Violence in public spaces is an aspect of society that demands analysis since this affects social and economic well-being. On setting out to explore the incidence of violence in public areas, this ...paper brings a multi-methodology framework to associate the exploratory analysis of data on street robberies with a geographic information system (GIS) and a multi-criteria decision analysis (MCDA) model. Our GIS-MCDA framework is based on a Dominance-based Rough Set Approach (DRSA) and induces the decision-maker to learn and understand the spatial, social, and demographic data on crime analysis. As a result, the study area was classified into levels of vulnerability. We found that the social interaction features, bus stops and street robberies are spatially and statistically associated. From the socio-demographic perspective, makeshift houses, the number of people who can read and write and the number of inhabitants were highlighted as dimensions to be considered when associated with crime. Finally, preferences in evaluation of areas of vulnerability tend to be pessimistic. Therefore, the multi-methodology framework makes a holistic analysis of such vulnerabilities and contributes to improve knowledge on urban spaces and how this informs detecting vulnerability to crime.
•Data analysis as complementary tool in multi-criteria assessment of urban planning.•Using data analysis to overcome an isolated view point on decision making preferences.•Framework applicable for other spatial issues, considering adaptations.
Improving the cyber security of critical protection devices is of paramount importance for reducing the impact of cyber attacks on power distribution system. This paper proposes a game-theoretic ...approach to identify the optimal defensive strategy and scheme to minimize the impact of relay setting attack on power distribution systems. To this end, two types of attacks, namely active and passive relay setting attacks (RSA), are introduced and modeled as the potential threats to the protection relays. The active RSA impacts the distribution system immediately, while passive RSA disrupts the relay coordination and escalates the outages resulted from future system faults. The optimal budget allocation problem for strengthening the security of relays is modeled by formulating the interaction between the defender, the attacker and the distribution system operation as a tri-level optimization problem, which is then cast into a single-level operation and a bi-level defender-attacker problem. The bi-level problem is further reduced to an expected energy loss minimization problem using an auxiliary constrained parameter. The proposed approach is tested on the IEEE 123-node test feeder, the results of which exhibit the effectiveness of the proposed model on determining the most vulnerable relays and reducing the expected energy not served.
Cyberstalking is a significant challenge in the era of Internet and technology. When dealing with cyberstalking, institutions and governments struggle in how to manage it and where to allocate ...resources. Therefore, it is important to understand how individuals feel about the problem of cyberstalking and how it can be managed. In this paper, we use Nissenbaum's (Wash L Rev 79(1):119-158, 2004) contextual integrity as a theoretical framework for applying Keeney's (Manag Sei 45: 533-542, 1999) value-focused thinking technique to develop actionable objectives aimed at the prevention of cyberstalking. By systematically interviewing over 100 individuals, we extract 20 objectives based on the underlying norms of distribution and appropriateness relevant to the context of cyberstalking. The objectives ensure that contextual integrity is maintained and cyberstalking prevented. Organizations can benefit from the objectives developed in this research since they are a means for developing an ethical policy regarding cyberstalking. Therefore, they help to ensure an ethical engagement with society at large by organizations when dealing with cyberstalking. Researchers can use these objectives to explore the best means for their implementation by organizations and institutions. Additionally they can explore the network mapping of fundamental and means objectives to determine relationships and their strengths in the cyberstalking context.
Electronic elements of a substation control system have been recognized as critical cyberassets due to the increased complexity of the automation system that is further integrated with physical ...facilities. Since this can be executed by unauthorized users, the security investment of cybersystems remains one of the most important factors for substation planning and maintenance. As a result of these integrated systems, intrusion attacks can impact operations. This work systematically investigates the intrusion resilience of the ten architectures between a substation network and others. In this paper, two network architectures comparing computer-based boundary protection and firewall-dedicated virtual local-area networks are detailed, that is, architectures one and ten. A comparison on the remaining eight architecture models was performed. Mean time to compromise is used to determine the system operational period. Simulation cases have been set up with the metrics based on different levels of attackers' strength. These results as well as sensitivity analysis show that implementing certain architectures would enhance substation network security.
