205 research outputs found

    Aging and Older Men: Thoughts, Reflections and Issues: Introduction

    Get PDF
    Efforts across many fields engaged in addressing the population of aging in this country have tended to create a nearly homogenous cohort that often does not recognize the heterogeneity of aging across gender, race, ethnicity, geography, socioeconomic status, cultural and sexual orientation. The diversity within aging members of our society brings about many variations and unique issues that need to be recognized and explored by policy makers and practitioners. Among these is aging related to gender, which has tended to pay much less attention to men than women. Content analysis of journals and texts on aging has revealed a significant lack of content on men, in particular, aging and elderly men (Kosberg, 2002; Tobin, 1997)

    The effectiveness of knowledge sharing: the case of ProMusa

    Get PDF
    This brief is based on a report by Genowefa Blundo-Canto and Elisabetta Gotor ‘Evaluation of Bioversity International’s ProMusa networkIn 2013, a study was undertaken to assess the nature and effectiveness of ProMusa from the point of view of its members and subscribers, what outputs are produced and how these are translated into outcomes and disseminated outside the network. The network provides the type and quality of services that its members expect: InfoMus@ and the mailing lists are the most successful service. An efficient and timely service on disease outbreaks and other breaking news is also a fundamental tool for ProMusa’s members and subscribers, and it should be a priority

    Controlled Data Sharing for Collaborative Predictive Blacklisting

    Get PDF
    Although sharing data across organizations is often advocated as a promising way to enhance cybersecurity, collaborative initiatives are rarely put into practice owing to confidentiality, trust, and liability challenges. In this paper, we investigate whether collaborative threat mitigation can be realized via a controlled data sharing approach, whereby organizations make informed decisions as to whether or not, and how much, to share. Using appropriate cryptographic tools, entities can estimate the benefits of collaboration and agree on what to share in a privacy-preserving way, without having to disclose their datasets. We focus on collaborative predictive blacklisting, i.e., forecasting attack sources based on one's logs and those contributed by other organizations. We study the impact of different sharing strategies by experimenting on a real-world dataset of two billion suspicious IP addresses collected from Dshield over two months. We find that controlled data sharing yields up to 105% accuracy improvement on average, while also reducing the false positive rate.Comment: A preliminary version of this paper appears in DIMVA 2015. This is the full version. arXiv admin note: substantial text overlap with arXiv:1403.212

    On Unconditionally Secure Distributed Oblivious Transfer.

    Get PDF
    This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one of them. During a set up phase, the Sender gives information about the secrets to m Servers. Afterwards, in a recovering phase, the Receiver can compute the secret she wishes by interacting with any k of them. More precisely, from the answers received she computes the secret in which she is interested but she gets no information on the others and, at the same time, any coalition of k − 1 Servers can neither compute any secret nor figure out which one the Receiver has recovered. We present an analysis and new results holding for this model: lower bounds on the resources required to implement such a scheme (i.e., randomness, memory storage, communication complexity); some impossibility results for one-round distributed oblivi- ous transfer protocols; two polynomial-based constructions implementing 1-out-of-n dis- tributed oblivious transfer, which generalize and strengthen the two constructions for 1-out-of-2 given by Naor and Pinkas; as well as new one-round and two-round distributed oblivious transfer protocols, both for threshold and general access structures on the set of Servers, which are optimal with respect to some of the given bounds. Most of these constructions are basically combinatorial in nature

    Industry 4.0 and smart data as enablers of the circular economy in manufacturing: Product re-engineering with circular eco-design

    Get PDF
    The digital transformation of manufacturing firms, in addition to making operations more efficient, offers important opportunities both to promote the transition to a circular economy and to experiment with new techniques for designing smarter and greener products. This study integrates Industry 4.0 technologies, smart data, Life Cycle Assessment methodology, and material microstructural analysis techniques to develop and apply a circular eco-design model that has been implemented in the Italian ceramic tile manufacturing industry. The model has been initially adopted in a simulation environment to define five different scenarios of raw material supply, alternative to the current production one. The scenarios were then validated operationally at laboratory scale and in a pilot environment, demonstrating that a proper selection of raw material transport systems significantly improves the environmental performance of the ceramic product. Both the results of the laboratory tests and of the pre-industrial experiments have demonstrated the technological feasibility of the solutions identified with circular eco-design, enabling the re-engineering of the ceramic product as the fifth of the 6Rs of the circular economy. © 2021 by the authors. Licensee MDPI, Basel, Switzerland

    Growing e-waste management risk awareness points towards new recycling scenarios: The view of the Big Four's youngest consultants

    Get PDF
    The e-waste sector is characterised by a rapid growth at global level and therefore involves an area not yet sufficiently investigated in its risk management dimension. This research fills the gap of the absence of a holistic approach to risk identification and assessment in e-waste management, suggesting a new Risk Awareness Indicator (RAI). An integrated Multi-criteria decision analysis (MCDA)-Analytic Hierarchy Process (AHP) is proposed to calculate the new index. Weights and values will be proposed by twenty Big Four's youngest consultants (generation-Z and millennials). For e-waste, cyber risks related to personal data are critical in the collection phase, environmental risks in the transport phase, and financial and economic risks in the processing phase. Recycling scenarios pose less overall risk than landfill alternatives. The results can help policy makers to meet the circular economy targets set at the European Union level by implementing administrative and regulatory simplifications to support recycling supply chains and make them more efficient and resilient after the pandemic disruption. This work focuses on e-waste and the opinion of screenagers consultants, however the methodology used to design the RAI index makes it easy to replicate the analysis to other social settings and other waste supply chains

    The Paradigms of Industry 4.0 and Circular Economy as Enabling Drivers for the Competitiveness of Businesses and Territories: The Case of an Italian Ceramic Tiles Manufacturing Company

    Get PDF
    Sustainable development and the circular economy are two important issues for the future and the competitiveness of businesses. The programs for the integration of sustainability into industrial activities include the reconfiguration of production processes with a view to reducing their impact on the natural system, the development of new eco-sustainable products and the redesign of the business model. This paradigm shift requires the participation and commitment of different stakeholder groups and industry can completely redesign supply chains, aiming at resource efficiency and circularity. Developments in key ICT technologies, such as the Internet of Things (IoT), help this systemic transition. This paper explores the phases of the transition from a linear to a circular economy and proposes a procedure for introducing the principles of sustainability (environmental, economic and social) in a manufacturing environment, through the design of a new Circular Business Model (CBM). The new procedure has been tested and validated in an Italian company producing ceramic tiles, using the digitalization of the production processes of the Industry 4.0 environment, to implement the impact assessment tools (LCA\u2014Life Cycle Assessment, LCC\u2014Life Cycle Costing and S-LCA\u2014Social Life Cycle Assessment) and the business intelligence systems to provide appropriate sustainability performance indicators essential for the definition of the new CBM
    corecore