820 resultados para Malicious intent
Resumo:
Purpose: The purpose of this paper was to evaluate the impact of some labeling aspects on the consumer intent to purchase ready to drink orange juice and nectar. Design/methodology/approach: The influence of label information on the consumer intent to purchase was evaluated by conjoint analysis using a convenience sample (n=149). A factorial design with four characteristics, price, brand, information about the product and kind of beverage, was used. Three levels were established for brand and product information, and two for price and kind of beverage. Findings: Low price, product information and market leading brand had positive impact. No preservatives/natural was the information that most influenced consumer's purchase intent. The ideal label showed the leading brand, low price and information no preservatives/natural. These results could be useful for strategic planning of consumer instruction and have important implications for Brazilian orange juice manufactures. Originality/value: Although the most widely consumed beverages in Brazil are ready to drink orange juice and nectar, it was unexpected that consumers did not know the differences between them and that kind of beverage was not an important factor for the purchase decision. © Emerald Group Publishing Limited.
Resumo:
The fast and strong social and economic transformations in the economies of many countries has raised the competition for consumers. One of the elements required to adapt to such scenario is knowing customers and their perceptions about products or services, mainly regarding word of mouth recommendations. This study adapts, to the fast food business, a model originally designed to analyze the antecedents of the intent to recommend by clients of formal restaurants. Three constructs were considered: service quality, satisfaction, and social well-being, the latter comprised of positive and negative affections. Six hypotheses were considered, three of which relating to social well-being (that it influences satisfaction, service quality, and the intent to recommend), two relating to service quality (that in influences the intent to recommend and satisfaction), and one relating to the influence of satisfaction on the intent to recommend. None was rejected, indicating adherence and adjustment of the simplication and adaptation of the consolidated model. Through a successful empirical application, the main contribution made by this research is the simplification of a model through its application in a similar context, but with a different scope.
Resumo:
This thesis collects the outcomes of a Ph.D. course in Telecommunications Engineering and it is focused on the study and design of possible techniques able to counteract interference signal in Global Navigation Satellite System (GNSS) systems. The subject is the jamming threat in navigation systems, that has become a very increasingly important topic in recent years, due to the wide diffusion of GNSS-based civil applications. Detection and mitigation techniques are developed in order to fight out jamming signals, tested in different scenarios and including sophisticated signals. The thesis is organized in two main parts, which deal with management of GNSS intentional counterfeit signals. The first part deals with the interference management, focusing on the intentional interfering signal. In particular, a technique for the detection and localization of the interfering signal level in the GNSS bands in frequency domain has been proposed. In addition, an effective mitigation technique which exploits the periodic characteristics of the common jamming signals reducing interfering effects at the receiver side has been introduced. Moreover, this technique has been also tested in a different and more complicated scenario resulting still effective in mitigation and cancellation of the interfering signal, without high complexity. The second part still deals with the problem of interference management, but regarding with more sophisticated signal. The attention is focused on the detection of spoofing signal, which is the most complex among the jamming signal types. Due to this highly difficulty in detect and mitigate this kind of signal, spoofing threat is considered the most dangerous. In this work, a possible techniques able to detect this sophisticated signal has been proposed, observing and exploiting jointly the outputs of several operational block measurements of the GNSS receiver operating chain.
Resumo:
This article focuses on the “social side” of pseudonymity—on how writers and readers compete to influence the critical destiny of a pseudonymous work. By analyzing pseudonymity and attribution in both the specific context of Voltaire’s 1760 staging of the play, Le café ou l’écossaise, and in larger debates in the emerging fields of anonymity, pseudonymity, and attribution studies, I hope to show how literary scholars at present can address the individuality of each pseudonymous case while not letting go of trans-historical, general problems of anonymous strategies. Voltaire’s use of multiple pseudonyms before and after releasing L’Ecossaise, a comédie sérieuse in which Voltaire attacks his enemy Elie-Cathérine Fréron, supports his philosophe friends at a crucial moment in history, and exemplifies his emerging taste for serious comedy and British drama calls into question traditional takes on pseudonymity, anonymity, and attribution by refusing to fit into the binary arguments of anonymous vs. attributed and authorial intent vs. the reader’s control.
Resumo:
PURPOSE: This study (EORTC 30891) attempted to demonstrate equivalent overall survival in patients with localized prostate cancer not suitable for local curative treatment treated with immediate or deferred androgen ablation. PATIENTS AND METHODS: We randomly assigned 985 patients with newly diagnosed prostate cancer T0-4 N0-2 M0 to receive androgen deprivation either immediately (n = 493) or on symptomatic disease progression or occurrence of serious complications (n = 492). RESULTS: Baseline characteristics were well balanced in the two groups. Median age was 73 years (range, 52 to 81). At a median follow-up of 7.8 years, 541 of 985 patients had died, mostly of prostate cancer (n = 193) or cardiovascular disease (n = 185). The overall survival hazard ratio was 1.25 (95% CI, 1.05 to 1.48; noninferiority P > .1) favoring immediate treatment, seemingly due to fewer deaths of nonprostatic cancer causes (P = .06). The time from randomization to progression of hormone refractory disease did not differ significantly, nor did prostate-cancer specific survival. The median time to the start of deferred treatment after study entry was 7 years. In this group 126 patients (25.6%) died without ever needing treatment (44% of the deaths in this arm). CONCLUSION: Immediate androgen deprivation resulted in a modest but statistically significant increase in overall survival but no significant difference in prostate cancer mortality or symptom-free survival. This must be weighed on an individual basis against the adverse effects of life-long androgen deprivation, which may be avoided in a substantial number of patients with a deferred treatment policy.
