988 resultados para credit card


Relevância:

60.00% 60.00%

Publicador:

Resumo:

We’ve had a bit of sticker shock in these parts. Well, apparently. Since my last missive, Brisbane’s Clem Jones Tunnel which was initially free now has a toll, at least partially, at the introductory rate of $2.95 for a one-way car ride between 5a.m. and midnight – free overnight. From 9 May 2010 the toll will be $4.28. Since the introductory toll was introduced, use of the tunnel appears to have declined somewhat – no surprise to transport professionals I suppose. An additional factor may have been that the “novelty value” of driving through the tunnel for free had worn off. This demonstrates to me that much of the community may still see the use of road infrastructure as a rite of passage, with only some actually weighing up the true value of their travel time and vehicle wear and tear against their out of pocket (or onto credit card) cost. Thus, we’re in pioneering times and the role of transport economics in the overall transport infrastructure planning realm is of considerable importance – especially as much of the new big ticket infrastructure is likely to be tolled into the future. The Queensland Premier, Anna Bligh, made poignant commentary about Brisbane City Council’s tunnel use in that such infrastructure is built for future times and not just as a quick fix for current traffic problems. My expectation is that once Airport Link, which is really the northern half of the corridor, opens in 2012, there will be a significant spike in Clem7 usage.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Fusion techniques have received considerable attention for achieving lower error rates with biometrics. A fused classifier architecture based on sequential integration of multi-instance and multi-sample fusion schemes allows controlled trade-off between false alarms and false rejects. Expressions for each type of error for the fused system have previously been derived for the case of statistically independent classifier decisions. It is shown in this paper that the performance of this architecture can be improved by modelling the correlation between classifier decisions. Correlation modelling also enables better tuning of fusion model parameters, ‘N’, the number of classifiers and ‘M’, the number of attempts/samples, and facilitates the determination of error bounds for false rejects and false accepts for each specific user. Error trade-off performance of the architecture is evaluated using HMM based speaker verification on utterances of individual digits. Results show that performance is improved for the case of favourable correlated decisions. The architecture investigated here is directly applicable to speaker verification from spoken digit strings such as credit card numbers in telephone or voice over internet protocol based applications. It is also applicable to other biometric modalities such as finger prints and handwriting samples.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A pesquisa detém sua atenção nos sentidos sociais e culturais dos meios de pagamento. Para tal, investiga dois domínios: o universo publicitário construído pelas empresas de tecnologias de pagamento (Visa e MasterCard) e outro prático, vivido por jovens universitários. Correlacionar e comparar as estratégias discursivas de apresentação dos cartões de crédito e os usos práticos desta ferramenta financeira tornou-se o ponto central do estudo. Primeiro, são examinados os sentidos dos meios de pagamento (em especial o cartão de crédito) atribuídos pelos especialistas - profissionais de marketing, planejadores de comunicação, redatores e diretores de arte, responsáveis pela promoção das ferramentas financeiras. Em seguida, concentra-se nos usos práticos dos jovens universitários, nos sentidos conferidos por estes aos cartões de crédito que usam. Comparar este dois domínios possibilita verificar a dificuldade de se falar sobre o dinheiro, o cartão de débito ou o cartão de crédito. Os meios de pagamento devem ser entendidos no plural, suas definições e funções são distintas e variam conforme aqueles que os utilizam.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Dissertação apresentada à Universidade Fernando Pessoa como parte dos requisitos de obtenção do grau de Mestre em Ciências da Comunicação, ramo de Marketing e Publicidade

