Tuesday, November 12, 2024

 AMERIKA IS GUN SICK

Most parents don’t ask about firearms in the homes their kids visit



Parents need to know that asking about firearms is critical to their child’s safety




Ann & Robert H. Lurie Children's Hospital of Chicago


Over 60 percent of Illinois parents had never asked another parent about an unlocked firearm in their home before allowing their child to visit for a playdate, according to a survey from Ann & Robert H. Lurie Children’s Hospital of Chicago published in Pediatrics. Many parents reported they had not asked about firearms because it never occurred to them to do so, which highlights a critical need to raise awareness of this important safety concern.

Among children 0-14 years old, almost 20 percent of unintentional firearm-related deaths occur at a friend’s home. Furthermore, approximately 40 percent of U.S. households with children have a firearm in the home, yet only 44 percent of these households store firearms locked and unloaded, the most secure possible manner.

“Parents need to approach the topic of firearm safety in the homes their child visits in the same way they would ask other parents about supervision during playdates or similar questions related to their child’s safety,” said lead author Samaa Kemal, MD, MPH, Emergency Medicine physician at Lurie Children’s and Assistant Professor of Pediatrics at Northwestern University Feinberg School of Medicine. “Parents need to ask about the presence of firearms in the home and about secure storage methods. These discussions with other parents are crucial for prevention of children’s injury and death from improperly stored firearms.”

Survey responses were received from 1,000 Illinois parents. Dr. Kemal and colleagues found that parents were less likely to ask about firearms if they were female, over 40 years old, living in rural areas, did not have a college degree and had lower household income. There were no differences based on parent race and ethnicity or ages of children in the home.

Ann & Robert H. Lurie Children’s Hospital of Chicago is a nonprofit organization committed to providing access to exceptional care for every child. It is the only independent, research-driven children’s hospital in Illinois and one of less than 35 nationally. This is where the top doctors go to train, practice pediatric medicine, teach, advocate, research and stay up to date on the latest treatments. Exclusively focused on children, all Lurie Children’s resources are devoted to serving their needs. Research at Lurie Children’s is conducted through Stanley Manne Children’s Research Institute, which is focused on improving child health, transforming pediatric medicine and ensuring healthier futures through the relentless pursuit of knowledge. Lurie Children’s is the pediatric training ground for Northwestern University Feinberg School of Medicine. It is ranked as one of the nation’s top children’s hospitals by U.S. News & World Report. Emergency medicine-focused research at Lurie Children’s is conducted through the Grainger Research Program in Pediatric Emergency Medicine.  

 

 CLASS DIFFERENCES

Beer-only drinkers’ diets are worse than wine drinkers



As obesity, alcohol use and liver disease rise, physicians should note habits


American Association for the Study of Liver Diseases




SAN DIEGO, California (Nov. 13, 2024) — Beer drinkers have lower-quality diets, are less active, and are more likely to smoke cigarettes than people who drink wine, liquor, or a combination, according to a study scheduled for presentation at The Liver Meeting, held by the American Association for the Study of Liver Diseases.

“Alcohol overuse is the leading cause of cirrhosis in the U.S., and metabolic dysfunction-associated steatotic liver disease (MASLD) is rapidly increasing,” said Madeline Novack, chief resident at Tulane School of Medicine’s internal medicine residency program and lead author of the study. “Both types of liver disease often coexist, and lifestyle changes are key to managing and preventing these conditions, starting with understanding the link between alcohol use and poor nutrition.”

Using a survey of a nationally representative sample of more than 1,900 U.S. adults who reported current alcohol use, researchers compared the diet quality among people who consume beer only (38.9%), wine only (21.8%), liquor only (18.2%), or a combination of alcohol types (21%), measuring self-reported eating habits against the Healthy Eating Index, a validated standardized tool based on dietary guidelines.

None of the alcohol-using groups came close to achieving the 80-point score that is considered an adequate diet on the 100-point Healthy Eating Index, Novack said, but the beer drinkers scored lowest at 49. Wine drinkers scored 55, and both liquor-only drinkers and combination drinkers scored nearly 53.

Beer-only drinkers, who were more likely to be male, younger, smokers, and low income, also reported the highest total daily caloric intake, adjusting for body weight, and the lowest level of physical activity. Previous studies have found that dietary quality declines with increasing alcohol consumption of any type, but little has been reported on the influence of specific alcoholic beverage type. 

Novack said the differences in diet quality among drinkers could be attributed to the context in which food and alcohol consumed together. In the U.S., beer is often chosen in settings where the available foods tend to be low in fiber and high in carbohydrates and processed meats. On the other hand, wine — particularly red wine — is often paired with meals complete with meat, vegetables and dairy.

