Narrow your search

Library

VUB (7)

AP (4)

KDG (4)

EhB (2)

KU Leuven (2)

ULB (2)

National Bank of Belgium (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

More...

Resource type

book (10)

digital (4)


Language

English (12)


Year
From To Submit

2023 (1)

2020 (4)

2017 (1)

2010 (1)

2009 (2)

More...
Listing 1 - 10 of 12 << page
of 2
>>
Sort by

Book
Emigration, Business Dynamics, and Firm Heterogeneity in North Macedonia
Authors: ---
ISBN: 9798400266003 Year: 2023 Publisher: Washington, D.C. : International Monetary Fund,

Loading...
Export citation

Choose an application

Bookmark

Abstract

High emigration rates are a challenge in the Western Balkans. High emigration rates might lead to inadequate skilled labor and affect firm creation, capital formation, and economic convergence. The 2021 North Macedonia census reveals that more than 12.4% of North Macedonians live abroad. To assess the consequences, we estimate the impact of emigration on the number of firms and capital formation. Business dynamics can affect emigration reversely. To alleviate the endogeneity bias, we use a shift-share instrument with the historical diaspora networks and destination countries’ GDP growth rate as a source of exogenous variations. Our results show that (1) In the short run, a 1 percentage point increase in the emigration rate leads to a 2.91% decrease in the number of firms in the area of origin; (2) The long-run effects of emigration on the number of firms are less negative than the short-run impacts; (3) Emigration mainly reduces the number of micro and small firms; (4) Emigration affects the number of firms and capital formation more in the industrial sector than the other sectors, through the skilled labor shortage channel. This paper contributes to the literature on emigration and provides implications and policy considerations for developing countries, where high emigration rates are prevalent.


Digital
Information and Communications Security (vol. # 4307) : 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings
Authors: --- ---
ISBN: 9783540494973 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Book
Information and Communications Security (vol. # 4307)
Authors: --- --- ---
ISBN: 9783540494973 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH.

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi'an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga, Spain (ICICS 2004); and Beijing, China (ICICS 2005). The conference proceedings of the past seven events have been published by Springer in the Lecture Notes in Computer Science series, in LNCS1334,LNCS1726,LNCS2229,LNCS 2513,LNCS 2836, LNCS 3269, and LNCS 3783, respectively. This year we received a total of 119 submissions on various aspects of - hoc and sensor network security. The Program Committee selected 22 regular papers and 17 short papers that cover a variety of topics, including security protocols, applied cryptography and cryptanalysis, access control in distributed systems, privacy, malicious code, network and systems security, and security implementations. Putting together ICICS 2006 was a team e?ort. First of all, we would like to thank the authors of every paper, whether accepted or not, for submitting their papers to ICICS 2006. We would like to express our gratitude to the Program Committee members and the external reviewers, who worked very hard in - viewing the papers and providing suggestions for their improvements.


Digital
Trust Management III : Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings
Authors: --- --- ---
ISBN: 9783642020568 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Book
Analysis Techniques for Information Security
Authors: --- --- --- ---
ISBN: 303102334X Year: 2010 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols.


Book
Differential privacy
Authors: --- --- ---
ISBN: 9781627052979 9781627054935 Year: 2017 Publisher: [San Rafael, California] Morgan & Claypool

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Information and communications security : 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings
Authors: --- --- ---
ISBN: 3540494960 3540494979 Year: 2006 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4–7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi’an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga, Spain (ICICS 2004); and Beijing, China (ICICS 2005). The conference proceedings of the past seven events have been published by Springer in the Lecture Notes in Computer Science series, in LNCS1334,LNCS1726,LNCS2229,LNCS 2513,LNCS 2836, LNCS 3269, and LNCS 3783, respectively. This year we received a total of 119 submissions on various aspects of - hoc and sensor network security. The Program Committee selected 22 regular papers and 17 short papers that cover a variety of topics, including security protocols, applied cryptography and cryptanalysis, access control in distributed systems, privacy, malicious code, network and systems security, and security implementations. Putting together ICICS 2006 was a team e?ort. First of all, we would like to thank the authors of every paper, whether accepted or not, for submitting their papers to ICICS 2006. We would like to express our gratitude to the Program Committee members and the external reviewers, who worked very hard in - viewing the papers and providing suggestions for their improvements.

Keywords

Computer security --- Telecommunication systems --- Computer Science --- Engineering & Applied Sciences --- Security measures --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer


Book
Trust Management III
Authors: --- --- --- ---
ISBN: 9783642020568 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.


Book
Computer Security – ESORICS 2020
Authors: --- --- --- ---
ISBN: 9783030589516 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Computer Security – ESORICS 2020
Authors: --- --- --- ---
ISBN: 9783030590130 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 12 << page
of 2
>>
Sort by