2 resultados para Machine-tools -- Maintenance and repair
em DRUM (Digital Repository at the University of Maryland)
Resumo:
This study reports on research that examines the family language policy (FLP) and biliteracy practices of middle-class Chinese immigrant families in a metropolitan area in the southwest of the U.S. by exploring language practices pattern among family members, language and literacy environment at home, parents’ language management, parents’ language attitudes and ideologies, and biliteracy practices. In this study, I employed mixed methods, including survey and interviews, to investigate Chinese immigrant parents’ FLP, biliteracy practices, their life stories, and their experience of raising and nurturing children in an English-dominant society. Survey questionnaires were distributed to 55 Chinese immigrant parents and interviews were conducted with five families, including mothers and children. One finding from this study is that the language practices pattern at home shows the trend of language shift among the Chinese immigrants’ children. Children prefer speaking English with parents, siblings, and peers, and home literacy environment for children manifests an English-dominant trend. Chinese immigrant parents’ language attitudes and ideologies are largely influenced by English-only ideology. The priority for learning English surpasses the importance of Chinese learning, which is demonstrated by the English-dominant home literacy practices and an English-dominant language policy. Parents invest more in English literacy activities and materials for children, and very few parents implement Chinese-only policy for their children. A second finding from this study is that a multitude of factors from different sources shape and influence Chinese immigrants’ FLP and biliteracy practices. The factors consist of family-related factors, social factors, linguistic factors, and individual factors. A third finding from this study is that a wide variety of strategies are adopted by Chinese immigrant families, which have raised quite balanced bilingual children, to help children maintain Chinese heritage language (HL) and develop both English and Chinese literacy. The close examination and comparison of different families with English monolingual children, with children who have limited knowledge of HL, and with quite balanced bilingual children, this study discovers that immigrant parents, especially mothers, play a fundamental and irreplaceable role in their children’s HL maintenance and biliteracy development and it recommends to immigrant parents in how to implement the findings of this study to nurture their children to become bilingual and biliterate. Due to the limited number and restricted area and group of participant sampling, the results of this study may not be generalized to other groups in different contexts.
Resumo:
Nigerian scam, also known as advance fee fraud or 419 scam, is a prevalent form of online fraudulent activity that causes financial loss to individuals and businesses. Nigerian scam has evolved from simple non-targeted email messages to more sophisticated scams targeted at users of classifieds, dating and other websites. Even though such scams are observed and reported by users frequently, the community’s understanding of Nigerian scams is limited since the scammers operate “underground”. To better understand the underground Nigerian scam ecosystem and seek effective methods to deter Nigerian scam and cybercrime in general, we conduct a series of active and passive measurement studies. Relying upon the analysis and insight gained from the measurement studies, we make four contributions: (1) we analyze the taxonomy of Nigerian scam and derive long-term trends in scams; (2) we provide an insight on Nigerian scam and cybercrime ecosystems and their underground operation; (3) we propose a payment intervention as a potential deterrent to cybercrime operation in general and evaluate its effectiveness; and (4) we offer active and passive measurement tools and techniques that enable in-depth analysis of cybercrime ecosystems and deterrence on them. We first created and analyze a repository of more than two hundred thousand user-reported scam emails, stretching from 2006 to 2014, from four major scam reporting websites. We select ten most commonly observed scam categories and tag 2,000 scam emails randomly selected from our repository. Based upon the manually tagged dataset, we train a machine learning classifier and cluster all scam emails in the repository. From the clustering result, we find a strong and sustained upward trend for targeted scams and downward trend for non-targeted scams. We then focus on two types of targeted scams: sales scams and rental scams targeted users on Craigslist. We built an automated scam data collection system and gathered large-scale sales scam emails. Using the system we posted honeypot ads on Craigslist and conversed automatically with the scammers. Through the email conversation, the system obtained additional confirmation of likely scam activities and collected additional information such as IP addresses and shipping addresses. Our analysis revealed that around 10 groups were responsible for nearly half of the over 13,000 total scam attempts we received. These groups used IP addresses and shipping addresses in both Nigeria and the U.S. We also crawled rental ads on Craigslist, identified rental scam ads amongst the large number of benign ads and conversed with the potential scammers. Through in-depth analysis of the rental scams, we found seven major scam campaigns employing various operations and monetization methods. We also found that unlike sales scammers, most rental scammers were in the U.S. The large-scale scam data and in-depth analysis provide useful insights on how to design effective deterrence techniques against cybercrime in general. We study underground DDoS-for-hire services, also known as booters, and measure the effectiveness of undermining a payment system of DDoS Services. Our analysis shows that the payment intervention can have the desired effect of limiting cybercriminals’ ability and increasing the risk of accepting payments.