880 resultados para Network security constraints


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In most European countries Social Security (SS) systems are characterized as Pay-asyou- go systems. Their sustainability is being challenged with demographic changes, namely population ageing. Portugal’s population is ageing rapidly being one of the countries where this problem is more critical. With the growing debate on this topic several public choice models have been developed so as to explain SS size. In this work project there is an attempt to understand whether these models contribute to better explain Social security expenditure with pensions (SSEP) and to establish the need of finding ways to reduce present commitment with pension expenditure in Portugal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The primary purpose of this research is to examine the feasibility of expanding Quinta dos Açores retailer network in Lisbon starting from 2015 onwards. A time series model was developed to estimate the company’s future production and sales. A Discounted Cash Flow analysis was also conducted to determine the profitability of this expansion opportunity. Our findings reveal that Quinta dos Açores will face negative results in the first two years of the expansion strategy, but the overall opportunity presents a net positive result of almost three million euros.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Following the Introduction, which surveys existing literature on the technology advances and regulation in telecommunications and on two-sided markets, we address specific issues on the industries of the New Economy, featured by the existence of network effects. We seek to explore how each one of these industries work, identify potential market failures and find new solutions at the economic regulation level promoting social welfare. In Chapter 1 we analyze a regulatory issue on access prices and investments in the telecommunications market. The existing literature on access prices and investment has pointed out that networks underinvest under a regime of mandatory access provision with a fixed access price per end-user. We propose a new access pricing rule, the indexation approach, i.e., the access price, per end-user, that network i pays to network j is function of the investment levels set by both networks. We show that the indexation can enhance economic efficiency beyond what is achieved with a fixed access price. In particular, access price indexation can simultaneously induce lower retail prices and higher investment and social welfare as compared to a fixed access pricing or a regulatory holidays regime. Furthermore, we provide sufficient conditions under which the indexation can implement the socially optimal investment or the Ramsey solution, which would be impossible to obtain under fixed access pricing. Our results contradict the notion that investment efficiency must be sacrificed for gains in pricing efficiency. In Chapter 2 we investigate the effect of regulations that limit advertising airtime on advertising quality and on social welfare. We show, first, that advertising time regulation may reduce the average quality of advertising broadcast on TV networks. Second, an advertising cap may reduce media platforms and firms' profits, while the net effect on viewers (subscribers) welfare is ambiguous because the ad quality reduction resulting from a regulatory cap o¤sets the subscribers direct gain from watching fewer ads. We find that if subscribers are sufficiently sensitive to ad quality, i.e., the ad quality reduction outweighs the direct effect of the cap, a cap may reduce social welfare. The welfare results suggest that a regulatory authority that is trying to increase welfare via regulation of the volume of advertising on TV might necessitate to also regulate advertising quality or, if regulating quality proves impractical, take the effect of advertising quality into consideration. 3 In Chapter 3 we investigate the rules that govern Electronic Payment Networks (EPNs). In EPNs the No-Surcharge Rule (NSR) requires that merchants charge at most the same amount for a payment card transaction as for cash. In this chapter, we analyze a three- party model (consumers, merchants, and a proprietary EPN) with endogenous transaction volumes and heterogenous merchants' transactional benefits of accepting cards to assess the welfare impacts of the NSR. We show that, if merchants are local monopolists and the network externalities from merchants to cardholders are sufficiently strong, with the exception of the EPN, all agents will be worse o¤ with the NSR, and therefore the NSR is socially undesirable. The positive role of the NSR in terms of improvement of retail price efficiency for cardholders is also highlighted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Release of chloroethene compounds into the environment often results in groundwater contamination, which puts people at risk of exposure by drinking contaminated water. cDCE (cis-1,2-dichloroethene) accumulation on subsurface environments is a common environmental problem due to stagnation and partial degradation of other precursor chloroethene species. Polaromonas sp. strain JS666 apparently requires no exotic growth factors to be used as a bioaugmentation agent for aerobic cDCE degradation. Although being the only suitable microorganism found capable of such, further studies are needed for improving the intrinsic bioremediation rates and fully comprehend the metabolic processes involved. In order to do so, a metabolic model, iJS666, was reconstructed from genome annotation and available bibliographic data. FVA (Flux Variability Analysis) and FBA (Flux Balance Analysis) techniques were used to satisfactory validate the predictive capabilities of the iJS666 model. The iJS666 model was able to predict biomass growth for different previously tested conditions, allowed to design key experiments which should be done for further model improvement and, also, produced viable predictions for the use of biostimulant metabolites in the cDCE biodegradation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

