8,905 research outputs found

    Housing finance in transition economies : the early years in Eastern Europe and the former Soviet Union

    Get PDF
    The transition to markets dominates the development agenda of the 1990s. Financial sector reforms are central to a successful transition to a market economy. The author focuses on one dimension of these reforms: the development of housing finance institutions and services. He presents a progress report for the years since 1989, when the road to change opened with the collapse of communist regimes in most countries. Rather than a detailed account of reform in 25 countries, he offers a general framework for analyzing change and evaluating the prospects for rapid development of market-based housing finance systems. To understand why sound housing finance systems have not yet developed, one must consider factors in four key reform areas: the macroeconomic policies adopted to liberalize the economy and stabilize prices; privatization policies, in particular in housing and real estate; the strategies adopted - whether by design or by default - to reform the financial sector; the nature of the financial priorities and institutional constraints affecting housing finance reform strategies followed in different countries. Housing finance policy development has been somewhat haphazard in many countries. But the evidence suggests that the transition economiesthat have achieved low inflation, have adopted radical banking reforms, and seriously reformed and liberalized their real estate sector should be among the first to develop a modern system of housing finance.Non Bank Financial Institutions,Banks&Banking Reform,Payment Systems&Infrastructure,Housing Finance,Public Sector Economics&Finance,Banks&Banking Reform,Housing Finance,Public Sector Economics&Finance,Non Bank Financial Institutions,Municipal Financial Management

    Refining the PoinTER “human firewall” pentesting framework

    Get PDF
    PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the importance of the human in the organisation, and the need to ensure that humans are resistant to cyber-attacks. To achieve this, some organisations “pentest” their employees, testing their resilience and ability to detect and repel human-targeted attacks. In a previous paper we reported on PoinTER (Prepare TEst Remediate), a human pentesting framework, tailored to the needs of SMEs. In this paper, we propose improvements to refine our framework. The improvements are based on a derived set of ethical principles that have been subjected to ethical scrutiny.MethodologyWe conducted a systematic literature review of academic research, a review of actual hacker techniques, industry recommendations and official body advice related to social engineering techniques. To meet our requirements to have an ethical human pentesting framework, we compiled a list of ethical principles from the research literature which we used to filter out techniques deemed unethical.FindingsDrawing on social engineering techniques from academic research, reported by the hacker community, industry recommendations and official body advice and subjecting each technique to ethical inspection, using a comprehensive list of ethical principles, we propose the refined GDPR compliant and privacy respecting PoinTER Framework. The list of ethical principles, we suggest, could also inform ethical technical pentests.OriginalityPrevious work has considered penetration testing humans, but few have produced a comprehensive framework such as PoinTER. PoinTER has been rigorously derived from multiple sources and ethically scrutinised through inspection, using a comprehensive list of ethical principles derived from the research literature

    Vulnerability assessment and protective effects of coastal vegetation during the 2004 tsunami in Sri Lanka

    Get PDF
    The tsunami of December 2004 caused extensive human and economic losses along many parts of the Sri Lankan coastline. Thanks to extensive national and international solidarity and support in the aftermath of the event, most people managed to restore their livelihoods completely but some households did not manage to recover completely from the impacts of the event. The differential in recovery highlighted the various vulnerabilities and coping capacities of communities exposed to the tsunami. Understanding the elements causing different vulnerabilities is crucial to reducing the impact of future events, yet capturing them comprehensively at the local level is a complex task. This research was conducted in a tsunami-affected area in southwestern Sri Lanka to evaluate firstly the role of coastal vegetation in buffering communities against the tsunami and secondly to capture the elements of vulnerability of affected communities. The area was chosen because of its complex landscape, including the presence of an inlet connecting the Maduganga estuary with the sea, and because of the presence of remaining patches of coastal vegetation. The vulnerability assessment was based on a comprehensive vulnerability framework and on the Sustainable Livelihoods Framework in order to detect inherent vulnerabilities of different livelihood groups. Our study resulted in the identification of fishery and labour-led households as the most vulnerable groups. Unsurprisingly, analyses showed that damages to houses and assets decreased quickly with increasing distance from the sea. It could also be shown that the Maduganga inlet channelled the energy of the waves, so that severe damages were observed at relatively large distances from the sea. Some reports after the tsunami stated that mangroves and other coastal vegetation protected the people living behind them. Detailed mapping of the coastal vegetation in the study area and subsequent linear regression revealed significant differences between three vegetation classes present in the area with regard to water level and damages to houses. As our region showed homogeneity in some important factors such as coastal topography, our results should only be generalised to comparable regions

