785 resultados para Governance of security
Resumo:
Several countries have invested in technologies for Smart Grids. Among such protocols designed cover this area, highlights the DNP3 (Distributed Network Protocol version 3). Although the DNP3 be developed for operation over the serial interface, there is a trend in the literature to the use of other interfaces. The Zigbee wireless interface has become more popular in the industrial applications. In order to study the challenges of integrating of these two protocols, this article is presented the analysis of DNP3 protocol stack through state machines The encapsulation of DNP3 messages in P2P (point-to-point) ZigBee Network, may assist in the discovery and solution of failures of availability and security of this integration. The ultimate goal is to merge the features of DNP3 and Zigbee stacks, and display a solution that provides the benefits of wireless environment, without impairment of security required for Smart Grid applications.
Resumo:
In this paper, we perform a thorough analysis of a spectral phase-encoded time spreading optical code division multiple access (SPECTS-OCDMA) system based on Walsh-Hadamard (W-H) codes aiming not only at finding optimal code-set selections but also at assessing its loss of security due to crosstalk. We prove that an inadequate choice of codes can make the crosstalk between active users to become large enough so as to cause the data from the user of interest to be detected by other user. The proposed algorithm for code optimization targets code sets that produce minimum bit error rate (BER) among all codes for a specific number of simultaneous users. This methodology allows us to find optimal code sets for any OCDMA system, regardless the code family used and the number of active users. This procedure is crucial for circumventing the unexpected lack of security due to crosstalk. We also show that a SPECTS-OCDMA system based on W-H 32(64) fundamentally limits the number of simultaneous users to 4(8) with no security violation due to crosstalk. More importantly, we prove that only a small fraction of the available code sets is actually immune to crosstalk with acceptable BER (<10(-9)) i.e., approximately 0.5% for W-H 32 with four simultaneous users, and about 1 x 10(-4)% for W-H 64 with eight simultaneous users.
Resumo:
A 30 anni dalla Dichiarazione di Alma Ata, l'Organizzazione Mondiale della Sanità, sia nei lavori della Commissione sui Determinanti Sociali della Salute che nel corso della sua 62^ Assemblea (2009) ha posto nuovamente la sua attenzione al tema dei determinanti sociali della salute e allo sviluppo di una sanità secondo un approccio "Primary Health Care", in cui la partecipazione ai processi decisionali è uno dei fattori che possono incidere sull'equità in salute tra e nelle nazioni. Dopo una presentazione dei principali elementi e concetti teorici di riferimento della tesi: Determinanti Sociali della Salute, partecipazione ed empowerment partecipativo (Cap. 1 e 2), il lavoro di tesi, a seguito dell'attività di ricerca di campo svolta in Zambia (Lusaka, Kitwe e Ndola) e presso EuropeAid (Bruxelles), si concentra sui processi di sviluppo e riforma del settore sanitario (Cap. 3), sulle politiche di cooperazione internazionale (Cap.4) e sull'azione (spesso sperimentale) della società civile in Zambia, considerando (Cap. 5): le principali criticità e limiti della/alla partecipazione, la presenza di strumenti e strategie specifiche di empowerment partecipativo, le politiche di decentramento e accountability, le buone prassi e proposte emergenti dalla società civile, le linee e i ruoli assunti dai donatori internazionali e dal Governo dello Zambia. Con questa tesi di dottorato si è voluto evidenziare e interpretare sia il dibattito recente rispetto alla partecipazione nel settore sanitario che i diversi e contraddittori gradi di attenzione alla partecipazione delle politiche di sviluppo del settore sanitario e l'emergere delle istanze e pratiche della società civile. Tutto questo incide su spazi e forme di partecipazione alla governance e ai processi decisionali nel settore sanitario, che influenzano a loro volta le politiche e condizioni di equità in salute. La metodologia adottata è stata di tipo qualitativo articolata in osservazione, interviste, analisi bibliografica e documentale.
