3,008 research outputs found

    Apprentice pay in Britain, Germany and Switzerland: Institutions, market forces and market power

    Get PDF
    This is the accepted version of the original publication in the European Journal of Industrial Relations, which is available online at http://ejd.sagepub.com/content/19/3/201.The pay of metalworking apprentices is high in Britain, middling in Germany and low in Switzerland. We analyse these differences using fieldwork evidence and survey data, drawing on both economic and institutionalist theories. Several institutional attributes influence apprentice pay, partly by affecting supply and demand in markets for training places. Institutional support for apprenticeship training appears to involve important complementarities in both Germany and Switzerland, in contrast to Britain’s less coherent and more market-driven approach.We thank the Hans-Böckler-Stiftung, Anglo-German Foundation, SKOPE (Oxford), the Swiss federal government (OPET/SERI) and WZB (Berlin) for financial support

    Poaching and firm-sponsored training: first clean evidence

    Full text link
    A series of seminal theoretical papers argues that poaching of employees may hamper company-sponsored general training. However, the extent of poaching, its determinants and consequences, remains an open empirical question. We provide a novel empirical identification strategy for poaching and investigate its causes and consequences. We find that only a small number of training firms in Germany are poaching victims. Firms are more likely to poach employees during an economic downturn. Training firms respond to poaching by lowering the share of new apprentice intakes in the following years

    Fix the Game, Not the Dame: Restoring Equity in Leadership Evaluations

    Get PDF
    This is the author accepted manuscript. The final version is available from Springer Verlag via the DOI in this record.Female leaders continue to face bias in the workplace compared to male leaders. When employees are evaluated differently because of who they are rather than how they perform, an ethical dilemma arises for leaders and organizations. Thus, bridging role congruity and social identity leadership theories, we propose that gender biases in leadership evaluations can be overcome by manipulating diversity at the team level. Across two multiple-source, multiple-wave, and randomized field experiments, we test whether team gender composition restores gender equity in leadership evaluations. In Study 1, we find that male leaders are rated as more prototypical in male-dominated groups, an advantage that is eliminated in gender-balanced groups. In Study 2, we replicate and extend this finding by showing that leader gender and team gender composition interact to predict trust in the leader via perceptions of leader prototypicality. The results show causal support for the social identity model of organizational leadership and a boundary condition of role congruity theory. Beyond moral arguments of fairness, our findings also show how, in the case of gender, team diversity can create a more level playing field for leaders. Finally, we outline the implications of our results for leaders, organizations, business ethics, and society

    Oligomerization and Nitration of the Grass Pollen Allergen Phl p 5 by Ozone, Nitrogen Dioxide, and Peroxynitrite: Reaction Products, Kinetics, and Health Effects

    Get PDF
    The allergenic and inflammatory potential of proteins can be enhanced by chemical modification upon exposure to atmospheric or physiological oxidants. The molecular mechanisms and kinetics of such modifications, however, have not yet been fully resolved. We investigated the oligomerization and nitration of the grass pollen allergen Phl p 5 by ozone (O(3)), nitrogen dioxide (NO(2)), and peroxynitrite (ONOO(–)). Within several hours of exposure to atmospherically relevant concentration levels of O(3) and NO(2), up to 50% of Phl p 5 were converted into protein oligomers, likely by formation of dityrosine cross-links. Assuming that tyrosine residues are the preferential site of nitration, up to 10% of the 12 tyrosine residues per protein monomer were nitrated. For the reaction with peroxynitrite, the largest oligomer mass fractions (up to 50%) were found for equimolar concentrations of peroxynitrite over tyrosine residues. With excess peroxynitrite, the nitration degrees increased up to 40% whereas the oligomer mass fractions decreased to 20%. Our results suggest that protein oligomerization and nitration are competing processes, which is consistent with a two-step mechanism involving a reactive oxygen intermediate (ROI), as observed for other proteins. The modified proteins can promote pro-inflammatory cellular signaling that may contribute to chronic inflammation and allergies in response to air pollution

    FACT -- the First Cherenkov Telescope using a G-APD Camera for TeV Gamma-ray Astronomy (HEAD 2010)

    Get PDF
    Geiger-mode Avalanche Photodiodes (G-APD) bear the potential to significantly improve the sensitivity of Imaging Air Cherenkov Telescopes (IACT). We are currently building the First G-APD Cherenkov Telescope (FACT) by refurbishing an old IACT with a mirror area of 9.5 square meters and construct a new, fine pixelized camera using novel G-APDs. The main goal is to evaluate the performance of a complete system by observing very high energy gamma-rays from the Crab Nebula. This is an important field test to check the feasibility of G-APD-based cameras to replace at some time the PMT-based cameras of planned future IACTs like AGIS and CTA. In this article, we present the basic design of such a camera as well as some important details to be taken into account.Comment: Poster shown at HEAD 2010, Big Island, Hawaii, March 1-4, 201

