Think the Internet Leads to Growth? Think Again

hass associates review articles Think the Internet Leads to Growth? Think Again

Remember the year 2000 in the months after the Y2K bug had been crushed, when all appeared smooth sailing in the global economy? When the miracle of finding information online was so novel that The Onion ran an article, “Area Man Consults Internet Whenever Possible?” It was a time of confident predictions of an ongoing economic and political renaissance powered by information technology. Jack Welch—then the lauded chief executive officer of General Electric (GE)—had suggested the Internet was “the single most important event in the U.S. economy since the Industrial Revolution.” The Group of Eight highly industrialized nations—at that point still relevant—met in Okinawa in 2000 and declared, “IT is fast becoming a vital engine of growth for the world economy. … Enormous opportunities are there to be seized by us all.” In a 2000 report, then-President Bill Clinton’s Council of Economic Advisers suggested (PDF), “Many economists now posit that we are entering a new, digital economy that could inaugurate an unprecedented period of sustainable, rapid growth.”

It hasn’t quite worked out that way. Indeed, if the last 10 years have demonstrated anything, it’s that for all the impact of a technology like the Internet, thinking that any new innovation will set us on a course of high growth is almost certainly wrong.

That’s in part because many of the studies purporting to show a relationship between the Internet and economic growth relied on shoddy data and dubious assumptions. In 1999 the Federal Reserve Bank of Cleveland released a study that concluded (PDF), “… the fraction of a country’s population that has access to the Internet is, at least, correlated with factors that help to explain average growth performance.” It did so by demonstrating a positive relationship between the number of Internet users in a country in 1999 with gross domestic product growth from 1974 to 1992. Usually we expect the thing being caused (growth in the 1980s) to happen after the things causing it (1999 Internet users).

In defense of the Fed, researchers at the World Bank recently tried to repeat the same trick. They estimated that a 10 percent increase in broadband penetration in a country was associated with a 1.4 percentage point increase in growth rate. This was based on growth rates and broadband penetration from 1980 to 2006. Given that most deployment of broadband occurred well after the turn of the millennium, the only plausible interpretation of the results is that countries that grew faster from 1980 to 2006 could afford more rapid rollouts of broadband. Yet the study is widely cited by broadband boosters. Many are in denial about the failure of the IT revolution to spark considerable growth.

Innovation in information technology has hardly dried up since 2000. YouTube (GOOG) was founded in 2005, and Facebook (FB) is only a year older. Customer-relations manager Salesforce.com (CRM), the first cloud-based solution for business, only just predates the turn of the millennium. And there are now 130 million smartphones in the U.S., each with about the same computing power as a 2005 vintage desktop. Meanwhile, according to the U.S. Department of Commerce (PDF), retail e-commerce as a percentage of total retail sales has continued to climb—e-commerce sales were more than 6 percent of the total by the fourth quarter of 2012, up from less than 2 percent in 2003. Yet despite continuing IT innovation, we’ve seen few signs that predictions of “an unprecedented period of sustainable,

rapid growth” are coming true. U.S. GDP expansion in the 1990s was a little faster than the 1980s—it climbed from an annual average of 3 percent to 3.2 percent. But GDP growth collapsed to 1.7 percent from 2000 to 2009. Northwestern University economist Robert Gordon notes that U.S. labor productivity growth spiked briefly—rising from 1.38 percent from 1972 to 1996 to 2.46 percent from 1996 to 2004—but fell to 1.33 percent from 2004 and 2012.

Part of the labor productivity spike around the turn of the century was because of the rapidly increasing efficiency of IT production (you get a lot more computer for the same cost nowadays). Another part was because of considerable investments in computers and networks across the economy—what economists call “capital deepening.” But even during the boom years it was near-impossible to see an economywide impact of IT on “total factor productivity”—or the amount of output we were getting for a given input of capital and labor combined.

