Toward Future Information Market: An Information Valuation Paradigm

Author(s):  
Lin Chen ◽  
Zhaoyuan Wu ◽  
Jianxiao Wang ◽  
Mingkai Yu ◽  
Yang Yu ◽  
...  
1995 ◽  
Vol 18 (11) ◽  
pp. 825-837 ◽  
Author(s):  
Martin Chapman ◽  
Hendrik Berndt ◽  
Nicola Gatti

Crustaceana ◽  
2019 ◽  
Vol 92 (3) ◽  
pp. 335-351 ◽  
Author(s):  
Juliana Gaeta ◽  
Raúl Cruz

Abstract Lobsters are recognizable faunal elements that play an important role as top predator in the trophic webs in benthic ecosystems and have an economic importance due to the intensive and valuable fishery. In Rocas Atoll (03°51′S 33°48′W) the presence of five species of lobsters in low tide pools was observed by visual census. These were: Enoplometopus antillensis Lütken, 1865; Palinurellus gundlachi Von Martens, 1878; Panulirus argus (Latreille, 1804); Panulirus echinatus Smith, 1869; and Parribacus antarcticus (Lund, 1793). This atoll appears to be dominated by P. echinatus followed by P. argus, P. antarcticus, P. gundlachi and E. antillensis, respectively. We also observed the presence of some potential predators that perhaps feed on lobster species and control these populations in the atoll. This work and future information could help to better understand the variability of lobster diversity and density in this unique atoll.


2020 ◽  
Vol 35 (3) ◽  
pp. 214-231
Author(s):  
Daniel Pienta ◽  
Jason Bennett Thatcher ◽  
Allen Johnston

Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message to a whale (i.e. a high-value target in an organization), it can result in large payoffs for cybercriminals, in terms of money or data stolen from organizations. While a legitimate cybersecurity threat, little information security research has directed attention toward whaling. In this study, we begin to provide an initial understanding of what makes whaling such a pernicious problem for organizations, executives, or celebrities (e.g. whales), and those charged with protecting them. We do this by defining whaling, delineating it from general phishing and spear phishing, presenting real-world cases of whaling, and provide guidance on future information security research on whaling. We find that whaling is far more complex than general phishing and spear phishing, spans multiple domains (e.g. work and personal), and potentially results in spillover effects that ripple across the organization. We conclude with a discussion of promising future directions for whaling and information security research.


2015 ◽  
Vol 14 (02) ◽  
pp. 1550002 ◽  
Author(s):  
Denise A. D. Bedford

Information landscape is a critical component of professional and scholarly disciplines. Established disciplines have a managed information foundation covering primary, secondary and tertiary sources, targeted search capabilities, discipline-specific knowledge organisation tools and services, and quality controlled review processes. The information landscapes of emerging disciplines may be more chaotic and unsettled, and present challenges for professionals. This research considers the information landscape of the knowledge management discipline. An open public survey of knowledge professionals provides insights into three factors that affect the landscape including: (1) information awareness; (2) information use and access; and (3) information valuation. Findings highlight key information management challenges, and offer suggestions for solutions.


Author(s):  
Areeya Chantasri ◽  
Ivonne Guevara ◽  
Kiarn T. Laverick ◽  
Howard M. Wiseman

StandardView ◽  
1997 ◽  
Vol 5 (1) ◽  
pp. 36-40 ◽  
Author(s):  
Shukri A. Wakid ◽  
Shirley M. Radack

Sign in / Sign up

Export Citation Format

Share Document