Another possibility is the inverse, where dietary choices influence the choice of alcohol consumed, Novack said. For example, fried or salty foods create thirst that may also lead to beer-only consumption.   

For prevention of liver disease and other health issues, physicians should ask about the type of alcohol consumed to guide discussion of healthy behaviors, Novack said. For example, findings of this study can be applied to patients who identify as beer-only drinkers and physicians could suggest increasing fruit and vegetable intake, as well as physical activity.

Madeline Novack, MD, will present the study, “Beer Consumption is Associated with Low Dietary Quality Among Alcohol Users,” abstract 3019, on Sunday, Nov. 17, at 1 p.m. PST. The study is simultaneously being published in the journal Nutrients.

 

###

 

About The Liver Meeting ®

The Liver Meeting® brings together clinicians, associates and scientists from around the world to exchange information on the latest research, discuss new developments in liver treatment and transplantation, and network with leading experts in the field of hepatology.

About AASLD

AASLD is the leading organization of scientists and health care professionals committed to preventing and curing liver disease. We foster research that leads to improved treatment options for millions of liver disease patients. We advance the science and practice of hepatology through educational conferences, training programs, professional publications and partnerships with government agencies and sister societies.

 

Reporting into the void: Research validates victims' doubts about response to phishing reports



Empirical study suggests most Fortune 100 companies fall short when it comes to addressing phishing



Drexel University




The cybersecurity refrain when encountering phishing emails invariably advises: “don’t click on that link” and “report that email” — but new research from Drexel University and Arizona State University has revealed a problematic reality: Most major companies do little to support reporting and few take action to shut down phishing sites disguised as their own after they have been reported.

Recently presented at the International Symposium on Research in Attacks, Intrusions and Defense (RAID), an extensive investigation into reporting resources and processes — including an empirical test of their efficacy — revealed that less than half of Fortune 100 companies offer any channel for reporting these scams. And an experiment, to test the companies’ response to reports of phishing attacks impersonating their websites, found that nearly 30% of reported websites were never accessed as part of an investigation and only 3% of the were ever blocked from access.

Most phishing emails include links to download malware or visit fake webpages that mimic popular sites. Recipients may be tricked into attempting to log in to the sites, divulging their account information to the bad actors behind them. Variations on this cyberattack, called smishing, which involves sending malicious links in text messages; and vishing, which uses voicemails, are also becoming more prevalent.

Despite ever-evolving cybersecurity techniques to detect and block the malicious scams, many still make it through countermeasures and into inboxes. In 2022 the FBI received more reports of phishing than any other type of cybercrime — totaling an 11-fold increase since 2018. 

Because of this evasiveness, most companies provide cybersecurity training to help employees identify and instruct them to report phishing emails as a last line of defense.

When phishing emails are reported, the companies that are being impersonated in them can take steps to mitigate the scam, including updating their security systems, re-securing compromised email accounts and reporting the fraud to federal authorities and report any website listed in the email so that it can be taken down, or “block listed.” 

But research suggests that the rate of phishing attack reporting is strikingly low. A 2020 study by researchers at Arizona State showed that phishing sites are visited an average of 27 times before being reported.

In hopes of improving participation in anti-phishing measures, cybersecurity researchers from Drexel University’s College of Computing & Informatics sought to better understand the reporting ecosystem that has generated such a low rate of participation. Their report, which is one of the first comprehensive studies to look at the attitudes and actions around phishing reporting, uncovered the challenges and concerns people face when reporting, as well as shortcomings in how the reports are handled.

“Although users are constantly trained and instructed on how to identify and report phishing emails, the reaction they receive in the actions taken — or, more often, not taken — by the companies to which they report creates a negative feedback that discourages them from reporting future emails,” said Eric Sun, PhD, an assistant professor in Drexel’s College of Computing & Informatics who helped to lead the research. “Our research sheds a light on what it’s like to be a reporter and a company that receives a phishing report in hopes of improving this cybersecurity environment.”

The team approached its analysis from three perspectives, seeking to understand:

  • The options the cybersecurity ecosystem provides to individuals who wish to report phishing attacks
  • The actual experience in preparing to report a phishing attack
  • The post-reporting response — what happens to phishing websites after reporting and what feedback is conveyed to reporters

It found that although there is a great deal of room for improvement in the guidance information and feedback provided by companies and enforcement institutions, individual reporting of phishing attacks remains a crucial part of cybersecurity efforts.

 

What are the options for reporting?

After conducting an extensive search and filtering out official guidance offered by .gov, .org sites and the websites of the top 100 brand-name U.S. companies (Fortune 100), the team identified 575 webpages providing guidance about phishing attacks.