Within the U.S., investment in the uses of the Internet for business applications had an impact on wage and employment growth in only 6 percent of counties—those that already had high incomes, large populations, high skills, and concentrated IT use before 1995, according to a recent analysis (PDF) by Chris Forman and colleagues in the American Economic Review. Investments in computers and software did yield a return for most companies—but the return wasn’t anything special.

hass associates review articles Think the Internet Leads to Growth? Think Again

More Aarticles:

http://www.linkedin.com/groups/hass-associates-4854820

http://www.goodreads.com/group/show/95364-hass-associates

Advertisements
Posted in business, hass associates review articles Think the Internet Leads to Growth? Think Again | Tagged | Leave a comment

http://readwrite.com/2013/04/09/hitting-back-at-hackers-why-strikeback-is-doomed-to-fail

Hass and Associates Cyber Discussion

Mellom agenda-skyve hacktivister, pengene-grubbing cyber kriminelle, og -nylig-krigførende nasjon stater, det er ingen mangel på angripere bryte inn i nettverk, stjele forretningshemmeligheter og generelt herje i hele IT-infrastruktur.

Den amerikanske regjeringen har lagt merke til, med den nyeste nasjonale intelligens anslag (NIE) advarer mot at landet er mallet av en stor cyber spionasje kampanje fra Kina. Faktisk, nettverket inntrenging har blitt så vanlig at President Obama har nylig signert en cyber-sikkerhet executive order i håp om å befeste våre forsvar, og oppfordrer regjeringen og kritisk privat sektor organisasjoner å dele etterretninger.

(Se også World War III er allerede her – og vi mister.)

Tatt i betraktning dette oversvømmelse av aggressiv og kostbare sikkerhetsbrudd frustrert det er ikke rart at noen folk får nok å tenke slående baksiden direkte mot våre angripere. Samtidig gir cyber kriminelle en smake sin egen medisin sikkert lyder tiltalende, de fleste former for såkalte “Strikeback” har ingen plass i privat virksomhet.

Hva er Strikeback?

Ideen om å lansere en teller angrep mot cyber kriminelle er ikke nytt. Sikkerhet geeks på informasjon sikkerhet konferanser har vært diskutert counter-hacking og proaktiv forsvar i år.

Tross alt, er mange i cyber sikkerhetssamfunnet like dyktige for brudd systemer som fienden (om ikke mer). faktisk

de “svarte hattene” utnytte ofte verktøy og kode som er opprettet av “white hat” sikkerhet fagfolk. I det siste, skjønt, denne ideen om slående tilbake mot angriperne har flyttet fra munter fantasy til potensielt forstyrrende virkeligheten – noen at sikkerhetsselskaper har selv begynt å tilby strikeback løsninger.

Det er forskjellige måter selskaper har begynt å nærme seg strikeback initiativer. De har løst utviklet seg inn i tre generelle

Kategorier:

Juridiske Strikeback: Dette er den minst offensive formen for strikeback. Det er hvor organisasjoner, i samarbeid med myndigheter, samle etterretning så mye som mulig om angripere, vanligvis ved å følge pengestrømmene, og deretter bruke noe juridisk manøvrering mulig å prøve og straffeforfølge angripere.

Passiv Strikeback: Dette er i hovedsak cyber entrapment. En organisasjon installerer en oppofrende system, agnet med booby fanget filer eller Trojan-laced informasjon en angriper måtte ønske.

Aktive Strikeback: I denne tilnærmingen, en organisasjon identifiserer en IP-adresse som angrepet ser ut til å komme, og lanserer en direkte motangrep.

Hva er galt med Strikeback?

Dessverre, direkte strikeback tiltak har stor iboende risikoen:.

Målretting: Det største problemet med strikeback er at Internett gir anonymitet, noe som gjør det svært vanskelig å vite hvem er egentlig bak et angrep. Det er alt for sannsynlig at strikebacks kan påvirke uskyldige ofre. For eksempel har angripere begynt å med hensikt plante falsk flagg i koden, noe som tyder på det kom fra en annen organisasjon for å sabotere at selskapet.

Geografi: Et annet viktig spørsmål er at Internett forbrytelser har en tendens til å passere gjennom mange geografiske områder og jurisdiksjoner. Innenlandske strikebacks invitere potensielle juridiske problemer, men grenseoverskridende handlinger har enda større konsekvenser.

Juridisk: I tillegg, de fleste strikeback aktivitet er ulovlig. Det er forbudt ved lov for den gjennomsnittlige personen å spore opp og straffe en innbruddstyv som ransaket et hus, og de samme prinsippene gjelder for cybercrimes. Hvis en organisasjon bruker en booby fanget dokumentere for å installere en trojaner på angriperens nettverk, det er teknisk å bryte den samme typen datamaskin svindel og misbruk lover at angriperen brøt for å stjele informasjon i første omgang.

