Search results for " security"
showing 10 items of 1419 documents
Has financial attitude impacted the trading activity of retail investors during the COVID-19 pandemic?
2020
Financial attitude influences the financial behavior of retail investors. Although the extant research has acknowledged and examined this relationship, the measures of financial attitude and behavior still vary widely and are generally posed as a series of questions rather than statements. In addition to this, there is insufficient knowledge regarding retail investors' behavior in the face of a health crisis, such as the current COVID-19 pandemic. This study addresses these gaps in the prior literature by examining the relative influence of six dimensions of financial attitude, namely, financial anxiety, optimism, financial security, deliberative thinking, interest in financial issues, and …
A simulation of disagreement for control of rational cheating in peer review
2013
Understanding the peer review process could help research and shed light on the mechanisms that underlie crowdsourcing. In this paper, we present an agent-based model of peer review built on three entities - the paper, the scientist and the conference. The system is implemented on a BDI platform (Jason) that allows to define a rich model of scoring, evaluating and selecting papers for conferences. Then, we propose a programme committee update mechanism based on disagreement control that is able to remove reviewers applying a strategy aimed to prevent papers better than their own to be accepted (rational cheating). We analyze a homogeneous scenario, where all conferences aim to the same leve…
Adapting rail and road networks to weather extremes: Case studies for southern Germany and Austria
2013
Published version of an article in the journal: Natural Hazards. Also available from the publisher at: http://dx.doi.org/10.1007/s11069-013-0969-3 The assessment of the current impacts of extreme weather conditions on transport systems reveals high costs in specific locations. Prominent examples for Europe are the economic consequences of the harsh winter periods 2009/2010 and 2010/2011 and the floods in Austria, Eastern Europe, Germany and the United Kingdom in 2005 and 2007. Departing from the EC-funded project WEATHER, this paper delves into the subject of adaptation strategies by revisiting the project’s general findings on adaptation strategies and by adding two specific cases: (1) adv…
A new hybrid procedure for the definition of seismic vulnerability in Mediterranean cross-border urban areas
2016
Assessment of seismic vulnerability of urban areas provides fundamental information for activities of planning and management of emergencies. The main difficulty encountered when extending vulnerability evaluations to urban contexts is the definition of a framework of assessment appropriate for the specific characteristics of the site and providing reliable results with a reasonable duration of surveys and post-processing of data. The paper proposes a new procedure merging different typologies of information recognized on the territories investigated and for this reason called “hybrid.” Knowledge of historical events influencing urban evolution and analysis of recurrent building technologie…
Comparison of Radiosonde and Remote Sensing Data to Evaluate Convective Forest Fire Risk: The Haines Index
2018
Haines Index (HI) has been associated with convective forest fires risk. Temperatures and humidities in low atmospheric levels are required to compute HI and usually, atmospheric sounding data are used for this purpose. However, spatial and temporal resolutions of these data are coarse and remote sensing data could improve them. Therefore, the aim of this work is to test remote sensing data from the Atmospheric Infrared Sounder (AIRS) instrument on board the EOS Aqua satellite, specifically the Level 2 V6 products (AIRX2RET and AIRS2RET), for this purpose. First, we validated the remote sensing data with radiosonde daytime and nighttime data located in the Iberian Peninsula in 2014. Signifi…
Efficient distributed average consensus in wireless sensor networks
2020
International audience; Computing the distributed average consensus in Wireless Sensor Networks (WSNs) is investigated in this article. This problem, which is both natural and important, plays a significant role in various application fields such as mobile agents and fleet vehicle coordination, network synchronization, distributed voting and decision, load balancing of divisible loads in distributed computing network systems, and so on. By and large, the average consensus' objective is to have all nodes in the network converged to the average value of the initial nodes' measurements based only on local nodes' information states. In this paper, we introduce a fully distributed algorithm to a…
The security of mobile business applications based on mCRM
2020
A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…
An NDC approach to helping pensioners cope with the cost of long-term care
2018
The aim of this paper is to analyse whether it would be possible to provide retirement and long-term care benefits using the same unfunded notional defined contribution scheme. We extend the multi-state overlapping generations model developed by Pla-Porcel et al. (2016) to include two new features: a long-term care benefit graded according to the annuitant's degree of disability and a minimum pension benefit for both contingencies. This brings the model closer to the reality of social insurance and enhances its political attractiveness. The paper contains a numerical example to show how the model functions and focuses especially on the mortality rates for dependent persons, the inception ra…
Analyzing the security of Windows 7 and Linux for cloud computing
2013
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.
Disadvantaged by Disability: Examining the Accessibility of Cyber Security
2021
Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…