986 resultados para Job security
Resumo:
The use of open source software continues to grow on a daily basis. Today, enterprise applications contain 40% to 70% open source code and this fact has legal, development, IT security, risk management and compliance organizations focusing their attention on its use, as never before. They increasingly understand that the open source content within an application must be detected. Once uncovered, decisions regarding compliance with intellectual property licensing obligations must be made and known security vulnerabilities must be remediated. It is no longer sufficient from a risk perspective to not address both open source issues.
Resumo:
This article examines the job prospects of displaced industrial workers in Switzerland. Based on a survey of 1,203 workers who were dismissed after their manufacturing plants closed down, we analyse the determinants of re-employment, the sector of re-employment and the change in wages. Two years after displacement, a majority of workers were back in employment: 69% were re-employed, 17% un-employed and 11% retired. Amongst re-employed workers, two thirds found a job in manufacturing and one third in services. Contrary to a common belief, low-end services are not the collecting vessel of redundant industrial workers. Displaced workers aged 55 and older seem particularly vulnerable after a plant closes down: over 30% were long-term unemployed, and those older workers who found a new job suffered disproportionate wage losses. Advanced age-and not low education-appears as the primary handicap after mass redundancy.
Resumo:
This paper analyses the effect of job accessibility by public and private transport on labour market outcomes in the metropolitan area of Barcelona. Beyond employment, we consider the effect of job accessibility on job-education mismatch, which represents a relevant aspect of job quality. We adopt a recursive system of equations that models car availability, employment and mismatch. Public transport accessibility appears as an exogenous variable in the three equations. Even though it may reflect endogenous residential sorting, falsification proofs suggest that the estimated effect of public transport accessibility is not entirely driven by the endogenous nature of residential decisions.
Resumo:
Recent efforts to implement gender mainstreaming in the field of security sector reform have resulted in an international policy discourse on gender and security sector reform (GSSR). Critics have challenged GSSR for its focus on 'adding women' and its failure to be transformative. This article contests this assessment, demonstrating that GSSR is not only about 'adding women', but also, importantly, about 'gendering men differently' and has important albeit problematic transformative implications. Drawing on poststructuralist and postcolonial feminist theory, I propose a critical reading of GSSR policy discourse in order to analyse its built-in logics, tensions and implications. I argue that this discourse establishes a powerful 'grid of intelligibility' that draws on gendered and racialized dualisms to normalize certain forms of subjectivity while rendering invisible and marginalizing others, and contributing to reproduce certain forms of normativity and hierarchy. Revealing such processes of discursive in/exclusion and marginalized subjectivities can serve as a starting point to challenge and transform GSSR practice and identify sites of contestation.
Resumo:
Aquest projecte inclou una aproximació als conceptes de RFID i targetes contactless centrant-se en l’ampliament usat MIFARE Classic chip. L’objectiu principal es mostrar el seu funcionament i les seves vulnerabilitats, així com alguns exemples pràctics fent una anàlisi de diferents serveis que les utilitzen.
Resumo:
CONTEXT: Increased altruism, self-transcendence, and quests for meaning in life (MiL) have been found in palliative care (PC) patients and their families who experience the finiteness of life. Similar changes were observed in healthy subjects who were experimentally confronted with their mortality. OBJECTIVES: The study investigated how daily experiences of the transitoriness of life influence PC health care professionals' (HCPs) values, MiL, and religiousness. METHODS: In a cross-sectional study, the Schwartz Value Survey, the Schedule for Meaning in Life Evaluation, and the Idler Index of Religiosity were used to investigate personal values, MiL, and private religiousness. HCPs working in PC (confronted with death) were compared with a control group of HCPs working at maternity wards (MWs) using multivariate models. Differences were considered to be statistically significant at P < 0.05. RESULTS: Seventy PC- and 70 MW-HCPs took part in the study (response rate 74.0%). No differences between the groups were found in overall MiL satisfaction scores. PC-HCPs were significantly more religious than MW-HCPs; they listed spirituality and nature experience more often as areas in which they experience MiL. Furthermore, hedonism was more important for PC-HCPs, and they had higher scores in openness-to-change values (stimulation and self-direction). MW-HCPs were more likely to list family as a MiL area. They assigned more importance to health and scored higher in conservation values (conformity and security). Duration of professional experience did not influence these results. CONCLUSION: Basic differences in values, MiL, and religiousness between PC-HCPs and MW-HCPs might have influenced the choice of working environment because no effect of job duration was observed. Longitudinal research is needed to confirm this hypothesis.
Resumo:
The impact of personality and job characteristics on parental rearing styles was compared in 353 employees. Hypotheses concerning the relationships between personality and job variables were formulated in accordance with findings in past research and the Belsky’s model (1984). Structural equation nested models showed that Aggression-hostility, Sociability and job Demand were predictive of Rejection and Emotional Warmth parenting styles, providing support for some of the hypothesized relationships. The findings suggest a well-balanced association of personality variables with both parenting styles: Aggression-Hostility was positively related to Rejection and negatively to Emotional Warmth, whereas Sociability was positively related to Emotional Warmth and negatively related to Rejection. Personality dimensions explained a higher amount of variance in observed parenting styles. However, a model that considered both, personality and job dimensions as antecedent variables of parenting was the best representation of observed data, as both systems play a role in the prediction of parenting behavior.
