WorldWideScience

Sample records for securities primary auctions

  1. Auction Market System in Electronic Security Trading Platform

    OpenAIRE

    Li, Xi Hao

    2012-01-01

    Under the background of the electronic security trading platform Xetra operated by Frankfurt Stock Exchange, we consider the Xetra auction market system (XAMS) from `bottom-up', which the interaction among heterogeneous traders and Xetra auction market mechanism generates non-equilibrium price dynamics. First we develop an integrative framework that serves as general guidance for analyzing the economic system from `bottom-up' and for seamlessly transferring the economic system into the corres...

  2. An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving

    Directory of Open Access Journals (Sweden)

    Hong Zhong

    2016-01-01

    Full Text Available With the rapid development of the Internet, electronic commerce has become more and more popular. As an important element of e-commerce, many Internet companies such as Yahoo! and eBay have launched electronic auction systems. However, like most electronic commerce products, safety is an important issue that should be addressed. Many researchers have proposed secure electronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users’ privacy. Considering the importance of privacy preservation, we have designed a new auction mechanism. Through symmetrical key establishment in the registration phase, all messages transmitted over the Internet would be protected and, meanwhile, achieve the property of unlinkability. The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.

  3. Efficient and Secure Comparison for On-Line Auctions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Geisler, Martin Joakim

    2007-01-01

    with respect to functionality and performance. It minimizes the amount of information bidders need to send, and for comparison of 16 bit numbers with security based on 1024 bit RSA (executed by two parties), our implementation takes 0.28 seconds including all computation and communication. Using precomputation...

  4. Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons

    Science.gov (United States)

    Zhang, Ke-Jia; Kwek, Leong-Chuan; Ma, Chun-Guang; Zhang, Long; Sun, Hong-Wei

    2018-02-01

    Quantum sealed-bid auction (QSA) has been widely studied in quantum cryptography. For a successful auction, post-confirmation is regarded as an important mechanism to make every bidder verify the identity of the winner after the auctioneer has announced the result. However, since the auctioneer may be dishonest and collude with malicious bidders in practice, some potential loopholes could exist. In this paper, we point out two types of collusion attacks for a particular post-confirmation technique with EPR pairs. And it is not difficult to see that there exists no unconditionally secure post-confirmation mechanism in the existing QSA model, if the dishonest participants have the ability to control multiparticle entanglement. In the view of this, we note that some secure implementation could exist if the participants are supposed to be semi-quantum, i.e., they can only control single photons. Finally, two potential methods to design post-confirmation mechanism are presented in this restricted scenario.

  5. Do I hear... anyone here? Tax-exempt healthcare facilities have taken a hit on auction-rate securities as the mortgage meltdown has investors skittish.

    Science.gov (United States)

    Evans, Melanie

    2008-02-25

    The crisis in auction-rate securities is coming down hard on tax-exempt providers. Buyers are disappearing, sending interest rates soaring. Some hospitals and other healthcare borrowers are being forced to pay maximum interest. "Basically, the investor pool has all but vanished," says Melissa Williams, left, of Christus Health.

  6. Auctions API

    Data.gov (United States)

    General Services Administration — GSA Auctions offers Federal personal property assets ranging from common place items (such as office equipment and furniture) to more select products like scientific...

  7. Modeling generation expansion in the context of a security of supply mechanism based on long-term auctions. Application to the Colombian case

    Energy Technology Data Exchange (ETDEWEB)

    Rodilla, P.; Batlle, C. [Institute for Research in Technology, University Pontificia Comillas, Sta. Cruz de Marcenado 26, 28015 Madrid (Spain); Salazar, J. [Empresas Publicas de Medellin, Carrera 58 No. 42-125 Edificio Inteligente, Medellin (Colombia); Sanchez, J.J. [Secretaria de Estado de Cambio Climatico, Ministerio de Medio Ambiente, Rural y Marino. Plaza San Juan de la Cruz, 28071 Madrid (Spain)

    2011-01-15

    In an attempt to provide electricity generation investors with appropriate economic incentives so as to maintain quality of supply at socially optimal levels, a growing number of electricity market regulators have opted for implementing a security of supply mechanism based on long-term auctions. In this context, the ability to analyze long-term investment dynamics is a key issue not only for market agents, but also for regulators. This paper describes a model developed to serve this purpose. A general system-dynamics-inspired methodology has been designed to be able to simulate these long-term auction mechanisms in the formats presently in place. A full-scale simulation based on the Colombian system was conducted to illustrate model capabilities. (author)

  8. Essays in auction theory

    NARCIS (Netherlands)

    Maasland, E.

    2012-01-01

    Auction theory is a branch of game theory that considers human behavior in auction markets and the ensuing market outcomes. It is also successfully used as a tool to design real-life auctions. This thesis contains five essays addressing a variety of topics within the realm of auction theory. The

  9. Virtual power plant auctions

    Energy Technology Data Exchange (ETDEWEB)

    Ausubel, Lawrence M.; Cramton, Peter [Department of Economics, University of Maryland, College Park, MD 20742 (United States)

    2010-12-15

    Since their advent in 2001, virtual power plant (VPP) auctions have been implemented widely. In this paper, we describe the simultaneous ascending-clock auction format that has been used for virtually all VPP auctions to date, elaborating on other design choices that most VPP auctions have had in common as well as discussing a few aspects that have varied significantly among VPP auctions. We then evaluate the various objectives of regulators in requiring VPP auctions, concluding that the auctions have been effective devices for facilitating new entry into electricity markets and for developing wholesale power markets. (author)

  10. Auction Sale Data

    Data.gov (United States)

    General Services Administration — This dataset contains sale data information for Agency reported items sold via GSA Auctions® Sales. The data is for closed sales during FY2009. GSA Auctions® offers...

  11. Web Auctions in Europe

    NARCIS (Netherlands)

    A. Pouloudi; J. Paarlberg; H.W.G.M. van Heck (Eric)

    2001-01-01

    textabstractThis paper argues that a better understanding of the business model of web auctions can be reached if we adopt a broader view and provide empirical research from different sites. In this paper the business model of web auctions is refined into four dimensions. These are auction model,

  12. Papers in auction theory

    NARCIS (Netherlands)

    Onderstal, A.M.

    2002-01-01

    This thesis is a collection of six papers in auction theory, with several economic applications, both to real life auctions and to other economic phenomena. In the introduction to the thesis, Onderstal argues why auction theory is an important branch of economic theory, and discusses several

  13. Auction Mechanism of Micro-Grid Project Transfer

    Directory of Open Access Journals (Sweden)

    Yong Long

    2017-10-01

    Full Text Available Micro-grid project transfer is the primary issue of micro-grid development. The efficiency and quality of the micro-grid project transfer directly affect the quality of micro-grid project construction and development, which is very important for the sustainable development of micro-grid. This paper constructs a multi-attribute auction model of micro-grid project transfer, which reflects the characteristics of micro-grid system and the interests of stakeholders, calculates the optimal bidding strategy and analyzes the influence of relevant factors on auction equilibrium by multi-stage dynamic game with complete information, and makes a numerical simulation analysis. Results indicate that the optimal strategy of auction mechanism is positively related to power quality, energy storage quality, and carbon emissions. Different from the previous lowest price winning mechanism, the auction mechanism formed in this paper emphasizes that the energy suppliers which provide the comprehensive optimization of power quality, energy storage quality, carbon emissions, and price will win the auction, when both the project owners and energy suppliers maximize their benefits under this auction mechanism. The auction mechanism is effective because it is in line with the principle of individual rationality and incentive compatibility. In addition, the number of energy suppliers participating in the auction and the cost of the previous auction are positively related to the auction equilibrium, both of which are adjusting the equilibrium results of the auction. At the same time, the utilization rate of renewable energy and the comprehensive utilization of energy also have a positive impact on the auction equilibrium. In the end, this paper puts forward a series of policy suggestions about micro-grid project auction. The research in this paper is of great significance to improve the auction quality of micro-grid projects and promote the sustainable development of micro-grid.

  14. Hybrid keyword search auctions

    KAUST Repository

    Goel, Ashish

    2009-01-01

    Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1. We show that risk-seeking advertisers will choose only a per-impression bid whereas risk-averse advertisers will choose only a per-click bid, and argue that both kind of advertisers arise naturally. Hence, the ability to bid in a hybrid fashion is important to account for the risk characteristics of the advertisers. 2. For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, we show that having the extra information from the advertisers in the form of a per-impression bid can result in significantly higher revenue. 3. An advertiser who believes that its click-probability is much higher than the auctioneer\\'s estimate can use per-impression bids to correct the auctioneer\\'s prior without incurring any extra cost. 4. The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies to deal with the uncertainty in the click-probability using the same basic auction. The per-click and per-impression bidding schemes can only be used to implement two extreme cases of these strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction. The

  15. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  16. An economic and feasible Quantum Sealed-bid Auction protocol

    Science.gov (United States)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  17. Equilibria of Chinese Auctions

    DEFF Research Database (Denmark)

    Branzei, Simina; Forero, Clara; Larson, Kate

    Chinese auctions are a combination between a raffle and an auction and are held in practice at charity events or festivals. In a Chinese auction, multiple players compete for several items by buying tickets, which can be used to win the items. In front of each item there is a basket...... are symmetric when both valuations and budgets are symmetric. We also study Chinese auctions with discrete budgets, for which we give both existence results and counterexamples. While the literature on rent-seeking contests traditionally focuses on continuous costly tickets, the discrete variant is very natural...

  18. The USSO2 Auction

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Christensen, J.L.

    1999-01-01

    An annual discriminative and revenue-neutral auction is linked to the new Acid Rain Program which allows electric utilities all over the US to trade SO2 emission permits. This innovative SO2 auction distributes 2% of the permits in circulation and takes place at the Chicago Board of Trade. Early...

  19. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    Science.gov (United States)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2017-11-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  20. Ascending auctions and Walrasian equilibrium

    OpenAIRE

    Ben-Zwi, Oren; Lavi, Ron; Newman, Ilan

    2013-01-01

    We present a family of submodular valuation classes that generalizes gross substitute. We show that Walrasian equilibrium always exist for one class in this family, and there is a natural ascending auction which finds it. We prove some new structural properties on gross-substitute auctions which, in turn, show that the known ascending auctions for this class (Gul-Stacchetti and Ausbel) are, in fact, identical. We generalize these two auctions, and provide a simple proof that they terminate in...

  1. Collusion through Communication in Auctions

    OpenAIRE

    Agranov, Marina; Yariv, Leeat

    2015-01-01

    We study the extent to which communication can serve as a collusion device in one-shot first- and second-price sealed-bid auctions. Theoretically, second-price auctions are more fragile to collusion through communication than first-price auctions. In an array of laboratory experiments we vary the amount of interactions (communication and/or transfers without commitment) available to bidders. We find that the auctioneer's revenues decrease significantly when bidders c...

  2. Anonymous, Yet Trustworthy Auctions

    Science.gov (United States)

    Chanda, Prasit Bikash; Naessens, Vincent; de Decker, Bart

    An auction is an inevitable market mechanism to setup prices of goods or services in a competitive and dynamic environment. Anonymity of bidders is required to conceal their business strategies from competitors. However, it is also essential to provide the seller guarantees that a bidder is trustworthy and competent enough to perform certain tasks (e.g transports). This paper proposes an auction protocol where bidders will participate anonymously, yet prove to be trustworthy and competent and can be held accountable towards auctioneers and sellers. Moreover, the protocol introduces promises, bonuses and compensations to ensure the best price for the sellers, extra profit for bidders and opportunities for newcomers in the business. It also handles ties, and copes with last minute bidding. Finally, the auction’s fair proceedings and outcome can be verified by everyone.

  3. Three essays on auction markets

    Science.gov (United States)

    Shunda, Nicholas James

    This dissertation contains a series of theoretical investigations of auction markets. The essays it contains cover wholesale electricity markets, a popular selling mechanism on eBay, and supplier entry into multi-unit procurement auctions. The study in Chapter 1 compares the procurement cost-minimizing and productive efficiency performance of the auction mechanism used by independent system operators in wholesale electricity auction markets in the U.S. with that of a proposed alternative. The current practice allocates energy contracts as if the auction featured a discriminatory final payment method when, in fact, the markets are uniform price auctions. The proposed alternative explicitly accounts for the market-clearing price during the allocation phase. We find that the proposed alternative largely outperforms the current practice on the basis of procurement costs in the context of simple auction markets featuring both day-ahead and real-time auctions and that the procurement cost advantage of the alternative is complete when we simulate the effects of increased competition. We also find that a tradeoff between the objectives of procurement cost minimization and productive efficiency emerges in our simple auction markets and persists in the face of increased competition. The study in Chapter 2 considers a possible rationale for an auction with a buy price. In an auction with a buy price, the seller provides bidders with an option to end the auction early by accepting a transaction at a posted price. The "Buy-It-Now" option on eBay is a leading example of an auction with a buy price. The study develops a model of an auction with a buy price in which bidders use the auction's reserve price and buy price to formulate a reference price. The model both explains why a revenue-maximizing seller would want to augment her auction with a buy price and demonstrates that the seller sets a higher reserve price when she can affect the bidders' reference price through the

  4. Combinatorial Auctions without Money

    Science.gov (United States)

    2014-05-01

    auctions. ICALP, pp. 90-101, 2010. [2] P. Briest, P. Krysta, and B. Vöcking. Approximation techniques for utilitarian mechanism design. STOC, pp. 39-48...Grandoni, P. Krysta, S. Leonardi, and C. Ventre. Utilitarian mechanism design for multi-objective optimization. SODA, pp. 573-584, 2010. [11] J. R

  5. BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Rohit Kumar Das

    2016-12-01

    Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.

  6. Auction design for gas pipeline transportation capacity-The case of Nabucco and its open season

    Energy Technology Data Exchange (ETDEWEB)

    Pickl, Matthias, E-mail: matthias.pickl@univie.ac.a [University of Vienna, Faculty of Business, Economics and Statistics (Austria); Wirl, Franz [University of Vienna, Faculty of Business, Economics and Statistics (Austria)

    2011-04-15

    As a response to the Russian dominance of the EU's natural gas supplies and the EU's increasing gas demands, major gas pipeline projects are currently under way to enhance the EU's energy supply security. Oftentimes to raise financing and to allocate gas transportation capacities, auctions are carried out to allow gas shippers to book transportation rights. In recent years, auctions have emerged as one of the most successful allocation mechanisms in the microeconomic theory. However, different auction designs can lead to different outcomes making the choice of auction design a decisive one, especially for divisible-good auctions. This paper seeks to give a formulation of an optimal auction design for gas pipeline transportation capacity. Specifically three different mechanisms are tested: (i) NPV allocation; (ii) pro rata allocation; and (iii) optimization. In addition, Nabucco is taken as a case study to empirically show results of such auction designs. Results show that a trade-off between revenue optimization and fair allocation can be observed: allocation per optimization is the favorable auction design when revenue maximization is more important than fair allocation. On the other hand, pro rata allocation is the auction design to be chosen when fairness of allocation is considered most central. - Research highlights: {yields} Auction design for gas pipeline transportation capacity. {yields} Empirical market-survey of Nabucco pipeline project auction as input data. {yields} Testing of three different allocation mechanisms: (i) NPV allocation; (ii) pro rata allocation; and (iii) optimization. {yields} Results show a trade-off between revenue optimization and fair allocation. {yields} Allocation per optimization is the favorable auction design when revenue maximization is more important than fair allocation. {yields} On the other hand, pro rata allocation is the auction design to be chosen when fairness of allocation is considered most central.

  7. The US SO2 Auction

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Christensen, Jan Lien

    1998-01-01

    An annual discriminative and revenue-neutral auction is linked to the new Acid Rain Program which allows electric utilities all over the US to trade SO2 emission permits. This innovative SO2 auction distributes 2% of the permits in circulation and takes place at the Chicago Board of Trade. Early...

  8. Combinatorial auctions for electronic business

    Indian Academy of Sciences (India)

    They are proving to be extremely useful in numerous e-business applications such as eselling, e-procurement, e-logistics, and B2B exchanges. In this article, we introduce combinatorial auctions and bring out important issues in the design of combinatorial auctions. We also highlight important contributions in current ...

  9. Secure computing, economy, and trust

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas

    In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an o...

  10. 76 FR 81932 - Auction of FM Broadcast Construction Permits; Revised Construction Permit Number in Auction 93

    Science.gov (United States)

    2011-12-29

    ... COMMISSION Auction of FM Broadcast Construction Permits; Revised Construction Permit Number in Auction 93... the construction permit number for one of the FM broadcast construction permits for Auction 93. FOR... of the FM broadcast construction permits being offered in Auction 93. The number assigned to the...

  11. Auction design for the wireless spectrum market

    CERN Document Server

    Lin, Peng; Zhang, Qian

    2014-01-01

    This Brief introduces the wireless spectrum market and discusses the current research for spectrum auctions. It covers the unique properties of spectrum auction, such as interference relationship, reusability, divisibility, composite effect and marginal effect, while also proposing how to build economic incentives into the network architecture and protocols in order to optimize the efficiency of wireless systems.Three scenarios for designing new auctions are demonstrated. First, a truthful double auction scheme for spectrum trading considering both the heterogeneous propagation properties of c

  12. Experiences with auctions for renewable energy support

    DEFF Research Database (Denmark)

    Mora Alvarez, David Fernando; Islam, Marco; Soysal, Emilie Rosenlund

    2017-01-01

    Auctions is an increasingly popular instrument for introducing competitiveness in the support schemes for renewable energy, however, designing successful auctions appears to be a challenge. Policy makers seeking to introduce auctions are faced with a range of design choices, which may affect...

  13. Exploring Online Auction Behaviors and Motivations

    Science.gov (United States)

    Jeon, Sua; Crutsinger, Christy; Kim, Haejung

    2008-01-01

    The availability and convenience of the Internet, combined with the variety of products available at any given time, have contributed to the success of online auctions.This exploratory study examined online auction behaviors among college students in an attempt to identify underlying dimensions of auction motivations. Questionnaires completed by…

  14. China's Land Market Auctions: Evidence of Corruption?

    Science.gov (United States)

    Cai, Hongbin; Henderson, J Vernon; Zhang, Qinghua

    2013-01-01

    This paper studies the urban land market in China in 2003-2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a "two stage auction". The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are "cold", which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities.

  15. Dynamic spectrum auction in wireless communication

    CERN Document Server

    Chen, Yanjiao

    2015-01-01

    This brief explores current research on dynamic spectrum auctions, focusing on fundamental auction theory, characteristics of the spectrum market, spectrum auction architecture and possible auction mechanisms. The brief explains how dynamic spectrum auctions, which enable new users to gain spectrum access and existing spectrum owners to obtain financial benefits, can greatly improve spectrum efficiency by resolving the artificial spectrum shortage. It examines why operators and users face significant challenges due to specialty of the spectrum market and the related requirements imposed on the auction mechanism design. Concise and up-to-date, Dynamic Spectrum Auction in Wireless Communication is designed for researchers and professionals in computer science or electrical engineering. Students studying networking will also find this brief a valuable resource.

  16. Spite and Reciprocity in Auctions

    Directory of Open Access Journals (Sweden)

    Yoshikazu Ikeda

    2011-09-01

    Full Text Available The paper presents a complete information model of bidding in second price sealed-bid and ascending-bid (English auctions, in which potential buyers know the unit valuation of other bidders and may spitefully prefer that their rivals earn a lower surplus. Bidders with spiteful preferences should overbid in equilibrium when they know their rival has a higher value than their own, and bidders with a higher value underbid to reciprocate the spiteful overbidding of the lower value bidders. The model also predicts different bidding behavior in second price as compared to ascending-bid auctions. The paper also presents experimental evidence broadly consistent with the model. In the complete information environment, lower value bidders overbid more than higher value bidders, and they overbid more frequently in the second price auction than in the ascending price auction. Overall, the lower value bidder submits bids that exceed value about half the time. These patterns are not found in the incomplete information environment, consistent with the model.

  17. Biological auctions with multiple rewards.

    Science.gov (United States)

    Reiter, Johannes G; Kanodia, Ayush; Gupta, Raghav; Nowak, Martin A; Chatterjee, Krishnendu

    2015-08-07

    The competition for resources among cells, individuals or species is a fundamental characteristic of evolution. Biological all-pay auctions have been used to model situations where multiple individuals compete for a single resource. However, in many situations multiple resources with various values exist and single reward auctions are not applicable. We generalize the model to multiple rewards and study the evolution of strategies. In biological all-pay auctions the bid of an individual corresponds to its strategy and is equivalent to its payment in the auction. The decreasingly ordered rewards are distributed according to the decreasingly ordered bids of the participating individuals. The reproductive success of an individual is proportional to its fitness given by the sum of the rewards won minus its payments. Hence, successful bidding strategies spread in the population. We find that the results for the multiple reward case are very different from the single reward case. While the mixed strategy equilibrium in the single reward case with more than two players consists of mostly low-bidding individuals, we show that the equilibrium can convert to many high-bidding individuals and a few low-bidding individuals in the multiple reward case. Some reward values lead to a specialization among the individuals where one subpopulation competes for the rewards and the other subpopulation largely avoids costly competitions. Whether the mixed strategy equilibrium is an evolutionarily stable strategy (ESS) depends on the specific values of the rewards. © 2015 The Author(s).

  18. Bidding behavior in a symmetric Chinese auction

    Directory of Open Access Journals (Sweden)

    Mauricio Benegas

    2015-01-01

    Full Text Available This paper purposes a symmetric all-pay auction where the bidders compete neither for an object nor the object itself but for a lottery on receive. That lottery is determined endogenously through the bids. This auction is known as chance auction or more popularly as Chinese auction. The model considers the possibility that for some bidders the optimal strategy is to bid zero and to rely on luck. It showed that bidders become less aggressive when the lottery satisfies a variational condition. It was also shown that luck factor is decisive to determine if the expected payoff in Chinese auction is bigger or smaller than expected payoff in standard all-pay auction.

  19. Pre-Auction Offers in Asymmetric First-Price and Second-Price Auctions

    DEFF Research Database (Denmark)

    Kirkegaard, René; Overgaard, Per Baltzer

    We consider “must-sell” auctions with asymmetric buyers. First, we study auctions with two asymmetric buyers, where the distribution of valuations of the strong buyer is “stretched” relative to that of the weak buyer. Then, it is known that ineffcient first-price auctions aremore profitable...

  20. Obesity and food security in Yazd primary school students

    Directory of Open Access Journals (Sweden)

    Karam soltani Z

    2007-09-01

    Full Text Available Background: Food security is defined as access, for all people at all times, to enough food for an active and healthy life. Food security includes: 1 the ready availability of nutritionally-adequate and safe food, and 2 an assured ability to acquire acceptable foods in socially acceptable ways. The increase in childhood as well as adulthood obesity and food insecurity has caused many recent investigations on obesity, food insecurity and some associated factors. However, there appears to be a lack of published information regarding some factors affecting obesity and food insecurity. This study aimed to determine the prevalence obesity and food insecurity and some associated factors among Yazd province primary school students in Iran.Methods: Using two-stage cluster sampling, a total of 3245 students (1587 boys and 1658 girls, aged 9-11 years, were randomly selected from primary school pupils in Yazd, Iran. From these, 187 students having BMIs ≥95th percentile, as defined by Hosseini et al. (1999, were identified as obese and 187 pupils of the same age and gender having BMIs between the 15th and 85th percentiles were selected as controls. Data were collected using 24-hour food-recall and USDA food insecurity questionnaires.Results: We found that the prevalence of obesity among students aged 9-11 years was 13.3%, and the prevalence of food insecurity was 30.5%. Daily energy intakes, compared to those recommended by the RDA, carbohydrate intake and energy percentages from proteins and carbohydrates were higher in obese children, and all macronutrient intakes per kilogram of body weight were significantly higher. An association between obesity and food insecurity was observed with adjusted fat intake.Conclusion: In conclusion, the prevalence of obesity and food insecurity is high among Yazd primary school students, and high-level intakes of energy, protein, carbohydrate are associated with obesity. Furthermore, variation in the rate of fat intake

  1. Post Auction Coverage Baseline 2.0

    Data.gov (United States)

    Federal Communications Commission — FINAL TELEVISION CHANNEL ASSIGNMENT INFORMATION RELATED TO INCENTIVE AUCTION REPACKING. NOTE: This file provides new baseline coverage and population data for all...

  2. Online Reverse Auctions for Procurement of Services

    NARCIS (Netherlands)

    U.L. Radkevitch (Uladzimir)

    2008-01-01

    textabstractOnline reverse auctions, in which a buyer seeks to select a supplier and suppliers compete for contracts by bidding online, revolutionized corporate procurement early this century. Shortly after they had been pioneered by General Electric, many companies rushed to adopt reverse auctions

  3. 7 CFR 29.36 - Auction market.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by the...

  4. The Extent of Internet Auction Markets

    NARCIS (Netherlands)

    L.F.M. de Haan (Laurens); C.G. de Vries (Casper); C. Zhou (Chen)

    2008-01-01

    textabstractInternet auctions attract numerous agents, but only a few become active bidders. A major difficulty in the structural analysis of internet auctions is that the number of potential bidders is unknown. Under the independent private value paradigm (IPVP)the valuations of the active bidders

  5. Revenue Prediction in Budget-constrained Sequential Auctions with Complementarities

    NARCIS (Netherlands)

    S. Verwer (Sicco); Y. Zhang (Yingqian)

    2011-01-01

    textabstractWhen multiple items are auctioned sequentially, the ordering of auctions plays an important role in the total revenue collected by the auctioneer. This is true especially with budget constrained bidders and the presence of complementarities among items. In such sequential auction

  6. Effects of Suboptimal Bidding in Combinatorial Auctions

    Science.gov (United States)

    Schneider, Stefan; Shabalin, Pasha; Bichler, Martin

    Though the VCG auction assumes a central place in the mechanism design literature, there are a number of reasons for favoring iterative combinatorial auction designs. Several promising ascending auction formats have been developed throughout the past few years based on primal-dual and subgradient algorithms and linear programming theory. Prices are interpreted as a feasible dual solution and the provisional allocation is interpreted as a feasible primal solution. iBundle( 3) (Parkes and Ungar 2000), dVSV (de Vries et al. 2007) and the Ascending Proxy auction (Ausubel and Milgrom 2002) result in VCG payoffs when the coalitional value function satisfies the buyer submodularity condition and bidders bid straightforward, which is an expost Nash equilibrium in that case. iBEA and CreditDebit auctions (Mishra and Parkes 2007) do not even require the buyer submodularity condition and achieve the same properties for general valuations. In many situations, however, one cannot assume bidders to bid straightforward and it is not clear from the theory how these non-linear personalized price auctions (NLPPAs) perform in this case. Robustness of auctions with respect to different bidding behavior is therefore a critical issue for any application. We have conducted a large number of computational experiments to analyze the performance of NLPPA designs with respect to different bidding strategies and different valuation models. We compare the results of NLPPAs to those of the VCG auction and those of iterative combinatorial auctions with approximate linear prices, such as ALPS (Bichler et al. 2009) and the Combinatorial Clock auction (Porter et al. 2003).

  7. Auction Markets for Specialty Food Products with Geographical Indications

    OpenAIRE

    Schamel, Guenter

    2006-01-01

    We present a first analysis of auction markets for specialty food products. We identify auction prices, trade volume and value for domestic and foreign origin specialty ham with geographical indications (GIs) which were actually sold in online auctions in Germany within a one-month period. Applying hedonic modeling, we examine potential factors that may influence online bidding behavior and final auction prices. We estimate positive auction price effects for weight, bidding activity, and auct...

