Synopsis: Security: Cybercrime:


Ecommerce Europe's proposal for sustainable growth of E-commerce in Europe.pdf.txt

reduce cybercrime and fraud •E-Identification-based schemes would allow effective age verification, which would be useful for age-dependent


E-commerce, omni-channel retail and EU policy.pdf.txt

online, payments, handling waste, and cybercrime. In other areas, there is either a lack of legislation or a late development of legislation fitted to the digital way of

1. 6. Combat fraud and cybercrime 1. 7. Freedom for a business to trade or not †Art. 20 (2) Services Directive

1. 6. COMBAT FRAUD AND CYBERCRIME Consumers and bona fide businesses both suffer from cybercrime, misleading marketing

identity fraud, payment fraud, etc. Currently, it affects a small part of all transactions However, as online transactions grow exponentially,

so does fraud and cybercrime. This is a major concern for bona fide merchants and traders. Protecting against this scourge creates

that cybercriminals operate across borders while the Member States still act mainly on a national basis;

The EU must make the combat of cybercrime a priority and enhance cooperation between Commission and Member States,


Economist Intelligence Unit_Reaping the benefits of ICT_2004.pdf.txt

new challenges and exploit technology†s potential to the full 3. Redouble the assault on barriers to competition


Education - technology and connectedness.pdf.txt

Hacker et al. 2009. As new technologies are presumed to represent an S-shaped adoption curve, it

Hacker, K. L.,Mason, S m, . & Morgan, E. L. 2009). Digital disempowerment in a network society

and John Rice,"Cybercrime: Understanding and addressing the concerns of stakeholders "Computers & Security, Vol. 30, No. 8, 2011, pp. 803-814

Mcafee, Prospective Analysis on Trends in Cybercrime from 2011 to 2020,2011 Mcdonald, P.,â€oetime for Action:


Entrepneurial Orientation and Network Ties_ innovative performance of SMEs in an emerging-economy manufacturing cluster.pdf.txt

prepared to meet future challenges and exploit future opportunities, and therefore may engage actively in search of new ideas outside of their cluster


Entrrepreneurial and Innovative Behaviour in Spanish SMEs_ essays on .pdf.txt

of information by a firm or its employees but also to the organization†s ability to exploit

exploit knowledge Rogers (2004) ACAP; economic growth A model to examine the importance of technological

exploit entrepreneurial opportunities (Lumpkin and Dess, 1996. Essentially, it refers to a firm†s strategy orientation, capturing the specific entrepreneurial aspect of decision


European Competitiveness in Key Enabling Technology_2010.pdf.txt

exploit the innovative potential and competences by transferring ideas and research output from the scientific community into commercial applications and products.


Forfas_South_East_Action_Plan_Publication.pdf.txt

There is potential to exploit new areas, such as Silver-technologies, building on the existing strengths in ICT and

engineering, and leverage regional assets such as Waterford Port, to exploit opportunities in renewable energy supply chains.

There is potential to exploit new areas, such as Silver-technologies, building on the existing strengths in ICT and


Fueling innovation through information technology in smes.pdf.txt

exploit newer technologies than their larger, less agile competitors (Xiang and Lan 2001; Bonk 1996


Growing a digital social innovation ecosystem for Europe.pdf.txt

hackers and activists The Commission must create the conditions where digital businesses, social entrepre -neurs and DSI communities can thrive.

There is great potential to exploit digital network effects, in social innovation activity and new services that generate social value,

-ing, Maker and hacker spaces, Investing and Funding, Event, Incubators and Accelerators, Advisory or expert body, Education And Training. 3 Technology

3d printing facilities (maker spaces and hacker spaces. There are now 96 known ac -tive hacker spaces worldwide, with 29 in the United states, Â according to Hackerspaces

org. There are many more Hacklabs around the world that are branded not as hacker spaces, but are community labs that incentivise the diffusion of free and p2p culture

and open technology Makerspaces are new and rapidly evolving hotbeds of innovation, which have been facilitated by the latest in prototyping technology,

have expanded from the electronics-centric hacker spaces to having a stronger emphasis on groups that attract a diversity of professionals such as artists, machinists, robotics

of civic innovators and hackers) to design and deliver public services that meet our societies†changing needs