An analysis of those resources showed that there are five main channels for reporting phishing: email, built in reporting button in email software, SMS text, online reporting forms, and direct contact through a phone call or live chat.

The team identified eight government agencies and two anti-phishing organizations providing information and guidance about phishing: Federal Trade Commission (FTC), Internal Revenue Service (IRS), Cybersecurity & Infrastructure Security Agency (CISA), FBI Internet Crime Complaint Center (IC3), Department of Homeland Security (DHS), Department of Justice (DOJ), Federal Communications Commission (FCC), Government Information and Services, Anti-Phishing Working Group (APWG), and Phishing.org.

While all offered security advice on reporting phishing, only half of them actually provided dedicated channels for reporting phishing.

A summary of the advice offered by these agencies and organizations show that they primarily direct victims to one or several of 12 options: FTC, IRS, CISA, FCC, IC3, police, state attorney general’s office, APWG, the national SMS reporting number (7726), Google, the impersonated company, their internet service provider.

“Understandably, many organizations play a role in mitigating, investigating and enforcing laws against cybercrime, this can also raise confusion when it comes to reporting crimes like phishing,” said Gail-Joon Ahn, PhD, a professor at Arizona State University who helped to lead the research. “We found that due to this enforcement environment, a great deal of the reporting advice offered online is inconsistent or conflicting.”

The team’s analysis of reporting resources provided by Fortune 100 companies revealed that only 65 of them provide guidance to their customers on how to report a phishing attack. Only 44 of them provided channels for directly reporting a phishing attack impersonating — or “spoofing” — the company’s website, despite the prevalence of security advice recommending reporting such deceptions to those companies.

“We're constantly advised to avoid clicking on phishing links and to report them, especially to the spoofed companies,” Sun said. “Our finding that only 65 of the Fortune 100 companies provide advice for reporting phishing attacks — and less than half of them offer actual reporting channels — is particularly striking given these companies have more resources and are expected to be more committed to handling such reports.”

Through this analysis the group teased out four challenges common to both government/organizations and the Fortune 100 companies that may be discouraging people from reporting phishing attacks:

  • Reporting procedures for email phishing attacks typically do not require critical information, such as email headers (including sender and recipient details, timestamps, or IP addresses).
  • Different reporting channels offer different and sometimes conflicting or outdated advice. For example, some companies instruct victims to report the phishing, others just advise them to delete it without reporting.
  • Security advice requests people report the same phishing to too many places (i.e. FTC, IC3, and APWG).
  • Reporters generally do not receive feedback other than an auto-reply email confirming receipt of the report.

 

What’s it like to report a phishing attack?

In addition to understanding the existing reporting resources and guidance, the team tried to better understand the experience and sentiments of people who report phishing attacks.

To do it they recruited 89 U.S.-based participants to individually go through the process of locating reporting information and filing a report of a phishing attack. Surveying the participants after this short process provided a snapshot of peoples’ experience, attitudes and concerns about reporting.

Of the 89 participants, 15 decided not to report the phishing email. Most suggested it wasn’t worth the time they’d spend on it, or that nothing would be done with the report. Others noted that they would only file a report if it reached a certain threshold — receiving the same phishing email multiple times, for example.

Drops in reporting compliance were also observed when participants were advised to report the attack to multiple channels (e.g. the company and a government agency) — only half would follow the advice. Among participants with cybersecurity experience, only 39% indicated they would report it to multiple channels as requested. About half of the participants expressed a negative attitude about the reporting, including noting a lack of confidence that it would make a difference, or that they would receive a response.

“While it might not be all that surprising that there are some negative feelings about reporting, given the time commitment and perceived lack of results, we also discovered that about a third of respondents have limited knowledge about phishing reporting and a quarter were unaware that there were places to report phishing attacks,” said Adam DoupĂ©, PhD, an associate professor at Arizona State, who helped to lead the research. “These are indicators that more could be done to educate the public about responding to phishing attacks.”

 

What happens after phishing is reported?

In the final step of their investigation the team looked at how companies and organizations responsible for dealing with phishing sites respond to reports. What they found indicates that concerns expressed by reporters about lack of response and communication are not unfounded.

The researchers used two observable actions as indicators of companies’ responsiveness to the reports: what happened to the reported phishing websites? And what feedback did the reporter receive?

They created a set of test phishing websites — in accordance with ethical research requirements and with prior notification of domain registrar and hosting service provider — spoofing the site of each Fortune 100 company. Over the course of two months, the team reported 14 times to each of the 39 companies that provided instructions for doing so. In addition, they reported all of the sites to the national SMS phishing reporting number (7726, the alphanumeric translation of “SPAM”).

