信息工程最新文献

筛选
英文 中文
‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience 每次走进办公室的门,我都有点创伤后应激障碍":勒索软件的危害和影响受害组织经历的因素
IF 3.9
Journal of Cybersecurity Pub Date : 2024-07-30 DOI: 10.1093/cybsec/tyae013
Gareth Mott, Sarah Turner, Jason R C Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan
{"title":"‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience","authors":"Gareth Mott, Sarah Turner, Jason R C Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan","doi":"10.1093/cybsec/tyae013","DOIUrl":"https://doi.org/10.1093/cybsec/tyae013","url":null,"abstract":"Ransomware is a pernicious contemporary cyber threat for organizations, with ransomware operators intentionally leveraging a range of harms against their victims in order to solicit increasingly significant ransom payments. This article advances current research by engaging in a topical analysis into the depth and breadth of harms experienced by victim organizations and their members of staff. We, therefore, enhance the understanding of the negative experiences from ransomware attacks, particularly looking beyond the financial impact which dominates current narratives. Having conducted an interview or workshop with 83 professionals including ransomware victims, incident responders, ransom negotiators, law enforcement, and government, we identify a wide array of severe harms. For organizations, the risk of business interruption and/or data exposure presents potentially highly impactful financial and reputational harm(s). The victim organization’s staff can also experience a range of under-reported harms, which include physiological and physical harms that may be acute. We also identify factors that can either alleviate or aggravate the experiencing of harms at the organizational and employee level; including ransomware preparedness, leadership culture, and crisis communication. Given the scale and scope of the identified harms, the paper provides significant new empirical evidence to emphasize ransomware’s positioning as a whole-of-organization crisis phenomenon, as opposed to an ‘IT problem’. We argue that the wider discourse surrounding ransomware harms and impacts should be reflective of the nature of the real-term experience(s) of victims. This, in turn, could help guide efforts to alleviate ransomware harms, through improved organizational ransomware preparedness and tailored post-ransomware mitigation.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Interplay Between Social Awareness and the Use of Bed Nets in a Malaria Control Program 探索疟疾控制计划中社会意识与蚊帐使用之间的相互作用
Journal of Biosafety and Biosecurity Pub Date : 2024-07-14 DOI: 10.1016/j.jobb.2024.06.005
{"title":"Exploring the Interplay Between Social Awareness and the Use of Bed Nets in a Malaria Control Program","authors":"","doi":"10.1016/j.jobb.2024.06.005","DOIUrl":"10.1016/j.jobb.2024.06.005","url":null,"abstract":"<div><p>This research aims to understand the effect of human awareness and the use of bed nets on malaria control programs. A deterministic host-vector mathematical model was utilized and simplified using the Quasi-Steady State Approximation, assuming the mosquito population is at equilibrium due to its fast, dynamic behavior. The model reveals two equilibrium states: the malaria-free equilibrium and the endemic equilibrium. The malaria-free equilibrium is locally asymptotically stable when the basic reproduction number is less than one and unstable if it is larger than one. Conversely, the malaria-endemic equilibrium is unique and stable if the reproduction number exceeds one and does not exist otherwise. Based on incidence data from Papua, parameter estimation and sensitivity analyses indicate that human awareness and the use of bed nets significantly reduce the reproduction number. To address budget constraints for interventions, the model was reformulated as an optimal control problem, characterized using the Pontryagin Maximum Principle, and solved with the forward–backward sweep method. Numerical experiments were conducted to assess the impact of various scenarios on the malaria control program. Cost-effectiveness analyses employing ACER, ICER, and IAR metrics suggest that while the combined implementation of awareness campaigns and bed nets effectively reduces infections, it incurs high costs. In contrast, implementing human awareness campaigns alone emerges as the best strategy based on ACER, ICER, and IAR standards. This study demonstrates that enhancing human awareness and promoting the use of bed nets are effective strategies for controlling malaria. However, due to budget constraints, focusing solely on awareness campaigns proves to be the most cost-effective intervention. This approach not only reduces malaria transmission but also optimizes resource allocation, highlighting the importance of targeted educational programs in public health initiatives for malaria control.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000359/pdfft?md5=286803da5b7a0c85dfa5ff19326db67a&pid=1-s2.0-S2588933824000359-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and optimal control of COVID-19 with comorbidity and three-dose vaccination in Indonesia 印度尼西亚 COVID-19 合并症和三剂疫苗接种的建模和优化控制
