45,633 research outputs found
Unweaving the Web: Beginning to think theologically about the Internet
This is the author's version of the book.This book discusses features of the Internet that are new and theologically challenging and how these features affect the way we think about place, time, and identity
Every Child a Talker: Guidance for consultants and early language lead practitioners (Third instalment: Autumn 2009)
"Every Child a Talker (ECAT) is designed to help practitioners and parents create a developmentally
appropriate, supportive and stimulating environment in which children can enjoy experimenting
with and learning language... Every Early Language Consultant (ELC) and Early Language Lead Practitioner (ELLP) will have
followed a different route on their journey towards ‘Every Child a Talker’... Within all
these diverse journeys, however, there are some common elements.
This third instalment of the Every Child a Talker (ECAT) file looks at the commonalities of the journeys
through a series of case studies." - page
Design Principals of Social Navigation
8th Delos Workshop on "User Interfaces for Digital Libraries" (on 21 October it will be held in conjuction with the 4th ERCIM Workshop on "User Interfaces for All"), SICS, Kista, Sweden, 21-23 October 1998PERSON
Recommended from our members
A netnography study to uncover the underlying dimensions of customer experience with resort brands
The interest in customer experience has increased at a phenomenal rate. However, research to capture the true meaning of the concept is limited. This study aims to address the question of what are the underlying dimensions that constitute the construct of customer experience. The netnography method is utilized to validate a priori concepts that have been identified in the literature within the context of resort-hotel brands in a Sharm El Sheikh resort in Egypt. The results identified eight dimensions; comfort, educational, hedonic, novelty, recognition, relational, safety and sense of beauty which are consistent with major studies on experience
Recommended from our members
A netnography study on branded customer experience: Evidence from the red sea
This study addresses the question of what are the underlying dimensions and messages to self and others that constitute the construct of customer experience. The study uses a netnography method to validate or refute and extend a priori concepts that the literature identifies within the context of resort-hotel brands in a Sharm El Sheikh resort in Egypt. The results identify eight dimensions (comfort, educational, hedonic, novelty, recognition, relational, safety and sense of beauty) and unique configurations of these eight dimensions that extend prior research on customer experience
Attacks by “Anonymous” WikiLeaks Proponents not Anonymous
On November 28, 2010, the world started watching the whistle blower website WikiLeaks to begin publishing part of the 250,000 US Embassy Diplomatic cables. These confidential cables provide an insight on U.S. international affairs from 274 different embassies, covering topics such as analysis of host countries and leaders and even requests for spying out United Nations leaders.\ud
The release of these cables has caused reactions not only in the real world, but also on the Internet. In fact, a cyberwar started just before the initial release. Wikileaks has reported that their servers were experiencing distributed denial-of-service attacks (DDoS). A DDoS attack consists of many computers trying to overload a server by firing a high number of requests, leading ultimately to service disruption. In this case, the goal was to avoid the release of the embassy cables.\ud
After the initial cable release, several companies started severed ties with WikiLeaks. One of the first was Amazon.com, that removed the WikiLeaks web- site from their servers. Next, EveryDNS, a company in which the domain wikileaks.org was registered, dropped the domain entries from its servers. On December 4th, PayPal cancelled the account that WikiLeaks was using to receive on-line donations. On the 6th, Swiss bank PostFinance froze the WikiLeaks assets and Mastercard stopped receiving payments to the WikiLeaks account. Visa followed Mastercard on December 7th.\ud
These reactions caused a group of Internet activists (or “hacktivists”) named Anonymous to start a retaliation against PostFinance, PayPay, MasterCard, Visa, Moneybrookers.com and Amazon.com, named “Operation Payback”. The retaliation was performed as DDoS attacks to the websites of those companies, disrupting their activities (except for the case of Amazon.com) for different periods of time.\ud
The Anonymous group consists of volunteers that use a stress testing tool to perform the attacks. This tool, named LOIC (Low Orbit Ion Cannon), can be found both as a desktop application and as a Web page.\ud
Even though the group behind the attacks claims to be anonymous, the tools they provide do not offer any security services, such as anonymization. As a consequence, a hacktivist that volunteers to take part in such attacks, can be traced back easily. This is the case for both current versions of the LOIC tool. Therefore, the goal of this report is to present an analysis of privacy issues in the context of these attacks, and raise awareness on the risks of taking part in them
- …