I test the Duffie, Gârleanu, and Pedersen hypothesis that security prices incorporate expected future securities lending income. To determine whether institutional investors anticipate gains from future lending of securities, I examine their trading behavior around loan-fee increases. The evidence suggests that institutions buy shares in response to an increase in lending fees, and that this could explain the premium associated with high- lending-fee stocks. Expected future lending income affects stock prices, although the effect seems to be attenuated by the negative information that arises from short selling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The way in which electricity networks operate is going through a period of significant change. Renewable generation technologies are having a growing presence and increasing penetrations of generation that are being connected at distribution level. Unfortunately, a renewable energy source is most of the time intermittent and needs to be forecasted. Current trends in Smart grids foresee the accommodation of a variety of distributed generation sources including intermittent renewable sources. It is also expected that smart grids will include demand management resources, widespread communications and control technologies required to use demand response are needed to help the maintenance in supply-demand balance in electricity systems. Consequently, smart household appliances with controllable loads will be likely a common presence in our homes. Thus, new control techniques are requested to manage the loads and achieve all the potential energy present in intermittent energy sources. This thesis is focused on the development of a demand side management control method in a distributed network, aiming the creation of greater flexibility in demand and better ease the integration of renewable technologies. In particular, this work presents a novel multi-agent model-based predictive control method to manage distributed energy systems from the demand side, in presence of limited energy sources with fluctuating output and with energy storage in house-hold or car batteries. Specifically, here is presented a solution for thermal comfort which manages a limited shared energy resource via a demand side management perspective, using an integrated approach which also involves a power price auction and an appliance loads allocation scheme. The control is applied individually to a set of Thermal Control Areas, demand units, where the objective is to minimize the energy usage and not exceed the limited and shared energy resource, while simultaneously indoor temperatures are maintained within a comfort frame. Thermal Control Areas are overall thermodynamically connected in the distributed environment and also coupled by energy related constraints. The energy split is performed based on a fixed sequential order established from a previous completed auction wherein the bids are made by each Thermal Control Area, acting as demand side management agents, based on the daily energy price. The developed solutions are explained with algorithms and are applied to different scenarios, being the results explanatory of the benefits of the proposed approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The recent massive inflow of refugees to the European Union (EU) raises a number of unanswered questions on the economic impact of this phenomenon. To examine these questions, we constructed an overlapping-generations model that describes the evolution of the skill premium and of the welfare benefit level in relevant European countries, in the aftermath of an inflow of asylum-seekers. In our simulation, relative wages of skilled workers increase between 8% and 11% in the period of the inflow; their subsequent time path is dependent on the initial skill premium. The entry of migrants creates a fiscal surplus of about 8%, which can finance higher welfare benefits in the subsequent periods. These effects are weaker in a scenario where refugees do not fully integrate into the labor market.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What role do social networks play in determining migrant labor market outcomes? We examine this question using data from a random sample of 1500 immigrants living in Ireland. We propose a theoretical model formally predicting that immigrants with more contacts have additional access to job offers, and are therefore better able to become employed and choose higher paid jobs. Our empirical analysis confirms these findings, while focusing more generally on the relationship between migrants’ social networks and a variety of labor market outcomes (namely wages, employment, occupational choice and job security), contrary to the literature. We find evidence that having one more contact in the network is associated with an increase of 11pp in the probability of being employed and with an increase of about 100 euros in the average salary. However, our data is not suggestive of a network size effect on occupational choice and job security. Our findings are robust to sample selection and other endogeneity concerns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Outrora dominado por ameaças provenientes de Estados-nação, o cenário global actual, dominado por uma rápida mudança de poderes que nos apresenta uma interacção complexa entre múltiplos actores, onde inimigos desconhecidos, anteriormente bem identificados, é actualmente controlado por grupos terroristas bem preparados e bem organizados. Hezbollah é reconhecido como um dos grupos terroristas mais capazes, com uma extensa rede fora do Líbano dedicada a tráfico de droga, armas e seres humanos, tal como o branqueamento de capitais para financiar o terrorismo, representando um grande foco de instabilidade à segurança. Como instrumento de Estado, os serviços de informações detêm a capacidade de estar na linha da frente na prevenção e combate ao terrorismo. Todavia, para compreender este fenómeno é necessário analisar os actores desta ameaça. À luz desta conjuntura, esta dissertação está dividida em três capítulos principais que visam responder às seguintes questões fundamentais: O que é o terrorismo? Como opera um grupo terrorista transnacional? Será que os serviços de informações têm as ferramentas necessárias para prevenir e combater estas ameaças?