5,264 research outputs found
Digital Positioning Plan for Algramar Winery.
The purpose of this study is to analyse the context and situation of Algramar, a SME (small medium size enterprise) in the wine sector, under the principles of the organic winemaking. The main aim pursued on this dissertation is to support the company in the penetration of the online market, further describing the challenges it will face and the most consistent plan to maximize the performance efficiency. More specifically, we will provide Algramar with market information about the characteristics of the digital channel, and carry out a research on particular actions to build a consistent brand image online. We will hold on a compound of resources that will ease the path to attract traffic to our website, and turn it into actual sales. This plan involves search engine strategic knowledge, support of social media and mailing tracking techniques. The resulting conclusions will open a continuous improvement cycle to reach digital performance perfection
Deanonymizing tor hidden service users through bitcoin transactions analysis
With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user. We investigate the feasibility of deanonymizing users of Tor hidden services who rely on Bitcoin as a method of payment. In particular, we correlate the public Bitcoin addresses of users and services with their corresponding transactions in the Blockchain. In other words, we establish a provable link between a Tor hidden service and its user by simply showing a transaction between their two corresponding addresses. This subtle information leakage breaks the anonymity of users and may have serious privacy consequences, depending on the sensitivity of the use case.
To demonstrate how an adversary can deanonymize hidden service users by exploiting leaked information from Bitcoin over Tor, we carried out a real-world experiment as a proof-of-concept. First, we collected public Bitcoin addresses of Tor hidden services from their .onion landing pages. Out of 1.5K hidden services we crawled, we found 88 unique Bitcoin addresses that have a healthy economic activity in 2017. Next, we collected public Bitcoin addresses from two channels of online social networks, namely, Twitter and the BitcoinTalk forum. Out of 5B tweets and 1M forum pages, we found 4.2K and 41K unique online identities, respectively, along with their public personal information and Bitcoin addresses. We then expanded the lists of Bitcoin addresses using closure analysis, where a Bitcoin address is used to identify a set of other addresses that are highly likely to be controlled by the same user. This allowed us to collect thousands more Bitcoin addresses for the users. By analyzing the transactions in the Blockchain, we were able to link up to 125 unique users to various hidden services, including sensitive ones, such as The Pirate Bay, Silk Road, and WikiLeaks. Finally, we traced concrete case studies to demonstrate the privacy implications of information leakage and user deanonymization. In particular, we show that Bitcoin addresses should always be assumed as compromised and can be used to deanonymize users
Examination of expense and investment policy for centrally managed items in the Air Force and Navy
Approved for public release, distribution unlimitedMBA Professional ReportA basic principle of fiscal law is the identification of an object of expenditure as either an investment or expense; the identification then determines the proper appropriation and means through which the item is acquired. Part of the decision logic for an investment/expense determination is whether the items are centrally managed. The policies and practices surrounding central management of items varies across military departments and sometimes varies within a military department. This report documents various processes, as they exist today, and chronicles changes that occurred recently in the U.S. Air Force. Analyzing those processes indicates unclear policy direction, which leads to nonstandard implementation and problems with compliance. The presence of centralized information technology seems to lessen confusion and aid standardization of practices. Recommendations are offered for policy makers who may be considering changing policies
Internet Marketing for Profit Organizations: A framework for the implementation of strategic internet marketing
Merged with duplicate record 10026.1/828 on 13.03.2017 by CS (TIS)The development of the Internet has significantly changed the face of established markets
and operation approaches across a tremendous spectrum of different industries. Within
the competitive environment of those industries, the opportunities and risks derived from
the new platform are so ubiquitous that unused opportunities quickly translate into
potential risks. Those opportunities and risks demand for a structured approach how to
implement a sustainable Internet marketing strategy that targets clear business objectives.
Marketing and strategic management theory describes very clear structural principles
towards their operational implementation. Based on those principles an extensive
literature review has been conducted which confirms the result from representative
statistics that demonstrate the lack of a comprehensive framework for strategic Internet
marketing. The distinct result of this research is such a comprehensive framework which
has been directly derived from the illustrated principles of strategic management and
Internet marketing. All major components of this generic framework are designed,
evaluated in dedicated surveys and validated in extensive case studies.
The main achievements of the research are:
• A comprehensive review of the current state-of-the-art Internet marketing
strategies
• Conceptual specification of a strategic Internet marketing framework with generic
applicability to profit organizations
• Demonstration of the practical feasibility of the proposed framework at the
implementation level (via several examples like the SIMTF and SIMPF)
• Confirmation of the applicability of the framework based upon a survey of potential
beneficiaries
• Validation of the effectiveness of the approach via case study scenarios
Changing the understanding of a former technical discipline, the thesis describes how
Internet marketing becomes a precise strategic instrument for profit organizations. The
new structured, complete and self-similar framework facilitates sales organizations to
significantly increase the effectiveness and efficiency of their marketing operations.
Furthermore, the framework ensures a high level of transparency about the impact and
benefit of individual activities. The new model explicitly answers concerns and problems
raised and documented in existing research and accommodate for the current limitations
of strategic Internet marketing. The framework allows evaluating existing as well as future
Internet marketing tactics and provides a reference model for all other definitions of
objectives, KPI and work packages. Finally this thesis also matures the subject matter of
Internet marketing as a discipline of independent scientific research providing an
underlying structure for subsequent studies.Darmstadt Node of the CSCAN Network
at University of Applied Sciences, Darmstad
- …