2,722 research outputs found

    Do Unprejudiced Societies Need Equal Opportunity Legislation?

    Get PDF
    To what extent should banks, insurance companies and employers be allowed to use personal information about the people whom they lend to, insure or employ in setting the terms of the contract? Even when different treatment is motivated by profit not prejudice, banning discrimination (when combined with mandatory protection against failure) may well be the best way of effecting redistribution of income. Unlike income taxation this policy achieves its goals without much adverse effect on incentives. Public provision of low-powered incentive contracts issued on generous terms is also a potent instrument of efficient redistribution. This is true even if the government cannot observe type but the private sector can.equal opportunities, incentives, contracts, asymmetric information, distribution

    Interaction Between Food Attributes in Markets: The Case of Environmental Labeling

    Get PDF
    Some consumers derive utility from using products produced with specific processes, such as environmentally friendly practices. Means of verifying these credence attributes, such as certification, are necessary for the market to function effectively. A substitute or complementary solution may exist when consumers perceive a relationship between a process attribute and other verifiable product attributes. We present a model where the level of search and experience attributes influences the likelihood of production of eco-friendly products. Our results suggest that the market success of eco-friendly food products requires a mix of environmental and other verifiable attributes that together signal credibility.environmental labeling, food attributes, food marketing, quality perception, Food Consumption/Nutrition/Food Safety,

    Contracting Agile Developments for Mission Critical Systems in the Public Sector

    Get PDF
    Although Agile is a well established software development paradigm, major concerns arise when it comes to contracting issues between a software consumer and a software producer. How to contractualize the Agile production of software, especially for security & mission critical organizations, which typically outsource software projects, has been a major concern since the beginning of the \u201cAgile Era.\u201d In literature, little has been done, from a foundational point of view regarding the formalization of such contracts. Indeed, when the development is outsourced, the management of the contractual life is non\u2013trivial. This happens because the interests of the two parties are typically not aligned. In these situations, software houses strive for the minimization of the effort, while the customer commonly expects high quality artifacts. This structural asymmetry can hardly be overcome with traditional \u201cWaterfall\u201d contracts. In this work, we propose a foundational approach to the Law & Economics of Agile contracts. Moreover, we explore the key elements of the Italian procurement law and outline a suitable solution to merge some basic legal constraints with Agile requirements. Finally, a case study is presented, describing how Agile contracting has been concretely implemented in the Italian Defense Acquisition Process. This work is intended to be a framework for Agile contracts for the Italian public sector of critical systems, according to the new contractual law (Codice degli Appalti)

    Jeremy Bentham\u27s Panopticon Design in Practise [sic] Within the City of Perth

    Get PDF
    This thesis outlines an investigation of Jeremy Bentham’s Panopticon Design that identifies the mechanisms of power which are found to be inherent characteristics within new surveillance technologies. The study includes a discussion of the Perth City Council\u27s implementation of the surveillance program in October 1991 including a detailed analysis of the cultural centre public space. Material provided by Gerard Martinet from the City of Perth, and the Security Industry helped establish a factual ground to form the basis of the investigation. I have sourced a number of academic texts from university libraries, particularly Murdoch University, Curtin University and The University of Western Australia. These texts have offered a broad reading and position from which to start the theoretical framework. I explore Foucault\u27s post structuralist texts by qualitative methodology and comparative analysis, drawing discussion to new surveillance technologies and their impact and use within the City of Perth. A discussion on the decline of the city gave reference to Stanley Cohen for an assessment of the state of society and the current justifications for surveillance technologies. I then identify artists who show how it is appropriate for them to produce work that deals with socio-political concerns and issues that function as social commentary

    Untapped Instrument. Sovereign Wealth Funds and Chinese policy toward the Central and Eastern European countries