Resumo:
La costruzione di un modello efficiente di corporate governance deve offrire una disciplina adeguata dei doveri contabili. Ciò nonostante, gli ordinamenti giuridici configurano i doveri di contabilità in modo incompleto, giacché l’inadempimento di questi non comporta una sanzione diretta per il soggetto inadempiente. Come informazione sulla situazione economica e finanziaria della società, esiste un interesse pubblico nella contabilità, e questa può servire come base di giudizio a soggetti interni ed esterni all’impresa, nell’adozione delle sue scelte. Disporre di un’informazione falsa o inesatta al riguardo può comportare un danno ingiustificato alla società stessa, ai soci o ai terzi, che potranno esercitare le azioni precise per il risarcimento del danno cagionato. Per evitare la produzione di questi danni, da una prospettiva preventiva, la corporate governance delle società di capitali può prevedere dei meccanismi di controllo che riducano il rischio di offrire un’informazione sbagliata. Questi controlli potranno essere esercitati da soggetti interni o esterni (revisori legali) alla struttura della società, ed avranno una configurazione diversa a seconda che le società adottino una struttura monistica o dualistica di governance. Questo ci colloca di fronte ad una eventuale situazione di concorrenza delle colpe, giacché i diversi soggetti che intervengono nel processo d’elaborazione dell’informazione contabile versano la sua attuazione sullo stesso documento: il bilancio. Risulta dunque cruciale determinare il contributo effettivo di ciascuno per analizzare il suo grado di responsabilità nella produzione del danno.
Resumo:
This dissertation investigates corporate governance and dividend policy in banking. This topic has recently attracted the attention of numerous scholars all over the world and currently remains one of the most discussed topics in Banking. The core of the dissertation is constituted by three papers. The first paper generalizes the main achievements in the field of relevant study using the approach of meta-analysis. The second paper provides an empirical analysis of the effect of banking corporate governance on dividend payout. Finally, the third paper investigates empirically the effect of government bailout during 2007-2010 on corporate governance and dividend policy of banks. The dissertation uses a new hand-collected data set with information on corporate governance, ownership structure and compensation structure for a sample of listed banks from 15 European countries for the period 2005-2010. The empirical papers employ such econometric approaches as Within-Group model, difference-in-difference technique, and propensity score matching method based on the Nearest Neighbor Matching estimator. The main empirical results may be summarized as follows. First, we provide evidence that CEO power and connection to government are associated with lower dividend payout ratios. This result supports the view that banking regulators are prevalently concerned about the safety of the bank, and powerful bank CEOs can afford to distribute low payout ratios, at the expense of minority shareholders. Next, we find that government bailout during 2007-2010 changes the banks’ ownership structure and helps to keep lending by bailed bank at the pre-crisis level. Finally, we provide robust evidence for increased control over the banks that receive government money. These findings show the important role of government when overcoming the consequences of the banking crisis, and high quality of governance of public bailouts in European countries.
Resumo:
Reliable electronic systems, namely a set of reliable electronic devices connected to each other and working correctly together for the same functionality, represent an essential ingredient for the large-scale commercial implementation of any technological advancement. Microelectronics technologies and new powerful integrated circuits provide noticeable improvements in performance and cost-effectiveness, and allow introducing electronic systems in increasingly diversified contexts. On the other hand, opening of new fields of application leads to new, unexplored reliability issues. The development of semiconductor device and electrical models (such as the well known SPICE models) able to describe the electrical behavior of devices and circuits, is a useful means to simulate and analyze the functionality of new electronic architectures and new technologies. Moreover, it represents an effective way to point out the reliability issues due to the employment of advanced electronic systems in new application contexts. In this thesis modeling and design of both advanced reliable circuits for general-purpose applications and devices for energy efficiency are considered. More in details, the following activities have been carried out: first, reliability issues in terms of security of standard communication protocols in wireless sensor networks are discussed. A new communication protocol is introduced, allows increasing the network security. Second, a novel scheme for the on-die measurement of either clock jitter or process parameter variations is proposed. The developed scheme can be used for an evaluation of both jitter and process parameter variations at low costs. Then, reliability issues in the field of “energy scavenging systems” have been analyzed. An accurate analysis and modeling of the effects of faults affecting circuit for energy harvesting from mechanical vibrations is performed. Finally, the problem of modeling the electrical and thermal behavior of photovoltaic (PV) cells under hot-spot condition is addressed with the development of an electrical and thermal model.