    Stratified Abstraction of Access Control Policies

    Get PDF
    The shift to cloud-based APIs has made application security critically depend on understanding and reasoning about policies that regulate access to cloud resources. We present stratified predicate abstraction, a new approach that summarizes complex security policies into a compact set of positive and declarative statements that precisely state who has access to a resource. We have implemented stratified abstraction and deployed it as the engine powering AWS’s IAM Access Analyzer service, and hence, demonstrate how formal methods and SMT can be used for security policy explanation

    A novel camera type for very high energy gamma-ray astronomy based on Geiger-mode avalanche photodiodes

    Full text link
    Geiger-mode avalanche photodiodes (G-APD) are promising new sensors for light detection in atmospheric Cherenkov telescopes. In this paper, the design and commissioning of a 36-pixel G-APD prototype camera is presented. The data acquisition is based on the Domino Ring Sampling (DRS2) chip. A sub-nanosecond time resolution has been achieved. Cosmic-ray induced air showers have been recorded using an imaging mirror setup, in a self-triggered mode. This is the first time that such measurements have been carried out with a complete G-APD camera.Comment: 9 pages with 11 figure

    Universal Composition with Responsive Environments

    Get PDF
    In universal composability frameworks, adversaries (or environments) and protocols/ideal functionalities often have to exchange meta-information on the network interface, such as algorithms, keys, signatures, ciphertexts, signaling information, and corruption-related messages. For these purely modeling-related messages, which do not reflect actual network communication, it would often be very reasonable and natural for adversaries/environments to provide the requested information immediately or give control back to the protocol/functionality immediately after having received some information. However, in none of the existing models for universal composability is this guaranteed. We call this the \emph{non-responsiveness problem}. As we will discuss in the paper, while formally non-responsiveness does not invalidate any of the universal composability models, it has many disadvantages, such as unnecessarily complex specifications and less expressivity. Also, this problem has often been ignored in the literature, leading to ill-defined and flawed specifications. Protocol designers really should not have to care about this problem at all, but currently they have to: giving the adversary/environment the option to not respond immediately to modeling-related requests does not translate to any real attack scenario. This paper solves the non-responsiveness problem and its negative consequences completely, by avoiding this artificial modeling problem altogether. We propose the new concepts of responsive environments and adversaries. Such environments and adversaries must provide a valid response to modeling-related requests before any other protocol/functionality is activated. Hence, protocol designers do no longer have to worry about artifacts resulting from such requests not being answered promptly. Our concepts apply to all existing models for universal composability, as exemplified for the UC, GNUC, and IITM models, with full definitions and proofs (simulation relations, transitivity, equivalence of various simulation notions, and composition theorems) provided for the IITM model

    Composable and Finite Computational Security of Quantum Message Transmission

    Get PDF
    Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the literature are asymptotic, game-based, and not known to be composable. We show how to define finite, composable, computational security for secure quantum message transmission. The new definitions do not involve any games or oracles, they are directly operational: a scheme is secure if it transforms an insecure channel and a shared key into an ideal secure channel from Alice to Bob, i.e., one which only allows Eve to block messages and learn their size, but not change them or read them. By modifying the ideal channel to provide Eve with more or less capabilities, one gets an array of different security notions. By design these transformations are composable, resulting in composable security. Crucially, the new definitions are finite. Security does not rely on the asymptotic hardness of a computational problem. Instead, one proves a finite reduction: if an adversary can distinguish the constructed (real) channel from the ideal one (for some fixed security parameters), then she can solve a finite instance of some computational problem. Such a finite statement is needed to make security claims about concrete implementations. We then prove that (slightly modified versions of) protocols proposed in the literature satisfy these composable definitions. And finally, we study the relations between some game-based definitions and our composable ones. In particular, we look at notions of quantum authenticated encryption and QCCA2, and show that they suffer from the same issues as their classical counterparts: they exclude certain protocols which are arguably secure.Comment: 43+11 pages, 18 figures, v2: minor changes, extended version of the published pape

    FACT -- The G-APD revolution in Cherenkov astronomy

    Full text link
    Since two years, the FACT telescope is operating on the Canary Island of La Palma. Apart from its purpose to serve as a monitoring facility for the brightest TeV blazars, it was built as a major step to establish solid state photon counters as detectors in Cherenkov astronomy. The camera of the First G-APD Cherenkov Telesope comprises 1440 Geiger-mode avalanche photo diodes (G-APD), equipped with solid light guides to increase the effective light collection area of each sensor. Since no sense-line is available, a special challenge is to keep the applied voltage stable although the current drawn by the G-APD depends on the flux of night-sky background photons significantly varying with ambient light conditions. Methods have been developed to keep the temperature and voltage dependent response of the G-APDs stable during operation. As a cross-check, dark count spectra with high statistics have been taken under different environmental conditions. In this presentation, the project, the developed methods and the experience from two years of operation of the first G-APD based camera in Cherenkov astronomy under changing environmental conditions will be presented.Comment: Proceedings of the Nuclear Science Symposium and Medical Imaging Conference (IEEE-NSS/MIC), 201
    • …
    corecore