Computer Hacking: Making the Case for a National Reporting Requirement

2004 ◽  
Author(s):  
Jason Chang
2021 ◽  
Vol 11 (13) ◽  
pp. 6188
Author(s):  
Parinaz Jafari ◽  
Malak Al Hattab ◽  
Emad Mohamed ◽  
Simaan AbouRizk

Due to a lack of suitable methods, extraction of reporting requirements from lengthy construction contracts is often completed manually. Because of this, the time and costs associated with completing reporting requirements are often informally approximated, resulting in underestimations. Without a clear understanding of requirements, contractors are prevented from implementing improvements to reporting workflows prior to project execution. This study developed an automated reporting requirement identification and time–cost prediction framework to overcome this challenge. Reporting requirements are extracted using Natural Language Processing (NLP) and Machine Learning (ML), and stochastic simulations are used to predict overhead costs and durations associated with report preparation. Functionality and validity of the framework were demonstrated using real contracts, and an accuracy of over 95% was observed. This framework provides a tool to rapidly and efficiently retrieve requirements and quantify the time and costs associated with reporting, in turn providing necessary insights to streamline reporting workflows.


2020 ◽  
pp. 001112872098189
Author(s):  
Thomas J. Holt ◽  
Kevin F. Steinmetz

Criminological inquiry consistently identifies a gender difference in offending rates, which are also evident among certain forms of cybercrime. The gender difference in cybercrime offending is particularly large within computer hacking, though few have specifically addressed this issue through applications of criminological theory. The current study attempted to account for the gender disparity in hacking through a test of power-control theory, which considers the role of class and family structure. This analysis also incorporated an extension of power-control theory through the influence of low self-control. Using data from the Second International Self-Report of Delinquency study (ISRD-2), logistic regression analyses were estimated, producing partial support for both theories to account for hacking. Implications for theory and research were explored in detail.


2020 ◽  
Vol 41 (S1) ◽  
pp. s396-s397
Author(s):  
Qunna Li ◽  
Minn Soe ◽  
Allan Nkwata ◽  
Victoria Russo ◽  
Margaret Dudeck ◽  
...  

Background: Surveillance data for surgical site infections (SSIs) following abdominal hysterectomy (HYST) have been reported to the CDC NHSN since 2005. Beginning in 2012, HYST SSI surveillance coverage expanded substantially as a result of a CMS mandatory reporting requirement as part of the Hospital Inpatient Quality Reporting Program. A trend analysis of HYST SSI using data submitted to the NHSN has not been previously reported. To estimate the overall trend of HYST SSI incidence rates, we analyzed data reported from acute-care hospitals with surgery performed between January 1, 2009, and December 31, 2018. Methods: We analyzed inpatient adult HYST procedures with primary closure resulting deep incisional primary and organ-space SSIs detected during the same hospitalization or rehospitalization to the same hospital. SSIs reported as infection present at time of surgery (PATOS) were included in the analysis. Due to the surveillance definition changes for primary closure in 2013 and 2015, these were tested separately as interruptions to HYST SSI outcome using an interrupted time-series model with a mixed-effects logistic regression. Because the previously described changes were not significantly associated with changes in HYST SSI risk, mixed-effects logistic regression was used to estimate the annual change in the log odds of HYST SSI. The estimates were adjusted for the following covariates: hospital bed size, general anesthesia, scope, ASA score, wound classification, medical school affiliation type, procedure duration and age. Results: The number of hospitals and procedures reported to NHSN for HYST increased and then stabilized after 2012 (Table 1). The unadjusted annual SSI incidence rates ranged from 0.60% to 0.81%. Based on the model, we estimate a 2.58% decrease in the odds of having a HYST SSI annually after controlling for variables mentioned above (Table 2). Conclusions: The volume of hospitals and procedures for HYST reported to NHSN increased substantially because of the CMS reporting requirement implemented in 2012. The overall adjusted HYST SSI odds ratio decreased annually over 2009–2018, which indicates progress in preventing HYST SSIs.Funding: NoneDisclosures: None


2021 ◽  
pp. 104398622110016
Author(s):  
Adam M. Bossler

The threat of formal sanctions is the criminal justice system’s primary tool to discourage online and offline deviant behavior. Yet, scholars have expressed strong concerns about the effectiveness of formal sanctions to deter cybercrime. Even more surprising is the sparsity of deterrence research in the cybercrime literature. This study examined the effects of perceived formal and informal sanctions on digital piracy, computer hacking, and online harassment in a large American college sample. Perceived formal sanctions was negatively correlated with software piracy, media piracy, password cracking, accessing accounts, sending mean messages privately online, and posting mean messages. Higher levels of perceived formal sanctions did not significantly predict any form of cybercrime, however, when controlling for informal sanctions and deviant peer associations. The implications of the findings for our ability to deter deviant behavior in cyberspace are explored.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Dessalegn Getie Mihret ◽  
Monika Kansal ◽  
Mohammad Badrul Muttakin ◽  
Tarek Rana

Purpose This study aims to examine the setting of International Standards on Auditing (ISA) 701 on disclosing key audit matters (KAMs) to explore the role of standard setting in maintaining or reconstituting the relationship of the auditing profession with preparers and users of financial reports. Design/methodology/approach This study draws on concepts from the sociology of the professions literature and the regulatory space metaphor. Data comprises comment letters and other documents pertaining to the setting of ISA 701. Findings The study shows that the KAM reporting requirement is part of the ongoing re-calibration of the regulatory arrangements governing auditing, which started in the early 2000s. This study interprets standard setting as a site for negotiating the relationships between linked ecologies in the audit regulatory space, namely, the auditing profession, preparers of financial statements and users of audited reports. This study identifies three processes involved in setting ISA 701, namely, reconstitution of the rules governing auditors’ reports as a link between the three ecologies, preserving boundaries between the auditing profession and preparers and negotiation aimed at balancing competing interests of the interrelated ecologies. Originality/value The study offers insights into the role of regulatory rule setting as a central medium through which the adaptive relationship of the profession with its environment is negotiated.


2009 ◽  
pp. 239-247
Author(s):  
Kevin Curran ◽  
Peter Breslin ◽  
Kevin McLaughlin ◽  
Gary Tracey
Keyword(s):  

Adaptation ◽  
2020 ◽  
Author(s):  
Reto Winckler

Abstract This essay proposes that computer hacking can provide us with an appropriate framework through which to rethink the basic workings of adaptation in general and Shakespeare adaptation in particular in the twenty-first century. Building on the work of Thomas Leitch and Sarah Cardwell in adaptation studies and Christopher Kelty in the anthropology of the hacker movement, the essay positions itself as an alternative to Douglas Lanier’s model of the Shakespeare rhizome. The central argument is that understanding Shakespeare’s works as source code, and adaptations of them as hacks of that source code, as well as sources of future hacks, makes it possible to account for and work with the difficult but crucial notions of the source and of fidelity, while resolving many of the theoretical, practical, and political problems which motivated scholars to avoid or try to overcome those notions in the past.


Sign in / Sign up

Export Citation Format

Share Document