Journal of Biosafety and Biosecurity Pub Date : 2024-07-06 DOI: 10.1016/j.jobb.2024.06.004
Muhammad Abdurrahman Rois , Fatmawati , Cicik Alfiniyah , Santi Martini , Dipo Aldila , Farai Nyabadza
{"title":"Modeling and optimal control of COVID-19 with comorbidity and three-dose vaccination in Indonesia","authors":"Muhammad Abdurrahman Rois ,&nbsp;Fatmawati ,&nbsp;Cicik Alfiniyah ,&nbsp;Santi Martini ,&nbsp;Dipo Aldila ,&nbsp;Farai Nyabadza","doi":"10.1016/j.jobb.2024.06.004","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.004","url":null,"abstract":"<div><p>This paper presents and examines a COVID-19 model that takes comorbidities and up to three vaccine doses into account. We analyze the stability of the equilibria, examine herd immunity, and conduct a sensitivity analysis validated by data on COVID-19 in Indonesia. The disease-free equilibrium is locally and globally asymptotically stable whenever the basic reproduction number is less than one, while an endemic equilibrium exists and is globally asymptotically stable when the number is greater than one. Subsequently, the model incorporates two effective measures, namely public education and enhanced medical care, to determine the most advantageous approach for mitigating the transmission of the disease. The optimal control model is then determined using Pontryagin’s maximum principle. The integrated control strategy is the best method for reliably safeguarding the general population against COVID-19 infection. Cost evaluations and numerical simulations corroborate this conclusion.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000347/pdfft?md5=e3f237c1b54058dbee82e284d716e498&pid=1-s2.0-S2588933824000347-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141606860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations 不仅要有良好的态度:对安全建议态度的因素探讨
IF 3.9
Journal of Cybersecurity Pub Date : 2024-07-03 DOI: 10.1093/cybsec/tyae011
Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla
{"title":"It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations","authors":"Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla","doi":"10.1093/cybsec/tyae011","DOIUrl":"https://doi.org/10.1093/cybsec/tyae011","url":null,"abstract":"Numerous factors determine information security-related actions (IS-actions) in the workplace. Attitudes toward following security rules and recommendations and attitudes toward specific IS actions determine intentions associated with those actions. IS research has examined the role of the instrumental aspect of attitudes. However, authors argue that attitudes toward a behavioral object are a multidimensional construct. We examined the dimensionality of attitudes toward security recommendations, hypothesized its multidimensional nature, and developed a new scale [attitudes toward security recommendations (ASR scale)]. The results indicated the multidimensional nature of attitudes toward security recommendations supporting our hypothesis. The results revealed two dimensions corresponding to the perceived legitimacy and effectiveness of security recommendations and its perceived rigor. The new ASR scale showed good psychometric properties. This work contributes to the IS research at suggesting that attitudes are a multidimensional construct in the IS context. These findings imply that the employee’s evaluation of information security policy can be examined considering their instrumentality (security recommendations are important) and rigor (security recommendations are strict). Different effects of the dimensions of attitudes over IS-action suggest different interventions. Additionally, this study offers the ASR scale as a new instrument to capture employees’ evaluation of security recommendations.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141547245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing poxvirus challenges in the Middle East to enhance biosafety and biosecurity measures 应对中东痘病毒挑战,加强生物安全和生物安保措施
Journal of Biosafety and Biosecurity Pub Date : 2024-07-02 DOI: 10.1016/j.jobb.2024.06.003
