119 research outputs found

    The Economic Impact of the Olympic Games: Ex Ante Predictions and Ex Poste Reality

    No full text
    This article uses data from the 1996 Summer Olympic Games and the 2002 Olympic Winter Games to test the predictions of regional input-output models. Real changes associated with these events are insignificant. Nominal measures of demand overstate demand increases and factor price increases absorb the impact of real increases in demand. Nominal changes appear to be limited to hotel prices. Input-output models of a regional economy are often used to predict the impact of short-duration sporting events. Because I-O models assume constant factor prices and technical coefficients between sectors are calibrated from long-run steady-state relations in the regional economy, the predictions greatly overstate the true impact. Because the predictions of these models are increasingly used to justify public subsidies, understanding these deficiencies is crucial

    Security and Privacy as Hygiene Factors of Developer Behavior in Small and Agile Teams

    No full text
    Part 3: Peace, War, Cyber-Security and ICTInternational audienceUser motivations are often considered in human computer relations. The analysis of developer behavior often lacks this perspective. Herzberg’s distinction of motivators and hygiene factors adds a level for the analyses of those sociotechnical phenomena that lead to skipping of security and privacy requirements especially in agile development projects. Requirements of security and privacy are not considered nice-to-have, but as necessary hygiene factors of systems attractiveness, motivation for extra effort is low with respect to those requirements. The motivators for developers – functionality that makes a system special and which is valued by customers and users are dominant for the decisions about priorities of development – hygiene factors like many security requirements get a lower priority. In this paper we introduce this theory with relation to known problems of (agile) development projects with respect to implementing security and privacy. We present this with a case study of mobile app development in a research project that we analyzed by security and privacy aspects
    • …
    corecore