Resumo:
One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechanisms for the management of security. The analysis is focused on how the architecture of the two systems protects users from threats and highlights the real presence of malware and spyware in their respective application stores. The work described in subsequent chapters explains the study of the behavior of 50 Android applications and 50 iOS applications performed using network analysis software. Furthermore, this thesis presents some statistics about malware and spyware present on the respective stores and the permissions they require. At the end the reader will be able to understand how to recognize malicious applications and which of the two systems is more suitable for him. This is how this thesis is structured. The first chapter introduces the security mechanisms of the Android and iOS platform architectures and the security mechanisms of their respective application stores. The Second chapter explains the work done, what, why and how we have chosen the tools needed to complete our analysis. The third chapter discusses about the execution of tests, the protocol followed and the approach to assess the “level of danger” of each application that has been checked. The fourth chapter explains the results of the tests and introduces some statistics on the presence of malicious applications on Play Store and App Store. The fifth chapter is devoted to the study of the users, what they think about and how they might avoid malicious applications. The sixth chapter seeks to establish, following our methodology, what application store is safer. In the end, the seventh chapter concludes the thesis.
Resumo:
What can we learn about the way that folk storytelling operates for tellers and audience members by examining the telling of stories by characters within such narratives? I examine Maithil women’s folktales in which stories of women’s suffering at the hands of other women are first suppressed and later overheard by men who have the power to alleviate such suffering. Maithil women are pitted against one another in their pursuit of security and resources in the context of patrilineal formations. The solidarities such women nonetheless form—in part through sharing stories and keeping each other’s secrets—serve to mitigate their suffering and maintain a counter-system of ideational patterns and practices.
Resumo:
Theoretical studies of the problems of the securities markets in the Russian Federation incline to one or other of the two traditional approaches. The first consists of comparing the definition of "valuable paper" set forth in the current legislation of the Russian Federation, with the theoretical model of "Wertpapiere" elaborated by German scholars more than 90 years ago. The problem with this approach is, in Mr. Pentsov's opinion, that any new features of the definition of "security" that do not coincide with the theoretical model of "Wertpapiere" (such as valuable papers existing in non-material, electronic form) are claimed to be incorrect and removed from the current legislation of the Russian Federation. The second approach works on the basis of the differentiation between the Common Law concept of "security" and the Civil Law concept of "valuable paper". Mr. Pentsov's research, presented in an article written in English, uses both methodological tools and involves, firstly, a historical study of the origin and development of certain legal phenomena (securities) as they evolved in different countries, and secondly, a comparative, synchronic study of equivalent legal phenomena as they exist in different countries today. Employing the first method, Mr. Pentsov divided the historical development of the conception of "valuable paper" in Russia into five major stages. He found that, despite the existence of a relatively wide circulation of valuable papers, especially in the second half of the 19th century, Russian legislation before 1917 (the first stage) did not have a unified definition of valuable paper. The term was used, in both theoretical studies and legislation, but it covered a broad range of financial instruments such as stocks, bonds, government bonds, promissory notes, bills of exchange, etc. During the second stage, also, the legislation of the USSR did not have a unified definition of "valuable paper". After the end of the "new economic policy" (1922 - 1930) the stock exchanges and the securities markets in the USSR, with a very few exceptions, were abolished. And thus during the third stage (up to 1985), the use of valuable papers in practice was reduced to foreign economic relations (bills of exchange, stocks in enterprises outside the USSR) and to state bonds. Not surprisingly, there was still no unified definition of "valuable paper". After the beginning of Gorbachev's perestroika, a securities market began to re-appear in the USSR. However, the successful development of securities markets in the USSR was retarded by the absence of an appropriate regulatory framework. The first effort to improve the situation was the adoption of the Regulations on Valuable Papers, approved by resolution No. 590 of the Council of