101 research outputs found

    Labour Market and Social Policy in Italy: Challenges and Changes. Bertelsmann Policy Brief #2016/02

    Get PDF
    vEight years after the outbreak of the financial crisis, Italy has still to cope with and overcome a plethora of economic and social challenges. On top of this, it faces an unfavourable demographic structure and severe disparities between its northern and southern regions. Some promising reforms have recently been enacted, specifically targeting poverty and social exclusion. However, much more remains to be done on the way towards greater economic stability and widely shared prosperity

    Evolving Discourses on Water Resource Management and Climate Change in the Equatorial Nile Basin

    Get PDF
    Transboundary water resources management in the Equatorial Nile Basin (EQNB) is a politically contested issue. There is a growing body of literature examining water-related discourses which identifies the ability of powerful actors and institutions to influence policy. Concern about the effects of future climate change has featured strongly in research on the Nile River for several decades. It is therefore timely to consider whether and how these concerns are reflected in regional policy documents and policy discourse. This study analyzes discourse framings of water resources management and climate change in policy documents (27, published between 2001 and 2013) and as elicited in interviews (38) with water managers in the EQNB. Three main discursive framings are identified which are present in the discourses on both subjects: a problem-oriented environmental risk frame and two solution-oriented frames, on governance and infrastructure development. Climate change discourse only emerges as a common topic around 2007. The framings found in the water resources management discourse and the climate change discourse are almost identical, suggesting that discursive framings were adopted from the former for use in the latter. We infer that the climate change discourse may have offered a less politically sensitive route to circumvent political sensitivities around water allocation and distribution between riparian countries in the EQNB. However, the climate change discourse does not offer a lasting solution to the more fundamental political dispute over water allocation. Moreover, in cases where the climate change discourse is subsumed within a water resources management discourse, there are dangers that it will not fully address the needs of effective adaptation

    Suojareleiden mittausketjun signaalinkäsittely

    No full text
    Since the early days of programming and automated reasoning, researchers have developed methods for systematically constructing programs from their specifications. Especially the last decade has seen a flurry of activities including the advent of specialized conferences, such as LOPSTR, covering the synthesis of programs in computational logic. In this paper we analyze and compare three state-of-the-art methods for synthesizing recursive programs in computational logic. The three approaches axe constructive/deductive synthesis, schema-guided synthesis, AA and inductive synthesis. Our comparison is carried out in a systematic way where, for each approach, we describe the key ideas and synthesize a common running example. In doing so, we explore the synergies between the approaches, which we believe are necessary in order to achieve progress over the next decade in this field

    Tool Support for Enforcing Security Policies on Databases

    No full text
    Abstract. Security in general and database protection from unauthorized access in particular, are crucial for organizations. It has long been accepted that security requirements should be considered from the early stages of the development. However, such requirements tend to be neglected or dealt-with only at the end of the development process. The Security Modeling Tool presented in this study aims at enforcing developers, in particular database designers, to deal with database authorization requirements from the early stages of development. This software demonstration shows how the Security Modeling Tool assists to define organizational security policies and use them during the application development to create a secured database schema
    • …
    corecore