Listing 1 - 6 of 6
Sort by

Book
Capitalismo distrettuale, localismi d'impresa, globalizzazione
Authors: ---
ISBN: 8884536057 8884536065 9788884536051 Year: 2007 Publisher: Firenze : Firenze University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

From the late Sixties on, industrial development in Italy evolved through the spread of small and medium sized firms, aggregated in district networks, with an elevated propensity to enterprise and the marked presence of owner-families. Installed within the local systems, the industrial districts tended to simulate large-scale industry exploiting lower costs generated by factors that were not only economic. The districts are characterised in terms of territorial location (above all the thriving areas of the North-east and Centre) and sector, since they are concentrated in the "4 As" (clothing-fashion, home-decor, agri-foodstuffs, automation-mechanics), with some overlapping with "Made in Italy". How can this model be assessed? This is the crucial question in the debate on the condition and prospects of the Italian productive system between the supporters of its capacity to adapt and the critics of economic dwarfism. A dispassionate judgement suggests that the prospects of "small is beautiful" have been superseded, but that the "declinist" view, that sees only the dangers of globalisation and the IT revolution for our SMEs is risky. The concept of irreversible crisis that prevails at present is limiting, both because it is not easy either to "invent", or to copy, a model of industrialisation, and because there is space for a strategic repositioning of the district enterprises. The book develops considerations in this direction, showing how an evolution of the district model is possible, focusing on: gains in productivity, scope economies (through diversification and expansion of the range of products), flexibility of organisation, capacity to meld tradition and innovation aiming at product quality, dimensional growth of the enterprises, new forms of financing, active presence on the international markets and valorisation of the resources of the territory. It is hence necessary to reactivate the behavioural functions of the entrepreneurs.


Book
Dissertatio anagogica, the[o]logica, parænetica de paradiso
Authors: ---
Year: 1762 Publisher: Panormi Ex typographia Francisici Ferrer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
La formazione degli economisti in Italia, 1950-1975
Authors: ---
ISBN: 8815095675 Year: 2004 Publisher: Bologna Il Mulino

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Economics --- Economists --- History


Dissertation
Evaluating Privacy Risks in Mouse Motion-Based Web Bot Detection

Loading...
Export citation

Choose an application

Bookmark

Abstract

There are several methods for detecting web bots, including analyzing mouse dynamics, which is a cost-effective approach. However, the effectiveness of the latest detection schemes in identifying "session-replay" bots, i.e., bots that imitate users by replaying mouse movements, remains uncertain. The privacy risks of using mouse dynamics are also unclear, with previous research indicating that such data can reveal personal information, suggesting potential risks in bot detection. This thesis explores two research gaps: the effectiveness of bot detection methods in identifying session-replay bots using mouse dynamics, and the privacy implications of employing mouse dynamics for this purpose. To explore these issues, two analyses were conducted. The first evaluated a convolutional neural network (CNN)-based bot detection method, while the second assessed its privacy risks. The model, built on a state-of-the-art framework, uses mouse dynamics from which it creates feature vectors and employs a similarity analysis through clustering. The findings indicate that (a) no clusters were detected among diverse user data, and (b) clusters emerged when analysing data from a single user. This suggests that, while the CNN effectively identifies distinct user behaviour patterns and detects sessions being replayed, it also poses privacy risks by exposing distinct user signatures in the generated feature vectors.

Keywords


Dissertation
Post-hoc XAI-based Adversarial Attack Detection on Deepfake Detectors

Loading...
Export citation

Choose an application

Bookmark

Abstract

Deepfakes, synthetic media created using machine learning, commonly used to recreate another’s identity, are becoming increasingly realistic and accessible, raising concerns about their misuse for misinformation, fraud, and other malicious activities. While significant progress has been made in developing tools to detect deepfakes, these detection systems remain highly vulnerable to adversarial attack, which are small manipulations of the input sample that can deceive the detectors into making incorrect classifications. The field of Explainable AI (XAI) aims to make AI systems more transparent and interpretable and has shown promise in helping users recognize adversarial manipulations by highlighting the decision-making process of machine learning models. This thesis explores the use of an XAI for post-hoc adversarial attack detection, evaluating its ability to identify adversarial manipulations in deepfake detection systems. Additionally, in this study, we investigate how adversarial attacks distort the explanations generated by XAI, the system’s ability to generalize to new types of adversarial attacks, and how this approach compares to the widely used defense technique, adversarial training. The findings of our work show that XAI-based methods are effective at identifying manipulations when they are similar to those included in the training process, offering both interpretability and reliable classification. However, their ability to detect previously unseen types of adversarial manipulations remains limited, with certain attacks successfully bypassing detection. This limitation may be linked to overfitting in the training process, caused by the use of a dataset with limited diversity in manipulation techniques. This thesis compares our XAI-base classification to and adversarially trained model and shows that while XAI-based methods demonstrate unique advantages in terms of interpretability, adversarial training outperforms XAI-based detection in terms of overall reliability and robustness. Despite this, XAI-based detection shows potential as a complementary tool for understanding and addressing vulnerabilities in detection systems.

Keywords


Dissertation
Privacy preserving machine learning for inertial gait authentication

Loading...
Export citation

Choose an application

Bookmark

Abstract

Motivated by the success of behavioral authentication systems and an interest in privacy, we decided to scrutinize the privacy of behavioral authentication systems. Because the authentication system learns to recognize the authentic user by studying his or her biometric data, it might seem like the authentication system must inherently use personal information. This will be tested in our research. In this thesis the presence of a privacy leak is confirmed in a state of the art gait authentication system. We copy the authentication system and benchmark it on the world's largest inertial gait database w.r.t. the amount of subjects, the OU-ISIR database. We measure a slight decrease in performance compared to the original study, from 14\% to 17\% equal error rate. However, this decrease can be seen in several other publications that are first published with a smaller data set. Furthermore, We use standard machine learning techniques to learn personal information, such as gender and age, from the feature vectors of the authentication system. To thwart any attacks on the demonstrated privacy leak, we use a defense from a recent investigation, called Slogger. This defense adds noise to the accelerometer data to make it more difficult to infer any private information from it. Slogger has already been criticized for injecting its noise too aggressively into the accelerometer data, which comes at the expense of the functionality from other applications. In this work we will not only validate if Slogger can combat the privacy leak, but we also check if it makes gait authentication impossible. Moreover, we propose two new defenses that can be used against the privacy leak. Both techniques will be compared with Slogger to verify whether they are an improvement. The first technique uses feature selection methods to calculate the influence they have in inferring age and gender. The features that are the most influential are removed from the feature vector. The second technique adds noise to those selected features instead of filtering them out of the feature vector. Both techniques succeed in improving on Slogger's performance when the authentication process remains operational.

Keywords

Listing 1 - 6 of 6
Sort by