13,213 research outputs found

    The innocent hill walker

    Get PDF
    Criminals are going to ever more extreme lengths to get access to company systems and home computers, according to Les Ball and Natalie Coull

    Communique, 26 January 2004

    No full text
    Main story: "Netware? Beware!". Second story: "Web cache-'n'-carry shuts up shop". Item: "Basement jacks for self-service musicians...". Item: "No-strings-attached networking". Feature: "ISS-Windows98 relationship: the 5-year ditch?". Contact information: "Contacting Information Systems Services"

    A Holistic View of Identity Theft Tax Refund Fraud

    Get PDF
    This thesis attempts to explain what identity theft tax refund fraud is and how the issue has developed over the years. It presents a holistic, historic view of the problem as well as how it has been addressed. It primarily relies on reports from the Internal Revenue Service (IRS), Treasury Inspector General for Tax Administration (TIGTA), Government Accountability Office (GAO) and National Taxpayer Advocate (NTA) in its assessment. It does not examine foreign tax administrations’ methods of dealing with identity theft refund fraud or the extent of the issue in other principalities, and therefore this is an area in need of further research. This thesis does not attempt to make an argument for the efficacy of funding for the IRS either, which is an area that could be further studied. It also does not deal with employment-related identity fraud, which some relate to identity theft refund fraud

    Cyber security fear appeals:unexpectedly complicated

    Get PDF
    Cyber security researchers are starting to experiment with fear appeals, with a wide variety of designs and reported efficaciousness. This makes it hard to derive recommendations for designing and deploying these interventions. We thus reviewed the wider fear appeal literature to arrive at a set of guidelines to assist cyber security researchers. Our review revealed a degree of dissent about whether or not fear appeals are indeed helpful and advisable. Our review also revealed a wide range of fear appeal experimental designs, in both cyber and other domains, which confirms the need for some standardized guidelines to inform practice in this respect. We propose a protocol for carrying out fear appeal experiments, and we review a sample of cyber security fear appeal studies, via this lens, to provide a snapshot of the current state of play. We hope the proposed experimental protocol will prove helpful to those who wish to engage in future cyber security fear appeal research

    An approach toward function allocation between humans and machines in space station activities

    Get PDF
    Basic guidelines and data to assist in the allocation of functions between humans and automated systems in a manned permanent space station are provided. Human capabilities and limitations are described. Criteria and guidelines for various levels of automation and human participation are described. A collection of human factors data is included

    E-Mail Revealed: What the Research Tells Us

    Get PDF

    Click carefully before you quote : citing internet-based sources

    Get PDF
    At the end of the 20th century, access to information provided by the World Wide Web (WWW) is changing as never before. The fast availability of current medical literature and the availability of tools for easy access to information, as well as for the easy production of information, have confronted research physicians, scholars, and students with new kinds of problems, many of which concern us personally. Quality control, difficulty establishing basic citation components, lack of standard guidelines for citing, as well as the short lifetime of Internet addresses concern us deeply. Some of these problems could be solved by the concept of an "Online-Library of Medicine" presented in the following paper. Since, however, at the present time there are no good answers to the problems regarding citing Internet-based sources, a Web surfer must keep in his or her mind the motto “caveat lector” (let the reader beware) - or, rather, in the spirit of our time: click c@refully before you cite
    • …
    corecore