Narrow your search

Library

KBC (2)

National Bank of Belgium (2)

ULB (2)

AP (1)

KDG (1)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

More...

Resource type

book (5)

digital (1)

dissertation (1)


Language

English (7)


Year
From To Submit

2018 (2)

2017 (1)

2012 (1)

2011 (2)

2009 (1)

Listing 1 - 7 of 7
Sort by

Dissertation
Poverty, risk and insurance : evidence from Ethiopia and Yemen.
Author:
ISBN: 9789036101066 Year: 2009

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
An investigation of recall and scalability in ontology-based data-access systems
Authors: ---
Year: 2017 Publisher: Brussel VUB

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Who is Vouching for the Input Voucher? : Decentralized Targeting and Elite Capture in Tanzania
Authors: ---
Year: 2011 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Input subsidy programs carry support as instruments to increase agricultural productivity, provided they are market-smart. This requires especially proper targeting to contain the fiscal pressure, with decentralized targeting of input vouchers currently the instrument of choice. Nonetheless, despite clear advantages in administrative costs, the fear of elite capture persists. These fears are borne out in the experience from the 2008 input voucher pilot program in Kilimanjaro, Tanzania, examined here. Elected village officials received about 60 percent of the distributed vouchers, a factor that significantly reduced the targeting performance of the program, especially in more unequal and remote communities. When targeting the poor, greater coverage and a focus on high trust settings helped mitigate these concerns. The findings highlight the continuing need for scrutiny when relying on decentralized targeting. A clearer sense of purpose (increasing productivity among poorer farmers versus increasing aggregate output) could also enhance the targeting performance.


Book
Who is Vouching for the Input Voucher? : Decentralized Targeting and Elite Capture in Tanzania
Authors: ---
Year: 2011 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Input subsidy programs carry support as instruments to increase agricultural productivity, provided they are market-smart. This requires especially proper targeting to contain the fiscal pressure, with decentralized targeting of input vouchers currently the instrument of choice. Nonetheless, despite clear advantages in administrative costs, the fear of elite capture persists. These fears are borne out in the experience from the 2008 input voucher pilot program in Kilimanjaro, Tanzania, examined here. Elected village officials received about 60 percent of the distributed vouchers, a factor that significantly reduced the targeting performance of the program, especially in more unequal and remote communities. When targeting the poor, greater coverage and a focus on high trust settings helped mitigate these concerns. The findings highlight the continuing need for scrutiny when relying on decentralized targeting. A clearer sense of purpose (increasing productivity among poorer farmers versus increasing aggregate output) could also enhance the targeting performance.


Book
On the Fungibility of Spending and Earnings : Evidence from Rural China and Tanzania
Authors: ---
Year: 2012 Publisher: Washington, D.C., The World Bank,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A common behavioral assumption of micro-economic theory is that income is fungible. Using household panel data from rural China and Tanzania, this study finds however that people are more likely to spend unearned income on less basic consumption goods such as alcohol and tobacco, non-staple food, transportation and communication, and clothing, while they are somewhat more likely to spend earned income on basic consumption goods such as staple food, and invest it in education. This resonates with the widespread cultural notion that money that is easily earned is also more easily spent. Cognitively, the results could be understood within the context of emotional accounting, whereby people classify income based on the emotions it evokes, prompting them to spend hard earned money more wisely to mitigate the negative connotations associated with its acquisition. The policy implications are real, bearing for example on the choice between employment guarantee schemes and cash transfers in designing social security programs.


Book
Honeypot Frameworks and Their Applications: A New Framework
Authors: --- ---
ISBN: 9811077398 981107738X Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.

Keywords

Computer security. --- Malware (Computer software) --- Prevention. --- Computer science. --- Computer organization. --- Computer science --- Computer simulation. --- Computer Science. --- Security. --- Computer Systems Organization and Communication Networks. --- Systems and Data Security. --- Applications of Graph Theory and Complex Networks. --- Math Applications in Computer Science. --- Simulation and Modeling. --- Mathematics. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Data protection. --- Computer network architectures. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Informatics --- Science --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Physics. --- Computer science—Mathematics. --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Organization, Computer


Digital
Honeypot Frameworks and Their Applications: A New Framework
Authors: --- ---
ISBN: 9789811077395 Year: 2018 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.

Listing 1 - 7 of 7
Sort by