3,008 research outputs found

    Apprentice pay in Britain, Germany and Switzerland: Institutions, market forces and market power

    Get PDF
    This is the accepted version of the original publication in the European Journal of Industrial Relations, which is available online at http://ejd.sagepub.com/content/19/3/201.The pay of metalworking apprentices is high in Britain, middling in Germany and low in Switzerland. We analyse these differences using fieldwork evidence and survey data, drawing on both economic and institutionalist theories. Several institutional attributes influence apprentice pay, partly by affecting supply and demand in markets for training places. Institutional support for apprenticeship training appears to involve important complementarities in both Germany and Switzerland, in contrast to Britain’s less coherent and more market-driven approach.We thank the Hans-Böckler-Stiftung, Anglo-German Foundation, SKOPE (Oxford), the Swiss federal government (OPET/SERI) and WZB (Berlin) for financial support

    Fix the Game, Not the Dame: Restoring Equity in Leadership Evaluations

    Get PDF
    This is the author accepted manuscript. The final version is available from Springer Verlag via the DOI in this record.Female leaders continue to face bias in the workplace compared to male leaders. When employees are evaluated differently because of who they are rather than how they perform, an ethical dilemma arises for leaders and organizations. Thus, bridging role congruity and social identity leadership theories, we propose that gender biases in leadership evaluations can be overcome by manipulating diversity at the team level. Across two multiple-source, multiple-wave, and randomized field experiments, we test whether team gender composition restores gender equity in leadership evaluations. In Study 1, we find that male leaders are rated as more prototypical in male-dominated groups, an advantage that is eliminated in gender-balanced groups. In Study 2, we replicate and extend this finding by showing that leader gender and team gender composition interact to predict trust in the leader via perceptions of leader prototypicality. The results show causal support for the social identity model of organizational leadership and a boundary condition of role congruity theory. Beyond moral arguments of fairness, our findings also show how, in the case of gender, team diversity can create a more level playing field for leaders. Finally, we outline the implications of our results for leaders, organizations, business ethics, and society

    Poaching and firm-sponsored training: first clean evidence

    Full text link
    A series of seminal theoretical papers argues that poaching of employees may hamper company-sponsored general training. However, the extent of poaching, its determinants and consequences, remains an open empirical question. We provide a novel empirical identification strategy for poaching and investigate its causes and consequences. We find that only a small number of training firms in Germany are poaching victims. Firms are more likely to poach employees during an economic downturn. Training firms respond to poaching by lowering the share of new apprentice intakes in the following years

    Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees

    Get PDF
    Composable security definitions, at times called simulation-based definitions, provide strong security guarantees that hold in any context. However, they are also met with some skepticism due to many impossibility results; goals such as commitments and zero-knowledge that are achievable in a stand-alone sense were shown to be unachievable composably (without a setup) since provably no efficient simulator exists. In particular, in the context of adaptive security, the so-called simulator commitment problem arises: once a party gets corrupted, an efficient simulator is unable to be consistent with its pre-corruption outputs. A natural question is whether such impossibility results are unavoidable or only artifacts of frameworks being too restrictive. In this work, we propose a novel type of composable security statement that evades the commitment problem. Our new type is able to express the composable guarantees of schemes that previously did not have a clear composable understanding. To this end, we leverage the concept of system specifications in the Constructive Cryptography framework, capturing the conjunction of several interval-wise guarantees, each specifying the guarantees between two events. We develop the required theory and present the corresponding new composition theorem. We present three applications of our theory. First, we show in the context of symmetric encryption with adaptive corruption how our notion naturally captures the expected confidentiality guarantee---the messages remain confidential until either party gets corrupted---and that it can be achieved by any standard semantically secure scheme (negating the need for non-committing encryption). Second, we present a composable formalization of (so far only known to be standalone secure) commitment protocols, which is instantiable without a trusted setup like a CRS. We show it to be sufficient for being used in coin tossing over the telephone, one of the early intuitive applications of commitments. Third, we reexamine a result by Hofheinz, Matt, and Maurer [Asiacrypt\u2715] implying that IND-ID-CPA security is not the right notion for identity-based encryption, unmasking this claim as an unnecessary framework artifact

    Synchronous Constructive Cryptography

    Get PDF
    This paper proposes a simple synchronous composable security framework as an instantiation of the Constructive Cryptography framework, aiming to capture minimally, without unnecessary artefacts, exactly what is needed to state synchronous security guarantees. The objects of study are specifications (i.e., sets) of systems, and traditional security properties like consistency and validity can naturally be understood as specifications, thus unifying composable and property-based definitions. The framework\u27s simplicity is in contrast to current composable frameworks for synchronous computation which are built on top of an asynchronous framework (e.g. the UC framework), thus not only inheriting artefacts and complex features used to handle asynchronous communication, but adding additional overhead to capture synchronous communication. As a second, independent contribution we demonstrate how secure (synchronous) multi-party computation protocols can be understood as constructing a computer that allows a set of parties to perform an arbitrary, on-going computation. An interesting aspect is that the instructions of the computation need not be fixed before the protocol starts but can also be determined during an on-going computation, possibly depending on previous outputs

