435 resultados para Theft detections


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Macroscopic Fundamental Diagram (MFD) relates space-mean density and flow, and the existence with dynamic features was confirmed in congested urban network in downtown Yokohama with real data set. Since the MFD represents the area-wide network traffic performances, studies on perimeter control strategies and an area traffic state estimation utilizing the MFD concept has been reported. However, limited works have been reported on real world example from signalised arterial network. This paper fuses data from multiple sources (Bluetooth, Loops and Signals) and presents a framework for the development of the MFD for Brisbane, Australia. Existence of the MFD in Brisbane arterial network is confirmed. Different MFDs (from whole network and several sub regions) are evaluated to discover the spatial partitioning for network performance representation. The findings confirmed the usefulness of appropriate network partitioning for traffic monitoring and incident detections. The discussion addressed future research directions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australian households currently pay the second highest “honesty tax” in the world at $290 per household per year, levied by retailers to offset the $AU1.86 billion in losses they incur from customer theft. Theft is only one type of consumer deviance, which can include behaviours that are against the law, an organisation’s policy, or behaviours that violate normally accepted conduct. An individual’s “deviant behaviour” can vary from one person to the next. My research exploring consumer definitions of right and wrong has found a number of things can inform what an individual thinks is “deviant behaviour”, beyond what the law or organisational policy states as right or wrong. Consumers then use their own justifications to excuse their actions...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What is ‘best practice’ when it comes to managing intellectual property rights in participatory media content? As commercial media and entertainment business models have increasingly come to rely upon the networked productivity of end-users (Banks and Humphreys 2008) this question has been framed as a problem of creative labour made all the more precarious by changing employment patterns and work cultures of knowledge-intensive societies and globalising economies (Banks, Gill and Taylor 2014). This paper considers how the problems of ownership are addressed in non-commercial, community-based arts and media contexts. Problems of labour are also manifest in these contexts (for example, reliance on volunteer labour and uncertain economic reward for creative excellence). Nonetheless, managing intellectual property rights in collaborative creative works that are created in community media and arts contexts is no less challenging or complex than in commercial contexts. This paper takes as its focus a particular participatory media practice known as ‘digital storytelling’. The digital storytelling method, formalised by the Centre for Digital Storytelling (CDS) from the mid-1990s, has been internationally adopted and adapted for use in an open-ended variety of community arts, education, health and allied services settings (Hartley and McWilliam 2009; Lambert 2013; Lundby 2008; Thumin 2012). It provides a useful point of departure for thinking about a range of collaborative media production practices that seek to address participation ‘gaps’ (Jenkins 2006). However the outputs of these activities, including digital stories, cannot be fully understood or accurately described as user-generated content. For this reason, digital storytelling is taken here to belong to a category of participatory media activity that has been described as ‘co-creative’ media (Spurgeon 2013) in order to improve understanding of the conditions of mediated and mediatized participation (Couldry 2008). This paper reports on a survey of the actual copyrighting practices of cultural institutions and community-based media arts practitioners that work with digital storytelling and similar participatory content creation methods. This survey finds that although there is a preference for Creative Commons licensing a great variety of approaches are taken to managing intellectual property rights in co-creative media. These range from the use of Creative Commons licences (for example, Lambert 2013, p.193) to retention of full copyrights by storytellers, to retention of certain rights by facilitating organisations (for example, broadcast rights by community radio stations and public service broadcasters), and a range of other shared rights arrangements between professional creative practitioners, the individual storytellers and communities with which they collaborate, media outlets, exhibitors and funders. This paper also considers how aesthetic and ethical considerations shape responses to questions of intellectual property rights in community media arts contexts. For example, embedded in the CDS digital storytelling method is ‘a critique of power and the numerous ways that rank is unconsciously expressed in engagements between classes, races and gender’ (Lambert 117). The CDS method privileges the interests of the storyteller and, through a transformative workshop process, aims to generate original individual stories that, in turn, reflect self-awareness of ‘how much the way we live is scripted by history, by social and cultural norms, by our own unique journey through a contradictory, and at times hostile, world’ (Lambert 118). Such a critical approach is characteristic of co-creative media practices. It extends to a heightened awareness of the risks of ‘story theft’ and the challenges of ownership and informs ideas of ‘best practice’ amongst creative practitioners, teaching artists and community media producers, along with commitments to achieving equitable solutions for all participants in co-creative media practice (for example, Lyons-Reid and Kuddell nd.). Yet, there is surprisingly little written about the challenges of managing intellectual property produced in co-creative media activities. A dialogic sense of ownership