During their experiments, the team found that reporting phishing attacks can be quite challenging. For instance, while some companies required them to forward phishing emails to a dedicated reporting address, the emails were often blocked due to the company’s own security measures. The filters flagged these emails as potentially harmful, stating, “A signature was detected that could either be a virus or a spam score over the maximum threshold,” thus preventing the reports from reaching the intended destination.

Following the reports, the researchers tracked how many of the sites were accessed — an indicator that the companies were investigating the report — and how many were ultimately blocked.

They found that 29 of the 39 companies accessed 184 of the reported sites, 10 companies did not access the sites at all. Only 3.3% of the sites reported via email to companies, per their instructions, were blocked. But the sites that were reported via 7726 were visited within seven hours of the report and more than 73% were blocked.

Of the 39 companies to which reports were filed, only 19 responded to the reporter and 15 of those responses were auto-replies. The reporter received no responses indicating a resolution — whether the phishing website had been taken down, for example.

“Our findings seem to confirm participants’ views that some companies may not care enough about the reports,” Ahn said. “In addition to the overall low response rate and lack of confirmation of a resolution, only four companies ever sent us a response indicating that the sites we had reported were indeed phishing sites.”

 

How can the vibe around phishing reporting be improved?

Taking their ample findings into consideration, the researchers suggest that to begin improving the phishing reporting ecosystems, companies and organizations responsible for addressing phishing attacks first need to become better communicators.

“Our research has identified a number of concerns from users, but the most significant is the outcome of reporting,” Sun said. “Many users are willing to report phishing attempts, but the lack of feedback is a key reason why they often don’t. Users are unsure if they are reporting through the correct channels and methods, whether their reports are being taken seriously, or if their actions are making a difference.”

Even automated responses would be an improvement, according to Sun, if they provide updates on actions being taken and the status of the reported site. Such correspondence would validate the reporters’ efforts and help to show that they are appreciated, which he suggests could encourage future reporting.

The next step the researchers recommended is providing clear and consistent security advice about how and where to report different types of phishing attacks. This would help to alleviate concerns about choosing the right reporting channel and reduce the effort and time involved in the process.

Sun notes that despite ongoing developments in cybersecurity technology, robust reporting, and a prompt response to block phishing sites, combined with detection technology, will continue to be the most reliable line of defense against these attacks.

“Phishing reporting is one of the few areas where end users — who bear the brunt of the harm in phishing attacks —  can actively fight back and make a difference,” Sun said. “It is crucial to encourage people to report phishing attacks because technology alone will not stem the tide.”

 

Guardian, kids, or companions? What do dogs mean to us today



Man’s best friend or “just a pet”? The roles that owners attribute to their dogs vary and may affect dogs’ daily lives


Eötvös Loránd University

Dog - human bond 

image: 

What role do dogs play in today’s world? For many, they are more than just pets. New findings from the Department of Ethology at Eötvös Loránd University show that whether seen as friends, family members, children or guardians, these roles affect the way dogs are cared for, suggesting shifting dynamics in human-animal bonds shaped by societal trends and individual owner profiles.

 

view more 

Credit: Photo: Vanda Molnár




What role do dogs play in today’s world? For many, they are more than just pets. New findings from the Department of Ethology at Eötvös Loránd University show that whether seen as friends, family members, children or guardians, these roles affect the way dogs are cared for, suggesting shifting dynamics in human-animal bonds shaped by societal trends and individual owner profiles.

In Western cultures, more and more people see their dogs as their best friends, family members or even their furry children. In fact, past studies have shown that

up to two-thirds of dog owners consider their dog to be more important than any human in their lives. 

One reason for these increasingly strong bonds between humans and dogs may be the demographic transition seen over the last few decades, characterised by smaller families and falling birth rates. Indeed, in a time when people feel lonelier and more socially isolated, dogs may have become a perfect substitute for human contact. However, not much scientific research has looked at this societal trend and how it affects the daily lives of dogs.

What is it about dogs that people love so much? Does regarding dogs as friends, children or family members influence the way owners care for them?

To answer these questions, researchers at the Department of Ethology at Eötvös Loránd University (ELTE) have studied questionnaire data collected from about 800 dog owners. 

First, results revealed that almost all owners really liked the physical contact with the dog (97.6% of owners), the “unconditional love” the dog provides them (93.7%), and the sight and beauty of the dog (88.4%). Other benefits were less unanimous - for example, 24.3% of owners didn’t benefit from the social interactions generated by their dog, while 36.3% liked it a lot.

One key question was, of course, what role(s) the dog played in the owner’s life. The novelty of the present study was that, instead of just choosing one main role, owners could attribute multiple roles to their dogs, like friend, family member, child, colleague, domesticated animal, and security guard.

