Search results for "Security"

showing 10 items of 1693 documents

Integrating retirement and permanent disability in NDC pension schemes

2015

ABSTRACTIn this article, we develop a theoretical basis for integrating retirement and permanent disability using a generic nonfinancial defined contribution framework. The methodology we use relies on a multistate overlapping generations model that includes the so-called survivor dividend. Currently, this feature can only be found in the Swedish defined contribution (DC) scheme. The results achieved in the numerical example we present endorse the fact that the model works well. Special attention is given to the assumptions made about mortality rates for disabled people and disability incidence rates, which largely determine the contribution rate assigned to disability. The model could be o…

Economics and EconometricsPensionActuarial science05 social sciencesDisabled peoplePermanent disabilityOverlapping generations model01 natural sciencesSocial security010104 statistics & probability0502 economics and businessEconomicsMuch difficultyDividend050207 economics0101 mathematicsDisability insuranceApplied Economics
researchProduct

AN EXPERIMENTAL TEST ON RETIREMENT DECISIONS

2007

I. INTRODUCTION The reform of social security systems is now one of the main issues on the economic policy agenda of most industrialized countries. It is widely considered that, unless serious changes take place, the aging of the population implying a rise in the number of retirees relative to that of workers will threaten the viability, of pay-as-you-go public pension systems in the long run. This threat is being reinforced by the progressive reduction in the retirement age of the working population. The central reforms that are being proposed to neutralize these future financing problems are the raising of the contribution rate, the decreasing of pension benefits, or/and the delay of the …

Economics and EconometricsPensionLabour economicseducation.field_of_studyPresent valuemedia_common.quotation_subjectPopulationGeneral Business Management and AccountingSocial securityIncentiveValue (economics)EconomicsProsperityeducationRetirement agemedia_commonEconomic Inquiry
researchProduct

Proximal and distal antecedents of problematic information technology use in organizations

2021

PurposeExcessive use of work-related information technology (IT) devices can lead to major performance and well-being concerns for organizations. Extant research has provided evidence of the incidence of such problematic IT use in organizations. We extend the understanding of problematic IT use by examining its individual (proximal) and organizational (distal) antecedents.Design/methodology/approachDrawing from the self-worth theory and the concept of fear of being left behind, we address proximal antecedents that lead to problematic IT use. Drawing from the concept of autonomy paradox, we address distal antecedents of problematic IT use through a positive association with the two proximal …

Economics and EconometricsSociology and Political ScienceIT insecuritymedia_common.quotation_subjecttieto- ja viestintätekniikkatyöhyvinvointi512 Business and managementtietotekniikkaStructural equation modelingExtant taxonAssociation (psychology)media_commonbusiness.industryCommunicationFear of missing outInformation technology113 Computer and information sciencesLeft behindtyön kuormittavuusfear of missing outFacilitationproblematic IT usedistal antecedentsbusinessPsychologySocial psychologyproximal antecedentsAutonomy
researchProduct

Examining the side effects of organizational Internet monitoring on employees

2020

PurposeInternet monitoring in organizations can be used to monitor risks associated with Internet usage and information systems in organizations, such as employees' cyberloafing behavior and information security incidents. Extant research has mainly discussed the effect of Internet monitoring in achieving the targeted goals (e.g. mitigating cyberloafing behavior and information security incidents), but little attention has been paid to the possible side effects of Internet monitoring. Drawing on affective events theory, the authors attempt to reveal that Internet monitoring may cause side effects on employees' Internet usage policy satisfaction, intrinsic work motivation and affective organ…

Economics and EconometricsSociology and Political ScienceInternet privacypolicy satisfactionAffective events theorykäyttöExtant taxontyöntekijätInformation systemseurantatietoturvakäyttötutkimusriskitWork motivationInternettyömotivaatiobusiness.industryCommunicationSoftware developmentInternet monitoringsitoutuminenInformation securityfield experimentaffective organizational commitmentThe InternetseurantatutkimusbusinessPsychologyInternet monitoringintrinsic work motivationInternet Research
researchProduct

Renewable energy and security for Ukraine: challenge or smart way?