Laith N. AL-Eitan , Haneen O. Ali , Hana S. Abu Kharmah , Maryam K. Alasmar , Iliya Y. Khair , Ahmad H. Mihyar
{"title":"Addressing poxvirus challenges in the Middle East to enhance biosafety and biosecurity measures","authors":"Laith N. AL-Eitan ,&nbsp;Haneen O. Ali ,&nbsp;Hana S. Abu Kharmah ,&nbsp;Maryam K. Alasmar ,&nbsp;Iliya Y. Khair ,&nbsp;Ahmad H. Mihyar","doi":"10.1016/j.jobb.2024.06.003","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.003","url":null,"abstract":"<div><p>The emergence and zoonotic transmission of poxviruses in the Middle East have been recognized as complex public health issues. Poxviruses, a vast family of DNA viruses, can infect many hosts, including animals and humans. The Middle East has had multiple epidemics of poxvirus infections (e.g., Monkeypox, Smallpox, and Camelpox) that have raised concerns owing to their detrimental effects on livestock, wildlife, and sporadic human cases. This review aims to thoroughly examine the complexity of the epidemiological patterns, intricate genetic diversity, and several contributing factors that support the emergence and zoonotic transmission of poxviruses in the Middle East. Several aspects of poxviruses contribute to the emergence of endemics and zoonotic breakouts, such as the complex nature of human-animal interactions, environmental changes, and their subtle capacity for viral adaptability. This review was compiled in the hopes of contributing to the current understanding of poxvirus biology and its implications for human and animal health in the Middle East. We provide a comprehensive overview of the most common poxviruses in the Middle East, including their classification, structure, replication cycle, pathogenesis, route of transmissions, and of how the Middle East has developed ways to mitigate these biological threats.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000335/pdfft?md5=951f14f2c0d40a84ed4f933830b032c0&pid=1-s2.0-S2588933824000335-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment 斯塔克尔伯格式相互依存的安全博弈:先行者优势如何影响搭便车和安全(投资不足)问题
IF 3.9
Journal of Cybersecurity Pub Date : 2024-06-28 DOI: 10.1093/cybsec/tyae009
Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu
{"title":"Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment","authors":"Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu","doi":"10.1093/cybsec/tyae009","DOIUrl":"https://doi.org/10.1093/cybsec/tyae009","url":null,"abstract":"Network games are commonly used to capture the strategic interactions among interconnected agents in simultaneous moves. The agents’ actions in a Nash equilibrium must take into account the mutual dependencies connecting them, which is typically obtained by solving a set of fixed point equations. Stackelberg games, on the other hand, model the sequential moves between agents that are categorized as leaders and followers. The corresponding solution concept, the subgame perfect equilibrium, is typically obtained using backward induction. Both game forms enjoy very wide use in the (cyber)security literature, the network game often as a template to study security investment and externality—also referred to as the interdependent security games—and the Stackelberg game as a formalism to model a variety of attacker–defender scenarios. In this study, we examine a model that combines both types of strategic reasoning: the interdependency as well as sequential moves. Specifically, we consider a scenario with a network of interconnected first movers (firms or defenders, whose security efforts and practices collectively determine the security posture of the eco-system) and one or more second movers, the attacker(s), who determine how much effort to exert on attacking the many potential targets. This gives rise to an equilibrium concept that embodies both types of equilibria mentioned above. We will examine how its existence and uniqueness conditions differ from that for a standard network game. Of particular interest are comparisons between the two game forms in terms of effort exerted by the defender(s) and the attacker(s), respectively, and the free-riding behavior among the defenders.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mathematical model for a disease outbreak considering waning-immunity class with nonlinear incidence and recovery rates 考虑到非线性发病率和恢复率的免疫力减弱类疾病爆发数学模型
Journal of Biosafety and Biosecurity Pub Date : 2024-06-26 DOI: 10.1016/j.jobb.2024.05.005
Nursanti Anggriani , Lazarus Kalvein Beay , Meksianis Z. Ndii , Fatuh Inayaturohmat , Sanubari Tansah Tresna