in stories has been identified as an indicator of successful digital storytelling practice (Hayes and Matusov 2005) and is helpful to grounding the more abstract claims of empowerment for social participation that are associated with co-creative methods. Contrary to the ‘change from below’ philosophy that underpins much thinking about co-creative media, however, discussions of intellectual property usually focus on how methods such as digital storytelling contribute to the formation of copyright law-compliant subjects, particularly when used in educational settings (for example, Ohler nd.). This also exposes the reliance of co-creative methods on the creative assets storytellers (rather than on the copyrighted materials of the media cultures of storytellers) as a pragmatic response to the constraints that intellectual property right laws impose on the entire category of participatory media. At the level of practical politics, it also becomes apparent that co-creative media practitioners and storytellers located in copyright jurisdictions governed by ‘fair use’ principles have much greater creative flexibility than those located in jurisdictions governed by ‘fair dealing’ principles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prostitution has been closely associated with the transportation of women convicts to British penal colonies. Convict labor was used to found a number of British colonies including Barbados, Jamaica, Maryland, Virginia, Singapore, New South Wales, Tasmania, and Western Australia. Between 1607 and 1939, Britain transported approximately 400,000 convicts, 162,000 of whom came to Australia and about 50,000 to North America. Significant numbers of women were among those transported to the Australian and North American colonies, although their numbers were relatively small in comparison to male convicts. Transportation was typically reserved for the most recalcitrant of female offenders. Most women transported came from working-class populations, resided in metropolitan centers, and were single at the time of their offense. Although few of these women were actually sentenced for activities associated with prostitution, large numbers had a history of involvement with prostitution. Transportation was considered to offer prostitutes a chance at redemption, with colonial commentators drawing contrasts between the Old World and its vice-ridden sensuality and the colonies, which offered opportunities for redemption through religious devotion and hard work. Many women transported to the Australian colonies were described by officials as being "on the town" at their time of apprehension and were collectively considered to be "damned whores, possessed of neither virtue nor honesty". Recently, historians have argued that these assessments were emblematic of middle-class prejudices toward the open and aggressive sexuality of working-class women. The number of convict women involved in prostitution may have been higher than recorded crimes, typically involving "larceny", suggest. A number of women were charged with theft from men who had paid them (or, in some instances, refused to pay them) for sex. Historians have estimated that one in five convict women were part-time or full-time prostitutes before transportation. Many continued in prostitution after transportation, with prostitution becoming an important element in the social and economic life of the Australian colonies, where, between 1788-1830, men outnumbered women six to one. Officially, prostitution was tolerated to dissuade men from vice. For women, prostitution presented a means of securing physical protection and accommodation at a time when general amenities and employment opportunities were restricted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Due to their unobtrusive nature, vision-based approaches to tracking sports players have been preferred over wearable sensors as they do not require the players to be instrumented for each match. Unfortunately however, due to the heavy occlusion between players, variation in resolution and pose, in addition to fluctuating illumination conditions, tracking players continuously is still an unsolved vision problem. For tasks like clustering and retrieval, having noisy data (i.e. missing and false player detections) is problematic as it generates discontinuities in the input data stream. One method of circumventing this issue is to use an occupancy map, where the field is discretised into a series of zones and a count of player detections in each zone is obtained. A series of frames can then be concatenated to represent a set-play or example of team behaviour. A problem with this approach though is that the compressibility is low (i.e. the variability in the feature space is incredibly high). In this paper, we propose the use of a bilinear spatiotemporal basis model using a role representation to clean-up the noisy detections which operates in a low-dimensional space. To evaluate our approach, we used a fully instrumented field-hockey pitch with 8 fixed high-definition (HD) cameras and evaluated our approach on approximately 200,000 frames of data from a state-of-the-art real-time player detector and compare it to manually labeled data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective To evaluate the performance of China’s infectious disease automated alert and response system in the detection of outbreaks of hand, foot and mouth (HFM) disease. Methods We estimated size, duration and delay in reporting HFM disease outbreaks from cases notified between 1 May 2008 and 30 April 2010 and between 1 May 2010 and 30 April 2012, before and after automatic alert and response included HFM disease. Sensitivity, specificity and timeliness of detection of aberrations in the incidence of HFM disease outbreaks were estimated by comparing automated detections to observations of public health staff. Findings The alert and response system recorded 106 005 aberrations in the incidence of HFM disease between 1 May 2010 and 30 April 2012 – a mean of 5.6 aberrations per 100 days in each county that reported HFM disease. The response system had a sensitivity of 92.7% and a specificity of 95.0%. The mean delay between the reporting of the first case of an outbreak and detection of that outbreak by the response system was 2.1 days. Between the first and second study periods, the mean size of an HFM disease outbreak decreased from 19.4 to 15.8 cases and the mean interval between the onset and initial reporting of such an outbreak to the public health emergency reporting system decreased from 10.0 to 9.1 days. Conclusion The automated alert and response system shows good sensitivity in the detection of HFM disease outbreaks and appears to be relatively rapid. Continued use of this system should allow more effective prevention and limitation of such outbreaks in China.