Search results for "exploitation"

showing 10 items of 122 documents

Building sustainable contextual ambidexterity through routines: a case study from information technology firms

2020

The purpose of this paper is to explain the role that routines play in achieving sustainable organisational ambidexterity in information technology (IT) firms. Our exploratory analysis of four case studies reveals the key importance of routines in setting the context for sustainable ambidexterity. Companies build up contextual ambidexterity through routines derived from normalization of processes, normalization of skills, and normalization of results. The findings of the study show that routines support IT professionals to decide whether to exploit or explore in each particular case. Firstly, the enabling character of explicit routines as a result of the normalisation of work processes and …

it firmsKnowledge managementComputer scienceGeography Planning and DevelopmentTJ807-830Management Monitoring Policy and LawTD194-195exploration:CIENCIAS ECONÓMICAS [UNESCO]Renewable energy sources0502 economics and businesscapabilitiesGE1-350AmbidexterityEnvironmental effects of industries and plantsRenewable Energy Sustainability and the Environmentbusiness.industry05 social sciencesInformation technologyUNESCO::CIENCIAS ECONÓMICASBuilding and ConstructionambidexterityEnvironmental sciences050211 marketingbusinessroutines050203 business & managementexploitation
researchProduct

La migración femenina, el trabajo doméstico asalariado y la violación de los derechos humanos

2015

The feminization of migrations, especially in the Mediterranean countries of Europe, is associated with new forms of exploitation of migrant labor. This article aims to analyze from this point of view the market of domestic and care work of migrant women in the homes of Italian families, placing it in relation to the deficiencies of national social policies. The analysis of this phenomenon in the Italian context - developed with the support of a series of interviews with migrant workers - reveals about these women and their families of origin the violation of certain fundamental human rights : primarily the right to the family unity, bound by the rules of family reunification, by the cohabi…

lines of gender and welfare regimeSettore IUS/20 - Filosofia Del Dirittodomestic work and labor exploitationSettore SPS/08 - Sociologia Dei Processi Culturali E ComunicativiSettore SPS/09 - Sociologia Dei Processi Economici E Del Lavoromigration policiehuman rights and right to careFemale migration
researchProduct

On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication

2022

Apache Log4j2 is a prevalent logging library for Java-based applications. In December 2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228, were publicly disclosed, enabling remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure far-reaching. The vulnerabilities potentially affect a wide range of internet of things (IoT) devices, embedded devices, critical infrastructure (CI), and cyber-physical systems (CPSs). In this paper, we study the effects and feasibility of exploiting these vulnerabilities in mission-critical aviation and maritime environment…

log4shellCVE-2021-44228General Computer Sciencelog4jvulnerabilitysatelliteavionicsexperimentationlangaton tiedonsiirtoproof-of-conceptACARSGeneral Materials ScienceElectrical and Electronic EngineeringkyberturvallisuushaavoittuvuusAIStietoliikennesatelliititlentoliikenneGeneral EngineeringaerospaceApachemeriliikennemaritimeaviationlangaton viestintäverkkohyökkäyksetlennonvarmistusexploitationADS-BJavaIEEE Access
researchProduct

Ancianos maltratados, ancianos que maltratan: abuso, negligencia, 'mobbing' y otras formas 'normales' de maltrato

2011

El artículo repasa la tipología más común del maltrato 'físico, emocional, sexual, económico-, así como la negligencia; y el abuso de confianza y la explotación por parte de las personas más próximas, como otras formas de maltrato consideradas 'normales'. La experiencia de la autora se basa en el ejercicio profesional coordinando un SAD para mayores durante veinticinco años, y recogido en su obra, '¿Se puede?'Trabajo social en domicilios de ancianos', premiado por el Colegio profesional de Cataluña y publicado en el 2009. A partir de ahí, propone una reflexión sobre una situación cada vez más extendida, pero que es encubierta por los propios mayores, y que exige a los profesionales informac…