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Wireless sensor networks (WSN) are becoming widely adopted for many applications including complicated tasks like building energy management. However, one major concern for WSN technologies is the short lifetime and high maintenance cost due to the limited battery energy. One of the solutions is to scavenge ambient energy, which is then rectified to power the WSN. The objective of this thesis was to investigate the feasibility of an ultra-low energy consumption power management system suitable for harvesting sub-mW photovoltaic and thermoelectric energy to power WSNs. To achieve this goal, energy harvesting system architectures have been analyzed. Detailed analysis of energy storage units (ESU) have led to an innovative ESU solution for the target applications. Battery-less, long-lifetime ESU and its associated power management circuitry, including fast-charge circuit, self-start circuit, output voltage regulation circuit and hybrid ESU, using a combination of super-capacitor and thin film battery, were developed to achieve continuous operation of energy harvester. Low start-up voltage DC/DC converters have been developed for 1mW level thermoelectric energy harvesting. The novel method of altering thermoelectric generator (TEG) configuration in order to match impedance has been verified in this work. Novel maximum power point tracking (MPPT) circuits, exploring the fractional open circuit voltage method, were particularly developed to suit the sub-1mW photovoltaic energy harvesting applications. The MPPT energy model has been developed and verified against both SPICE simulation and implemented prototypes. Both indoor light and thermoelectric energy harvesting methods proposed in this thesis have been implemented into prototype devices. The improved indoor light energy harvester prototype demonstrates 81% MPPT conversion efficiency with 0.5mW input power. This important improvement makes light energy harvesting from small energy sources (i.e. credit card size solar panel in 500lux indoor lighting conditions) a feasible approach. The 50mm × 54mm thermoelectric energy harvester prototype generates 0.95mW when placed on a 60oC heat source with 28% conversion efficiency. Both prototypes can be used to continuously power WSN for building energy management applications in typical office building environment. In addition to the hardware development, a comprehensive system energy model has been developed. This system energy model not only can be used to predict the available and consumed energy based on real-world ambient conditions, but also can be employed to optimize the system design and configuration. This energy model has been verified by indoor photovoltaic energy harvesting system prototypes in long-term deployed experiments.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Reviews case law on the meaning of the phrase "residing with" as used in the Housing Act 1985 s.87 to identify one of the qualifying requirements for the right to succeed to a secure tenancy. Focuses on the Court of Appeal decision in Freeman v Islington LBC on whether a daughter intended to have her settled home with her father where, in the year preceding her father's death she lived with him full time in order to care for him whilst retaining her own flat and using it as her correspondence address for everything but her credit card. Lists conclusions that can be drawn from the case law.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Call centres have in the last three decades come to define the interaction between corporations, governments, and other institutions and their respective customers, citizens, and members. From telemarketing to tele-health services, to credit card assistance, and even emergency response systems, call centres function as a nexus mediating technologically enabled labour practices with the commodification of services. Because of the ubiquitous nature of the call centre in post-industrial capitalism, the banality of these interactions often overshadows the nature of work and labour in this now-global sector. Advances in telecommunication technologies and the globalization of management practices designed to oversee and maintain standardized labour processes have made call centre work an international phenomenon. Simultaneously, these developments have dislocated assumptions about the geographic and spatial seat of work in what is defined here as the new international division of knowledge labour. The offshoring and outsourcing of call centre employment, part of the larger information technology and information technology enabled services sectors, has become a growing practice amongst governments and corporations in their attempts at controlling costs. Leading offshore destinations for call centre work, such as Canada and India, emerged as prominent locations for call centre work for these reasons. While incredible advances in technology have permitted the use of distant and “offshore” labour forces, the grander reshaping of an international political economy of communications has allowed for the acceleration of these processes. New and established labour unions have responded to these changes in the global regimes of work by seeking to organize call centre workers. These efforts have been assisted by a range of forces, not least of which is the condition of work itself, but also attempts by global union federations to build a bridge between international unionism and local organizing campaigns in the Global South and Global North. Through an examination of trade union interventions in the call centre industries located in Canada and India, this dissertation contributes to research on post-industrial employment by using political economy as a juncture between development studies, critical communications, and labour studies.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this article, using Ireland where debt issues are of particular salience, as a test case, we seek to locate over-indebtedness and the severity of debt problems in the context of the broader economic circumstances of households. In doing so, we first identify an economically vulnerable segment of households and then explore the debt experience of vulnerable and non-vulnerable households. Our analysis reveals a striking contrast between the debt experiences of less than one in five households defined as economically vulnerable and all others. Financial exclusion, relating to access to a bank account and a credit card, was found to increase debt levels. However, such effects were modest. The impact of economic vulnerability seems to be largely a consequence of its relationship to a wide
range of socio-economic attributes and circumstances. The manner in which a potential debt crisis
unfolds will be shaped by the broader socio-economic structuring of life-chances. Any attempt to
respond to such problems by concentrating on financial exclusion or household behaviour or, indeed,
triggering factors without taking the wider social structuring of economic vulnerability is likely to be
both seriously misguided and largely ineffective.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Dissertação de Mestrado apresentada ao Instituto de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Marketing Digital, sob orientação de Mestre António da Silva Vieira.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

School of Management Studies, Cochin University of Science and Technology

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A primary medium for the human beings to communicate through language is Speech. Automatic Speech Recognition is wide spread today. Recognizing single digits is vital to a number of applications such as voice dialling of telephone numbers, automatic data entry, credit card entry, PIN (personal identification number) entry, entry of access codes for transactions, etc. In this paper we present a comparative study of SVM (Support Vector Machine) and HMM (Hidden Markov Model) to recognize and identify the digits used in Malayalam speech.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A finales de 2009 se emprendió un nuevo modelo de segmentación de mercados por conglomeraciones o clústers, con el cual se busca atender las necesidades de los clientes, advirtiendo el ciclo de vida en el cual se encuentran, realizando estrategias que mejoren la rentabilidad del negocio, por medio de indicadores de gestión KPI. Por medio de análisis tecnológico se desarrolló el proceso de inteligencia de la segmentación, por medio del cual se obtuvo el resultado de clústers, que poseían características similares entre sí, pero que diferían de los otros, en variables de comportamiento. Esto se refleja en el desarrollo de campañas estratégicas dirigidas que permitan crear una estrecha relación de fidelidad con el cliente, para aumentar la rentabilidad, en principio, y fortalecer la relación a largo plazo, respondiendo a la razón de ser del negocio

Relevância:

60.00% 60.00%

Publicador:

Resumo:

An E-Learning Gateway for the latest news and information relating to Computer Crime for INFO2009