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Automatic Vehicle Identification Systems are being increasingly used as a new source of travel information. As in the last decades these systems relied on expensive new technologies, few of them were scattered along a networks making thus Travel-Time and Average Speed estimation their main objectives. However, as their price dropped, the opportunity of building dense AVI networks arose, as in Brisbane where more than 250 Bluetooth detectors are now installed. As a consequence this technology represents an effective means to acquire accurate time dependant Origin Destination information. In order to obtain reliable estimations, however, a number of issues need to be addressed. Some of these problems stem from the structure of a network made out of isolated detectors itself while others are inherent of Bluetooth technology (overlapping detection area, missing detections,\...). The aim of this paper is threefold: First, after having presented the level of details that can be reached with a network of isolated detectors we present how we modelled Brisbane's network, keeping only the information valuable for the retrieval of trip information. Second, we give an overview of the issues inherent to the Bluetooth technology and we propose a method for retrieving the itineraries of the individual Bluetooth vehicles. Last, through a comparison with Brisbane Transport Strategic Model results, we highlight the opportunities and the limits of Bluetooth detectors networks. The aim of this paper is twofold. We first give a comprehensive overview of the aforementioned issues. Further, we propose a methodology that can be followed, in order to cleanse, correct and aggregate Bluetooth data. We postulate that the methods introduced by this paper are the first crucial steps that need to be followed in order to compute accurate Origin-Destination matrices in urban road networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of tracking a maneuvering target in clutter. In such an environment, missed detections and false alarms make it impossible to decide, with certainty, the origin of received echoes. Processing radar returns in cluttered environments consists of three functions: 1) target detection and plot formation, 2) plot-to-track association, and 3) track updating. Two inadequacies of the present approaches are 1) Optimization of detection characteristics have not been considered and 2) features that can be used in the plot-to-track correlation process are restricted to a specific class. This paper presents a new approach to overcome these limitations. This approach facilitates tracking of a maneuvering target in clutter and improves tracking performance for weak targets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose This study aims to use opportunity as a theoretical lens to investigate how the spatio-temporal and social dimensions of the consumption environment create perceived opportunities for consumers to misbehave. Design/methodology/approach Drawing on routine activity theory and social impact theory, the authors use two experiments to demonstrate that spatio-temporal and social dimensions can explain consumer theft in retail settings. Findings Study 1 reveals mixed empirical support for the basic dimensions of routine activity theory, which posits that the opportunity to thieve is optimised when a motivated offender, suitable target and the absence of a capable formal guardian transpire in time and space. Extending the notion of guardianship, Study 2 tests social impact theory and shows that informal guardianship impacts the likelihood of theft under optimal routine activity conditions. Originality/value The study findings highlight important implications for academicians and retail managers: rather than focusing on the uncontrollable characteristics of thieving offenders, more controllable spatio-temporal and social factors of the retail environment can be actively monitored and manipulated to reduce perceived opportunities for consumer misbehaviour.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Early detection surveillance programs aim to find invasions of exotic plant pests and diseases before they are too widespread to eradicate. However, the value of these programs can be difficult to justify when no positive detections are made. To demonstrate the value of pest absence information provided by these programs, we use a hierarchical Bayesian framework to model estimates of incursion extent with and without surveillance. A model for the latent invasion process provides the baseline against which surveillance data are assessed. Ecological knowledge and pest management criteria are introduced into the model using informative priors for invasion parameters. Observation models assimilate information from spatio-temporal presence/absence data to accommodate imperfect detection and generate posterior estimates of pest extent. When applied to an early detection program operating in Queensland, Australia, the framework demonstrates that this typical surveillance regime provides a modest reduction in the estimate that a surveyed district is infested. More importantly, the model suggests that early detection surveillance programs can provide a dramatic reduction in the putative area of incursion and therefore offer a substantial benefit to incursion management. By mapping spatial estimates of the point probability of infestation, the model identifies where future surveillance resources can be most effectively deployed.