Search results for " security"

showing 10 items of 1419 documents

Has financial attitude impacted the trading activity of retail investors during the COVID-19 pandemic?

2020

Financial attitude influences the financial behavior of retail investors. Although the extant research has acknowledged and examined this relationship, the measures of financial attitude and behavior still vary widely and are generally posed as a series of questions rather than statements. In addition to this, there is insufficient knowledge regarding retail investors' behavior in the face of a health crisis, such as the current COVID-19 pandemic. This study addresses these gaps in the prior literature by examining the relative influence of six dimensions of financial attitude, namely, financial anxiety, optimism, financial security, deliberative thinking, interest in financial issues, and …

Artificial neural networkFinancial behaviorCoronavirus disease 2019 (COVID-19)media_common.quotation_subjectFinancial anxietyFace (sociological concept)ArticleOptimismPrecautionary savings0502 economics and businessPandemicmedicineFinancial securitymedia_commonFinanceMarketingPandemicbusiness.industry:Samfunnsvitenskap: 200 [VDP]05 social sciencesCOVID-19Peer reviewAnxietyVDP::Samfunnsvitenskap: 200050211 marketingBusinessmedicine.symptomFinancial attitude050203 business & managementJournal of Retailing and Consumer Services
researchProduct

A simulation of disagreement for control of rational cheating in peer review

2013

Understanding the peer review process could help research and shed light on the mechanisms that underlie crowdsourcing. In this paper, we present an agent-based model of peer review built on three entities - the paper, the scientist and the conference. The system is implemented on a BDI platform (Jason) that allows to define a rich model of scoring, evaluating and selecting papers for conferences. Then, we propose a programme committee update mechanism based on disagreement control that is able to remove reviewers applying a strategy aimed to prevent papers better than their own to be accepted (rational cheating). We analyze a homogeneous scenario, where all conferences aim to the same leve…

Artificial social systems peer review agent-based simulation trust reliability and reputationComputer scienceMechanism (biology)business.industryCheatingmedia_common.quotation_subjectControl (management)Mechanism basedArtificial social systemsComputer securitycomputer.software_genreCrowdsourcingData sciencePeer reviewWorld Wide Webtrust reliability and reputationControl and Systems EngineeringHomogeneouspeer reviewQuality (business)businessPsychologycomputeragent-based simulationmedia_common
researchProduct

Adapting rail and road networks to weather extremes: Case studies for southern Germany and Austria

2013

Published version of an article in the journal: Natural Hazards. Also available from the publisher at: http://dx.doi.org/10.1007/s11069-013-0969-3 The assessment of the current impacts of extreme weather conditions on transport systems reveals high costs in specific locations. Prominent examples for Europe are the economic consequences of the harsh winter periods 2009/2010 and 2010/2011 and the floods in Austria, Eastern Europe, Germany and the United Kingdom in 2005 and 2007. Departing from the EC-funded project WEATHER, this paper delves into the subject of adaptation strategies by revisiting the project’s general findings on adaptation strategies and by adding two specific cases: (1) adv…

Atmospheric ScienceEngineering010504 meteorology & atmospheric sciencesMeteorologyextreme weather events0211 other engineering and technologiesClimate change02 engineering and technologyadaptation01 natural sciencesExtreme weatherroad networksRoad networksNatural hazardinvestments11. SustainabilityEarth and Planetary Sciences (miscellaneous)Regional science0105 earth and related environmental sciencesWater Science and Technologyweather information systems021110 strategic defence & security studiesVDP::Mathematics and natural science: 400::Geosciences: 450business.industryrailway operationsclimate change13. Climate actionforecastsbusiness
researchProduct

A new hybrid procedure for the definition of seismic vulnerability in Mediterranean cross-border urban areas

2016

Assessment of seismic vulnerability of urban areas provides fundamental information for activities of planning and management of emergencies. The main difficulty encountered when extending vulnerability evaluations to urban contexts is the definition of a framework of assessment appropriate for the specific characteristics of the site and providing reliable results with a reasonable duration of surveys and post-processing of data. The paper proposes a new procedure merging different typologies of information recognized on the territories investigated and for this reason called “hybrid.” Knowledge of historical events influencing urban evolution and analysis of recurrent building technologie…