Make, a five day outdoor international camping festival for hackers and makers, and the Chaos Communication Camp, an international meeting of hackers that takes place

every four years, organised by the Chaos Computer Club (CCC) 11, an informal associa -tion of hackers from across Europe

OPEN ACCESS The Open Access Ecosystem approach (including open access to content, open standards, open

The Chaos Computer Club (CCC), Europe†s largest network of hackers, is the most prominent example of grassroots commu

Supporting the principles of the hacker ethic, the club also fights for free access to computers and

The Chaos Computer Club (CCC) HACKERS NETWORKS 34 Growing a Digital Social Innovation Ecosystem for Europe

HACKER SPACES ADVISORY OR EXPERT BODY INVESTMENT AND FUNDING 152 26 13 7674 70 32313030

and hackers. Recognising DSI€ s strong social value, besides its strategic contri -bution to repositioning Europe worldwide

However, noninstitutional actors (hackers geeks, social innovators and activists) are key in this process since they are able to generate creativity,


Guide to Research and Innovation Strategies for Smart Specialisations.pdf.txt

The key to successful differentiation is to exploit related variety, suggesting that a regional economy can build its competitive advantage by

6. 3 Does the strategy include a clear reflection/proposal on how to exploit synergies between different European, national and regional funding sources, in


ICT and e-Business Impact in the Transport and Logistics Services Industry.pdf.txt

skills and resources which are needed to exploit technological innovation and to support the reorganisation of work processes.


ICT for Societal Challenges.pdf.txt

of the network due to a cyberattack. Therefore, the DAE has defined a number of objectives in the field of trust and security

•fight against cybercrime and cyberattacks †attacks against information systems are a growing threat,

of becoming a victim of cybercrime has increased in the past year. Building citizens†confidence in the digital world needs an EU-wide solution †also

Over the past decade we have witnessed an ever-increasing amount of cyber attacks on the Internet.

Ranging in style from large-scale worms to phishing attempts, cyber attacks have evolved to unprecedented levels of sophistication.

Moreover, there are plans to exploit DEMONS technologies after the conclusion of the project in actual operational networks


ICT' Role in Healthcare Transformation 2009.pdf.txt

environment, Ireland has a tremendous opportunity to exploit multiple opportunities in these international markets. Our enhanced reputation will


industry_innovation_competitiveness_agenda.pdf.txt

Small businesses have the advantage of being adaptable and flexible, able to exploit niche markets, develop


innomeld_kortv_eng.pdf.txt

and productivity. this is not least due to our capacity to exploit scarce resources, among other ways, by means of new technological and organisational developments based on


InnoSupport - Supporting Innovation in SMEs.pdf.txt

and excellent ideas that could exploit new technolo -gies or products are very important for the development of business.

if production exploits resources and people in a not acceptable way. The internet and mass media are able to influence on costumers opinions during very short timeâ€


INNOVATION AND SMEs PRODUCTS AND SERVICES.pdf.txt

technology/market/product combinations that exploit new technology than they are at conducting fundamental research (which large firms do better.

exploit the financial potential that such businesses offer. Nearly all product manufacturing companies that invest heavily in extending their service businesses increase their service


Innovation capacity of SMEs.pdf.txt

Innovative capabilities for SMES depend on both their ability to exploit external knowledge and on their


Innovation driven growth in Regions The role of Smart specialisation.pdf.txt

especially MNES, will exploit differently the same set of national or regional comparative advantages Among the conditions that affect factor endowments, specialisation and comparative advantage are the following

overlaps, and limit the possibilities in some activities to exploit economies of scale, but it also does not


Innovation in SMEs - A review of its role to organisational performance and SMEs operations sustainability.pdf.txt

vision, enthusiasm, future-oriented exploit external opportunities for inward investment and information gathering. In addition, Motwaniet al.


Innovation, collaboration and SMEs internal research capacities.pdf.txt

and exploit networks information differently 2. Industrial co-operation: from exchange to production From a theoretical point of view, the notion of net

-tive capabilities depend on the ability to exploit exter -nal knowledge and on in-house R&d efforts.


