999 resultados para identity entrepreneurship
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
This research examines the entrepreneurship phenomenon, and the question: Why are some venture attempts more successful than others? This question is not a new one. Prior research has answered this by describing those that engage in nascent entrepreneurship. Yet, this approach yielded little consensus and offers little comfort for those newly considering venture creation (Gartner, 1988). Rather, this research considers the process of venture creation, by focusing on the actions of nascent entrepreneurs. However, the venture creation process is complex (Liao, Welsch, & Tan, 2005), and multi-dimensional (Davidsson, 2004). The process can vary in the amount of action engaged by the entrepreneur; the temporal dynamics of how action is enacted (Lichtenstein, Carter, Dooley, and Gartner 2007); or the sequence in which actions are undertaken. And little is known about whether any, or all three, of these dimensions matter. Further, there exists scant general knowledge about how the venture creation process influences venture creation outcomes (Gartner & Shaver, 2011). Therefore, this research conducts a systematic study of what entrepreneurs do as they create a new venture. The primary goal is to develop general principles so that advice may be offered on how to ‘proceed’, rather than how to ‘be’. Three integrated empirical studies were conducted that separately focus on each of the interrelated dimensions. The basis for this was a randomly sampled, longitudinal panel, of nascent ventures. Upon recruitment these ventures were in the process of being created, but yet to be established as new businesses. The ventures were tracked one year latter to follow up on outcomes. Accordingly, this research makes the following original contributions to knowledge. First, the findings suggest that all three of the dimensions play an important role: action, dynamics, and sequence. This implies that future research should take a multi-dimensional view of the venture creation process. Failing to do so can only result in a limited understanding of a complex phenomenon. Second, action is the fundamental means through which venture creation is achieved. Simply put, more active venture creation efforts are more likely more successful. Further, action is the medium which allows resource endowments their effect upon venture outcomes. Third, the dynamics of how venture creation plays out over time is also influential. Here, a process with a high rate of action which increases in intensity will more likely achieve positive outcomes. Forth, sequence analysis, suggests that the order in which actions are taken will also drive outcomes. Although venture creation generally flows in sequence from discovery toward exploitation (Shane & Venkataraman, 2000; Eckhardt & Shane, 2003; Shane, 2003), processes that actually proceed in this way are less likely to be realized. Instead, processes which specifically intertwine discovery and exploitation action together in symbiosis more likely achieve better outcomes (Sarasvathy, 2001; Baker, Miner, & Eesley, 2003). Further, an optimal venture creation order exists somewhere between these sequential and symbiotic process archetypes. A process which starts out as symbiotic discovery and exploitation, but switches to focus exclusively on exploitation later on is most likely to achieve venture creation. These sequence findings are unique, and suggest future integration between opposing theories for order in venture creation.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
Previous studies have enabled exact prediction of probabilities of identity-by-descent (IBD) in randommating populations for a few loci (up to four or so), with extension to more using approximate regression methods. Here we present a precise predictor of multiple-locus IBD using simple formulas based on exact results for two loci. In particular, the probability of non-IBD X ABC at each of ordered loci A, B, and C can be well approximated by XABC = XABXBC/XB and generalizes to X123. . .k = X12X23. . .Xk-1,k/ Xk-2, where X is the probability of non-IBD at each locus. Predictions from this chain rule are very precise with population bottlenecks and migration, but are rather poorer in the presence of mutation. From these coefficients, the probabilities of multilocus IBD and non-IBD can also be computed for genomic regions as functions of population size, time, and map distances. An approximate but simple recurrence formula is also developed, which generally is less accurate than the chain rule but is more robust with mutation. Used together with the chain rule it leads to explicit equations for non-IBD in a region. The results can be applied to detection of quantitative trait loci (QTL) by computing the probability of IBD at candidate loci in terms of identity-by-state at neighboring markers.
Resumo:
Academically gifted students are recognised as possessing considerable achievement potential. Yet many fail to perform at a level commensurate with their ability. Often gifted students in early adolescence are faced with a forced choice between fulfilment of potential and achieving stable positive relationships with peers. This choice can affect their achievement and may have far-reaching personal and social costs. This case study explored the viability of self-presentation theory to explain students' ways of negotiating their sense of self whilst developing public identity and the concomitant affects on achievement and the fulfilment of potential. It examined how gifted students moderate their images in their learning and extra-curricular environments. Further, the study identifies those self-presentation strategies adopted that either facilitate or hinder achievement. This study may assist parents, educators and school counsellors to provide greater support for gifted adolescents.
