69,985 research outputs found

    Gender Equality in the Labor Market in the Philippines

    Get PDF
    This report on gender equality in the labor market in the Philippines is drawn from studies by a team of international consultants selected by the Asian Development Bank (ADB) for a technical assistance project on promoting gender equality in Asian labor markets for inclusive growth, implemented in cooperation with the International Labour Office (ILO), Bangkok. This report comprises a gendered analysis of the Philippines’ labor market, policies, and legislation, and provides recommendations for policies and legislation that have the potential to expand or improve employment and work opportunities for women in specific sectors in the Philippines. The report provides a summary of findings and recommendations that are specifically relevant for the Philippines from an analysis of gender equality and the labor markets in Cambodia, Kazakhstan, and the Philippines, and two global good practice reviews: one on social and economic policy and the other on legislation (ADB 2013a; ADB and ILO 2013a; ADB and ILO 2013b)

    Analysis of the need for skilled workers in the construction industry

    Get PDF
    Includes bibliographical references

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    Fair Labor Association 2007 Annual Report

    Get PDF
    Assesses the progress made by companies in the move towards sustainable corporate responsibility in their labor standards. Breaks up data by company

    Lessons Learned from an Information Security Incident: A Practical Recommendation to Involve Employees in Information Security

    Get PDF
    With the increasingly negative impact of information security attacks, measures of information security, which address the weakest link in the information security chain, namely the employee, have become a necessity for today’s business world. One way to improve employees’ - yet limited - information security awareness is to learn from past information security incidents. This study theoretically builds upon the so called involvement theory to extend the existing research on information security awareness. Insights gained from 34 interviews suggest that involvement accompanied with a detailed review of past security incidents has a positive effect on staff’s information security awareness. Employees, directly affected by an information security incident, gain significant information security expertise and knowledge which they can, again, share with their colleagues. Moreover, constructive team work in the light of information security risks as well as an adequate adjustment of security-related measures is fostered

    A Framework to Detect the Susceptibility of Employees to Social Engineering Attacks

    Get PDF
    Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable SE-attacks not considered by the other researchers. Thus, this thesis aims to address the gap by identifying and analyzing all the factors that make the SE-attack possible. We have developed a framework that operates in an enterprise environment and can detect the susceptibility of victims to SE-attacks. It relies on mapping Gragg’s psychological triggers of social engineering to three groups of factors, namely the national cultural factors, the organizational factors, and the personality traits of employees. Our analysis demonstrates that there is a correlation between the social engineering triggers and the three-layered factors that make employees susceptible to social engineering attacks. Thus, adding these factors in the proposed framework detects susceptibility of victims. Finally, we introduce a proposed framework that would detect and recognize weaknesses and susceptibility of employees in an organization which can be used for enhancing awareness and employee training to better recognize and prevent SE-attacks
    • 

    corecore