961 resultados para document credibility
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.
Resumo:
This paper analyzes the linkages between the credibility of a target zone regime, the volatility of the exchange rate, and the width of the band where the exchange rate is allowed to fluctuate. These three concepts should be related since the band width induces a trade-off between credibility and volatility. Narrower bands should give less scope for the exchange rate to fluctuate but may make agents perceive a larger probability of realignment which by itself should increase the volatility of the exchange rate. We build a model where this trade-off is made explicit. The model is used to understand the reduction in volatility experienced by most EMS countries after their target zones were widened on August 1993. As a natural extension, the model also rationalizes the existence of non-official, implicit target zones (or fear of floating), suggested by some authors.
Resumo:
This paper presents an analysis of the credibility of the EMScurrencies that covers the period before and after the increase in thebands of fluctuation. Our credibility indicator is based on the inferredprobabilities derived from the estimation of a Markov-switching model(Hamilton (1989)) applied to the expected rate of depreciation. Theresults show that, for most of the currencies, credibility has improved,at least transitorily, after the increase in the bands. However, for allcurrencies, the credibility measured by the indicator proposed in thispaper has been eroded recently even with the widened bands.
Resumo:
The effectiveness of pre-play communication in achieving efficientoutcomes has long been a subject of controversy. In some environments,cheap talk may help to achieve coordination. However, Aumannconjectures that, in a variant of the Stag Hunt game, a signal forefficient play is not self-enforcing and concludes that an "agreementto play [the efficient outcome] conveys no information about what theplayers will do." Harsanyi and Selten (1988) cite this example as anillustration of risk-dominance vs. payoff-dominance. Farrell and Rabin(1996) agree with the logic, but suspect that cheap talk willnonetheless achieve efficiency. The conjecture is tested with one-waycommunication. When the sender first chooses a signal and then anaction, there is impressive coordination: a 94% probability for thepotentially efficient (but risky) play, given a signal for efficientplay. Without communication, efforts to achieve efficiency wereunsuccessful, as the proportion of B moves is only 35%. I also test ahypothesis that the order of the action and the signal affects theresults, finding that the decision order is indeed important. WhileAumann s conjecture is behaviorally disconfirmed when the signal isdetermined initially, the signal s credibility seems to be much moresuspect when the sender is known to have first chosen an action, andthe results are not statistically distinguishable from those whenthere is no signal. Some applications and issues in communication andcoordination are discussed.
Resumo:
Universidade Estadual de Campinas. Faculdade de Educação Física
Resumo:
Due to both the widespread and multipurpose use of document images and the current availability of a high number of document images repositories, robust information retrieval mechanisms and systems have been increasingly demanded. This paper presents an approach to support the automatic generation of relationships among document images by exploiting Latent Semantic Indexing (LSI) and Optical Character Recognition (OCR). We developed the LinkDI (Linking of Document Images) service, which extracts and indexes document images content, computes its latent semantics, and defines relationships among images as hyperlinks. LinkDI was experimented with document images repositories, and its performance was evaluated by comparing the quality of the relationships created among textual documents as well as among their respective document images. Considering those same document images, we ran further experiments in order to compare the performance of LinkDI when it exploits or not the LSI technique. Experimental results showed that LSI can mitigate the effects of usual OCR misrecognition, which reinforces the feasibility of LinkDI relating OCR output with high degradation.
Resumo:
Application of geographic information system (GIS) and global positioning system (GPS) technology in the Hlabisa community-based tuberculosis treatment programme documents the increase in accessibility to treatment after the expansion of the service from health facilities to include community workers and volunteers.
Resumo:
Service quality is assessed by customers along the dimensions of staff conduct, credibility, communication, and access to teller services. Credibility and staff conduct emerge as the highest loading first-order factors. This highlights the significance of rectifying mistakes while keeping customers informed, and employing branch staff that are responsive and civilized in their conduct. Discovery of a valid second-order factor, namely, overall customer service quality, underscores the importance of providing quality service across all its dimensions. For example, if the bank fails to rectify mistakes and keep customers informed but excels in all other dimensions, its overall customer service quality can still be rated poorly.
Resumo:
Many employees neither trained as career writers nor defining themselves as writers spend a major part of their time writing because, undeniably, writing is a central activity in organizations. To produce the high quality required to create and maintain credibility, organizations need to have professionals who can efficiently produce documents with substance, structure and style. This paper discusses issues relating to the management of corporate writing and editing, and presents practices and processes that managers can implement in their organizations to produce flawless documents, thereby avoiding the credibility crises that occur when writing is not taken seriously.
Resumo:
This paper discusses a document discovery tool based on Conceptual Clustering by Formal Concept Analysis. The program allows users to navigate e-mail using a visual lattice metaphor rather than a tree. It implements a virtual. le structure over e-mail where files and entire directories can appear in multiple positions. The content and shape of the lattice formed by the conceptual ontology can assist in e-mail discovery. The system described provides more flexibility in retrieving stored e-mails than what is normally available in e-mail clients. The paper discusses how conceptual ontologies can leverage traditional document retrieval systems and aid knowledge discovery in document collections.
Resumo:
Mestrado em Engenharia Química - Ramo Optimização Energética na Indústria Química
Resumo:
This paper focuses on the Portuguese results from an international survey on LIS students’ information literacy skills. The results’ analysis will be grounded on a literature review on the criteria application to evaluate information and determine the credibility by undergraduate students. The guidelines for the information evaluation, especially regarding credibility aspect, on three main information literacy frameworks will be presented. After an overall presentation of the main results, the analysis of the Portuguese survey results will focus on issues related to information evaluation skills, namely on criteria to assess information credibility and on difficulties to apply them.