Search results

1 – 10 of 62
Article
Publication date: 1 May 1999

Paul A. Watters and Malti Patel

The Internet has the potential to facilitate understanding across cultures and languages by removing the physical barriers to intercultural communication. One possible contributor…

1042

Abstract

The Internet has the potential to facilitate understanding across cultures and languages by removing the physical barriers to intercultural communication. One possible contributor to this development has been the recent release of freely‐available automated direct machine translation systems, such as AltaVista with SYSTRAN, which translates from English to five other European languages (French, German, Italian, Spanish and Portuguese), and vice versa. However, concerns have recently been raised over the performance of these systems, and the potential for confusion that can be created when the intended meaning of sentences is not correctly translated (i.e. semantic processing errors). In this paper, we use an iterative paradigm to examine errors associated with interlingual divergence in meaning arising from the automated machine translation of English proverbs. The need for the development of Web‐based translation systems, which have an explicit cross‐linguistic representation of meaning for successful intercultural communication, is discussed.

Details

Internet Research, vol. 9 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 5 July 2013

Paul A. Watters

A key problem in money laundering investigations based on open source intelligence gathering is the performance (efficiency and accuracy) of people in the team, where suspects…

Abstract

Purpose

A key problem in money laundering investigations based on open source intelligence gathering is the performance (efficiency and accuracy) of people in the team, where suspects will typically try to conceal incriminating evidence or deliberately deceive investigators to avoid prosecution. If we are able to develop a suitable psychological model of deception for web‐based investigations, it should be possible to develop training programmes to improve investigators' ability to “see beyond” deliberate concealment. The purpose of this paper is to empirically test a model based on non‐linear system identification using a well‐known psychological phenomenon (the Stroop effect), where conflicting colour and text information is presented to subjects which they are instructed to process in a certain way.

Design/methodology/approach

The paper uses an experimental approach.

Findings

The results indicate that strategies for improving investigator information processing performance can benefit from models that incorporate both linear and non‐linear components.

Originality/value

Although the Stroop effect is well known, no other papers have investigated how it may be used to evaluate and monitor the performance of investigators. The real value of this study will emerge when tools are developed to better train investigators to identify concealment within conflicting input data.

Details

Journal of Money Laundering Control, vol. 16 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 August 1998

Paul A. Watters, Maya F. Watters and Stuart C. Carr

States that there has been a trend for publications in the Asia‐Pacific region to move to a combined print and electronic medium, in an effort to achieve the goals of social…

550

Abstract

States that there has been a trend for publications in the Asia‐Pacific region to move to a combined print and electronic medium, in an effort to achieve the goals of social equity and increased exposure to the worldwide community through the World Wide Web (WWW). Reviews some of the mechanisms by which this transition can be evaluated with respect to these two goals, both economically, but more importantly, in terms of user‐behaviour recorded WWW server access logs. The auditing of these logs facilitates new forms of market research which are impossible to conduct on traditional paper publications, as objective, quantitative information about usage patterns can be measured directly from key variables such as country of origin, most popular content pages, and typical access errors. It is argued that these audits can be used effectively for future planning, developing popular content areas, and creating publicity policy for electronic publications. The transition to a joint paper and electronic format for the South Pacific Journal of Psychology is presented in a three‐month case study, with important issues, such as the importance of indigenous contributions, being resolved using statistics computed from the server access logs.

Details

Internet Research, vol. 8 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 5 October 2012

Paul A. Watters, Stephen McCombie, Robert Layton and Josef Pieprzyk

Ethnographic studies of cyber attacks typically aim to explain a particular profile of attackers in qualitative terms. The purpose of this paper is to formalise some of the…

2370

Abstract

Purpose

Ethnographic studies of cyber attacks typically aim to explain a particular profile of attackers in qualitative terms. The purpose of this paper is to formalise some of the approaches to build a Cyber Attacker Model Profile (CAMP) that can be used to characterise and predict cyber attacks.

Design/methodology/approach

The paper builds a model using social and economic independent or predictive variables from several eastern European countries and benchmarks indicators of cybercrime within the Australian financial services system.