  8. Reputation and Mechanism Choice in Procurement Auctions – An Experiment

    OpenAIRE

    Brosig, Jeannette; Heinrich, Timo

    2011-01-01

    We experimentally study the role of reputation in procurement using two common mechanisms: price-based and buyer-determined auctions. While buyers are bound to buy from the lowest bidder in price-based auctions, they can choose between bidders in buyer-determined auctions. Only in the latter buyers can consider the reputation of bidders. We find that bidders supply higher quality in buyer-determined auctions leading to higher market efficiencies in these auctions. Accordingly, buyers prefer t...

  9. An Exploratory Profiling Study of Online Auction Fraudsters

    OpenAIRE

    Chan, Vivien; Chow, Kam-Pui; Kwan, Michael; Fong, Guy; Hui, Michael; Tang, Jemy

    2014-01-01

    Part 1: Internet Crime Investigations; International audience; Online auctions are one of the most popular e-commerce applications. With the growth of online auctions, the amount of online auction fraud has increased significantly. Little work has focused on the criminal profiling of online auction fraudsters. This exploratory study uses multivariate behavioral analysis to profile 61 online auction fraud offenders based on their behavior. The relationships between offender behavior and person...

  10. The US SO{sub 2} AUCTION: A policy recommendation for future auctions

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, J.L.; Thinggaard Svendsen, G.

    1998-12-31

    An annual discriminative and revenue-neutral auction is linked to the new Acid Rain Program which allows electric utilities all over the US to trade SO2 emission permits. This innovative SO2 auction distributes 2% of the permits in circulation and takes place at the Chicago Board of Trade. Early results showed that the auction generated a clearing price signal lower than the market price. Now the auction price seems to be determined by the outside market price. Still, in the important starting phase, a non-discriminative auction design would probably have generated better price signals since potentially severe downward biases in both seller price offers and buyer bids are due to the discriminative feature of the EPA auction. (au) 30 refs.

  11. The US SO{sub 2} AUCTION: A policy recommendation for future auctions

    Energy Technology Data Exchange (ETDEWEB)

    Christensen, J.L.; Thinggaard Svendsen, G

    1998-07-01

    An annual discriminative and revenue-neutral auction is linked to the new Acid Rain Program which allows electric utilities all over the US to trade SO2 emission permits. This innovative SO2 auction distributes 2% of the permits in circulation and takes place at the Chicago Board of Trade. Early results showed that the auction generated a clearing price signal lower than the market price. Now the auction price seems to be determined by the outside market price. Still, in the important starting phase, a non-discriminative auction design would probably have generated better price signals since potentially severe downward biases in both seller price offers and buyer bids are due to the discriminative feature of the EPA auction. (au) 30 refs.

  12. Spiral of Hatred: Social Effects in Buyer-Seller Cross-Comments Left on Internet Auctions

    Science.gov (United States)

    Nielek, Radoslaw; Wawer, Aleksander; Wierzbicki, Adam

    An auction platform is a dynamic environment where a rich variety of social effects can be observed. Most of those effects remain unnoticed or even hidden to ordinary users. The in-depth studies of such effects should allow us to identify and understand the key factors influencing users’ behaviour. The material collected from the biggest Polish auction house has been analyzed. NLP algorithms were applied to extract sentiment-related content from collected comments. Emotional distance between negative, neutral and positive comments has been calculated. The obtained results confirm the existence of the spiral-of-hatred effect but also indicate that much more complex patterns of mutual relations between sellers and buyers exist. The last section contains a several suggestions which can prove useful to improve trustworthiness of users’ reports and security of an auction platform in general.

  13. Enabling Automatic Certification of Online Auctions

    Directory of Open Access Journals (Sweden)

    Wei Bai

    2014-04-01

    Full Text Available We consider the problem of building up trust in a network of online auctions by software agents. This requires agents to have a deeper understanding of auction mechanisms and be able to verify desirable properties of a given mechanism. We have shown how these mechanisms can be formalised as semantic web services in OWL-S, a good enough expressive machine-readable formalism enabling software agents, to discover, invoke, and execute a web service. We have also used abstract interpretation to translate the auction's specifications from OWL-S, based on description logic, to COQ, based on typed lambda calculus, in order to enable automatic verification of desirable properties of the auction by the software agents. For this language translation, we have discussed the syntactic transformation as well as the semantics connections between both concrete and abstract domains. This work contributes to the implementation of the vision of agent-mediated e-commerce systems.

  14. Commodity auctions in tropical Africa : a survey of the African tea, tobacco and coffee auctions

    NARCIS (Netherlands)

    Houtkamp, J.A.; Laan, van der H.L.

    1993-01-01

    It has proved possible and worthwhile to organize regular auctions for a few African export crops, namely tea, tobacco and coffee. Such auctions were first introduced in British East Africa in the 1930s and today, East Africa and the former British territories (Kenya, Tanzania, Zimbabwe and Malawi)

  15. 75 FR 8070 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Auction 88...

    Science.gov (United States)

    2010-02-23

    ... transaction data. A proposed minimum opening bid amount for each construction permit available in Auction 88... Applicants Must Provide Supplemental Information by March 12, 2010; Comment Sought on Competitive Bidding... commence on July 20, 2010 (Auction 88). This document also seeks comments on competitive bidding procedures...

  16. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    an auction process even if some bidding agents dynamically crash. In this paper, we propose an approach to specify fault tolerant auction protocols in open and dynamic environments by means of communication rules dealing with crash failures of agents. We illustrate these concepts considering a case study......Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource...... and shared allowing agents to dynamically engage well‐known and trusted negotiation protocols. To cope with real‐world applications, these rules should also specify fault tolerant patterns of interaction, enabling negotiating agents to interact with each other tolerating failures, for instance terminating...

  17. Experiments with the auction algorithm for the shortest path problem

    DEFF Research Database (Denmark)

    Larsen, Jesper; Pedersen, Ib

    1999-01-01

    The auction approach for the shortest path problem (SPP) as introduced by Bertsekas is tested experimentally. Parallel algorithms using the auction approach are developed and tested. Both the sequential and parallel auction algorithms perform significantly worse than a state-of-the-art Dijkstra-l......-like reference algorithm. Experiments are run on a distributed-memory MIMD class Meiko parallel computer....

  18. Towards Formal Analysis of Insider Threats for Auctions

    NARCIS (Netherlands)

    Kammüller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    This paper brings together the world of insider threats and auctions. For online-auction systems, like eBay, but also for high-value one-off auction algorithms as they are used for selling radio wave frequencies, the use of rigorous machine supported modelling and verification techniques is

  19. Keeping out Trojan horses: auctions and bankruptcy in the laboratory

    NARCIS (Netherlands)

    Onderstal, S.; van der Veen, A.

    2011-01-01

    If a government auctions the right to market a good, continuity is likely to be of significant importance. In a laboratory experiment, we compare the effects of bidders' limited liability in the first-price sealed-bid auction and the English auction in a common value setting. Our data strongly

  20. Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement

    Science.gov (United States)

    Sharma, Rishi Dutt; Thapliyal, Kishore; Pathak, Anirban

    2017-07-01

    A feasible, secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol, the set of all ( n) bidders is grouped into l subsets (sub-circles) in such a way that only the initiator (who prepares the quantum state to be distributed for a particular round of communication and acts as the receiver in that round) is a member of all the subsets (sub-circles) prepared for a particular round, while any other bidder is part of only a single subset. All n bidders and auctioneer initiate one round of communication, and each of them prepares l copies of a ( r-1) -partite entangled state (one for each sub-circle), where r=n/l+1. The efficiency and security of the proposed protocol are critically analyzed. It is shown that the proposed protocol is free from the collusion attacks that are possible on the existing schemes of quantum sealed-bid auction. Further, it is observed that the security against collusion attack increases with the increase in l, but that reduces the complexity (number of entangled qubits in each entangled state) of the entangled states to be used and that makes the scheme scalable and implementable with the available technologies. The additional security and scalability are shown to arise due to the use of a circular structure in place of a complete-graph or tree-type structure used earlier.

  1. Selling pictures: the illustrated auction catalogue

    Directory of Open Access Journals (Sweden)

    Elizabeth Pergam

    2014-12-01

    Full Text Available This essay is based upon a survey of reproductions in auction catalogues – from their first appearance in the early eighteenth century until their more consistent use in the second decade of the twentieth century. Examining the role of these illustrations sheds light on how auctions functioned; it was not just the works of art that were traded, but knowledge about those works of art became currency to be exchanged. In contrast to the high end engravings and photographs of luxury illustrated art books, reproductions in auction catalogues – publications produced as ephemeral marketing tools – were of noticeably lower quality. This study of the status of reproductions, therefore, investigates the evolving understanding of art knowledge, both aesthetic and economic, and the interdependence of the market and connoisseurship.

  2. China’s Land Market Auctions: Evidence of Corruption?

    Science.gov (United States)

    Cai, Hongbin; Henderson, J. Vernon; Zhang, Qinghua

    2013-01-01

    This paper studies the urban land market in China in 2003—2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a “two stage auction”. The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are “cold”, which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities. PMID:25506125

  3. Auction based spectrum management of cognitive radio networks

    DEFF Research Database (Denmark)

    Chang, H. B.; Chen, K.-C.; Prasad, Ramjee

    2009-01-01

    Cognitive radio (CR) technology is considered as an effective solution to enhance overall spectrum efficiency, especially primary radio network (PRN) typically having relatively low spectrum utilization. However, to realize CR concept, it is essential to provide enough incentives to PRN and extra...... profit to the service provider so that cognitive radio mobile stations (CR-MSs) may utilize PRN spectrum accordingly, which provides a new challenge for spectrum management. In this paper, we consider a PRN consisting of a primary system base station (PS-BS) and multiple primary system mobile stations...... (PS-MSs), and we therefore construct a cognitive radio network (CRN) consisting of a PRN with multiple CR-MSs. We propose a spectrum management policy framework such that CR-MSs can compete in utilization of the PRN spectrum bands available to opportunistic transmission of CR-MSs by Vickrey auction...

  4. Primary, secondary and tertiary frequency control in dynamic security analyses of electric power interconnections

    Directory of Open Access Journals (Sweden)

    Ivanović Milan

    2012-01-01

    Full Text Available This paper presents the incorporation of primary, secondary and tertiary frequency control in the dynamic security analyses of electric power interconnections. This was done in accordance with the wider environment of the existing state of the Serbian power system. The improved software for dynamic security analysis has been tested on the regional transmission network, which includes power systems of Serbia, Montenegro, Bosnia and Herzegovina, Croatia, Hungary, Macedonia, Romania, Bulgaria, Greece and Albania.

  5. 7 CFR 46.25 - Auction sales.

    Science.gov (United States)

    2010-01-01

    ... Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE MARKETING OF PERISHABLE AGRICULTURAL COMMODITIES REGULATIONS (OTHER... may show that he is acting in the capacity of agent. If a person instructs an auction company to...

  6. Privacy-Enhancing Auctions Using Rational Cryptography

    DEFF Research Database (Denmark)

    Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikolaos

    2009-01-01

    show how to use rational cryptography to approximately implement any given ex interim individually strictly rational equilibrium of such an auction without a trusted mediator through a cryptographic protocol that uses only point-to-point authenticated channels between the players. By “ex interim...

  7. Sequential auctions for full truckload allocation

    NARCIS (Netherlands)

    Mes, Martijn R.K.

    2008-01-01

    In this thesis we examine the use of sequential auctions for the dynamic allocation of transportation jobs. For all players, buyers and sellers, we develop strategies and examine their performance both in terms of individual benefits and with respect to the global logistical performance (resource

  8. Balloon popping with applications to ascending auctions

    NARCIS (Netherlands)

    N.S. Immorlica (Nicole Simone); A. Karlin; M. Mahdian (Mohammad); K. Talwar; A. Sinclair

    2007-01-01

    textabstractWe study the power of ascending auctions in a scenario in which a seller is selling a collection of identical items to anonymous unit-demand bidders. We show that even with full knowledge of the set of bidders' private valuations for the items, if the bidders are ex-ante identical, no

  9. An Auction Market for Journal Articles

    NARCIS (Netherlands)

    Prüfer, J.; Zetland, D.

    2007-01-01

    Economic articles are published very slowly. We believe this results from the poor incentives referees face. We recommend that an auction market replace the current, push system for submitting papers and demonstrate that our proposed market has a stable, Pareto-improving equilibrium. Besides the

  10. Experimental comparison of impact of auction format on carbon allowance market

    DEFF Research Database (Denmark)

    Cong, Ronggang; Wei, Yi-Ming

    2012-01-01

    Carbon allowances auctions are a good way to achieve the carbon allowance allocations under international agreements to address global climate change. Based on an economic experiment, this paper compares three possible carbon allowance auction formats (uniform price auction, discriminatory price...... auction and English clock auction) with heterogeneous bidders (coal power plants and gas power plants) from four perspectives (carbon price, auction efficiency, demand withholding and fluctuations in power supplies). Possibilities of collusion among bidders and impacts of allowance banking and penalty...

  11. Specification and Verification of an Agent-Based Auction Service

    Science.gov (United States)

    Badica, Amelia; Badica, Costin

    In this chapter we propose a rigorous modelling and analysis of complex interactions occurring between providers and users of an agent-based English auction service. In our model several auctions initiated by different seller agents are carried out in parallel. Buyer agents can dynamically decide to register for participation in auctions that match their goals. Our approach is based on conceptualising these interactions by formal specification using FSP process algebra and formal verification using FLTL temporal logic.

  12. e-Reverse Auction Guidelines for MDB Financed Procurement

    OpenAIRE

    Inter-American Development Bank; Asian Development Bank; World Bank

    2005-01-01

    Borrowing countries are increasingly inclined to use electronic procurement systems and means for processing and managing MDB funded activities. This guide is intended to be used for the application of e-reverse auctions during the procurement process. Not all procurement is suitable for e-reverse auction. Some governments consider e-reverse auction to be a special case of e-bidding while ...

  13. Auctioning off Prizes for Agricultural Product Flow under a Policy of Minimum Prices

    Directory of Open Access Journals (Sweden)

    Wilson da Cruz Vieira

    2015-12-01

    Full Text Available In this article, we analyze the use of descending clock auctions in the implementation of a minimum pricing policy. This type of auction has been used by the Brazilian government policy of support for agricultural prices. We propose a clock auction model along the lines used by the Brazilian government and derive its main implications. Based on data from auctions already held and implications of the theoretical model, we conclude that the following factors are crucial to minimize the costs of implementing a minimum price policy via auctions: the choice of product to be auctioned, amount auctioned, reserve price (maximum prize, and auction rules.

  14. Homomorphic encryption and secure comparison

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Geisler, Martin; Krøigaard, Mikkel

    2008-01-01

    Computation (MPC). We show how our comparison protocol can be used to improve security of online auctions, and demonstrate that it is efficient enough to be used in practice. For comparison of 16 bits numbers with security based on 1024 bits RSA (executed by two parties), our implementation takes 0.28 sec...

  15. The Role of Signals in Online Auction Purchase Decisions

    Directory of Open Access Journals (Sweden)

    Cypryjański Jacek

    2015-06-01

    Full Text Available There is a growing interest in behavioural economics contradicting the empirical prediction of rational choice theory once applied to online auctions. The issue is of particular relevance due to the large use of online auctions and the anticipated growth in the future. Online auctions combine the conventional auction model with information technology. However, information asymmetry within such auctions causes risks and uncertainties that influence consumer purchase intentions. The research investigates online consumers’ behaviour. The Authors suggest that due to the high perceived risk of the online buying process consumers are prompted to use cues of seller’ reputation. In a series of six experiments conducted via the auction site Allegro.pl in Poland a number of signals from auction web pages has been manipulated to influence purchase intention. The results suggest that several signals can be used to stimulate online customers’ behaviour. The results of these experiments indicate that buyers are more susceptible to the influence of “visual” signals than signals that require greater involvement of the buyer (to read information. The conducted experiments contribute to a more comprehensive understanding of online auction users’ behaviour. And finally it provides some managerial implications to increase online auction effectiveness from the seller’s perspective.

  16. Auction pricing of network access for North American railways

    DEFF Research Database (Denmark)

    Harrod, Steven

    2013-01-01

    The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate that the i......The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate...

  17. A/B Testing of Auctions

    OpenAIRE

    Chawla, Shuchi; Hartline, Jason D.; Nekipelov, Denis

    2016-01-01

    For many application areas A/B testing, which partitions users of a system into an A (control) and B (treatment) group to experiment between several application designs, enables Internet companies to optimize their services to the behavioral patterns of their users. Unfortunately, the A/B testing framework cannot be applied in a straightforward manner to applications like auctions where the users (a.k.a., bidders) submit bids before the partitioning into the A and B groups is made. This paper...

  18. Auction-theoretic analyses of the first offshore wind energy auction in Germany

    Science.gov (United States)

    Kreiss, J.; Ehrhart, K.-M.; Hanke, A.-K.

    2017-11-01

    The first offshore wind energy auction in Germany led to a striking result. The average award price was 0.44 ct/kWh and even more interesting, 3 out of 4 awarded projects had a strike price of 0.0 ct/kWh. That implies that those projects will only receive the actual wholesale market price for electricity as revenue. Although there has been a strong decline in costs of offshore wind projects, such a result is still surprising. We analyzed this result auction-theoretically and showed how the auction design and the market environment can explain part of the outcome. However, another aspect of the explanation is the high risk that the awarded bidders take regarding the future development of both the project costs and the wholesale market price.

  19. Primary care in an unstable security, humanitarian, economic and political context: the Kurdistan Region of Iraq.

    Science.gov (United States)

    Shukor, Ali R; Klazinga, Niek S; Kringos, Dionne S

    2017-08-23

    This study presents a descriptive synthesis of Kurdistan Region of Iraq's (KRI) primary care system, which is undergoing comprehensive primary care reforms within the context of a cross-cutting structural economic adjustment program and protracted security, humanitarian, economic and political crises. The descriptive analysis used a framework operationalizing Starfield's classic primary care model for health services research. A scoping review was performed using relevant sources, and expert consultations were conducted for completing and validating data. The descriptive analysis presents a complex narrative of a primary care system undergoing classical developmental processes of transitioning middle-income countries. The system is simultaneously under tremendous pressure to adapt to the continuously changing, complex and resource-intensive needs of sub-populations exhibiting varying morbidity patterns, within the context of protracted security, humanitarian, economic, and political crises. Despite exhibiting significant resilience in the face of the ongoing crises, the continued influx of IDPs and Syrian refugees, coupled with extremely limited resources and weak governance at policy, organizational and clinical levels threaten the sustainability of KRI's public primary care system. Diverse trajectories to the strengthening and development of primary care are underway by local and international actors, notably the World Bank, RAND Corporation, UN organizations and USAID, focusing on varying imperatives related to the protracted humanitarian and economic crises. The convergence, interaction and outcomes of the diverse initiatives and policy approaches in relation to the development of KRI's primary care system are complex and highly uncertain. A common vision of primary care is required to align resources, initiatives and policies, and to enable synergy between all local and international actors involved in the developmental and humanitarian response. Further

  20. A Combinatorial Auction among Versatile Experts and Amateurs

    Science.gov (United States)

    Ito, Takayuki; Yokoo, Makoto; Matsubara, Shigeo

    Auctions have become an integral part of electronic commerce and a promising field for applying multi-agent technologies. Correctly judging the quality of auctioned goods is often difficult for amateurs, in particular, in Internet auctions. However, experts can correctly judge the quality of goods. In this situation, it is difficult to make experts tell the truth and attain an efficient allocation, since experts have a clear advantage over amateurs and they would not reveal their valuable information without some reward. In our previous work, we have succeeded in developing such auction protocols under the following two cases: (1) the case of a single-unit auction among experts and amateurs, and (2) the case of a combinatorial auction among single-skilled experts and amateurs. In this paper, we focus on versatile experts. Versatile experts have an interest in, and expert knowledge on the qualities of several goods. In the case of versatile experts, there would be several problems, e.g., free riding problems, if we simply extended the previous VCG-style auction protocol. Thus, in this paper, we employ PORF (price-oriented, rationing-free) protocol for designing our new protocol to realize a strategy-proof auction protocol for experts. In the protocol, the dominant strategy for experts is truth-telling. Also, for amateurs, truth-telling is the best response when two or more experts select the dominant strategy. Furthermore, the protocol is false-name-proof.

  1. License auctions when winning bids are financed through debt

    NARCIS (Netherlands)

    Haan, M.A.; Toolsema-Veldman, Linda

    2006-01-01

    We study an auction where two licenses to operate on a new market are sold, and winning bidders finance their bids on the debt market. Higher bids imply higher debts, which affects product market competition. We compare our results to those of a beauty contest and a standard auction. For the case

  2. Solids: a combinatorial auction for a housing corporation

    NARCIS (Netherlands)

    Goossens, D.R.; Onderstal, S.; Spieksma, F.C.R.; Coles, P.; Das, S.; Lahaie, S.; Szymanski, B.

    2012-01-01

    On May 7, 2011, over one hundred bidders took part in a combinatorial auction for housing space in a newly erected building in Amsterdam (the Netherlands). This paper describes the development of this auction. We sketch our collaboration with the housing corporation that resulted in design choices

  3. The US SO2 Auction: Analysis and Generalization

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Christensen, J.L.

    1999-01-01

    An annual discriminative and revenue-neutral auction is linked to the new Acid Rain Program which allows electric utilities all over the US to trade SO2 emission permits. This innovative SO2 auction distributes 2% of the permits in circulation and takes place at the Chicago Board of Trade. Early...

  4. The US SO2 Auction and Environmental Regulation

    DEFF Research Database (Denmark)

    Svendsen, Gert Tinggaard; Christensen, J.L.

    1999-01-01

    The US Acid Rain Program (ARP) is now well-established. The ARP relies on tradable permits and includes an annual revenue-neutral SO2 auction. Has this auction been an important factor in establishing low transaction costs and a successful market? In answering this question, we first compare...

  5. Premium auctions and risk preferences: an experimental study

    NARCIS (Netherlands)

    Brunner, C.; Hu, A.; Oechssler, J.

    2014-01-01

    In premium auctions, the highest losing bidder receives a reward from the seller. This paper studies the private value English premium auction (EPA) for different risk attitudes of bidders. We explicitly derive the symmetric equilibrium for bidders with CARA utilities and conduct an experimental

  6. Multi-Attribute Vickrey Auctions when Utility Functions are Unknown

    NARCIS (Netherlands)

    Máhr, T.; De Weerdt, M.M.

    2006-01-01

    Multi-attribute auctions allow negotiations over multiple attributes besides price. For example in task allocation, service providers can define their service by means of multiple attributes, such as quality of service, deadlines, or delay penalties. Auction mechanisms assume that the players have

  7. Strategy-Proof Contract Auctions and the Role of Ties

    NARCIS (Netherlands)

    De Weerdt, M.M.; Harrenstein, P.; Conitzer, V.

    2011-01-01

    A contract auction establishes a contract between a center and one of the bidders. As contracts may describe many terms, preferences over contracts typically display indifferences. The Qualitative Vickrey Auction (QVA) selects the best contract for the winner that is at least as good for the center

  8. A Classroom Auction with Externalities: Applied to Mergers and Acquisitions

    Science.gov (United States)

    Meister, J. Patrick; Anderson, Kyle J.

    2007-01-01

    The authors describe an in-class exercise in which students participate in an auction to buy US Airways. The exercise is based on events of late 1995, in which neither United nor American Airlines decided to bid for US Airways. Two teams of students participate in an English auction. Students learn that the equilibrium of the sequential game is…

  9. 77 FR 38803 - Mobility Fund Phase I Auction Updated Data For Auction 901

    Science.gov (United States)

    2012-06-29

    ... subsequently released geographic information system (GIS) formats of the data shown in the interactive map. The interactive map and the related GIS data formats will be updated in the near future to match the corrections... with the release of Auction 901 Procedures Public Notice, the Bureaus released an interactive map of...

  10. Intelligent Personalized Trading Agents that facilitate Real-time Decisionmaking for Auctioneers and Buyers in the Dutch Flower Auctions

    NARCIS (Netherlands)

    W. Ketter (Wolfgang); H.W.G.M. van Heck (Eric); R.A. Zuidwijk (Rob)

    2010-01-01

    textabstractIn this case the Dutch Flower Auctions (DFA) are discussed. The DFA are part of the supply network in which flowers are produced, stocked, and then sold through either mediation or auctioning. This case focuses on the buyers’ and auctioneers’ positions when flowers are traded through

  11. Detecting Fraud in Internet Auction Systems

    Science.gov (United States)

    Peng, Yanlin; Zhang, Linfeng; Guan, Yong

    Fraud compromises the thriving Internet auction market. Studies have shown that fraudsters often manipulate their reputations through sophisticated collusions with accomplices, enabling them to defeat the reputation-based feedback systems that are used to combat fraud. This paper presents an algorithm that can identify colluding fraudsters in real time. Experiments with eBay transaction data show that the algorithm has low false negative and false positive rates. Furthermore, the algorithm can identify fraudsters who are innocent at the time of the data collection, but engage in fraudulent transactions soon after they accumulate good feedback ratings.

  12. Rationality, irrationality and escalating behavior in lowest unique bid auctions.

    Directory of Open Access Journals (Sweden)

    Filippo Radicchi

    Full Text Available Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions--lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Lévy flight search strategies in their exploration of "bid space". The Lévy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets.

  13. From Walras’ auctioneer to continuous time double auctions: a general dynamic theory of supply and demand

    Science.gov (United States)

    Donier, J.; Bouchaud, J.-P.

    2016-12-01

    In standard Walrasian auctions, the price of a good is defined as the point where the supply and demand curves intersect. Since both curves are generically regular, the response to small perturbations is linearly small. However, a crucial ingredient is absent of the theory, namely transactions themselves. What happens after they occur? To answer the question, we develop a dynamic theory for supply and demand based on agents with heterogeneous beliefs. When the inter-auction time is infinitely long, the Walrasian mechanism is recovered. When transactions are allowed to happen in continuous time, a peculiar property emerges: close to the price, supply and demand vanish quadratically, which we empirically confirm on the Bitcoin. This explains why price impact in financial markets is universally observed to behave as the square root of the excess volume. The consequences are important, as they imply that the very fact of clearing the market makes prices hypersensitive to small fluctuations.

