16,983 research outputs found
Regulation, governance and informality: an empirical analysis of selected countries
The Informal Economy provides employment to more than 60 per cent of the labour population in the developing world despite being a site unfettered by regulations and social norms of fairness governing pay and work conditions. In assessing the factors behind an informal agent’s decision to formalize, it is asserted that rigidity in regulatory mechanism is the primary cause that impedes the process of formalization. However whether flexible regulations can encourage formalization by making gains of formalization more accessible and certain remains a question. In this paper we argue that flexible regulations does not necessarily manifest into the incentives that are essential for formalization. Reducing rigidities in regulation has a significant pay off only in the ambit of good governance. More specifically we hypothesise that degree of intensity of regulation will hardly matter in containing informality; rather what matters is the quality of governance and capability of the institutions to put the regulations into effect. Using secondary data for 46 countries over the period between 1980 and 2008, we empirically investigate into the linkages between governance, regulation and informal employment by developing static and dynamic panel data models and establish that in curbing informality what turns out to be crucial is the interaction between quality of governance and regulation
Hybrid Information Flow Analysis for Programs with Arrays
Information flow analysis checks whether certain pieces of (confidential)
data may affect the results of computations in unwanted ways and thus leak
information. Dynamic information flow analysis adds instrumentation code to the
target software to track flows at run time and raise alarms if a flow policy is
violated; hybrid analyses combine this with preliminary static analysis.
Using a subset of C as the target language, we extend previous work on hybrid
information flow analysis that handled pointers to scalars. Our extended
formulation handles arrays, pointers to array elements, and pointer arithmetic.
Information flow through arrays of pointers is tracked precisely while arrays
of non-pointer types are summarized efficiently.
A prototype of our approach is implemented using the Frama-C program analysis
and transformation framework. Work on a full machine-checked proof of the
correctness of our approach using Isabelle/HOL is well underway; we present the
existing parts and sketch the rest of the correctness argument.Comment: In Proceedings VPT 2016, arXiv:1607.0183
Semantics of trace relations in requirements models for consistency checking and inferencing
Requirements traceability is the ability to relate requirements back to stakeholders and forward to corresponding design artifacts, code, and test cases. Although considerable research has been devoted to relating requirements in both forward and backward directions, less attention has been paid to relating requirements with other requirements. Relations between requirements influence a number of activities during software development such as consistency checking and change management. In most approaches and tools, there is a lack of precise definition of requirements relations. In this respect, deficient results may be produced. In this paper, we aim at formal definitions of the relation types in order to enable reasoning about requirements relations. We give a requirements metamodel with commonly used relation types. The semantics of the relations is provided with a formalization in first-order logic. We use the formalization for consistency checking of relations and for inferring new relations. A tool has been built to support both reasoning activities. We illustrate our approach in an example which shows that the formal semantics of relation types enables new relations to be inferred and contradicting relations in requirements documents to be determined. The application of requirements reasoning based on formal semantics resolves many of the deficiencies observed in other approaches. Our tool supports better understanding of dependencies between requirements
Abstract State Machines 1988-1998: Commented ASM Bibliography
An annotated bibliography of papers which deal with or use Abstract State
Machines (ASMs), as of January 1998.Comment: Also maintained as a BibTeX file at http://www.eecs.umich.edu/gasm
Deriving Quests from Open World Mechanics
Open world games present players with more freedom than games with linear
progression structures. However, without clearly-defined objectives, they often
leave players without a sense of purpose. Most of the time, quests and
objectives are hand-authored and overlaid atop an open world's mechanics. But
what if they could be generated organically from the gameplay itself? The goal
of our project was to develop a model of the mechanics in Minecraft that could
be used to determine the ideal placement of objectives in an open world
setting. We formalized the game logic of Minecraft in terms of logical rules
that can be manipulated in two ways: they may be executed to generate graphs
representative of the player experience when playing an open world game with
little developer direction; and they may be statically analyzed to determine
dependency orderings, feedback loops, and bottlenecks. These analyses may then
be used to place achievements on gameplay actions algorithmically.Comment: To appear at Foundations of Digital Games (FDG) 201
A Survey on Economic-driven Evaluations of Information Technology
The economic-driven evaluation of information technology (IT) has become an important instrument in the management of IT projects. Numerous approaches have been developed to quantify the costs of an IT investment and its assumed profit, to evaluate its impact on business process performance, and to analyze the role of IT regarding the achievement of enterprise objectives. This paper discusses approaches for evaluating IT from an economic-driven perspective. Our comparison is based on a framework distinguishing between classification criteria and evaluation criteria. The former allow for the categorization of evaluation approaches based on their similarities and differences. The latter, by contrast, represent attributes that allow to evaluate the discussed approaches. Finally, we give an example of a typical economic-driven IT evaluation
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial
render instructional content in a three-dimensional immersive computer
experience for training youth with learning impediments. There are limited
prior works that explored attack vulnerability in VR technology, and hence
there is a need for systematic frameworks to quantify risks corresponding to
security, privacy, and safety (SPS) threats. The SPS threats can adversely
impact the educational user experience and hinder delivery of VRLE content. In
this paper, we propose a novel risk assessment framework that utilizes attack
trees to calculate a risk score for varied VRLE threats with rate and duration
of threats as inputs. We compare the impact of a well-constructed attack tree
with an adhoc attack tree to study the trade-offs between overheads in managing
attack trees, and the cost of risk mitigation when vulnerabilities are
identified. We use a vSocial VRLE testbed in a case study to showcase the
effectiveness of our framework and demonstrate how a suitable attack tree
formalism can result in a more safer, privacy-preserving and secure VRLE
system.Comment: Tp appear in the CCNC 2019 Conferenc
- …