4 resultados para Emails categorization

em DRUM (Digital Repository at the University of Maryland)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

ABSTRACT Title of Dissertation: A BETTER PLACE TO BE: REPUBLICANISM AS AN ALTENATIVE TO THE AUTHORITARIANISM-DEMOCRACY DICHOTOMY Christopher Ronald Binetti, Doctor of Philosophy, and 2016 Dissertation directed by: Dr. Charled Frederick Alford, Department of Government and Politics In this dissertation, I argue that in modern or ancient regimes, the simple dichotomy between democracies and autocracies/dictatorships is both factually wrong and problematic for policy purposes. It is factually wrong because regimes between the two opposite regime types exist and it is problematic because the either/or dichotomy leads to extreme thinking in terms of nation-building in places like Afghanistan. In planning for Afghanistan, the argument is that either we can quickly nation-build it into a liberal democracy or else we must leave it in the hands of a despotic dictator. This is a false choice created by both a faulty categorization of regime types and most importantly, a failure to understand history. History shows us that the republic is a regime type that defies the authoritarian-democracy dichotomy. A republic by my definition is a non-dominating regime, characterized by a (relative) lack of domination by any one interest group or actor, mostly non-violent competition for power among various interest groups/factions, the ability of factions/interest groups/individual actors to continue to legitimately play the political game even after electoral or issue-area defeat and some measure of effectiveness. Thus, a republic is a system of government that has institutions, laws, norms, attitudes, and beliefs that minimize the violation of the rule of law and monopolization of power by one individual or group as much as possible. These norms, laws, attitudes, and beliefs ae essential to the republican system in that they make those institutions that check and balance power work. My four cases are Assyria, Persia, Venice and Florence. Assyria and Persia are ancient regimes, the first was a republic and then became the frightening opposite of a republic, while the latter was a good republic for a long time, but had effectiveness issues towards the end. Venice is a classical example of a medieval or early modern republic, which was very inspirational to Madison and others in building republican America. Florence is the example of a medieval republic that fell to despotism, as immortalized by Machiavelli’s writings. In all of these examples, I test certain alternative hypotheses as well as my own.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Alternate Reality Game (ARG) represent a new genre of transmedia practice where players hunt for scattered clues, make sense of disparate information, and solve puzzles to advance an ever-evolving storyline. Players participate in ARGs using multiple communications technologies, ranging from print materials to mobile devices. However, many interaction design challenges must be addressed to weave these everyday communication tools together into an immersive, participatory experience. Transmedia design is not an everyday process. Designers must create and connect story bits across multiple media (video, audio, text) and multiple platforms (phones, computers, physical spaces). Furthermore, they must engage with players of varying skill levels. Few studies to-date have explored the design process of ARGs in learning contexts. Fewer still have focused on challenges involved in designing for youth (13-17 years old). In this study, I explore the process of designing ARGs as vehicles for promoting information literacy and participatory culture for adolescents (13-17 years old). Two ARG design scenarios, distinguished by target learning environment (formal and informal context) and target audience (adolescents), comprise the two cases that I examine. Through my analysis of these two design cases, I articulate several unique challenges faced by designers who create interactive, transmedia stories for – and with – youth. Drawing from these design challenges, I derive a repertoire of design strategies that future designers and researchers may use to create and implement ARGs for teens in learning contexts. In particular, I propose a narrative design framework that allows for the categorization of ARGs as storytelling constructs that lie along a continuum of participation and interaction. The framework can serve as an analytic tool for researchers and a guide for designers. In addition, I establish a framework of social roles that designers may employ to craft transmedia narratives before live launch and to promote and scaffold player participation after play begins. Overall, the contributions of my study include theoretical insights that may advance our understanding of narrative design and analysis as well as more practical design implications for designers and practitioners seeking to incorporate transmedia features into learning experiences that target youth.