Search results for "Security"
showing 10 items of 1693 documents
Integrating retirement and permanent disability in NDC pension schemes
2015
ABSTRACTIn this article, we develop a theoretical basis for integrating retirement and permanent disability using a generic nonfinancial defined contribution framework. The methodology we use relies on a multistate overlapping generations model that includes the so-called survivor dividend. Currently, this feature can only be found in the Swedish defined contribution (DC) scheme. The results achieved in the numerical example we present endorse the fact that the model works well. Special attention is given to the assumptions made about mortality rates for disabled people and disability incidence rates, which largely determine the contribution rate assigned to disability. The model could be o…
AN EXPERIMENTAL TEST ON RETIREMENT DECISIONS
2007
I. INTRODUCTION The reform of social security systems is now one of the main issues on the economic policy agenda of most industrialized countries. It is widely considered that, unless serious changes take place, the aging of the population implying a rise in the number of retirees relative to that of workers will threaten the viability, of pay-as-you-go public pension systems in the long run. This threat is being reinforced by the progressive reduction in the retirement age of the working population. The central reforms that are being proposed to neutralize these future financing problems are the raising of the contribution rate, the decreasing of pension benefits, or/and the delay of the …
Proximal and distal antecedents of problematic information technology use in organizations
2021
PurposeExcessive use of work-related information technology (IT) devices can lead to major performance and well-being concerns for organizations. Extant research has provided evidence of the incidence of such problematic IT use in organizations. We extend the understanding of problematic IT use by examining its individual (proximal) and organizational (distal) antecedents.Design/methodology/approachDrawing from the self-worth theory and the concept of fear of being left behind, we address proximal antecedents that lead to problematic IT use. Drawing from the concept of autonomy paradox, we address distal antecedents of problematic IT use through a positive association with the two proximal …
Examining the side effects of organizational Internet monitoring on employees
2020
PurposeInternet monitoring in organizations can be used to monitor risks associated with Internet usage and information systems in organizations, such as employees' cyberloafing behavior and information security incidents. Extant research has mainly discussed the effect of Internet monitoring in achieving the targeted goals (e.g. mitigating cyberloafing behavior and information security incidents), but little attention has been paid to the possible side effects of Internet monitoring. Drawing on affective events theory, the authors attempt to reveal that Internet monitoring may cause side effects on employees' Internet usage policy satisfaction, intrinsic work motivation and affective organ…
Renewable energy and security for Ukraine: challenge or smart way?
2016
Entry and espionage with noisy signals
2014
Abstract We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The potential entrant uses this signal to decide whether or not to enter the market. The incumbent may signal-jam to manipulate the likelihood of the noisy signals and hence affect the entrantʼs decisions. If the precision of the IS is commonly known, the incumbent benefits from his rivalʼs espionage. Actually, he benefits more the higher is the precision of the IS while the spying entrant is worse off…
Trends Regarding the Evolution of the Romanian Pension System
2018
Abstract The pension system, together with the social assistance services form the social security system is recognized worldwide throughout the adoption of the Universal Declaration of Human Rights for the purpose of insured person compensation for damages regarding some inherent risks as: permanent or temporary inability of work, old age or unemployment. The main objectives of a pension system are decreasing poverty regarding the lower income persons throughout the conditions of limitation of the working capacity which are financially vulnerable. In this article we provide a qualitative and quantitative overview regarding the Romanian pension system structure and mechanism. The conclusion…
The European Union’s Development Policy: A Balancing Act between ‘A More Comprehensive Approach’ and Creeping Securitization
2016
More than a decade after the release of the European Security Strategy (ESS) in 2003, its affirmation that development and security policy should work together is still one of its most discussed features. The vision of a more comprehensive — if not integrated — approach to security and development was underwritten by substantial changes to the EU’s external relations bureaucracy following the 2009 Lisbon Treaty. This ambition raises several important questions regarding the potential ‘securitization’ of EU development policy and foreign aid. Have security concerns had a growing influence on EU development policy and aid allocation? Do key concepts that have become prominent since the ESS wa…
Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures
2021
Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and surveillance. This work presents the design and implementation of a complete end-to-end deep learning based edge computing system that can verify a user contactlessly using &lsquo
Fog Computing based traffic Safety for Connected Vulnerable Road Users
2019
Annually, millions of people die and many more sustain non-fatal injuries because of road traffic crashes. Despite multitude of countermeasures, the number of causalities and disabilities owing to traffic accidents are increasing each year causing grinding social, economic, and health problems. Due to their high volume and lack of protective-shells, more than half of road traffic deaths are imputed to vulnerable road users (VRUs): pedestrians, cyclists and motorcyclists. Mobile devices combined with fog computing can provide feasible solutions to protect VRUs by predicting collusions and warning users of an imminent traffic accident. Mobile devices’ ubiquity and high computational capabilit…