Search results for "Security"
showing 10 items of 1693 documents
Using protection motivation theory in the design of nudges to improve online security behavior
2019
Abstract We conducted an online experiment (n = 2024) on a representative sample of internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highlighted the potential negative consequences of not doing so. Both increased secure behavior – but the coping message significantly more so. The coping message was also as effective as both messages combined, but not so the threat appeal. Risk attitudes, age and country had a significant effect on behavior. Initiatives seeking to promote se…
Specialized Applications Used in the Mobile Application Security Implementation Process
2020
In the paper, authors aim to determine the extent to which open source applications can replace specialized security applications for mobile applications. In this respect, open source components are selected at which level the implemented security features are identified, based on which a completeness-determining indicator is calculated. The value of this indicator is then compared to the value obtained for the .NET CF3 framework, with a hierarchy of the components being treated according to this indicator. Based on the same selected components or components derived from them, to which other components have been added, the issue of ensuring their quality is dealt with by calculating the com…
Autonomous agent system using dispatching rules in the negotiation protocol
2002
In this paper, the most important results obtained by the simulated application of autonomous agent paradigms to a. real factory are presented. The classical rules of dispatching are compared with the autonomous agents approach. In particular, the possibility of redesigning the negotiation rules in terms of currency in order to take into account even non-time-related costs is considered. Finally, a new project on the effective application of the autonomous agent system to a test bed, modelling a simplified firm, is proposed.
A Rule-Based Multi-agent System for Road Traffic Management
2009
Road Traffic presents a high dynamism which makes necessary the development of traffic management and control strategies to improve traffic flows and more important, road safety. This dynamism makes necessary the use of intelligent systems to support traffic organizations and road operators to cope with incidents. In this paper we introduce a new expert system to support traffic management when weather problems occur in the road network. The system uses multiagent technology to work with the specific characteristics of traffic domain and is able to work in two modes: a) coordinately, where all the agents works to solve problems in large networks and b) locally where due to communications pr…
Hybrid Passive Control Strategies for Reducing the Displacements at the Base of Seismic Isolated Structures
2019
In this paper, the use of hybrid passive control strategies to mitigate the seismic response of a base-isolated structure is examined. The control performance of three different types of devices used for reducing base displacements of isolated buildings is investigated. Specifically, the Tuned Mass Damper (TMD), the New Tuned Mass Damper (New TMD) and the Tuned Liquid Column Damper (TLCD), each one associated to a Base Isolated structure (BI), have been considered. The seismic induced vibration control of base-isolated structures equipped with the TMD, New TMD or the TLCD is examined and compared with that of the base-isolated system without devices, using real recorded seismic signals as e…
ICOOLPS 2010 and MASPEGHI 2010.
2012
International audience; At ECOOP 2010 in Maribor, Slovenia, the two workshops MASPEGHI (MechAnisms for SPEcialization, Generalization and inHerItance) and ICOOOLPS (Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems) were combined because both were rather small and shared common concerns, their topic areas being strongly related. Six papers had been accepted to MASPEGHI, but only five were presented because the authors of one paper could not attend the conference and workshop. Three papers had been accepted to ICOOOLPS, and all were also presented. The workshop authors were later asked to submit extended versions of their papers for possible publica…
Multi-party metering: An architecture for privacy-preserving profiling schemes
2013
Several privacy concerns about the massive deploy- ment of smart meters have been arisen recently. Namely, it has been shown that the fine-grained temporal traces generated by these meters can be correlated with different users behaviors. A new architecture, called multi-party metering, for enabling privacy-preserving analysis of high-frequency metering data without requiring additional complexity at the smart meter side is here proposed. The idea is to allow multiple entities to get a share of the high-frequency metering data rather than the real data, where this share does not reveal any information about the real data. By aggregating the shares provided by different users and publishing …
Cross-lagged associations between perceived external employability, job insecurity, and exhaustion: Testing gain and loss spirals according to the Co…
2012
Summary This study investigates perceived external employability (PEE) as a personal resource in relation to job insecurity and exhaustion. We advance the idea that PEE may reduce feelings of job insecurity and, through felt job insecurity, also exhaustion. That is, we probe the paths from PEE to job insecurity and from job insecurity to exhaustion. We furthermore account for possible reversed causality, so that exhaustion felt job insecurity and felt job insecurity PEE. This aligns with insights from the Conservation of Resources Theory, which is built on the assumption of resource caravans passageways and associated gain and loss spirals. We based the results on a sample of 1314 workers…
Job preservation efforts: when does job insecurity prompt performance?
2020
PurposeWhile job insecurity generally impedes performance, there may be circumstances under which it can prompt performance. The purpose of this paper is to examine a specific situation (reorganization) in which job insecurity may prompt task and contextual performance. The authors propose that performance can represent a job preservation strategy, to which employees may only resort when supervisor-issued ratings of performance are instrumental toward securing one’s job. The authors hypothesize that because of this instrumentality, job insecurity will motivate employees’ performance only when they have low intrinsic motivation, and only when they perceive high distributive justice.Design/me…
Hedging foreign exchange rate risk: Multi-currency diversification
2016
Abstract This article proposes a multi-currency cross-hedging strategy that minimizes the exchange risk. The use of derivatives in small and medium-sized enterprises (SMEs) is not common but, despite its complexity, can be interesting for those with international activities. In particular, the reduction in the exchange risk borne through the use of natural multi-currency cross-hedging is measured, considering Conditional Value-at-Risk (CVaR) and Value-at-Risk (VaR) for measuring market risk instead of the variance. CVaR is minimized using linear programmes, while a multiobjective genetic algorithm is designed for minimizing VaR, considering two scenarios for each currency. The results obtai…