  14. The impact of secure messaging on workflow in primary care: Results of a multiple-case, multiple-method study.

    Science.gov (United States)

    Hoonakker, Peter L T; Carayon, Pascale; Cartmill, Randi S

    2017-04-01

    Secure messaging is a relatively new addition to health information technology (IT). Several studies have examined the impact of secure messaging on (clinical) outcomes but very few studies have examined the impact on workflow in primary care clinics. In this study we examined the impact of secure messaging on workflow of clinicians, staff and patients. We used a multiple case study design with multiple data collections methods (observation, interviews and survey). Results show that secure messaging has the potential to improve communication and information flow and the organization of work in primary care clinics, partly due to the possibility of asynchronous communication. However, secure messaging can also have a negative effect on communication and increase workload, especially if patients send messages that are not appropriate for the secure messaging medium (for example, messages that are too long, complex, ambiguous, or inappropriate). Results show that clinicians are ambivalent about secure messaging. Secure messaging can add to their workload, especially if there is high message volume, and currently they are not compensated for these activities. Staff is -especially compared to clinicians- relatively positive about secure messaging and patients are overall very satisfied with secure messaging. Finally, clinicians, staff and patients think that secure messaging can have a positive effect on quality of care and patient safety. Secure messaging is a tool that has the potential to improve communication and information flow. However, the potential of secure messaging to improve workflow is dependent on the way it is implemented and used. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Team Organization Method Using Salary Auction Game for Sustainable Motivation

    Directory of Open Access Journals (Sweden)

    Sangkyun Kim

    2015-10-01

    Full Text Available In performing team-based projects in engineering class, students usually face many problems, such as free-riding, lack of responsibility, boredom, and insufficient initiative. This papers proposes a new method for performing team-based projects in engineering class—specifically, a gamified method for team organization using a salary auction game. On the description of the design and use of a salary auction game in engineering class, a case study conducted using a survey method is reported to validate the practical value of the proposed auction game. The salary auction game proposed in this paper demonstrates that a gamified team organization method in engineering class could be used as an effective tool to enhance motivation and to improve learning outcomes of engineering students.

  16. The Impact of Auctions on Residential Sale Prices : Australian Evidence

    Directory of Open Access Journals (Sweden)

    Alex Frino

    2010-09-01

    Full Text Available This study re-examines the variation in selling prices between the auction and private treaty method of sales.Using sales data from five major Australian capital cities over a four year period, we estimate a hedonic pricingmodel. Results indicate that for house sales, auctions lead to greater selling prices across all cities examined.However, results for unit sales reveal that this auction premium is only evident in two cities where auctionsare less prevalent. Further analysis reveals that self-selection (where a particular method of sale is selected tomaximise the selling price is evident across the sample. After controlling for this self-selection bias using atwo-stage model, houses sold via auction generally command a higher price. This suggests that the auctionmethod of selling provides a price premium over the private treaty method of sale.

  17. Auction fever: exploring informational social influences on bidder choices.

    Science.gov (United States)

    Chen, Yi-Fen

    2011-01-01

    Previous investigations of herd behavior have identified the importance of informational social influences in consumer decision making. This research presents three studies examining herd behavior in online auctions. The three studies addressed the influence on bidder online choices of herd cues frequently found in online auctions, including bid number, feedback ratings, and number of questions and answers. This research also investigated the effect of different levels of herd cues on bidder online choices under high and low brand awareness in online auctions. The experimental results demonstrated that bidders use online herd cues when making decisions in online auctions. Additionally, different levels of herd cues influence bidder online choices in both high and low brand awareness product situations.

  18. Access to primary energy sources - the basis of national energy security

    Science.gov (United States)

    Szlązak, Jan; Szlązak, Rafał A.

    2017-11-01

    National energy security is of fundamental importance for economic development of a country. To ensure such safety energy raw material, also called primary energy sources, are necessary. Currently in Poland primary energy sources include mainly fossil fuels, such as hard coal, brown coal, natural gas and crude oil. Other sources, e.g. renewable energy sources account for c. 15% in the energy mix. Primary energy sources are used to produce mainly electricity, which is considered as the cleanest form of energy. Poland does not have, unfortunately, sufficient energy sources and is forced to import some of them, mainly natural gas and crude oil. The article presents an insightful analysis of energy raw material reserves possessed by Poland and their structure taking account of the requirements applicable in the European Union, in particular, those related to environmental protection. The article also describes demand for electricity now and in the perspective of 2030. Primary energy sources necessary for its production have also been given. The article also includes the possibilities for the use of renewable energy sources in Poland, however, climatic conditions there are not are not particularly favourable to it. All the issues addressed in the article are summed up and ended with conclusions.

  19. Bidding Strategies in Agent-based Continuous Double Auctions

    OpenAIRE

    Ma, Huiye; Leung, H.-F.

    2008-01-01

    htmlabstractOnline auctions are a platform to trade goods on the Internet. In this context, negotiation capabilities for software agents in continuous double auctions (CDAs) are a central concern. Agents need to be able to prepare bids for and evaluate offers on behalf of the users they represent with the aim of obtaining the maximum benefit for their users. For the agents, their bids are decided according to some bidding strategy. However, in CDAs, it is a complex decision problem because of...

  20. Knowing me, imagining you: Projection and overbidding in auctions

    OpenAIRE

    Breitmoser, Yves

    2015-01-01

    People overestimate the probability that others share their values or preferences. I introduce type projection equilibrium (TPE) to capture such projection in Bayesian games. TPE allows each player to believe his opponents share his type with intermediate probability \\rho. After establishing existence, I address my main question: How does projection affect behavior in games? I analyze auctions and distribution games. In auctions, projection implies an increased sense of competition, which ind...

  1. An Auction Model of Intellectual Property Protection: Patent Versus Copyright

    OpenAIRE

    Michael WATERSON; Norman IRELAND

    1998-01-01

    In this paper several firms compete for the right to obtain intellectual property protection for a basic idea which has subsequent potential applications. The modelling employs an auction analogy, taking the context to be an n-player all-pay auction, with a reserve. We find that, even taking only firms' own utilities into account, welfare has no interior maximum, so that either maximal, or minimal, protection is optimal. Through examining a simple version of this game, we suggest that softwar...

  2. Auction dynamics: A volume constrained MBO scheme

    Science.gov (United States)

    Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim

    2018-02-01

    We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.

  3. Auctions for Renewable Support in Denmark:Instruments and lessons learnt

    DEFF Research Database (Denmark)

    Kitzing, Lena; Wendring, Paul; Wigan, Fabian

    This report deals with all past and ongoing auctions for renewable support in Denmark. Since 2004, five single-item, technology-specific offshore wind auctions were held, with one more currently ongoing. One multi-item, multi-site nearshore wind auction is currently ongoing.......This report deals with all past and ongoing auctions for renewable support in Denmark. Since 2004, five single-item, technology-specific offshore wind auctions were held, with one more currently ongoing. One multi-item, multi-site nearshore wind auction is currently ongoing....

  4. Auctions Versus Private Negotiations in Buyer-Seller Networks

    Directory of Open Access Journals (Sweden)

    Alison Watts

    2016-08-01

    Full Text Available Buyer-seller networks where price is determined by an ascending-bid auction are important in many economic examples such as certain real estate markets, radio spectrum sharing, and buyer-supplier networks. However, it may be that some sellers are better off not participating in the auction. We consider what happens if sellers can make a take it or leave it offer to one of their linked buyers before the auction takes place and thus such a seller can choose not to participate in the auction. We give conditions on the graph and buyers valuations under which the buyer and seller will both agree to such a take it or leave it offer. Specifically, the buyer-seller pair will choose private negotiation over the auction if the seller acts as a network bridge with power over the buyer and if there are enough buyers with low valuations so that the seller does not expect to receive a high price in the auction.

  5. Georeferenced and secure mobile health system for large scale data collection in primary care.

    Science.gov (United States)

    Sa, Joao H G; Rebelo, Marina S; Brentani, Alexandra; Grisi, Sandra J F E; Iwaya, Leonardo H; Simplicio, Marcos A; Carvalho, Tereza C M B; Gutierrez, Marco A

    2016-10-01

    Mobile health consists in applying mobile devices and communication capabilities for expanding the coverage and improving the effectiveness of health care programs. The technology is particularly promising for developing countries, in which health authorities can take advantage of the flourishing mobile market to provide adequate health care to underprivileged communities, especially primary care. In Brazil, the Primary Care Information System (SIAB) receives primary health care data from all regions of the country, creating a rich database for health-related action planning. Family Health Teams (FHTs) collect this data in periodic visits to families enrolled in governmental programs, following an acquisition procedure that involves filling in paper forms. This procedure compromises the quality of the data provided to health care authorities and slows down the decision-making process. To develop a mobile system (GeoHealth) that should address and overcome the aforementioned problems and deploy the proposed solution in a wide underprivileged metropolitan area of a major city in Brazil. The proposed solution comprises three main components: (a) an Application Server, with a database containing family health conditions; and two clients, (b) a Web Browser running visualization tools for management tasks, and (c) a data-gathering device (smartphone) to register and to georeference the family health data. A data security framework was designed to ensure the security of data, which was stored locally and transmitted over public networks. The system was successfully deployed at six primary care units in the city of Sao Paulo, where a total of 28,324 families/96,061 inhabitants are regularly followed up by government health policies. The health conditions observed from the population covered were: diabetes in 3.40%, hypertension (age >40) in 23.87% and tuberculosis in 0.06%. This estimated prevalence has enabled FHTs to set clinical appointments proactively, with the aim of

  6. Urban expansion brought stress to food security in China: Evidence from decreased cropland net primary productivity.

    Science.gov (United States)

    He, Chunyang; Liu, Zhifeng; Xu, Min; Ma, Qun; Dou, Yinyin

    2017-01-15

    Cropland net primary productivity (CNPP) is a crucial indicator of grain productivity and food security. However, assessments of the impact of urban expansion on the CNPP in China have been inadequate owing to data limitations. In this paper, our objective was to assess the impact of urban expansion on the CNPP in China from 1992 to 2015 in a spatially explicit manner. We first obtained the CNPP before urban expansion between 1992 and 2015 in China using the Carnegie-Ames-Stanford Approach (CASA) model. We then assessed the impact of urban expansion on the CNPP from 1992 to 2015 at multiple scales (the whole country, agricultural zones, and urban expansion hotspots) by combining the CNPP before urban expansion with the urban land coverage time series extracted from multi-source remotely sensed data. We found that the total loss of the CNPP due to urban expansion from 1992 to 2015 was 13.77TgC, which accounts for 1.88% of the CNPP before urban expansion in China. This CNPP loss resulted in a 12.45-million-ton decrease in grain production in China, corresponding to a reduction in the mean annual grain self-sufficiency rate of 2%. Therefore, we concluded that rapid urban expansion from 1992 to 2015 caused stress to China's food security. We suggest that it is still vital for China to effectively protect cropland to improve the urbanization level to 60% by 2020. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Auctionable fixed transmission rights for congestion management

    Science.gov (United States)

    Alomoush, Muwaffaq Irsheid

    the transaction by the ISO, take a decision to expand the existing system, or retain the original structure of the system. Also, the thesis investigates the impact of wheeling transactions on congestion management, where we present a generalized mathematical model for the Fixed Transmission Right (FTR) auction. The auction guarantees FTR availability to all participants on a non-discriminatory basis, in which system users are permitted to buy, sell and trade FTRs through an auction. When FTRs are utilized with LMPs, they increase the efficient use of the transmission system and let a transmission customer gain advantageous features such as acquiring a mechanism to offset the extra cost due to congestion charges, providing financial and operational certainty and making system users pay for the actual use of the congested paths. The thesis also highlighted FTR trading in secondary markets to self-arrange access across different paths, create long-term transmission rights and provide more commercial certainty.

  8. The Use of Contextual Information to Detection of Fraud on On - line Auctions

    OpenAIRE

    JIRI KNIZEK

    2013-01-01

    Currently, Internet auction portals are an integral part of business activities on the Internet. Anyone can easily participate in online auctions, either as a seller or a buyer (bidder), and the total turnover on Internet auction portals represents billions of dollars. However, the amount of fraud in these Internet auctions is related to their popularity. To prevent discovery,fraudsters exhibit normal trading behaviors and disguise themselves as honest members. It is therefore not easy to det...

  9. A novel income security intervention to address poverty in a primary care setting: a retrospective chart review.

    Science.gov (United States)

    Jones, Marcella K; Bloch, Gary; Pinto, Andrew D

    2017-08-17

    To examine the development and implementation of a novel income security intervention in primary care. A retrospective, descriptive chart review of all patients referred to the Income Security Heath Promotion service during the first year of the service (December 2013-December 2014). A multisite interdisciplinary primary care organisation in inner city Toronto, Canada, serving over 40 000 patients. The study population included 181 patients (53% female, mean age 48 years) who were referred to the Income Security Health Promotion service and engaged in care. The Income Security Health Promotion service consists of a trained health promoter who provides a mixture of expert advice and case management to patients to improve income security. An advisory group, made up of physicians, social workers, a community engagement specialist and a clinical manager, supports the service. Sociodemographic information, health status, referral information and encounter details were collected from patient charts. Encounters focused on helping patients with increasing their income (77.4%), reducing their expenses (58.6%) and improving their financial literacy (26.5%). The health promoter provided an array of services to patients, including assistance with taxes, connecting to community services, budgeting and accessing free services. The service could be improved with more specific goal setting, better links to other members of the healthcare team and implementing routine follow-up with each patient after discharge. Income Security Health Promotion is a novel service within primary care to assist vulnerable patients with a key social determinant of health. This study is a preliminary look at understanding the functioning of the service. Future research will examine the impact of the Income Security Health Promotion service on income security, financial literacy, engagement with health services and health outcomes. © Article author(s) (or their employer(s) unless otherwise stated in

  10. Auction design for the allocation of carbon emission allowances: uniform or discriminatory price?

    DEFF Research Database (Denmark)

    Cong, Ronggang; wei, yi-ming

    2010-01-01

    Only four states used auction in Phase Ⅰ (2005-2007) of the European Union Emission Trading System, of which four used a uniform-price sealed auction format. Here we discuss whether the auction should adopt a uniform-price or discriminatory-price format using an agent-based carbon allowances auct...

  11. How to Organize Sequential Auctions : Results of a Natural Experiment by Christie's

    NARCIS (Netherlands)

    Ginsburgh, V.; van Ours, J.C.

    2003-01-01

    In empirical studies of sequential auctions of identical objects prices have been found to decline.We study auctions of ancient Chinese porcelain recovered from shipwrecks.In these auctions there are very long sequences of lots of identical objects.We find that the average price decline is smaller

  12. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Science.gov (United States)

    2010-01-01

    ... and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE... brokers. (a) Every operator of an auction sale or broker shall make, keep, and maintain records or forms... be retained by the operator of such auction sale, or broker, for each animal sold by the auction sale...

  13. Effective Spend Management Through Electronic Reverse Auction Configurations

    Directory of Open Access Journals (Sweden)

    Mojmír Prídavok

    2013-07-01

    Full Text Available The purpose of the paper is to analyz wide range of possible auction strategies and configurations of eRA, with respect to the ever changing market conditions. Electronic reverse auction (eRA represents an electronic sourcing method of competitive bidding among a number of qualified suppliers. Theory assumes that eRA represents pure market environment with information perfectly distributed between both buyers and suppliers. Although initial eRA cost savings in B2B could be as high as 40%, without deeper knowledge of different auctions strategies and configurations, additional cost reductions are not possible. To identify crucial determinant, the statistical (correlation analysis on the data set of more than 18.000 auction items with different configuration parameters was conducted. Findings suggest that the more bidders are invited to the eRA, the better results could be expected. Additionally, the complexity of the eRA parameterization does not seem to influent the success of the eRA. These results can influence usage and SW development of eRA application in real environment. This research extends already realized studies in the field of electronic auctions for the B2B processes

  14. A Pareto Optimal Auction Mechanism for Carbon Emission Rights

    Directory of Open Access Journals (Sweden)

    Mingxi Wang

    2014-01-01

    Full Text Available The carbon emission rights do not fit well into the framework of existing multi-item auction mechanisms because of their own unique features. This paper proposes a new auction mechanism which converges to a unique Pareto optimal equilibrium in a finite number of periods. In the proposed auction mechanism, the assignment outcome is Pareto efficient and the carbon emission rights’ resources are efficiently used. For commercial application and theoretical completeness, both discrete and continuous markets—represented by discrete and continuous bid prices, respectively—are examined, and the results show the existence of a Pareto optimal equilibrium under the constraint of individual rationality. With no ties, the Pareto optimal equilibrium can be further proven to be unique.

  15. Multi-unit auctions with budget-constrained bidders

    Science.gov (United States)

    Ghosh, Gagan Pratap

    In my dissertation, I investigate the effects of budget-constraints in multi-unit auctions. This is done in three parts. First, I analyze a case where all bidders have a common budget constraint. Precisely, I analyze an auction where two units of an object are sold at two simultaneous, sealed bid, first-price auctions, to bidders who have demand for both units. Bidders differ with respect to their valuations for the units. All bidders have an identical budget constraint which binds their ability to spend in the auction. I show that if valuation distribution is atom-less, then their does not exist any symmetric equilibrium in this auction game. In the second and third parts of my thesis, I analyze the sale of licenses for the right to drill for oil and natural gas in the Outer Continental Shelf (OCS) of the United States. These sales are conducted using simultaneous sealed-bid first-price auctions for multiple licenses, each representing a specific area (called a tract). Using aspects of observed bidding-behavior, I first make a prima facie case that bidders are budget-constrained in these auctions. In order to formalize this argument, I develop a simple extension of the standard model (where bidders differ in their valuations for the objects) by incorporating (random) budgets for the bidders. The auction-game then has a two-dimensional set of types for each player. I study the theoretical properties of this auction, assuming for simplicity that two units are being sold. I show that this game has an equilibrium in pure strategies that is symmetric with respect to the players and with respect to the units. The strategies are essentially pure in the sense that each bidder-type has a unique split (up to a permutation) of his budget between the two auctions. I then characterize the equilibrium in terms of the bid-distribution and iso-bid curves in the value-budget space. I derive various qualitative features of this equilibrium, among which are: (1) under mild

  16. The family of c-bisection auctions: efficiency and running time

    OpenAIRE

    Grigorieva Elena; Herings P. Jean-Jacques; Müller Rudolf; Vermeulen Dries

    2006-01-01

    In this paper we analyze the performance of a recently proposed sequential auction, called the c-bisection auction, that can be used for a sale of a single indivisible object. We discuss the running time and the e±ciency in the ex-post equilibrium of the auction. We show that by changing the parameter c of the auction we can trade o® e±ciency against running time. Moreover, we show that the auction that gives the desired level of e±ciency in expectation takes the same number of rounds for any...

  17. Essays on empirical analysis of multi-unit auctions: Impacts of financial transmission rights on the restructured electricity industry

    Science.gov (United States)

    Zang, Hailing

    This dissertation uses recently developed empirical methodologies for the study of multi-unit auctions to test the impacts of Financial Transmission Rights (FTRs) on the competitiveness of restructured electricity markets. FTRs are a special type of financial option that hedge against volatility in the cost of transporting electricity over the grid. Policy makers seek to use the prices of FTRs as market signals to incentivize efficient investment and utilization of transmission capacity. However, prices will not send the correct signals if market participants strategically use FTRs. This dissertation uses data from the Texas electricity market to test whether the prices of FTRs are efficient to achieve such goals. The auctions studied are multi-unit, uniform-price, sealed-bid auctions. The first part of the dissertation studies the auctions on the spot market of the wholesale electricity industry. I derive structural empirical models to test theoretical predictions as to whether bidders fully internalize the effect of FTRs on profits into their bidding decisions. I find that bidders are learning as to how to optimally bid above marginal cost for their inframarginal capacities. The bidders also learn to bid to include FTRs into their profit maximization problem during the course of the first year. But starting from the second year, they deviated from optimal bidding that includes FTRs in the profit maximization problems. Counterfactual analysis show that the primary effect of FTRs on market outcomes is changing the level of prices rather than production efficiency. Finally, I find that in most months, the current allocations of FTRs are statistically equivalent to the optimal allocations. The second part of the dissertation studies the bidding behavior in the FTR auctions. I find that FTRs' strategic impact on the FTR purchasing behavior is significant for large bidders---firms exercising market power in the FTR auctions. Second, trader forecasts future FTR credit

  18. Are Speculators Unwelcome in Multi-object Auctions?

    OpenAIRE

    Marco Pagnozzi

    2010-01-01

    I consider a uniform-price auction under complete information. The possibility of resale attracts speculators who have no use value for the objects on sale. A high-value bidder may strictly prefer to let a speculator win some of the objects and then buy in the resale market, in order to keep the auction price low. Although resale induces entry by speculators and therefore increases the number of competitors, high-value bidders' incentives to "reduce demand" are also affected. Allowing resale ...

  19. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

    Directory of Open Access Journals (Sweden)

    Zhen Li

    2016-03-01

    Full Text Available The Internet of Things (IoT is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones. Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR at the eavesdropper subject to the Quality of Service (QoS constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI. By using Semi-Definite Programming (SDP, the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the

  20. Using Neighbor Diversity to Detect Fraudsters in Online Auctions

    Directory of Open Access Journals (Sweden)

    Jun-Lin Lin

    2014-05-01

    Full Text Available Online auctions attract not only legitimate businesses trying to sell their products but also fraudsters wishing to commit fraudulent transactions. Consequently, fraudster detection is crucial to ensure the continued success of online auctions. This paper proposes an approach to detect fraudsters based on the concept of neighbor diversity. The neighbor diversity of an auction account quantifies the diversity of all traders that have transactions with this account. Based on four different features of each trader (i.e., the number of received ratings, the number of cancelled transactions, k-core, and the joined date, four measurements of neighbor diversity are proposed to discern fraudsters from legitimate traders. An experiment is conducted using data gathered from a real world auction website. The results show that, although the use of neighbor diversity on k-core or on the joined date shows little or no improvement in detecting fraudsters, both the neighbor diversity on the number of received ratings and the neighbor diversity on the number of cancelled transactions improve classification accuracy, compared to the state-of-the-art methods that use k-core and center weight.

  1. Sellers' hedging incentives at EPA's emission trading auction

    NARCIS (Netherlands)

    Dijkstra, BR; Haan, M

    Cason (1993, J. Environ. Econom, Management 25, 177-195, doi:10.1006/jeem 1993.1041) argued that the auction which the EPA used in order to start the market for sulfur allowances may reduce the efficiency of the market since it gives sellers an incentive to understate their valuation. In this paper

  2. Sellers' hedging incentives at EPA's emission trading auction

    NARCIS (Netherlands)

    Dijkstra, B.R.; Haan, M.

    1999-01-01

    Cason (1993)argued thattheauction theEPAused in order to start the market for sulfur allowances, is not efficient. The set-up of the auction gives both buyers and sellers an incentive to understate their valuation of an allowance. In this paper, we show that the sellers’ incentives are even more

  3. Designing bidding strategies in sequential auctions for risk averse agents

    NARCIS (Netherlands)

    V. Robu (Valentin); J.A. La Poutré (Han)

    2010-01-01

    textabstractDesigning efficient bidding strategies for sequential auctions represents an important, open problem area in agent-mediated electronic markets. In existing literature, a variety of bidding strategies have been proposed and have been shown to perform with varying degrees of efficiency.

  4. Teaching Auction Strategy Using Experiments Administered Via the Internet

    Science.gov (United States)

    Asker, John; Grosskopf, Brit; McKinney, C. Nicholas; Niederle, Muriel; Roth, Alvin E.; Weizsacker, Georg

    2004-01-01

    The authors present an experimental design used to teach concepts in the economics of auctions and implications for e-Business procurement. The experiment is easily administered and can be adapted to many different treatments. The chief innovation is that it does not require the use of a lab or class time. Instead, the design can be implemented on…

  5. Multi-dimensional procurement auction under uncertain and asymmetric information

    DEFF Research Database (Denmark)

    Papakonstantinou, Athanasios; Bogetoft, Peter

    2017-01-01

    and to honestly report quality-cost probabilistic estimates based on which the principal can choose the agent that offers the best value for money. The mechanism extends second score auction design to settings where the quality is uncertain and it provides incentives to both collect information and deliver...

  6. Convergent Double Auction Mechanism for a Prosumers’ Decentralized Smart Grid

    Directory of Open Access Journals (Sweden)

    Tadahiro Taniguchi

    2015-10-01

    Full Text Available In this paper, we propose a novel automated double auction mechanism called convergent linear function submission-based double-auction (CLFS-DA for a prosumers’ decentralized smart grid. The target decentralized smart grid is a regional electricity network that consists of many prosumers that have a battery and a renewable energy-based generator, such as photovoltaic cells. In the proposed double-auction mechanism, each intelligent software agent representing each prosumer submits linear demand and supply functions to an automated regional electricity market where they are registered. It is proven that the CLFS-DA mechanism is guaranteed to obtain one of the global optimal price profiles in addition to it achieving an exact balance between demand and supply, even through the learning period. The proof of convergence is provided on the basis of the theory of LFS-DA, which gives a clear bridge between a function submission-based double auction and a dual decomposition (DD-based real-time pricing procedure. The performance of the proposed mechanism is demonstrated numerically through a simulation experiment.

  7. 41 CFR 102-38.95 - What is an auction?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  8. Price Regulations in a Multi-unit Uniform Price Auction

    DEFF Research Database (Denmark)

    Boom, Anette

    Inspired by recent regulations in the New York ICAP market we examine the effect of different price regulations on a multi-unit uniform price auction. We investigate a bid cap and a bid foor. Given suffciently high total capacities general bid caps always ensure that the market price does...

  9. Bid Regulations in a Multi-unit Uniform Price Auction

    DEFF Research Database (Denmark)

    Boom, Anette

    This paper examines the effect of bid regulations on the range of potential equilibrium prices in a multi-unit uniform price auction with heterogenous bidders. General bid caps destroy equilibria with prices above the bid cap and create new equilibria with prices way below the cap. A cap only...

  10. Sealed-bid auction of Netherlands mussels: statistical analysis

    NARCIS (Netherlands)

    Kleijnen, J.P.C.; van Schaik, F.D.J.

    2011-01-01

    This article presents an econometric analysis of the many data on the sealed-bid auction that sells mussels in Yerseke town, the Netherlands. The goals of this analysis are obtaining insight into the important factors that determine the price of these mussels, and quantifying the performance of an

  11. Sealed-Bid Auction of Dutch Mussels : Statistical Analysis

    NARCIS (Netherlands)

    Kleijnen, J.P.C.; van Schaik, F.D.J.

    2007-01-01

    This article presents an econometric analysis of the many data on the sealed-bid auction that sells mussels in Yerseke town, the Netherlands. The goals of this analy- sis are obtaining insight into the important factors that determine the price of these mussels, and quantifying the performance of an

  12. Making Marketing Principles Tangible: Online Auctions as Living Case Studies

    Science.gov (United States)

    Wood, Charles M.; Suter, Tracy A.

    2004-01-01

    This article presents an effective course supplement for Principles of Marketing classes. An experiential project involving online auctions is offered to instructors seeking to create a more participatory student environment and an interactive teaching style. A number of learning points are illustrated that allow instructors to use an auction…

  13. A Research Study on Secure Attachment Using the Primary Caregiving Approach

    Science.gov (United States)

    Ebbeck, Marjory; Phoon, Dora Mei Yong; Tan-Chong, Elizabeth Chai Kim; Tan, Marilyn Ai Bee; Goh, Mandy Lian Mui

    2015-01-01

    A child's positive sense of well-being is central to their overall growth and development. With an increasing number of mothers in the workforce, many infants and toddlers spend much time in child care services. Hence it is crucial that caregivers provide a secure base for the child to develop secure attachment with educarers. Given multiple…

  14. Spectrum sharing in cognitive radio networks--an auction-based approach.

    Science.gov (United States)

    Wang, Xinbing; Li, Zheng; Xu, Pengchao; Xu, Youyun; Gao, Xinbo; Chen, Hsiao-Hwa

    2010-06-01

    Cognitive radio is emerging as a promising technique to improve the utilization of the radio frequency spectrum. In this paper, we consider the problem of spectrum sharing among primary (or "licensed") users (PUs) and secondary (or "unlicensed") users (SUs). We formulate the problem based on bandwidth auction, in which each SU makes a bid for the amount of spectrum and each PU may assign the spectrum among the SUs by itself according to the information from the SUs without degrading its own performance. We show that the auction is a noncooperative game and that Nash equilibrium (NE) can be its solution. We first consider a single-PU network to investigate the existence and uniqueness of the NE and further discuss the fairness among the SUs under given conditions. Then, we present a dynamic updating algorithm in which each SU achieves NE in a distributed manner. The stability condition of the dynamic behavior for this spectrum-sharing scheme is studied. The discussion is generalized to the case in which there are multiple PUs in the network, where the properties of the NE are shown under appropriate conditions. Simulations were used to evaluate the system performance and verify the effectiveness of the proposed algorithm.

