This report will discuss and analyze the risks and different challenges which are accompanied when completing remote work and learning. Specifically, this paper will focus on this trends’ effect, during the 2019 Coronavirus pandemic (COVID-19). The different applications that will be included in this research are Slack, Zoom, Skype, Microsoft Teams, Google Meets, Trello, Webex, and Troop Messenger. In recent months, there has been a complete increase in the amount of people worldwide that use these platforms. However, the majority of users do not fully understand security and privacy when using these different platforms. Due to this lack of knowledge, this comes with an increase in attacks. This study will further discuss the different pros and cons of each of the different platforms (mentioned above); the applications that have been breached, how often they were breached, different flaws, vulnerabilities of each system and more. This study coherently uses and assesses its credibility with the assistance of research, a user survey, and past research studies on this topic.
more »
« less
Studying mutation rate evolution in primates—the effects of computational pipelines and parameter choices
Abstract This commentary investigates the important role of computational pipeline and parameter choices in performing mutation rate estimation, using the recent article published in this journal by Bergeron et al. entitled “The germline mutational process in rhesus macaque and its implications for phylogenetic dating” as an illustrative example.
more »
« less
- Award ID(s):
- 2045343
- PAR ID:
- 10312510
- Date Published:
- Journal Name:
- GigaScience
- Volume:
- 10
- Issue:
- 10
- ISSN:
- 2047-217X
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
This chapter documents the procedures and methods used in the shipboard laboratories during International Ocean Discovery Program (IODP) Expedition 356. This introductory section provides a rationale for the site locations and an overview of IODP depth conventions, curatorial procedures, and general core handling/analyses during Expedition 356. Subsequent sections describe specific laboratory procedures and instruments in more detail. This information only applies to shipboard work described in this Proceedings volume; methods used in shore-based analyses of Expedition 356 samples and/or data will be described in various scientific contributions in the open peer-reviewed literature and the Expedition research results section of this volume.more » « less
-
Abstract Bacillus anthracis, the causative agent of anthrax, is a considerable global health threat affecting wildlife, livestock, and the general public. In this study, whole‐genome sequence analysis of over 350B. anthracisisolates was used to establish a new high‐resolution global genotyping framework that is both biogeographically informative and compatible with multiple genomic assays. The data presented in this study shed new light on the diverse global dissemination of this species and indicate that many lineages may be uniquely suited to the geographic regions in which they are found. In addition, we demonstrate that plasmid genomic structure for this species is largely consistent with chromosomal population structure, suggesting vertical inheritance in this bacterium has contributed to its evolutionary persistence. This classification methodology is the first based on population genomic structure for this species and has potential use for local and broader institutions seeking to understand both disease outbreak origins and recent introductions. In addition, we provide access to a newly developed genotyping script as well as the full whole‐genome sequence analyses output for this study, allowing future studies to rapidly employ and append their data in the context of this global collection. This framework may act as a powerful tool for public health agencies, wildlife disease laboratories, and researchers seeking to utilize and expand this classification scheme for further investigations intoB. anthracisevolution.more » « less
-
Alves, Mark; Sidwell, Paul. (Ed.)This is the first-ever study of prosodic structure of the Santali spoken in Assam. It is revealed that this language is strongly second-syllable prominent in uninflected disyllables. This data is then compared with varieties of Sora spoken in both Assam and Odisha and it is revealed that the two languages share almost all of the same properties in this regard. The only node in the Munda language tree that unites Santali and Sora is the Proto-Munda node. It is then suggested that second syllable prominence is the likely system that characterized Proto-Munda and that both of the attested modern languages retained this feature to the present. This is counter to what has been previously claimed in the literature. Our study however offers both instrumental phonetics analysis as well as statistical analysis in support of these claims, unlike previous studies which have been impressionistic and anecdotal.more » « less
-
This report will discuss and explore the concept of reflexive control theory (RCT) in the context of day-to-day cybersecurity operations. Specifically, this study aims to investigate and emphasize the influential role of this trend in cyberspace while simultaneously examining the manipulative tactics employed by adversaries and RCT’s effect on the public. This report will further explain the concept of RCT and aims to promote awareness to educate the public about this topic. In the realm of cybersecurity, reflexive control serves as a potent weapon, used to allow adversaries to be able to exploit vulnerabilities, influence decision-making and essentially predict their target’s actions. This research will focus on three key concepts within reflexive control theory: Behavioral Analysis, Threat Detection and Perception Management. Furthermore, this report examines the ethical dimensions and potential risks associated with the reflexive control theory technique. These findings are intended to raise awareness and propose strategies to enhance resilience against these manipulative tactics. By meticulously synthesizing existing literature, research studies, and user surveys, this report provides a comprehensive analysis of the reflexive control theory in cyber operations.more » « less
An official website of the United States government

