8,197 research outputs found

    Employment insecurity and life satisfaction: The moderating influence of labour market policies across Europe

    Get PDF
    This article tests whether the link between employment insecurity and life satisfaction is moderated by the generosity of labour market policies across Europe. Employment insecurity provokes anxieties about (a) the difficulties of finding a new job and (b) alternative sources of non-work income. These components can be related to active and passive labour market policies, respectively. Generous policy support is thus expected to buffer the negative consequences of employment insecurity by lowering the perceived difficulty of finding a similar job or providing income maintenance during unemployment. Based on data for 22 countries from the 2010 European Social Survey, initial support for this hypothesis is found. Perceived employment insecurity is negatively associated with life satisfaction but the strength of the relationship is inversely related to the generosity of labour market policies. Employment insecurity, in other words, is more harmful in countries where labour market policies are less generous

    Multilevel Hashing based Access Control for Authentication and Security in Relational Database Management System

    Get PDF
    The relational database is very widely used in these days and so as the relational database security is very vital to protect from different kinds of threats and attacks. The security of relational database is very important because now these days all data and information are stored in database by some form of database objects including user’s personal information like credit/debit card details, username, passwords etc. as well as confidential data of business organization and companies. Many researches are done in order to protect the relational database from these vulnerabilities but the methodologies of relational database security are not able to protect the relational database from all security issues. Authentication of users is an important issue in the database that is needed to be addressed most because it can give full access to the database objects. In this paper we present various security issues that can cause degradation in relational database security and we also identify various problems in the current database security policies. In this paper we propose the use of Multilevel Hashing based Access control mechanism for authentication and security in Relational database

    Financial hardship and well-being: a cross-national comparison among the European self-employed

    Get PDF
    Based on data from the 2004 and 2010 European Social Survey, this multidisciplinary and cross-national comparative study investigates the relationship between financial hardship and subjective well-being among 9,755 self-employed individuals from 31 European countries. It also aims to identify potential mitigating factors in this relationship on both the individual and the country level. Multilevel regression analyses reveal a strong relationship between financial hardship and impaired well-being, explaining about 36% of variance in well-being between conditions (countries and time periods) and 8% of variance between individuals. In other words, economic conditions matter significantly. Additionally, education and social trust act as important buffering factors for individuals, and the relationship between financial hardship and impaired well-being is somewhat weaker for self-employed persons living in countries with a more supportive social policy in the form of unemployment allowance. Entrepreneurs can hence mitigate the consequences of financial hardship by protecting social resources, and policymakers can be advised to invest in education and social security

    Security Analysis and Improvement Model for Web-based Applications

    Get PDF
    Today the web has become a major conduit for information. As the World Wide Web?s popularity continues to increase, information security on the web has become an increasing concern. Web information security is related to availability, confidentiality, and data integrity. According to the reports from http://www.securityfocus.com in May 2006, operating systems account for 9% vulnerability, web-based software systems account for 61% vulnerability, and other applications account for 30% vulnerability. In this dissertation, I present a security analysis model using the Markov Process Model. Risk analysis is conducted using fuzzy logic method and information entropy theory. In a web-based application system, security risk is most related to the current states in software systems and hardware systems, and independent of web application system states in the past. Therefore, the web-based applications can be approximately modeled by the Markov Process Model. The web-based applications can be conceptually expressed in the discrete states of (web_client_good; web_server_good, web_server_vulnerable, web_server_attacked, web_server_security_failed; database_server_good, database_server_vulnerable, database_server_attacked, database_server_security_failed) as state space in the Markov Chain. The vulnerable behavior and system response in the web-based applications are analyzed in this dissertation. The analyses focus on functional availability-related aspects: the probability of reaching a particular security failed state and the mean time to the security failure of a system. Vulnerability risk index is classified in three levels as an indicator of the level of security (low level, high level, and failed level). An illustrative application example is provided. As the second objective of this dissertation, I propose a security improvement model for the web-based applications using the GeoIP services in the formal methods. In the security improvement model, web access is authenticated in role-based access control using user logins, remote IP addresses, and physical locations as subject credentials to combine with the requested objects and privilege modes. Access control algorithms are developed for subjects, objects, and access privileges. A secure implementation architecture is presented. In summary, the dissertation has developed security analysis and improvement model for the web-based application. Future work will address Markov Process Model validation when security data collection becomes easy. Security improvement model will be evaluated in performance aspect

    Limiting Disclosure in Hippocratic Databases

    Get PDF

    Global Management Effectiveness Study: Integrated Social and Ecological Report for Non-node and Node Sites

    Get PDF
    The purpose of this study is to provide a critical assessment of the implementation, impact, and performance of Marine Managed Area (MMA) projects to serve as a basis for improved planning and implementation of new MMA projects worldwide. The specific objectives of the study are (1) to determine the socioeconomic, governance and ecological effects of MMAs; (2) to determine the critical factors influencing MMA effects, as well as the impact of the timing of those factors on the effects of the MMA; and (3) to provide tools for predicting MMA effects based on ecological, socioeconomic and governance variable

    Minimization of DDoS false alarm rate in Network Security; Refining fusion through correlation

    Get PDF
    Intrusion Detection Systems are designed to monitor a network environment and generate alerts whenever abnormal activities are detected. However, the number of these alerts can be very large making their evaluation a difficult task for a security analyst. Alert management techniques reduce alert volume significantly and potentially improve detection performance of an Intrusion Detection System. This thesis work presents a framework to improve the effectiveness and efficiency of an Intrusion Detection System by significantly reducing the false positive alerts and increasing the ability to spot an actual intrusion for Distributed Denial of Service attacks. Proposed sensor fusion technique addresses the issues relating the optimality of decision-making through correlation in multiple sensors framework. The fusion process is based on combining belief through Dempster Shafer rule of combination along with associating belief with each type of alert and combining them by using Subjective Logic based on JĂžsang theory. Moreover, the reliability factor for any Intrusion Detection System is also addressed accordingly in order to minimize the chance of false diagnose of the final network state. A considerable number of simulations are conducted in order to determine the optimal performance of the proposed prototype

    Modeling the Influence of Land Use Developments on Transportation System Performance

    Get PDF
    The growth in the urban population has influenced urban sprawl, congestion, and subsequently, delays on the existing road infrastructure. New land use developments occur in every part of the city due to rapid economic development and to meet the demand for better living standards. The induced traffic volume generated from such land use developments often results in increased congestion and vehicular delay on the existing roads. With recent advancements in the technology, it is possible to capture continuous, and comprehensive travel time data for every major corridor in a city. Therefore, the goal of this research is to model the influence of land use developments on travel time variations to improve the mobility of people and goods. Data for 259 road links were selected within the city of Charlotte, North Carolina (NC). Three years of travel time data, from the year 2013 to the year 2015, were collected from the private agency. Thirty-five different types of land use developments were considered in this research. The spatial dependency was incorporated by considering the land use developments within 0.5 miles, 1 mile, 2 miles, and 3 miles of the selected road link. Forty-eight statistical models were developed. The results obtained indicate that land use developments have a significant influence on travel times. Different land use categories contribute to the average travel time based on the buffer width, area type, and the link speed limit. Developing the models by classifying the links based on the speed limit (\u3c 45 mph, 45 to 50 mph, and \u3e 50 mph) was observed to be the best approach to examine the relationship between land use developments and the average travel time. Also, typically travel time on a selected road link is higher during the evening peak period compared to the morning peak and the afternoon off-peak period. Further, the results obtained indicate that the number of lanes and the posted speed limit are negatively associated with the travel time of the selected link
    • 

    corecore