“Interestingly, even though we collected data from online groups dedicated to family dogs, the owners weren’t all the same” explained Laura Gillet, PhD student at the Department of Ethology and lead author of the study. “We found three distinct profiles of owners whose dogs played diverse social and practical roles”.

Indeed, for some owners, the dog had dual functions:

both practical as a colleague and a security guard, but also a strong emotional and social function as the most important individual in their lives.

Another group of owners, labelled as “dog parents”, emphasised the human-like roles of the dog, suggesting a very close bond but no practical functions. The last group kept dogs mainly for companionship while showing a greater emotional distance from their pets.

“As we previously assumed, several dog and human factors were associated with these three profiles. For instance, dogs with dual functions were perceived as very obedient and were trained with positive reinforcement and professional training methods like clicker training”, noted Prof. Eniko Kubinyi, head of the Department of Ethology and of the MTA-ELTE “Momentum” Companion Animals Research Group. “Moreover, they often belonged to breeds known for their working abilities, such as Border Collie, Belgian Shepherd Dog and German Shepherd Dog.”

On the other hand, owners keeping dogs for companionship purposes preferred the Mudi, the English Cocker Spaniel and the Labrador Retriever breeds, spent less time with their dogs on a daily basis and were older than other owners. Lastly, “dog parents” were more likely than others to house their dogs indoors only, and their favourite breeds were Border collies, Vizsla, Boxer, and Dachshund.

The researchers also collected information about the behavioural problems of the dogs as indicators of canine welfare,

as these may result from inadequate management practices. The most frequently reported issues were jumping up (33.2% of dogs), chasing animals (28.5%), territoriality (26.7%), overexcitement (20.9%), and fear of new things or situations (19.4%). However, no association was found between these perceived behavioural problems and the roles attributed to the dogs.

In sum, dogs can play many roles in their owners’ lives and provide them with different benefits.

This new research method better captures the complexity of the dog-human bond.

Moreover, the roles that owners attributed to their dogs seem to have direct implications for dogs’ daily lives, although in this convenience sample of dog enthusiasts, endowing dogs with human-like roles had no negative effect on canine welfare. 

Finally, the present findings also suggest a generational shift in the perception of the dog-owner relationship, with

younger owners forming stronger emotional bonds with their dogs and more likely to refer to them as children than the previous generation.

More research is needed to better understand the consequences of this phenomenon in terms of animal and human well-being, but also what it says about our modern societies.

 

 

Decentralized social media ‘increases citizen empowerment’, says Oxford study




University of Oxford





Researchers from the Oxford Martin Programme on Ethical Web and Data Architectures (University of Oxford) have reported findings from a paper exploring the motivations and challenges in running decentralised social media such as Mastodon, concluding such platforms offer potential for increased citizen empowerment in this digital domain.

In their study, presented at the 27th ACM SIGCHI Conference on Computer-Supported Cooperative Work & Social Computing (CSCW) today, the researchers interviewed 16 administrators of Mastodon servers (otherwise known as instances), including those supporting marginalised and stigmatised communities. Their answers highlighted the complexities of managing decentralised platforms and the future potential of such technologies to foster more equitable social media ecosystems.

The participants identified the following benefits with decentralised social media platforms:

  • Safer, more inclusive spaces online – administrators of instances supporting LGBTQ+ communities noted mainstream social media tended to avoid making moderation decisions that could alienate large user groups. A Mastodon instance, however, allowed marginalised users to hold discussions they would otherwise feel unsafe or uncomfortable having on traditional platforms.
  • Absence of algorithmic manipulation – participants said algorithms on traditional social media platforms typically prevented them from reaching a substantial audience or fostering meaningful conversations. This was not the case with Mastodon, which operates a chronological feed and is free from algorithm-driven recommendations and ads.
  • Better support for data privacy and autonomy – Participants shared concerns about the safety of their data on traditional platforms, including that sensitive posts could unintentionally reach unintended audiences. Decentralised platforms like Mastodon gave users greater control over their data because they could create their own instances.

Zhilin Zhang, DPhil student with the Ethical Web and Data Architectures programme and lead author of the paper, said:

‘Decentralised social media platforms represent a shift towards user autonomy, where individuals can engage in a safer and more inclusive digital space without the constraints and biases imposed by traditional, centralised, algorithm-driven networks.’

Participants did identify challenges with decentralised social media platforms. For example, they found it challenging to grow their respective communities because of the sparse content driven by relatively low numbers of users, while the concept of decentralised social media might be too difficult for new users to understand. The complex nature of moderating communities due to the fine line of creating a safe space and protecting freedom of speech, and the burdens of moderating content that could include harmful materials and potential scams, were other identified challenges.