Resumo:
The global human population is expected to reach ∼9 billion by 2050. Feeding this many people represents a major challenge requiring global crop yield increases of up to 100%. Microbial symbionts of plants such as arbuscular mycorrhizal fungi (AMF) represent a huge, but unrealized resource for improving yields of globally important crops, especially in the tropics. We argue that the application of AMF in agriculture is too simplistic and ignores basic ecological principals. To achieve this challenge, a community and population ecology approach can contribute greatly. First, ecologists could significantly improve our understanding of the determinants of the survival of introduced AMF, the role of adaptability and intraspecific diversity of AMF and whether inoculation has a direct or indirect effect on plant production. Second, we call for extensive metagenomics as well as population genomics studies that are crucial to assess the environmental impact that introduction of non-local AMF may have on native AMF communities and populations. Finally, we plead for an ecologically sound use of AMF in efforts to increase food security at a global scale in a sustainable manner.
Resumo:
Uusien mobiilien laitteiden ja palveluiden kehitys ovat herättäneet yritysten mielenkiinnon soveltaa langattomia sovelluksia omassa liiketoiminnassaan. Erilaisten tekniikoiden myötä myös mahdollisuuksien kirjo on laajentumassa, mikä johtaa erilaisten verkkojen ja laitteiden yhtenäiselle hallinnalle asetettavien vaatimusten kasvuun. Yritysten siirtyessä soveltamaan uusia langattomia palveluita ja sovelluksia on myös huomioon otettavaa sovellusten sekä palveluiden vaatima tietoturva ja sen hallittavuus. Tutkimuksessa esitetään langattoman sähköisen liiketoiminnan määritelmä sekä kyseisien teknologioiden käyttöä edistävät tekijät. Tutkimus luo viitekehyksen yrityksen langattomien teknologioiden käytölle ja siihen olennaisesti vaikuttavista tekijöistä. Viitekehystä on käytetty todelliseen esimerkkiin, liikkuva myyntihenkilö, kyseisten teknologioiden, palveluiden, tietoturvan ja hallittavuuden näkökulmasta. Johtopäätöksinä on arvioitu mobiilien ja langattomien teknologioiden sekä palveluiden, tietoturvan ja hallittavuuden tilaa ja analysoimalla niitä tulevaa ajatellen.
Resumo:
This article envisions the use of context-awareness to improve single sign-on solutions (SSO) for mobile users. The attribute-based SSO is expected to increase users' perceived ease of use of the system and service providers' authentication security of the application. From these two features we derive two value propositions for a new business model for mobile platforms. The business model can be considered as an instantiation of the privacy-friendly business model pattern presented in our previous work, reinforcing our claim that privacy-friendly value propositions are possible and can be used to obtain a competitive advantage.
Resumo:
Elektroninen kaupankäynti ja pankkipalvelut ovat herättäneet toiminnan jatkuvuuden kannalta erittäin kriittisen kysymyksen siitä, kuinka näitä palveluja pystytään suojaamaan järjestäytynyttä rikollisuutta ja erilaisia hyväksikäyttöjä vastaan.
Resumo:
Tutkimuksen tavoitteena oli muodostaa viitekehys sijoittajaviestinnän strategian muodostamiseen ja soveltaa viitekehystä käytännössä. Tutkimusongelma nousi case-yrityksestä, SSH Communications Security Oyj:stä, joka listautui vuoden 2000 lopussa. Teoreettinen viitekehys perustuu aikaisempaan kirjallisuuteen sijoittajaviestinnästä, strategian kehittämisestä ja rahoitusteoriasta. Rahoitusteorian alueet, joita käsiteltiin tutkimuksessa ovat; vapaaehtoinen tiedottaminen, markkinatehokkuus ja agenttiteoria. Tutkimuksen empiirinen osa toteutettiin soveltamalla teoreettista viitekehystä case yritykseen. Empiirisessä osuudessa käytiin läpi seuraavat vaiheet; nykyisen tilan ulkoinen ja sisäinen analyysi, tavoitteiden asettaminen ja sijoittajaviestintä strategia ehdotuksen muodostaminen case yritykseen. Tutkielman viimeinen kappale kokoaa tärkeimmät löydökset, pohtii työn teoreettista kontribuutiota ja liikkeenjohdollisia kytköksiä sekä esittää tutkimuksen herättämiä ehdotuksia jatkotutkimuksille
Resumo:
Multicast is one method to transfer information in IPv4 based communication. Other methods are unicast and broadcast. Multicast is based on the group concept where data is sent from one point to a group of receivers and this remarkably saves bandwidth. Group members express an interest to receive data by using Internet Group Management Protocol and traffic is received by only those receivers who want it. The most common multicast applications are media streaming applications, surveillance applications and data collection applications. There are many data security methods to protect unicast communication that is the most common transfer method in Internet. Popular data security methods are encryption, authentication, access control and firewalls. The characteristics of multicast such as dynamic membership cause that all these data security mechanisms can not be used to protect multicast traffic. Nowadays the protection of multicast traffic is possible via traffic restrictions where traffic is allowed to propagate only to certain areas. One way to implement this is packet filters. Methods tested in this thesis are MVR, IGMP Filtering and access control lists which worked as supposed. These methods restrict the propagation of multicast but are laborious to configure in a large scale. There are also a few manufacturerspecific products that make possible to encrypt multicast traffic. These separate products are expensive and mainly intended to protect video transmissions via satellite. Investigation of multicast security has taken place for several years and the security methods that will be the results of the investigation are getting ready. An IETF working group called MSEC is standardizing these security methods. The target of this working group is to standardize data security protocols for multicast during 2004.
Resumo:
This paper investigates the determinants of job satisfaction of university graduates in Spain. We base our analysis on Locke"s discrepancy theory [Locke (1969)] and decompose subjective evaluation of job characteristics into surplus and deficit levels. We also study the importance of overeducation and over-skilling on job satisfaction. We use REFLEX data, a survey of university graduates. We conclude that job satisfaction is mostly determined by the subjective evaluation of intrinsic job characteristics, with an asymmetric impact of surpluses and deficits. Over-skilling is much more important than over-education in explaining the job satisfaction of university graduates, although the latter is also significant.