With the acceleration of economic development and urban construction, urban security accidents have occurred around the world with alarming frequency, causing serious casualties and economic losses. ...Urban security planning and management as emerging areas of research have drawn widespread attention. For city development plans, urban security planning and management have become one of major topics. This paper first outlines the principles of urban security planning and management, combined with the construction of a digital and intelligent platform for urban emergency management. This research then analyzes the core technology and equipment support system of urban security management and its practical application. It also presents a new model based on urban security planning and management, followed by examples of its application in some mega infrastructure development for security planning and design (for example, Singapore Changi Airport and Shanghai Hongqiao Airport Transportation Hub). Additionally, a blast protection concept of urban security planning and management is provided.
Construction site layout planning (CSLP) is important to ensure that cost, time, quality and environmental impacts are strictly controlled. Even though extensive research has been conducted on CSLP ...problems, the effect of the multi-stakeholder interactions on optimal site layout plans has been less studied. Therefore, this paper proposes an agent-based decentralized bi-level mathematical model that incorporates decisions from three stakeholders, to examine the CSLP multi-stakeholder interactions. To solve the model, a particle swarm optimization (PSO)-based solution approach is developed to generate the CSLP, construction material logistics planning (CMLP) and security planning (SP) solutions in an integrated CSLP-CMLP/SP system. Specifically, the stakeholders are modelled as individual agents with respective decisions and objective functions, and the inter-dependencies between the layout planner and the other two stakeholders (i.e. the logistics planner and the safety manager) are simultaneously incorporated and dealt with using the bi-level model. The multi-stakeholder interactions are realized by iteratively updating the individual decisions to determine an optimal integrated solution in which the potential stakeholder conflicts in the construction stage are minimized. A case study is given to validate the practicality of the designed model in addressing the CSLP-CMLP and CSLP-SP interactions. The contributions of this research are its applicability to model the effect of multi-stakeholder interactions in agent-based decentralized models, the design of a PSO-based solution approach to achieve an integrated CSLP-CMLP/SP solution, and the provision of academic and practical guidance for decision makers to further enrich global decentralized CSLP research.
•An agent-based decentralized model is proposed to study the effect of multi-stakeholder interactions on CSLP.•The system stakeholders are modeled as individual agents with their respective decisions and objective functions.•Agent-based modelling and bi-level programming are integrated to model the mutual interactions.•The paper enriches CSLP research by guiding academic and practical decision makers in a decentralized and coordinated manner.
At a time when many observers question the EU's ability to achieve integration of any significance, and indeed Europeans themselves appear disillusioned, Mai'a K. Davis Cross argues that the EU has ...made remarkable advances in security integration, in both its external and internal dimensions. Moreover, internal security integration-such as dealing with terrorism, immigration, cross-border crime, and drug and human trafficking-has made even greater progress with dismantling certain barriers that previously stood at the core of traditional state sovereignty.
Such unprecedented collaboration has become possible thanks to knowledge-based transnational networks, or "epistemic communities," of ambassadors, military generals, scientists, and other experts who supersede national governments in the diplomacy of security decision making and are making headway at remarkable speed by virtue of their shared expertise, common culture, professional norms, and frequent meetings. Cross brings together nearly 80 personal interviews and a host of recent government documents over the course of five separate case studies to provide a microsociological account of how governance really works in today's EU and what future role it is likely to play in the international environment.
"This is an ambitious work which deals not only with European security and defense but also has much to say about the policy-making process of the EU in general."-Ezra Suleiman, Princeton University
Abstract
Advancements in technology enable new opportunities for creating digital social security accounts, but the effectiveness of these to solve the accessibility and eligibility issues facing ...platform workers has not been assessed fully in the literature. The potential of digital social security accounts lies in their ability to consider the possible different streams of income of atypical workers and to improve the effective access of these workers to social security. Tax and social security offices can now exchange information on the income of platform workers in real time, which offers the promise of formalizing the previously informal casual work relationships of the self‐employed. This article explores the case of the Estonian entrepreneur account as a digital hybrid solution for improving the effective access to social security of platform workers. Digital portable accounts create the conditions for the structural improvement required to respond adequately to meet the changing social security needs of atypical workers. However, this also requires that the policy design be thought through carefully, to avoid digital portable accounts being simply a digital facilitator of outdated solutions.
