866 resultados para (In)security feelings


Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper analyzes the choice between limit and market orders in animperfectly competitive noisy rational expectations economy. There is a uniqueinsider, who takes into account the effect their trading has on prices. If theinsider behaves as a price taker, she will choose market orders if her privateinformation is very precise and she will choose limit orders otherwise. On thecontrary, if the insider recognizes and exploits her ability to affect themarket price, her optimal choice is to place limit orders whatever the precisionof her private information.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The arbuscular mycorrhizal symbiosis is formed between arbuscular mycorrhizal fungi (AMF) and plant roots. The fungi provide the plant with inorganic phosphate (P). The symbiosis can result in increased plant growth. Although most global food crops naturally form this symbiosis, very few studies have shown that their practical application can lead to large-scale increases in food production. Application of AMF to crops in the tropics is potentially effective for improving yields. However, a main problem of using AMF on a large-scale is producing cheap inoculum in a clean sterile carrier and sufficiently concentrated to cheaply transport. Recently, mass-produced in vitro inoculum of the model mycorrhizal fungus Rhizophagus irregularis became available, potentially making its use viable in tropical agriculture. One of the most globally important food plants in the tropics is cassava. We evaluated the effect of in vitro mass-produced R. irregularis inoculum on the yield of cassava crops at two locations in Colombia. A significant effect of R. irregularis inoculation on yield occurred at both sites. At one site, yield increases were observed irrespective of P fertilization. At the other site, inoculation with AMF and 50% of the normally applied P gave the highest yield. Despite that AMF inoculation resulted in greater food production, economic analyses revealed that AMF inoculation did not give greater return on investment than with conventional cultivation. However, the amount of AMF inoculum used was double the recommended dose and was calculated with European, not Colombian, inoculum prices. R. irregularis can also be manipulated genetically in vitro, leading to improved plant growth. We conclude that application of in vitro R. irregularis is currently a way of increasing cassava yields, that there is a strong potential for it to be economically profitable and that there is enormous potential to improve this efficiency further in the future.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

166 countries have some kind of public old age pension. What economic forcescreate and sustain old age Social Security as a public program? Mulligan and Sala-i-Martin (1999b) document several of the internationally and historically common features of social security programs, and explore "political" theories of Social Security. This paper discusses the "efficiency theories", which view creation of the SS program as a full of partial solution to some market failure. Efficiency explanations of social security include the "SS as welfare for the elderly" the "retirement increases productivity to optimally manage human capital externalities", "optimal retirement insurance", the "prodigal father problem", the "misguided Keynesian", the "optimal longevity insurance", the "governmenteconomizing transaction costs", and the "return on human capital investment". We also analyze four "narrative" theories of social security: the "chain letter theory", the "lump of labor theory", the "monopoly capitalism theory", and the "Sub-but-Nearly-Optimal policy response to private pensions theory".The political and efficiency explanations are compared with the international and historical facts and used to derive implications for replacing the typical pay-as-you-go system with a forced savings plan. Most of the explanations suggest that forced savings does not increase welfare, and may decrease it.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

166 countries have some kind of public old age pension. What economic forcescreate and sustain old age Social Security as a public program? We document some of the internationally and historically common features of Social Security programs including explicit and implicit taxes on labor supply, pay-as-you-go features, intergenerational redistribution, benefits which areincreasing functions of lifetime earnings and not means-tested. We partition theories of Social Security into three groups: "political", "efficiency" and "narrative" theories. We explore three political theories in this paper: the majority rational voting model (with its two versions: "the elderly as the leaders of a winning coalition with the poor" and the "once and for all election" model), the "time-intensive model of political competition" and the "taxpayer protection model". Each of the explanations is compared with the international and historical facts. A companion paper explores the "efficiency" and "narrative" theories, and derives implicationsof all the theories for replacing the typical pay-as-you-go system with a forced savings plan.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Résumé La cryptographie classique est basée sur des concepts mathématiques dont la sécurité dépend de la complexité du calcul de l'inverse des fonctions. Ce type de chiffrement est à la merci de la puissance de calcul des ordinateurs ainsi que la découverte d'algorithme permettant le calcul des inverses de certaines fonctions mathématiques en un temps «raisonnable ». L'utilisation d'un procédé dont la sécurité est scientifiquement prouvée s'avère donc indispensable surtout les échanges critiques (systèmes bancaires, gouvernements,...). La cryptographie quantique répond à ce besoin. En effet, sa sécurité est basée sur des lois de la physique quantique lui assurant un fonctionnement inconditionnellement sécurisé. Toutefois, l'application et l'intégration de la cryptographie quantique sont un souci pour les développeurs de ce type de solution. Cette thèse justifie la nécessité de l'utilisation de la cryptographie quantique. Elle montre que le coût engendré par le déploiement de cette solution est justifié. Elle propose un mécanisme simple et réalisable d'intégration de la cryptographie quantique dans des protocoles de communication largement utilisés comme les protocoles PPP, IPSec et le protocole 802.1li. Des scénarios d'application illustrent la faisabilité de ces solutions. Une méthodologie d'évaluation, selon les critères communs, des solutions basées sur la cryptographie quantique est également proposée dans ce document. Abstract Classical cryptography is based on mathematical functions. The robustness of a cryptosystem essentially depends on the difficulty of computing the inverse of its one-way function. There is no mathematical proof that establishes whether it is impossible to find the inverse of a given one-way function. Therefore, it is mandatory to use a cryptosystem whose security is scientifically proven (especially for banking, governments, etc.). On the other hand, the security of quantum cryptography can be formally demonstrated. In fact, its security is based on the laws of physics that assure the unconditional security. How is it possible to use and integrate quantum cryptography into existing solutions? This thesis proposes a method to integrate quantum cryptography into existing communication protocols like PPP, IPSec and the 802.l1i protocol. It sketches out some possible scenarios in order to prove the feasibility and to estimate the cost of such scenarios. Directives and checkpoints are given to help in certifying quantum cryptography solutions according to Common Criteria.

Relevância:

40.00% 40.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Resumo:

JXME is the JXTA protocols implementation formobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default security level provided. This paper presents a brief analysis of the current state of security in JXME, focusing on the JXME-Proxied version, identifies existing vulnerabilities and proposes further improvements in this field.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The use of open source software continues to grow on a daily basis. Today, enterprise applications contain 40% to 70% open source code and this fact has legal, development, IT security, risk management and compliance organizations focusing their attention on its use, as never before. They increasingly understand that the open source content within an application must be detected. Once uncovered, decisions regarding compliance with intellectual property licensing obligations must be made and known security vulnerabilities must be remediated. It is no longer sufficient from a risk perspective to not address both open source issues.