2016

Economics and Econometricsbusiness.industry020209 energyPolitical Science and International Relations0202 electrical engineering electronic engineering information engineeringlcsh:International relations02 engineering and technologyEnergy securityEnvironmental economicsbusinesslcsh:JZ2-6530Renewable energyJournal of International Studies
researchProduct

Entry and espionage with noisy signals

2014

Abstract We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The potential entrant uses this signal to decide whether or not to enter the market. The incumbent may signal-jam to manipulate the likelihood of the noisy signals and hence affect the entrantʼs decisions. If the precision of the IS is commonly known, the incumbent benefits from his rivalʼs espionage. Actually, he benefits more the higher is the precision of the IS while the spying entrant is worse off…

Economics and Econometricsbusiness.industrymedia_common.quotation_subjectRadio jammingEspionagePublic relationsComputer securitycomputer.software_genreInformation asymmetryIndustrial espionageQuality (business)Deterrence theoryBusinessMonopolycomputerPrivate information retrievalFinancemedia_commonGames and Economic Behavior
researchProduct

Trends Regarding the Evolution of the Romanian Pension System

2018

Abstract The pension system, together with the social assistance services form the social security system is recognized worldwide throughout the adoption of the Universal Declaration of Human Rights for the purpose of insured person compensation for damages regarding some inherent risks as: permanent or temporary inability of work, old age or unemployment. The main objectives of a pension system are decreasing poverty regarding the lower income persons throughout the conditions of limitation of the working capacity which are financially vulnerable. In this article we provide a qualitative and quantitative overview regarding the Romanian pension system structure and mechanism. The conclusion…

Economics and Econometricsn34j11Strategy and Managementmedia_common.quotation_subjectpension system0211 other engineering and technologiesDeclarationpension pillars02 engineering and technologysocial protectionj18Regional economics. Space in economics0502 economics and business050207 economicsBusiness and International ManagementromaniaHB71-74media_commonPovertyPublic economicsHuman rights05 social sciences021107 urban & regional planningfiscal sustainabilitySocial securityEconomics as a scienceSocial protectionHT388UnemploymentDamagesh53h55BusinessFiscal sustainabilityFinanceStudia Universitatis „Vasile Goldis” Arad – Economics Series
researchProduct

The European Union’s Development Policy: A Balancing Act between ‘A More Comprehensive Approach’ and Creeping Securitization

2016

More than a decade after the release of the European Security Strategy (ESS) in 2003, its affirmation that development and security policy should work together is still one of its most discussed features. The vision of a more comprehensive — if not integrated — approach to security and development was underwritten by substantial changes to the EU’s external relations bureaucracy following the 2009 Lisbon Treaty. This ambition raises several important questions regarding the potential ‘securitization’ of EU development policy and foreign aid. Have security concerns had a growing influence on EU development policy and aid allocation? Do key concepts that have become prominent since the ESS wa…

EconomyPolitical sciencePolitical economymedia_common.cataloged_instanceSecuritizationSocioeconomic developmentFragile stateTreatyEuropean unionSecurity policyInternational developmentEuropean Security Strategymedia_common
researchProduct

Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures

2021

Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and surveillance. This work presents the design and implementation of a complete end-to-end deep learning based edge computing system that can verify a user contactlessly using &lsquo

Edge deviceComputer Networks and CommunicationsComputer scienceSpeech recognitionlcsh:TK7800-8360securitySign languageVDP::Teknologi: 500::Elektrotekniske fag: 540edge computingCode (cryptography)ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSElectrical and Electronic EngineeringEdge computingAuthenticationhand gestures recognitionArtificial neural networkbusiness.industryDeep learninglcsh:Electronicsdeep learningneural networkscontactless authenticationHardware and ArchitectureControl and Systems Engineeringcamera based authenticationSignal ProcessingArtificial intelligencebusinessGesture
researchProduct

Fog Computing based traffic Safety for Connected Vulnerable Road Users

2019

Annually, millions of people die and many more sustain non-fatal injuries because of road traffic crashes. Despite multitude of countermeasures, the number of causalities and disabilities owing to traffic accidents are increasing each year causing grinding social, economic, and health problems. Due to their high volume and lack of protective-shells, more than half of road traffic deaths are imputed to vulnerable road users (VRUs): pedestrians, cyclists and motorcyclists. Mobile devices combined with fog computing can provide feasible solutions to protect VRUs by predicting collusions and warning users of an imminent traffic accident. Mobile devices’ ubiquity and high computational capabilit…

Efficacité énergétiqueTrust Management and Security[INFO.INFO-MC] Computer Science [cs]/Mobile ComputingEnergy EfficiencyPosition accuracy and predictionPrécision de position géographique et taux d'échantillonnageTraffic SafetyFog ComputingGestion de confiance et sécuritéUsagers vulnérables de la routeVulnerable road usersSécurité routière
researchProduct