Revenge: Når det kommer til stykket, strikeback er bare hevn. Hvis et nettverk har allerede blitt misbrukt, slående tilbake mot angriperen vanligvis ikke gjenopprette stjålne data eller reparere skader som allerede er utført. Det er nesten alltid bedre å forfølge rettslige undersøkelser og straffeforfølgning gjennom riktige kanaler.

Strikeback ganske enkelt ikke hører hjemme i privat virksomhet. Det tilbyr ingen virkelige fordeler til de fleste organisasjoner, og det bærer alvorlig risikoer som langt oppveier kortvarige tilfredsstillelse av hevn. I stedet, bedrifter bør fokusere deres sikkerhetsstrategier på vel-implementert nøye overvåket, flerlags forsvar som er utformet for å holde cyber kriminelle fra brudd på deres nettverk i først sted.

Hass and Associates Cyber Discussion

Posted in business | Tagged | Leave a comment

International Hass og Associates Phishing nyheter forebygging hvordan å være trygg på nettet

http://www.women24.com/CareersAndMoney/Technology/How-to-stay-safe-online-20130403

International Hass and Associates Phishing News Prevention

Internett gir oss magiske tilgang til alt ved å trykke på en knapp, men det gir også fremmede tilgang til oss. Internett er en del av vårt daglige liv; Vi bruker det for alt-kommunikasjon, lesing, forskning, utdanning, aktuelle hendelser, utforske verden, underholdning, shopping, nettverk og business. Ved å oppføre seg ansvarlig og ta proaktive skritt, kan du sikre at du er beskyttet mot phishing-angrep og skadelig programvare.  MWEB koble GM, Carolyn Holgate, gir informasjon og forslag på hvordan du kan beskytte deg selv mens ikke gi opp noen av Internett frihet.

Hva er Phishing?

Phishing er en svindel som er utformet for å stjele verdifulle personlige data, for eksempel logikk detaljene, PIN tall, passord eller kredittkortopplysninger. Svindlere satt opp falske websteder som ser akkurat ut som klarerte bank eller forretnings-områder, hvor du kan oppbevare kredittkortopplysninger.

De deretter sender tilfeldig ut millioner av e-postmeldinger som synes å komme fra det klarerte området, be om brukernes å komme og oppdatere informasjon. Hvis en bruker skriver inn noen sensitiv informasjon, kan svindlere bruke disse detaljene til å få tilgang til bankkontoene sine online, foreta falske kjøp på sine kredittkort eller bruke stjålet data på andre måter ulovlig.

Hvordan beskytter jeg meg selv?

Du bør være mistenksom hvis du mottar uventede e-postmeldinger som synes å være fra klarerte områder, ber deg om å følge en kobling og bekrefte dine detaljer. Hvis du tror det kan være legitim; i stedet for å følge linken, Logg inn på nettstedet som du normalt ville og se om det er merknader ligner på det som var nevnt i e-postmeldingen. De fleste nettlesere som Internet Explorer 7, Firefox 2 og Opera 9 har anti-phishing features innebygd som vil kontrollere nettsteder du besøker mot en stadig oppdatert liste over kjente phishing-områder og advarer deg hvis du har tilgang til en. Sjekk din nettlesers bidra til å lære å aktivere denne funksjonen. Hvis du får hva du tror er en phishing e-post, kan du rapportere

det som “spam” til tjenesteleverandøren.

Hva er Malware?

Malware eller skadelig programvare, er et begrep for en rekke ulike typer programmer som er utformet for å bryte inn eller skade datamaskinen. Det finnes mange typer malware, mange med navn du kan kjenne igjen:

• Virus er designet for å kopiere av “infiserer” andre programmer med kopier av seg selv. De er oftest overført gjennom infiserte programmer sendt via e-post eller innebygd i piratkopiert programvare.

• Ormer infisere PCer i nettverk, uten behovet for en bruker å kjøre en infisert fil. Faren for en orm er at de kan forsinke eller selv uskadeliggjøre en hele nettverket, som mer og mer infiserte datamaskiner gjentatte ganger sende ut tusenvis av kopier av den. Noen installere “backdoors” som lar hackere å ta kontroll over infiserte PC.

