Search results for "BERT"

showing 10 items of 1789 documents

Market Polarization and the Phillips Curve

2021

The Phillips curve has flattened out over the last decades. We develop a model that rationalizes this phenomenon as a result of the observed increase in polarization in many industries, a process along which a few top firms gain an increasing share of their industry market. In the model, firms compete a la Bertrand and there is exit and endogenous market entry, as well as optimal up and downgrading of technology. Firms with larger market shares find optimal to dampen the response of their price changes, thus cushioning the shocks to their marginal costs through endogenous countercyclical markups. Thus, regardless of its causes (technology, competition, barriers to entry, etc.), the recent i…

InflationMarginal costHistoryPolymers and Plasticsmedia_common.quotation_subjectMonetary economicsIndustrial and Manufacturing EngineeringCompetition (economics)Output gapBertrand competitionEconomicsMarket shareBusiness and International ManagementPhillips curveBarriers to entrymedia_commonSSRN Electronic Journal
researchProduct

L’informatica umanistica: attualità e prospettive

2010

Informatica umanistica Massimo Parodi Roberto Busa S.J.Settore M-STO/05 - Storia Della Scienza E Delle TecnicheSettore M-FIL/08 - Storia Della Filosofia Medievale
researchProduct

Strategic leadership in cyber security, case Finland

2020

Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this article is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. In terms of effective strategic leadership of cyber security, it is vital t…

Information Systems and ManagementNational securitybusiness.industrystrateginen johtaminenComputer securitycomputer.software_genreCyber securityComputer Science ApplicationsStrategic leadershipKey (cryptography)strategic leadershiptietoturvakansallinen turvallisuusnational securitykyberturvallisuusbusinesscomputerComputingMilieux_MISCELLANEOUSSoftware
researchProduct

Comparing Cybersecurity Information Exchange Models and Standards for the Common Secure Information Management Framework

2021

Cyber threats have increased in spite of formal economic integration in the world. Decision-makers and authorities need to respond to the growing challenge of cyberthreats by increasing cooperation. Information is one of the main facilities when the objective is to prevent hybrid threats at the EU level and between the western countries. The main purpose of the study is to find out separating and combining factors concerning existing cyber information sharing models and information management frameworks in western countries. The aim is also to find out crucial factors, which affect the utilization of a common Early Warning System for the ECHO stakeholders. The main findings are that unclear…

Information managementComputer securitycomputer.software_genreCritical infrastructureInformation sharing Early warning Standards ECHO projectInformation systemmedia_common.cataloged_instancestandarditEuropean unionkansallinen turvallisuuskyberturvallisuusRisk managementInformation exchangemedia_commonturvallisuuspolitiikkaearly warningbusiness.industryturvallisuusympäristöInformation sharingtietojenvaihtoECHO projectManagement information systemsinformation sharingstandardsBusinesscomputertiedonkulkuDigital Transformation, Cyber Security and Resilience of Modern Societies. Studies in Big Data, vol 84
researchProduct

Parlons sécurité

2012

National audience; Les questions de sécurité publique sont au cœur de l’actualité française. En témoignent les lois d'orientation et de programmation pour la performance de la sécurité intérieure (dites LOPSI 1 et LOPPSI 2), le débat autour du fichier central d’identité biométrique ou encore celui sur la vidéosurveillance et les violences urbaines avec l’exemple anglais. Quels sont les enjeux et les réalités de la sécurité en France ? Pour sortir du brouhaha médiatique, « Entrez dans l’actu » vous présente l’éventail des informations en mesure de vous éclairer objectivement.

Informatique et libertésFichiers d'enquêtePolice and Policing[SHS.INFO]Humanities and Social Sciences/Library and information sciencessecurite[ SHS.INFO ] Humanities and Social Sciences/Library and information sciencesStatistique criminelleVideosurveillance[SHS.INFO] Humanities and Social Sciences/Library and information sciences
researchProduct

Vidéosurveillane : la fuite en avant technologique

2012

National audience; Objectif fixé par le gouvernement français : 60.000 caméras à la fin 2012. Si ce chiffre n’a aucune chance d’être atteint, force est de constater que les dispositifs de vidéosurveillance se sont multipliés ces dernières années. Mais est-ce vraiment un problème ? Ne s’agit-il pas au contraire d’une opportunité pour améliorer notre sécurité ? Telle est la vision de certains. Pour d’autres, les bénéfices ne sont pas avérés, et les effets négatifs pourraient même être dominants. Plongé au cœur de cette opposition, le lecteur pourra juger de la pertinence économique, sociale et éthique de ces dispositifs.

