35 research outputs found
Marketing Aspects of Technology Ventures
Cílem diplomové práce je analýza marketingových nástrojů použitých firmou XAX a následně vyhodnotit a navrhnout zvýšení jejich efektivity. Popis strategie společnosti a faktory ovlivňující budou identifikovány. Práce obsahuje návrhy a doporučení na zvýšení efektivity marketingových nástrojů dané firmy v oblasti High-tech odvětví.The aim of diploma thesis is to analyze marketing tools used in Company XAX and under this condition evaluate and purpose increase efficiency used tools. The current marketing strategy of the company is described and main influencing factors are identified. The thesis contains proposals and recommendations for tools usage in the field of High-tech marketing.
Recommended from our members
The SPARCHS Project: Hardware Support for Software Security
The SPARCHS project is considering a new computer systems design methodology that considers security as a first-order design requirement at all levels, starting from hardware, in addition to the usual design requirements such as programmability, usability, speed, and power/energy- efficiency. The rest of the paper describes the proposed hardware security mechanisms and the current status of the project
Products Liability and the Internet of (Insecure) Things: Should Manufacturers Be Liable for Damage Caused by Hacked Devices?
While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation might limit liability for manufacturers
Recommended from our members
Transforming CyberSecurity R&D within the Department of Energy: Getting Ahead of The Threat
This report outlines a preliminary response from DOE researchers to the following three questions: a) what are the key priorities w.r.t. cybersecurity R&D over the next decade? b) what would we recommend, in terms of a program, to address those priorities c) how would a DOE Office of Science program in this area complement other cybersecurity R&D initiatives such as NSF's or other agency programs
Characterization and modeling of top spam botnets
The increasing impact of the Internet in the global economy has transformed Botnets into one of the most relevant security threats for citizens, organizations and governments. Despite the significant efforts that have been made over the last years to understand this phenomenon and develop detection techniques and countermeasures, this continues to be a field with big challenges to address. Several approaches can be taken to study Botnets: analyze its source code, which can be a hard task because it is usually unavailable; study the control mechanism, particularly the activity of its Command and Control server(s); study its behavior, by measuring real traffic and collecting relevant statistics. In this work, we have installed some of the most popular spam Botnets, captured the originated traffic and characterized it in order to identify the main trends/patterns of their activity. From the intensive statistics that were collected, it was possible to conclude that there are distinct features between Botnets that can be explored to build efficient detection methodologies. Based on this study, the second part of the paper proposes a generic and systematic model to describe the network dynamics whenever a Botnet threat is detected, defining all actors, dimensions, states and actions that need to be taken into account at each moment. We believe that this type of modeling approach is the basis for developing systematic and integrated frameworks and strategies to predict and fight Botnet threats in an efficient way.This research was supported by Fundação para a Ciência e a Tecnologia, under research project PTDC/EEA-TEL/101880/2008
Presage criteria for blog credibility assessment using Rasch analysis / Sharifah Aliman, Saadiah Yahya and Syed Ahmad Aljunid
Credibility is an entrance path to trust model environment and its impact is
so tremendous to the blogosphere and real world. The natural unique of blogs
features compared with ordinary websites, the rise of information propagation
through blogs and the scarcity of blog credibility research have sparked the
impetus to investigate blog credibility assessment. This paper presents an
exploratory study to identify credibility factors used by local blog users in
assessing blogs. Our survey respondents are from local university that consisting
of academic staff and students who are computer and Internet literate. Data was
analyzed using person-item distribution map (PIDM) Rasch analysis. The results
indicated that 75% credibility criteria, which was validated using misfit item, are
preferable for assessing blog credibility. However, only 46% credibility criteria,
which was validated using person gap difference, are acceptable. It also shows
that update blog content, reputation of blog authors as well as recognition and
performance of blog site are inapt criteria to assess blog credibility. Inspite, most
of our credibility criteria are fit to formulate our new blog credibility model.
Our study also suggests that Rasch analysis is significantly worthy to validate
criteria that most of previous researches employed descriptive statistics and
factor analytic approach’