These could be mitigated, said the administrators, by doing the following:

  • Prioritising quality over growth
  • Deliberately keeping instances small to streamline content and keep communities friendly and interactive
  • Foster a diverse and dedicated content moderation team
  • Balancing between proactive and reactive when moderating

In addition, the researchers also identified intricate power dynamics involving Mastodon’s governing structure that could carry a risk of power abuse.

Dr Jun Zhao, senior researcher with the Ethical Web and Data Architectures programme and a co-author of the paper, said:

‘Decentralised platforms like Mastodon reveal new and complex power dynamics, but community involvement in decision-making can help prevent authoritarian control and foster trust.

‘We argue that these power dynamics should be accounted for when developing any support mechanisms to help administrators and users of decentralised social media platforms.’

Ultimately though, the study’s findings demonstrate the potential of decentralised social media in paving the way for a more citizen-powered future in social media.

Zhang concluded, ‘Decentralised social media is more than just a technical shift; it's a step toward restoring autonomy and trust in our digital lives, empowering individuals and communities to connect without compromising their values or privacy.’

The authors of the paper are affiliated to the University of Oxford’s Department of Computer Sciences, University College London, and Stanford University.

The paper, ‘Trouble in Paradise? Understanding Mastodon Admin’s Motivations, Experiences, and Challenges Running Decentralised Social Media’, can be read at:  https://doi.org/10.1145/3687059

…ENDS…

Notes to Editors

For an interview with the researchers or further information, including to see a copy of the paper, please contact Amjad Parkar on amjad.parkar@oxfordmartin.ox.ac.uk

DOI - 10.1145/3687059

About the Oxford Martin Programme on Ethical Web and Data Architectures

The World Wide Web has radically diverged from the values upon which it was founded, and it is now dominated by a few platform companies, whose business models and services generate huge profits.

The Oxford Martin Programme on Ethical Web and Data Architectures, led by Sir Tim Berners-Lee and Principal of Jesus College Nigel Shadbolt, aims to identify digital infrastructures that promote and support individual autonomy and self-determination in our emerging digital societies. To do this, researchers aim to redesign the fundamental information architectures which underpin the web, and deploy new legal and regulatory infrastructures.

About the Oxford Martin School   

The Oxford Martin School is a world-leading research department of the University of Oxford. Its 200 academics work across more than 30 pioneering research programmes to find solutions to the world's most urgent challenges. It supports novel and high-risk projects that often do not fit within conventional funding channels, with the belief that breaking boundaries and fostering innovative collaborations can dramatically improve the wellbeing of this and future generations. Underpinning all our research is the need to translate academic excellence into impact – from innovations in science, medicine, and technology, through to providing expert advice and policy recommendations.   

About the Department of Computer Science

The Department of Computer Science is consistently recognised as the internationally leading centre of research and teaching across a broad spectrum of computer science, ranging from foundational discoveries to interdisciplinary work with significant real-world impact.

We are proud of our history as one of the longest-established computer science departments in the country, as we continue to provide first-rate undergraduate and postgraduate teaching to some of the world's brightest minds. We enjoy close links with other University departments and Oxford research groups and institutes.

For more information visit our website: https://www.cs.ox.ac.uk/

About the University of Oxford

Oxford University has been placed number 1 in the Times Higher Education World University Rankings for the ninth year running, and ​number 3 in the QS World Rankings 2024. At the heart of this success are the twin-pillars of our ground-breaking research and innovation and our distinctive educational offer.

Oxford is world-famous for research and teaching excellence and home to some of the most talented people from across the globe. Our work helps the lives of millions, solving real-world problems through a huge network of partnerships and collaborations. The breadth and interdisciplinary nature of our research alongside our personalised approach to teaching sparks imaginative and inventive insights and solutions.

Through its research commercialisation arm, Oxford University Innovation, Oxford is the highest university patent filer in the UK and is ranked first in the UK for university spinouts, having created more than 300 new companies since 1988. Over a third of these companies have been created in the past five years. The university is a catalyst for prosperity in Oxfordshire and the United Kingdom, contributing £15.7 billion to the UK economy in 2018/19, and supports more than 28,000 full time jobs.

 

MBARI researchers discover remarkable new swimming sea slug in the deep sea



A new glowing nudibranch species is the first known to swim through the ocean’s midnight zone and has unique adaptations for life in this environment.



