Community-Based Protection Mechanisms
In: Peace review: peace, security & global change, Band 27, Heft 1, S. 43-51
ISSN: 1469-9982
9487 Ergebnisse
Sortierung:
In: Peace review: peace, security & global change, Band 27, Heft 1, S. 43-51
ISSN: 1469-9982
In: Peace review: the international quarterly of world peace, Band 27, Heft 1, S. 43-51
ISSN: 1040-2659
In: Research Policy, Band 35, Heft 6, S. 825-838
SWP
SWP
SWP
In: Mir nauki: sociologija, filologija, kul'turologija : naučnyj žurnal otkrytogo dostupa = World of science : sociology, philology, cultural studies, Band 14, Heft 4
ISSN: 2542-0577
This work is devoted to the characterization and analysis of the most obvious trends emerging in the last few years in the field of social protection and reflecting changes in the mechanisms of its implementation. The analysis of scientific works in the field of social protection made it possible to identify and characterize the following main social protection mechanisms: social insurance; social security; social services; social support and assistance. In order to identify trends in the development of social protection mechanisms, the author reviewed the social protection measures introduced and implemented in recent years. The systematization and analysis of these measures were carried out on the basis of materials from an online survey conducted by the author of 28 experts in the field of social protection and social work from among researchers and teachers of higher education representing 19 cities of the Russian Federation. The analysis of the materials of the expert survey, scientific publications and statistical indicators made it possible to form a list of measures in the field of social protection that have appeared in recent years. These include: payment of maternity capital in connection with the birth of the first child; a single monthly allowance for families with children; preferential mortgage loans; social contract; active longevity programs; long-term care system; accompanied accommodation; introduction of digital technologies in the field of social protection. A review of the social protection measures mentioned by experts and considered in the scientific literature, which have appeared in recent years within the framework of the activities of the sphere of social protection and related branches of social orientation, allows us to draw some conclusions and conclusions concerning the trends in the development of social protection mechanisms. The analysis of these measures made it possible to assess their focus on solving acute socio-demographic problems. The systematization of the analyzed social protection measures has shown a tendency for the predominant development of social protection mechanisms in the field of social services, social support and assistance, which makes it possible to ensure the necessary standard of living for the population. A significant decrease in the role of social insurance mechanisms, taking into account the labor contribution of beneficiaries of social protection, has been revealed.
SSRN
Working paper
In: German yearbook of international law: Jahrbuch für internationales Recht, Band 61, Heft 1, S. 565-567
ISSN: 2195-7304
In: Knowledge and process management: the journal of corporate transformation ; the official journal of the Institute of Business Process Re-engineering, Band 11, Heft 2, S. 117-126
ISSN: 1099-1441
AbstractThis article deals with the appropriability of technological innovations. Specifically, it looks at how certain attributes of technological knowledge (codifiability, teachability, complexity, observability and dependency) may influence the choices that firms make among different protection mechanisms (patents, secrecy, lead time, learning curve and complementary resources). Based on a sample of 670 innovations developed by Spanish industrial firms, it is found that dependency and, to a lesser extent, codifiability are the attributes that have the most influence the choice of appropriation method. Copyright © 2004 John Wiley & Sons, Ltd.
In: Indian journal of corporate governance, Band 11, Heft 1, S. 45-68
ISSN: 2454-2482
Whistle-blower protection mechanisms (WPMs) play a critically significant role in combating corruption through ethics, corporate governance and statutes. This article examines the essence of whistle-blower mechanism existing in the developed and developing countries in order to unearth the legislative structure of countries supporting the whistle blower mechanism and pursuit of ethical conduct for sound corporate governance. The article attempts to identify, evaluate and analyse the attributes of whistle-blower mechanism across nations and finds that despite off-symmetric attributes, the mechanisms are asymmetric specific to the countries' corporate culture. It has also been found that most significant attribute of a sound whistle-blower mechanism is the level of protection provided to the whistle-blowers followed by coverage of sectors, anonymity and the regulator of whistle-blowing complaints in the country. The attributes vary widely across nations on the basis of coverage of sectors, anonymity withheld and the level of protection, with United States of America delivering the best protection to whistle-blowers trailed by Australian whistle-blower protection laws and then South Africa; India, China and Indonesia lag considerably behind in having a sound whistle-blower mechanism.
In: Journal of intellectual capital, Band 9, Heft 1, S. 86-104
ISSN: 1758-7468
PurposeThe purpose of this paper is to analyze the effectiveness of legal protection mechanisms to sustain competitive advantage and appropriate technological intellectual capital, taking into account its degree of complexity.Design/methodology/approachThe empirical analysis was conducted on a sample of Spanish biotechnology firms, devoted to human and animal health, having a specific department for carrying on R&D activities from 2001 to 2003. The hypotheses were tested by non‐parametric techniques after collecting data by sending a questionnaire as the primary source of information.FindingsThe results show that the higher the complexity of technological knowledge, the greater the protection of intellectual capital against imitation. In addition, it is proven that legal protection is an effective means of protection against imitation only when technological knowledge has a low degree of complexity.Research limitations/implicationsWithin the resource‐based view context, our results provide new empirical evidence about the great impact of the complexity of technological intellectual capital on evaluating the effectiveness of legal protection mechanisms and sustaining competitive advantage.Originality/valueThis research is of great value for strategic technological decision‐making. Although several studies present the theoretical conditions that explain how firms can create imitation "barriers", the empirical evidence found is very scarce and controversial, especially for the Spanish biotechnology industry. The results obtained here offer new empirical evidence on the resource‐based view.
This research develops Code White, a hardware-implemented trusted execution mechanism for the Symbian mobile operating system. Code White combines a signed whitelist approach with the execution prevention technology offered by the ARM architecture. Testing shows that it prevents all untrusted user applications from executing while allowing all trusted applications to load and run. Performance testing in contrast with an unmodified Symbian system shows that the difference in load time increases linearly as the application file size increases. The predicted load time for an application with a one megabyte code section remains well below one second, ensuring uninterrupted experience for the user. Smartphones have proven to be invaluable to military, civic, and business users due in a large part to their ability to execute code just like any desktop computer can. While many useful applications have been developed for these users, numerous malicious programs have also surfaced. And while smartphones have desktop-like capabilities to execute software, they do not have the same resources to scan for malware. More efficient means, like Code White, which minimize resource usage are needed to protect the data and capabilities found in smartphones.
BASE
In: Asian journal of research in social sciences and humanities: AJRSH, Band 6, Heft 7, S. 93
ISSN: 2249-7315
In: Journal of international development: the journal of the Development Studies Association, Band 21, Heft 2, S. 159-168
ISSN: 1099-1328