869 resultados para Portfolio and Security Analysis
Resumo:
Grid computing is an emerging technology for providing the high performance computing capability and collaboration mechanism for solving the collaborated and complex problems while using the existing resources. In this paper, a grid computing based framework is proposed for the probabilistic based power system reliability and security analysis. The suggested name of this computing grid is Reliability and Security Grid (RSA-Grid). Then the architecture of this grid is presented. A prototype system has been built for further development of grid-based services for power systems reliability and security assessment based on probabilistic techniques, which require high performance computing and large amount of memory. Preliminary results based on prototype of this grid show that RSA-Grid can provide the comprehensive assessment results for real power systems efficiently and economically.
Resumo:
Cyber-physical systems tightly integrate physical processes and information and communication technologies. As today’s critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance. Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furthermore, cybersecurity vulnerabilities are often not considered critical, because their effects on the physical processes are not fully understood. In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety. Using this information, the most effective mitigation strategies to ensure safety and security of the system can be readily identified. We apply STPA-SafeSec to a use case in the power grid domain, and highlight its benefits.
Resumo:
Regression analysis has shown that recovery rates are determined by a variety of conditions at the time of default. These conditions can be broken into five major categories: (1) a security's seniority within the capital structure of the defaulting firm, (2) the type of default event, (3) firm-specific factors, (4) industry-specific factors, and (5) macroeconomic factors. Expectations of these inputs determine the expected recovery rate if default were to occur, thereby determining credit ratings and security prices. Although it is widely understood how recovery rate estimates influence credit rating assignments (the higher the expected recovery rate, the higher the assigned credit rating), no research, to the best of my knowledge, has investigated the reasons why higher rated securities recover more than lower rated securities in the event of default. Specifically, this paper will empirically investigate why securities originally rated investment grade, fallen angels, recover more than securities originally rated high yield in the event of default.
Resumo:
Investing in global environmental and adaptation benefits in the context of agriculture and food security initiatives can play an important role in promoting sustainable intensification. This is a priority for the Global Environment Facility (GEF), created in 1992 with a mandate to serve as financial mechanism of several multilateral environmental agreements. To demonstrate the nature and extent of GEF financing, we conducted an assessment of the entire portfolio over a period of two decades (1991–2011) to identify projects with direct links to agriculture and food security. A cohort of 192 projects and programs were identified and used as a basis for analyzing trends in GEF financing. The projects and programs together accounted for a total GEF financing of US$1,086.8 million, and attracted an additional US$6,343.5 million from other sources. The value-added of GEF financing for ecosystem services and resilience in production systems was demonstrated through a diversity of interventions in the projects and programs that utilized US$810.6 million of the total financing. The interventions fall into the following four main categories in accordance with priorities of the GEF: sustainable land management (US$179.3 million), management of agrobiodiversity (US$113.4 million), sustainable fisheries and water resource management (US$379.8 million), and climate change adaptation (US$138.1 million). By aligning GEF priorities with global aspirations for sustainable intensification of production systems, the study shows that it is possible to help developing countries tackle food insecurity while generating global environmental benefits for a healthy and resilient planet.
Resumo:
Relatório de Estágio de Mestrado em Ciência Política e Relações Internacionais Globalização e Ambiente
Resumo:
vegeu resum en el fitxer adjunt a l'inici del treball de recerca
Resumo:
The Finnish legislation requires for a safe and secure learning environment. However, the comprehensive, risk based safety and security management (SSM) and the management commitment in the implementation and development of the SSM are not mentioned in the legislation. Multiple institutions, operators and researchers have studied and developed safety and security in educational institutions over the past decade. Typically the approach has been fragmented and without bringing up the importance of the comprehensive SSM. The development needs of the safety and security operations in universities have been studied. However, in universities of applied sciences (UASs) and in elementary schools (ESs), the performance level, strengths and weaknesses of the comprehensive SSM have not been studied. The objective of this study was to develop the comprehensive, risk based SSM of educational institutions by developing the new Asteri consultative auditing process and study its effects on auditees. Furthermore, the performance level in the comprehensive SSM in UASs and ESs were studied using Asteri and the TUTOR model developed by the Keski-Uusimaa Department for Rescue Services. In addition, strengths, development needs and differences were identified. In total, 76 educational institutions were audited between the years 2011 and 2014. The study is based on logical empiricism, and an observational applied research design was used. Auditing, observation and an electronic survey were used for data collection. Statistical analysis was used to analyze the collected information. In addition, thematic analysis was used to analyze the development areas of the organizations mentioned by the respondents in the survey. As one of the main contributions, this research presents the new Asteri consultative auditing process. Organizations with low performance levels on the audited subject benefit the most from the Asteri consultative auditing process. Asteri may be usable in many different types of audits, not only in SSM audits. As a new result, this study provides new knowledge on attitudes related to auditing. According to the research findings, auditing may generate negative attitudes and the auditor should take them into account when planning and preparing for audits. Negative attitudes can be compensated by producing added value, objectivity and positivity for the audit and, thus, improve the positive effects of auditing on knowledge and skills. Moreover, as the results of this study shows, auditing safety and security issues do not increase feelings of insecurity, but rather increase feelings of safety and security when using the new Asteri consultative auditing process with the TUTOR model. The results showed that the SSM in the audited UASs was statistically significantly more advanced than that in the audited ESs. However, there is still room for improvement in the ESs and the UASs as the approach to the SSM was fragmented. It can be assumed that the majority of Finnish UASs and ESs do not likely meet the basic level of the comprehensive, risk based the SSM.