Innovation, Performance and Growth Intentions in SMEs.pdf.txt

for the proposition that national culture influences the way firms†exploit entrepreneurial orientation has been noted by Knight


MIS2014_without_Annex_4.pdf.txt

well as data related to online security and cybercrime, gender and youth, and cultural and environmental aspects.

organize and take urgent action to exploit the possibilities and harness the challenges effectively†(UNSC, 2014). 30 In view of declining

consumer confidence and hinder efforts to exploit big data for the greater social good. Encryption virtual private networks (VPNS), firewalls, threat


National Strategy on Digital Agenda for Romania.pdf.txt

#of cyberattacks/threats registered by the Government on private data Target: To be defined based on Appendix 5

the event of major cyber attacks Operative Council for Cyber security (COSC responsible All Ministries offering public services

and the European Cybercrime Centre within Europol (center instituted in 2013, at European level Ministry for Information

In fighting against cyberattacks on the information systems, Member States must amend the existing criminal law on attacks against information systems.

the European legislation on cybercrime. The initiative will improve the security of citizens and businesses

To achieve a European platform on cybercrime, Europol in cooperation with the European commission has called for the integration of all relevant EU platforms in only one.

and storing information about cyberattacks. It will be the major element in the European Centre Cybercrime. At the national level it will be carried out the analysis and optimization of

existing security platforms, eventually merging and consolidating their national platform and access to Europol and staff training in fighting against cybercrime.

The implementation, monitoring and interconnection between the European and national platforms will be achieved In order to intensify the fight against cybercrime at international and European level it will be enhanced

the cooperation between EU Member States in the fight against cyberattacks. In this respect, in the EU

we will need to create a European forum for discussion between the national government to integrate risk

the event of major cyber attacks Strategic Responsible: Operative Council for Cyber security (COSC Participation in international

European Cybercrime Centre, within Europol (center instituted in 2013 at European level. Operational Responsible: Ministry for

#of cyberattacks/threats registered by the Government on private data indirect indirect indirect direct direct direct direct direct indirect direct direct


NESTA Digital Social Innovation report.pdf.txt

hackers and activists The Commission must create the conditions where digital businesses, social entrepre -neurs and DSI communities can thrive.

There is great potential to exploit digital network effects, in social innovation activity and new services that generate social value,

-ing, Maker and hacker spaces, Investing and Funding, Event, Incubators and Accelerators, Advisory or expert body, Education And Training. 3 Technology

3d printing facilities (maker spaces and hacker spaces. There are now 96 known ac -tive hacker spaces worldwide, with 29 in the United states, Â according to Hackerspaces

org. There are many more Hacklabs around the world that are branded not as hacker spaces, but are community labs that incentivise the diffusion of free and p2p culture

and open technology Makerspaces are new and rapidly evolving hotbeds of innovation, which have been facilitated by the latest in prototyping technology,

have expanded from the electronics-centric hacker spaces to having a stronger emphasis on groups that attract a diversity of professionals such as artists, machinists, robotics

of civic innovators and hackers) to design and deliver public services that meet our societies†changing needs

Make, a five day outdoor international camping festival for hackers and makers, and the Chaos Communication Camp, an international meeting of hackers that takes place

every four years, organised by the Chaos Computer Club (CCC) 11, an informal associa -tion of hackers from across Europe

OPEN ACCESS The Open Access Ecosystem approach (including open access to content, open standards, open

The Chaos Computer Club (CCC), Europe†s largest network of hackers, is the most prominent example of grassroots commu

Supporting the principles of the hacker ethic, the club also fights for free access to computers and

The Chaos Computer Club (CCC) HACKERS NETWORKS 34 Growing a Digital Social Innovation Ecosystem for Europe

HACKER SPACES ADVISORY OR EXPERT BODY INVESTMENT AND FUNDING 152 26 13 7674 70 32313030

and hackers. Recognising DSI€ s strong social value, besides its strategic contri -bution to repositioning Europe worldwide

However, noninstitutional actors (hackers geeks, social innovators and activists) are key in this process since they are able to generate creativity,


NHS Prescription Services - the impace of legacy ICT - National Audit Office UK 2013.pdf.txt

accreditations to deal with the risks of cyber threat, fraud and other security threats 6 Part One NHS Prescription Services:

accreditations to deal with the risks of cyber threat and fraud and other security threats Technology

changes in its business environment and/or exploit new technologies Business case and funding Business case (s) for replacement reflect good


OECD _ ICT, E-BUSINESS AND SMEs_2004.pdf.txt

hackers) are among the most important perceived barriers to Internet use by businesses (B2b and B2c), although large