    Get PDF
    Although there has been vivid academic debate as to what extent Sovereign Wealth Funds (SWFs) are motivated by political reasons, it is rather clear that countries can use state-owned investment funds as a tool of their foreign policy. Even Barack Obama, during his initial presidential campaign in 2008 commented: “I am obviously concerned if these
 sovereign wealth funds are motivated by more than just market consideration and that’s obviously a possibility”. This book looks at SWF activities in Central and Eastern Europe (CEE) to determine the main motives for SWF presence in CEE. Are the potential financial gains the only reason behind their investments? Are SWF activities in the region dangerous for the stability and security of the CEE countries? The book is pioneering analyses of SWFs behaviour in the region, based on empirical data collected from the Sovereign Wealth Fund Institute Transaction Database, arguably the most comprehensive and authoritative resource tracking SWF investment behaviour globally.RozdziaƂ pochodzi z ksiÄ…ĆŒki: Political Players? Sovereign Wealth Funds’ Investments in Central and Eastern Europe, T. KamiƄski (ed.), Wydawnictwo Uniwersytetu Ɓódzkiego, ƁódĆș 2017.This chapter aims at looking at the role of Sovereign wealth funds (SWFs) in China’s policy toward Central and Eastern European (CEE) countries in the 21st century, especially since the enlargement of the European Union (EU) in 2004. During this time, we could observe an increase of Chinese interest in the region resulting in growing trade, investments and number of contacts on all levels. China has used a wide array of different instruments to achieve its goals in the region: from a big political project such as the “16+1 format” to an unprecedented frequency of contacts between Chinese provinces and their European counterparts (Kaczmarski, JakĂłbowski 2015). Despite a visible growth of economic ties, Beijing presented a very limited will to use investments as a political instrument. Even if Chinese investments in CEE are booming, they are possibly less politically biased and more market-driven than those in other developing countries, like African ones.This book was published in frames of project “Political significance of the Sovereign Wealth Funds’ investments in the Central and Eastern Europe”. The project was financed by the Polish National Science Centre (Decision no. DEC-2012/07/B/HS5/03797)

    The Global Impact of Religious Violence

    Get PDF
    TIP O\u27NEILL, THE FAMOUS Speaker of the United States House of Representatives ( 1977-1987 ), is often credited with popularizing the phrase, \u27\u27.All politics is locaI:\u271 In the case of religious violence, it is particularly difficult to say that all violence is local:\u27 The shootings in Orlando, Florida in June of 2016 are related, even if indirectly, to the airport attacks in Belgium and Istanbul. In turn, these events are related to the American invasion of Iraq and Afghanistan, and to the dissolution of the Ottoman Empire in the early 20th century. Indeed, religious violence can easily transcend geography and locality because its actors live all over the globe and/or can travel seamlessly across many borders. More importantly, the mentality that accompanies religious violence is not restricted to any locality

