Spelling suggestions: "subject:"[een] INTERNET"" "subject:"[enn] INTERNET""
231 |
Análise das fraudes aplicadas sobre o ambiente Internet Banking. / Fraud analysis over internet banking environment.Lau, Marcelo 01 August 2006 (has links)
Este trabalho identifica sob o contexto da tecnologia, negócio, engenharia social e investigação a ocorrência de fraudes sobre o ambiente Internet Banking. A pesquisa relata a evolução dos métodos utilizados pelos fraudadores para efetivação da fraude desde seu o início, no ano de 2002 à evolução na sofisticação dos meios utilizados para os ataques até meados de 2005. Como a análise se baseou em um estudo de caso, coletou-se um número quantitativo de incidentes no período de um ano permitindo entender neste escopo a tendência de ataques aos clientes de serviços Internet Banking. E com pleno domínio do assunto, o trabalho traz recomendações para a contenção destes incidentes, através de três linhas de ação; sobre usuários finais, provedores e sobre o fraudador. / This research identifies under the technology, business, social engineering and inquiry context the occurrence of fraud on Internet Banking environment. It covers the evolution of the methods used for deceivers since from the beginning, in the year of 2002, and his evolution in the sophistication in several ways used for attacks until 2005. The analysis is based on a case study and a quantitative number of incidents in the period of one year were collected making possible to see the point of such purpose the trend of attacks on Interne t Banking customers. With full domain of this ones subject, this research brings suggest for incident containment three lines of action; on final users, suppliers and deceivers.
|
232 |
Prevalence of internet addiction and related psychiatric problems and problematci behaviors among adolescents in Macau and mainland ChinaXu, Dan Dan January 2018 (has links)
University of Macau / Faculty of Health Sciences
|
233 |
Internet, terror e ciberterrorismo : uma análise comparativaAlcântara, Bruna Toso de January 2018 (has links)
Com o objetivo de identificar a diferença entre o uso da Internet por terroristas e o uso do ciberespaço com fins políticos para o terror, a pesquisa proposta se desenvolve em cinco capítulos, além da introdução e conclusão. O capítulo 2 busca elucidar como os mundos físico e virtual se entrelaçam, explicando a vulnerabilidade das Infraestruturas Críticas aos ataques cibernéticos que geram o medo sobre o ciberterrorismo. Seguindo, no capítulo 3 explica-se o debate sobre a percepção acadêmica acerca do uso do ciberespaço por terroristas e, no capítulo 4, uma amostra de países relevantes para o combate ao terrorismo é posta em comparação, a fim de se entender as percepções políticas acerca do uso terrorista do ciberespaço. Nesse sentido, o estudo em voga, hipotético-dedutivo com caráter qualitativo em meio às análises e comparações, validou a hipótese de que, embora pertencentes a paletas do mesmo escopo, o uso da Internet por terroristas e o ciberterrorismo possuem diferenças significativas, sendo elas elencadas dentro de quatro categorias analíticas: Utilidade do ciberespaço, Foco Operacional, Uso de violência e Objetivo Último. Por fim, essas diferenças foram postas na conclusão como propostas de tipologias para a definição do fenômeno do ciberterrorismo e do uso terrorista da Internet, partindo da conceituação de terrorismo proposta por Eugênio Diniz (2002). / In order to identify the difference between the use of the Internet by terrorists and the use of cyberspace for political purposes for terror, this research developes itself in five chapters, in which, in addition to the introduction and conclusion, in chapter 2, it seeks to elucidate how the physical and virtual worlds intertwine, explaining the vulnerability of Critical Infrastructures to cyberattacks that generate fear about cyberterrorism. Chapter 3 explains the debate about the academic perception of the use of cyberspace by terrorists and, chapter 4, a sample of countries that are relevant to the fight against terrorism is compared in order to understand the perceptions about the terrorist use of cyberspace. In this sense, the present hypothetical-deductive study with a qualitative character, in the midst of the analyzes and acquisitions validated the hypothesis that although belonging to palettes of the same scope, the use of the Internet by terrorists and cyberterrorism have significant differences, and they are listed within four analytical categories: Usefulness of cyberspace, Operational Focus, Use of violence and Last Objective. Finally, these differences were put in the conclusion as typology proposals for the definition of the phenomenon of cyberterrorism and the terrorist use of the Internet, rooted in the conceptualization of terrorism proposed by Eugênio Diniz (2002).
|
234 |
Internet addiction among cyberkids in China: risk factors and intervention strategies. / CUHK electronic theses & dissertations collectionJanuary 2011 (has links)
Jiang, Qiaolei. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references (leaves 293-328). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese.
