• Title/Summary/Keyword: Security Economics

Search Result 418, Processing Time 0.022 seconds

Employment Instability and Security Funds in U.S. Households

  • Baek, Eun-Woung
    • International Journal of Human Ecology
    • /
    • v.4 no.2
    • /
    • pp.55-75
    • /
    • 2003
  • The purpose of this study was to investigate the effect of employment related factors on household savings for precautionary purposes when controlling for financial security and to compare the results between the two different economic periods. A conceptual framework was developed based on the precautionary saving theory, the family stress theory, and previous empirical studies. As a self-insurance, a measure of security funds were developed and used as the dependent variable. Using data on working households in the 1992 and the 1998 Survey of Consumer Finances (SCF), a MLE estimation was conducted on the pooled data. The 1992 and 1998 data were used to reflect periods of economic recession and expansion, respectively. The results suggested that factors representing resources played the most significant role in determining the amount of security funds. Some of the employment related factors, preferences, financial security, and race were also significantly affected the amount of security funds. The results suggested that stable employment conditions were important for households to accumulate security funds. Households with more human resources and financial resources had a larger amount of security funds than those that had less human and financial resources. From the findings, implications for research, policies, and financial educators had been suggested.

Fuel Mix of Electricity Generating System Considering Energy Security and Climate Change Mitigations : Focusing on Complementarity between Policy Objectives (에너지 안보 및 기후변화 대책을 고려한 발전구성비의 도출 : 정책 목표간의 상호보완성을 중심으로)

  • Ryu, Hanee;Kim, Kyunam;Kim, Yeonbae
    • Environmental and Resource Economics Review
    • /
    • v.20 no.4
    • /
    • pp.761-796
    • /
    • 2011
  • The purpose of this paper is to derive fuel mix of electricity generating system with the lowest cost considering energy security and climate change mitigations as the target of energy policy. Energy Security Price Index(ESPI), based on the measure of market concentration in fossil fuel market and political risk of exporting countries, is chosen to assess the level of energy security. The methodology of Energy Conservation Supply Curve(CSC) is applied to fuel mix to meet the carbon emission mitigation through increasing the alternatives participation and introduction of new technologies. These also represent an improvement on the level of energy security, having the complementarity between two objectives. The alternative measure for improving energy security is exploration and production(E&P) of fossil fuel for energy sufficiency. Fuel mix of electricity generating system to achieve certain objectives in 2020 can be derived with the lowest cost considering energy security and carbon emission mitigations.

  • PDF

Who Cares More about Security?: Effects of Personality Traits on PC Security Intention (누가 보안에 더 신경을 쓰는가?: 성격특성이 PC보안의도에 미치는 영향)

  • June-Young Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.99-114
    • /
    • 2018
  • Technical measures for computer security are essential, but they are not a sufficient condition for security. Therefore, a personal approach to user's security behavior should be developed. Personality, which is a human aspect, is a behavioral characteristic that characterizes each individual and facilitates prediction of how an individual will behave in certain situations. Protection motivation theory has been used extensively in the security research on human behavior. The present study discusses how protection motivation was formed from personality traits. Thus, organizations can refer the result of this study for their HRD and HRM concerns.

An Analysis on Intention to Use Information Service for Personal Information Breach (개인정보 침해 관련 정보 제공 서비스 사용 의도 분석)

  • Kim, Taek-Young;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.199-213
    • /
    • 2018
  • Since 2008, large-scale personal information breach incidents have occurred frequently. Even though national education, policy, and laws have been enacted and implemented to resolve the issue, personal information breaches still occur. Currently, individuals cannot confirm detailed information about what personal information has been affected, and they cannot respond to the breaches. Therefore, it is desirable to develop various methods for preventing and responding to personal information infringement caused by breach and leakage incidents and move to privacy protection behaviors. The purpose of this study is to create understanding of personal information security and information breach, to present services that can prevent breaches of personal information, to investigate the necessity of and analyze the potential public demand for such services, and to provide direction for future privacy-related information services.

THE POLITICS OF SOCIAL SECURITY AND RETIREMENT REFORMS AND RETIREMENT SAVINGS CULTURE IN SOUTH AFRICA

  • Nevondwe, Lufuno;Odeku, Kola;Matotoka, Mothlatlego
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.1 no.3
    • /
    • pp.71-84
    • /
    • 2013
  • Purpose: The South African government is determined in alleviating poverty while encouraging job creation and protecting the disposable incomes of poor households. This article looks at the challenges that are facing the South African Social Security system and argues that the provision of income security is amongst the most practical expressions of a nation's cohesion and values. Research Design, Data and Methodology: There are seven proposals in the Social Security and Retirement Reform and these proposals are based on the following two principal objectives of the government, that is, to ensure a basic standard of living and to prevent destitution in old age or in circumstances of unemployment or incapacity partly or wholly through redistributive measures, and to encourage savings to provide for the replacement of income on retirement, disablement or death through long-term insurance arrangements. Results: This article evaluates these seven proposals, state old age pension, wage subsidy, mandatory participation in a national social security system for all, mandatory participation in private occupational or individual retirement funds, Voluntary additional contributions to occupational or individual retirement funds, reform of the governance and regulation of the retirement funding industry and reform of the tax system. Conclusion: This article concludes that the population size of South Africa has increased significantly to 51, 8 million in 2011 and therefore the time is right for bold new steps in improving income security of the poor and strengthening the fabric of social solidarity that binds all South Africans together.