    Improving the accuracy of spoofed traffic inference in inter-domain traffic

    Get PDF
    Ascertaining that a network will forward spoofed traffic usually requires an active probing vantage point in that network, effectively preventing a comprehensive view of this global Internet vulnerability. We argue that broader visibility into the spoofing problem may lie in the capability to infer lack of Source Address Validation (SAV) compliance from large, heavily aggregated Internet traffic data, such as traffic observable at Internet Exchange Points (IXPs). The key idea is to use IXPs as observatories to detect spoofed packets, by leveraging Autonomous System (AS) topology knowledge extracted from Border Gateway Protocol (BGP) data to infer which source addresses should legitimately appear across parts of the IXP switch fabric. In this thesis, we demonstrate that the existing literature does not capture several fundamental challenges to this approach, including noise in BGP data sources, heuristic AS relationship inference, and idiosyncrasies in IXP interconnec- tivity fabrics. We propose Spoofer-IX, a novel methodology to navigate these challenges, leveraging Customer Cone semantics of AS relationships to guide precise classification of inter-domain traffic as In-cone, Out-of-cone ( spoofed ), Unverifiable, Bogon, and Unas- signed. We apply our methodology on extensive data analysis using real traffic data from two distinct IXPs in Brazil, a mid-size and a large-size infrastructure. In the mid-size IXP with more than 200 members, we find an upper bound volume of Out-of-cone traffic to be more than an order of magnitude less than the previous method inferred on the same data, revealing the practical importance of Customer Cone semantics in such analysis. We also found no significant improvement in deployment of SAV in networks using the mid-size IXP between 2017 and 2019. In hopes that our methods and tools generalize to use by other IXPs who want to avoid use of their infrastructure for launching spoofed-source DoS attacks, we explore the feasibility of scaling the system to larger and more diverse IXP infrastructures. To promote this goal, and broad replicability of our results, we make the source code of Spoofer-IX publicly available. This thesis illustrates the subtleties of scientific assessments of operational Internet infrastructure, and the need for a community focus on reproducing and repeating previous methods.A constatação de que uma rede encaminharĂĄ trĂĄfego falsificado geralmente requer um ponto de vantagem ativo de medição nessa rede, impedindo efetivamente uma visĂŁo abrangente dessa vulnerabilidade global da Internet. Isto posto, argumentamos que uma visibilidade mais ampla do problema de spoofing pode estar na capacidade de inferir a falta de conformidade com as prĂĄticas de Source Address Validation (SAV) a partir de dados de trĂĄfego da Internet altamente agregados, como o trĂĄfego observĂĄvel nos Internet Exchange Points (IXPs). A ideia chave Ă© usar IXPs como observatĂłrios para detectar pacotes falsificados, aproveitando o conhecimento da topologia de sistemas autĂŽnomos extraĂ­do dos dados do protocolo BGP para inferir quais endereços de origem devem aparecer legitimamente nas comunicaçÔes atravĂ©s da infra-estrutura de um IXP. Nesta tese, demonstramos que a literatura existente nĂŁo captura diversos desafios fundamentais para essa abordagem, incluindo ruĂ­do em fontes de dados BGP, inferĂȘncia heurĂ­stica de relacionamento de sistemas autĂŽnomos e caracterĂ­sticas especĂ­ficas de interconectividade nas infraestruturas de IXPs. Propomos o Spoofer-IX, uma nova metodologia para superar esses desafios, utilizando a semĂąntica do Customer Cone de relacionamento de sistemas autĂŽnomos para guiar com precisĂŁo a classificação de trĂĄfego inter-domĂ­nio como In-cone, Out-of-cone ( spoofed ), Unverifiable, Bogon, e Unassigned. Aplicamos nossa metodologia em anĂĄlises extensivas sobre dados reais de trĂĄfego de dois IXPs distintos no Brasil, uma infraestrutura de mĂ©dio porte e outra de grande porte. No IXP de tamanho mĂ©dio, com mais de 200 membros, encontramos um limite superior do volume de trĂĄfego Out-of-cone uma ordem de magnitude menor que o mĂ©todo anterior inferiu sob os mesmos dados, revelando a importĂąncia prĂĄtica da semĂąntica do Customer Cone em tal anĂĄlise. AlĂ©m disso, nĂŁo encontramos melhorias significativas na implantação do Source Address Validation (SAV) em redes usando o IXP de tamanho mĂ©dio entre 2017 e 2019. Na esperança de que nossos mĂ©todos e ferramentas sejam aplicĂĄveis para uso por outros IXPs que desejam evitar o uso de sua infraestrutura para iniciar ataques de negação de serviço atravĂ©s de pacotes de origem falsificada, exploramos a viabilidade de escalar o sistema para infraestruturas IXP maiores e mais diversas. Para promover esse objetivo e a ampla replicabilidade de nossos resultados, disponibilizamos publicamente o cĂłdigo fonte do Spoofer-IX. Esta tese ilustra as sutilezas das avaliaçÔes cientĂ­ficas da infraestrutura operacional da Internet e a necessidade de um foco da comunidade na reprodução e repetição de mĂ©todos anteriores
    • 

    corecore