• Trojanere er skadelig programvare som synes å være nyttig eller underholdende, men vil gjøre noen form for skade når kjører.

For eksempel, kan en Trojan installere et virus eller en “bakdør” program for å tillate hackere tilgang til datamaskinen det kjører på.

• Spyware spioner på deg- og sender personlige opplysninger, for eksempel kredittkortdetaljer eller passord, til sine skapere uten din viten eller samtykke. Det kan også avta datamaskinen og bruke opp båndbredden.

Hvordan beskytter jeg meg selv?

Malware er også ofte sendt via e-post, slik at du bør følge de samme forholdsreglene som foreslått ovenfor, i tillegg til kjører virussøk på alle vedlegg.

Kontroller at du kjøper anerkjente programvare; ikke bruk piratkopier, selv fra din venner. Piratkopiert programvare kan gjøre PCen mer sårbar for angrep av virus og malware.

Med lisensiert programvare, får du etter salgsstøtte bør du trenger det, i tillegg til nyter godt av automatiske oppdateringer.

Mange rutere har en innebygd brannmur for å beskytte mot hackere og skadelig programvare, men hvis du bruker en normal ADSL modem du bør installere en brannmur, eller aktivere den eksisterende Windows-brannmur på din maskin.

Du kan også kjøpe spesiell Internet Security-programvare for å beskytte din PC fra angrep, bør du komme i kontakt med malware.

Prøv kjent, rimelige produkter som AVG, som vil gjenkjenne og fjerne vanlig malware; Du kan kjøre selv i tillegg til å gi et oppdatert virusprogram.

International Hass and Associates Phishing News Prevention

Posted in business | Tagged , | Leave a comment

Hass Associates Hacking Used to Create Detailed Map of the Internet

http://www.voanews.com/content/hacking-project-creates-detailed-internet-map/1627170.html

Hass Associates

An anonymous researcher has used illegal hacking techniques to create what some are calling the most accurate map yet of the internet and internet activity.

The researcher built a botnet, a loose network of computers that can be harnessed to perform specific tasks, comprised of some 420,000 unprotected computers and other connected devices around the world. The researcher then uploaded a small program onto the devices, which monitored their activity.

The result was what the researcher called  “the largest and most comprehensive IPv4 census ever.”  The animated map shows relative usage of IP addresses over a 24-hour period. IPv4 is the fourth version of the Internet Protocol, a system of numbers used to identify devices on the Internet. A newer Internet Protocol, IPv6, will replace IPv4, but IPv4 still carries the majority of Internet traffic.

The researcher justified using hacking techniques to collect data, writing in a paper about the project that the program was designed to have no negative impact on any device onto which it was loaded, and that the program was not permanently installed and stopped after a few days.

“I did not want to ask myself for the rest of my life how much fun it could have been or if the infrastructure I imagined in my head would have worked as expected,” explained the researcher in that paper. “I saw the chance to really work on an Internet scale, command hundred thousands of devices with a click of my mouse, portscan and map the whole Internet in a way nobody had done before, basically have fun with computers and the Internet in a way very few people ever will. I decided it would be worth my time.”

Hass Associates

READ MORE:

https://getsatisfaction.com/hassandassociatesnoemicryer/topics/hass_associates_take_steps_to_protect_identity

https://foursquare.com/imogemiller23

Posted in business | Tagged | 1 Comment

Hass Associates Online: Scam du jour They’re creative everywhere so beware/DEVIANTART

http://biggerprice.deviantart.com/journal/Hass-Associates-Online-Scam-du-jour-Theyre-crea-357578897

