212 resultados para Credit generalization


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The author, Dean Shepherd, is of entrepreneurship—how entrepreneurs think, decide to act, and feel. He recently realized that while his publications in academic journals have implications for entrepreneurs, those implications have remained relatively hidden in the text of the articles and hidden in articles published in journals largely inaccessible to those involved in the entrepreneurial process. This series is designed to bring the practical implications of his research to the forefront.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The author, Dean Shepherd, is of entrepreneurship—how entrepreneurs think, decide to act, and feel. He recently realized that while his publications in academic journals have implications for entrepreneurs, those implications have remained relatively hidden in the text of the articles and hidden in articles published in journals largely inaccessible to those involved in the entrepreneurial process. This series is designed to bring the practical implications of his research to the forefront.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The author, Dean Shepherd, is of entrepreneurship—how entrepreneurs think, decide to act, and feel. He recently realized that while his publications in academic journals have implications for entrepreneurs, those implications have remained relatively hidden in the text of the articles and hidden in articles published in journals largely inaccessible to those involved in the entrepreneurial process. This series is designed to bring the practical implications of his research to the forefront.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The author, Dean Shepherd, is of entrepreneurship—how entrepreneurs think, decide to act, and feel. He recently realized that while his publications in academic journals have implications for entrepreneurs, those implications have remained relatively hidden in the text of the articles and hidden in articles published in journals largely inaccessible to those involved in the entrepreneurial process. This series is designed to bring the practical implications of his research to the forefront.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Previous group signature constructions did not provide any disclosure capability, or at best a very limited one (such as subset membership). Our scheme offers a very powerful language for disclosing exactly in what capacity a subgroup of signers is making a signature on behalf of the group.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RC4(n, m) is a stream cipher based on RC4 and is designed by G. Gong et al. It can be seen as a generalization of the famous RC4 stream cipher designed by Ron Rivest. The authors of RC4(n, m) claim that the cipher resists all the attacks that are successful against the original RC4. The paper reveals cryptographic weaknesses of the RC4(n, m) stream cipher. We develop two attacks. The first one is based on non-randomness of internal state and allows to distinguish it from a truly random cipher by an algorithm that has access to 24·n bits of the keystream. The second attack exploits low diffusion of bits in the KSA and PRGA algorithms and recovers all bytes of the secret key. This attack works only if the initial value of the cipher can be manipulated. Apart from the secret key, the cipher uses two other inputs, namely, initial value and initial vector. Although these inputs are fixed in the cipher specification, some applications may allow the inputs to be under the attacker control. Assuming that the attacker can control the initial value, we show a distinguisher for the cipher and a secret key recovery attack that for the L-bit secret key, is able to recover it with about (L/n) · 2n steps. The attack has been implemented on a standard PC and can reconstruct the secret key of RC(8, 32) in less than a second.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Regulation has played a significant role in shaping the financial services sector in Australia over the past few decades. Regulatory changes have included the establishment of the Australian Prudential Regulation Authority (APRA), floating the Australian dollar, allowing foreign financial institutions to operate domestically, the introduction of the superannuation guarantee charge, and the removal of interest rate controls. As the economy emerges from the worst financial crisis since the great depression, a new force of change that is recognised as one of the most significant sources of risk and opportunity facing the business community in the foreseeable future is that of climate change. Climate change is expected to be a significant change agent in the financial services sector as extreme weather patterns, sea level rises, and atmospheric changes impact on asset values (both investment and lending), project finance, and risk products. The financial services industry will be particularly affected by these developments, both as a provider of financial products (capital, credit, investment, advice, and insurance), and also through its powerful influence on the economy in terms of capital allocation. In addition, industry constituents will be heavily impacted by government regulation in this area (reporting, emissions trading and environmental policies), with respect to their own business practices and also those of their clients. This study reports the results of interviews conducted with senior members of the finance sector working in the sustainability area to gauge their perceptions of the challenges facing the sector with respect to climate change. Our results confirm that that regulatory intervention will be critical to climate change response gaining traction and momentum. In particular, regulatory certainty will promote engagement, particularly in relation to the Carbon Pollution Reduction Scheme (CPRS), with other developments needed in terms of information disclosure, performance and remuneration, and incentive programs. Accordingly, the significant potential risks and opportunities that climate change presents to the sector, and the broader economy, will in part be managed/realised only if a swift and significant regulatory response is achieved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The placement of the mappers and reducers on the machines directly affects the performance and cost of the MapReduce computation in cloud computing. From the computational point of view, the mappers/reducers placement problem is a generalization of the classical bin packing problem, which is NP-complete. Thus, in this paper we propose a new heuristic algorithm for the mappers/reducers placement problem in cloud computing and evaluate it by comparing with other several heuristics on solution quality and computation time by solving a set of test problems with various characteristics. The computational results show that our heuristic algorithm is much more efficient than the other heuristics. Also, we verify the effectiveness of our heuristic algorithm by comparing the mapper/reducer placement for a benchmark problem generated by our heuristic algorithm with a conventional mapper/reducer placement. The comparison results show that the computation using our mapper/reducer placement is much cheaper while still satisfying the computation deadline.