Online services, including e-commerce, in the Single Market.pdf.txt

pharmaceutical offers, fake banking services (phishing), data protection infringements, illicit tobacco or alcohol advertisements, unfair commercial practices or breaches of the EU

where there is a financial gain involved in the takedown (for instance phishing websites. A majority of the respondents to the consultation proposed a European notice-and-takedown

is much longer than the time before takedown of phishing sites d) Liability for providing wrongful notices or for taking down or blocking legal content

degree of filtering is necessary to block harmful traffic such as cyber attacks and viruses Traffic management can,

-the decree of 20 june 2009 lays down the basis for a public website for reporting cybercrime (notably child abuse content, financial crime and racist content


Open Innovation - The Good, The Bad, The Uncertainties - Eliza Laura Coras.pdf.txt

exploit technology, knowledge gaps and financial constraints. The extensive literature written on open innovation subjects highlights the motives,

to effectively exploit diversity and to share risk. Innovation collaboration allows organization to gain needed skills, technologies, assets,


Open Innovation 2.0.pdf.txt

cybercrime. One way to avoid the need of two elec -tronic devices to ensure security is checking from

protect from cybercrime. This means that the right identification of the holder has to be made, some

exploit knowledge is often crucial for its survival in the long run. One way of doing this is to recruit per

-lying limited ability to better exploit knowledge assets in Europe. The present chapter deals with

exploit the potential network effects, different types of platform strategies are being used in terms of openness, compatibility, control (8). In this context

innovation, innovators generate ideas by exploit -ing existing or new data sources and analytics to

Google, on the other hand, take the hacker way They run experiments †thousands upon thou -sands of them.


Open innovation in small and micro enterprises .pdf.txt

situations for all parties involved and how to exploit external knowledge sources effectively Despite the insights generated,


Open innovation in SMEs - Prof. Wim Vanhaverbeke.pdf.txt

different business model to exploit. Each in their own way, many other management authors have suggested methods and models to implement business models and business model innovations


Open innovation in SMEs Trends- motives and management challenges .pdf.txt

'open innovation',firms use both internal and external pathways to exploit technologies and, concurrently, they scout different external sources of technology


Open-innovation-in-SMEs.pdf.txt

different business model to exploit. Each in their own way, many other management authors have suggested methods and models to implement business models and business model innovations


Oxford_ European competitiveness in information technology and lon term scientific performance_2011.pdf.txt

the hacker movement, or the explosion of creativity over the concept of PCS illustrated by popular books

†exploits and addresses exponential growth †seeks the fundamental limits on what can be

Hackers. Heroes of the Computer Revolution. New York, Doubleday Lowen, R 1997. Creating the Cold war University.


Policies in support of high growth innovative smes.pdf.txt

and growth in catch up countries makes much more use of strategies that exploit com -parative advantages†(p. 6) and are oriented towards export markets.


Policies in support of high-growth innovative SMEs - EU - Stefan Lilischkis.pdf.txt

and growth in catch up countries makes much more use of strategies that exploit com -parative advantages†(p. 6) and are oriented towards export markets.


Regional Planning Guidelines_SouthEastIreland.pdf.txt

-imised, offering alternative uses for land withdrawn from agriculture and to commercially exploit existing forest


RIS3_Canary Islands.pdf.txt

ï Why we in the Canary islands miss opportunities to exploit for a knowledge-based economy, the availability of good


RIS3_GUIDE_FINAL.pdf.txt

The key to successful differentiation is to exploit related variety, suggesting that a regional economy can build its competitive advantage by


Romania Western Regiona Competitiveness Enhancement and Smart Specialization - Report.pdf.txt

exploit comparative advantages of other parts of the country. Moreover, when they venture outside the


SEFEP-SmartGrids_EU_2012.pdf.txt

 http://www. dreamsworld. it/emanuele/2007- †07- †01/hacking- â€

 exploit  active  demand  in  CIRED  Ed  21st  International


SMART SPECIALISATION STRATEGY, ASTURIAS.pdf.txt

ï There is no evidence that the strategy includes a clear reflection/proposal on how to exploit


SMEs inventive performance and profitability in the markets for technology.pdf.txt

whether small ï rms are better off exploit -ing their comparative advantage in inventing by becoming â€oetech

small ï rms may be less able to exploit economies of scale and scope, or be more ï nancially constrained (e g


SMEs, Entrepreneurship and Innovation.pdf.txt

as one of the key ways to exploit untapped knowledge, alongside the more traditional patent and licensing routes and the publishing and teaching activities of universities.

exploit new products and services, and higher education institutions can play an important supporting function through the transfer of knowledge.