Si les progrès technologiques offrent de nouvelles possibilités quant à la création de comptes de sécurité sociale en ligne, jamais aucune étude ne s’est penchée en détail sur la capacité de ces derniers à résoudre les problèmes d’accessibilité et d’ouverture des droits auxquels sont confrontés les travailleurs de plateforme. Le potentiel des comptes de sécurité sociale en ligne repose sur leur faculté à regrouper les différentes sources de revenu des travailleurs atypiques et à garantir un meilleur accès effectif de ces travailleurs à la sécurité sociale. L’administration fiscale et les agences de sécurité sociale peuvent désormais échanger des informations relatives aux revenus des travailleurs de plateforme en temps réel, ce qui devrait formaliser le travail précaire auparavant informel des travailleurs indépendants. Cet article examine le cas du compte entrepreneur en Estonie, qui constitue une solution numérique hybride visant à garantir un meilleur accès effectif des travailleurs de plateforme à la sécurité sociale. Ces comptes uniques en ligne ouvrent la voie aux changements structurels nécessaires pour répondre de manière adéquate aux besoins changeants des travailleurs atypiques en matière de sécurité sociale. Pour ce faire, les politiques doivent aussi être élaborées avec soin afin que les comptes uniques en ligne ne deviennent pas de simples plateformes numériques supportant des solutions obsolètes.
Los progresos tecnológicos dan pie al surgimiento de nuevas oportunidades para crear cuentas digitales de la seguridad social, si bien en los estudios sobre esta cuestión todavía no se ha analizado plenamente el grado de eficacia de estas cuentas para resolver los problemas de accesibilidad y de elegibilidad a los que se enfrentan los trabajadores de plataformas. El potencial de las cuentas digitales de la seguridad social radica en su capacidad para tener en cuenta las diferentes fuentes de ingresos que pueden tener los trabajadores atípicos y para mejorar el acceso efectivo de estos trabajadores a la seguridad social. Las agencias tributarias y las oficinas de la seguridad social ya pueden compartir de inmediato información sobre los ingresos de los trabajadores de plataformas, lo que ofrece la promesa de formalizar las relaciones laborales de los trabajadores por cuenta propia, hasta ahora informales. En este artículo se analiza el caso de la cuenta de empresario de Estonia como una solución digital híbrida para mejorar el acceso efectivo de los trabajadores de plataformas a la seguridad social. Las cuentas digitales portátiles sientan las bases para la mejora estructural que se necesita para responder adecuadamente a las necesidades de seguridad social de los trabajadores atípicos, las cuales están en constante evolución. No obstante, también es necesario que las políticas se diseñen cuidadosamente, a fin de evitar que las cuentas digitales portátiles sean simplemente un facilitador digital de soluciones desactualizadas.
Technologische Fortschritte bieten neue Möglichkeiten für die Einrichtung digitaler Konten der sozialen Sicherheit. Inwieweit diese Konen sich jedoch dazu eignen, die Probleme von Plattformbeschäftigten im Hinblick auf Zugänglichkeit und Anspruchsberechtigung zu lösen, ist in der Literatur noch nicht umfassend untersucht worden. Das Potenzial digitaler Konten der sozialen Sicherheit beruht auf ihrer Fähigkeit, die möglichen unterschiedlichen Einkommensströme atypischer Beschäftigter zu berücksichtigen und den effektiven Zugang zur sozialen Sicherheit für diese Beschäftigten zu verbessern. Steuerbehörden und Ämter für soziale Sicherheit können nun in Echtzeit Informationen über das Einkommen von Plattformbeschäftigten austauschen, was eine Formalisierung der zuvor informellen gelegentlichen Beschäftigungsverhältnisse von Selbstständigen verspricht. In diesem Artikel wird der Fall des estnischen Unternehmerkontos als digitale Hybridlösung zur Verbesserung des effektiven Zugangs von Plattformbeschäftigten zur sozialen Sicherheit untersucht. Digitale, mobile Konten schaffen die Voraussetzungen für die strukturelle Verbesserung, die erforderlich ist, um angemessen auf die sich verändernden Bedürfnisse atypischer Beschäftigter im Bereich der sozialen Sicherheit reagieren zu können. Dies setzt jedoch auch voraus, dass die Strategie sorgfältig durchdacht ist, um zu vermeiden, dass digitale mobile Konten nur als digitaler Vermittler für veraltete Lösungen dienen.
