5,264 research outputs found

    Emerging Technologies, Law Enforcement Responses, and National Security

    Get PDF

    Digital Positioning Plan for Algramar Winery.

    Get PDF
    The purpose of this study is to analyse the context and situation of Algramar, a SME (small medium size enterprise) in the wine sector, under the principles of the organic winemaking. The main aim pursued on this dissertation is to support the company in the penetration of the online market, further describing the challenges it will face and the most consistent plan to maximize the performance efficiency. More specifically, we will provide Algramar with market information about the characteristics of the digital channel, and carry out a research on particular actions to build a consistent brand image online. We will hold on a compound of resources that will ease the path to attract traffic to our website, and turn it into actual sales. This plan involves search engine strategic knowledge, support of social media and mailing tracking techniques. The resulting conclusions will open a continuous improvement cycle to reach digital performance perfection

    Deanonymizing tor hidden service users through bitcoin transactions analysis

    Get PDF
    With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user. We investigate the feasibility of deanonymizing users of Tor hidden services who rely on Bitcoin as a method of payment. In particular, we correlate the public Bitcoin addresses of users and services with their corresponding transactions in the Blockchain. In other words, we establish a provable link between a Tor hidden service and its user by simply showing a transaction between their two corresponding addresses. This subtle information leakage breaks the anonymity of users and may have serious privacy consequences, depending on the sensitivity of the use case. To demonstrate how an adversary can deanonymize hidden service users by exploiting leaked information from Bitcoin over Tor, we carried out a real-world experiment as a proof-of-concept. First, we collected public Bitcoin addresses of Tor hidden services from their .onion landing pages. Out of 1.5K hidden services we crawled, we found 88 unique Bitcoin addresses that have a healthy economic activity in 2017. Next, we collected public Bitcoin addresses from two channels of online social networks, namely, Twitter and the BitcoinTalk forum. Out of 5B tweets and 1M forum pages, we found 4.2K and 41K unique online identities, respectively, along with their public personal information and Bitcoin addresses. We then expanded the lists of Bitcoin addresses using closure analysis, where a Bitcoin address is used to identify a set of other addresses that are highly likely to be controlled by the same user. This allowed us to collect thousands more Bitcoin addresses for the users. By analyzing the transactions in the Blockchain, we were able to link up to 125 unique users to various hidden services, including sensitive ones, such as The Pirate Bay, Silk Road, and WikiLeaks. Finally, we traced concrete case studies to demonstrate the privacy implications of information leakage and user deanonymization. In particular, we show that Bitcoin addresses should always be assumed as compromised and can be used to deanonymize users

    Privacy & law enforcement

    Get PDF

    Examination of expense and investment policy for centrally managed items in the Air Force and Navy

    Get PDF
    Approved for public release, distribution unlimitedMBA Professional ReportA basic principle of fiscal law is the identification of an object of expenditure as either an investment or expense; the identification then determines the proper appropriation and means through which the item is acquired. Part of the decision logic for an investment/expense determination is whether the items are centrally managed. The policies and practices surrounding central management of items varies across military departments and sometimes varies within a military department. This report documents various processes, as they exist today, and chronicles changes that occurred recently in the U.S. Air Force. Analyzing those processes indicates unclear policy direction, which leads to nonstandard implementation and problems with compliance. The presence of centralized information technology seems to lessen confusion and aid standardization of practices. Recommendations are offered for policy makers who may be considering changing policies

    School management information systems and value for money 2010

    Get PDF

    Internet Marketing for Profit Organizations: A framework for the implementation of strategic internet marketing

    Get PDF
    Merged with duplicate record 10026.1/828 on 13.03.2017 by CS (TIS)The development of the Internet has significantly changed the face of established markets and operation approaches across a tremendous spectrum of different industries. Within the competitive environment of those industries, the opportunities and risks derived from the new platform are so ubiquitous that unused opportunities quickly translate into potential risks. Those opportunities and risks demand for a structured approach how to implement a sustainable Internet marketing strategy that targets clear business objectives. Marketing and strategic management theory describes very clear structural principles towards their operational implementation. Based on those principles an extensive literature review has been conducted which confirms the result from representative statistics that demonstrate the lack of a comprehensive framework for strategic Internet marketing. The distinct result of this research is such a comprehensive framework which has been directly derived from the illustrated principles of strategic management and Internet marketing. All major components of this generic framework are designed, evaluated in dedicated surveys and validated in extensive case studies. The main achievements of the research are: • A comprehensive review of the current state-of-the-art Internet marketing strategies • Conceptual specification of a strategic Internet marketing framework with generic applicability to profit organizations • Demonstration of the practical feasibility of the proposed framework at the implementation level (via several examples like the SIMTF and SIMPF) • Confirmation of the applicability of the framework based upon a survey of potential beneficiaries • Validation of the effectiveness of the approach via case study scenarios Changing the understanding of a former technical discipline, the thesis describes how Internet marketing becomes a precise strategic instrument for profit organizations. The new structured, complete and self-similar framework facilitates sales organizations to significantly increase the effectiveness and efficiency of their marketing operations. Furthermore, the framework ensures a high level of transparency about the impact and benefit of individual activities. The new model explicitly answers concerns and problems raised and documented in existing research and accommodate for the current limitations of strategic Internet marketing. The framework allows evaluating existing as well as future Internet marketing tactics and provides a reference model for all other definitions of objectives, KPI and work packages. Finally this thesis also matures the subject matter of Internet marketing as a discipline of independent scientific research providing an underlying structure for subsequent studies.Darmstadt Node of the CSCAN Network at University of Applied Sciences, Darmstad
    • …
    corecore