|
235 |
Internet web site promotion: how to reach your target in cyberspace?.January 1998 (has links)
by Cheung Wai-Leung, Shao Yuk-Yin Rebecca. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (p. 75). / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iii / LIST OF TABLES --- p.v / Chapter CHAPTER 1 --- BACKGROUND AND RESEARCH OBJECTIVE --- p.1 / Marketing Opportunities --- p.2 / Research Objective --- p.3 / Hindrance one - Web traffic --- p.3 / Hindrance two - Web measurement --- p.3 / Hindrance three - Web advertising know-how --- p.4 / Research Methodology --- p.4 / Literature review and WWW search --- p.4 / Survey on Web Promotion Strategy in Greater China --- p.5 / Research Limitation --- p.6 / Chapter CHAPTER 2 --- ENVIRONMENTAL ANALYSIS ON WEB PROMOTION STRATEGY --- p.7 / Hong Kong --- p.8 / China --- p.9 / Taiwan --- p.11 / Chapter CHAPTER 3 --- INTERNET AS A MARKETING MEDIUM --- p.13 / SWOT analysis on the internet as a marketing media --- p.13 / Marketing Resources on The Internet --- p.16 / Web Site Promotion Methods and Tools --- p.16 / Measurement --- p.33 / Chapter CHAPTER 4 --- ANALYSIS ON FACTORS AFFECTING WEB SITE PROMOTION --- p.40 / Company Profile --- p.40 / Types of On-line Business --- p.40 / Company Resources and Capabilities --- p.44 / Product Profile --- p.44 / Consumer Profile --- p.47 / Types of Searching Behaviors --- p.49 / Web Site Promotion Objective --- p.50 / Evaluation of Web Promotion Tools --- p.50 / Reach --- p.50 / Efficiency --- p.51 / Chapter CHAPTER 5 --- THE FORMULATION OF THE WEB SITE PROMOTION STRATEGY --- p.57 / Company Resources --- p.60 / Chapter CHAPTER 6 --- SURVEY FINDINGS --- p.61 / Observations on the Web Site Promotion Tools --- p.62 / The Airline --- p.64 / The TV --- p.65 / The Hotel --- p.65 / The Florist --- p.66 / The Bookstore --- p.67 / The Media --- p.68 / The Org --- p.69 / The ISP --- p.69 / Observations on the Web Traffic Measurement strategy --- p.70 / Observations on the overall web promotion strategy --- p.70 / Observations about Internet marketing development in the region --- p.71 / Chapter CHAPTER 7 --- CONCLUSION --- p.72
|
236 |
Ciberativismo: a política em tempos de internet / Cyberactivism: politics in Internet timeNascimento, Sílvia Ramos Bezerra 17 March 2015 (has links)
O objetivo desta tese foi compreender como o ciberativismo, na condição de práxis centrada no uso programático da Internet, se insere no contexto das manifestações políticas ocorridas na Europa, Oriente Médio, EUA e Brasil, entre os anos de 2010 e 2013. Com isso, buscou-se refletir sobre as transformações da política na contemporaneidade, em face do transcurso da atual crise econômico-ecológica. Por intermédio de análises dos pensadores da teoria crítica (Marx, Adorno, Horkheimer, Debord) e da Nova Crítica do Valor (Kurz, Jappe, Trenkle), este estudo apresenta um modelo teórico que denominamos paradigma do antipoder, que partiu da obra de John Holloway, para entender a esfera pública oposicional praticada na Internet em sua tendência a uma práxis de ação direta, aberta, livre e anticapitalista. / The objective of this thesis was to understand how the cyber activism, on condition of praxis focused on programmatic use of the Internet, fits into the context of political demonstrations occurred in Europe, Middle East, USA and Brazil, between 2010 and 2013. Thus, reflections were made on of the politics transformations in contemporary society, given the course of the current economic and ecological crisis. By means of analyzes of the thinkers of critical theory (Marx, Adorno, Horkheimer, Debord) and New Value Critique (Kurz, Jappe, Trenkle), this study presents a theoretical model that we call paradigm of antipower, which was based work on John Holloway´s work, to understand the oppositional public sphere practiced on the Internet in their tendency to a praxis of direct, open, free and anti-capitalist action.