Достижения в области технологий открывают новые возможности для регистрации цифровых счетов социального обеспечения, однако их эффективность в решении проблем с доступом к услугам и правом на получение помощи, с которыми сталкиваются работники платформенной экономики, не освещалась в литературе в полной мере. Потенциал цифровых счетов социального обеспечения заключается в их способности учитывать несколько разных источников дохода нетипичных работников и повышать эффективность доступа таких работников к социальному обеспечению. Налоговая служба и служба социального обеспечения теперь могут обмениваться информацией о доходе работников платформенной экономики в режиме реального времени, что открывает возможность формализации до этого неформальных разовыхтрудовых отношений самозанятых. В статье рассматривается пример предпринимательского счёта в Эстонии — гибридного цифрового решения для обеспечения работникам платформенной экономики более эффективного доступа к социальному обеспечению. Переносимые цифровые счета создают условия для структурных улучшений, необходимых для адекватного реагирования на меняющиеся потребности в области социального обеспечения нетипичных работников. Однако это также требует хорошо продуманной политики, которая не позволит переносимым цифровым счетам стать всего лишь цифровым оформлением устаревших решений.
技术进步为创建社会保障数字账户提供了新的机遇, 但这些账户在解决平台工人面临的可及性和资格条件问题方面是否有效, 文献尚未进行充分评估。社会保障数字账户的潜力在于能够考虑非典型工人可能存在不同收入来源, 改善他们有效获得社会保障的机会。税收和社会保障部门如今可以实时交换平台工人的收入信息, 为自雇工人此前非正规的临时工作关系正规化带来了希望。本文探讨了爱沙尼亚企业家账户案例, 这是一种数字化混合解决方案, 可以改善平台工人有效获得社会保障的情况。数字便携账户为结构性改善创造了条件, 以充分应对非典型工人不断变化的社会保障需求。然而, 这也要求政策设计必须仔细斟酌, 避免数字便携账户只是成为过时解决方案的数字化推手。
تتيح التطورات في مجال التكنولوجيا فرصا جديدة لإنشاء حسابات ضمان اجتماعي رقمية، ولكن لم يتم تقييم فعالية هذه الحسابات في حل مشكلات التأهل والوصول الى المنافع التي تواجه عمال المنصات بشكل كامل في الأدبيات. وتكمن إمكانات حسابات الضمان الاجتماعي الرقمية في قدرتها على النظر في التدفقات المختلفة المحتملة لدخل العمال غير العاديين وتحسين الوصول الفعال لهؤلاء العمال إلى الضمان الاجتماعي. ويمكن لمكاتب الضرائب والضمان الاجتماعي الآن تبادل المعلومات بشأن دخل العاملين في المنصات في الوقت الفعلي، مما يعد بإضفاء الطابع الرسمي على علاقات العمل غير الرسمية التي كانت في السابق متعلقة بالعاملين لحسابهم الخاص. ويستكشف هذا المقال حالة حساب رائد الأعمال الإستوني كحل رقمي مختلط لتحسين الوصول الفعال إلى الضمان الاجتماعي للعاملين في المنصات. وتخلق الحسابات الرقمية المحمولة الظروف لتحقيق التحسين الهيكلي المطلوب للاستجابة بشكل مناسب فيما يتعلق بتلبية احتياجات الضمان الاجتماعي المتغيرة للعمال غير الاعتياديين. ومع ذلك، يتطلب هذا الأمر أيضا التفكير بعناية في تصميم السياسات لتجنب أن تكون الحسابات الرقمية المحمولة مجرد وسيلة تسهيل رقمية للحلول التي عفا عليها الزمن.
Os avanços da tecnologia habilitam novas oportunidades para a criação de contas digitais de seguridade social, mas a eficácia delas para resolver os problemas de acessibilidade e elegibilidade enfrentados pelos trabalhadores de plataforma on‐line não foram totalmente avaliados nas publicações específicas. O potencial das contas digitais de seguridade social reside em sua capacidade de considerar os possíveis diferentes fluxos de rendimentos dos trabalhadores atípicos e em melhorar o acesso efetivo desses trabalhadores à seguridade social. Agora as agências fiscais e previdenciárias podem trocar informações sobre os rendimentos dos trabalhadores de plataforma on‐line em tempo real, o que promete formalizar as relações de trabalho anteriormente informais dos autônomos. Este artigo explora o caso da conta do empreendedor estoniano como uma solução híbrida digital para melhorar o acesso efetivo à seguridade social dos trabalhadores em plataforma on‐line. As contas digitais portáteis criam as condições de melhoria estrutural necessária para responder de maneira adequada às mudanças nas necessidades de seguridade social dos trabalhadores atípicos. No entanto, essa situação também requer que o conceito da política seja pensado com cuidado, para evitar que as contas digitais portáteis sejam simplesmente um facilitador digital de soluções desatualizadas.