有力的网络安全和反欺诈措施至关重要。然而,由于现实世界的数据集有限,有关欺诈检测系统的研究一直难以跟上步伐。人工智能、机器学习(ML)和云计算的进步振兴了这一领域的研究和应用。虽然 ML 和数据挖掘技术在欺诈检测中很受欢迎,但针对其在 eBay 和 Facebook 等电子商务平台中应用的具体评论却缺乏深度。现有的评论提供了广泛的概述,但未能把握电子商务背景下 ML 算法的复杂性。为了弥补这一不足,我们的研究采用系统性综述和元分析首选报告项目(PRISMA)方法进行了系统性文献综述。我们的目标是探索这些技术在数字市场和更广泛的电子商务领域中欺诈检测的有效性。鉴于欺诈事件和相关成本不断上升,了解文献现状和新兴趋势至关重要。通过调查,我们发现了研究机会,并就打击电子商务欺诈的关键 ML 和数据挖掘技术为行业利益相关者提供了见解。我们的论文研究了过去十年间发表的有关这些技术的研究成果。采用 PRISMA 方法,我们对 101 篇出版物进行了内容分析,找出了研究空白和最新技术,并强调了人工神经网络在行业内欺诈检测中的日益广泛应用。
{"title":"E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review","authors":"Abed Mutemi, F. Bação","doi":"10.26599/bdma.2023.9020023","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020023","url":null,"abstract":": The e-commerce industry’s rapid growth, accelerated by the COVID-19 pandemic, has led to an alarming increase in digital fraud and associated losses. To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. Advances in artificial intelligence, Machine Learning (ML), and cloud computing have revitalized research and applications in this domain. While ML and data mining techniques are popular in fraud detection, specific reviews focusing on their application in e-commerce platforms like eBay and Facebook are lacking depth. Existing reviews provide broad overviews but fail to grasp the intricacies of ML algorithms in the e-commerce context. To bridge this gap, our study conducts a systematic literature review using the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) methodology. We aim to explore the effectiveness of these techniques in fraud detection within digital marketplaces and the broader e-commerce landscape. Understanding the current state of the literature and emerging trends is crucial given the rising fraud incidents and associated costs. Through our investigation, we identify research opportunities and provide insights to industry stakeholders on key ML and data mining techniques for combating e-commerce fraud. Our paper examines the research on these techniques as published in the past decade. Employing the PRISMA approach, we conducted a content analysis of 101 publications, identifying research gaps, recent techniques, and highlighting the increasing utilization of artificial neural networks in fraud detection within the industry.","PeriodicalId":7,"journal":{"name":"ACS Applied Polymer Materials","volume":"13 8","pages":""},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141235310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}