66 resultados para Tactics
Resumo:
This study aims to redefine spaces of learning to places of learning through the direct engagement of local communities as a way to examine and learn from real world issues in the city. This paper exemplifies Smart City Learning, where the key goal is to promote the generation and exchange of urban design ideas for the future development of South Bank, in Brisbane, Australia, informing the creation of new design policies responding to the needs of local citizens. Specific to this project was the implementation of urban informatics techniques and approaches to promote innovative engagement strategies. Architecture and Urban Design students were encouraged to review and appropriate real-time, ubiquitous technology, social media, and mobile devices that were used by urban residents to augment and mediate the physical and digital layers of urban infrastructures. Our study’s experience found that urban informatics provide an innovative opportunity to enrich students’ place of learning within the city.
Resumo:
In this paper, we describe a method to represent and discover adversarial group behavior in a continuous domain. In comparison to other types of behavior, adversarial behavior is heavily structured as the location of a player (or agent) is dependent both on their teammates and adversaries, in addition to the tactics or strategies of the team. We present a method which can exploit this relationship through the use of a spatiotemporal basis model. As players constantly change roles during a match, we show that employing a "role-based" representation instead of one based on player "identity" can best exploit the playing structure. As vision-based systems currently do not provide perfect detection/tracking (e.g. missed or false detections), we show that our compact representation can effectively "denoise" erroneous detections as well as enabe temporal analysis, which was previously prohibitive due to the dimensionality of the signal. To evaluate our approach, we used a fully instrumented field-hockey pitch with 8 fixed high-definition (HD) cameras and evaluated our approach on approximately 200,000 frames of data from a state-of-the-art real-time player detector and compare it to manually labelled data.
Resumo:
In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
‘Engagement’ is one of the buzzwords of 21st century public relations theory and practice. Yet the concept of engagement remains frustratingly nebulous and intangible, lacking clear definition and consistent use. This paper suggests that the concept of dialogue can provide public relations practitioners and academics with a framework for defining engagement that allows deep insights into the range of ideas and contexts it covers. Specifically, this paper argues for the use of a pragmatic practitioner perspective on dialogue as a lens through which to study engagement. Current literature clearly articulates the normative and prescriptive perspectives on dialogue in public relations, but leaves the story of the reality of the practitioner experience of dialogue largely untold. New research tells this ‘missing’ story of the practitioner perspective on dialogue, which in turn offers some insights into the forms and functions of engagement in practice. Dialogue is seen as encompassing three different types of public relations practice: informing stakeholders of organisational decisions and receiving their feedback; consulting with stakeholders on the strategies and tactics used by organisations to achieve their chosen goals; and including stakeholder input in the making of decisions on what organisational goals should be. Adopting this pragmatic practitioner perspective on dialogue to view engagement provides scaffolding that is strong enough to encourage development of a consistent definition of its meaning; while still allowing the freedom and scope necessary to develop deep and rich understanding of the phenomenon.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
This study determined factors which influenced Canadian provincial (state) politicians when making funding decisions for public libraries. Using the case study methodology, Canadian provincial/state-level funding for public libraries in the 2009-2010 fiscal year was examined. The data were analyzed to determine whether Cialdini’s theory of influence and specifically any of the six tactics of influence (i.e., commitment and consistency, authority, liking, social proof, scarcity, and reciprocity) were instrumental in these budgetary decision-making processes. Findings show the principles of “authority,” “consistency and commitment,” and “liking” were relevant, and that “liking” was especially important to these decisions.
Resumo:
Contemporary cities no longer offer the same types of permanent environments that we planned for in the latter part of the twentieth century. Our public spaces are increasingly temporary, transient, and ephemeral. The theories, principles and tactics with which we designed these spaces in the past are no longer appropriate. We need a new theory for understanding the creation, use, and reuse of temporary public space. Moe than a theory, we need new architectural tactics or strategies that can be reliably employed to create successful temporary public spaces. This paper will present ongoing research that starts that process through critical review and technical analysis of existing and historic temporary public spaces. Through the analysis of a number of public spaces, that were either designed for temporary use or became temporary through changing social conditions, this research identifies the tactics and heuristics used in such projects. These tactics and heuristics are then analysed to extract some broader principles for the design of temporary public space. The theories of time related building layers, a model of environmental sustainability, and the recycling of social meaning, are all explored. The paper will go on to identify a number of key questions that need to be explored and addressed by a theory for such developments: How can we retain social meaning in the fabric of the city and its public spaces while we disassemble it and recycle it into new purposes? What role will preservation have in the rapidly changing future; will exemplary temporary spaces be preserved and thereby become no longer temporary? Does the environmental advantage of recycling materials, components and spaces outweigh the removal or social loss of temporary public space? This research starts to identify the knowledge gaps and proposes a number of strategies for making public space in the age of temporary, recyclable, and repurposing of our urban infrastructure; a way of creating lighter, cheaper, quicker, and temporary interventions.
Resumo:
This research aims to understand what factors influence consumers' behaviour to subculture marketing and how companies can strategically overcome potential brand alienation. Findings validate cryptic marketing as a strategy for organizations to communicate effectively with their chosen market through the use of cryptic cues, symbols and messages while circumventing negative responses from non-target audiences. The thesis contributes to extending current understanding of marketing communication through the use of covert strategies, employing covert tactics on the non-target, wider market instead of the target, subculture market.