Ministers of the USSR, dated June 19, 1990. Section 1 of the Regulation contained the first statutory definition of "valuable paper" in the history of Russia. At the very beginning of the period of transition to a market economy, a number of acts contained different definitions of "valuable paper". This diversity clearly undermined the stability of the Russian securities market and did not achieve the goal of protecting the investor. The lack of unified criteria for the consideration of such non-standard financial instruments as "valuable papers" significantly contributed to the appearance of numerous fraudulent "pyramid" schemes that were outside of the regulatory scheme of Russia legislation. The situation was substantially improved by the adoption of the new Civil Code of the Russian Federation. According to Section 1 of Article 142 of the Civil Code, a valuable paper is a document that confirms, in compliance with an established form and mandatory requisites, certain material rights whose realisation or transfer are possible only in the process of its presentation. Finally, the recent Federal law No. 39 - FZ "On the Valuable Papers Market", dated April 22 1996, has also introduced the term "emission valuable papers". According to Article 2 of this Law, an "emission valuable paper" is any valuable paper, including non-documentary, that simultaneously has the following features: it fixes the composition of material and non-material rights that are subject to confirmation, cession and unconditional realisation in compliance with the form and procedure established by this federal law; it is placed by issues; and it has equal amount and time of realisation of rights within the same issue regardless of when the valuable paper was purchased. Thus the introduction of the conception of "emission valuable paper" became the starting point in the Russian federation's legislation for the differentiation between the legal regimes of "commercial papers" and "investment papers" similar to the Common Law approach. Moving now to the synchronic, comparative method of research, Mr. Pentsov notes that there are currently three major conceptions of "security" and, correspondingly, three approaches to its legal definition: the Common Law concept, the continental law concept, and the concept employed by Japanese Law. Mr. Pentsov proceeds to analyse the differences and similarities of all three, concluding that though the concept of "security" in the Common Law system substantially differs from that of "valuable paper" in the Continental Law system, nevertheless the two concepts are developing in similar directions. He predicts that in the foreseeable future the existing differences between these two concepts will become less and less significant. On the basis of his research, Mr. Pentsov arrived at the conclusion that the concept of "security" (and its equivalents) is not a static one. On the contrary, it is in the process of permanent evolution that reflects the introduction of new financial instruments onto the capital markets. He believes that the scope of the statutory definition of "security" plays an extremely important role in the protection of investors. While passing the Securities Act of 1933, the United States Congress determined that the best way to achieve the goal of protecting investors was to define the term "security" in sufficiently broad and general terms so as to include within the definition the many types of instruments that in the commercial world fall within the ordinary concept of "security' and to cover the countless and various devices used by those who seek to use the money of others on the promise of profits. On the other hand, the very limited scope of the current definition of "emission valuable paper" in the Federal Law of the Russian Federation entitled "On the Valuable Papers Market" does not allow the anti-fraud provisions of this law to be implemented in an efficient way. Consequently, there is no basis for the protection of investors. Mr. Pentsov proposes amendments which he believes would enable the Russian markets to become more efficient and attractive for both foreign and domestic investors.
Resumo:
The Centre for Development and Environment (CDE) is the University of Bern's center for sustainable development research. Founded in 1988 as a part of the Institute of Geography, CDE became an interdisciplinary university center in 2009. Its current overall aim is to foster sustainable development-oriented research across various institutes and departments of the University of Bern. In view of this new mandate, CDE devised a new strategy focusing on 6 strategic themes. These are explored and advanced by groups of researchers organized in thematic clusters. Three of the 6 clusters address sustainable development from a comprehensive perspective: global change impacts, innovations for sustainable development, and education for sustainable development. These clusters are complemented by 3 clusters that investigate sustainable development with a specialized perspective: natural resources and ecosystem services, multidimensional disparities, and governance of land and natural resources.