Findings

The paper found a very strong link between perceived corruption and GDP in two distinct groups of countries – corruption in Russia was closely linked to the GDP of Belarus, Moldova and Russia, while corruption in Lithuania was linked to GDP in Estonia, Latvia, Lithuania and Ukraine. At the same time corruption in Russia and Ukraine were also closely linked. These results support previous research that indicates a strong link between been legitimate economy and the black economy in many countries of Eastern Europe and the Baltic states. The results of the regression analysis suggest that a highly skilled workforce which is mobile and working in an environment of high perceived corruption in the target countries is related to increases in cybercrime even within Australia. It is important to note that the data used for the dependent and independent variables were gathered over a seven year time period, which included large economic shocks such as the global financial crisis.

Originality/value

This is the first paper to use a modelling approach to directly show the relationship between various social, economic and demographic factors in the Baltic states and Eastern Europe, and the level of card skimming and card not present fraud in Australia.

Details

Journal of Money Laundering Control, vol. 15 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 4 January 2011

Paul A. Watters and Stephen McCombie

Cybercrime has rapidly developed in recent years thanks in part to online markets for tools and credentials. Credential trading operates along the lines of a wholesale…

2135

Abstract

Purpose

Cybercrime has rapidly developed in recent years thanks in part to online markets for tools and credentials. Credential trading operates along the lines of a wholesale distribution model, where compromised credentials are bundled together for sale to end‐users. Thus, the criminals who specialize in obtaining credentials (through phishing, dumpster diving, etc.) are typically not the same as the end‐users. This research aims to propose an initial methodology for further understanding of how credentials are traded in online marketplaces (such as internet relay chat (IRC) channels), such as typical amounts charged per credential, and with a view to preliminary profiling, especially based on language identification.

Design/methodology/approach

This research proposes an initial methodology for further understanding of how credentials are traded in online marketplaces (such as IRC channels), such as typical amounts charged per credential, and with a view to preliminary profiling, especially based on language identification. Initial results from a small sample of credential chatroom data is analysed using the technique.

Findings

The paper identified five key term categories from the subset of the 100 most frequent terms (bank/payment provider names, supported trading actions, non‐cash commodities for trading, targeted countries and times), and demonstrated how actors and processes could be extracted to identify common business processes in credential trading. In turn, these elements could potentially be used to track the specific trading activities of individuals or groups. The hope in the long‐term is that we may be able to cross‐reference named entities in the credential trading world (or a pattern of activity) and cross‐reference this with known credential theft attacks, such as phishing.

Originality/value

This is the first study to propose a methodology to systematically analyse credential trading on the internet.

Details

Journal of Money Laundering Control, vol. 14 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 16 October 2009

Paul A. Watters

The purpose of this paper is to compare and contrast university governance structures with those of commercial providers of information security education.

657

Abstract

Purpose

The purpose of this paper is to compare and contrast university governance structures with those of commercial providers of information security education.

Design/methodology/approach

Policy analysis methods from social research are used. Professional information security education (and certification) is generally provided by commercial training arms of major IT vendors, independent industry groups and universities. While the “for profit” status of commercial training organisations is recognised, the commercial standing of universities is unclear, since they increasingly charge commercial‐grade (or higher) fees for professional development, especially at the postgraduate level. The independence from commercial interests is one of the main attractions for students to undertake professional education at universities; however, if universities are becoming commercial, at what point and according to which criteria is the veracity of vendor‐supplied training and university education considered equal, or indeed, superior?

Findings

This paper briefly reviews the key drivers of university commercialisation, and discusses the implications for postgraduate education in the very sensitive area of information security, in an Australian context, especially where universities directly compete with private sector interests. The key findings are that universities who wish to offer information security programs in competition with private providers will need to adopt corporate‐style governance policies and procedures, which include industry representation on boards, and ensuring that academic independence is not compromised by deeper vendor relationships.

Originality/value

No other papers have specifically investigated the emerging trends in information security education, in an Australian context, and related these to the necessary changes in governance that will be required for universities to compete on equal terms with corporate providers.