Second, these resource combinations are intended primarily to explore and exploit opportunities to create social value by stimulating social change

and exploit opportunities in order to enhance social wealth by creating new ventures or managing existing organisations in an innovative manner. †(p. 118


Southeast-economic-development-strategy.docx.txt

To explore the feasibility of the deepening of the Port of Waterford and exploit its commercial potential as a load-on load-off Port

and level of expertise in the logistics industry can be built upon to create further business opportunities and exploit emerging trends.

To explore the feasibility of the deepening of the Port of Waterford and exploit its commercial potential as a load on load off Port


Tepsie_A-guide_for_researchers_06.01.15_WEB.pdf.txt

ways to exploit investment models through more effective mechanisms of reducing investment capital costs †which are the main barrier for this form of

need the management and business skills to exploit market opportunities to set up and grow a social


The future internet.pdf.txt

supporting context-aware communications that efficiently exploit the available net -work resources. Furthermore, context-aware networking enables new types of appli

using mechanisms that exploit the business requirements, other forms of context and context usage statistics.

towards closed-loop algorithms and procedures which are able to properly exploit appropriate real-time network measurements.

Payload Size Control equal to 84 Bytes; and; Delivery Guarantee re -quest. In this context, this need is informed, to the Service Layer, by the direct

resources, exploit the native self-organizing incentive-based mechanisms of over -lays to increase the level of traffic locality within ISPS

because signalling in the payload is more likely to get traumatised by some middleboxes â € There is a separate connection-level sequence number, in addition to the stan

TCP-Options for signalling (rather than the payload) is that it should simplify off -loading by network cards that support MPTCP, due to the separate handling of

addressing one of the major obstacles preventing businesses and users to fully exploit the Future Internet opportunities today

that is used for the payload communication. The data-centric paradigm is a natural match with the communication of topology information that needs to be distributed

-tial latency for the payload communication as popular operations can be completed locally based on cached data

A graphlet defines the network resources used for the payload communication and it can be anything from the path of an IP packet to private virtual circuits.

payload communication. A graphlet adheres to a set of scopes that are responsible for policy-compliant matching of nodes to interaction instances, collecting the needed

on a per-segment basis in the payload communication, we use packet level authentica -tion (PLA) 25 that uses elliptic curve cryptography (ECC) 23.

delivery tree) that can then be used for the fast-path payload communication At every level of the hierarchy, the rendezvous core provides an anycast routing to the

ensure that no security hole arises from implementations that exploit the com -putational infrastructure of the Future Internet.

-port for the discovery of important vulnerabilities and associated exploits that are already plaguing complex web-based security-sensitive applications, and thus

on Proverif 7, exploits abstract interpretation for veriï cation of web services that use SOAP messaging, using logical predicates to relate the concrete SOAP

approaches that exploit extend or redesign current Internet architecture and protocols The Pan-European laboratory 1, Panlab, is a FIRE 2 initiative and builds on a fed

Application Payload Classif Content aware flow classification SM@SP MANE CANMGR@AS1 Intranrm@AS1 3. MANE configuration for CAN

-mon cryptographic techniques over the packets†payload. Private communications is to be adopted when the confidentiality and authenticity of the entire packets, includ

In order to exploit the opportunities of services enabled by the Future Internet for smart cities, there is a

cybercrime, tracking, identification, military control over cities Digital cities, from digital representation of cities, virtual cities, digital metaphor of cities


The Relationship between innovation, knowledge, performance in family and non-family firms_ an analysis of SMEs.pdf.txt

willingness to adjust their business as necessary in order to exploit them. The pro -active nature of firms to utilize opportunities was measured by action and decision


TOWARDS TOWARDS A NETWORK NETWORK OF DIGITAL BUSINESS ECOSYSTEMS_2002.pdf.txt

organizations, is required a further stage in ICT technology adoption which exploits the dynamic interaction (with cooperation and competition) of several players in order to