  15. 78 FR 61350 - Tribal Mobility Fund Phase I Auction (Auction 902); Short-Form Application Filing Window...

    Science.gov (United States)

    2013-10-03

    ... 902 Public Notice released on September 27, 2013. Eligible Areas Map and GIS Data 11. The interactive.... The link to the interactive map is available on the Auction 902 Web site at http://wireless.fcc.gov... thus it fails to rebut that carrier's showing regarding its service coverage, which includes maps, an...

  16. Human resources requirements for diabetic patients healthcare in primary care clinics of the Mexican Institute of Social Security

    OpenAIRE

    Doubova, Svetlana V; Claudine Ramírez-Sánchez; Alejandro Figueroa-Lara; Ricardo Pérez-Cuevas

    2013-01-01

    Objective. To estimate the requirements of human resources (HR) of two models of care for diabetes patients: conventional and specific, also called DiabetIMSS, which are provided in primary care clinics of the Mexican Institute of Social Security (IMSS). Materials and methods. An evaluative research was conducted. An expert group identified the HR activities and time required to provide healthcare consistent with the best clinical practices for diabetic patients. HR were estimated by using th...

  17. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  18. From English to First-Price Sealed Bid: An Empirical Assessment of the Change in Auction Type on Experienced Bidders

    Directory of Open Access Journals (Sweden)

    Miller Joshua J.

    2014-06-01

    Full Text Available This paper estimate the differential impact of first-price sealed-bid (first-price auctions relative to English auctions on auction revenue. While there is a theoretical literature on the potential outcomes of first-price relative to English auction, there is a paucity of articles that empirically estimate this relationship. The answer to this question is important not only to economists but also those designing auction for practical application. Using a unique dataset from tax lien auctions in Illinois, I empirically test the effect of a switch in auction type from English to first-price. I find auction revenue is greatly increased, by as much as 22 percent, under the first-price auction. The results are supported by a within county difference-in-difference model specification and are robust when restricting the sample across various specifications

  19. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    Science.gov (United States)

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  20. The association of family food security and depression in mothers having primary school children in Ray-Iran.

    Science.gov (United States)

    Payab, Moloud; Motlagh, Ahmad-Reza Dorosty; Eshraghian, Mohammadreza; Rostami, Reza; Siassi, Fereydoun

    2014-01-01

    As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group.

  1. Electronic Reverse Auctions in the Federal Government

    Science.gov (United States)

    2007-12-01

    Millwork, Plywood, and Veneer $426,995 8 56—Construction and Building Materials $724,450 30 58—Communication, Detection, and Coherent Radiation Equipment...Security Detection Systems $11,826,216 296 65—Medical, Dental , and Veterinary Equipment and Supplies $7,277,606 374 66—Instruments and Laboratory

  2. An Investigation of Value Updating Bidders in Simultaneous Online Art Auctions

    Directory of Open Access Journals (Sweden)

    Mayukh Dass

    2010-01-01

    Full Text Available Simultaneous online auctions, in which the auction of all items being sold starts at the same time and ends at the same time, are becoming popular especially in selling items such as collectables and art pieces. In this paper, we analyze the characteristics of bidders (Reactors in simultaneous auctions who update their preauction value of an item in the presence of influencing bidders (Influencers. We represent an auction as a network of bidders where the nodes represent the bidders participating in the auction and the ties between them represent an Influencer-Reactor relationship. We further develop a random effects bilinear model that is capable of handling covariates of both bidder types at the same time and account for higher-order dependence among the bidders during the auction. Using the model and data from a Modern Indian Art auction, we find that Reactors tend to update their values on items that have high preauction estimates, bid on items created by high investment risk artists, bid selectively only on certain items, and are more active in the second half of the auction. Implications for the auction house managers are discussed.

  3. Design and Promotion Strategy of Marketing Platform of Aquatic Auction based on Internet

    Science.gov (United States)

    Peng, Jianliang

    For the online trade and promotion of aquatic products and related materials through the network between supply and demand, the design content and effective promotional strategies of aquatic auctions online marketing platform is proposed in this paper. Design elements involve the location of customer service, the basic function of the platform including the purchase of general orders, online auctions, information dissemination, and recommendation of fine products, human services, and payment preferences. Based on network and mobile e-commerce transaction support, the auction platform makes the transaction of aquatic products well in advance. The results are important practical value for the design and application of online marketing platform of aquatic auction.

  4. Why do bidders drop out from a sequential auction

    Directory of Open Access Journals (Sweden)

    Richard Engelbrecht-Wiggans

    2001-03-01

    Full Text Available In actual sequential auctions, bidders typically incur a cost in continuing from one sale to the next, and they decide whether or not to continue. To investigate the question "why do bidders drop out'', this paper defines a sequential auction model with continuation costs and an endogenously determined number of bidders at each sale, and characterizes the equilibria in this model. Simple examples illustrate the effect of several possible changes to this model.Este artigo examina um modelo de leilões seqüenciais com custos de participação onde o número de participantes é determinado endogenamente em cada rodada. O artigo caracteriza os lances em eqüilíbrio em cada rodada do leilão seqüencial e ilustra, através de exemplos, os efeitos de diversas mudanças possíveis no modelo.

  5. Estimating consumer surplus in ebay computer monitor auctions

    OpenAIRE

    Giray, Tuğba

    2006-01-01

    Cataloged from PDF version of article. In this study, using data from computer monitor auctions on eBay collected in 2000, bidding functions are estimated by maximum likelihood using five different assumptions about the underlying distribution of independent private values. It is assumed that these values come from the logistic, gamma, weibull, pareto and lognormal distributions. Next, consumer surplus in the market for computer monitors is estimated and its sensitivity to d...

  6. Empirical Analysis of Rosca Auctions in a South Indian Village

    OpenAIRE

    Stefan Klonner

    2003-01-01

    A bidding rotating savings and credit association (Rosca) is modeled as a sequence of symmetricindependent-private-value auctions with price-proportional benefits to bidders. We estimate a structural econometric model which, by introducing an altruistic component into each bidder's utility function, allows for socially favorable deviations from the private information, nonaltruistic bidding equilibrium. We find that bidding is more altruistic in groups managed by experienced organizers and in...

  7. Auction-based distributed efficient economic operations of microgrid systems

    Science.gov (United States)

    Zou, Suli; Ma, Zhongjing; Liu, Xiangdong

    2014-12-01

    This paper studies the economic operations of the microgrid in a distributed way such that the operational schedule of each of the units, like generators, load units, storage units, etc., in a microgrid system, is implemented by autonomous agents. We apply and generalise the progressive second price (PSP) auction mechanism which was proposed by Lazar and Semret to efficiently allocate the divisible network resources. Considering the economic operation for the microgrid systems, the generators play as sellers to supply energy and the load units play as the buyers to consume energy, while a storage unit, like battery, super capacitor, etc., may transit between buyer and seller, such that it is a buyer when it charges and becomes a seller when it discharges. Furthermore in a connected mode, each individual unit competes against not only the other individual units in the microgrid but also the exogenous main grid possessing fixed electricity price and infinite trade capacity; that is to say, the auctioneer assigns the electricity among all individual units and the main grid with respect to the submitted bid strategies of all individual units in the microgrid in an economic way. Due to these distinct characteristics, the underlying auction games are distinct from those studied in the literature. We show that under mild conditions, the efficient economic operation strategy is a Nash equilibrium (NE) for the PSP auction games, and propose a distributed algorithm under which the system can converge to an NE. We also show that the performance of worst NE can be bounded with respect to the system parameters, say the energy trading price with the main grid, and based upon that, the implemented NE is unique and efficient under some conditions.

  8. Budget constraints and optimization in sponsored search auctions

    CERN Document Server

    Yang, Yanwu

    2013-01-01

    The Intelligent Systems Series publishes reference works and handbooks in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. They include theoretical studies, design methods, and real-world implementations and applications. The series' readership is broad, but focuses on engineering, electronics, and computer science. Budget constraints and optimization in sponsored search auctions takes into account consideration of the entire life cycle of campaigns for researchers and developers working on search systems and ROI maximization

  9. Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks

    CERN Document Server

    Han, Zhu; Poor, Vincent H

    2009-01-01

    In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness.

  10. 76 FR 60830 - Auction of FM Broadcast Construction Permits Scheduled for March 27, 2012; Comment Sought on...

    Science.gov (United States)

    2011-09-30

    ... COMMISSION Auction of FM Broadcast Construction Permits Scheduled for March 27, 2012; Comment Sought on.... SUMMARY: This document announces the auction of certain FM broadcast construction permits scheduled to...) announce an auction of certain FM broadcast construction permits and seek comment on the procedures to be...

  11. 77 FR 60690 - Auction of FM Broadcast Construction Permits Scheduled for March 26, 2013; Comment Sought on...

    Science.gov (United States)

    2012-10-04

    ... COMMISSION Auction of FM Broadcast Construction Permits Scheduled for March 26, 2013; Comment Sought on.... SUMMARY: This document announces the auction of certain FM broadcast construction permits scheduled to... auction of certain FM broadcast construction permits and seek comment on the procedures to be used for...

  12. 78 FR 72081 - Closed Auction of AM Broadcast Construction Permits Scheduled for May 6, 2014; Comment Sought on...

    Science.gov (United States)

    2013-12-02

    ... COMMISSION Closed Auction of AM Broadcast Construction Permits Scheduled for May 6, 2014; Comment Sought on.... SUMMARY: This document announces the auction of certain AM broadcast construction permits. Auction 84 will... may have a bearing on the value of the construction permits for AM broadcast facilities that it is...

  13. Information Transparency in B2B Auction Markets: The Role of Winner Identity Disclosure

    NARCIS (Netherlands)

    Y. Lu (Yixin); A. Gupta (Alok); W. Ketter (Wolfgang); H.W.G.M. van Heck (Eric)

    2017-01-01

    textabstractWe study the impact of information transparency in B2B auctions. Specifically, we measure the effect of concealing winners’ identities on auction outcomes using a large-scale, quasi-natural field experiment. Contrary to the conventional wisdom that “the more information, the better,” we

  14. Apprenticeship of agents in electric power auctions; Aprendizado de agentes no leilao de energia eletrica

    Energy Technology Data Exchange (ETDEWEB)

    Walter, Igor; Gomide, Fernando [Universidade Estadual de Campinas (UNICAMP), SP (Brazil). Faculdade de Engenharia Eletrica e de Computacao. Dept. de Engenharia de Computacao e Automacao Industrial; Takahashi, Leticia; Correia, Paulo de Barros [Universidade Estadual de Campinas (UNICAMP), SP (Brazil). Faculdade de Engenharia Mecanica

    2006-07-01

    Auctions are used in a myriad of economic transactions through different trading environments. This work addresses simulation and implementation of power auction strategies based on an actual case, namely, first auction of existent energy recently completed by the Brazilian electricity sector. Auctions provide formal methods to allocate resources based on competition, where sellers and buyers aim to maximize their benefit. The goal of this work is to study automatic learning of bidding strategies for an agent playing in a power auction. The agent learns bidding strategies from data and information commonly available during electronic auctions. The intelligent power auction agent learning approach is based on neural dynamic programming, a scheme that combines dynamic programming and neural networks techniques. Evidences suggest that the neural dynamic programming is an effective learning approach for power auction learning agents. More specifically, it is shown that Q-learning mechanism is a valuable approach to learn sub-optimal bidding policies in real time when using neural network for function approximation. (author)

  15. Risk aversion and optimal reserve prices in first and second-price auctions

    NARCIS (Netherlands)

    Hu, A.; Matthews, S.A.; Zou, L.

    2009-01-01

    This paper analyzes the effects of buyer and seller risk aversion in first and second- price auctions. The setting is the classic one of symmetric and independent private values, with ex ante homogeneous bidders. However, the seller is able to optimally set the reserve price. In both auctions the

  16. Risk aversion and optimal reserve prices in first- and second-price auctions

    NARCIS (Netherlands)

    Hu, A.; Matthews, S.A.; Zou, L.

    2010-01-01

    We analyze the effects of buyer and seller risk aversion in first- and second-price auctions in the classic setting of symmetric and independent private values. We show that the seller's optimal reserve price decreases in his own risk aversion, and more so in the first-price auction. The reserve

  17. Risk aversion and optimal reserve prices in first and second-price auctions [second version

    NARCIS (Netherlands)

    Hu, A.; Matthews, S.A.; Zou, L.

    2009-01-01

    This paper analyzes the effects of buyer and seller risk aversion in first and second-price auctions. The setting is the classic one of symmetric and independent private values, with ex ante homogeneous bidders. However, the seller is able to optimally set the reserve price. In both auctions the

  18. Sets in Excess Demand in Ascending Auctions with Unit-Demand Bidders

    NARCIS (Netherlands)

    Andersson, T.D.; Andersson, C.; Talman, A.J.J.

    2010-01-01

    This paper analyzes the problem of selling a number of indivisible items to a set of unitdemand bidders. An ascending auction mechanism called the Excess Demand Ascending Auction (EDAA) is defined. The main results demonstrate that EDAA terminates in a finite number of iterations and that the exact

  19. Do auctions and forced divestitures increase competition? Evidence for retail gasoline markets

    NARCIS (Netherlands)

    Soetevent, A.R.; Haan, M.A.; Heijnen, P.

    2008-01-01

    Where markets are insufficiently competitive, governments can intervene by auctioning licenses to operate or by forcing divestitures. The Dutch government has done exactly that, organizing auctions to redistribute tenancy rights for highway gasoline stations and forcing the divestiture of outlets of

  20. Do auctions and forced divestitures increase competition? Evidence for retail gasoline markets

    NARCIS (Netherlands)

    Soetevent, A.R.; Haan, M.A.; Heijnen, P.

    2014-01-01

    To foster competition, governments can intervene by auctioning licenses to operate, or by imposing divestitures. The Dutch government has done exactly that, organizing auctions to redistribute tenancy rights for highway gasoline stations and imposing divestitures of such stations on the four major

  1. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption is...

  2. Show me the goods: The warranting effect of user-generated photographs in online auctions

    NARCIS (Netherlands)

    Johnson, B.K.; Vang, M.H.; van der Heide, B.

    2015-01-01

    Consumers using online auction websites face the challenge of appraising products at a distance. Sellers and buyers in online auctions navigate this challenge by displaying and evaluating various cues, a critical one being use of photographs. Warranting theory predicts that cues less subject to

  3. Implementation of Auctions for Renewable Energy Support in the Netherlands and Denmark: A cooperation case study

    DEFF Research Database (Denmark)

    Gephart, Malte; Kitzing, Lena; Tiedeman, Silvana

    This report deals with the potential implementation of opened auctions for Renewable Energy support in the Netherlands from 2017 on. The report focuses on the implementation process and provides the necessary background information. Furthermore the planned auction design is described and discussed...

  4. 75 FR 57947 - Auction of VHF Commercial Television Station Construction Permits Scheduled for February 15, 2011...

    Science.gov (United States)

    2010-09-23

    ... transaction data. The proposed minimum opening bid amounts are $200,000 for each construction permit available...; Comment Sought on Competitive Bidding Procedures for Auction 90 AGENCY: Federal Communications Commission... bidding procedures for Auction 90. DATES: Comments are due on or before September 30, 2010, and reply...

  5. Efficient Double Auction Mechanisms in the Energy Grid with Connected and Islanded Microgrids

    Science.gov (United States)

    Faqiry, Mohammad Nazif

    The future energy grid is expected to operate in a decentralized fashion as a network of autonomous microgrids that are coordinated by a Distribution System Operator (DSO), which should allocate energy to them in an efficient manner. Each microgrid operating in either islanded or grid-connected mode may be considered to manage its own resources. This can take place through auctions with individual units of the microgrid as the agents. This research proposes efficient auction mechanisms for the energy grid, with is-landed and connected microgrids. The microgrid level auction is carried out by means of an intermediate agent called an aggregator. The individual consumer and producer units are modeled as selfish agents. With the microgrid in islanded mode, two aggregator-level auction classes are analyzed: (i) price-heterogeneous, and (ii) price homogeneous. Under the price heterogeneity paradigm, this research extends earlier work on the well-known, single-sided Kelly mechanism to double auctions. As in Kelly auctions, the proposed algorithm implements the bidding without using any agent level private infor-mation (i.e. generation capacity and utility functions). The proposed auction is shown to be an efficient mechanism that maximizes the social welfare, i.e. the sum of the utilities of all the agents. Furthermore, the research considers the situation where a subset of agents act as a coalition to redistribute the allocated energy and price using any other specific fairness criterion. The price homogeneous double auction algorithm proposed in this research ad-dresses the problem of price-anticipation, where each agent tries to influence the equilibri-um price of energy by placing strategic bids. As a result of this behavior, the auction's efficiency is lowered. This research proposes a novel approach that is implemented by the aggregator, called virtual bidding, where the efficiency can be asymptotically maximized, even in the presence of price anticipatory bidders

  6. A multi-attribute yardstick auction without prior scoring

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Nielsen, Kurt; Papakonstantinou, Athanasios

    by reducing the principal’s articulation of his preferences to simply choosing the most preferred oer as if it was a market with posted prices. Although truthful reporting does not constitute a Nash equilibrium, we demonstrate by simulations that truth-telling may indeed be some kind of focal point....... By focusing on the initial winner in case everyone tells the truth, we show that even if the other bidders are allowed to misreport by as much as 20% of their true cost, the initial winner remains the winner in 80% of all simulated auctions in the case of 3 competing bidders. Furthermore, as it takes...

  7. Prior-Free Multi-Unit Auctions with Ordered Bidders

    Science.gov (United States)

    2014-05-01

    analysis framework based on revenue benchmarks [6, 20]; see also the survey by Hartline and Karlin [15].1 The idea is to define a real-valued function on...Goldberg, J. D. Hartline, A. Karlin , M. Saks, and A. Wright. Competitive auctions. Games and Economic Behavior, 55(2):242–269, 2006. [12] A. V...design. Book in preparation, 2012. [15] J. D. Hartline and A. Karlin . Profit maximization in mechanism design. In N. Nisan, T. Rough- garden, É. Tardos

  8. Price Regulations in a Multi-unit Uniform Price Auction

    DEFF Research Database (Denmark)

    Boom, Anette

    not exceed the price cap whereas a selective bid cap for only the larger firms, does not guarantee this outcome. A sufficiently high bid floor always destroys pure strategy equilibria with equilibrium prices above the marginal costs, no matter whether the floor applies to all or only to relatively small......Inspired by recent regulations in the New York ICAP market we examine the effect of different price regulations on a multi-unit uniform price auction. We investigate a bid cap and a bid foor. Given suffciently high total capacities general bid caps always ensure that the market price does...

  9. Price Regulations in a Multi-unit Uniform Price Auction

    DEFF Research Database (Denmark)

    Boom, Anette

    Inspired by recent regulations in the New York ICAP market we examine the effect of different price regulations on a multi-unit uniform price auction. We investigate a bid cap and a bid foor. Given suffciently high total capacities general bid caps always ensure that the market price does...... not exceed the price cap whereas a selective bid cap for only the larger firms, does not guarantee this outcome. A sufficiently high bid floor always destroys pure strategy equilibria with equilibrium prices above the marginal costs, no matter whether the floor applies to all or only to relatively small...

  10. Human resources requirements for diabetic patients healthcare in primary care clinics of the Mexican Institute of Social Security

    Directory of Open Access Journals (Sweden)

    Svetlana V Doubova

    2013-11-01

    Full Text Available Objective. To estimate the requirements of human resources (HR of two models of care for diabetes patients: conventional and specific, also called DiabetIMSS, which are provided in primary care clinics of the Mexican Institute of Social Security (IMSS. Materials and methods. An evaluative research was conducted. An expert group identified the HR activities and time required to provide healthcare consistent with the best clinical practices for diabetic patients. HR were estimated by using the evidence-based adjusted service target approach for health workforce planning; then, comparisons between existing and estimated HRs were made. Results. To provide healthcare in accordance with the patients’ metabolic control, the conventional model required increasing the number of family doctors (1.2 times nutritionists (4.2 times and social workers (4.1 times. The DiabetIMSS model requires greater increase than the conventional model. Conclusions. Increasing HR is required to provide evidence-based healthcare to diabetes patients.

  11. [Human resources requirements for diabetic patients healthcare in primary care clinics of the Mexican Institute of Social Security].

    Science.gov (United States)

    Doubova, Svetlana V; Ramírez-Sánchez, Claudine; Figueroa-Lara, Alejandro; Pérez-Cuevas, Ricardo

    2013-12-01

    To estimate the requirements of human resources (HR) of two models of care for diabetes patients: conventional and specific, also called DiabetIMSS, which are provided in primary care clinics of the Mexican Institute of Social Security (IMSS). An evaluative research was conducted. An expert group identified the HR activities and time required to provide healthcare consistent with the best clinical practices for diabetic patients. HR were estimated by using the evidence-based adjusted service target approach for health workforce planning; then, comparisons between existing and estimated HRs were made. To provide healthcare in accordance with the patients' metabolic control, the conventional model required increasing the number of family doctors (1.2 times) nutritionists (4.2 times) and social workers (4.1 times). The DiabetIMSS model requires greater increase than the conventional model. Increasing HR is required to provide evidence-based healthcare to diabetes patients.

  12. Identification of shareholder ethics and responsibilities in online reverse auctions for construction projects.

    Science.gov (United States)

    Hatipkarasulu, Yilmaz; Gill, James H

    2004-04-01

    The increasing number of companies providing internet services and auction tools helped popularize the online reverse auction trend for purchasing commodities and services in the last decade. As a result, a number of owners, both public and private, accepted the online reverse auctions as the bidding technique for their construction projects. Owners, while trying to minimize their costs for construction projects, are also required to address their ethical responsibilities to the shareholders. In the case of online reverse auctions for construction projects, the ethical issues involved in the bidding technique directly reflects on the owner's ethical and social responsibilities to their shareholders. The goal of this paper is to identify the shareholder ethics and responsibilities in online reverse auctions for construction projects by analyzing the ethical issues for the parties involved in the process. The identification of the ethical issues and responsibilities requires clear definition and understanding of professional ethics and the roles of the involved parties. In this paper, first, the concept of professional ethics and social responsibility is described in a general form. To illustrate the ethical issues and responsibilities, a sample case of bidding for a construction project using online reverse auction techniques is presented in which the shareholders were actively involved in questioning the ethical issues. The issues involved in the bidding process and their reflection on the shareholder responsibilities are described and analyzed for each stage of the process. A brief discussion of the overall process is also included to address the general ethical issues involved in online reverse auctions.

  13. Using Experimental Auctions to Examine Demand for E-Cigarettes.

    Science.gov (United States)

    O'Connor, Richard; Rousu, Matthew C; Bansal-Travers, Maansi; Vogl, Lisa; Corrigan, Jay R

    2017-06-01

    E-cigarettes are the latest in a line of potentially reduced exposure products that have garnered interest among smokers. In this paper, we use experimental auctions to estimate smokers' demand for e-cigarettes and to assess the impact of advertisements on willingness to pay. These are actual auctions, with winners and losers, which means hypothetical biases often seen in surveys are minimized. We find smokers have positive demand for e-cigarettes, and that the print advertisements used in our study had greater effectiveness than video ads (b = 2.00, p e-cigarettes. Demand was greater for reusable versus disposable e-cigarettes. In multivariate models, demand for e-cigarettes was higher among non-white participants and among smokers willing to pay more for cigarettes. Our findings suggest that cigarette smokers are interested in e-cigarettes as alternatives to traditional products, particularly for reusable forms, and that this demand can be influenced by messaging/advertising. Given these reduced harm products are appealing, if smokers are able to switch completely to e-cigarettes, there is a good chance for accrual of significant harm reduction.

  14. Understanding Financial Market States Using an Artificial Double Auction Market.

    Science.gov (United States)

    Yim, Kyubin; Oh, Gabjin; Kim, Seunghwan

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85.

  15. Investing EU ETS auction revenues into energy savings

    Energy Technology Data Exchange (ETDEWEB)

    Sijm, J.P.M.; Boonekamp, P.G.M. [ECN Policy Studies, Petten (Netherlands); Summerton, P.; Pollitt, H.; Billington, S. [Cambridge Econometrics CE, Cambridge (United Kingdom)

    2013-05-15

    The overall objective of this study is to analyse the effects of using EU ETS auction revenues to stimulate investments in energy savings in three key target sectors, i.e. Households, Tertiary and Industry (including both ETS and non-ETS industrial installations). The scenarios used refer basically to the situation before the recent agreement on the Energy Efficiency Directive (EED) and include (a mixture of) different policy options to enhance energy savings in the target sectors, in particular (1) reducing the ETS cap, (2) introducing an Energy Efficiency Obligation (EEO) for energy suppliers or distributors, and/or (3) using ETS auction revenues to support additional (private) investments in raising energy efficiency. In order to meet this objective a variety of different policy scenarios have been defined and analysed by means of the 'Energy-Environment-Economy Model for Europe (E3ME)'. The study presents and discusses a large variety of scenario modelling results by the year 2020 at the EU27 level. These results refer to, among others, energy savings, GHG emissions, the ETS carbon price, household electricity bills and to changes in some macro- or socio-economic outcomes such as GDP, inflation, employment or international trade. Finally, the study discusses some policy findings and implications, including options to enhance the effectiveness of some EE policies, in particular those having a potential adverse effect on the ETS carbon price.

  16. Multiagent model and mean field theory of complex auction dynamics

    Science.gov (United States)

    Chen, Qinghua; Huang, Zi-Gang; Wang, Yougui; Lai, Ying-Cheng

    2015-09-01

    Recent years have witnessed a growing interest in analyzing a variety of socio-economic phenomena using methods from statistical and nonlinear physics. We study a class of complex systems arising from economics, the lowest unique bid auction (LUBA) systems, which is a recently emerged class of online auction game systems. Through analyzing large, empirical data sets of LUBA, we identify a general feature of the bid price distribution: an inverted J-shaped function with exponential decay in the large bid price region. To account for the distribution, we propose a multi-agent model in which each agent bids stochastically in the field of winner’s attractiveness, and develop a theoretical framework to obtain analytic solutions of the model based on mean field analysis. The theory produces bid-price distributions that are in excellent agreement with those from the real data. Our model and theory capture the essential features of human behaviors in the competitive environment as exemplified by LUBA, and may provide significant quantitative insights into complex socio-economic phenomena.

