13,213 research outputs found
The innocent hill walker
Criminals are going to ever more extreme lengths to get access to company systems and home computers, according to Les Ball and Natalie Coull
Communique, 26 January 2004
Main story: "Netware? Beware!".
Second story: "Web cache-'n'-carry shuts up shop".
Item: "Basement jacks for self-service musicians...".
Item: "No-strings-attached networking".
Feature: "ISS-Windows98 relationship: the 5-year ditch?".
Contact information: "Contacting Information Systems Services"
A Holistic View of Identity Theft Tax Refund Fraud
This thesis attempts to explain what identity theft tax refund fraud is and how the issue has developed over the years. It presents a holistic, historic view of the problem as well as how it has been addressed. It primarily relies on reports from the Internal Revenue Service (IRS), Treasury Inspector General for Tax Administration (TIGTA), Government Accountability Office (GAO) and National Taxpayer Advocate (NTA) in its assessment. It does not examine foreign tax administrations’ methods of dealing with identity theft refund fraud or the extent of the issue in other principalities, and therefore this is an area in need of further research. This thesis does not attempt to make an argument for the efficacy of funding for the IRS either, which is an area that could be further studied. It also does not deal with employment-related identity fraud, which some relate to identity theft refund fraud
Cyber security fear appeals:unexpectedly complicated
Cyber security researchers are starting to experiment with fear appeals, with a wide variety of designs and reported efficaciousness. This makes it hard to derive recommendations for designing and deploying these interventions. We thus reviewed the wider fear appeal literature to arrive at a set of guidelines to assist cyber security researchers. Our review revealed a degree of dissent about whether or not fear appeals are indeed helpful and advisable. Our review also revealed a wide range of fear appeal experimental designs, in both cyber and other domains, which confirms the need for some standardized guidelines to inform practice in this respect. We propose a protocol for carrying out fear appeal experiments, and we review a sample of cyber security fear appeal studies, via this lens, to provide a snapshot of the current state of play. We hope the proposed experimental protocol will prove helpful to those who wish to engage in future cyber security fear appeal research
An approach toward function allocation between humans and machines in space station activities
Basic guidelines and data to assist in the allocation of functions between humans and automated systems in a manned permanent space station are provided. Human capabilities and limitations are described. Criteria and guidelines for various levels of automation and human participation are described. A collection of human factors data is included
Click carefully before you quote : citing internet-based sources
At the end of the 20th century, access to information provided by the World Wide Web (WWW) is changing as never before. The fast availability of current medical literature and the availability of tools for easy access to information, as well as for the easy production of information, have confronted research physicians, scholars, and students with new kinds of problems, many of which concern us personally. Quality control, difficulty establishing basic citation components, lack of standard guidelines for citing, as well as the short lifetime of Internet addresses concern us deeply. Some of these problems could be solved by the concept of an "Online-Library of Medicine" presented in the following paper. Since, however, at the present time there are no good answers to the problems regarding citing Internet-based sources, a Web surfer must keep in his or her mind the motto “caveat lector” (let the reader beware) - or, rather, in the spirit of our time: click c@refully before you cite
- …