Search results for "Security"
showing 10 items of 1693 documents
El artículo 18 del estatuto de los trabajadores italiano a la luz de las últimas reformas laborales
2015
En las siguientes líneas se realizará un somero repaso sobre las principales las modificaciones de la disciplina italiana de los despidos individuales recogida en el artículo 18 del Estatuto de los Trabajadores italiano, introducidas por las últimas reformas laborales. En ellas se constará el impacto de dichas reformas en el cuadro legislativo de referencia, viéndose reducida la posibilidad de readmisión del trabajador en el caso de despido individual improcedente. Además se harán unos apuntes críticos sobre el concepto de flexsecurity, de cual se destaca una gran inflación en el presente contexto de crisis económica. This paper examines the amendments made to the Italian regulation of indi…
Politics of Mobility and Stability in Authorizing European Heritage : Estonia’s Great Guild Hall
2019
AbstractKaasik-Krogerus scrutinizes the European Heritage Label (EHL) as an authorized heritage discourse (AHD) in the making. She analyses how the discourse is formed in a politics of mobility and stability between the local, national, and European scales resulting from the interplay of europeanization (of the national and local) and domestication (of the European). The chapter asks how this politics of mobility and stability is conducted to manage the scalar dissonance in one of the sites, the Great Guild Hall in Tallinn, Estonia. Kaasik-Krogerus argues that the politics conducted in the exhibitions works in two controversial ways: legitimizing mobility and stability as natural and simult…
A Century with the Same Problem - Similar but still Different Solutions? : Four perspectives on the security policies of Finland and Estonia during t…
2020
Finland: Finnish Principal
2016
The presentation of principalship in Finland begins by giving an overall description of the Finnish education system and of the formal position of principals in Finland. The more detailed examination of the Finnish principal comprises two main sources. Both sources are reviews on research on principals in Finland in 2000–2010. The first one was conducted for the Swedish Research Council by Risku and Kanervio (Doctoral and regular research on principals in Finland 2000–2010. In: Johansson O (ed) Rektor – en forskningsoversikt 2000–2010 [Principal – a research report]. Vetenskapsradets rapportserie 4:161–186, 2011). The second one is a report by Alava et al. (Changing school management. Statu…
Not Worth the Net Worth? The Democratic Dilemmas of Privileged Access to Information
2017
In this article, we discuss the democratic conditions for parliamentary oversight in EU foreign affairs. Our point of departure is two Interinstitutional Agreements (IIAs) between the Council and the European Parliament (EP), which provide the latter with access to sensitive documents. To shed light on this issue, we ask to what extent these contribute to the democratic accountability in EU foreign policy? It is argued that the IIAs have strengthened the EP’s role in EU foreign affairs by giving it access to information to which it was previously denied. This does not mean, however, that this increase in power equals a strengthening of the EP as a democratic accountability forum. First of a…
The European Unemployment Benefit Scheme: Legal Basis for Resocialising Europe
2017
Il presente lavoro analizza la possibile introduzione di un Sussidio europeo di disoccupazione (d’ora in poi EUBS) nella temperie economico-culturale della crisi quale strumento tecnico-giuridico per la risocializzazione dell’Europa. Dopo un’analisi del sistema statunitense di tutela della disoccupazione, che rappresenterebbe un idealtipo in ragione del sistema di competenze condivise tra livello federale e statale, il saggio si concentra sulla legittimità dell’EUBS alla luce dei trattati UE: nonostante l’assenza di un’autonoma potestas normativa europea in materia di sicurezza sociale, l’EUBS potrebbe essere giustificato da un’interpretazione olistica del diritto dell’Unione. Da ultimo, pe…
LA ORDEN EUROPEA DE INVESTIGACIÓN COMO INSTRUMENTO PARA LA LUCHA CONTRA LA CRIMINALIDAD ORGANIZADA. Significado, sujetos y herramientas en la obtenci…
2022
The study focuses on the analysis and investigation of the European instrument called the European Investigation Order (EIO), and its contributions to the fight against organised crime. This instrument was adopted by the European legislator, with the aim of achieving effective and swift cross-border judicial cooperation in criminal matters. In this context the main question that encourages research is: to what extent is the EIO a suitable instrument in the fight against organised crime? From this question the rest of the questions arise, articulating the structure of the thesis. In addition, in this work, we highlight the comparative perspective: the EIO instrument has been examined from a …
Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context
2021
Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attac…
Eliciting Information on the Vulnerability Black Market from Interviews
2010
Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…
A review of challenges and benefits of integration of CHP plant into the grid: a case study in Serbia
2021
AbstractThe Republic of Serbia must make significant efforts to promote and exploit renewable energy sources and increase energy efficiency in all energy sectors to ensure energy security and economic competitiveness, reduce the negative impact on the environment from energy production and use, and contribute to global efforts to reduce greenhouse gases. Within the paper several issues of integration of recently realized CHP plant are introduced and discussed. Firstly, the legal and energy policy issues in the Republic of Serbia regarding connecting CHP to the grid are presented. The challenges and technical solutions for CHP connection to the grid, as well as power quality issues and the r…