Monterey Bay Aquarium Research Institute

The mystery mollusc (Bathydevius caudactylus), a remarkable new species of sea slug discovered in the deep sea by MBARI researchers 

image: 

MBARI researchers have described a remarkable new species of nudibranch from the depths of the midnight zone. Nicknamed the “mystery mollusc,” Bathydevius caudactylus swims with a fingered tail, uses a cavernous hood to capture food, and glows with brilliant bioluminescence. Image: © 2014 MBARI

view more 

Credit: © 2014




MBARI researchers have discovered a remarkable new species of sea slug that lives in the deep sea. Bathydevius caudactylus swims through the ocean’s midnight zone with a large gelatinous hood and paddle-like tail, and lights up with brilliant bioluminescence. The team published a description of the animal, nicknamed the “mystery mollusc,” in the journal Deep-Sea Research Part I.

“Thanks to MBARI’s advanced underwater technology, we were able to prepare the most comprehensive description of a deep-sea animal ever made. We’ve invested more than 20 years in understanding the natural history of this fascinating species of nudibranch. Our discovery is a new piece of the puzzle that can help better understand the largest habitat on Earth,” said MBARI Senior Scientist Bruce Robison, who led efforts to describe the mystery mollusc.

MBARI researchers first observed the mystery mollusc in February 2000 during a dive with the institute’s remotely operated vehicle (ROV) Tiburon offshore of Monterey Bay at 2,614 meters (8,576 feet) deep. The team leveraged MBARI’s advanced and innovative underwater technology to gather extensive natural history information about the mystery mollusc. After reviewing more than 150 sightings from MBARI’s ROVs over the past 20 years, they published a detailed description of this animal.

With a voluminous hooded structure at one end, a flat tail fringed with numerous finger-like projections at the other, and colorful internal organs in between, the team initially struggled to place this animal in a group. Because the animal also had a foot like a snail, they nicknamed this the “mystery mollusc.”

After gently collecting a specimen, MBARI researchers were able to take a closer look at the animal in the lab. Through detailed investigations of anatomy and genetics, they began to solve the mystery, finally confirming that this incredible animal is a nudibranch.

Most nudibranchs, also known as sea slugs, live on the seafloor. Nudibranchs are common in coastal environments—including tide pools, kelp forests, and coral reefs—and a small number of species are known to live on the abyssal seafloor. A few are pelagic and live in open waters near the surface.

The mystery mollusc is the first nudibranch known to live in the deep water column. This species lives in the ocean’s midnight zone, an expansive environment of open water 1,000 to 4,000 meters (3,300 to 13,100 feet) below the surface, also known as the bathypelagic zone. 

The mystery mollusc is currently known to live in the waters offshore of the Pacific coast of North America, with sightings on MBARI expeditions as far north as Oregon and as far south as Southern California. An observation of a similar-looking animal by NOAA researchers in the Mariana Trench in the Western Pacific, suggests the mystery mollusc may have a more widespread distribution.

The mystery mollusc has evolved unique solutions to find food, safety, and companions to survive in the midnight zone. 

While most sea slugs use a raspy tongue to feed on prey attached to the seafloor, the mystery mollusc uses a cavernous hood to trap crustaceans like a Venus fly trap plant. A number of other unrelated deep-sea species use this feeding strategy, including some jellies, anemones, and tunicates. 

Mystery molluscs are typically seen in open water far below the surface and far above the seafloor. They move through these waters by flexing their body up and down to swim or simply drifting motionless with the currents. To avoid being eaten, the mystery mollusc hides in plain sight with a transparent body. Rapidly closing the oral hood facilitates a quick escape, similar to the pulse of a jelly’s bell. 

If threatened, the mystery mollusc can light up with bioluminescence to deter and distract hungry predators. On one occasion, researchers observed the animal illuminate and then detach a steadily glowing finger-like projection from the tail, likely serving as a decoy to distract a potential predator. “When we first filmed it glowing with the ROV, everyone in the control room let out a loud ‘Oooooh!’ at the same time. We were all enchanted by the sight,” said MBARI Senior Scientist Steven Haddock. “Only recently have cameras become capable of filming bioluminescence in high-resolution and in full color. MBARI is one of the only places in the world where we have taken this new technology into the deep ocean, allowing us to study the luminous behavior of deep-sea animals in their natural habitat.”

Like other nudibranchs, the mystery mollusc is a hermaphrodite, possessing both male and female sex organs. The mystery mollusc appears to descend to the seafloor to spawn. MBARI researchers observed some animals using their muscular foot to attach to the muddy seafloor in order to release their eggs. 

Detailed examination of specific gene sequences confirmed that the mystery mollusc is unique enough from other known nudibranchs to merit the creation of a new family, Bathydeviidae. Two shallow-water nudibranchs—the lion’s mane nudibranch (Melibe leonina) and the veiled nudibranch (Tethys fimbria)—use a hood to capture prey; however, this appears to be convergent evolution of a similar feeding method, as the mystery mollusc is only distantly related to these species. In fact, genetics suggests the mystery mollusc may have split off first on its own branch of the nudibranch family tree.