Hass Associates Online

Either the nation is experiencing a gigantic wave of scams, or Hubbard County’s new seat of power is now called Scam City. Authorities have been besieged with complaints about scams, through e-mail, phone calls and letters. Everybody wants money in their own unique way. And the sob stories are getting more detailed, more aggressive and more pernicious. Just in the last week: n A Lake Itasca couple called the Enterprise. They’d been called by someone with a “Pakistani accent” advising them of all the new provisions of Medicare. The man needed their bank account and Social Security numbers to issue their new card. If they refused to give the information, Medicare would cut them off. “They already had our address and phone number,” the husband said with dismay. n Park Rapids resident Chuck Fuller got called from an alleged grandson. The detailed history said he’d been attending a wedding in Peru after graduating from the University of Kentucky. He got into a car accident. “It was very detailed,” Fuller said. “The driver ahead of him was swerving all over the road and he had to go up on a curb. He hit a telephone post, broke his nose, knocked the telephone post down and the police arrested him, of course, for DWI.” The tale went on and on. The kid went to the Peruvian embassy for help, got the charges dropped, but he couldn’t leave the country until he made restitution for the pole, $1,830, with the money to be sent to Barbara T. Johnson. “Have you called your mother?” Fuller asked. The voice said he was too embarrassed and wanted to tell her the story “face-to-face.” Besides, his mother was on a plane. As the scheme spun on, it started to smell. Fuller didn’t take the bait and alerted Sheriff Cory Aukes. “You know where they get a lot of this information?” Fuller asked. “From Facebook.” Hacking Facebook pages gives sometimes an inordinate amount of personal information. “I get a phone call about every two weeks saying, ‘Your credit card is OK…, however,’” Fuller said. n Steve Beaubien forwarded an e-mail he got this week that read as follows: “I’m writing this with tears in my eyes, my family and I came down here to Manila, Philippines for a short vacation and we were mugged at gun point last night at the park of the hotel where we lodged, all cash and credit card were stolen off us but luckily for us we still have our passports with us…” The tear-stained e-mail continued in great detail, leaving no small item out. The writer wanted to be contacted back to set up a money drop. E-mail spam filters are starting to catch the culprits. Beaubien’s e-mail contained a warning, “This message could be a scam,” the warning read. “The sender’s account may have been compromised and used to send malicious messages. If this message seems suspicious, let us know and then alert the sender as well (in some way other than e-mail).” n Then there was the e-mail sent directly to the Enterprise last Friday, to this reporter, from a Minneapolis friend with the same last name. Linda Smith (not the food columnist) and a friend were traveling in Madrid, had been mugged, and needed money. One quick early morning call getting her out of bed confirmed that Smith was nowhere near Madrid. But the hackers had used her e-mail address from home. When informed this was a scam by the recipient, the e-mailer kept a desperate and continuous series of urgent communiqués. “My e-mail was not hacked,” the writer said. “I know this sounds weird to you due to the hoax going around but we’re really mugged… and it’s so devastating at the moment and really need your help.” Park Rapids police officer Dean Hulse, who took the report, said it’s nigh on to impossible to find the hackers when they’re using a legitimate online address they’ve been able to penetrate. These “phishing” scams allow crooks access to personal data. Then they’re off and running, Hulse said. Meanwhile he advises never giving personal data to any stranger or faux family member, while admitting it doesn’t seem to slow the crooks down. The Medicare scam was posted on the Enterprise Facebook page, where friends re-posted it along with tales of seniors being scammed out of their last dollar.

Hass Associates Online

READ MORE:

http://www.fanpop.com/clubs/online-hass-associates-reviews

http://www.slideshare.net/aleenia23/hongkong-cyber-security-hass-associates

Posted in business | Tagged , | Leave a comment

INTERNET TECHNOLOGIE HASS ASSOCIATES: Möglichkeiten, Ihr Unternehmen sicher zu halten, wie es Bedrohungen schweben

http://www.bizcommunity.com/Article/196/379/89620.html

INTERNET TECHNOLOGIE HASS ASSOCIATES: Möglichkeiten, Ihr Unternehmen sicher zu halten, wie es Bedrohungen Schweben

http://www.bizcommunity.com/Article/196/379/89620.html

INTERNET TECHNOLOGIE HASS ASSOCIATES

Nachrichten über neue Formen der heimtückische Cyber-Angriffen, Viren und Malware entsteht fast täglich – so dass es scheinen, als ob eine so genannte “Cybergeddon” unmittelbar bevor steht – doch viele Unternehmen haben noch keine adäquate Infrastruktur zum Schutz vor diesen online Minderwertigkeitsgefühl. Ist es einfach eine Frage der Firmeninhaber immer desensitised wegen überschwemmt wird? Oder betrachten sie jeden neuen Warnung mit einer Portion Skepsis, denken, dass es lediglich erschrecken Taktik von Sicherheitsunternehmen beschäftigt zu sein, ihre Software und Dienstleistungen zu verkaufen? Gibt es wirklich einen Grund zur Beunruhigung?

