A bird's eye view of Cyber Crimes and Free and Open Source Software's to Detoxify Cyber Crime Attacks - an End User Perspective

Author(s):  
M.K. Jayanthi Kannan
Natural Gas ◽  
2007 ◽  
Vol 14 (7) ◽  
pp. 21-23
Author(s):  
Edward J. Grenier
Keyword(s):  
End User ◽  

1996 ◽  
Vol 26 (2) ◽  
pp. 92-104 ◽  
Author(s):  
Linda Leon ◽  
Zbigniew Przasnyski ◽  
Kala Chand Seal
Keyword(s):  
End User ◽  

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 10483-10496 ◽  
Author(s):  
Debajyoti Pal ◽  
Suree Funilkul ◽  
Nipon Charoenkitkarn ◽  
Prasert Kanthamanon

2012 ◽  
Vol 65 (7) ◽  
pp. 1200-1207 ◽  
Author(s):  
Jeremy Gabe ◽  
Sam Trowsdale ◽  
Diveshkumar Mistry

Rainwater harvesting is effectively mandated in several urban areas of New Zealand. To understand the costs and benefits of rainwater harvesting from an end-user perspective, semistructured interviews were conducted with 14 homeowners in northern Auckland affected by these regulations. Residents report differences in four aspects of urban rainwater infrastructure – security of supply, water quality, the learning process and financial costs – that could represent key values for public acceptance. When responses are examined from the perspective of experience that has built empirical knowledge, participants explained how their satisfaction with rainwater harvesting increased over time. We hypothesise that for those lacking experience, urban rainwater consumption is a function of empirical knowledge and has initially rising marginal utility. Regulation that recognises the costs of social learning is likely to be a more effective pathway towards maximising the social benefits associated with integrated urban water management.


2021 ◽  
Vol 251 ◽  
pp. 02015
Author(s):  
Adeel Ahmad ◽  
Asier Aguado Corman ◽  
Maria Fava ◽  
Maria V. Georgiou ◽  
Julien Rische ◽  
...  

The new CERN Single-Sign-On (SSO), built around an open source stack, has been in production for over a year and many CERN users are already familiar with its approach to authentication, either as a developer or as an end user. What is visible upon logging in, however, is only the tip of the iceberg. Behind the scenes there has been a significant amount of work taking place to migrate accounts management and to decouple Kerberos [1] authentication from legacy Microsoft components. Along the way the team has been engaging with the community through multiple fora, to make sure that a solution is provided that not only replaces functionality but also improves the user experience for all CERN members. This paper will summarise key evolutions and clarify what is to come in the future.


Author(s):  
T. Venkat Narayana Rao, Sreeja Reddy

Advancement of technology have both positive and negative impacts. Some of the negative impacts are cyber crimes. Cyber crimes have become more dangerous. Phishing is one of the cyber crime which results in exploitation of data. There are many phishing attacks which are identified every day. There are different techniques in phishing attacks. We have to reduce those attacks by employing suitable anti-phishing techniques. Some of the anti-phishing techniques and algorithms are discussed in this paper. History of phishing and the lifecycle are also discussed in this paper. People should be aware of all such phishing and the anti-phishing techniques. They have to be careful while checking their mails and should not click on any links or downloadable malware files.


Sign in / Sign up

Export Citation Format

Share Document