192 research outputs found

    Netherlands

    Get PDF
    The Netherlands traditionally had ample early retirement possibilities. Several reforms introduced from the late 1990s onward contributed to the successful reversal of this early exit trend. As a result, in 2018, employees o

    Dual-Earner Family Policies at Work for Single-Parent Families

    Get PDF
    Family dynamics are changing and single-parent families are becoming more common across countries. In their flagship report “Progress of the World’s Women, 2019–2020,” UN Women (2019) demonstrated that, contrary to popular belief, couples with children do not constitute a majority of all families, but rather there are many different types of families. Single parenthood is considered a “new social risk” in poverty and inequality (Bonoli, 2013). Therefore, policy makers and legislators have designed targeted policy specifically for single parents, such as targeted child benefits to single parents. In addition, legislation and social policy have been designed and implemented specifically for single parents, such as child support and family law such as child custody and shared residence. This study takes a different approach, based on the universalist argument that without adequate social protection that benefits all families, those families that are more vulnerable are often hit the hardest. We focus on family policies, and specifically we examine whether and to what extent single parents benefit from the same family policies that are available to all families with children

    Living on social assistance with chronic illness: Buffering and undermining features to well-being

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>In Sweden, the social security and sickness insurance systems are comprehensive and aim to provide people whose illness prevents them from earning their own living, with either sickness benefits or disability pension. Some, however, are not entitled to these benefits or receive social insurance benefits at a level too low for subsistence, and are referred to social assistance. The purpose of this study was to explore in depth how social assistance recipients with chronic illness perceive and respond to the experience of living on social assistance.</p> <p>Methods</p> <p>Seventeen in-depth interviews were carried out with chronically ill people who had received social assistance for several years. Grounded theory informed the design of the study.</p> <p>Results</p> <p>The study showed that different strategies (living one day at a time, taking steps forwards and backwards and making attempts to find ways out of the situation) were employed by social assistance recipients to maintain or improve their well-being. Contextual features like the prevailing welfare system, public services and the local neighbourhood could buffer or undermine these strategies and their overall well-being. These features together influenced how interviewees perceived their situation, the possible ways out of the situation and the consequences for their well-being.</p> <p>Conclusion</p> <p>From this study it is evident that the way in which individuals on social assistance interact with services and how they are treated by professionals plays an important role in their well-being, in combination with what kind of help and support is available for recipients through the welfare system. In this respect, persons living on social assistance with chronic illness are particularly vulnerable. This study suggests that more effort should be made to find long term solutions concerning income support, rehabilitation and other services provided to this group.</p

    A New Algorithm for the Unbalanced Meet-in-the-Middle Problem

    Get PDF
    A collision search for a pair of nn-bit unbalanced functions (one is RR times more expensive than the other) is an instance of the meet-in-the-middle problem, solved with the familiar standard algorithm that follows the tradeoff TM=NTM=N, where TT and MM are time and memory complexities and N=2nN=2^n. By combining two ideas, unbalanced interleaving and Oorschot-Wiener parallel collision search, we construct an alternative algorithm that follows T2M=R2NT^2 M = R^2 N, where MRM\le R. Among others, the algorithm solves the well-known open problem: how to reduce the memory of unbalanced collision search

    Simple Nudges for Better Password Creation

    Get PDF
    Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords

    Continuous and transparent multimodal authentication: reviewing the state of the art

    Get PDF
    Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. They are also still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. Thus, it is apparent that a more innovative, convenient and secure user authentication solution is vital. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art and identifying the open problems to be tackled and available solutions to be adopted. It also investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. This is followed by a literature review of the existing research on continuous and transparent multimodal authentication. It concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; however it needs to be developed and extensively evaluated, thus operating in a transparent, continuous and user-friendly manner

    Morphological docking of secretory vesicles

    Get PDF
    Calcium-dependent secretion of neurotransmitters and hormones is essential for brain function and neuroendocrine-signaling. Prior to exocytosis, neurotransmitter-containing vesicles dock to the target membrane. In electron micrographs of neurons and neuroendocrine cells, like chromaffin cells many synaptic vesicles (SVs) and large dense-core vesicles (LDCVs) are docked. For many years the molecular identity of the morphologically docked state was unknown. Recently, we resolved the minimal docking machinery in adrenal medullary chromaffin cells using embryonic mouse model systems together with electron-microscopic analyses and also found that docking is controlled by the sub-membrane filamentous (F-)actin. Currently it is unclear if the same docking machinery operates in synapses. Here, I will review our docking assay that led to the identification of the LDCV docking machinery in chromaffin cells and also discuss whether identical docking proteins are required for SV docking in synapses
    corecore