|
237 |
Critical success factors of Internet marketing in Hong Kong.January 1997 (has links)
by Lui Ping Sang, Tong Chi Kong. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1997. / Includes bibliographical references (leaf 51). / Chapter CHAPTER I --- INTRODUCTION --- p.4 / Chapter CHAPTER II --- RESEARCH METHODOLOGY --- p.5 / Defining the Problem --- p.5 / Research Direction --- p.5 / Internet Usage --- p.6 / Internet shopping --- p.7 / Literature Review --- p.8 / Sampling --- p.8 / Data Collection --- p.9 / Interpretation of Result --- p.9 / Company survey --- p.10 / Chapter CHAPTER III --- LITERATURE REVIEW --- p.11 / Objective of employing Internet --- p.11 / Web Users Characteristics --- p.12 / The Audience Mix --- p.12 / Selectiveness in viewing --- p.13 / What to market --- p.14 / how to market on the web --- p.15 / Identifying a market segment --- p.15 / Challenge for Netpreneurs --- p.16 / Chapter CHAPTER IV --- RESULTS FROM THE 1997 HONG KONG WEB USER SURVEY --- p.18 / Usage Behavior of Internet User in Hong Kong --- p.19 / Purpose of Using Internet --- p.19 / Registration of Web Sites --- p.22 / Accept Promotion --- p.22 / Information Sources related to Internet --- p.23 / Attitude towards Internet Shopping --- p.23 / Chapter CHAPTER V --- INTERVIEW WITH COMPANIES ENGAGING IN MARKETING THROUGH INTERNET --- p.29 / Case 1 : Unihall - Leed & Wood Company Ltd --- p.29 / Case 2: In Flower --- p.33 / Chapter CHAPTER VI --- MARKET ANALYSIS OF INTERNET SHOPPING --- p.36 / Internet Market Overview --- p.36 / Customer Segments on the Internet --- p.37 / Current Market Players on the Internet --- p.38 / Threats and Opportunities on Internet Shopping in Hong Kong --- p.40 / Chapter CHAPTER VII --- MARKETING STRATEGY ON INTERNET SHOPPING --- p.42 / Promotion Strategies --- p.42 / Pricing Strategies --- p.44 / Product Strategies --- p.44 / Distribution Strategies --- p.47 / Chapter CHAPTER VIII --- SUMMARY --- p.49 / Reference --- p.51 / Appendix A --- p.52 / Appendix b --- p.53 / Appendix C
|
238 |
Internetová bannerová reklama - nový model on-line nákupu a prodeje bannerové reklamy / Internet banner advertising - a new model of online buying and selling banner advertisementTabáček, Jiří January 2011 (has links)
The first, theoretical part is dedicated to a complete summary of the theory behind the banner advertising in general -- starting at the very beginning of internet advertising in the past, to today's latest forms of internet advertising campaigns. In this part you can also find an exact description of functionality of these models and their possible options. The following, practical part is focused on implementing the new model for buying and selling space for advertising on the web. This part of my Thesis includes analysis of functionality, advantages and disadvantages for the use of the new model and analysis of issues that occurred during its implementation. A questionnaire has been developed and used to analyze this. My Theses concludes with proposed recommendations and future development of the new model.
|
239 |
Internetové pirátství / Internet piracyFiala, Jiří January 2012 (has links)
The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rulings have or may eventually have impact on the legislation or approach to the piracy of other countries. This thesis consists of ten chapters. First chapter gives an introduction to the Internet piracy problem. It claims that copyright violation on the Internet might nowadays be the most common unlawful deed. Second chapter provides definitions of three terms which are later frequently used in the thesis. These terms are: work of authorship, Internet, Internet piracy. Third chapter explores copyright and its content (personal and economic rights of the author). Next chapter analyses the legal means of protection of the work of authorship. These means are provided by various areas of law (copyright law, administrative law, criminal law etc.). Fifth chapter explains functioning of peer-to-peer networks which are...
|
240 |
Análise das fraudes aplicadas sobre o ambiente Internet Banking. / Fraud analysis over internet banking environment.Marcelo Lau 01 August 2006 (has links)
Este trabalho identifica sob o contexto da tecnologia, negócio, engenharia social e investigação a ocorrência de fraudes sobre o ambiente Internet Banking. A pesquisa relata a evolução dos métodos utilizados pelos fraudadores para efetivação da fraude desde seu o início, no ano de 2002 à evolução na sofisticação dos meios utilizados para os ataques até meados de 2005. Como a análise se baseou em um estudo de caso, coletou-se um número quantitativo de incidentes no período de um ano permitindo entender neste escopo a tendência de ataques aos clientes de serviços Internet Banking. E com pleno domínio do assunto, o trabalho traz recomendações para a contenção destes incidentes, através de três linhas de ação; sobre usuários finais, provedores e sobre o fraudador. / This research identifies under the technology, business, social engineering and inquiry context the occurrence of fraud on Internet Banking environment. It covers the evolution of the methods used for deceivers since from the beginning, in the year of 2002, and his evolution in the sophistication in several ways used for attacks until 2005. The analysis is based on a case study and a quantitative number of incidents in the period of one year were collected making possible to see the point of such purpose the trend of attacks on Interne t Banking customers. With full domain of this ones subject, this research brings suggest for incident containment three lines of action; on final users, suppliers and deceivers.
|
Page generated in 0.0339 seconds