Resumo:
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.
Resumo:
This paper deals with causal effect estimation strategies in highly heterogeneous empirical settings such as entrepreneurship. We argue that the clearer used of modern tools developed to deal with the estimation of causal effects in combination with our analysis of different sources of heterogeneity in entrepreneurship can lead to entrepreneurship with higher internal validity. We specifically lend support from the counterfactual logic and modern research of estimation strategies for causal effect estimation.
Resumo:
Principal Topic Counties in Northern Europe, such as Sweden, Finland and Denmark, have comparatively low per capita rates of entrepreneurship as measured by independent new venture start-up rates – as for example measured by the Global Entrepreneurship Monitor (GEM) Total entrepreneurial activity (TEA) rate. However, the latest 2011 GEM data reveals that these same countries have comparatively very high Employee Entrepreneurship Activity (EEA) rates – that is a high rate per capita of employees involved in new product development or new enterprise activities. This observation has prompted us to investigate the role of national culture in driving independent versus employee entrepreneurial activities. Prior research has established that national (and regional) culture plays an important role in forming an “entrepreneurial culture” that encourages (or discourages) independent business start-ups and TEA (e.g. Davidsson, 1995; Beugelsdijk, 2007). However, the relationship of culture and EEA has not received research attention. Moreover, empirical relationships between elements of national culture and independent entrepreneurship have revealed some surprising results. For example, Wildeman et al. (1999) report an unexpected higher share of individual business ownership in countries that have higher uncertainty avoidance, higher power distance and lower individualism according to Hofstede’s dimensions of culture. They speculate that dissatisfaction can be a source of entrepreneurship: in countries with a high power distance, a high uncertainty avoidance and low individualism, there may be relatively more business owners since enterprising individuals cannot satisfy their needs within existing organizations. Yet it remains a rather open question whether entrepreneurial behaviour in existing organisations provides a satisfactory explanation for these empirical findings. Methods We will conduct a cross sectional study of the influence of national culture according to the five / six dimensions of Hofstede (1980; 2001) on both TEA and EEA for the 54 countries that participated in GEM 2011. Since it is well established that the opportunities for entrepreneurship vary substantially with a country’s level of economic development, we intend to conduct separate analyses for the three categories of development – innovation driven economies, efficient driven economies and factor driven economies. We also intend to restrict our assessment of TEA to opportunity driven entrepreneurship, as necessity driven entrepreneurship has a different relationship to the “entrepreneurial culture” that is the focus of our study. We will control for a range of factors such as GDP growth, ease of doing business index and unemployment. Results and Implications Descriptive analyses of the GEM TEA and EEA data reveal clusters of countries that appear to be have similar national culture. We are yet to conduct regression analyses.
Resumo:
The ongoing crises of child sexual abuse by Christian institutions leaders across the Anglophone world continue to attract public attention and public inquiries. The pervasiveness of this issue lends credence to the argument that the prevailing ethos functioning within some Christian Institutions is one which exercises influence to repeatedly mismanage allegations of child sexual abuse by Church leaders. This work draws on semistructured interviews conducted with 15 Personnel in Christian Institutions (PICIs) in Australia who were identified as being pro-active in their approach to addressing child sexual abuse by PICIs. From these data, themes of power and forgiveness are explored through a Foucaultian conceptualising of pastoral power and ‘truth’ construction. Forgiveness is viewed as a discourse which can have the power effect of either silencing or empowering victim/survivors. The study concludes that individual PICIs’ understandings of the role ofpower in their praxis influences outcomes from the deployment of forgiveness.
Resumo:
In this presentation, renowned arts practitioner, Sean Mee, and Nigel Lavender, Executive Director of the Queensland Music Festival, talk about how community arts practice can be used to build cultural captial in communities, using examples such large-scale musicals such as The Road We're ON (Charleville) and Behind the Cand (Bowen), Mee and Lavender highlight the importance of community-driven narrative and particiaption.