    Memorable And Secure: How Do You Choose Your PIN?

    Get PDF
    Managing all your PINs is difficult. Banks acknowledge this by allowing and facilitating PIN changes. However, choosing secure PINs is a difficult task for humans as they are incapable of consciously generating randomness. This leads to certain PINs being chosen more frequently than others, which in turn increases the danger of someone else guessing correctly. We investigate different methods of supporting PIN changes and report on an evaluation of these methods in a study with 152 participants. Our contribution is twofold: We introduce an alternative to system-generated random PINs, which considers people’s preferred memorisation strategy, and, secondly, we provide indication that presenting guidance on how to avoid insecure PINs does indeed nudge people towards more secure PIN choices when they are in the process of changing their PINs

    Cosmic-ray acceleration and gamma-ray signals from radio supernovae

    Full text link
    In this work the efficiency of particle acceleration at the forward shock right after the SN outburst for the particular case of the well-known SN 1993J is analyzed. Plasma instabilities driven by the energetic particles accelerated at the shock front grow over intraday timescales and drive a fast amplification of the magnetic field at the shock, that can explain the magnetic field strengths deduced from the radio monitoring of the source. The maximum particle energy is found to reach 1-10 PeV depending on the instability dominating the amplification process. We derive the time dependent particle spectra and the associated hadronic signatures of secondary particles arising from proton proton interactions. We find that the Cherenkov Telescope Array (CTA) should easily detect objects like SN 1993J in particular above 1 TeV, while current generation of Cherenkov telescopes such as H.E.S.S. could only marginally detect such events. The gamma-ray signal is found to be heavily absorbed by pair production process during the first week after the outburst. We predict a low neutrino flux above 10 TeV, implying a detectability horizon with a KM3NeT-type telescope of 1 Mpc only. We finally discuss the essential parameters that control the particle acceleration and gamma-ray emission in other type of SNe.Comment: 7 pages, 3 figures (Note: conflict of .sty file version explains the problems with journal title and the abstract, apologies for any inconvenience). Appears as Nuclear Physics B Proceedings Supplement 2014 Proceedings of the workshop "Cosmic Ray Origin beyond the standard models", San Vito (2014), ed. by O.Tibolla, L. Drur

    Permutation Inference for Canonical Correlation Analysis

    Get PDF
    Canonical correlation analysis (CCA) has become a key tool for population neuroimaging, allowing investigation of associations between many imaging and non-imaging measurements. As other variables are often a source of variability not of direct interest, previous work has used CCA on residuals from a model that removes these effects, then proceeded directly to permutation inference. We show that such a simple permutation test leads to inflated error rates. The reason is that residualisation introduces dependencies among the observations that violate the exchangeability assumption. Even in the absence of nuisance variables, however, a simple permutation test for CCA also leads to excess error rates for all canonical correlations other than the first. The reason is that a simple permutation scheme does not ignore the variability already explained by previous canonical variables. Here we propose solutions for both problems: in the case of nuisance variables, we show that transforming the residuals to a lower dimensional basis where exchangeability holds results in a valid permutation test; for more general cases, with or without nuisance variables, we propose estimating the canonical correlations in a stepwise manner, removing at each iteration the variance already explained, while dealing with different number of variables in both sides. We also discuss how to address the multiplicity of tests, proposing an admissible test that is not conservative, and provide a complete algorithm for permutation inference for CCA.Comment: 49 pages, 2 figures, 10 tables, 3 algorithms, 119 reference
    • …
    corecore