1,208 research outputs found

    A Journey That Shaped Our Lives: Reflections of a Lay Spiritan

    Get PDF

    Justice, Peace and Reconciliation

    Get PDF

    Recreational Food Service is Big Business

    Get PDF
    In the analysis - Recreational Food Service Is Big Business - by Gary Horvath, President, Recreational Foodservice Division, Service America Corporation and Mickey Warner, Associate Professor School of Hospitality Management at Florida International University, Horvath and Warner initially state: “Recreational food service is very different from routine food service management. The authors review the market and the management planning and challenges that create that difference.” Recreational food is loosely defined by the authors as food for special events. These can be one-time events, repeated events that are not on a fixed schedule [i.e. concerts], weekly events such as football-baseball-or basketball games, or other similar venues. Concessions are a large part of these fan based settings. “An anticipated 101,000 fans at a per capita spending of 56[wereexpected].Atypicalconcessionsmenuofhotdogs,popcorn,soda,beer,snacks,noveltyfoods,candy,andtobaccoproductscomprisesthismarketsegment,sayHorvathandWarnerinreferencetotheSuperBowlXXIfootballchampionshipgame,heldinRoseBowlstadiuminPasadena,California,onJanuary25,1987.Someofthearticleisbaseduponthatevent.Thesefoodserviceeffortsfocusontheindividualfan,butdoextendtothecorporateorganizationallevelaswell.Yourauthorswillhaveyouknowthatcateringisdefinitelyapartofthisequation.Themoniesspentandearnedarephenomenal.SpecialeventsofthistypeattractnumerouscorporatecateringopportunitiesforcompaniesentertainingVIPguestlists,theauthorsinform.Hospitalitytentsusuallyconsistofapregamecocktailpartyandbuffetandapostgamecelebrationwithmusicalentertainmentheldinlavishlydecoratedtentserectedatthesite.Inthiscaseatotalof5,000covers,atapriceof5-6 [were expected]. A typical concessions menu of hot dogs, popcorn, soda, beer, snacks, novelty foods, candy, and tobacco products comprises this market segment,” say Horvath and Warner in reference to the Super-Bowl XXI football championship game, held in Rose Bowl stadium in Pasadena, California, on January 25, 1987. Some of the article is based upon that event. These food service efforts focus on the individual fan, but do extend to the corporate-organizational level as well. Your authors will have you know that catering is definitely a part of this equation. The monies spent and earned are phenomenal. “Special events of this type attract numerous corporate catering opportunities for companies entertaining VIP guest lists,” the authors inform. “Hospitality tents usually consist of a pregame cocktail party and buffet and a post-game celebration with musical entertainment held in lavishly decorated tents erected at the site. In this case a total of 5,000 covers, at a price of 200 each, for 12-15 separate parties were anticipated.” Horvath and Warner also want you to know that novelties and souvenirs make up an essential part of this, the recreational food service market. “Novelties and souvenirs are a primary market and source of revenue for every stadium food service operator,” say Horvath and Warner. The term, “per capita spending is the measurement used by the industry to evaluate sales potential per attendee at an event,” say the authors. Of course, with the solid revenue figures involved as well as the number of people anticipated for such events, planning is crucial, say Horvath and Warner. Training of staff, purchasing and supply, money and banking, facility access, and equipment, are a few of the elements to be negotiated. Through both graphs and text, Horvath and Warner do provide a fairly detailed outline of what a six-step event plan consists of

    Tracking Criminals on Facebook: A Case Study From A Digital Forensics REU Program

    Get PDF
    The 2014 Digital Forensics Research Experience for Undergraduates (REU) Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on tracking criminal forums and Facebook groups. The UAB-REU Facebook team was provided with a list of about 60 known criminal groups on Facebook, with a goal to track illegal information posted in these groups and ultimately store the information in a searchable database for use by digital forensic analysts. Over the course of about eight weeks, the UAB-REU Facebook team created a database with over 400 Facebook groups conducting criminal activity along with over 100,000 unique users within these groups. As of November 2014, students involved in the research project with Advisor Gary Warner at UAB continued running the automated fetchers since my summer projected completed. Working with U.S. Federal Law Enforcement agencies, there have been at least NINE CONFIRMED ARRESTS of individuals associated with the illegal activities tracked on Facebook. This paper will discuss the methods used to collect the information, store it in a database and analyze the data. The paper will also present possible future uses of the Facebook criminal activity-monitoring tool. Keywords: social media, criminal organizations, online crime, social network monitorin

    Phishing Intelligence Using the Simple Set Comparison Tool

    Get PDF
    Phishing websites, phish, attempt to deceive users into exposing their passwords, user IDs, and other sensitive information by imitating legitimate websites, such as banks, product vendors, and service providers. Phishing investigators need fast automated tools to analyze the volume of phishing attacks seen today. In this paper, we present the Simple Set Comparison tool. The Simple Set Comparison tool is a fast automated tool that groups phish by imitated brand allowing phishing investigators to quickly identify and focus on phish targeting a particular brand. The Simple Set Comparison tool is evaluated against a traditional clustering algorithm over a month\u27s worth of phishing data, 19,825 confirmed phish. The results show clusters of comparable quality, but created more than 37 times faster than the traditional clustering algorithm. Keywords: phishing, phish kits, phishing investigation, data mining, parallel processin

    An Accidental Discovery of IoT Botnets and a Method for Investigating Them With a Custom Lua Dissector

    Get PDF
    This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study

    Kelihos Botnet: A Never-Ending Saga

    Get PDF
    This paper investigates the recent behavior of the Kelihos botnet, a spam-sending botnet that accounts for many millions of emails sent each day. The paper demonstrates how a team of students are able to perform a longitudinal malware study, making significant observations and contributions to the understanding of a major botnet using tools and techniques taught in the classroom. From this perspective the paper has two objectives: encouragement and observation. First, by providing insight into the methodology and tools used by student researchers to document and understand a botnet, the paper strives to embolden other academic programs to follow a similar path and to encourage such discovery. Second, the paper shares observations and insights gathered about the botnet\u27s recent spam activity showing evidence of the ``spam as a service model and demonstrating a variety of unique and dangerous spam campaigns conducted via the Kelihos botnet, including banking trojans, credential phishing, and ransomware attacks

    Investigative Techniques of N-Way Vendor Agreement and Network Analysis Demonstrated with Fake Antivirus

    Get PDF
    Fake AntiVirus (FakeAV) malware experienced a resurgence in the fall of 2013 after falling out of favor after several high profile arrests. FakeAV presents two unique challenges to investigators. First, because each criminal organization running a FakeAV affiliate system regularly alters the appearance of their system, it is sometimes difficult to know whether an incoming criminal complaint or malware sample is related to one ring or the other. Secondly, because FakeAV is delivered in a “Pay Per Install” affiliate model, in addition to the ring-leaders of each major ring, there are many high-volume malware infection rings who are all using the same malware. Indeed, a single criminal could participate in multiple affiliate programs using the same spreading and distribution system. Because of this, traditional malware clustering may identify common code, but fail to achieve distinction or attribution of the individual affiliate actors profiting from the scam. By combining n-way vendor agreement and live network capture, malware samples can quickly be associated with particular affiliate infrastructure and/or managing affiliate programs, while identifying and helping to prioritize investigations
    corecore