Resumo:
This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). These techniques introduce noise into the spectrum in order to hide real information. Nevertheless, they directly affect two important parameters in Cognitive Wireless Sensor Networks (CWSNs), energy consumption and spectrum utilization. Both are affected because the number of packets transmitted by the network and the active period of the nodes increase. Security evaluation demonstrates that these techniques are effective against eavesdropper attacks, but also optimization allows for the implementation of these approaches in low-resource networks such as Cognitive Wireless Sensor Networks. In this work, the scenario is formally modeled and the optimization according to the simulation results and the impact analysis over the frequency spectrum are presented.
Resumo:
This study examines the workings of the Common European Asylum System (CEAS), in order to assess the need and potential for new approaches to ensure access to protection for people seeking it in the EU, including joint processing and distribution of asylum seekers. Rather than advocating the addition of further complexity and coercion to the CEAS, the study proposes a focus on front-line reception and streamlined refugee status determination, in order to mitigate the asylum challenges facing Member States, and vindicate the rights of asylum seekers and refugees according to the EU acquis and international legal standards. Joint processing could contribute to front-line reception and processing capacity, but is no substitute for proper investment in national systems. The Dublin system as currently configured leads inexorably to increasing coercion and detention, and must thus be reconfigured to remove coercion as a principle and ensure consistency with human rights and other fundamental values of the EU.
Resumo:
Most critical analyses assess citizenship-deprivation policies against international human rights and domestic rule of law standards, such as prevention of statelessness, non-arbitrariness with regard to justifications and judicial remedies, or non-discrimination between different categories of citizens. This report considers instead from a political theory perspective how deprivation policies reflect specific conceptions of political community. We distinguish four normative conceptions of the grounds of membership in a political community that apply to decisions on acquisition and loss of citizenship status: i) a ‘State discretion’ view, according to which governments should be as free as possible in pursuing State interests when determining citizenship status; ii) an ‘individual choice’ view, according to which individuals should be as free as possible in choosing their citizenship status; iii) an ‘ascriptive community’ view, according to which both State and individual choices should be minimised through automatic determination of membership based on objective criteria such as the circumstances of birth; and iv) a ‘genuine link’ view, according to which the ties of individuals to particular States determine their claims to inclusion and against deprivation while providing at the same time objections against including individuals without genuine links. We argue that most citizenship laws combine these four normative views in different ways, but that from a democratic perspective the ‘genuine link’ view is normatively preferable to the others. The report subsequently examines five general grounds for citizenship withdrawal – threats to public security, non-compliance with citizenship duties, flawed acquisition, derivative loss and loss of genuine links – and considers how the four normative views apply to withdrawal provision motivated by these concerns. The final section of the report examines whether EU citizenship provides additional reasons for protection against Member States’ powers of citizenship deprivation. We suggest that, in addition to fundamental rights protection through EU law and protection of free movement rights, three further arguments could be invoked: toleration of dual citizenship in a political union, prevention of unequal conditions for loss among EU citizens, and the salience of genuine links to the EU itself rather than merely to one of its Member States.
Resumo:
I test the Duffie, Gârleanu, and Pedersen hypothesis that security prices incorporate expected future securities lending income. To determine whether institutional investors anticipate gains from future lending of securities, I examine their trading behavior around loan-fee increases. The evidence suggests that institutions buy shares in response to an increase in lending fees, and that this could explain the premium associated with high- lending-fee stocks. Expected future lending income affects stock prices, although the effect seems to be attenuated by the negative information that arises from short selling.
Resumo:
JXME es la especificación de JXTA para dispositivos móviles con J2ME. Hay dos versiones diferentes de la aplicación JXME disponibles, cada una específica para un determinado conjunto de dispositivos, de acuerdo con sus capacidades. El principal valor de JXME es su simplicidad para crear peer-to-peer (P2P) en dispositivos limitados. Además de evaluar las funciones JXME, también es importante tener en cuenta el nivel de seguridad por defecto que se proporciona. Este artículo presenta un breve análisis de la situación actual de la seguridad en JXME, centrándose en la versión JXME-Proxyless, identifica las vulnerabilidades existentes y propone mejoras en este campo.