{"title":"A mathematical model for a disease outbreak considering waning-immunity class with nonlinear incidence and recovery rates","authors":"Nursanti Anggriani ,&nbsp;Lazarus Kalvein Beay ,&nbsp;Meksianis Z. Ndii ,&nbsp;Fatuh Inayaturohmat ,&nbsp;Sanubari Tansah Tresna","doi":"10.1016/j.jobb.2024.05.005","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.05.005","url":null,"abstract":"<div><p>In the spread of infectious diseases, intervention levels play a crucial role in shaping interactions between healthy and infected individuals, leading to a nonlinear transmission process. Additionally, the availability of medical resources limits the recovery rate of infected patients, adding further nonlinear dynamics to the healing process. Our research introduces novelty by combining nonlinear incidence and recovery rates alongside waning immunity in an epidemic model. We present a modified SIRW-type model, examining the epidemic problem with these factors. Through analysis, we explore conditions for non-endemic and co-existing cases based on the basic reproduction ratio. The local stability of equilibria is verified using the Routh-Hurwitz criteria, while global stability is assessed using Lyapunov functions for each equilibrium. Furthermore, we investigate bifurcations around both non-endemic and co-existing equilibria. Numerically, we give some simulations to support our analytical findings.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000311/pdfft?md5=9a3f3ac37c5d275226798d8df28d62fc&pid=1-s2.0-S2588933824000311-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The association between mycotic pneumonia and neonatal septicemia 霉菌性肺炎与新生儿败血症之间的关系
Journal of Biosafety and Biosecurity Pub Date : 2024-06-26 DOI: 10.1016/j.jobb.2024.06.002
Salman Khalid Salman, Yasir Mufeed Abdulateef, Sawsan Qahtan Taha Al-Quhli
{"title":"The association between mycotic pneumonia and neonatal septicemia","authors":"Salman Khalid Salman,&nbsp;Yasir Mufeed Abdulateef,&nbsp;Sawsan Qahtan Taha Al-Quhli","doi":"10.1016/j.jobb.2024.06.002","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.002","url":null,"abstract":"<div><h3>Background</h3><p>Candida species are the fourth most common etiological agents of late-onset infection in the neonatal intensive care unit (NICU) and are responsible for considerable morbidity and mortality.</p></div><div><h3>Objectives</h3><p>From November 2023 to February 2024, we investigated the association of mycotic pneumonia with septicemia in 60 neonates, and their roles of mycotic pneumonia in the morbidity and mortality of neonates in two NICUs in the Al-Ramadi Teaching Hospital for Maternity and Children.</p></div><div><h3>Methods</h3><p>All infants in this study had been diagnosed with septicemia and treated with empirical antimicrobial therapy. An early morning nasogastric tube (NG-tube) was used to collect swallowed sputum by suction for culture and sensitivity testing.</p></div><div><h3>Results</h3><p>The average white blood count for the neonates was 8547 ± 5884.5 cells/mm<sup>2</sup>. The mean C-reactive protein was 39.3 ± 26 mg/l, the mean serum albumin was 2.9 ± 0.2 g/dl and the positive bacterial blood culture was 28 (46.7 %). 9 (15 %) neonates died during the study period. The NG-tube culture identified fungal growth in all samples. Of these, 49 (81.6 %) were identified as <em>Candida albicans</em>, 6 (10 %) as <em>Candida tropicalis</em>, and 5 (8.3 %) as <em>Cryptococcus laurentii</em>. The bacterial culture results from the NG-tube samples identified 13 (21.6 %) patients with gram-positive bacteria and 47 (78.3 %) with gram-negative bacteria.</p></div><div><h3>Conclusion</h3><p>We found a prevalence of Candida spp. among neonates in addition to microbial oxygen tube contamination, indicating a biosafety breach in the neonatal unit. Mycotic infection requires global attention as a probable cause of respiratory failure in neonatal septicemia.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000323/pdfft?md5=e98223a68d44a37acdaeed7c16c9e563&pid=1-s2.0-S2588933824000323-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structure-based discovery of F. religiosa phytochemicals as potential inhibitors against Monkeypox (mpox) viral protein 基于结构发现 F. religiosa 植物化学物质作为猴痘 (mpox) 病毒蛋白的潜在抑制剂
Journal of Biosafety and Biosecurity Pub Date : 2024-06-24 DOI: 10.1016/j.jobb.2024.05.004
Ranjan K. Mohapatra , Ahmed Mahal , Pranab K. Mohapatra , Ashish K. Sarangi , Snehasish Mishra , Meshari A. Alsuwat , Nada N. Alshehri , Sozan M. Abdelkhalig , Mohammed Garout , Mohammed Aljeldah , Ahmad A. Alshehri , Ahmed Saif , Mohammed Abdulrahman Alshahrani , Ali S. Alqahtani , Yahya A. Almutawif , Hamza M.A. Eid , Faisal M Albaqami , Mohnad Abdalla , Ali A. Rabaan