Resumo:
In this study, I investigate the model of English language teacher education developed in Cuba. It includes features that would be considered innovative, contemporary, good practice anywhere in the Western world, as well as having distinctly Cuban elements. English is widely taught in Cuba in the education system and on television by Cuban teachers who are prepared in five-year courses at pedagogical universities by bilingual Cuban teacher educators. This case study explores the identity and pedagogy of six English language teacher educators at Cuba’s largest university of pedagogical sciences. Postcolonial theory provides a framework for examining how the Cuban pedagogy of English language teacher education resists the negative representation of Cuba in hegemonic Western discourse; and challenges neoliberal Western dogma. Postcolonial concepts of representation, resistance and hybridity are used in this examination. Cuban teacher education features a distinctive ‘pedagogy of tenderness’. Teacher educators build on caring relationships and institutionalised values of solidarity, collectivism and collaboration. Communicative English language teaching strategies are contextualised to enhance the pedagogical and communicative competence of student teachers, and intercultural intelligibility is emphasised. The collaborative pedagogy of Cuban English language teacher education features peer observation, mentoring and continuing professional development; as well as extensive pre-service classroom teaching and research skill development for student teachers. Being Cuban and bilingual are significant aspects of the professional identity of case members, who regard their profession as a vocation and who are committed to preparing good English language teachers.
Resumo:
In this article, I argue for an acknowledgement of the significance of the dancer’s role in the creation of independent contemporary dance. I propose the term ‘moving identity’ to outline the independent contemporary dancer’s ‘way of moving’ which could be perceived as the accumulation of various factors including training approaches, choreographic movement traces and anatomical structures. The concept of the moving identity allows us to appreciate the dancer’s unique signature movement style as the collation of embodied experiences into a unique way of moving. However, the moving identity is also open to change when the dancer encounters new choreography and the choreographer. Professional dance training produces particular types of dancers, depending on the techniques with which they engage. I demonstrate how the independent contemporary dancer troubles this distinctiveness by engaging with a multitude of movement styles and approaches throughout a career. This leads me to a fresh description of the dancer’s activity through the lens of Deleuzean concepts of multiplicity and de-stratification. Finally, I propose a definition of the dancer as a fluid and mutable body-in-flux with the creative potential to significantly influence the outcome of the choreographic process.
Resumo:
This thesis investigates the role of personal Digital Stories shared in public spaces as catalysts for social change. By analysing the influence of workshop facilitators, organisations, digital platforms and networked publics on voice and self-representation, it sheds light on shifting meanings of publicness and privacy, both face to face and online. This thesis argues that, despite numerous obstacles, the cumulative influence of diverse voices dispersed among networked publics shape new cultural norms, thereby contributing to gradual social change.
Resumo:
Purpose – The purpose of this paper is to investigate whether new and young firms are different from older firms. This analysis is undertaken to explore general characteristics, use of external resources and growth orientation. Design/methodology/approach – Data from the 2008 UK Federation of Small Businesses survey provided 8,000 responses. Quantitative analysis identified significantly different characteristics of firms from 0-4, 4-9, 9-19 and 20+ years. Factor analysis was utilised to identify the advice sets, finance and public procurement customers of greatest interest, with ANOVA used to statistically compare firms in the identified age groups with different growth aspirations. Findings – The findings reveal key differences between new, young and older firms in terms of characteristics including business sector, owner/manager age, education/business experience, legal status, intellectual property and trading performance. New and young firms were more able to access beneficial resources in terms of finance and advice from several sources. New and young firms were also able to more easily access government and external finance, as well as government advice, but less able to access public procurement. Research limitations/implications – New and young firms are utilising external networks to access several resources for development purposes, and this differs for older firms. This suggests that a more explicit age-differentiated focus is required for government policies aimed at supporting firm growth. Originality/value – The study provides important baseline data for future quantitative and qualitative studies focused on the impact of firm age and government policy.
Resumo:
Iris based identity verification is highly reliable but it can also be subject to attacks. Pupil dilation or constriction stimulated by the application of drugs are examples of sample presentation security attacks which can lead to higher false rejection rates. Suspects on a watch list can potentially circumvent the iris based system using such methods. This paper investigates a new approach using multiple parts of the iris (instances) and multiple iris samples in a sequential decision fusion framework that can yield robust performance. Results are presented and compared with the standard full iris based approach for a number of iris degradations. An advantage of the proposed fusion scheme is that the trade-off between detection errors can be controlled by setting parameters such as the number of instances and the number of samples used in the system. The system can then be operated to match security threat levels. It is shown that for optimal values of these parameters, the fused system also has a lower total error rate.