Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Choose an application
Choose an application
Input subsidy programs carry support as instruments to increase agricultural productivity, provided they are market-smart. This requires especially proper targeting to contain the fiscal pressure, with decentralized targeting of input vouchers currently the instrument of choice. Nonetheless, despite clear advantages in administrative costs, the fear of elite capture persists. These fears are borne out in the experience from the 2008 input voucher pilot program in Kilimanjaro, Tanzania, examined here. Elected village officials received about 60 percent of the distributed vouchers, a factor that significantly reduced the targeting performance of the program, especially in more unequal and remote communities. When targeting the poor, greater coverage and a focus on high trust settings helped mitigate these concerns. The findings highlight the continuing need for scrutiny when relying on decentralized targeting. A clearer sense of purpose (increasing productivity among poorer farmers versus increasing aggregate output) could also enhance the targeting performance.
Decentralization --- Economic Theory & Research --- Environment --- Fertilizer --- Housing & Human Habitats --- Local Elite --- Regional Economic Development --- Rural development --- Rural Poverty Reduction --- Services & Transfers to Poor --- Social development --- Targeting --- Voucher Program --- Tanzania
Choose an application
Input subsidy programs carry support as instruments to increase agricultural productivity, provided they are market-smart. This requires especially proper targeting to contain the fiscal pressure, with decentralized targeting of input vouchers currently the instrument of choice. Nonetheless, despite clear advantages in administrative costs, the fear of elite capture persists. These fears are borne out in the experience from the 2008 input voucher pilot program in Kilimanjaro, Tanzania, examined here. Elected village officials received about 60 percent of the distributed vouchers, a factor that significantly reduced the targeting performance of the program, especially in more unequal and remote communities. When targeting the poor, greater coverage and a focus on high trust settings helped mitigate these concerns. The findings highlight the continuing need for scrutiny when relying on decentralized targeting. A clearer sense of purpose (increasing productivity among poorer farmers versus increasing aggregate output) could also enhance the targeting performance.
Decentralization --- Economic Theory & Research --- Environment --- Fertilizer --- Housing & Human Habitats --- Local Elite --- Regional Economic Development --- Rural development --- Rural Poverty Reduction --- Services & Transfers to Poor --- Social development --- Targeting --- Voucher Program --- Tanzania
Choose an application
A common behavioral assumption of micro-economic theory is that income is fungible. Using household panel data from rural China and Tanzania, this study finds however that people are more likely to spend unearned income on less basic consumption goods such as alcohol and tobacco, non-staple food, transportation and communication, and clothing, while they are somewhat more likely to spend earned income on basic consumption goods such as staple food, and invest it in education. This resonates with the widespread cultural notion that money that is easily earned is also more easily spent. Cognitively, the results could be understood within the context of emotional accounting, whereby people classify income based on the emotions it evokes, prompting them to spend hard earned money more wisely to mitigate the negative connotations associated with its acquisition. The policy implications are real, bearing for example on the choice between employment guarantee schemes and cash transfers in designing social security programs.
Economic Theory & Research --- Fiscal & Monetary Policy --- Inequality --- Labor Policies --- Macroeconomics and Economic Growth --- Marginal propensity to consume --- Mental accounts --- Rural Poverty Reduction --- Safety nets --- World Bank --- China --- Tanzania
Choose an application
This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.
Computer security. --- Malware (Computer software) --- Prevention. --- Computer science. --- Computer organization. --- Computer science --- Computer simulation. --- Computer Science. --- Security. --- Computer Systems Organization and Communication Networks. --- Systems and Data Security. --- Applications of Graph Theory and Complex Networks. --- Math Applications in Computer Science. --- Simulation and Modeling. --- Mathematics. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Data protection. --- Computer network architectures. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Informatics --- Science --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Physics. --- Computer science—Mathematics. --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Organization, Computer
Choose an application
This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.
Complex analysis --- Mathematics --- Applied physical engineering --- Production management --- Computer science --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- toegepaste wiskunde --- complexe analyse (wiskunde) --- veiligheid (mensen) --- bitcoin --- vormgeving --- computers --- informatica --- computerbesturingssystemen --- mineralen (chemie) --- simulaties --- mijnbouw --- wiskunde --- computerbeveiliging --- KI (kunstmatige intelligentie) --- OS (operating system) --- computernetwerken --- computerkunde
Listing 1 - 7 of 7 |
Sort by
|