  17. Strategic Bidding in Multi-Unit Auctions with Capacity Constrained Bidders

    DEFF Research Database (Denmark)

    Schwenen, Sebastian

    2015-01-01

    This article employs a simple model to describe bidding behavior in multi-unit uniform price procurement auctions when firms are capacity constrained. Using data from the New York City procurement auctions for power generating capacity, I find that firms use simple bidding strategies to coordinate...... on an equilibrium that extracts high rents for all bidders. I show theoretically and empirically that the largest bidder submits the auction clearing bid. All other bidders submit inframarginal bids that are low enough to not be profitably undercut. Inframarginal bidders decrease their bids as the pivotal firm...

  18. Agora Energiewende (2017). Future cost of onshore wind. Recent auction results, long-term outlook and implications for upcoming German auctions

    Energy Technology Data Exchange (ETDEWEB)

    Thomassen, Georg; Deutsch, Matthias

    2017-04-15

    The costs for electricity from renewable generation have been falling significantly in recent years, and record low bids at auctions around the world have grasped the attention of the public. Solar photovoltaics and offshore wind auctions, in particular, have attracted a lot of interest. The results for onshore wind, however, are just as impressive. The future cost development of onshore wind is of great relevance, since it is a key pillar of the energy system transformation in many parts of the world. However, the estimated long-term cost reductions vary significantly, as different studies value the cost drivers of wind differently. In Germany, the opaque and complex cost structure of onshore wind is the root of much controversy. International auction results with winning bids of less than half of the typical German pay rate left people questioning the costs of domestic wind power. However this discussion often fails to account adequately for differences in the quality of wind resources. In light of the upcoming, and first, German onshore wind auctions, we aim to contribute to the ongoing discussion by providing the necessary context for international auction results, a general outlook on the future cost of onshore wind, and by illustrating the existing potential and hindrances for cost reductions in the German market.

  19. A simplified multiattribute procurement auction with postponed scoring by a double revelation mechanism

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Nielsen, Kurt

    in a higher compensation if winning. This strengthens the Principal’s articulation of preferences and the competition in general. Also, the postponed scoring lowers the Principal’s transaction costs involved in tender description and thereby making the suggested auction a closer alternative to a traditional...... of linear scoring functions, consistent with the principal’s choice given linear preferences. The resulting scoring functions are used to score the original bids. While the highest score wins the second highest score settle the compensation. If the auction results in more than one highest scoring bid......, the Principal ends the auction by selecting the most preferred. The auction provides almost ideal incentives for bidders to reveal prices less than or equal to true cost. In general bidding below true cost involves a risk of getting a oss, nevertheless it may also both increase the chance of winning and result...

  20. A Dynamic Pricing Reverse Auction-Based Resource Allocation Mechanism in Cloud Workflow Systems

    National Research Council Canada - National Science Library

    Li, Xuejun; Ding, Ruimiao; Liu, Xiao; Liu, Xiangjun; Zhu, Erzhou; Zhong, Yunxiang

    2016-01-01

    Market-oriented reverse auction is an efficient and cost-effective method for resource allocation in cloud workflow systems since it can dynamically allocate resources depending on the supply-demand...

  1. An Electronic Marketplace: Agent-based Coordination Models for Online Auctions

    NARCIS (Netherlands)

    Morali, A.; Diaz, J.F.; Rueda, C.; Varela, L.; Varela, C.A.; Buss, A.A.

    2005-01-01

    Different coordination models exist for managing concurrency in complex distributed systems, for example, direct interaction, tuple spaces, hierarchical structures, and publish-and-subscribe mechanisms. Online auctions are complex distributed systems, where the choice of coordination model can

  2. Bid distribution derived from consistent mixed strategy in lowest unique bid auction

    Science.gov (United States)

    Zhao, Yinan; Chen, Qinghua; Wang, Yougui

    2014-12-01

    The Lowest Unique Bid Auction (LUBA) booms recently through the Internet. A typical distribution pattern of bid price in this reverse auction has been found and needs to be interpreted. The distribution curve is a decreasing one whose slope has a close relationship with the number of agents participating in the auction. To explain this stylized fact, we develop a model assuming that agents prefer to bid on the price at which the probability of winning is higher. The bid distributions of actual auctions with the number of agents less than 200 can be fitted very well using the parameters for the value of items and the number of bids. When this number becomes larger, however, a deviation occurs between prediction and empirical data, which can be adjusted by introducing cognitive illusion of the bid number.

  3. The Security Education Concepts in the Textbooks of the National and Civic Education of the Primary Stage in Jordan--An Analytical Study

    Science.gov (United States)

    Al-Edwan, Zaid Suleiman

    2016-01-01

    The present study aimed at exploring the concepts of the security education in the textbooks of the national and civic education of the higher primary stage in Jordan. It adopted the descriptive analytical method. The study sample consisted of the textbooks of the national and civic education for the basic eighth, ninth and tenth grades. To…

  4. Opportunity cost for the digital dividend bandwidth: Application and comparison with LTE auctions outcomes

    OpenAIRE

    Garelli, Nicola

    2014-01-01

    Radio spectrum represents a scarce resource assigned to operators by national regulatory authorities through auctions, beauty contests or other mechanisms, aimed at introducing sufficient incentives for an optimal use of such a resource. A prerequisite for designing efficient assignment methods is that regulatory agencies, which typically rely on incomplete and asymmetric information, clearly identify the expected value of the spectrum, to be used to set auction bases, prices in beauty contes...

  5. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    Science.gov (United States)

    2007-12-01

    The authors used a reverse combinatorial auction to examine the effects of offering a “ menu ” of retention incentives. The following explanation of...the menu ), and the eight different combinations of non- traditional incentives (including “none” as an option), there are 64 unique packages that could...SWOCP model that is similar to a cafeteria auction, where officers would be guaranteed homeport, platform type, and job type but required to accept a

  6. The Allocation of Runway Slots by Auction. Volume III. Theory and Technical Issues for Implementation.

    Science.gov (United States)

    1980-04-15

    conditions. The Airline Management Game is used to create a simulation test of the Slot Exchange Auction and Its associated continuous market, the...11111.2 III~~.N 1. MICROCOPY RESOLUTION TEST CHtV NATIONAL BUREAU (M STANDARDS 1363-.1 )!: Volume III The-Allocation of @ *o Runway Slots by Auction...Pilots Associations ( AOPA ) sued to have the rules withdrawn, arguing that quotas favored the airlines and violated the "freedom-to-airspace" principle

  7. An Empirical Examination of Reverse Auction Appropriateness in B2B Source Selection

    Science.gov (United States)

    2006-01-01

    U.S. GOVERNMENT. An Empirical Examination of Reverse Auction Appropriateness in B2B Source Selection Abstract Electronic reverse auctions (e-RA) are...of business-to-business electronic markets . Joo and Kim’s (2004) study revealed that external pressure, such as competition and firm size, directly...competitive market structure, the greater the appropriateness of an e- RA as a sourcing strategy . Specifiability In the sourcing strategy development

  8. Strategic design under uncertain evaluations: Structural analysis of design-build auctions

    OpenAIRE

    Takahashi, Hidenori

    2015-01-01

    I investigate firms' competition over price and product design under uncertain design evaluations in the context of Design-Build (DB) auctions. Reviewers' design evaluations contain uncertainty from a bidder's perspective, leading luck to curtail differences in firms' chances of winning. I model bidders' behavior and derive semiparametric identification of the model primitives. Uncertain evaluations worsen the expected price of design quality, and exacerbate an auctioneer's unc...

  9. Implicit price of mussel characteristics in the auction market

    DEFF Research Database (Denmark)

    Nguyen, Thong Tien

    2012-01-01

    This study explores desired and undesired characteristics of mussels in wholesale market by applying hedonic price analysis. Transaction data in auction market in Yerseke, the Netherlands, was used to estimate linear and semi-log price models. Meat content and size count, which are measured...... of raw mussels are significant discounting factors on the price. The study also investigates the impact of farming locations and seasons on the price and the price trend during the period of 2002–2009....... as the ratio of the weight of cooked meat to the total weight and the number of mussel per kg of raw mussels, respectively, are the most important characteristics determining the price. At the sample mean, if the meat content increases by 1%, farmers can get a premium price of 5.5 eurocents kg−1 of raw mussel...

  10. Detecting Fraudsters in Online Auction Using Variations of Neighbor Diversity

    Directory of Open Access Journals (Sweden)

    Laksamee Khomnotai

    2015-07-01

    Full Text Available Inflated reputation fraud is a serious problem in online auction. Recent work suggested that neighbor diversity is an effective feature for discerning fraudsters from normal users. However, there exist many different methods to quantify diversity in the literature. This raises the problem of finding the most suitable method to calculate neighbor diversity for detecting fraudsters. We collect four different methods to quantify diversity, and apply them to calculate neighbor diversity. We then use these various neighbor diversities for fraudster detection. Experimental results on a real-world dataset demonstrate that, although these diversities were calculated differently, their performances on fraudster detection are similar. This finding reflects the robustness of neighbor diversity, regardless of how the diversity is calculated.

  11. Understanding Financial Market States Using an Artificial Double Auction Market.

    Directory of Open Access Journals (Sweden)

    Kyubin Yim

    Full Text Available The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85.

  12. Combining auctions and performance-based payments in a forest enrichment field trial in Western Kenya.

    Science.gov (United States)

    Khalumba, Mercelyne; Wünscher, Tobias; Wunder, Sven; Büdenbender, Mirjam; Holm-Müller, Karin

    2014-06-01

    Cost-effectiveness is an important aspect in the assessment of payments for environmental services (PES) initiatives. In participatory field trials with communities in Western Kenya, we combined procurement auctions for forest enrichment contracts with performance-based payments and compared the outcomes with a baseline scenario currently used by the Kenyan Forest Service. Procurement auctions were the most cost-effective. The competitive nature of the auction reduced contracting expenses (provision costs), and the result-oriented payments provided additional incentives to care for the planted seedlings, resulting in their improved survival rates (service quantity). These gains clearly exceeded increases in transaction costs associated with conducting an auction. The number of income-poor auction participants and winners was disproportionately high and local institutional buy-in was remarkably strong. Our participatory approach may, however, require adaptations when conducted at a larger scale. Although the number of contracts we monitored was limited and prohibited the use of statistical tests, our study is one of the first to reveal the benefits of using auctions for PES in developing countries. © 2014 Society for Conservation Biology.

  13. Green auctions and reduction of information rents in payments for environmental services: an experimental investigation in Sunan County, northwestern China.

    Directory of Open Access Journals (Sweden)

    Xiaohong Deng

    Full Text Available Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the "Grain for Green" Payments for environmental services (PES program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. "Perfect information" in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions.

  14. Green auctions and reduction of information rents in payments for environmental services: an experimental investigation in Sunan County, northwestern China.

    Science.gov (United States)

    Deng, Xiaohong; Xu, Zhongmin

    2015-01-01

    Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the "Grain for Green" Payments for environmental services (PES) program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. "Perfect information" in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions.

  15. Measuring Dutch consumers' willingness-to-pay for ethically-improved foods and supply chains through the performance of experimental auctions

    DEFF Research Database (Denmark)

    Costa, Ana I.A.

    to the actual auction rounds. The ethical attributes assessed were selected based on the outcome of a previous collage and focus group study. The type of auction mechanism employed was the second-price, sealed bid auction. The results obtained indicate that Dutch consumers might be willing to pay more...

  16. Uncertain Reasoning for Detection of Selling Stolen Goods in Online Auctions Using Contextual Information

    Directory of Open Access Journals (Sweden)

    Ladislav Beranek

    2014-01-01

    Full Text Available This work describes the design of a decision support system for detection of fraudulent behavior of selling stolen goods in online auctions. In this system, each seller is associated with a type of certification, namely “proper seller,” “suspect seller,” and “selling stolen goods.” The certification level is determined on the basis of a seller’s behaviors and especially on the basis of contextual information whose origin is outside online auctions portals. In this paper, we focus on representing knowledge about sellers in online auctions, the influence of additional information available from other Internet source, and reasoning on bidders’ trustworthiness under uncertainties using Dempster-Shafer theory of evidence. To demonstrate the practicability of our approach, we performed a case study using real auction data from Czech auction portal Aukro. The analysis results show that our approach can be used to detect selling stolen goods. By applying Dempster-Shafer theory to combine multiple sources of evidence for the detection of this fraudulent behavior, the proposed approach can reduce the number of false positive results in comparison to approaches using a single source of evidence.

  17. Physical contact influences how much people pay at celebrity auctions

    Science.gov (United States)

    Newman, George E.; Bloom, Paul

    2014-01-01

    Contagion is a form of magical thinking in which people believe that a person’s immaterial qualities or essence can be transferred to an object through physical contact. Here we investigate how a belief in contagion influences the sale of celebrity memorabilia. Using data from three high-profile estate auctions, we find that people’s expectations about the amount of physical contact between the object and the celebrity positively predicts the final bids for items that belonged to well-liked individuals (e.g., John F. Kennedy) and negatively predicts final bids for items that belonged to disliked individuals (e.g., Bernard Madoff). A follow-up experiment further suggests that these effects are driven by contagion beliefs: when asked to bid on a sweater owned by a well-liked celebrity, participants report that they would pay substantially less if it was sterilized before they received it. However, sterilization increases the amount they would pay for a sweater owned by a disliked celebrity. These studies suggest that magical thinking may still have effects in contemporary Western societies and they provide some unique demonstrations of contagion effects on real-world purchase decisions. PMID:24567388

  18. Electronic Reverse Auctions: Integrating an E-Sourcing Tool into a Sales and Purchasing Cross-Course Negotiation Project

    Science.gov (United States)

    Williams, Jacqueline A.; Dobie, Kathryn

    2011-01-01

    Electronic reverse auctions are increasingly being used by firms to improve firm financial and operational performance. The described teaching innovation serves as a model for introducing electronic reverse auctions as a central element in a comprehensive negotiation exercise involving sales management and purchasing management students. Results…

  19. 75 FR 21627 - Auction of Lower and Upper Paging Bands Licenses Rescheduled for June 15, 2010; Status of Short...

    Science.gov (United States)

    2010-04-26

    ...-Form Applications to Participate in Auction 87 AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: This document announces the revised schedule and deadlines for the upcoming auction of 9... applications must resubmit their applications, having corrected the deficiencies indicated, prior to 6 p.m. ET...

  20. 75 FR 61752 - Auction of FM Broadcast Construction Permits Scheduled for March 29, 2011; Comment Sought on...

    Science.gov (United States)

    2010-10-06

    ... broadcast facility, and recent broadcast transaction data. The proposed minimum opening bid amount for each... Competitive Bidding Procedures for Auction 91 AGENCY: Federal Communications Commission. ACTION: Notice... March 29, 2011 (Auction 91). This document also seeks comment on competitive bidding procedures for...

  1. Auctions for renewable energy support - Taming the beast of competitive bidding

    DEFF Research Database (Denmark)

    Mora Alvarez, David Fernando; Kitzing, Lena; Soysal, Emilie Rosenlund

    Auctions for Renewable Energy Support - AURES - is a coordination and support action financed by the European Commission under the Horizon 2020 program to improve the implementation of renewable energy policies in EU Member States. AURES was conceived by the need of implementing market......-based instruments including competitive bidding processes (i.e. auctions or tenders) to allocate support for renewable energy sources (RES) in the European electricity sector from 2015 onwards as stipulated in the EC State Aid Guidelines. Many European countries have by now undertaken competitive auctions...... for different technologies with mixed experiences while others have recently started or are at the verge of starting the implementation process. Energy community countries may also soon introduce competition for support payments. Therefore, there exists the need for capacity building of policy makers and market...

  2. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    Science.gov (United States)

    Yu, Wang

    2017-10-01

    Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  3. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    Directory of Open Access Journals (Sweden)

    Yu Wang

    2017-10-01

    Full Text Available Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  4. A Sealed-Bid Two-Attribute Yardstick AuctionWithout Prior Scoring

    DEFF Research Database (Denmark)

    Leth Hougaard, Jens; Nielsen, Kurt; Papakonstantinou, Athanasios

    2016-01-01

    that following this type of equilibrium behavior often leads to winner’s curse. The simulations show that in auctions with more than 12 participants the chance of facing winner’s curse is around 95%. Truthful reporting, on the other hand, does not constitute a Nash equilibrium but it is ex post individually......We analyze a two-attribute single item procurement auction that uses yardstick competition to settle prices. The auction simplifies the procurement process by reducing the principal’s articulation of preferences to simply choosing the most preferred offer as if it was a market with posted prices...... rational. Using a simulation study we demonstrate that truthful bidding may indeed represent some kind of focal point....

  5. Implementation of Auctions for Renewable Energy Support in Poland: a Case Study

    DEFF Research Database (Denmark)

    Kitzing, Lena; Wendring, Paul

    This report deals with the planned implementation of auctions for Renewable Energy support in Poland from 2016 onwards. The report focuses on the implementation process and provides the necessary background information. Furthermore the planned auction design is described and discussed both from...... a policy maker’s and an investor’s point of view. Finally, main strengths and weaknesses are identified and the scheme is discussed according to several success criteria. The proposed design is related to the findings from AURES work packages 2, 3 and 4, which included the identification of success...

  6. Uncertain Reasoning for Detection of Selling Stolen Goods in Online Auctions Using Contextual Information

    OpenAIRE

    Beranek, Ladislav

    2014-01-01

    This work describes the design of a decision support system for detection of fraudulent behavior of selling stolen goods in online auctions. In this system, each seller is associated with a type of certification, namely “proper seller,” “suspect seller,” and “selling stolen goods.” The certification level is determined on the basis of a seller’s behaviors and especially on the basis of contextual information whose origin is outside online auctions portals. In this paper, we focus on represent...

  7. Enabling secure and privacy preserving communications in smart grids

    CERN Document Server

    Li, Hongwei

    2014-01-01

    This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in sma

  8. Mid-term follow-up of the TVT-Secur midurethral sling for primary stress incontinence.

    Science.gov (United States)

    Angleitner-Flotzinger, Johannes; Aigmueller, Thomas

    2014-09-01

    The TVT-Secur was introduced in 2006 as a less invasive alternative to retropubic and transobturator suburethral slings. This retrospective cohort study evaluated objective and subjective results in a series of 158 consecutive patients as well as complications and the reoperation rate after TVT-Secur procedure. Between November 2006 and June 2010 a total of 158 patients underwent a TVT-Secur procedure at a single institution. All patients underwent preoperative urodynamic testing. All patients were invited for follow-up including physical examination, urodynamic studies and subjective evaluation. A total of 96 patients (61%) were available for follow-up with a mean follow-up of 29.8 months (range 5-50, median 30). At follow-up, eight (8%) of 96 patients had reoperations for stress incontinence. There were no reoperations for bleeding/hematoma, tape erosions or obstructed micturition and there were no tape erosions or exposures. 29 patients (30%) had a negative cough stress test and 44 patients (46%) subjectively considered themselves "cured". Nine of 43 patients (21%) without urgency symptoms preoperatively developed de novo urgency; 24 of 35 patients (69%) with preoperative urgency complaints were free of urgency symptoms. At 2.4 years, the TVT-Secur appears to have a low adverse events profile but inferior results compared with traditional midurethral slings. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  9. Impacts of climate and land use change on ecosystem hydrology and net primary productivity: Linking water availability to food security in Asia

    Science.gov (United States)

    Dangal, S. R. S.; Tian, H.; Pan, S.; Zhang, B.; Yang, J.

    2015-12-01

    The nexus approach to food, water and energy security in Asia is extremely important and relevant as the region has to feed two-third of the world's population and accounts for 59% of the global water consumption. The distribution pattern of food, water and energy resources have been shaped by the legacy effect of both natural and anthropogenic disturbances and therefore are vulnerable to climate change and human activities including land use/cover change (LUCC) and land management (irrigation and nitrogen fertilization). In this study, we used the Dynamic Land Ecosystem Model (DLEM) to examine the effects of climate change, land use/cover change, and land management practices (irrigation and nitrogen fertilization) on the spatiotemporal trends and variability in water availability and its role in limiting net primary productivity (NPP) and food security in the 20th and early 21st centuries. Our specific objectives are to quantify how climate change, LUCC and other environmental changes have interactively affected carbon and water dynamics across the Asian region. In particular, we separated the Asian region into several sub-region based on the primary limiting factor - water, food and energy. We then quantified how changes in environmental factors have altered the water and food resources during the past century. We particularly focused on Net Primary Productivity (NPP) and water cycle (Evapotranspiration, discharge, and runoff) as a measure of available food and water resources, respectively while understanding the linkage between food and water resources in Asia.

  10. The 80/20 Rule and Long-Tail in the Online Auction Market: A Case Study on YAHOO Auction, Taiwan

    Directory of Open Access Journals (Sweden)

    Jang-Ruey Tzeng

    2009-08-01

    Full Text Available The online auction market has been growing rapidly, but what are the significant effects on Taiwan? Based upon the 80/20 rule and the Long Tail, the paper started its observation by taking Yahoo Auction platform as a case study and found a negative co-variance existing between performance and the number of online sellers. A further analysis showed that these 20% sellers promoted more items of goods online than numerous online sellers with less efficient performance. The former ones were found to have attracted more patronage than 80% of the sellers do, and they were capable of promoting both popular and rare goods, which led to sustained revenues in E-commerce. The paper concluded that 80% of economies of scale in the online auction market are characterized by higher performance sellers that constitute 20% of the whole participants, a sign that proves supportive of the 80/20 rule. These 20% sellers display more items of goods online and create more revenues than those of the lower performance sellers do, a sign that reflects the Long Tail. The co-existence of the 80/20 rule and the Long Tail, may serve as a preliminary study for further academic research.

  11. On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values

    Science.gov (United States)

    Constantin, Florin; Parkes, David C.

    In a dynamic market, being able to update one's value based on information available to other bidders currently in the market can be critical to having profitable transactions. This is nicely captured by the model of interdependent values (IDV): a bidder's value can explicitly depend on the private information of other bidders. In this paper we present preliminary results about the revenue properties of dynamic auctions for IDV bidders. We adopt a computational approach to design single-item revenue-optimal dynamic auctions with known arrivals and departures but (private) signals that arrive online. In leveraging a characterization of truthful auctions, we present a mixed-integer programming formulation of the design problem. Although a discretization is imposed on bidder signals the solution is a mechanism applicable to continuous signals. The formulation size grows exponentially in the dependence of bidders' values on other bidders' signals. We highlight general properties of revenue-optimal dynamic auctions in a simple parametrized example and study the sensitivity of prices and revenue to model parameters.

  12. See Art History in a New Light: Have an Art Auction

    Science.gov (United States)

    Benter, Doris J.

    2008-01-01

    At Portledge School in Locust Valley, New York, ninth graders in their upper school study art history for one semester. The visual arts department has created a vigorous new syllabus culminating in an hour-long mock art auction. The department selects several art movements (e.g., Post-Impressionism, Cubism, Abstract Expressionism, Social Realism,…

  13. Teaching Undergraduate Money and Banking: T-Bill Auctions and Stock Market Models

    Science.gov (United States)

    Saros, Daniel E.

    2009-01-01

    The author offers innovative approaches to 3 topics that are typically only briefly mentioned (if at all) in money and banking courses. The first topic is a Treasury bill auction experiment in which students have an opportunity to participate directly. The results from a class of 14 money and banking students are used to explain how an instructor…

  14. 31 CFR 356.10 - What is the purpose of an auction announcement?

    Science.gov (United States)

    2010-07-01

    ... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY CIRCULAR, PUBLIC DEBT SERIES NO...? By issuing an auction announcement, we provide public notice of the sale of bills, notes, and bonds...

  15. 31 CFR 356.33 - Does the Treasury have any discretion in the auction process?

    Science.gov (United States)

    2010-07-01

    ... Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT SALE... CIRCULAR, PUBLIC DEBT SERIES NO. 1-93) Miscellaneous Provisions § 356.33 Does the Treasury have any... provide a public notice if we change any auction provision, term, or condition. (c) We reserve the right...

  16. Liquidity Shocks, Market Maker Turnover, and Bidding Behavior in Treasury Auctions

    DEFF Research Database (Denmark)

    Gonzalez-Eiras, Martin; Rudiger, Jesper

    2017-01-01

    We use bid data from Argentinian Treasury bill auctions from 1996 to 2000 to study how banks' balance sheet and past performance affect bidding behavior. Exploiting variation in regulations for market making activity we show that when banks fear losing their market maker status, they bid more...

  17. Implementing a Multi-Agent System in Python with an Auction-Based Agreement Approach

    DEFF Research Database (Denmark)

    Ettienne, Mikko Berggren; Vester, Steen; Villadsen, Jørgen

    2012-01-01

    We describe the solution used by the Python-DTU team in the Multi-Agent Programming Contest 2011, where the scenario was called Agents on Mars. We present our auction-based agreement algorithm and discuss our chosen strategy and our choice of technology used for implementing the system. Finally, we...

  18. Reciprocity in Online Markets: Empirical Studies of Auction and Barter Markets

    Science.gov (United States)

    Ye, Shun

    2013-01-01

    My dissertation seeks to understand how reciprocity affects transaction outcomes and mechanism design in online markets. The first essay examines negative reciprocity illustrated as feedback-revoking behavior in the eBay auction market, focusing on its impact and implications for reputation system design. I utilize the biggest policy change of…

  19. A Dynamic Pricing Reverse Auction-Based Resource Allocation Mechanism in Cloud Workflow Systems

    Directory of Open Access Journals (Sweden)

    Xuejun Li

    2016-01-01

    Full Text Available Market-oriented reverse auction is an efficient and cost-effective method for resource allocation in cloud workflow systems since it can dynamically allocate resources depending on the supply-demand relationship of the cloud market. However, during the auction the price of cloud resource is usually fixed, and the current resource allocation mechanisms cannot adapt to the changeable market properly which results in the low efficiency of resource utilization. To address such a problem, a dynamic pricing reverse auction-based resource allocation mechanism is proposed. During the auction, resource providers can change prices according to the trading situation so that our novel mechanism can increase the chances of making a deal and improve efficiency of resource utilization. In addition, resource providers can improve their competitiveness in the market by lowering prices, and thus users can obtain cheaper resources in shorter time which would decrease monetary cost and completion time for workflow execution. Experiments with different situations and problem sizes are conducted for dynamic pricing-based allocation mechanism (DPAM on resource utilization and the measurement of Time⁎Cost (TC. The results show that our DPAM can outperform its representative in resource utilization, monetary cost, and completion time and also obtain the optimal price reduction rates.

  20. Discrete Strategies in Keyword Auctions and Their Inefficiency for Locally Aware Bidders

    NARCIS (Netherlands)

    V. Markakis (Vangelis); O. Telelis (Orestis); A. Saberi

    2010-01-01

    htmlabstractWe study formally discrete bidding strategies for the game induced by the Generalized Second Price keyword auction mechanism. Such strategies have seen experimental evaluation in the recent literature as parts of iterative best response procedures, which have been shown not to converge.

  1. Equilibrium Selection with Risk Dominance in a Multiple-unit Unit Uniform Price Auction

    DEFF Research Database (Denmark)

    Boom, Anette

    This paper uses an adapted version of the linear tracing procedure, suggested by Harsanyi and Selten (1988), in order to discriminate between two types of multiple Nash equilibria. Equilibria of the same type are pay-off equivalent in the analysed multiple-unit unit price auction where two seller...

  2. Horticultural auctions in The Netherlands: A transition from 'price discovery' institution to 'marketing' institution

    NARCIS (Netherlands)

    Meulenberg, M.T.G.

