112 resultados para phishing emails
Resumo:
This paper presents a lattice-based visual metaphor for knowledge discovery in electronic mail. It allows a user to navigate email using a visual lattice metaphor rather than a tree structure. By using such a conceptual multi-hierarchy, the content and shape of the lattice can be varied to accommodate any number of queries against the email collection. The system provides more flexibility in retrieving stored emails and can be generalised to any electronic documents. The paper presents the underlying mathematical structures, and a number of examples of the lattice and multi-hierarchy working with a prototypical email collection.
Resumo:
CEM is an email management system which stores its email in a concept lattice rather than in the usual tree structure. By using such a conceptual multi-hierarchy, the system provides more flexibility in retrieving stored emails. The paper presents the underlying mathematical structures, discusses requirements for their maintenance and presents their implementation.
Resumo:
Common craft make short videos which explain in simple terms some common concepts and technologies used in learning and teaching. These are available through The Common Craft Store, which offers versions of videos that are: Downloadable files Presentation-quality Licensed for workplace use You can find the free, online versions of the videos on The Common Craft Show. Topics include phishing, RSS, wikis, Twitter, social networking, social bookmarking, web search strategies, social media, podcasting, sharing photos online and many more.
Resumo:
Hace varios años atrás el uso del celular era un bien que muy pocas personas tenían la oportunidad de adquirirlo. Por un lado esta adquisición era muy cara y además había muy poca oferta en el mercado. El uso de los celulares era estrictamente para llamadas urgentes y muy pocas personas podían tener este bien en sus manos. A medida que iban avanzando los años las personas generaban mas necesidades y las empresas hacían todo lo posible por satisfacer estas necesidades. Por esta misma razón las empresas empezaron a ir más allá que simplemente satisfacer estas necesidades. Por lo que empezaron a no solo crear un simple celular que sirviera para llamadas sino un celular que también incluyera cámara, video, mensajes de texto, mails, bluetooth, música, entre más funciones. Hoy en día un celular que no tenga este tipo de funciones es obsoleto y ahora las personas se vuelven cada vez más dependientes a un teléfono celular. Por eso es importante investigar si es verdaderamente importante y necesario tener toda la vida de las personas en el celular, si estas nuevas tecnologías son relevantes para la sustentabilidad de las empresas y también que beneficios trae la evolución de las nuevas tecnologías. En la actualidad se ha dado que para las personas es fundamental el uso de los smartphones, no solo en la vida personal sino también laboral. Por eso es relevante conocer qué tan importante es el Smartphone para las personas y también cómo se puede aprovechar esta tecnología. Para la sociedad en la que vivimos actualmente, estar en contacto con el mundo es fundamental y también ser parte de el, por lo que la aparición de estos smartphones ha permitido que ese acercamiento sea mas rápido y con mayor facilidad. En los últimos años, ha habido un boom en la oferta y demanda de este tipo de productos, en el cual las empresas han estado peleando por ofrecer tanto nuevos dispositivos y tecnologías, como también nuevos servicios en cuanto a conectividad y aplicaciones de estos.
Resumo:
This is the INFO2009 project for group 17 Our topic is Security. Our resource is a website that contains links to different questionnaires we created to help educate people in various subtopics of Security
Resumo:
An E-Learning Gateway for the latest news and information relating to Computer Crime for INFO2009
Resumo:
Presentation slides + mini quiz on the topic of cybercrime.
Resumo:
El proceso administrativo y de compras de OPL Carga tiene algunas falencias entre ellas: fallas en la Comunicación entre el personal operativo, no se realizan llamadas internas usando con frecuencia el email, produciendo la saturación de solicitudes las cuales terminan sin ser resueltas en cuanto a roles se refiere, no hay enfoque de procesos en vista que no se tiene claras las tareas de cada cargo, adicionalmente no hay claridad en los subprocesos, perjudicando el proceso con el aumento de costos, pérdida de tiempo, las responsabilidades de los funcionario no todas las veces se ejecutan en el tiempo asignado, el liderazgo compartido presenta ambigüedades. Objetivos: Definir el trabajo en equipo en el proceso administrativo y de compras en OPL carga de Bucaramanga. La investigación que a realizar es de tipo descriptivo, busca descubrir las falencias o características que permiten diseñar y desarrollar un modelo de solución para los problemas del equipo de OPL Carga S.A.S. Materiales y métodos: La investigación efectuada es de tipo descriptivo, el objetivo es definir el modelo del trabajo en equipo y describir las falencias en el proceso administrativo y de compras en OPL carga de Bucaramanga, que permitan obtener un diagnóstico integral que conlleve a la implementación de estrategias de solución. Resultados: Se identificaron las falencias en los siguientes aspectos: Variable comunicación, rendimiento, destrezas complementarias, propósito significativo y meta específicas de los funcionarios en OPL carga sección administrativa. Conclusiones: El modelo de trabajo en equipo que OPL aplica es jerárquico, en el que se ofrece estabilidad, seguridad, se toman decisiones en forma piramidal, mediante la planeación de tareas, la colaboración, igualdad y respeto por los miembros, trabajando en pro de la solución de problemas. Se construyó un plano conceptual que permitió exponer la interpretación que la estudiante tiene de las teorías, investigaciones y antecedentes válidos para la comprensión del problema investigado. Área comunicacional: Coordinar acciones tendientes para que los funcionarios respondan a tiempo los emails atenientes a su trabajo. Área condiciones de trabajo: Clarificar y diseñar las reglas de comportamiento al interior de los equipos de trabajo que redunden en el mejoramiento del mismo y la búsqueda de soluciones oportunas. Área metas específicas: Procurar mediante auditorías el cumplimiento de las metas y objetivos propuestos por cada equipo de trabajo.