Resumo:
It has been noted that immigrant women often initiate prenatal care late in their pregnancy and thus may be inadequately prepared for their birth experience. This leads to poorer maternal outcomes and higher morbidity statistics compared to Swiss women. Tamil women of Sri Lanka represent the largest group of immigrant women being seen at the antenatal care clinic of a Swiss University Hospital. To get a deeper understanding of their needs and expectations relative to their antenatal care, a qualitative study was undertaken. Problem centred interviews were conducted with seven Tamil women before and after delivery. An interpreter was consulting. Data were analyzed using content analysis methods as described by Mayring. Four main themes emerged, demonstrating the need of the women and their resulting expectation: 1) to receive esteem--to show respect and attention; 2) to consult with somebody--to ensure communication; 3) to alleviate worries and fear--to give a sense of security and be in charge; and 4) to make up for lack of experience and knowledge--to pass on experience and knowledge. The quality of the relationships to caregivers is viewed as pivotal and seems to influence Tamil women's satisfaction and their motivation to receive prenatal care.
Resumo:
This dissertation presents a detailed study in exploring quantum correlations of lights in macroscopic environments. We have explored quantum correlations of single photons, weak coherent states, and polarization-correlated/polarization-entangled photons in macroscopic environments. These included macroscopic mirrors, macroscopic photon number, spatially separated observers, noisy photons source and propagation medium with loss or disturbances. We proposed a measurement scheme for observing quantum correlations and entanglement in the spatial properties of two macroscopic mirrors using single photons spatial compass state. We explored the phase space distribution features of spatial compass states, such as chessboard pattern by using the Wigner function. The displacement and tilt correlations of the two mirrors were manifested through the propensities of the compass states. This technique can be used to extract Einstein-Podolsky-Rosen correlations (EPR) of the two mirrors. We then formulated the discrete-like property of the propensity Pb(m,n), which can be used to explore environmental perturbed quantum jumps of the EPR correlations in phase space. With single photons spatial compass state, the variances in position and momentum are much smaller than standard quantum limit when using a Gaussian TEM00 beam. We observed intrinsic quantum correlations of weak coherent states between two parties through balanced homodyne detection. Our scheme can be used as a supplement to decoy-state BB84 protocol and differential phase-shift QKD protocol. We prepared four types of bipartite correlations ±cos2(θ12) that shared between two parties. We also demonstrated bits correlations between two parties separated by 10 km optical fiber. The bits information will be protected by the large quantum phase fluctuation of weak coherent states, adding another physical layer of security to these protocols for quantum key distribution. Using 10 m of highly nonlinear fiber (HNLF) at 77 K, we observed coincidence to accidental-coincidence ratio of 130±5 for correlated photon-pair and Two-Photon Interference visibility >98% entangled photon-pair. We also verified the non-local behavior of polarization-entangled photon pair by violating Clauser-Horne-Shimony-Holt Bell’s inequality by more than 12 standard deviations. With the HNLF at 300 K (77 K), photon-pair production rate about factor 3(2) higher than a 300 m dispersion-shifted fiber is observed. Then, we studied quantum correlation and interference of photon-pairs; with one photon of the photon-air experiencing multiple scattering in a random medium. We observed that depolarization noise photon in multiple scattering degrading the purity of photon-pair, and the existence of Raman noise photon in a photon-pair source will contribute to the depolarization affect. We found that quantum correlation of polarization-entangled photon-pair is better preserved than polarization-correlated photon-pair as one photon of the photon-pair scattered through a random medium. Our findings showed that high purity polarization-entangled photon-pair is better candidate for long distance quantum key distribution.
Resumo:
It is a challenging time to be a social scientist. Many of the concepts and categories we took for granted have been revealed as temporally and geographically specific. It is now widely accepted that the nation-state is no longer the sole container for economic, political and social processes, if indeed it ever was. This is where Kevin Stenson begins his paper. He traces the re-ordering of both state and nation, highlighting recent discussions about the unbundling and rescaling of the state and outlining how increasing ethnic and cultural diversity challenge homogeneous conceptions of the nation. In Stenson’s account these are largely empirical processes that are the basis for the important questions he raises about changing understandings of publics and social order, and their implications for the local governance of community safety. He contrasts two alternative positions; the ‘universal human rights position’ which refuses to privilege the interests of majority populations, and a more ‘communitarian and nationalistic position’ which he argues is most likely to be deployed by right wing politicians and interests groups. Drawing from extensive research in the Thames Valley region of the United Kingdom, he shows how these two understandings have both shaped the local policy response to crime and disorder.