Resumo:
The associations between life events in the 12 months preceding an episode of self-poisoning resulting in hospital attendance (the index episode), and the suicide intent of this episode were compared in individuals for whom the index episode was their first, episode and in individuals in whom it was a recurrence of DSH. Results indicated a significant interaction between independent life events, repetition status, and gender in the prediction of suicide intent, the association between life events and intent being moderated by repetition status in women only. The results provide preliminary evidence to suggest the presence of a suicidal process in women, in which the impact of negative life events on suicide intent diminishes across episodes.
Understanding and Characterizing Shared Decision-Making and Behavioral Intent in Medical Uncertainty
Resumo:
Applying Theoretical Constructs to Address Medical Uncertainty Situations involving medical reasoning usually include some level of medical uncertainty. Despite the identification of shared decision-making (SDM) as an effective technique, it has been observed that the likelihood of physicians and patients engaging in shared decision making is lower in those situations where it is most needed; specifically in circumstances of medical uncertainty. Having identified shared decision making as an effective, yet often a neglected approach to resolving a lack of information exchange in situations involving medical uncertainty, the next step is to determine the way(s) in which SDM can be integrated and the supplemental processes that may facilitate its integration. SDM involves unique types of communication and relationships between patients and physicians. Therefore, it is necessary to further understand and incorporate human behavioral elements - in particular, behavioral intent - in order to successfully identify and realize the potential benefits of SDM. This paper discusses the background and potential interaction between the theories of shared decision-making, medical uncertainty, and behavioral intent. Identifying Shared Decision-Making Elements in Medical Encounters Dealing with Uncertainty A recent summary of the state of medical knowledge in the U.S. reported that nearly half (47%) of all treatments were of unknown effectiveness, and an additional 7% involved an uncertain tradeoff between benefits and harms. Shared decision-making (SDM) was identified as an effective technique for managing uncertainty when two or more parties were involved. In order to understand which of the elements of SDM are used most frequently and effectively, it is necessary to identify these key elements, and understand how these elements related to each other and the SDM process. The elements identified through the course of the present research were selected from basic principles of the SDM model and the “Data, Information, Knowledge, Wisdom” (DIKW) Hierarchy. The goal of this ethnographic research was to identify which common elements of shared decision-making patients are most often observed applying in the medical encounter. The results of the present study facilitated the understanding of which elements patients were more likely to exhibit during a primary care medical encounter, as well as determining variables of interest leading to more successful shared decision-making practices between patients and their physicians. Understanding Behavioral Intent to Participate in Shared Decision-Making in Medically Uncertain Situations Objective: This article describes the process undertaken to identify and validate behavioral and normative beliefs and behavioral intent of men between the ages of 45-70 with regard to participating in shared decision-making in medically uncertain situations. This article also discusses the preliminary results of the aforementioned processes and explores potential future uses of this information which may facilitate greater understanding, efficiency and effectiveness of doctor-patient consultations.Design: Qualitative Study using deductive content analysisSetting: Individual semi-structure patient interviews were conducted until data saturation was reached. Researchers read the transcripts and developed a list of codes.Subjects: 25 subjects drawn from the Philadelphia community.Measurements: Qualitative indicators were developed to measure respondents’ experiences and beliefs related to behavioral intent to participate in shared decision-making during medical uncertainty. Subjects were also asked to complete the Krantz Health Opinion Survey as a method of triangulation.Results: Several factors were repeatedly described by respondents as being essential to participate in shared decision-making in medical uncertainty. These factors included past experience with medical uncertainty, an individual’s personality, and the relationship between the patient and his physician.Conclusions: The findings of this study led to the development of a category framework that helped understand an individual’s needs and motivational factors in their intent to participate in shared decision-making. The three main categories include 1) an individual’s representation of medically uncertainty, 2) how the individual copes with medical uncertainty, and 3) the individual’s behavioral intent to seek information and participate in shared decision-making during times of medically uncertain situations.
Resumo:
Mapping is an important tool for the management of plant invasions. If landscapes are mapped in an appropriate way, results can help managers decide when and where to prioritize their efforts. We mapped vegetation with the aim of providing key information for managers on the extent, density and rates of spread of multiple invasive species across the landscape. Our case study focused on an area of Galapagos National Park that is faced with the challenge of managing multiple plant invasions. We used satellite imagery to produce a spatially-explicit database of plant species densities in the canopy, finding that 92% of the humid highlands had some degree of invasion and 41% of the canopy was comprised of invasive plants. We also calculated the rate of spread of eight invasive species using known introduction dates, finding that species with the most limited dispersal ability had the slowest spread rates while those able to disperse long distances had a range of spread rates. Our results on spread rate fall at the lower end of the range of published spread rates of invasive plants. This is probably because most studies are based on the entire geographic extent, whereas our estimates took plant density into account. A spatial database of plant species densities, such as the one developed in our case study, can be used by managers to decide where to apply management actions and thereby help curtail the spread of current plant invasions. For example, it can be used to identify sites containing several invasive plant species, to find the density of a particular species across the landscape or to locate where native species make up the majority of the canopy. Similar databases could be developed elsewhere to help inform the management of multiple plant invasions over the landscape.
Resumo:
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.
Resumo:
Mode of access: Internet.