Resumo:
Social marketing by Western governments that use fear tactics and threatening information to promote anti-drinking messages has polarized ‘binge drinking’ and ‘moderate drinking’ through a continuum that implies benefits and harms for both individuals and society. With the goal of extending insights into social marketing approaches that promote safer drinking cultures in Australia, we discuss findings from a study that examines alcohol consumers' moderate-drinking intentions. By applying the theory of planned behaviour and emotions theory, we discuss survey results from a sample of alcohol consumers, which demonstrate that positively framed value propositions that evoke happiness and love are more influential in the processing of an alcohol moderation message for alcohol consumers. The key limitations of this study are the cross-sectional nature of the data and the focal-dependent variable being behavioural intentions rather than behaviours. Research insight into the stronger influence of positive emotions on processing an alcohol moderation message establishes an important avenue for future social marketing communications that moves beyond negative, avoidance appeals to promote behaviour change in drinkers. These research findings will benefit professionals involved in developing social change campaigns that promote and reinforce consumers' positive intentions, with messages about the benefits of controlled, moderate drinking.
Resumo:
Two studies examine how a consumer’s awareness of marketing tactics influences the effectiveness of conclusion explicitness advertising (implicit, open-ended or explicit, closed-ended conclusions). Study 1 shows that persuasion awareness and conclusion explicitness influence brand evaluations. Persuasion aware consumers prefer implicit conclusions in comparative advertising that allow them to decide which brand is superior, rather than explicit conclusions which state the superior brand. Persuasion unaware consumers show no difference for conclusion explicitness. Brand trust mediates the results. Study 2 demonstrates the robustness of these effects. Research contributions include persuasion awareness as a moderator of conclusion explicitness effects and the role of trust as a mediator. For managers, results show how implicit conclusions can improve the brand evaluations of persuasion aware consumers.
Resumo:
The philosophical promise of community development to “resource and empower people so that they can collectively control their own destinies” (Kenny 1996:104) is no doubt alluring to Indigenous Australia. Given the historical and contemporary experiences of colonial control and surveillance of Aboriginal bodies, alongside the continuing experiences of socio-economic disadvantage, community development reaffirms the aspirational goal of Indigenous Australians for self-determination. Self-determination as a national policy agenda for Indigenous Australians emerged in the 1970s and saw the establishment of a wide range of Aboriginal community-controlled services (Tsey et al 2012). Sullivan (2010:4) argues that the Aboriginal community controlled service sector during this time has, and continues to be, instrumental to advancing the plight of Indigenous Australians both materially and politically. Yet community development and self-determination remain highly problematic and contested in how they manifest in Indigenous social policy agendas and in practice (Hollinsworth 1996; Martin 2003; McCausland 2005; Moreton-Robinson 2009). Moreton-Robinson (2009:68) argues that a central theme underpinning these tensions is a reading of Indigeneity in which Aboriginal and Torres Strait Islander people, behaviours, cultures, and communities are pathologised as “dysfunctional” thus enabling assertions that Indigenous people are incapable of managing their own affairs. This discourse distracts us from the “strategies and tactics of patriarchal white sovereignty” that inhibit the “state’s earlier policy of self-determination” (Moreton-Robinson 2009:68). We acknowledge the irony of community development espoused by Ramirez above (1990), that the least resourced are expected to be most resourceful.; however, we wish to interrogate the processes that inhibit Indigenous participation and control of our own affairs rather than further interrogate Aboriginal minds as uneducated, incapable and/or impaired...
Resumo:
Pranks, hoaxes and practical jokes are co-creative cultural performance practices that appear across times, contexts and cultures. These practices include everyday play amongst families, friends and coworkers, entertainment programs such as Prank Patrol, Punked or Scare Tactics, and aesthetic and activist pranks perpetrated by situationist artists, guerrilla artists, and, most recently, culture ‘jammers’ or ‘hackers’ intent on turning capitalist systems back on themselves. Although it can, in common usage, describe almost any show off behaviour, a prank in the strictest definition of the term is a performance that deploys a very specific set of strategies. It is an act of trickery, mischief, or deceit, that must be taken as real, and momentarily cause real fear, anger or worry for an unwitting spectator-become-performer, who is meant to play along until the trick is revealed and their response can be represented back to the prankster, other spectators, or society as a whole, either for the sake of entertainment or for the sake of commentary on a cultural phenomenon. A prank, in this sense, deliberately blurs the boundaries between daily and dramatic performance. It creates a moment of uncertainty, in which both the prankster’s ability to be creative, clever, or culturally astute, and the prankee’s ability to play along, discern the trick, discern the point of the trick, and, in the end, be duped, be a good sport, or even play/pay the prankster back, are both put to the test. In this paper, I consider a number of pranking traditions popular where I am in Australia, from the community-building pranks of footballers, bucks parties and ‘drop bear’ tales told to tourists, to the more controversial pranks of radio shock jocks, activists and artists. I use performance, spectatorship and ethical theory to examine the engagement between prankster, pranked spectator, and other spectators, in this most distinctive sort of community-driven performance practice, and the way it builds and breaks status, social and other sorts of relationships within and between specific communities.
Resumo:
Romantic Terrorism offers an innovative methodology in exploring the ways in which domestic violence offenders terrorise their victims. Hayes and Jeffries employ a collaborative auto-ethnographic approach to analyse their own lived experiences of domestic violence, particularly how romantic love is employed and distorted by abusers. Its focus on the insidious use of tactics of coercive control by abusers opens up much-needed discussion on the damage caused by emotional and psychological abuse, which are often overlooked or downplayed in both the literature and the criminal justice system. To this end, it offers strategic advice for policy-makers, practitioners, and criminal justice professionals involved in domestic violence service provision.