Informatique et libertésvidéosurveillance[SHS.INFO]Humanities and Social Sciences/Library and information sciences[ SHS.INFO ] Humanities and Social Sciences/Library and information sciencesPolitique Publique[SHS.INFO] Humanities and Social Sciences/Library and information sciences
researchProduct

Isolated childhood growth hormone deficiency: a 30-year experience on final height and a new prediction model

2022

Purpose We aimed to evaluate the near-final height (nFHt) in a large cohort of pediatricpatients with growth hormone deficiency (GHD) and to elaborate a new predictive method of nFHt. Methods We recruited GHD patients diagnosed between 1987 and 2014 and followed-up until nFHt. To predict the values of nFHt, each predictor was run in a univariable spline. Results We enrolled 1051 patients. Pre-treatment height was -2.43 SDS, lower than parental height (THt) (-1.09 SDS, p < 0.001). The dose of recombinant human GH (rhGH) was 0.21mg/kg/week at start of treatment. nFHt was -1.08 SDS (height gain 1.27 SDS), higher than pre-treatment height (p < 0.001) and comparable to THt. 1.6% of the pat…

Insulin-like growth factor 1Human Growth HormoneEndocrinology Diabetes and MetabolismPubertyFinal height; Growth; Growth hormone deficiency; Growth hormone retesting; Insulin-like growth factor 1; LMG method; PredictionDwarfismGrowthBody HeightCohort StudiesEndocrinologySettore MED/38 - Pediatria Generale E SpecialisticaGrowth hormone retestingPituitaryFinal heightGrowth HormoneFinal height; Growth; Growth hormone deficiency; Growth hormone retesting; Insulin-like growth factor 1; LMG method; Prediction; Body Height; Child; Cohort Studies; Growth Hormone; Humans; Puberty; Dwarfism Pituitary; Human Growth HormoneHumansGrowth hormone deficiencyLMG methodDwarfism PituitaryPredictionChildFinal height Growth Growth hormone deficiency Growth hormone retesting Insulin-like growth factor 1 LMG method Prediction
researchProduct

Approvvigionamento di flussi e dati tramite il dispositivo telefonico altrui

2019

Il contributo affronta il tema delle indagini digitali tramite dispositivo telefonico. Ci si chiede mediante quali mezzi di ricerca della prova si possono acquisire tutte le informazioni utili alle indagini contenute in un telefono cellulare e se, per il buon esito delle stesse, sia consentito servirsi incondizionatamente del dispositivo, procedendo a una immediata ispezione o perquisizione, ovvero se non sia più opportuno che l'apparecchio venga sottoposto a sequestro e, con l'ausilio di esperti, procedere all'analisi e all'acquisizione dei dati ivi contenuti mediante un accertamento tecnico che, in molti casi, può assumere il connotato della irripetibilità. Ci si chiede, inoltre, se è rag…

Intercettazioni telefoniche - Indagini atipiche - Attività ispettiva urgente della polizia giudiziariaSettore IUS/16 - Diritto Processuale PenaleIndagini digitali - Ispezione - Perquisizione - Accertamenti tecnici irripetibili - Attività della polizia giudiziaria - Attività del pubblico ministero - Diritto alla riservatezza - Libertà e segretezza delle comunicazioni - Inviolabilità del domicilio - Diritto alla privacy
researchProduct

La responsabilité pénale dérivée du titulaire d'un compte Facebook

2022

International audience

InternetLiberté d'expressionFacebook[SHS.DROIT]Humanities and Social Sciences/Law[SHS.DROIT] Humanities and Social Sciences/LawRéseau socialComputingMilieux_MISCELLANEOUSDroit et Liberté FondamentauxSite internet
researchProduct

Loi Avia : une censure attendue mais paradoxalement surprenante

2020

International audience

InternetLiberté d'expression[SHS.DROIT]Humanities and Social Sciences/Law[SHS.DROIT] Humanities and Social Sciences/LawPlateformeDiscours de haineComputingMilieux_MISCELLANEOUSConseil constitutionnel
researchProduct