Atmospheric SciencePeak ground accelerationIndex (economics)Vulnerability indexVulnerability index0211 other engineering and technologiesVulnerability020101 civil engineering02 engineering and technology0201 civil engineeringSeismic riskNatural hazardVulnerability curveEarth and Planetary Sciences (miscellaneous)Seismic riskDuration (project management)MasonryWater Science and TechnologyEstimation021110 strategic defence & security studiesPushoverbusiness.industryPGAEnvironmental resource managementVulnerability curvesSettore ICAR/09 - Tecnica Delle CostruzioniMasonry; PGA; Pushover; Seismic risk; Vulnerability curves; Vulnerability index;businessCartographyNatural Hazards
researchProduct

Comparison of Radiosonde and Remote Sensing Data to Evaluate Convective Forest Fire Risk: The Haines Index

2018

Haines Index (HI) has been associated with convective forest fires risk. Temperatures and humidities in low atmospheric levels are required to compute HI and usually, atmospheric sounding data are used for this purpose. However, spatial and temporal resolutions of these data are coarse and remote sensing data could improve them. Therefore, the aim of this work is to test remote sensing data from the Atmospheric Infrared Sounder (AIRS) instrument on board the EOS Aqua satellite, specifically the Level 2 V6 products (AIRX2RET and AIRS2RET), for this purpose. First, we validated the remote sensing data with radiosonde daytime and nighttime data located in the Iberian Peninsula in 2014. Signifi…

Atmospheric sounding021110 strategic defence & security studiesDaytime010504 meteorology & atmospheric sciences0211 other engineering and technologies02 engineering and technology01 natural scienceslaw.inventionHaines IndexSea surface temperatureAtmosphere of EarthlawAtmospheric Infrared SounderRadiosondeEnvironmental scienceSatellite0105 earth and related environmental sciencesRemote sensingIGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium
researchProduct

Efficient distributed average consensus in wireless sensor networks

2020

International audience; Computing the distributed average consensus in Wireless Sensor Networks (WSNs) is investigated in this article. This problem, which is both natural and important, plays a significant role in various application fields such as mobile agents and fleet vehicle coordination, network synchronization, distributed voting and decision, load balancing of divisible loads in distributed computing network systems, and so on. By and large, the average consensus' objective is to have all nodes in the network converged to the average value of the initial nodes' measurements based only on local nodes' information states. In this paper, we introduce a fully distributed algorithm to a…

AtomicitySpeedupComputer Networks and CommunicationsSynchronization networksComputer sciencebusiness.industry020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyEnergy consumptionLoad balancing (computing)[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Consensus[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Distributed algorithm0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer networkComputer Communications
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

An NDC approach to helping pensioners cope with the cost of long-term care

2018

The aim of this paper is to analyse whether it would be possible to provide retirement and long-term care benefits using the same unfunded notional defined contribution scheme. We extend the multi-state overlapping generations model developed by Pla-Porcel et al. (2016) to include two new features: a long-term care benefit graded according to the annuitant's degree of disability and a minimum pension benefit for both contingencies. This brings the model closer to the reality of social insurance and enhances its political attractiveness. The paper contains a numerical example to show how the model functions and focuses especially on the mortality rates for dependent persons, the inception ra…

AttractivenessOrganizational Behavior and Human Resource ManagementEconomics and EconometricsStrategy and ManagementPay as you gomedia_common.quotation_subjectOverlapping generations model01 natural sciencesIndustrial and Manufacturing EngineeringSocial insurance010104 statistics & probabilityEconomics050602 political science & public administration0101 mathematicsLong-term care insuranceNotional amountFunction (engineering)media_commonPensionActuarial scienceMechanical Engineering05 social sciencesMetals and Alloys0506 political scienceSocial securityLong-term careBusinessFinanceJournal of Pension Economics and Finance
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Disadvantaged by Disability: Examining the Accessibility of Cyber Security

2021

Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…

AuthenticationComputer sciencebusiness.industrymedia_common.quotation_subjectFace (sociological concept)UsabilityContext (language use)Computer securitycomputer.software_genreDisadvantagedbusinessDigital divideFunction (engineering)computerQuestionnaire studymedia_common
researchProduct