Showing 1 - 10 of 182
Abstract This paper analyzes the topology of the network of common asset holdings, where nodes represent managed portfolios and edge weights capture the impact of liquidations. Asset holdings data is extracted from the 13F filings. We consider the degree centrality as the degree in the...
Persistent link: https://www.econbiz.de/10014621245
southeast of the study area show a high vulnerability already in the 2030s. A consideration of climate change in the strategic …
Persistent link: https://www.econbiz.de/10014624279
Purpose – The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by the visual representation of a password, which enhance its memorability. Graphical passwords are vulnerable to attacks (e.g. shoulder surfing);...
Persistent link: https://www.econbiz.de/10014754612
leader. Research limitations/implications In a novel approach, inherent system vulnerability of the firm, financial benefit … modeling. Originality/value In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from …
Persistent link: https://www.econbiz.de/10014754668
Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully...
Persistent link: https://www.econbiz.de/10014754772
Purpose – The purpose of this paper is to investigate how trade unions may address the questions of inclusion of vulnerable employees in low-wage “anchored” sectors in the European Union. Design/methodology/approach – The findings presented in the paper are mainly results of the analysis...
Persistent link: https://www.econbiz.de/10014784167
topic of vulnerability at work is explored, before the distinguishing features of jobs that generate vulnerable conditions …. Vulnerability is widespread across the workforce, with workers subject to work intensification, employment insecurity and poor work … aspects of vulnerability in employment. It documents the international dimensions of vulnerability, the different forms it …
Persistent link: https://www.econbiz.de/10014784517
Purpose This research investigates new innovative service models that provide opportunities for hearing and deaf individuals to switch roles within a co-created service encounter to allow for an enhanced perspective-taking experience. The purpose of this paper is to gain an in-depth...
Persistent link: https://www.econbiz.de/10014906140
vulnerability within police custody. Design/methodology/approach The design of the study was qualitative, and it utilised telephone … therefore it presents a holistic overview of some key issues around mental health, vulnerability and safeguarding within the …
Persistent link: https://www.econbiz.de/10014841316
underpinned by differing conceptualisations of vulnerability, autonomy and privacy, and the paper relates these conceptualisations … socially mediated rather than an essentialist understanding of the concepts of vulnerability, autonomy and privacy allows for … overcome challenges to accessing adults at risk in adult safeguarding through an exploration of understandings of vulnerability …
Persistent link: https://www.econbiz.de/10014841355