35 research outputs found

    Marketing Aspects of Technology Ventures

    Get PDF
    Cílem diplomové práce je analýza marketingových nástrojů použitých firmou XAX a následně vyhodnotit a navrhnout zvýšení jejich efektivity. Popis strategie společnosti a faktory ovlivňující budou identifikovány. Práce obsahuje návrhy a doporučení na zvýšení efektivity marketingových nástrojů dané firmy v oblasti High-tech odvětví.The aim of diploma thesis is to analyze marketing tools used in Company XAX and under this condition evaluate and purpose increase efficiency used tools. The current marketing strategy of the company is described and main influencing factors are identified. The thesis contains proposals and recommendations for tools usage in the field of High-tech marketing.

    Transforming CyberSecurity R&D within the Department of Energy: Getting Ahead of The Threat

    Full text link

    Support for the Core Research Activities and Studies of the Computer Science and Telecommunications Board (CSTB)

    Full text link

    Thoughts on Threat Assessment in Cyberspace

    Get PDF

    Products Liability and the Internet of (Insecure) Things: Should Manufacturers Be Liable for Damage Caused by Hacked Devices?

    Get PDF
    While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation might limit liability for manufacturers

    Characterization and modeling of top spam botnets

    Get PDF
    The increasing impact of the Internet in the global economy has transformed Botnets into one of the most relevant security threats for citizens, organizations and governments. Despite the significant efforts that have been made over the last years to understand this phenomenon and develop detection techniques and countermeasures, this continues to be a field with big challenges to address. Several approaches can be taken to study Botnets: analyze its source code, which can be a hard task because it is usually unavailable; study the control mechanism, particularly the activity of its Command and Control server(s); study its behavior, by measuring real traffic and collecting relevant statistics. In this work, we have installed some of the most popular spam Botnets, captured the originated traffic and characterized it in order to identify the main trends/patterns of their activity. From the intensive statistics that were collected, it was possible to conclude that there are distinct features between Botnets that can be explored to build efficient detection methodologies. Based on this study, the second part of the paper proposes a generic and systematic model to describe the network dynamics whenever a Botnet threat is detected, defining all actors, dimensions, states and actions that need to be taken into account at each moment. We believe that this type of modeling approach is the basis for developing systematic and integrated frameworks and strategies to predict and fight Botnet threats in an efficient way.This research was supported by Fundação para a Ciência e a Tecnologia, under research project PTDC/EEA-TEL/101880/2008

    Presage criteria for blog credibility assessment using Rasch analysis / Sharifah Aliman, Saadiah Yahya and Syed Ahmad Aljunid

    Get PDF
    Credibility is an entrance path to trust model environment and its impact is so tremendous to the blogosphere and real world. The natural unique of blogs features compared with ordinary websites, the rise of information propagation through blogs and the scarcity of blog credibility research have sparked the impetus to investigate blog credibility assessment. This paper presents an exploratory study to identify credibility factors used by local blog users in assessing blogs. Our survey respondents are from local university that consisting of academic staff and students who are computer and Internet literate. Data was analyzed using person-item distribution map (PIDM) Rasch analysis. The results indicated that 75% credibility criteria, which was validated using misfit item, are preferable for assessing blog credibility. However, only 46% credibility criteria, which was validated using person gap difference, are acceptable. It also shows that update blog content, reputation of blog authors as well as recognition and performance of blog site are inapt criteria to assess blog credibility. Inspite, most of our credibility criteria are fit to formulate our new blog credibility model. Our study also suggests that Rasch analysis is significantly worthy to validate criteria that most of previous researches employed descriptive statistics and factor analytic approach’
    corecore