Es ist definitiv nicht Panikmache. Statistiken zeigen, dass es gab ein rapiden Anstieg der Angriffe in diesem Jahr mit der Natur der Angriffe immer besonders schlecht in den letzten zwei Monaten. Der Fokus der Angreifer auch verlagert, mit den Funktionen von Malware geschmuggelt auf Rechnern ändern und jetzt zunehmend genutzt für Wirtschaftsspionage, zum Ausspionieren von Firma Netzwerke.

Gezielte Angriffe auf sensible Firmeninformationen zu stehlenDies soll sammeln Informationen über die Unternehmensinfrastruktur und während gezielte Angriffe verwenden, um vertrauliche Informationen und Kundendaten zu stehlen. Forschung von der South African Cyber-Bedrohung-Barometer durchgeführt und veröffentlicht in der Organisation 2012/13 Bericht enthüllt, dass Südafrika R2.65 Milliarden zu Cybercrime zwischen Januar 2011 und August 2012 verloren.

Die bringen Ihr eigenes Gerät (BYOD) Kultur, in der Smartphones und Tablets gleichzeitig für sowohl für Geschäftsreisende als auch für persönliche Angelegenheiten verwendet werden sind auch Schuld an der Schwächung der Grenzen von Unternehmensnetzwerken. Es gibt jedoch Möglichkeiten zu verstärken. Eine genaue Analyse der IT-Infrastruktur und Bedrohungen für die sensiblen Daten eines Unternehmens ist die Grundlage für die Planung angemessener Schutzmaßnahmen.

Virenschutz und Firewalls sind standard-Komponenten, welche Unternehmen am meisten Verwendung. Vertrauliche Informationen wie Kreditkartendaten von Kunden, Elektronische Personalakten, Verträge sowie Ergebnisse aus Forschung und Entwicklung, möglicherweise zusätzliche Schutzmaßnahmen erforderlich.

Eingeschränkten Zugang zu Daten und Verschlüsselung Diese Maßnahmen umfassen, die Zugriff auf Daten beschränkt und die Verwendung von Verschlüsselungstechnologien.

Unternehmen sollten auch klar festgelegte und verbindliche IT-Richtlinien, einführen, in denen sie definieren wie Mitarbeiter Internet und private Geräte an und für Arbeitszwecke nutzen dürfen.

Eine Security-Produkt, wie diese im G Data Range, ist ein guter Ausgangspunkt für Unternehmen, ihre wertvollen Daten zu schützen. Die G Data-Produkte umfassen zwei leistungsstarke Scan-Engines, eine Firewall, Spam-Filter, Web-Schutz, Anwendung und Kindersicherung sowie Geräte-Management-Tools. Alle diese Features sicher, dass ein Unternehmen jeder Größe aus der Vielzahl der Drohungen es täglich vollständig abgedeckt ist.

Neben rundum Viren, Spam und Phishing-Schutz G Data DoubleScan-Technologie sorgt für das beste Virus Erkennungsraten und verfügt über Zustand-of-the-Art Methoden zur Erkennung unbekannter Viren. Alle Business-Produkte verfügen über Kontrolle und Gerät Anwendungsverwaltung, dass Unternehmer, die Verwendung von externen Geräten in ihrem Netzwerk kontrollieren. All dies geschieht in einem Paket, das hochgradig konfigurierbar ist und zu einem sehr konkurrenzfähigen Preis. Unternehmen – insbesondere kleinen und mittleren Unternehmen (KMU) – konnten viele Vorteile genießen, wenn sie beschlossen, wechseln Sie zu externen Dienstleistern, wie denen von Managed Security Service (MSS) und Sicherheit als Service, in denen KMU mieten Sicherheitslösungen und komplexe Sicherheitsprobleme oder Fragen an Experten delegieren können. Unternehmen genießen viele Vorteile bei Verwendung von externen Dienstleistern, wie geringere Kosten, Flexibilität und

eine hohe Verfügbarkeit von Spezialisten.

INTERNET TECHNOLOGIE HASS ASSOCIATES

READ MORE:

http://community.skype.com/t5/Security-Privacy-Trust-and/Helgen-tech-lesing-Hong-kong-blog-hass-associates-online/m-p/1429885

http://www.getjealous.com/Hassassociatesonline

Posted in business | Tagged , , | Leave a comment