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Siphons have been used since ancient times, but exactly how they work is still a matter of debate. In order to elucidate the modus operandi of a siphon, a 1.5 m high siphon was set up in a hypobaric chamber to explore siphon behaviour in a low-pressure environment. When the pressure in the chamber was reduced to about 0.18 atmospheres, a curious waterfall-like feature appeared downstream from the apex of the siphon. A hypothesis is presented to explain the waterfall phenomenon. When the pressure was reduced further the siphon broke into two columns - in effect becoming two back-to-back barometers. This experiment demonstrates the role of atmospheric pressure in explaining the hydrostatic characteristics of a siphon and the role of molecular cohesion in explaining the hydrodynamic aspects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In many cities around the world, surveillance by a pervasive net of CCTV cameras is a common phenomenon in an attempt to uphold safety and security across the urban environment. Video footage is being recorded and stored, sometimes live feeds are being watched in control rooms hidden from public access and view. In this study, we were inspired by Steve Mann’s original work on sousveillance (surveillance from below) to examine how a network of camera equipped urban screens could allow the residents of Oulu in Finland to collaborate on the safekeeping of their city. An agile, rapid prototyping process led to the design, implementation and ‘in the wild’ deployment of the UbiOpticon screen application. Live video streams captured by web cams integrated at the top of 12 distributed urban screens were broadcast and displayed in a matrix arrangement on all screens. The matrix also included live video streams of two roaming mobile phone cameras. In our field study we explored the reactions of passers-by and users of this screen application that seeks to inverse Bentham’s original panopticon by allowing the watched to be watchers at the same time. In addition to the original goal of participatory sousveillance, the system’s live video feature sparked fun and novel user-led apprlopriations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Falling prices have led to an ongoing spread of public displays in urban areas. Still, they mostly show passive content such as commercials and digital signage. At the same time, technological advances have enabled the creation of interactive displays potentially increasing their attractiveness for the audience, e.g. through providing a platform for civic discourse. This poses considerable challenges, since displays need to communicate the opportunity to engage, motivate the audience to do so, and be easy to use. In this paper we present Vote With Your Feet, a hyperlocal public polling tool for urban screens allowing users to express their opinions. Similar to vox populi interviews on TV or polls on news websites, the tool is meant to reflect the mindset of the community on topics such as current affairs, cultural identity and local matters. It is novel in that it focuses on a situated civic discourse and provides a tangible user interface, tackling the mentioned challenges. It shows one Yes/No question at a time and enables users to vote by stepping on one of two tangible buttons on the ground. This user interface was introduced to attract people’s attention and to lower participation barriers. Our field study showed that Vote With Your Feet is perceived as inviting and that it can spark discussions among co-located people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Software engineers constantly deal with problems of designing, analyzing, and improving process specifications, e.g., source code, service compositions, or process models. Process specifications are abstractions of behavior observed or intended to be implemented in reality which result from creative engineering practice. Usually, process specifications are formalized as directed graphs in which edges capture temporal relations between decisions, synchronization points, and work activities. Every process specification is a compromise between two points: On the one hand engineers strive to operate with less modeling constructs which conceal irrelevant details, while on the other hand the details are required to achieve the desired level of customization for envisioned process scenarios. In our research, we approach the problem of varying abstraction levels of process specifications. Formally, developed abstraction mechanisms exploit the structure of a process specification and allow the generalization of low-level details into concepts of a higher abstraction level. The reverse procedure can be addressed as process specialization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In order to execute, study, or improve operating procedures, companies document them as business process models. Often, business process analysts capture every single exception handling or alternative task handling scenario within a model. Such a tendency results in large process specifications. The core process logic becomes hidden in numerous modeling constructs. To fulfill different tasks, companies develop several model variants of the same business process at different abstraction levels. Afterwards, maintenance of such model groups involves a lot of synchronization effort and is erroneous. We propose an abstraction technique that allows generalization of process models. Business process model abstraction assumes a detailed model of a process to be available and derives coarse-grained models from it. The task of abstraction is to tell significant model elements from insignificant ones and to reduce the latter. We propose to learn insignificant process elements from supplementary model information, e.g., task execution time or frequency of task occurrence. Finally, we discuss a mechanism for user control of the model abstraction level – an abstraction slider.