    1989-01-01

    This paper depicts the evolution of Dutch auctions during the past hundred years from a "price discovery" institution to a "marketing" institution, focusing on price discovery. A conceptual framework is proposed to assess the suitablility of marketing management by agricultural marketing

  3. Setting licence fees for renewing telecommunication spectrum based on an auction

    NARCIS (Netherlands)

    Poort, J.; Kerste, M.

    2014-01-01

    This paper presents a methodology for setting fees for the renewal or extension of spectrum licences, by using the outcome of an auction for comparable licences but with a different licence period. The methodology is a combination of market and cash flow valuation and consists of two main steps.

  4. Factors Affecting the Price of Beech Timber Sale by Auctions in Turkey

    Directory of Open Access Journals (Sweden)

    İsmet DAŞDEMİR

    2008-01-01

    Full Text Available There are many factors affecting the auction price of timber in the state forest enterprises in Turkey. This studywas handled to determine the factors affecting the price of third class normal sized beech timber sale by auctions.It was carried out in two rival state forest enterprises (Bartın and Yenice of Zonguldak Regional ForestDirectorate in the Western Blacksea Region of Turkey. The data obtained from the total 149 timber auctions inthe period 1998-2002 were used as material in this study. The effects of seasonal and other factors on the auctionprice of beech timber were investigated by variance analysis, season and month indexes, and correlation,regression and factors analyses respectively. At the end of statistical analyses, it was determined that the seasonsaffected the beech timber prices at the 90% significant level. The most positive effect in spring and the mostnegative effect in winter were determined. The month most affecting timber price was April. Also, the factorsthe most affecting the price of beech timber sale by auctions were determined as follows: (1 Timing of theauctions, (2 Quantity of supply and size of timber stack, (3 Demand level, (4 Quality and appropriateness tostandardization in timber production. Furthermore, based on these conclusions, some suggestions were made inorder to plan marketing activities optimally and to improve the marketing policies and to ensure economicallysustainability in state forest enterprises.

  5. Reverse Auction Based Green Offloading Scheme for Small Cell Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Xiaodong Xu

    2016-01-01

    Full Text Available The small cell is treated as a promising proposition to provide hot spot capacity and higher data rates. However, even with dense small cell deployment scenario, the heavy traffic load pressure and low energy efficiency in the small cell heterogeneous network (HetNet still exist. Therefore, how to make the best use of densely deployed small cells under HetNet environments becomes the focus of researches. Offloading provides a feasible solution to promote cooperation between macrocells and small cells for user traffic supporting. In this paper, we propose the reverse auction based Green Offloading (GO scheme for energy efficiency improvements. The proposed GO scheme employs the reverse auction theory to handle the offloading decision process, aiming at maximizing the system energy efficiency under the constraints of user Quality of Service (QoS requirements, bandwidth, and transmission power limitations. Moreover, the reverse auction model gives the facility of multicell coordination transmissions with multiple winners situation. The energy efficiency optimization problem with constraints is solved by Dynamic Programming method with Karush-Kuhn-Tucker (KKT conditions. The Individual Rationality and Truthfulness of the reverse auction model are also proved. By comparing the energy efficiency performances of the proposed GO scheme with current works within the Long Term Evolution-Advanced (LTE-A system downlink scenario, simulation results show the improvements of the proposed GO scheme.

  6. Efficient Nash Equilibrium Resource Allocation Based on Game Theory Mechanism in Cloud Computing by Using Auction.

    Science.gov (United States)

    Nezarat, Amin; Dastghaibifard, G H

    2015-01-01

    One of the most complex issues in the cloud computing environment is the problem of resource allocation so that, on one hand, the cloud provider expects the most profitability and, on the other hand, users also expect to have the best resources at their disposal considering the budget constraints and time. In most previous work conducted, heuristic and evolutionary approaches have been used to solve this problem. Nevertheless, since the nature of this environment is based on economic methods, using such methods can decrease response time and reducing the complexity of the problem. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneer's utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.

  7. 76 FR 1158 - Auction of 700 MHz Band Licenses Scheduled for July 19, 2011; Comment Sought on Competitive...

    Science.gov (United States)

    2011-01-07

    ... protect against frivolous or insincere bidding and provide the Commission with a source of funds from... CFR 1.1206(b). William W. Huber, Associate Chief, Auctions and Spectrum Access Division, WTB, Federal...

  8. Auction Mechanisms For Allocating Individualized Non-monetary Retention Incentives in Complex Decision Environments: Evaluation Via Laboratory Experimentation

    Science.gov (United States)

    2010-03-01

    33 Lawrence M. Ausubel and Paul Milgrom, Combinatorial Auctions, ed. Peter Cramton, Yoav Shomham, and Richard Steinberg, (Cambridge, MA: MIT...3% 21% Uniform Discriminatory 150 THIS PAGE INTENTIONALLY LEFT BLANK 151 LIST OF REFERENCES Ausubel , Lawrence M., and Paul

  9. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  10. Market Design and Supply Security in Imperfect Power Markets

    DEFF Research Database (Denmark)

    Schwenen, Sebastian

    2014-01-01

    Supply security in imperfect power markets is modelled under different market designs. In a uniform price auction for electricity with two firms, strategic behaviour may leave firms offering too few capacities and unable to supply all realized demand. Market design that relies oncapacity markets...... increases available generation capacities for sufficiently high capacity prices and consequently decreases energy prices. However, equilibrium capacity prices are non-competitive. Capacity markets can increase security of supply, but cannot mitigate market power, which is exercised in the capacity market...... instead of the energy market....

  11. Intelligent Continuous Double Auction method For Service Allocation in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Nima Farajian

    2013-10-01

    Full Text Available Market-oriented approach is an effective method for resource management because of its regulation of supply and demand and is suitable for cloud environment where the computing resources, either software or hardware, are virtualized and allocated as services from providers to users. In this paper a continuous double auction method for efficient cloud service allocation is presented in which i enables consumers to order various resources (services for workflows and coallocation, ii consumers and providers make bid and request prices based on deadline and workload time and in addition providers can tradeoff between utilization time and price of bids, iii auctioneers can intelligently find optimum matching by sharing and merging resources which result more trades. Experimental results show that proposed method is efficient in terms of successful allocation rate and resource utilization.

  12. Biased Random-Key Genetic Algorithms for the Winner Determination Problem in Combinatorial Auctions.

    Science.gov (United States)

    de Andrade, Carlos Eduardo; Toso, Rodrigo Franco; Resende, Mauricio G C; Miyazawa, Flávio Keidi

    2015-01-01

    In this paper we address the problem of picking a subset of bids in a general combinatorial auction so as to maximize the overall profit using the first-price model. This winner determination problem assumes that a single bidding round is held to determine both the winners and prices to be paid. We introduce six variants of biased random-key genetic algorithms for this problem. Three of them use a novel initialization technique that makes use of solutions of intermediate linear programming relaxations of an exact mixed integer linear programming model as initial chromosomes of the population. An experimental evaluation compares the effectiveness of the proposed algorithms with the standard mixed linear integer programming formulation, a specialized exact algorithm, and the best-performing heuristics proposed for this problem. The proposed algorithms are competitive and offer strong results, mainly for large-scale auctions.

  13. Encouraging information sharing to boost the name-your-own-price auction

    Science.gov (United States)

    Chen, Yahong; Li, Jinlin; Huang, He; Ran, Lun; Hu, Yusheng

    2017-08-01

    During a name-your-own-price (NYOP) auction, buyers can learn a lot of knowledge from their socially connected peers. Such social learning process makes them become more active to attend the auction and also helps them make decisions on what price to submit. Combining an information diffusion model and a belief decision model, we explore three effects of bidders' information sharing on the buyers' behaviors and the seller profit. The results indicate that information sharing significantly increases the NYOP popularity and the seller profit. When enlarging the quality or quantity of information sharing, or increasing the spreading efficiency of the network topology, the number of attenders and the seller profit are increased significantly. However, the spread of information may make bidders be more likely to bid higher and consequently lose surplus. In addition, the different but interdependent influence of the successful information and failure information are discussed in this work.

  14. Long-term contract auctions and market power in regulated power industries

    Energy Technology Data Exchange (ETDEWEB)

    Soledad Arellano, M. [School of Government, Universidad Adolfo Ibanez, Diagonal Las Torres 2640, Penalolen, Santiago (Chile); Serra, Pablo [Department of Economics, Universidad de Chile, Diagonal Paraguay 257, Santiago (Chile)

    2010-04-15

    A number of countries with oligopolistic power industries have used marginal cost pricing to set the price of energy for small customers. This course of action, however, does not necessarily ensure an efficient outcome when competition is imperfect. The purpose of this paper is to study how the auction of long-term contracts could reduce market power. We do so in a two-firm, two-technology, linear-cost, static model where demand is summarized by a price inelastic load curve. In this context we show that the larger the proportion of total demand auctioned in advance, the lower are both the contract and the average spot price of energy. (author)

  15. Sellers' hedging incentives at EPA's emission trading auction

    Energy Technology Data Exchange (ETDEWEB)

    Dijkstra, B.R.; Haan, M

    1999-01-08

    Cason (1993) argued that the auction the EPA (Environmental Protection Agency in the USA) used in order to start the market for sulfur allowances, is not efficient. The set-up of the auction gives both buyers and sellers an incentive to understate their valuation of an allowance. In this paper, we show that the sellers' incentives are even more perverse than Cason suggested. In particular, we show that sellers have an incentive to set their ask price equal to zero, while simultaneously hedging their bets by submitting a positive bid. It is not possible to derive the Nash equilibrium for this set-up. If such an equilibrium exists, sellers either set only a positive ask price, or an ask price equal to zero, and a positive bid as well. 14 refs.

  16. Collective induction without cooperation? Learning and knowledge transfer in cooperative groups and competitive auctions.

    Science.gov (United States)

    Maciejovsky, Boris; Budescu, David V

    2007-05-01

    There is strong evidence that groups perform better than individuals do on intellective tasks with demonstrably correct solutions. Typically, these studies assume that group members share common goals. The authors extend this line of research by replacing standard face-to-face group interactions with competitive auctions, allowing for conflicting individual incentives. In a series of studies involving the well-known Wason selection task, they demonstrate that competitive auctions induce learning effects equally impressive as those of standard group interactions, and they uncover specific and general knowledge transfers from these institutions to new reasoning problems. The authors identify payoff feedback and information pooling as the driving factors underlying these findings, and they explain these factors within the theoretical framework of collective induction. ((c) 2007 APA, all rights reserved).

  17. Equilibrium Strategy and Population-Size Effects in Lowest Unique Bid Auctions

    Science.gov (United States)

    Pigolotti, Simone; Bernhardsson, Sebastian; Juul, Jeppe; Galster, Gorm; Vivo, Pierpaolo

    2012-02-01

    In lowest unique bid auctions, N players bid for an item. The winner is whoever places the lowest bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large data set of internet auctions. The theory agrees with the data with striking accuracy for small population-size N, while for larger N a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game.

  18. Report on the behalf of the Foreign Affairs, Defence and Armed Forces Commission on: the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of common bid platforms, and the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of an auction monitor. Nr 171; Rapport fait au nom de la commission des affaires etrangeres, de la defense et des forces armees sur le projet de loi (procedure acceleree) autorisant la ratification de l'accord de passation conjointe de marche en vue de la designation par adjudication de plates-formes d'encheres communes et sur le projet de loi (procedure acceleree) autorisant la ratification de l'accord de passation conjointe de marche en vue de la designation par adjudication d'une instance de surveillance des encheres. No. 171

    Energy Technology Data Exchange (ETDEWEB)

    Boulaud, Didier

    2011-12-07

    This document first presents the currently operating greenhouse gas emission quota trading scheme and its evolution according to which quotas will be put up for auction. Then, it more precisely describes different aspects of this arrangement: general economy of the auction system, common auction platforms, auction monitor, and market procedures. Consequences on the French law are presented. The ratification procedure is discussed

  19. Buying Fields and Marrying Daughters: An Empirical Analysis of Rosca Auctions in a South Indian Village

    OpenAIRE

    Stefan Klonner

    2004-01-01

    A bidding rotating savings and credit association (Rosca) is modeled as a sequence of symmetric-independent-private-value auctions with price-proportional benefits to bidders. We estimate a structural econometric model which, by introducing an altruistic component into each bidder's utility function, allows for socially favorable deviations from the private information, non-altruistic bidding equilibrium. We find that bidding is more altruistic in groups managed by experienced organizers and ...

  20. Buying Fields and Marrying Daughters: Empirical Analysis of Rosca Auctions in a South Indian Village

    OpenAIRE

    Klonner, Stefan

    2003-01-01

    A bidding rotating savings and credit association (Rosca) is modeled as a sequence of symmetricindependent-private-value auctions with price-proportional benefits to bidders. We estimate a structural econometric model which, by introducing an altruistic component into each bidder's utility function, allows for socially favorable deviations from the private information, nonaltruistic bidding equilibrium. We find that bidding is more altruistic in groups managed by experienced organizers and in...

  1. A Centralized Auction Mechanism for the Disability and Survivors Insurance in Chile

    Science.gov (United States)

    Reyes H., Gonzalo

    As part of the pension reform recently approved in Chile, the government introduced a centralized auction mechanism to provide the Disability and Survivors (D&S) Insurance that covers recent contributors among the more than 8 million participants in the mandatory private pension system. This paper is intended as a case study presenting the main distortions found in the decentralized operation of the system that led to this reform and the challenges faced when designing a competitive auction mechanism to be implemented jointly by the Pension Fund Managers (AFP). In a typical bilateral contract the AFP retained much of the risk and the Insurance Company acted in practice as a reinsurer. The process to hire this contract was not competitive and colligated companies ended up providing the service. Several distortions affected competition in the market through incentives to cream-skim members by AFPs (since they bear most of the risk) or efforts to block disability claims. Since the price of this insurance is hidden in the fees charged by AFPs for the administration of individual accounts and pension funds there was lack of price transparency. Since new AFPs have no history of members’ disability and mortality profile the insurance contract acted as a barrier to entry in the market of AFP services, especially when D&S insurance costs reached 50% of total costs. Cross-subsidies between members of the same AFP, inefficient risk pooling (due to pooling occurring at the AFP rather than at the system level) and regulatory arbitrage, since AFPs provided insurance not being regulated as an insurance company, were also present. A centralized auction mechanism solves these market failures, but also gives raise to new challenges, such as how to design a competitive auction that attracts participation and deters collusion. Design features that were incorporated in the regulation to tackle these issues, such as dividing coverage into predefined percentage blocks, are presented

  2. The Use of Reverse Auction Within the U.S. Army

    Science.gov (United States)

    2016-12-01

    approach uses fixed pricing according to the internal price structure of the 18 seller, and market -based pricing is dynamic because it changes in response ...J. SUMMARY This chapter presented the framework for understanding how free markets operate and how economics plays a fundamental role in auction...collection of information is estimated to average 1 hour per response , including the time for reviewing instruction, searching existing data sources

  3. Reverse Auctions im Einkauf : empirische Analyse von Anbieterreaktionen und deren Ursachen

    OpenAIRE

    Schnellbächer, Wolfgang

    2013-01-01

    Die electronic reverse auction (eRA) ist das meistdiskutierte Beschaffungsinstrument der vergangenen Jahre. Einkäufer erhoffen sich von ihrem Einsatz vor allem signifikante Preisreduktionen durch einen erhöhten und transparenten Wettbewerb. Die wissenschaftliche Literatur behandelte primär Fragestellungen nach geeigneten Beschaffungssituationen zur Anwendung des Verhandlungsinstruments und dem optimalen Set-up von eRAs zur Erreichung der angestrebten Preisreduktionen. In jüngeren Untersuchung...

  4. Implementing and Testing Risk Preference Induction Mechanisms in Experimental Sealed Bid Auctions

    OpenAIRE

    Rietz, Thomas A.

    1992-01-01

    Risk preference inducing lottery procedures can serve as valuable tools for experimental economists. However, questioning their effectiveness, experimenters may avoid them even when predictions and conclusions depend crucially on risk preferences. Here, I review risk preference induction attempts in sealed bid auctions, discussing factors that promote or hinder success. Making the procedure very transparent and having subjects learn about it in simple environments promote success. Hysteresis ...

  5. Asymmetric Cooperative Communications Based Spectrum Leasing via Auctions in Cognitive Radio Networks

    Science.gov (United States)

    2011-08-01

    analog circuits for commercial, industrial, and telephony applications. Prior to joining AFRL he worked as a government contractor performing design... transmission in cognitive networks albeit without the assumption of Dynamic 1536-1276/11$25.00 c⃝ 2011 IEEE Report Documentation Page Form ApprovedOMB No. 0704...of error over a transmission bandwidth of . In the following, we first consider the Dynamic Spectrum Leasing auctions for centralized

  6. Optimal pricing using online auction experiments: A P\\'olya tree approach

    OpenAIRE

    George, Edward I.; Hui, Sam K.

    2012-01-01

    We show how a retailer can estimate the optimal price of a new product using observed transaction prices from online second-price auction experiments. For this purpose we propose a Bayesian P\\'olya tree approach which, given the limited nature of the data, requires a specially tailored implementation. Avoiding the need for a priori parametric assumptions, the P\\'olya tree approach allows for flexible inference of the valuation distribution, leading to more robust estimation of optimal price t...

  7. An equilibrium analysis of market selection strategies and fee strategies in competing double auction marketplaces

    OpenAIRE

    Shi, B.; Gerding, E.; Vytelingum, P; Jennings, N

    2013-01-01

    In this paper, we propose a game-theoretic framework for analysing competing double auction marketplaces that vie for traders and make profits by charging fees. Firstly, we analyse the equilibrium strategies for the traders' market selection decision for given market fees using evolutionary game theory. Using this approach, we investigate how traders dynamically change their strategies, and thus, which equilibrium, if any, can be reached. In so doing, we show that, when the same type of fees ...

  8. Multiple Robots Tasks Allocation: An Auction-Based Approach Using Dynamic-Domain RRT

    Science.gov (United States)

    Nazif, Ali Nasri; Iranmanesh, Ehsan; Mohades, Ali

    Consider a 2D environment, in which multiple robots, initially at random configurations, can move. We propose an auction-based method for the allocation of tasks to these robots. We consider tasks as some points in the environment. The environment is occupied with static obstacles, but other moving robots can be considered as dynamic obstacles and may prevent a robot from reaching its goal. So rebidding may be necessary at definite times.

  9. Multi-attribute Reverse Auction Design Based on Fuzzy Data Envelopment Analysis Approach

    Directory of Open Access Journals (Sweden)

    Deyan Chen

    2017-08-01

    Full Text Available Multi-attribute reverse auction is widely used for the procurements of enterprises or governments. To overcome the difficulty of identifying bidding attribute weight and score function of the buyer, the multi-round auction and bidding models with multiple winners are established based on fuzzy data envelopment analysis. The winner determination model of the buyer considers the integrated input-output efficiency of k winners. The bidding strategy of seller is divided into two parts: the first one estimates the weight of the ideal supplier that is thought to be the buyer’s preference; the second one is to calculate the weight of the test supplier which reflects the change trend of current weights and the seller’s weakness. The final predicted weight is the weighted sum of both. On the basis of known weight, the test supplier can improve his efficiency to increase the winning chance in the next round auction. Our models comprise crisp numbers and fuzzy numbers. Finally, a numerical example verifies the validity of the proposed models.

  10. A Hierarchical Auction-Based Mechanism for Real-Time Resource Allocation in Cloud Robotic Systems.

    Science.gov (United States)

    Wang, Lujia; Liu, Ming; Meng, Max Q-H

    2017-02-01

    Cloud computing enables users to share computing resources on-demand. The cloud computing framework cannot be directly mapped to cloud robotic systems with ad hoc networks since cloud robotic systems have additional constraints such as limited bandwidth and dynamic structure. However, most multirobotic applications with cooperative control adopt this decentralized approach to avoid a single point of failure. Robots need to continuously update intensive data to execute tasks in a coordinated manner, which implies real-time requirements. Thus, a resource allocation strategy is required, especially in such resource-constrained environments. This paper proposes a hierarchical auction-based mechanism, namely link quality matrix (LQM) auction, which is suitable for ad hoc networks by introducing a link quality indicator. The proposed algorithm produces a fast and robust method that is accurate and scalable. It reduces both global communication and unnecessary repeated computation. The proposed method is designed for firm real-time resource retrieval for physical multirobot systems. A joint surveillance scenario empirically validates the proposed mechanism by assessing several practical metrics. The results show that the proposed LQM auction outperforms state-of-the-art algorithms for resource allocation.

  11. Control and Assurance in E-Commerce: Privacy, Integrity and Security at eBay

    OpenAIRE

    Rong-Ruey Duh; Karim Jamal; Shyam NMI Sunder

    2001-01-01

    Growth of online auctions and other forms of e-commerce has been hampered by concerns about the privacy, integrity, and security of online transactions. To earn the trust of their participants, new e-commerce organizations, like traditional organizations, have to reach the state of expectations equilibrium or control - a state where the actual behavior of participants corresponds to what others expect them to do. Since e-commerce companies provide electronic platforms where buyers and sellers...

  12. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  13. 9 CFR 3.137 - Primary enclosures used to transport live animals.

    Science.gov (United States)

    2010-01-01

    ... live animals. 3.137 Section 3.137 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION... live animals. No dealer, research facility, exhibitor, or operator of an auction sale shall offer for transportation or transport, in commerce, any live animal in a primary enclosure which does not conform to the...

  14. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  15. "Buy-It-Now" or "Sell-It-Now" Auctions: Effects of Changing Bargaining Power in Sequential Trading Mechanisms

    OpenAIRE

    Grebe, Tim; Ivanova-Stenzel, Radosveta; Kröger, Sabine

    2015-01-01

    We study experimentally the effect of bargaining power in two sequential mechanisms that offer the possibility to trade at a fixed price before an auction. In the “Buy-It-Now” format, the seller has the bargaining power and offers a price prior to the auction; whereas in the “Sell-It-Now” format, it is the buyer. Both formats are extensively used in online and offline markets. Despite very different strategic implications for buyers and sellers, results from our experiment suggest...

  16. Effect of brand and advertising medium on demand for e-cigarettes: Evidence from an experimental auction ?

    OpenAIRE

    Rousu, Matthew C.; O'Connor, Richard; Corrigan, Jay

    2017-01-01

    Print and television advertisements for e-cigarettes are currently legal in the United States. Given that e-cigarettes are a lower-risk alternative to cigarettes, these ads could have a positive public health impact if they motivate smokers to switch to e-cigarettes. However, the public health impact of e-cigarette ads could be negative if ads increase demand for both e-cigarettes and cigarettes. We use experimental auctions –in which participants bid in real auctions and winners pay for the ...

  17. A Heckit Model of Sales Dynamics in Turkish Art Auctions: 2005-2008

    OpenAIRE

    Seçkin, Aylin; ATUKEREN, Erdal

    2017-01-01

    Unsold artworks are excluded from a traditional hedonic price index as no observable price can be attached to them. The question is whether the exclusion of unsold artworks lead to a sample selection bias in the traditionally constructed art price indices. In this paper, we examine the art auction sales performance in Turkey for the period between January 2005 and February 2008 using a unique database which contains 11,212 sales records including unsold items. We employ the two-stage Heckit m...

  18. A Montero auction mechanism for regulating unobserved use of the commons

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn

    , these taxes are vulnerable to collusion and strategic behavior and they generate inefficient entry-exit incentives. To address these disadvantages, I suggest using a Montero (2008)-type auction mechanism to allocate licenses for unobserved use of common resources and to induce compliance with these licenses......Regulating externalities from the use of common resources is often hampered by the regulator’s inability to accurately observe individual firms’ resource use. Allocating resource use through taxes on aggregate use, which often can be observed, has been suggested (Segerson, 1988); however...... through an enforcement tax on the differences between aggregated licenses issued and observed aggregated resource use....

  19. Recommendations on the role of auctions in a new renewable energy directive

    DEFF Research Database (Denmark)

    Kitzing, Lena; Islam, Marco; Soysal, Emilie Rosenlund

    to support renewable energy than other support instruments. The use of auctions entails several new implications that often policy makers have not had to deal with before: ensuring sufficient competition for a well-functioning price formation, avoiding undesired strategic incentives, collusion and other...... market distortions, and importantly dealing with risk of low realisation rates, e.g. caused by underbidding or the existence of non-cost barriers. Often, the specific design solutions for these issues are highly context-specific and what works in one market is not ecessarily applicable to another...... for allocating support of renewables and experiences so far are rather limited and mixed....

  20. Media visibility on the formation of female celebrity: Catarina, a virgin for auction

    Directory of Open Access Journals (Sweden)

    Lígia Campos de Cerqueira Lana

    2013-09-01

    Full Text Available This article analyzes the role of media visibility in the rise of CatherineMigliorini’s celebrity, famous after putting her virginity up for auction oninternet. The history of the case and its main events, texts written by experts, images and statements of Catarina are investigated from the perspective of women’s visibility transformations. Although media critique, the celebrity Catarina displayed expected abilities of women in media visibility, as the possession of a sexy, young and assertive body, able to be used as capital.

  1. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    The inclusion of China, India, Japan, Singapore and Italy as permanent observers in the Arctic Council has increased the international status of this forum significantly. This chapter aims to explain the background for the increased international interest in the Arctic region through an analysis...... of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  2. Improving Fraudster Detection in Online Auctions by Using Neighbor-Driven Attributes

    Directory of Open Access Journals (Sweden)

    Jun-Lin Lin

    2015-12-01

    Full Text Available Online auction websites use a simple reputation system to help their users to evaluate the trustworthiness of sellers and buyers. However, to improve their reputation in the reputation system, fraudulent users can easily deceive the reputation system by creating fake transactions. This inflated-reputation fraud poses a major problem for online auction websites because it can lead legitimate users into scams. Numerous approaches have been proposed in the literature to address this problem, most of which involve using social network analysis (SNA to derive critical features (e.g., k-core, center weight, and neighbor diversity for distinguishing fraudsters from legitimate users. This paper discusses the limitations of these SNA features and proposes a class of SNA features referred to as neighbor-driven attributes (NDAs. The NDAs of users are calculated from the features of their neighbors. Because fraudsters require collusive neighbors to provide them with positive ratings in the reputation system, using NDAs can be helpful for detecting fraudsters. Although the idea of NDAs is not entirely new, experimental results on a real-world dataset showed that using NDAs improves classification accuracy compared with state-of-the-art methods that use the k-core, center weight, and neighbor diversity.

  3. Comparing the performance of the public, social security and private health subsystems in Argentina by core dimensions of primary health care.

    Science.gov (United States)

    Yavich, Natalia; Báscolo, Ernesto Pablo; Haggerty, Jeannie

    2016-06-01

    Most Latin American health systems are comprised of public (PubS), social security (SSS) and private (PrS) subsystems. These subsystems coexist, causing health care fragmentation and population segmentation. To estimate the extent of subsystem cross-coverage in a geographically bounded population (Rosario city) and to compare the subsystems' performance on primary health care (PHC) dimensions. Through a cross-sectional, interviewer-administered survey to a representative sample (n = 822) of the Rosario population, we measured the percentage of cross-coverage (people with usual source of care in one subsystem but also covered by another subsystem) and the health services' performance by core PHC dimensions, as reported by each subsystem's usual users. We compared the subsystems' performance using chi-square analysis and one-way analysis of variance testing. We analyzed whether the observed differences were coherent with the predominant institutional and organizational features of each subsystem. Overall, 39.3% of the population was affiliated with the PubS, 44.8% with the SSS and 15.9% with the PrS. Cross-coverage was reported by 40.6% of respondents. The performance of the PubS was weak on accessibility but strong on person-and-community-oriented care, the opposite of the PrS. The SSS combined the strengths of the other two subsystems. Rosario's health system has a high percentage of cross-coverage, contributing to issues of fragmentation, segmentation, financial inequity and inefficiency. The overall performance of the SSS was better than that of the PrS and PubS, though each subsystem had a particular performance pattern with areas of strength and weakness that were consistent with their institutional and organizational profiles. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  4. Primary health services in Ecuador: comparative costs, quality, and equity of care in Ministry of Health and rural social security facilities.