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The study now presented a research study aimed at the exercise of security activity of the prison guard corps (CGP) in the specific context of the prison system (SP). The study also focused on the phenomenon of globalization and its influence on the current panorama of world crime and their relationship with the prison security object of study was the security activity of the CGP on the current inmate population, as well as the typology of crimes inherent to it and that requires the interpretation of the amendment to the correctional paradigm. In the preparation of the study we have tried to identify the legal framework of the profession based on the main laws and decree-laws governing the institution DGRSP and CGP's career. The difficulties and constraints were analyzed the performance of the security function of the CGP, resulting from the infrastructure, the interaction with the inmates and the need of assigning the status of Criminal Police (OPC). Really connected the relevant importance of OPC so the Corporation can establish a cooperation interaction and sharing of information with different security forces. We noted the importance of the CGP being OPC status before the framework for its action in work situations, specifically, on gatehouses, prison wings, area, and high-complexity operations such as escorts and riot control interventions.The explanation of this study enabled us to assess the importance of the actions of a police officer of the elements of the CGP for maintaining internal security. The analyses and studies were complemented by twenty years of career and exercise of the activity of the master's degree, during which time he served as guard and head of the CGP, the intervention Group and Prison Security, the Lisbon Prison, Prison, Prison of Caxias, Sintra and Monsanto.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What role do social networks play in determining migrant labor market outcomes? We examine this question using data from a random sample of 1500 immigrants living in Ireland. We propose a theoretical model formally predicting that immigrants with more contacts have additional access to job offers, and are therefore better able to become employed and choose higher paid jobs. Our empirical analysis confirms these findings, while focusing more generally on the relationship between migrants’ social networks and a variety of labor market outcomes (namely wages, employment, occupational choice and job security), contrary to the literature. We find evidence that having one more contact in the network is associated with an increase of 11pp in the probability of being employed and with an increase of about 100 euros in the average salary. However, our data is not suggestive of a network size effect on occupational choice and job security. Our findings are robust to sample selection and other endogeneity concerns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Os aquivos municipais preservam a documentação definida legalmente como de conservação permanente, a memória e a experiência da Administração Local e, como tal, são agentes imprescindíveis à preservação dos direitos municipais. A preocupação com a preservação da documentação deve constituir um dos pilares principais do arquivo desde o início da sua criação. E não somente quando a documentação é transferida para o Arquivo Histórico, deve estar presente durante todo o ciclo de vida da documentação. Com a criação do PARAM (Programa de Apoio à Rede de Arquivos Municipais), os arquivos municipais ganham um novo incremento, não só a nível técnico como a nível financeiro, sendo-lhe reconhecido o seu devido valor e importância, na sua dupla dimensão, administrativa e cultural. Uma das funções do arquivo é disponibilizar a documentação que têm à sua guarda e que se encontra armazenada nos depósitos. Para tal é fundamental criar condições a curto, a médio e a longo prazo, implementando toda uma política integrada de preservação, envolvendo os demais serviços da instituição, fazendo-se o controlo do estado de conservação da documentação, aplicando uma metodologia da manipulação de documentos para disponibilizá-los tanto aos clientes internos como externos. O Arquivo Intermédio da Câmara Municipal de Sintra não possui plano de preservação documental, nem ações de preservação extensíveis aos objetos digitais, daí que a presente tese de mestrado pretenda ser um proposta de um contributo de um plano de preservação, que tenha em consideração os demais aspetos desde a localização e construção ou manutenção do edifício onde se encontra o arquivo, questões de segurança, de controlo ambiental, de luz/fotodegradação, o controlo integrado de pragas, danos causados por água, os desastres naturais, a poluição, a limpeza e vigilância na zona de depósitos e armazenamento e manuseamento dos documentos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the impact of cross-delisting on firms’ financial constraints and investment sensitivities. We find that firms that cross-delisted from a U.S. stock exchange face stronger post-delisting financial constraints than their cross-listed counterparts, as measured by investment-to-cash flow sensitivity. Following a delisting, the sensitivity of investment-to-cash flow increases significantly and firms also tend to save more cash out of cash flows. Moreover, this increase appears to be primarily driven by informational frictions that constrain access to external financing. We document that information asymmetry problems are stronger for firms from countries with weaker shareholders protection and for firms from less developed capital markets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a study on human mobility at small spatial scales. Differently from large scale mobility, recently studied through dollar-bill tracking and mobile phone data sets within one big country or continent, we report Brownian features of human mobility at smaller scales. In particular, the scaling exponents found at the smallest scales is typically close to one-half, differently from the larger values for the exponent characterizing mobility at larger scales. We carefully analyze 12-month data of the Eduroam database within the Portuguese university of Minho. A full procedure is introduced with the aim of properly characterizing the human mobility within the network of access points composing the wireless system of the university. In particular, measures of flux are introduced for estimating a distance between access points. This distance is typically non-Euclidean, since the spatial constraints at such small scales distort the continuum space on which human mobility occurs. Since two different ex- ponents are found depending on the scale human motion takes place, we raise the question at which scale the transition from Brownian to non-Brownian motion takes place. In this context, we discuss how the numerical approach can be extended to larger scales, using the full Eduroam in Europe and in Asia, for uncovering the transi- tion between both dynamical regimes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.