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nigerian scam, also known as advance fee fraud or 419 scam, is a prevalent form of online fraudulent activity that causes financial loss to individuals and businesses. Nigerian scam has evolved from simple non-targeted email messages to more sophisticated scams targeted at users of classifieds, dating and other websites. Even though such scams are observed and reported by users frequently, the community’s understanding of Nigerian scams is limited since the scammers operate “underground”. To better understand the underground Nigerian scam ecosystem and seek effective methods to deter Nigerian scam and cybercrime in general, we conduct a series of active and passive measurement studies. Relying upon the analysis and insight gained from the measurement studies, we make four contributions: (1) we analyze the taxonomy of Nigerian scam and derive long-term trends in scams; (2) we provide an insight on Nigerian scam and cybercrime ecosystems and their underground operation; (3) we propose a payment intervention as a potential deterrent to cybercrime operation in general and evaluate its effectiveness; and (4) we offer active and passive measurement tools and techniques that enable in-depth analysis of cybercrime ecosystems and deterrence on them. We first created and analyze a repository of more than two hundred thousand user-reported scam emails, stretching from 2006 to 2014, from four major scam reporting websites. We select ten most commonly observed scam categories and tag 2,000 scam emails randomly selected from our repository. Based upon the manually tagged dataset, we train a machine learning classifier and cluster all scam emails in the repository. From the clustering result, we find a strong and sustained upward trend for targeted scams and downward trend for non-targeted scams. We then focus on two types of targeted scams: sales scams and rental scams targeted users on Craigslist. We built an automated scam data collection system and gathered large-scale sales scam emails. Using the system we posted honeypot ads on Craigslist and conversed automatically with the scammers. Through the email conversation, the system obtained additional confirmation of likely scam activities and collected additional information such as IP addresses and shipping addresses. Our analysis revealed that around 10 groups were responsible for nearly half of the over 13,000 total scam attempts we received. These groups used IP addresses and shipping addresses in both Nigeria and the U.S. We also crawled rental ads on Craigslist, identified rental scam ads amongst the large number of benign ads and conversed with the potential scammers. Through in-depth analysis of the rental scams, we found seven major scam campaigns employing various operations and monetization methods. We also found that unlike sales scammers, most rental scammers were in the U.S. The large-scale scam data and in-depth analysis provide useful insights on how to design effective deterrence techniques against cybercrime in general. We study underground DDoS-for-hire services, also known as booters, and measure the effectiveness of undermining a payment system of DDoS Services. Our analysis shows that the payment intervention can have the desired effect of limiting cybercriminals’ ability and increasing the risk of accepting payments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ability to sensitively care for others’ wellbeing develops early in ontogeny and is an important developmental milestone for healthy social, emotional, and moral development. One facet of care for others, prosocial comforting, has been linked with important social outcomes such as peer acceptance and friendship quality, underscoring the importance of determining factors involved in the ability to comfort. Although social support has been linked with a number of important social outcomes, no study has directly examined whether felt social support can foster children’s positive behavior toward others. The purpose of the current investigation was to use an experimental priming paradigm to demonstrate that felt social support a) enhances children’s ability to respond prosocially to the distress of others and b) decreases children’s expressions of personal distress when faced with the distress of another person. Participants were 94 4-year-old children (M = 53.56 months, SD = 3.38 months; 52 girls). Children were randomly assigned to either view pictures of mothers and children in close, personal interactions (supportive social interaction condition), happy women and children in separate pictures, presented side-by-side (happy control condition), or pictures of colorful overlapping shapes (neutral control condition). Each set of 20 pictures was presented in the context of a categorization computer game that participants played 4 times throughout the course of the study. Immediately following the first three computer games, children were given the opportunity to comfort someone who was distressed; twice it was the adult experimenter working with the child, and once it was an unseen infant crying over a monitor that participants had been trained to use. Comforting behaviors and distress/arousal were coded in 10-second time segments and yielded a global comforting score and a distress proportion score for each task. Results indicated that priming condition had no effect on either prosocial comforting behavior or expressions of personal distress. I discuss these null findings in light of the available literatures on priming mental representations in children and on prosocial comforting, and suggest some future directions for continued investigation in both fields.