    Science.gov (United States)

    Robertson, R L; Castro, C E; Gomez, L C; Gwynne, G; Tinajero Baca, C L; Zschock, D K

    1991-01-01

    This study of costs, quality and financial equity of primary health services in Ecuador, based on 1985 data, examines three assumptions, common in international health, concerning Ministry of Health (MOH) and Social Security (SS) programs. The assumptions are that MOH services are less costly than SS services, that they are of lower quality than SS services, and that MOH programs are more equitable in terms of the distribution of funds available for PHC among different population groups. Full costs of a range of primary health services were estimated by standard accounting techniques for 15 typical health care establishments, 8 operated by the MOH and 7 by the rural SS program (RSSP), serving rural and peri-urban populations in the two major geographical regions of Ecuador. Consistent with the conventional premise, MOH average costs were much lower than RSSP costs for several important types of services, especially those provided by physicians. Little difference was found for dental care. The lower MOH physician service costs appeared to be attributable primarily to lower personnel compensation (only partially offset by lesser productivity) and to greater economies of scope. Several measures of the quality of care were applied, with varying results. Based on staff differences and patterns of expenditures on resource inputs, notably drugs, RSSP quality appeared higher, as assumed. However, contrary to expectation, a questionnaire assessment of staff knowledge and procedures favored the MOH for quality. Program equity was judged in terms of per capita budgeted expenditures (additional measures, such as the likelihood of receiving necessary care, would have required household survey data beyond the scope of this program-based study). The results support the assumption of greater MOH financial equity, as its program reveals less variation in budgeted expenditures between different population groups covered. Additional evidence of equity, using other indicators, would

  5. Reputation mechanism: From resolution for truthful online auctions to the model of optimal one-gambler problem

    Energy Technology Data Exchange (ETDEWEB)

    Bradonjic, Milan [Los Alamos National Laboratory

    2009-01-01

    In this paper we study reputation mechanisms, and show how the notion of reputation can help us in building truthful online auction mechanisms. From the mechanism design prospective, we derive the conditions on and design a truthful online auction mechanism. Moreover, in the case when some agents may lay or cannot have the real knowledge about the other agents reputations, we derive the resolution of the auction, such that the mechanism is truthful. Consequently, we move forward to the optimal one-gambler/one-seller problem, and explain how that problem is refinement of the previously discussed online auction design in the presence of reputation mechanism. In the setting of the optimal one-gambler problem, we naturally rise and solve the specific question: What is an agent's optimal strategy, in order to maximize his revenue? We would like to stress that our analysis goes beyond the scope, which game theory usually discusses under the notion of reputation. We model one-player games, by introducing a new parameter (reputation), which helps us in predicting the agent's behavior, in real-world situations, such as, behavior of a gambler, real-estate dealer, etc.

  6. 78 FR 50086 - Notice of Competitive Auction for Solar Energy Development on Public Lands in the State of Colorado

    Science.gov (United States)

    2013-08-16

    ... Bureau of Land Management Notice of Competitive Auction for Solar Energy Development on Public Lands in... applicant to submit a right-of-way (ROW) application and a plan of development for solar energy projects on... solicitations of interest and ROW applications within two designated Solar Energy Zones (SEZ): Los Mogotes East...

  7. 78 FR 21355 - Tribal Mobility Fund Phase I Auction Scheduled for October 24, 2013; Comment Sought on...

    Science.gov (United States)

    2013-04-10

    ... procedures, including information disclosure procedures and methodologies for calculating auction and... of methodologies for determining coverage, and certifications by one or more individuals as to the... the ranking method would likely result in monies remaining available from the budget after identifying...

  8. 75 FR 22792 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Notice and Filing...

    Science.gov (United States)

    2010-04-30

    ... guarantee of business success. iv. Use of Integrated Spectrum Auction System 27. The Commission will make... deadline, such as the acquisition of attributable interests in media of mass communications, may cause... deadline. Thus, any change in control of an applicant, resulting from a merger, for example, will be...

  9. The Auction Behavior of Felling Companies in the Forest Sector. Case Study: the Companies in the Central Region of Romania

    Directory of Open Access Journals (Sweden)

    Antonoaie, V.

    2014-06-01

    Full Text Available As part of the quantitative research from the doctoral thesis “Marketing Strategies and Policies in the Forest Sector”, we have analyzed the behaviour of the managers from felling companies regarding wood auctions in the central area of Romania, more specifically in the Braşov, Sibiu, Harghita, Covasna, Mureş and Alba counties.

  10. 75 FR 28278 - Notice of amendment to Notice of Realty Action: Competitive Online Auction of Public Lands in...

    Science.gov (United States)

    2010-05-20

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR...: 14X5232] Notice of amendment to Notice of Realty Action: Competitive Online Auction of Public Lands in... newspaper and advertisements on local radio and television stations will notify the public of the specific...

  11. 77 FR 32092 - Mobility Fund Phase I Auction Scheduled for September 27, 2012; Notice and Filing Requirements...

    Science.gov (United States)

    2012-05-31

    ... release of the Auction 901 Procedures Public Notice, the Bureaus released an interactive map of the... Bureaus used geographic information system (GIS) software to determine whether the American Roamer data... individual states for the National Broadband Map. In the USF/ICC Transformation Order, the Commission...

  12. The influence of an online auction's product price and e-retailer reputation on consumers' perception, attitude, and behavioral intention.

    Science.gov (United States)

    Wu, Wann-Yih; Huang, Po-Ching; Fu, Chen-Su

    2011-06-01

    Online auctions combine the conventional auction model with information technology. However, information asymmetry within such auctions causes risks and uncertainties that influence consumer purchase intentions. In this study, a 2 (product price: high vs. low) × 2 (e-retailer reputation: high vs. low) experimental design was used to understand whether the product price and e-retailer reputation will influence consumers' perceived risk, attitude toward the website and purchase intention. The results of this study indicate that perceived risk negatively influences consumer attitude toward the website and online purchase intention, while consumer attitude toward the website positively influences purchase intention. Moreover, involvement moderates the influence of product price and e-retailer reputation only on social risk but does not have a significant effect on consumer attitude toward the website. This study contributes to a more comprehensive understanding of online auction users' behavior. Finally, the managerial implications, limitations and future research directions are also provided. © 2011 The Authors. Scandinavian Journal of Psychology © 2011 The Scandinavian Psychological Associations.

  13. 78 FR 24404 - Auction of Lower and Upper Paging Band Licenses Scheduled for July 16, 2013; Notice of Filing...

    Science.gov (United States)

    2013-04-25

    ..., such as members of the press, financial analysts, or others who might become conduits for the... are in place, as in the case for Auction 95, an applicant's statement to the press that it has lost..., electronic files, or audio format) for people with disabilities, send an email to [email protected] or call the...

  14. 76 FR 21350 - Auction of 700 MHz Band Licenses Scheduled for July 19, 2011; Notice and Filing Requirements...

    Science.gov (United States)

    2011-04-15

    .... Accordingly, applicants should use caution in their dealings with other parties, such as members of the press... Auction 92, a qualified bidder's statement to the press that it has lost bidding eligibility and stopped... (technical) at (202) 418-0620. To request materials in accessible formats (Braille, large print, electronic...

  15. Isavuconazole versus voriconazole for primary treatment of invasive mould disease caused by Aspergillus and other filamentous fungi (SECURE): a phase 3, randomised-controlled, non-inferiority trial.

    Science.gov (United States)

    Maertens, Johan A; Raad, Issam I; Marr, Kieren A; Patterson, Thomas F; Kontoyiannis, Dimitrios P; Cornely, Oliver A; Bow, Eric J; Rahav, Galia; Neofytos, Dionysios; Aoun, Mickael; Baddley, John W; Giladi, Michael; Heinz, Werner J; Herbrecht, Raoul; Hope, William; Karthaus, Meinolf; Lee, Dong-Gun; Lortholary, Olivier; Morrison, Vicki A; Oren, Ilana; Selleslag, Dominik; Shoham, Shmuel; Thompson, George R; Lee, Misun; Maher, Rochelle M; Schmitt-Hoffmann, Anne-Hortense; Zeiher, Bernhardt; Ullmann, Andrew J

    2016-02-20

    Isavuconazole is a novel triazole with broad-spectrum antifungal activity. The SECURE trial assessed efficacy and safety of isavuconazole versus voriconazole in patients with invasive mould disease. This was a phase 3, double-blind, global multicentre, comparative-group study. Patients with suspected invasive mould disease were randomised in a 1:1 ratio using an interactive voice-web response system, stratified by geographical region, allogeneic haemopoietic stem cell transplantation, and active malignant disease at baseline, to receive isavuconazonium sulfate 372 mg (prodrug; equivalent to 200 mg isavuconazole; intravenously three times a day on days 1 and 2, then either intravenously or orally once daily) or voriconazole (6 mg/kg intravenously twice daily on day 1, 4 mg/kg intravenously twice daily on day 2, then intravenously 4 mg/kg twice daily or orally 200 mg twice daily from day 3 onwards). We tested non-inferiority of the primary efficacy endpoint of all-cause mortality from first dose of study drug to day 42 in patients who received at least one dose of the study drug (intention-to-treat [ITT] population) using a 10% non-inferiority margin. Safety was assessed in patients who received the first dose of study drug. This study is registered with ClinicalTrials.gov, number NCT00412893. 527 adult patients were randomly assigned (258 received study medication per group) between March 7, 2007, and March 28, 2013. All-cause mortality from first dose of study drug to day 42 for the ITT population was 19% with isavuconazole (48 patients) and 20% with voriconazole (52 patients), with an adjusted treatment difference of -1·0% (95% CI -7·8 to 5·7). Because the upper bound of the 95% CI (5·7%) did not exceed 10%, non-inferiority was shown. Most patients (247 [96%] receiving isavuconazole and 255 [98%] receiving voriconazole) had treatment-emergent adverse events (p=0·122); the most common were gastrointestinal disorders (174 [68%] vs 180 [69%]) and infections and

  16. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks......, the collaboration between science, anthropology and the military, transnational terrorism, and the ethical consequences of security expertise. Together they challenge our understanding of how expertise works and what consequences it has for security politics and international relations. This book...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  17. Food security is related to adult type 2 diabetes control over time in a United States safety net primary care clinic population.

    Science.gov (United States)

    Shalowitz, M U; Eng, J S; McKinney, C O; Krohn, J; Lapin, B; Wang, C-H; Nodine, E

    2017-05-15

    Successful Type 2 diabetes management requires adopting a high nutrient-density diet made up of food items that both meet dietary needs and preferences and can be feasibly obtained on a regular basis. However, access to affordable, nutrient-dense foods often is lacking in poorer neighbourhoods. Therefore, low food security should directly impair glucose control, even when patients have full access to and utilize comprehensive medical management. The present study sought to determine whether food security is related longitudinally to glucose control, over-and-above ongoing medication management, among Type 2 diabetes patients receiving comprehensive care at a Midwestern multi-site federally qualified health centre (FQHC). In this longitudinal observational study, we completed a baseline assessment of patients' food security (using the US Household Food Security Module), demographics (via Census items), and diabetes history/management (using a structured clinical encounter form) when patients began receiving diabetes care at the health centre. We then recorded those patients' A1C levels several times during a 24-month follow-up period. Three hundred and ninety-nine patients (56% with low food security) had a baseline A1c measurement; a subsample of 336 (median age=52 years; 56% female; 60% Hispanic, 27% African American, and 9% White) also had at least one follow-up A1c measurement. Patients with lower (vs higher) food security were more likely to be on insulin and have higher A1c levels at baseline. Moreover, the disparity in glucose control by food security status persisted throughout the next 2 years. Although results were based on one multi-site FQHC, potentially limiting their generalizability, they seem to suggest that among Type 2 diabetes patients, low food security directly impairs glucose control-even when patients receive full access to comprehensive medical management-thereby increasing their long-term risks of high morbidity, early mortality, and high

  18. Design Methods for Embedded Security

    Directory of Open Access Journals (Sweden)

    I. Verbauwhede

    2009-11-01

    Full Text Available Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper we show a typical top-down approach for secure and efficient implementation of embedded systems. We outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing only on two levels - architecture and circuit level - we show how the design can be implemented to be both efficient and secure.

  19. Sustainable development and wordwide con-troversial issues regarding the auction of pollution right

    Directory of Open Access Journals (Sweden)

    Ph. D. Mariana Iovitu

    2010-05-01

    Full Text Available The present study investigates one of the most up-to-date scientific and pragmatic problems faced by the evolution of the human society, by the European Union and by the future of this planet: pollution as externality of the economic growth.The inclusion of the sustainable development objectives in the framework of the ambitious goals of the Lisbon Strategy is launching once again several controversies concerning the analysis of the global auction process of pollution right. Linked to the context, the study considers the economic fact through and with the help of the results of scientific economic research by using the design theory (award of the Swedish Academy for Economy, 2007.We need to mention that the theoretical and practical nature of the study is based upon the recents conclusions of the Copenhagen Summit, underlining the normative-positive report that governs the economy.

  20. Incentives in Multi-dimensional Auctions under Information Asymmetry for Costs and Qualities

    DEFF Research Database (Denmark)

    Papakonstantinou, Athanasios; Bogetoft, Peter

    2013-01-01

    This paper discusses the design of a novel multi-dimensional mechanism which allows a principal to procure a single project or an item from multiple suppliers through a two-step payment. The suppliers are capable of producing different qualities at costs which cannot exceed a certain value...... and the mechanism balances between the costs faced by the suppliers and the benefit the principal achieves from higher qualities. Iniatially, the principal implements a standard second score auction and allocates the project to a single supplier based its reported cost and quality, while then it elicits truthful...... qualities than they reported. We prove that for both mechanisms truthful revelation of costs and qualities is a dominant strategy (weakly for costs) and that they are immune to combined misreporting of both qualities and costs. We also show that the mechanisms are individually rational, and that the optimal...

  1. Effects of scarcity, aesthetics and ecology on wildlife auction prices of large African mammals.

    Science.gov (United States)

    Dalerum, Fredrik; Miranda, María; Muñiz, Cristina; Rodríguez, Plácido

    2018-02-01

    For successful integration of biological conservation into economic markets, economic processes need to capture ecological values. South African wildlife ranching is a tourist-based activity that generates unique information on the economic value of wildlife species. We used public data from South African wildlife auctions to evaluate if annual prices 1991-2012 related to species characteristics associated with scarcity, aesthetics and ecology of South African carnivores and ungulates. While none of the species characteristics influenced carnivore prices, ungulate prices were related to characteristics associated with novelty and aesthetics, which relative importance had increased over time. We raise both ecological and economic concerns for this apparent focus. Our results also suggest a potential importance of non-species-related factors, such as market and buyer characteristics. We encourage further evaluation of the relative influences of species characteristics versus factors that are intrinsically linked to economic processes on price variations in South African wildlife.

  2. Effects of information on young consumers' willingness to pay for genetically modified food: experimental auction analysis.

    Science.gov (United States)

    Kajale, Dilip B; Becker, T C

    2014-01-01

    This study examines the effects of information on consumers' willingness to pay (WTP) for genetically modified food (GMF). We used Vickrey second price experimental auction method for elicitation of consumer WTP for GM potato chips and GM soya-chocolate bar. The sample used in this study was university students from Delhi, India. Four information formats (positive, negative, no information, and combined information about GM technology) were used for the examination. The results show that, when students received the combine information they were willing to pay around 17%-20% premium for GMF and when received the negative information they demanded around 22% discount for GMF. While the positive- and the no-information formats alone have no considerable effect on consumers' WTP for GMF. Overall, our findings suggest that while doing marketing of GMF in India, the best strategy is to provide combined information about GM technology.

  3. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  4. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  5. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  6. The Brazilian experience of incentive of renewable sources expansion by means of electric power auctions; A experiencia brasileira de incentivo a expansao das fontes renovaveis por meio de leiloes de energia eletrica

    Energy Technology Data Exchange (ETDEWEB)

    Viana, Alexandre Guedes [Camara de Comercializacao de Energia Eletrica (CCEE), Sao Paulo, SP (Brazil); Parente, Virginia [Universidade de Sao Paulo (USP), SP (Brazil)

    2010-07-01

    The aim of this paper is to present the Brazilian experience to encourage renewable sources of power generation through the auctions into the Regulated Environment of Contracting. These auctions are subdivided into auctions of existing plants, new plants, alternative sources and structural plants. In this process we observe the structure of the mechanism for contracting new projects of renewable sources without neglecting the low tariffs issues. Thus, the auctions of electricity in Brazil is an alternative to be considered in an attempt to group market mechanisms, low tariffs and incentives to renewable sources of generation. (author)

  7. Low-traffic limit and first-passage times for a simple model of the continuous double auction

    Science.gov (United States)

    Scalas, Enrico; Rapallo, Fabio; Radivojević, Tijana

    2017-11-01

    We consider a simplified model of the continuous double auction where prices are integers varying from 1 to N with limit orders and market orders, but quantity per order limited to a single share. For this model, the order process is equivalent to two M / M / 1 queues. We study the behavior of the auction in the low-traffic limit where limit orders are immediately matched by market orders. In this limit, the distribution of prices can be computed exactly and gives a reasonable approximation of the price distribution when the ratio between the rate of order arrivals and the rate of order executions is below 1 / 2. This is further confirmed by the analysis of the first-passage time in 1 or N.

  8. Cost Uncertainty and Time Overruns in Public Procurement: a Scoring Auction for a Contract with Delay Penalties

    OpenAIRE

    Dosi, Cesare; Moretto, Michele

    2017-01-01

    Drawing on the real-options theory we analyse bidding behaviour in a sealed-bid-first-score procurement auction where suppliers, facing variable production costs, must simultaneously report the contract price and the cost level at which they intend to perform the project. We show that this award mechanism is potentially able to maximize total welfare. Next we look at the time incentives required to ensure compliance with the promised optimal trigger value. We show that ex-post efficiency may ...

  9. An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT.

    Science.gov (United States)

    Chen, Xin; Xing, Lei; Qiu, Tie; Li, Zhuo

    2017-02-16

    The Internet of Things (IoT) is a vision of the upcoming society. It can provide pervasive communication between two or more entities using 4G-LTE (Long Term Evolution) communication technology. In 4G-LTE networks, there are two important problems: helping manage the spectrum demands of IoT devices and achieving much more revenue with the limited resource. This paper proposes a pricing framework to investigate the spectrum leasing in mobile heterogeneous networks with single macrocell and multiple femtocells. We modeled the leasing procedure between the macrocell service provider (MSP) and femtocell holders (FHs) as an auction to motivate the MSP to lease its spectrum resource. All FHs act as the bidders, and the monopolist MSP acts as the auctioneer. In the auction, FHs submit their bids to rent the spectrum resource so that they can make a profit by selling it to their subscribers. The MSP determines the spectrum leasing amount and chooses the winning FHs by solving the dynamic programming-based 0-1 knapsack problem. In our proposed framework, we focus on the spectrum pricing strategy and revenue maximization of the MSP. The simulation results show that the proposed scheme provides effective motivation for the MSP to lease the spectrum to FHs, and both the MSP and FHs can benefit from spectrum leasing.

  10. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Science.gov (United States)

    2010-07-01

    ... PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY CIRCULAR, PUBLIC DEBT SERIES NO. 1-93) General Information § 356.4 What are the book-entry systems... eligible to be held in the receiving system. See Department of the Treasury Circular, Public Debt Series No...

  11. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  12. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  13. 6 essays about auctions: a theoretical and empirical analysis. Application to power markets; 6 Essais sur les encheres: approches theorique et empirique. Application aux marches de l'electricite

    Energy Technology Data Exchange (ETDEWEB)

    Lamy, L

    2007-06-15

    This thesis is devoted to a theoretical and empirical analysis of auction mechanisms. Motivated by allocation issues in network industries, in particular by the liberalization of the electricity sector, it focus on auctions with externalities (either allocative or informational) and on multi-objects auctions. After an introduction which provides a survey of the use and the analysis of auctions in power markets, six chapters make this thesis. The first one considers standard auctions in Milgrom-Weber's model with interdependent valuations when the seller can not commit not to participate in the auction. The second and third chapters study the combinatorial auction mechanism proposed by Ausubel and Milgrom. The first of these two studies proposes a modification of this format with a final discount stage and clarifies the theoretical status of those formats, in particular the conditions such that truthful reporting is a dominant strategy. Motivated by the robustness issues of the generalizations of the Ausubel-Milgrom and the Vickrey combinatorial auctions to environments with allocative externalities between joint-purchasers, the second one characterizes the buyer-sub-modularity condition in a general model with allocative identity-dependent externalities between purchasers. In a complete information setup, the fourth chapter analyses the optimal design problem when the commitment abilities of the principal are reduced, namely she can not commit to a simultaneous participation game. The fifth chapter is devoted to the structural analysis of the private value auction model for a single-unit when the econometrician can not observe bidders' identities. The asymmetric independent private value (IPV) model is identified. A multi-step kernel-based estimator is proposed and shown to be asymptotically optimal. Using auctions data for the anglo-french electric Interconnector, the last chapter analyses a multi-unit ascending auctions through reduced forms. (author)

  14. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  15. Emissions trading from 2013 on. Auctioning of emission permits at the European level; Der Emissionshandel ab 2013. Die Versteigerung der Emissionszertifikate auf europaeischer Ebene

    Energy Technology Data Exchange (ETDEWEB)

    Greb, Tobias

    2011-07-01

    As explained in the present publication, the European Communities have general competence for the initial payable allocation of CO{sub 2} emission permits, determination of the allocation method to be used and execution of the auction. The member states retain their revenue powers. The level of regulatory density of the amending directive conforms to the requirements of essentiality and determinacy. There is nothing in Art. 295 of the EC Treaty (Art. 345 TFEU) that contravenes the reform of the emissions trading scheme. However, its centralised implementation is not in accord with the principles of subsidiarity and proportionality. It is not beyond the capacity of the member states to each carry out the auction themselves, nor would its centralized execution provide an integration benefit over a decentralised procedure (provided the auctioning rules were defined in sufficient detail). Moreover, there is nothing in the goals pursued with the auction to necessitate its centralised execution. The adequacy of auctioning as an allocation method must be judged on the basis of the participatory rights of the plant operators concerned. These derive primarily from the right of equality, modified by aspects of the right of liberty. The European Court of Justice is examining the commensurability of the procedure against the general principle of equality, giving due consideration also to the scheme's impact on the liberty rights of those discriminated by it.

  16. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  17. A Novel Electricity Transaction Mode of Microgrids Based on Blockchain and Continuous Double Auction

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-11-01

    Full Text Available The installed capacity of distributed generation (DG based on renewable energy sources has increased continuously in power systems, and its market-oriented transaction is imperative. However, traditional transaction management based on centralized organizations has many disadvantages, such as high operation cost, low transparency, and potential risk of transaction data modification. Therefore, a decentralized electricity transaction mode for microgrids is proposed in this study based on blockchain and continuous double auction (CDA mechanism. A buyer and seller initially complete the transaction matching in the CDA market. In view of the frequent price fluctuation in the CDA market, an adaptive aggressiveness strategy is used to adjust the quotation timely according to market changes. DG and consumer exchange digital certificate of power and expenditure on the blockchain system and the interests of consumers are then guaranteed by multi-signature when DG cannot generate power due to failure or other reasons. The digital certification of electricity assets is replaced by the sequence number with specific tags in the transaction script, and the size of digital certification can be adjusted according to transaction energy quantity. Finally, the feasibility of market mechanism through specific microgrid case and settlement process is also provided.

  18. Simulation Optimization of Search and Rescue in Disaster Relief Based on Distributed Auction Mechanism

    Directory of Open Access Journals (Sweden)

    Jian Tang

    2017-11-01

    Full Text Available In this paper, we optimize the search and rescue (SAR in disaster relief through agent-based simulation. We simulate rescue teams’ search behaviors with the improved Truncated Lévy walks. Then we propose a cooperative rescue plan based on a distributed auction mechanism, and illustrate it with the case of landslide disaster relief. The simulation is conducted in three scenarios, including “fatal”, “serious” and “normal”. Compared with the non-cooperative rescue plan, the proposed rescue plan in this paper would increase victims’ relative survival probability by 7–15%, increase the ratio of survivors getting rescued by 5.3–12.9%, and decrease the average elapsed time for one site getting rescued by 16.6–21.6%. The robustness analysis shows that search radius can affect the rescue efficiency significantly, while the scope of cooperation cannot. The sensitivity analysis shows that the two parameters, the time limit for completing rescue operations in one buried site and the maximum turning angle for next step, both have a great influence on rescue efficiency, and there exists optimal value for both of them in view of rescue efficiency.

  19. Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhu Han

    2009-01-01

    Full Text Available Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks, forms virtual MIMO system, and provides diversity gains. In this paper, wireless video transmission protocols are proposed, in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination, and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation, configuration of side information, subject to bandwidth and power constraints. For multiuser cases, most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition, it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.

  20. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores

    Science.gov (United States)

    Dalerum, Fredrik; Miranda, Maria

    2016-02-01

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated.

  1. Evaluating the impacts of farmers' behaviors on a hypothetical agricultural water market based on double auction

    Science.gov (United States)

    Du, Erhu; Cai, Ximing; Brozović, Nicholas; Minsker, Barbara

    2017-05-01

    Agricultural water markets are considered effective instruments to mitigate the impacts of water scarcity and to increase crop production. However, previous studies have limited understanding of how farmers' behaviors affect the performance of water markets. This study develops an agent-based model to explicitly incorporate farmers' behaviors, namely irrigation behavior (represented by farmers' sensitivity to soil water deficit λ) and bidding behavior (represented by farmers' rent seeking μ and learning rate β), in a hypothetical water market based on a double auction. The model is applied to the Guadalupe River Basin in Texas to simulate a hypothetical agricultural water market under various hydrological conditions. It is found that the joint impacts of the behavioral parameters on the water market are strong and complex. In particular, among the three behavioral parameters, λ affects the water market potential and its impacts on the performance of the water market are significant under most scenarios. The impacts of μ or β on the performance of the water market depend on the other two parameters. The water market could significantly increase crop production only when the following conditions are satisfied: (1) λ is small and (2) μ is small and/or β is large. The first condition requires efficient irrigation scheduling, and the second requires well-developed water market institutions that provide incentives to bid true valuation of water permits.