maltrato considerado 'normal'Ancianos maltratados ; maltrato considerado 'normal' ; abuso de confianza ; explotación ancianos Mistreated elderly persons ; mistreatment considered as being 'normal' ; breach of trust ; exploitation of the elderly ArtículoAncianos maltratadosabuso de confianzaexploitation of the elderly Artículo:SOCIOLOGÍA::Cambio y desarrollo social [UNESCO]UNESCO::SOCIOLOGÍA::Cambio y desarrollo socialexplotación ancianos Mistreated elderly personsmistreatment considered as being 'normal'breach of trust
researchProduct

Covid-19 and Inequalities. Protecting Human Rights of Migrants in a Time of Pandemic

2020

By focusing on the Italian context, this article explores the human rights violations that migrants systematically experience and that the current health crisis is unveiling and, in turn, producing. In particular, we look at these dynamics by taking into account four issues/dimensions: the access to essential services and benefits, such as food vouchers; working and living conditions; conditions in reception and detention centres; and the denial of entry to reach ports of safety.

migrant rightinequalitiehuman rightSettore SPS/12 - Sociologia Giuridica della Devianza e Mutamento SocialeSettore IUS/02 - Diritto Privato ComparatoCovid-19exploitation
researchProduct

De l'exploitation à l'entreprise agricole : regards sur la loi d'orientation agricole du 5 janvier 2006

2007

International audience

méthodes d'évaluation de l'entreprise agricoleévolution économique du droit rural[SHS.DROIT]Humanities and Social Sciences/Law[SHS.DROIT] Humanities and Social Sciences/Lawbail rural cessible hors du cadre familialdéfinition juridique de l'exploitation agricoleFonds agricolepas-de-porte en agriculture[ SHS.DROIT ] Humanities and Social Sciences/LawComputingMilieux_MISCELLANEOUS
researchProduct

Le roi en Anjou: fisc, palais et politique de Childebert Ier à Charles le Chauve (milieu du VIe-fin du IXe siècle)

2010

Daniel Prigent et Noël-Yves Tonnerre; International audience

normes et rituels en Occidentexploitations[SHS.HIST] Humanities and Social Sciences/HistoryDomainespropriétésPouvoirsinstitutionsInstitutions ecclésiastiques et milieux de vie religieuse[SHS.HIST]Humanities and Social Sciences/Historyla France (généralités et régions)
researchProduct

Exploration and exploitation : organization's age and the nature of its innovative behavior

2015

This study examines the relationship of an organization's age and its innovative activity. The innovative activity of an organization is discussed and examined through the concepts of exploration and exploitation, basing on the previous literature on organizational ambidexterity. Three hypotheses on the relationship of aging and the innovative behavior of an organization are formed based on the ambidexterity literature and the theories of the effect of aging on an organization. These hypotheses are tested with logistic regression analyses on a patent data set covering the modern biotechnology industry in Finland between 1973–2008. The results of the analyses show that age has a weak but sig…

organizational ambidexterityinnovaatiotoimintaagingorganisaatiottutkimusexplorationexploitationinnovationinnovaatiot
researchProduct

Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic

2021

Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers. Organizations with working antivirus systems and firewalls may be surprised when they discover their network has been encrypted by a ransomware operator. This raises a serious question, how did the attacks go undetected? The conducted research focuses on the most common pitfalls regarding late or even non-existent detection by defining the root cause behind the failed detec…

threat detectionorganisaatiotTK5101-6720threat analysiscyber defensetietotekniikkacybersecurity frameworktestauscyber attack simulationTelecommunicationsimulointisoctietoturvakyberturvallisuusverkkohyökkäyksetexploitationpalomuurit (tietoturva)
researchProduct

Labour Exploitation and Trafficking in the Agricultural Sector Reflections on the (In)Efficacy of Anti-trafficking Interventions in Italy

2014

trafficking Labour exploitation human rights
researchProduct