“What is exciting to me about the mystery mollusc is that it exemplifies how much we are learning as we spend more time in the deep sea, particularly below 2,000 meters. For there to be a relatively large, unique, and glowing animal that is in a previously unknown family really underscores the importance of using new technology to catalog this vast environment. The more we learn about deep-sea communities, the better we will be at ocean decision-making and stewardship,” said Haddock.

The mystery mollusc is just one of many fascinating discoveries MBARI has made in the midnight zone. To date, MBARI technology has been used to document more than 250 deep-sea species previously unknown to science. 

“Deep-sea animals capture the imagination. These are our neighbors that share our blue planet. Each new discovery is an opportunity to raise awareness about the deep sea and inspire the public to protect the amazing animals and environments found deep beneath the surface,” said Robison.

This work was funded as part of the David and Lucile Packard Foundation’s longtime support of MBARI’s work to advance marine science and technology to understand a changing ocean.

 

Mystery mollusc (Bathydevius caudactylus) fact sheet 

Common name: Mystery mollusc
Scientific name: Bathydevius caudactylus
Pronunciation: bath-ee-dee-vee-us caw-dack-till-us

Habitat: midwater, in the bathypelagic zone
Depth range: 1,013 to 4,009 meters (3,323 to 13,153 feet)
Geographic range: currently known from the Northeastern Pacific Ocean, from Oregon to Southern California, but likely more widespread

Size: 14.5 centimeters (5.6 inches) (total length)
Diet: crustaceans, including mysid shrimp

Swimming: Bathydevius caudactylus swims with up-and-down undulations of the entire body, from the hood to the tail. Quickly closing the hood propels the animal backward. Most individuals have been observed in the water column at depths of 1,013 to 3,272 meters (3,323 to 10,735 feet), either swimming slowly or passively drifting. Bathydevius caudactylus is neutrally buoyant and does not sink or rise in the water column when at rest. 

Feeding: Bathydevius caudactylus uses a gelatinous hood to trap crustaceans. The bowl-shaped hood is highly elastic and may be up to 9 centimeters (3.5 inches) across. Meals are ingested through a funnel-shaped mouth at the back of the hood. Bathydevius caudactylus lacks the raspy tongue-like radula typical of bottom-dwelling nudibranchs and snails. Bathydevius caudactylus feeds on prey rich in nutrients, slowly metabolizing meals that may be few and far between in an environment where food is scarce.

Physiology: Researchers measured oxygen consumption of Bathydevius caudactylus with the Midwater Respirometer System developed by MBARI scientists and engineers. Bathydevius caudactylus has a metabolism much lower than that reported in other nudibranchs; in fact, respiration rates are more similar to those MBARI researchers have recorded in deep-sea jellies. The reduced respiration reflects the slower pace of life in the deep water column.

Bioluminescence: Researchers filmed bioluminescence from Bathydevius caudactylus in the field and the laboratory. Luminous granules in the animal’s tissues create a “starry” appearance across the animal’s back, including a diffuse glow in the oral hood and throughout the tips of the finger-like dactyls in the tail. Bathydevius caudactylus appears to drop luminescent dactyls as a decoy to distract predators, much like a lizard dropping its tail. The dactyls regenerate, with some Bathydevius caudactylus observed bearing dactyls of different lengths. Bioluminescence is uncommon among nudibranchs and snails, and Bathydevius caudactylus represents an independent evolution of this trait—just the third time bioluminescence has evolved in nudibranchs and the seventh time among gastropods.

Reproduction: Bathydevius caudactylus is a hermaphrodite with both male and female reproductive organs. Spawning individuals were observed on the seafloor at depths of 2,269 to 4,009 meters (7,444 to 13,153 feet). Bathydevius caudactylus is a solitary species, however, spawning individuals were occasionally seen in proximity to each other on the seafloor. One specimen collected by MBARI researchers released a ribbon of eggs in the laboratory. Eggs hatched three days later, developing into trochophore larvae with a round body and long hair-like cilia.

Etymology: The genus name Bathydevius reflects the “devious” nature of this deep-sea animal that fooled researchers with features unlike those of other known nudibranchs. The species name caudactylus refers to distinctive finger-like projections, or dactyls, on the animal’s tail.

 

About MBARI
MBARI (Monterey Bay Aquarium Research Institute) is a non-profit oceanographic research center founded in 1987 by the late Silicon Valley innovator and philanthropist David Packard. Our mission is to advance marine science and technology to understand a changing ocean. Learn more at mbari.org