Securitization and the Merger of Great Power Management and Global Governance: The Ebola Crisis

  • Cui, Shunji;Buzan, Barry
    • Analyses & Alternatives
    • /
    • v.3 no.1
    • /
    • pp.29-61
    • /
    • 2019
  • Within the discipline of International Relations (IR), the literatures on global governance (GG) and great power management (GPM) at best ignore each other, and at worst treat the other as a rival or enemy. On the one hand, the GPM literature, like both realism in all its forms, and neoliberalism, takes for granted the ongoing, disproportionate influence of the great powers in the management of the international system/society, and does not look much beyond that. On the other hand, the GG literature emphasizes the roles of smaller states, non-state actors and intergovernmental organizations (IGOs), and tends to see great powers more as part of the problem than as part of the solution. This paper argues that the rise to prominence of a non-traditional security agenda, and particularly of human security, has triggered a de facto merger of GPM and GG that the IR literature usually treated as separate and often opposed theories. We use the Ebola crisis of 2014-15 to show how an issue framed as human security brought about a multi-actor response that combined the key elements of GPM and GG. The security framing overrode many of the usual inhibitions between great powers and non-state actors in humanitarian crises, including even the involvement of great power military forces. Through examining broadly the way in which the Ebola crisis is tackled, we argue that in an age of growing human security challenges, GPM and GG are necessarily and fruitfully merging. The role of great powers in this new human security environment is moving away from the simple means and ends of traditional GPM. Now, great powers require the ability to cooperate and coordinate with multiple-level actors to make the GG/GPM nexus more effective and sustainable. In doing so they can both provide crucial resources quickly, and earn respect and status as responsible great powers. IGOs provide legitimation and coordination to the GPM/GG package, and non-state actors (NSAs) provide information, specialist knowledge and personnel, and links into public engagement. In this way, the unique features of the Ebola crisis provide a model for how the merger of GPM and GG might be taken forward on other shared-fate threats facing global international society.

  • PDF

Corporate Social Responsibility in Modern Transnational Corporations

  • Vitalii Nahornyi;Alona Tiurina;Olha Ruban;Tetiana Khletytska;Vitalii Litvinov
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.172-180
    • /
    • 2024
  • Since the beginning of 2015, corporate social responsibility (CSR) models have been changing in connection with the trend towards the transition of joint value creation of corporate activities and consideration of stakeholders' interests. The purpose of the academic paper lies in empirically studying the current practice of social responsibility of transnational corporations (TNCs). The research methodology has combined the method of qualitative analysis, the method of cases of agricultural holdings in emerging markets within the framework of resource theory, institutional theory and stakeholders' theory. The results show that the practice of CSR is integrated into the strategy of sustainable development of TNCs, which determine the methods, techniques and forms of communication, as well as areas of stakeholders' responsibility. The internal practice of CSR is aimed at developing norms and standards of moral behaviour with stakeholders in order to maximize economic and social goals. Economic goals are focused not only on making a profit, but also on minimizing costs due to the potential risks of corruption, fraud, conflict of interest. The system of corporate social responsibility of modern TNCs is clearly regulated by internal documents that define the list of interested parties and stakeholders, their areas of responsibility, greatly simplifying the processes of cooperation and responsibility. As a result, corporations form their own internal institutional environment. Ethical norms help to avoid the risks of opportunistic behaviour of personnel, conflicts of interest, cases of bribery, corruption, and fraud. The theoretical value of the research lies in supplementing the theory of CSR in the context of the importance of a complex, systematic approach to integrating the theory of resources, institutional theory, theory of stakeholders in the development of strategies for sustainable development of TNCs, the practice of corporate governance and social responsibility.

Green Employee Empowerment? Driving and Inhibiting Factors for Green Employee Performance

  • ADI, Nyoman Rasmen;MULYADI, Made;SETINI, Made;ASTAWA, Nengah Dasi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.293-302
    • /
    • 2021
  • Being able to survive during the Covid19 pandemic is a big task for a company, as such, empowerment of employees is a must. The sample in this study was 300 employees who worked in Spas throughout Bali. The sampling technique was purposive sampling. Data analysis was using SEM and SMARTS as data processing. The results showed that green communication, namely communication that occurs between employees, superiors, and the environment, has a very good influence on the sustainability of employee performance. To become green management, a green organizational commitment that cares about the safety of employee health and the environment is an important factor as motivation in green dedication or positive employee productivity, but communication between work actors and justice is also a motivating factor. Work safety and job security for employees empower employees (which is a green line), especially for freelance work organizations so that further research in subsequent studies can make samples in a more varied industrial sector.

Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security

  • Tan, Zuowen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.8
    • /
    • pp.1982-1997
    • /
    • 2012
  • Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In 2011, Dehkordi et al. proposed an identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Dehkordi et al.'s protocol is vulnerable to impersonation attacks. Furthermore, we have found that their protocol cannot provide perfect forward security or mutual security. Then we propose an identity-based authenticated multiple key agreement protocol which removes the weaknesses of the Dehkordi et al.'s protocol. Compared with the multiple key agreement protocols in the literature, the proposed protocol is more efficient and holds stronger security.

An Information Security Evaluation Indices for an enterprise organization (기업조직을 위한 정보보호 평가 척도)

  • Ko Il Seok;Ko Gwang Uk;Na Dae Kyung;Na Heui Seong
    • Proceedings of the KAIS Fall Conference
    • /
    • 2005.05a
    • /
    • pp.108-110
    • /
    • 2005
  • Most of the evaluation systems have performed evaluation with an emphasis on information security products so far. However, evaluating information security level for an enterprise needs analysis of the whole enterprise organization, and a synthetic and systematic evaluation system based on it. This study has tried to grasp the information security level of the whole enterprise organization, and develop an evaluation system of information security level for suggesting a more developing direction of information security.

  • PDF