{"title":"Structure-based discovery of F. religiosa phytochemicals as potential inhibitors against Monkeypox (mpox) viral protein","authors":"Ranjan K. Mohapatra ,&nbsp;Ahmed Mahal ,&nbsp;Pranab K. Mohapatra ,&nbsp;Ashish K. Sarangi ,&nbsp;Snehasish Mishra ,&nbsp;Meshari A. Alsuwat ,&nbsp;Nada N. Alshehri ,&nbsp;Sozan M. Abdelkhalig ,&nbsp;Mohammed Garout ,&nbsp;Mohammed Aljeldah ,&nbsp;Ahmad A. Alshehri ,&nbsp;Ahmed Saif ,&nbsp;Mohammed Abdulrahman Alshahrani ,&nbsp;Ali S. Alqahtani ,&nbsp;Yahya A. Almutawif ,&nbsp;Hamza M.A. Eid ,&nbsp;Faisal M Albaqami ,&nbsp;Mohnad Abdalla ,&nbsp;Ali A. Rabaan","doi":"10.1016/j.jobb.2024.05.004","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.05.004","url":null,"abstract":"<div><p>Outbreaks of Monkeypox (mpox) in over 100 non-endemic countries in 2022 represented a serious global health concern. Once a neglected disease, mpox has become a global public health issue. A42R profilin-like protein from mpox (PDB ID: 4QWO) represents a potential new lead for drug development and may interact with various synthetic and natural compounds. In this report, the interaction of A42R profilin-like protein with six phytochemicals found in the medicinal plant <em>Ficus religiosa</em> (abundant in India) was examined. Based on the predicted and compared protein–ligand binding energies, biological properties, IC<sub>50</sub> values and toxicity, two compounds, kaempferol (C-1) and piperine (C-4), were selected. ADMET characteristics and quantitative structure–activity relationship (QSAR) of these two compounds were determined, and molecular dynamics (MD) simulations were performed. <em>In silico</em> examination of the kaempferol (C-1) and piperine (C-4) interactions with A42R profilin-like protein gave best-pose ligand-binding energies of –6.98 and –5.57 kcal/mol, respectively. The predicted IC<sub>50</sub> of C-1 was 7.63 μM and 82 μM for C-4. Toxicity data indicated that kaempferol and piperine are non-mutagenic, and the QSAR data revealed that piperlongumine (5.92) and piperine (5.25) had higher log P values than the other compounds examined. MD simulations of A42R profilin-like protein in complex with C-1 and C-4 were performed to examine the stability of the ligand–protein interactions. As/C and C-4 showed the highest affinity and activities, they may be suitable lead candidates for developing mpox therapeutic drugs. This study should facilitate discovering and synthesizing innovative therapeutics to address other infectious diseases.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S258893382400030X/pdfft?md5=ec15123379db8c297e57ae0d9b373a79&pid=1-s2.0-S258893382400030X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university 琐碎的门票建立信任":了解一所大型大学中安全支持互动的共同设计方法
IF 3.9
Journal of Cybersecurity Pub Date : 2024-06-20 DOI: 10.1093/cybsec/tyae007
Albesë Demjaha, David Pym, Tristan Caulfield, Simon Parkin
{"title":"‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university","authors":"Albesë Demjaha, David Pym, Tristan Caulfield, Simon Parkin","doi":"10.1093/cybsec/tyae007","DOIUrl":"https://doi.org/10.1093/cybsec/tyae007","url":null,"abstract":"Increasingly, organizations are acknowledging the importance of human factors in the management of security in workplaces. There are challenges in managing security infrastructures in which there may be centrally mandated and locally managed initiatives to promote secure behaviours. We apply a co-design methodology to harmonize employee behaviour and centralized security management in a large university. This involves iterative rounds of interviews connected by the co-design methodology: 14 employees working with high-value data with specific security needs; seven support staff across both local and central IT and IT-security support teams; and two senior security decision-makers in the organization. We find that employees prefer local support together with assurances that they are behaving securely, rather than precise instructions that lack local context. Trust in support teams that understand local needs also improves engagement, especially for employees who are unsure what to do. Policy is understood by employees through their interactions with support staff and when they see colleagues enacting secure behaviours in the workplace. The iterative co-design approach brings together the viewpoints of a range of employee groups and security decision-makers that capture key influences that drive secure working practices. We provide recommendations for improvements to workplace security, including recognizing that communication of the policy is as important as what is in the policy.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信