    Stratified Abstraction of Access Control Policies

    Get PDF
    The shift to cloud-based APIs has made application security critically depend on understanding and reasoning about policies that regulate access to cloud resources. We present stratified predicate abstraction, a new approach that summarizes complex security policies into a compact set of positive and declarative statements that precisely state who has access to a resource. We have implemented stratified abstraction and deployed it as the engine powering AWS’s IAM Access Analyzer service, and hence, demonstrate how formal methods and SMT can be used for security policy explanation

    Oligomerization and Nitration of the Grass Pollen Allergen Phl p 5 by Ozone, Nitrogen Dioxide, and Peroxynitrite: Reaction Products, Kinetics, and Health Effects

    Get PDF
    The allergenic and inflammatory potential of proteins can be enhanced by chemical modification upon exposure to atmospheric or physiological oxidants. The molecular mechanisms and kinetics of such modifications, however, have not yet been fully resolved. We investigated the oligomerization and nitration of the grass pollen allergen Phl p 5 by ozone (O(3)), nitrogen dioxide (NO(2)), and peroxynitrite (ONOO(–)). Within several hours of exposure to atmospherically relevant concentration levels of O(3) and NO(2), up to 50% of Phl p 5 were converted into protein oligomers, likely by formation of dityrosine cross-links. Assuming that tyrosine residues are the preferential site of nitration, up to 10% of the 12 tyrosine residues per protein monomer were nitrated. For the reaction with peroxynitrite, the largest oligomer mass fractions (up to 50%) were found for equimolar concentrations of peroxynitrite over tyrosine residues. With excess peroxynitrite, the nitration degrees increased up to 40% whereas the oligomer mass fractions decreased to 20%. Our results suggest that protein oligomerization and nitration are competing processes, which is consistent with a two-step mechanism involving a reactive oxygen intermediate (ROI), as observed for other proteins. The modified proteins can promote pro-inflammatory cellular signaling that may contribute to chronic inflammation and allergies in response to air pollution

    Membranes Are Decisive for Maximum Freezing Efficiency of Bacterial Ice Nucleators

    Get PDF
    Ice-nucleating proteins (INPs) from Pseudomonas syringae are among the most active ice nucleators known, enabling ice formation at temperatures close to the melting point of water. The working mechanisms of INPs remain elusive, but their ice nucleation activity has been proposed to depend on the ability to form large INP aggregates. Here, we provide experimental evidence that INPs alone are not sufficient to achieve maximum freezing efficiency and that intact membranes are critical. Ice nucleation measurements of phospholipids and lipopolysaccharides show that these membrane components are not part of the active nucleation site but rather enable INP assembly. Substantially improved ice nucleation by INP assemblies is observed for deuterated water, indicating stabilization of assemblies by the stronger hydrogen bonds of D2O. Together, these results show that the degree of order/disorder and the assembly size are critically important in determining the extent to which bacterial INPs can facilitate ice nucleation.We thank L. Reichelt, N. Bothen, and N. M. Kropf for technical assistance. The TOC graphic and Figures 1 and 2B were created using BioRender.com.Ye

    FACT -- the First Cherenkov Telescope using a G-APD Camera for TeV Gamma-ray Astronomy (HEAD 2010)

    Get PDF
    Geiger-mode Avalanche Photodiodes (G-APD) bear the potential to significantly improve the sensitivity of Imaging Air Cherenkov Telescopes (IACT). We are currently building the First G-APD Cherenkov Telescope (FACT) by refurbishing an old IACT with a mirror area of 9.5 square meters and construct a new, fine pixelized camera using novel G-APDs. The main goal is to evaluate the performance of a complete system by observing very high energy gamma-rays from the Crab Nebula. This is an important field test to check the feasibility of G-APD-based cameras to replace at some time the PMT-based cameras of planned future IACTs like AGIS and CTA. In this article, we present the basic design of such a camera as well as some important details to be taken into account.Comment: Poster shown at HEAD 2010, Big Island, Hawaii, March 1-4, 201

    A novel camera type for very high energy gamma-ray astronomy based on Geiger-mode avalanche photodiodes

    Full text link
    Geiger-mode avalanche photodiodes (G-APD) are promising new sensors for light detection in atmospheric Cherenkov telescopes. In this paper, the design and commissioning of a 36-pixel G-APD prototype camera is presented. The data acquisition is based on the Domino Ring Sampling (DRS2) chip. A sub-nanosecond time resolution has been achieved. Cosmic-ray induced air showers have been recorded using an imaging mirror setup, in a self-triggered mode. This is the first time that such measurements have been carried out with a complete G-APD camera.Comment: 9 pages with 11 figure
    • …
    corecore