Details

Corporate Governance: The international journal of business in society, vol. 9 no. 5
Type: Research Article
ISSN: 1472-0701

Keywords

Book part
Publication date: 7 November 2017

Marie Paul Dusingize and Venantie Nyiransabimana

This case study was designed using the qualitative research method of interviews with key employees to investigate university social responsibility (USR) practices within Institut…

Abstract

This case study was designed using the qualitative research method of interviews with key employees to investigate university social responsibility (USR) practices within Institut Catholique de Kabgayi (ICK) in Rwanda and to advance understanding of ways USR is defined against a postgenocide history, to identify its core components, and to track how it is communicated. Key respondents in accordance with their relationships with internal and external stakeholder groups were interviewed from among functions/departments of public relations, human resource management, community outreach, student services, courses and examination office, and the ombudsperson who plays an intermediary role between employees and employer in case of conflict. Findings suggest that for this higher education organization, on one hand, USR is understood mainly as stakeholder aid and Christian engagement benefitting employees, students, and community members according to specific needs. On the other hand, USR also is understood in terms of privacy protection and as a research driver that integrates openness, flexibility, and autonomy. Core components comprising USR are extension services, business incubation, student volunteer services, public relations activities, public works services, alumni relations, and employee outreach services. Means for communicating USR are face-to-face communication, partnerships, and mass media channels.

Details

Corporate Social Responsibility, Sustainability, and Ethical Public Relations
Type: Book
ISBN: 978-1-78714-585-6

Keywords

Article
Publication date: 1 December 2007

Shervin Shahnavaz and Solvig Ekblad

While the literature contains plenty of theoretical models for cultural competence training of health care staff, the personnel and clinicians have seldom been asked for their…

Abstract

While the literature contains plenty of theoretical models for cultural competence training of health care staff, the personnel and clinicians have seldom been asked for their views on transcultural competence. Focus group interviews that we carried out in this study showed that the main concern of the participants (interprofessional teams in Swedish psychiatry) is to understand the culturally diverse in psychiatry, rather than being culturally competent. Three major themes of the process of understanding emerged in our analyses: (1) diversity reflection (sub‐themes: reflecting on co‐existent cultural differences and similarities, moving from a one‐dimensional to a multi‐dimensional approach to cultural diversity and self‐reflection), (2) cultural knowledge and skill acquisition (generic and specific) and (3) communication (sources, discrimination). Listening to staff's learning needs may motivate greater sensitivity to the needs of their culturally diverse patients.

Details

International Journal of Migration, Health and Social Care, vol. 3 no. 4
Type: Research Article
ISSN: 1747-9894

Book part
Publication date: 28 June 2013

Lucia M. Flevares and Jamie R. Schiff

The conceptual framework of mathematical modeling (e.g., Lesh & Doerr, 2003) is a vital area in mathematics education research, and its implementation has potential for deeply…

Abstract

The conceptual framework of mathematical modeling (e.g., Lesh & Doerr, 2003) is a vital area in mathematics education research, and its implementation has potential for deeply involving children in integrated and meaningful learning. In mathematical modeling learners are active agents in content-integrated, real-world problem solving. This emphasis on integrating multiple content areas to answer big questions, the pursuit of mathematical modeling, descends from Dewey’s work. We present the definition, principles, and design of modeling practices for readers who may be familiar with early childhood curriculum but less so with using modeling for learning. We explore the application of mathematical modeling to early childhood classrooms and its compatibility with early childhood pedagogies and philosophies. Young children may often be underestimated, assumed to be unable to pose big questions that can be answered through activity, experience, and data; but we discuss how young children can be engaged in problems through mathematical modeling. Finally, as preservice teacher educators, we discuss preparing preservice and in-service teachers for modeling in their classrooms. We offer examples and guidance for early childhood teachers to engage in authentic practice – meeting children where their interests are and creating integrated problem-solving experiences.

Details

Learning Across the Early Childhood Curriculum
Type: Book
ISBN: 978-1-78190-700-9

Keywords

Abstract

Details

International Journal of Migration, Health and Social Care, vol. 6 no. 3
Type: Research Article
ISSN: 1747-9894

1 – 10 of 62