Vincenzo Morabito (auth.)-Trends and Challenges in Digital Business Innovation-Springer International Publishing (2014) (1).pdf.txt

4 Mapreduce exploit, on the one hand, (i) a map function, specified by the user to process a key

electric utilities, hospitals to exploit GE€ s Big data expertise, generating big savings, likewise. Thus, human resources and talent management are key issues to

for CSP as well as customers like cyberattacks and illegitimate control over user accounts 8. Cloud and CSP migration

•Exploit any internal skills already acquired on a particular technology suitable to be adopted for the mobile applications development on the chosen device (s

Considering cybercrime, as reported by Paul Hyman on the Communications of the ACM (CACM) 8 on March 2013, security companies evaluations about the

costs of the cybercrime worldwide were $110 billion every year according to Symantec Corp.;while approximately $1 trillion according to Mc afee Inc

estimates of the scale of the risk of cybercrime 8. According to a report titled †Measuring the cost of cybercrime†9, presented in 2012 by an international team

cybercrime often exceed the cost of the threat itself 10. The analyses and the consequent evaluation presented in the report have followed the framework shown

considering all the main types of cybercrime, such as, e g.,, online payment and banking fraud, fake antivirus, patent-infringing pharmaceuticals

Crime††9, p. 4. For example, the revenue of a phishing advertised by email spam is the sum of the money withdrawn from the accounts of the subject that is

victim of the phishing activity •Direct losses are ††the monetary equivalent of losses, damage, or other suffering

cybercrime action; deferred purchases or not having access to money 9 •Indirect losses are ††the monetary equivalent of the losses and opportunity costs

imposed on society by the fact that a certain cybercrime is carried out, no matter whether successful or not and independent of a specific instance of that cy

indirect costs of cybercrimes on business are several times higher than the direct costs. Furthermore, as pointed out by Ross Anderson, one the researchers of the

would be far more effective than telling the public to fit an anti-phishing toolbar or purchase antivirus software††10, p. 1. Thus, a conclusion from the study is that

Cybercrimes Supporting Infrastructure Cost to society Fig. 7. 1 A framework for evaluating the costs of

cybercrime. Adapted from 9 136 7 Digital Business Identity the state of art on business information systems, an interesting solution for

, cybercrime and for Enterprise Identity Management. Besides the inner context of an organization, the Chapter has pointed out how digital business

8. Hyman P (2013) Cybercrime: it†s serious, but exactly how serious? Commun ACM 56:

2012) Measuring the cost of cybercrime. Elev. Annu Work Econ Inf Secur (WEIS12 Berlin, DE, June 25†26

Anderson R How much does cybercrime cost? http://www. cam. ac. uk/research/news /how much-does-cybercrime-cost

11. Birch D (2007) Digital identity management technological, business and social implications Gower Publishing, Aldershot

implement a business model able to deal with and exploit such characteristics of the digital economy Table 9. 7 compares the essential features of the processes of transformation of

models that are most popular among Web 2. 0 companies, which exploits the peculiarities of the information economy, is the so-called ††freemium††(combi

Cybercrime, 134†136,143 D Data, 4 Data deluge, 4 Decision 2. 0, 67 Degree centrality, 69


WEF_EuropeCompetitiveness_FosteringInnovationDrivenEntrepreneurship_Report_2014.pdf.txt

Develop collaboration and exploit results •Set and manage clear expectations •Focus on tangible results


WEF_GlobalCompetitivenessReport_2014-15.pdf.txt

markets allow firms to exploit economies of scale Traditionally, the markets available to firms have been constrained by national borders.


WEF_GlobalInformationTechnology_Report_2014.pdf.txt

fully exploit big data expansion (Figureâ 3). An approach that tackles these issues concurrently will help to

ability to exploit big data opportunities or exposing them to threats of legal and regulatory intervention

both physically as well as through cyberattack. This is because any single exploit is likely to gain access

to only a limited part of the whole database. Similarly the resilience of organizations with a heterogeneous

and cyberattack are among the greatest dangers that companies face in the big data era. A distributed architecture of databases joined with

financial systems to hackers. Thus a strong legal and policy framework will be required to ensure that criminals

and the data they carry from cyberattacks. A further imperative is to build the trust of citizens,


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011