Resumo:
A new distributed spam filter system based on mobile agent is proposed in this paper. We introduce the application of mobile agent technology to the spam filter system. The system architecture, the work process, the pivotal technology of the distributed spam filter system based on mobile agent, and the Naive Bayesian filter method are described in detail. The experiment results indicate that the system can prevent spam emails effectively.
Resumo:
We introduce a model for a pair of nonlinear evolving networks, defined over a common set of vertices, sub ject to edgewise competition. Each network may grow new edges spontaneously or through triad closure. Both networks inhibit the other’s growth and encourage the other’s demise. These nonlinear stochastic competition equations yield to a mean field analysis resulting in a nonlinear deterministic system. There may be multiple equilibria; and bifurcations of different types are shown to occur within a reduced parameter space. This situation models competitive peer-to-peer communication networks such as BlackBerry Messenger displacing SMS; or instant messaging displacing emails.
Resumo:
This article analyses the results of an empirical study on the 200 most popular UK-based websites in various sectors of e-commerce services. The study provides empirical evidence on unlawful processing of personal data. It comprises a survey on the methods used to seek and obtain consent to process personal data for direct marketing and advertisement, and a test on the frequency of unsolicited commercial emails (UCE) received by customers as a consequence of their registration and submission of personal information to a website. Part One of the article presents a conceptual and normative account of data protection, with a discussion of the ethical values on which EU data protection law is grounded and an outline of the elements that must be in place to seek and obtain valid consent to process personal data. Part Two discusses the outcomes of the empirical study, which unveils a significant departure between EU legal theory and practice in data protection. Although a wide majority of the websites in the sample (69%) has in place a system to ask separate consent for engaging in marketing activities, it is only 16.2% of them that obtain a consent which is valid under the standards set by EU law. The test with UCE shows that only one out of three websites (30.5%) respects the will of the data subject not to receive commercial communications. It also shows that, when submitting personal data in online transactions, there is a high probability (50%) of incurring in a website that will ignore the refusal of consent and will send UCE. The article concludes that there is severe lack of compliance of UK online service providers with essential requirements of data protection law. In this respect, it suggests that there is inappropriate standard of implementation, information and supervision by the UK authorities, especially in light of the clarifications provided at EU level.
Resumo:
Organizations introduce acceptable use policies to deter employee computer misuse. Despite the controlling, monitoring and other forms of interventions employed, some employees misuse the organizational computers to carry out their personal work such as sending emails, surfing internet, chatting, playing games etc. These activities not only waste productive time of employees but also bring a risk to the organization. A questionnaire was administrated to a random sample of employees selected from large and medium scale software development organizations, which measured the work computer misuse levels and the factors that influence such behavior. The presence of guidelines provided no evidence of significant effect on the level of employee computer misuse. Not having access to Internet /email away from work and organizational settings were identified to be the most significant influences of work computer misuse.
Resumo:
Interpretation of utterances affects an interrogator’s determination of human from machine during live Turing tests. Here, we consider transcripts realised as a result of a series of practical Turing tests that were held on 23 June 2012 at Bletchley Park, England. The focus in this paper is to consider the effects of lying and truth-telling on the human judges by the hidden entities, whether human or a machine. Turing test transcripts provide a glimpse into short text communication, the type that occurs in emails: how does the reader determine truth from the content of a stranger’s textual message? Different types of lying in the conversations are explored, and the judge’s attribution of human or machine is investigated in each test.
Resumo:
It is a known fact that some employees misuse the organizational computers to do their personal work such as sending emails, surfing the Internet, chatting, playing games. These activities not only waste productive time of employees but also bring a risk factor to the organization. This affects organizations in the software industry very much as almost all of their employees are connected to the Internet throughout them day./ By introducing an Acceptable Use Policy (AUP) for an organization, it is believed that the computer misuse by its employees could be reduced. In many countries Acceptable Use Policies are used and they have been studied with various perspectives. In Sri Lankan context research on these areas are scarce. This research explored the situation in Sri Lanka with respect to AUPs and their effectiveness./ A descriptive study was carried out to identify the large and medium scale software development organizations that had implemented computer usage guidelines for employees. A questionnaire was used to gather information regarding employee’s usual computer usage behavior. Stratified random sampling was employed to draw a representative sample from the population./ Majority of the organizations have not employed a written guideline on acceptable use of work computers. The study results did not provide evidence to conclude that the presence or non presence of an AUP has a significant difference in computer use behaviors of employees. A significant negative correlation was observed between level of awareness about AUP and misuse. Access to the Internet and organizational settings were identified as significant factors that influence employee computer misuse behavior.
Resumo:
This article reports the results of a mixed-methods approach to investigating the association between globalisation and MATESOL in UK universities. Qualitative and quantitative data collected from academic staff through eight emails, four interviews and 41 questionnaires indicate that the globalised context of higher education have affected these programmes in a number of ways including an increasing interest in recruiting more international students and a growing awareness about the need for curriculum and content modifications. The analysis of the data suggests that although change has been an inherent characteristic of these MAs over the past decade, it has been implemented gradually and conservatively, often relying on a dialectic relationship between academic staff and universities’ policies. The results imply that factors other than globalisation have also been at work. Many of the participants contend that globalisation has not lowered the quality of these MAs or standards of good practice.