  2. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  3. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  4. Control system of the inspection robots group applying auctions and multi-criteria analysis for task allocation

    Science.gov (United States)

    Panfil, Wawrzyniec; Moczulski, Wojciech

    2017-10-01

    In the paper presented is a control system of a mobile robots group intended for carrying out inspection missions. The main research problem was to define such a control system in order to facilitate a cooperation of the robots resulting in realization of the committed inspection tasks. Many of the well-known control systems use auctions for tasks allocation, where a subject of an auction is a task to be allocated. It seems that in the case of missions characterized by much larger number of tasks than number of robots it will be better if robots (instead of tasks) are subjects of auctions. The second identified problem concerns the one-sided robot-to-task fitness evaluation. Simultaneous assessment of the robot-to-task fitness and task attractiveness for robot should affect positively for the overall effectiveness of the multi-robot system performance. The elaborated system allows to assign tasks to robots using various methods for evaluation of fitness between robots and tasks, and using some tasks allocation methods. There is proposed the method for multi-criteria analysis, which is composed of two assessments, i.e. robot's concurrency position for task among other robots and task's attractiveness for robot among other tasks. Furthermore, there are proposed methods for tasks allocation applying the mentioned multi-criteria analysis method. The verification of both the elaborated system and the proposed tasks' allocation methods was carried out with the help of simulated experiments. The object under test was a group of inspection mobile robots being a virtual counterpart of the real mobile-robot group.

  5. The cost of inaction. Auctioning revenues under different climate ambition scenarios for the EU emissions trading scheme

    Energy Technology Data Exchange (ETDEWEB)

    Hermann, Hauke; Graichen, Verena

    2012-11-06

    Compared to the reference scenario auctioning revenues increase for all coun-tries in all action scenarios, even in the backloading scenario. If the EU continues with its current 20% emission reduction target until 2020, the revenue losses for European Member States will be in the range of Euro{sub 2012} 62 billion (compared to revenues in the 25% domestic scenario) and Euro{sub 2012} 78 billion (compared to revenues in the 30% domestic scenario). Overall the impact of reduced auctioning quantities and higher climate targets on industrial competitiveness is very limited and will be compensated. The sectors concerned have enjoyed over allocation in the past. From 2013 onwards they will receive 100% free allocation (based on benchmarks). A compensation mechanism for higher electricity prices has also been established. The proposal by the Commission which includes the back-loading measure is a first step forward; however, the respective amount of allowances should be back-loaded for a period of a decade or more. It would be best to retire the back-loaded allowances at the earliest point in time. This first move should be complemented by the adoption of higher reduction targets since previous re-search has clearly shown that a stand-alone back-loading approach will not be sufficient to solve the surplus problem and restore a robust CO{sub 2} price signal. Considering that the EU ETS Directive includes special provisions on redistribu-tion designed to support Central and Eastern European countries, these Member States would benefit more (compared to other Member States) from an in-crease in auctioning revenues even without introducing additional redistribution mechanisms under the ETS.

  6. The Interplay of Virtual Communities: A Multiple Case Study of E-Retailers in Yahoo E-Auctions

    Directory of Open Access Journals (Sweden)

    Julia Zhi-Xian Zhao

    2012-06-01

    Full Text Available This study investigated how businesses operate e-shops in a transaction-oriented virtual community. This research employed a multiple case study approach by observing three cases of e-retailers, as being new e-commerce initiates, operating their businesses on the Yahoo! e-auction website. The results showed that e-shops displaying amusing stories can attract site visitors and “spick and span” e-shop design format can be helpful for converting visitors into buyers.

  7. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  8. 12 CFR 619.9010 - Additional security.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan. ...

  9. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  10. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  11. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  12. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  13. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  14. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  15. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  16. European energy security : Challenges and green opportunities

    OpenAIRE

    Heshmati, Almas; Abolhosseini, Shahrouz

    2017-01-01

    This research reviews relevant literature on the current state and effectiveness of developing renewable energy on energy security in general, and on energy security in the European Union in particular. The paper elaborates on primary energy import sources, possible alternatives, and how energy security is affected by the sources of supply. It also gives an analysis of the effects of the Ukrainian crisis, the isolation of Iran on diversification sources, and on European energy security. It ex...

  17. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  18. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  19. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  20. Secure Directories

    OpenAIRE

    Chadwick, David W.

    2000-01-01

    This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol. Security can be provided by three functions: an application level firewall, an authentication mechanism, and an access control scheme. A description of the X.500 and LDAP access control models is presented followed by the authentication method...

  1. Estimating the impact of various menu labeling formats on parents' demand for fast-food kids' meals for their children: An experimental auction.

    Science.gov (United States)

    Hobin, Erin; Lillico, Heather; Zuo, Fei; Sacco, Jocelyn; Rosella, Laura; Hammond, David

    2016-10-01

    This study experimentally tested whether parents' demand for fast-food kids' meals for their children is influenced by various menu labeling formats disclosing calorie and sodium information. The study also examined the effect of various menu labeling formats on parents' ability to identify fast-food kids' meals with higher calorie and sodium content. Online surveys were conducted among parents of children aged 3-12. Parents were randomized to view 1 of 5 menu conditions: 1) No Nutrition Information; 2) Calories-Only; 3) Calories + Contextual Statement (CS); 4) Calories, Sodium, + CS; and, 5) Calorie and Sodium in Traffic Lights + CS. Using an established experimental auction study design, parents viewed replicated McDonald's menus according to their assigned condition and were asked to bid on 4 Happy Meals. A randomly selected price was chosen; bids equal to or above this price "won" the auction, and bids less than this price "lost" the auction. After the auction, participants were asked to identify the Happy Meal with the highest calories and sodium content. Adjusting for multiple comparisons and covariates, the Calories, Sodium, + CS menu had a mean attributed value across all 4 Happy Meals which was 8% lower (-$0.31) than the Calories + CS menu (p fast-food kids' meals and better support parents in making more informed and healthier food choices for their children. Copyright © 2016. Published by Elsevier Ltd.

  2. Choosing between Auctions and Negotiations in Online B2B Markets for IT Services: The Effect of Prior Relationships and Performance

    NARCIS (Netherlands)

    U.L. Radkevitch (Uladzimir); H.W.G.M. van Heck (Eric); O.R. Koppius (Otto)

    2008-01-01

    textabstractThe choice of contract allocation mechanism in procurement affects such aspects of transactions as information exchange between buyer and supplier, supplier competition, pricing and, eventually, performance. In this study we investigate the buyer’s choice between reverse auctions and

  3. The Wasteland Auction Policy in Northwest China: Solving Environmental Degradation and Rural Poverty? / Rural Development in Transitional China: A Special Issue

    NARCIS (Netherlands)

    Ho, P.P.S.

    2003-01-01

    In order to relieve rural poverty and solve the problem of soil and water erosion on marginal land, various provinces and regions throughout China proclaimed a new policy in the late 1980s and early 1990s. This 'Four Wastelands Auction Policy' attempts to boost the development of land of low

  4. A Virtual Field Trip to the Real World of Cap and Trade: Environmental Economics and the EPA SO[subscript 2] Allowance Auction

    Science.gov (United States)

    Lewis, Lynne Y.

    2011-01-01

    In the spring of 2001, Bates College Environmental Economics classes bought their first sulfur dioxide emissions allowance at U.S. Environmental Protection Agency's annual auction, then conducted by the Chicago Board of Trade. In the spring of 2010, they bought their 22nd through 34th allowances. This article describes a three-part method for…

  5. Varying the number of bidders in the first-price sealed-bid auction: experimental evidence for the one-shot game

    NARCIS (Netherlands)

    Füllbrunn, S.C.; Neugebauer, T.

    2013-01-01

    The paper reports experimental data on the behavior in the first-price sealed-bid auction for a varying number of bidders when values and bids are private information. This feedback-free design is proposed for the experimental test of the one-shot game situation. We consider both within-subjects and

  6. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  7. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  8. Electric energy auctions in Brazil and its effect on emissions of greenhouse gases by the electric sector; Leiloes de energia eletrica no Brasil e sua influencia nas emissoes de gases de efeito estufa pelo setor eletrico

    Energy Technology Data Exchange (ETDEWEB)

    Alpire, Ricardo; Pereira, Osvaldo Livio Soliano [Universidade Salvador (UNIFACS), BA (Brazil)

    2010-07-01

    The result of the auctions of electricity, after the new regulatory framework in 2004, has shown the increased participation of fossil sources of thermal generation, contributing to increased emission of greenhouse gases by the Brazilian Electricity Sector. This article aims to analyze the correlation between growth in electric generation sector and rising greenhouse gases, especially through the study of the winning projects of electric power auctions conducted with the advent of the New Institutional Model of the Power Sector from 2004, comparing with the existing policies and prospects of the next auction of the electric sector. (author)

  9. Android Security Analysis

    Science.gov (United States)

    2016-03-01

    past lessons learned from traditional computing platforms. Most notably, Android provides a sandbox for applications (hereinafter “apps") which...static analysis checks have been merged into the Android Open Source Project’s lint tool. They are present in the Android Studio 2.0 beta release...security issues). Lint is integrated into Android Studio and Eclipse, the primary graphical environments used by Android app developers. Lint is also

  10. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  11. Toward better usability, security, and privacy of information technology: report of a workshop

    National Research Council Canada - National Science Library

    Steering Committee on the Usability, Security, and Privacy of Computer Systems; National Research Council

    .... Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users...

  12. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe......, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following...... World War I it is not surprising that a salient feature of the defence debate is aversion against armed conflict. The Wilsonian agenda of a new system of collective security featuring prominently in the peace talks as well as in European debate generally does indeed have ramifications in Danish...

  13. Federation for a Secure Enterprise

    Science.gov (United States)

    2016-09-10

    be stopped at the front door , to a distributed security system that eliminates or mitigates many of the primary vulnerability points inherent with...differences do not open up large security holes or prevent large groups of entities from receiving proper access. Shortcuts and workarounds may be...receiving are the only entities that know about the transaction. In this case shared information may be fingerprinted or steganographically imprinted for

  14. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  15. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  16. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in

  17. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  18. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  19. Effect of brand and advertising medium on demand for e-cigarettes: Evidence from an experimental auction

    Directory of Open Access Journals (Sweden)

    Matthew C. Rousu

    2017-09-01

    Full Text Available Print and television advertisements for e-cigarettes are currently legal in the United States. Given that e-cigarettes are a lower-risk alternative to cigarettes, these ads could have a positive public health impact if they motivate smokers to switch to e-cigarettes. However, the public health impact of e-cigarette ads could be negative if ads increase demand for both e-cigarettes and cigarettes. We use experimental auctions –in which participants bid in real auctions and winners pay for the items they purchase – to study the effect of print and TV e-cigarettes ads on demand for the brand from the ad, for another e-cigarettes brand, and for cigarettes. We ran experiments with 288 Pennsylvania smokers in November 2014–March 2015 and we found that in cases where an ad affects demand for e-cigarettes, the ad moves demand for cigarettes in the same direction. For example, the Blu print ad increases demand for Blu e-cigarettes and cigarettes among non-white participants. The Vuse TV ad reduces demand for both types of e-cigarettes and for cigarettes. We also find that non-white participants are willing to pay more for e-cigarettes in the absence of advertising, and that smokers who worry most about their health are willing to pay more for e-cigarettes. The results of this study point to the need for greater scrutiny of advertising for e-cigarette products such that they do not also induce demand for tobacco cigarettes.

  20. Cryptographic Combinatorial Securities Exchanges

    Science.gov (United States)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  1. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  2. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  3. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  4. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  5. Secure E-mailing Between Physicians and Patients

    OpenAIRE

    Garrido, Terhilda; Meng, Di; Wang, Jian J.; Palen, Ted E; Kanter, Michael H.

    2014-01-01

    Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health c...

  6. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  7. Potential benefits of selling by auction the CIP 6 energy; Effetti della vendita tramite asta dell'energia CIP 6

    Energy Technology Data Exchange (ETDEWEB)

    Campidoglio, C. [Istituto per la Ricerca Sociale, Milan (Italy). Osservatorio Energia

    2000-12-01

    This paper analyses the potential benefits of selling by auction the CIP 6 energy. This would both reduce the supply shortage and the prices on the eligible market, increase competition on the contract-for-difference market, indicate a clear price to which regulated energy charges could be indexed, thus extending the auction benefits to the franchise market to avoid the reintroduction of cross-subsidies. [Italian] L'articolo analizza i possibili benefici della vendita tramita asta dell'energia CIP 6. In particolare, l'asta ridurrebbe la scarsita' d'offerta e quindi i pressi sul mercato libero, aumenterebbe la concorrenza nel mercato dei contratti per differenza, fornirebbe un prezzo chiaro a cui indicizzare il prezzo dell'energia in tariffa, estendendo i benefici dell'asta sul mercato vincolato ed evitando la reintroduzione di sussidi incrociati.

  8. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  9. Innovations in Defense Acquisition Auctions: Lessons Learned and Alternative Mechanism Designs

    Science.gov (United States)

    2008-02-21

    566,725 25 54—Prefabricated Structures and Scaffolding $2,198,937 17 55—Lumber, Millwork, Plywood, and Veneer $426,995 8 56—Construction and Building...Fixtures and Lamps $632,231 29 3—Alarm, Signal and Security Detection Systems $11,826,216 296 65—Medical, Dental , and Veterinary Equipment and

  10. Allocation scenarios for evaluation of strategies in electric power auctions; Atribuicao de cenarios para avaliacoes de estrategias em leiloes de energia eletrica

    Energy Technology Data Exchange (ETDEWEB)

    Munhoz, Fernando C.; Correia, Tiago B.; Correia, Paulo B. [Universidade Estadual de Campinas (UNICAMP), Campinas, SP (Brazil). Faculdade de Engenharia Mecanica. Dept. de Energia]. E-mail: fcolli@fem.unicamp.br

    2004-07-01

    The reform of the Brazilian energy sector established the competition in the sectors of generation and marketing of electric power. The electric power, then, went to be negotiated through contracts in a mixed model with the presence of private and state agents. There are two types of market for the contracts of energy: the bilateral and spot. The focus of this work is on the bilateral market. In Brazil, auctions are being used to negotiate bilateral contracts. The objective of this work is to analyze, through scenarios and the theory of a portfolio, in which contracts one company that generating power must allocate their bids in the auction for the sale of electric power, organized by the Mercado Atacadista de Energia (MAE), to maximize their expected utility. This analysis also covers the risk and expected return. The work described here is conducted in point of view of a vendor and outlines strategies for bids developed for a double auction with participants identified. The result of the model is established through a optimal allocation for bids from the vendors, minimizing the risk given a fixed rate of return. The model gives probabilities for each scenario and uses techniques of optimization with the use of quadratic programming to find the solution to the problem.

  11. Sustainable woodfuel for food security

    NARCIS (Netherlands)

    Sooyeon, Laura Jln; Schure, J.M.; Ingram, V.J.; Yoo, Byoung Il; Reeb, Dominique; Xia, Zuzhang; Perlis, Andrea; Nordberg, Mats; Campbell, Jeffrey; Muller, Eva

    2017-01-01

    With food insecurity, climate change and deforestation and forest degradation remaining key global issues, this paper highlights the role of sustainable woodfuel in improving food security. Food insecurity and a high dependence on woodfuel as a primary cooking fuel are characteristics common to

  12. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  13. When trust defies common security sense.

    Science.gov (United States)

    Williams, Patricia A H

    2008-09-01

    Primary care medical practices fail to recognize the seriousness of security threats to their patient and practice information. This can be attributed to a lack of understanding of security concepts, underestimation of potential threats and the difficulty in configuration of security technology countermeasures. To appreciate the factors contributing to such problems, research into general practitioner security practice and perceptions of security was undertaken. The investigation focused on demographics, actual practice, issues and barriers, and practitioner perception. Poor implementation, lack of relevant knowledge and inconsistencies between principles and practice were identified as key themes. Also the results revealed an overwhelming reliance on trust in staff and in computer information systems. This clearly identified that both cultural and technical attributes contribute to the deficiencies in information security practice. The aim of this research is to understand user needs and problems when dealing with information security practice.

  14. Natural gas ballast requirement to allow participation of thermal plants in the new energy auctions: analysis and proposals; Requisito de lastro de gas natural para viabilizar a participacao de termeletricas nos leiloes de energia nova: analise e propostas

    Energy Technology Data Exchange (ETDEWEB)

    Avila, Pedro Luis de; Bezerra, Bernardo Vieira; Barroso, Luiz Augusto Nobrega; Pereira, Mario Veiga; Rosenblatt, Jose [PSR, Rio de Janeiro, RJ (Brazil)

    2012-07-01

    Since the first New Energy Auction (LEN), held in December 2005, there has been a continuous process of improving the auction rules and mechanism. For the specific case of gas-fired plants, a significant change was observed between the LEN A-3/2011 and LEN A-5/2011, and refers to the need of natural gas ballast for candidate projects in the auction. This rule was introduced by ANP Resolution No. 52, which establishes that the gas supply agreements must be backed up by proven reserves (analogous to the requirement in the power sector contracts of physical guarantee backup), and Ordinance MME No. 21/2008, which deals with power plants qualification for the new energy auctions. The latter was amended by MME Ordinance No. 514, which requires proven natural gas reserves to support the GSA of all candidate projects in a LEN. In other words, the gas supplier now has to prove that there are sufficient gas reserves to meet requirements of all candidate project in an auction, regardless of the plausibility of their engagement in the auction. In this context, the present study discusses these issues and has as main contributions: (I) a review of current regulations on contract ballast in the Brazilian natural gas sector, (II) a proposal to conciliate the need of fuel supply contract ballast to the dynamics of the natural gas sector, and (III) a proposal to conciliate the need for fuel contract ballast to the contracting process of the thermoelectric power in the new energy auctions. These contributions aim at a better integration between the sectors of natural gas and electricity in Brazil, leading to a more efficient use of resources and infrastructure development. (author)

  15. Detection of equine herpesvirus-4 and physiological stress patterns in young Thoroughbreds consigned to a South African auction sale.

    Science.gov (United States)

    Badenhorst, Marcha; Page, Patrick; Ganswindt, Andre; Laver, Peter; Guthrie, Alan; Schulman, Martin

    2015-06-02

    The prevalence of equine herpesvirus types-1 and -4 (EHV-1 and -4) in South African Thoroughbreds at auction sales is currently undefined. Commingling of young Thoroughbreds from various populations together with physiological stress related to their transport and confinement at a sales complex, may be associated with shedding and transmission of EHV-1 and -4. This prospective cohort study sampled 90 young Thoroughbreds consigned from eight farms, originating from three provinces representative of the South African Thoroughbred breeding demographic to a sales complex. Nasal swabs for quantitative real-time polymerase chain reaction (qPCR) assay to detect EHV-1 and -4 nucleic acid and blood samples for enzyme-linked immunosorbent assay for EHV-1 and -4 antibodies were collected from all horses on arrival and departure. Additional nasal swabs for qPCR were obtained serially from those displaying pyrexia and, or nasal discharge. Daily faecal samples were used for determination of faecal glucocorticoid metabolite (FGM) concentrations as a measurement of physiological stress and these values were modelled to determine the factors best explaining FGM variability. EHV-4 nucleic acid was detected in 14.4 % and EHV-1 from none of the animals in the study population. Most (93.3 %) and very few (1.1 %) of this population showed antibodies indicating prior exposure to EHV-4 and EHV-1 respectively. Pyrexia and nasal discharge were poor predictors for detecting EHV-4 nucleic acid. The horses' FGM concentrations increased following arrival before decreasing for most of the remaining study period including the auction process. Model averaging showed that variation in FGM concentrations was best explained by days post-arrival and transport duration. In this study population, sales consignment was associated with limited detection of EHV-4 nucleic acid in nasal secretions, with most showing prior exposure to EHV-4 and very few to EHV-1. The physiological stress response shown by

  16. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  17. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  18. Lessons from the first auction of carbon credits in Brazil; Licoes do primeiro leilao de creditos de carbono no Brasil

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, Osvaldo Soliano; Andrade, Carla; Goncalves, Gustavo Mano [Universidade Salvador (UNIFACS), BA (Brazil). Mestrado em Regulacao da Industria de Energia], e-mail: osoliano@unfacs.br, e-mail: carlasap@hotmail.com, e-mail: gmano@terra.com.br

    2008-07-01

    The Kyoto Protocol, of 1997, foresaw three mechanisms by means of which the market could contribute for the reduction of emissions of greenhouse gases worldwide. The only one of these mechanisms that allows the participation of the countries not listed in the Annex I of the United Nations Framework Convention on Climate Change is the Clean Development Mechanism - CDM. CDM is an important opportunity for these countries to develop projects of emissions reduction and to generate incomes to be applied in projects of sustainable social and environmental improvements. This article offers an analysis of the antecedents and the results of the first auction of Certified Emission Reductions (CER) carried out in Brazil, by 'Bolsa de Mercadorias and Futuros - BM and F', in September 26, 2007, in order to demonstrate to the success of the initiative and its utility for the future of the preservation actions and environmental improvements in the country, also displaying the criticisms of some environmentalist sectors due to the multiplication of landfills as result of economic incentive of the CER generation. (author)

  19. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  20. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  1. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  2. 49 CFR 1542.201 - Security of the secured area.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section...

  3. Techniques Used in String Matching for Network Security

    OpenAIRE

    Jamuna Bhandari

    2014-01-01

    String matching also known as pattern matching is one of primary concept for network security. In this area the effectiveness and efficiency of string matching algorithms is important for applications in network security such as network intrusion detection, virus detection, signature matching and web content filtering system. This paper presents brief review on some of string matching techniques used for network security.

  4. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  5. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  6. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  7. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  8. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  9. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  10. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  11. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  12. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  13. Practical unix & internet security

    National Research Council Canada - National Science Library

    Garfinkel, Simson; Spafford, Gene; Schwartz, Alan

    2003-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Part I. Computer Security Basics 1. Introduction: Some Fundamental Questions What Is Computer Security? What Is an Operating System? What Is a...

  14. Practical unix & internet security

    National Research Council Canada - National Science Library

    Garfinkel, Simson; Spafford, Gene; Schwartz, Alan

    2003-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Part I. Computer Security Basics 1. Introduction: Some Fundamental Questions What Is Computer Security? What Is an Operating System? What Is a Deployment...

  15. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  16. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  17. Declining job security level and workers' perfomance in selected ...

    African Journals Online (AJOL)

    The study assessed bank workers' level of job security and also investigated the relationship between job security level and job performance among employees of the banks. The study adopted cross-sectional research design where primary and secondary data were sourced. Primary data were obtained through both ...

  18. Protein security and food security in China

    Directory of Open Access Journals (Sweden)

    Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

    2015-06-01

    Full Text Available Food security, the need to meet nutritional requirements, and four main problems for food protein security in China are analyzed. From the perspective of residentsrsquo; nutritional requirements and balanced dietary patterns, the conclusion is that food security in China is in essence dependent on protein production and security of supply and that fat and carbohydrates supply in China can reach self-sufficiency. Considering the situation of food protein production and consumption in China, policy suggestions are made, which could ensure a balanced supply and demand for food protein and food security in China.

  19. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  20. Auction of electricity trading capacity at State frontiers. An offence against the European legal free movement of goods and the duty prohibition?; Versteigerung von Stromdurchleitungskapazitaeten an Staatsgrenzen. Ein Verstoss gegen die europarechtliche Warenverkehrsfreiheit und das Zollverbot?

    Energy Technology Data Exchange (ETDEWEB)

    Toedtmann, Ulrich [Anwaltskanzlei Eimer Heuschmid Mehle, Bonn (Germany); Kaluza, Anna-Lena [Gleiss Lutz Rechtsanwaelte, Frankfurt am Main (Germany)

    2011-08-15

    At the borders of most Member States the capacity for the power transfer across the border clearly is undersized. With its guidelines on electricity regulation in the year 2003, the European Commission has established an auction procedure for a bottleneck management at border interconnectors. Cross-border current flows are more expensive. A cross-border trade of electricity thus is prevented. Instead of today's illegal auction procedure, it is obvious to proceed by competition or other cost-neutral distribution processes. Then, each applicant would have the same chance to receive the contract for a limited capacity without the expensive cross-border traffic.

  1. Keanekaragaman Jenis Gastropoda di Sekitar Tempat Pelelangan Ikan (TPI Parit 7 Desa Tungkal I Tanjung Jabung Barat (Species Diversity of Gastropods around Parit Fish Auction, Tungkal I Village, West Tanjung Jabung

    Directory of Open Access Journals (Sweden)

    NURRUDIN NURRUDIN

    2015-09-01

    Full Text Available The objective of this research is to determine the gastropod species diversity aroundParit 7 fish auction, Tungkal 1 Village, West Tanjung Jabung. The research found 208 individuals of15 gastropods species: Cerithidea obtusa, Cerithidea alata, Cerithidea cingulata, Telescopiumtelescopium, Telescopium mauritsi, Littoraria melanostoma, Littoraria conica, Littoraria scabra,Nerita balteata, Neritina violacea, Neritina cornucopia, Stramonita gradata, Chicoreus capucinus,Cassidula aurisfelis, and Ellobium aurisjudae. The research concluded that the gastropod speciesdiversity around Parit 7 fish auction Tungkal 1 Village West Tanjung Jabung classified as mediumdue to H' index ranged from 1.79 to 2.28 and there is no dominant species.

  2. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  3. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  4. From Secure Memories to Smart Card Security

    Science.gov (United States)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  5. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  6. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  7. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  8. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  9. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  10. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...

  11. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  12. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  13. Using of electric power auctions in the Brazilian energy sector; A utilizacao de leiloes de energia eletrica no setor eletrico brasileiro

    Energy Technology Data Exchange (ETDEWEB)

    Almeida, Luis Henrique Bassi [Agencia Nacional de Energia Eletrica (ANEEL), Brasilia, DF (Brazil)]. E-mail: lhbassi@aneel.gov.br; Camargo, Ivan Marques de Toledo [Universidade de Brasilia (UnB), DF (Brazil)]. E-mail: ivancamargo@unb.br

    2006-07-01

    The Brazilian power industry has undergone fundamental institutional changes in order to introduce competition in generation segment by allowing more flexibility to the electricity trading arrangements since mid 90. These reforms were aimed at increasing economic efficiency and both cost and energy price reduction. The restructuring process requested a highly complex legal framework in order to: ensure the necessary investments for the expansion of power infrastructure; stimulate the participation of private capital; and guarantee power supply adequacy at desired safety and reliability levels. The electricity rationing, occurred in 2001, was a result of: lack of investments, growing demand and supply vulnerability to adverse hydrological shocks. As a consequence, the Brazilian Government initiated a wide debate concerning the loopholes in the implanted model as well as the improvements needed to be adopted. The refinement of the electricity trading arrangements is an important aspect of the electric sector model revitalization. It resulted in the implantation of energy auctions aiming at increasing transactions transparency as well as establishing a long run energy price market reference and promoting market efficiency and competition. This paper analyses the implementation of energy auctions as a mechanism for trading power purchase agreements in the long term. It also discusses the Brazilian power industry restructuring process, in the face of the distribution utilities' obligation to purchase power for their captive customers. (author)

  14. Automated Linear Function Submission-Based Double Auction as Bottom-up Real-Time Pricing in a Regional Prosumers’ Electricity Network

    Directory of Open Access Journals (Sweden)

    Tadahiro Taniguchi

    2015-07-01

    Full Text Available A linear function submission-based double auction (LFS-DA mechanism for a regional electricity network is proposed in this paper. Each agent in the network is equipped with a battery and a generator. Each agent simultaneously becomes a producer and consumer of electricity, i.e., a prosumer, and trades electricity in the regional market at a variable price. In the LFS-DA, each agent uses linear demand and supply functions when they submit bids and asks to an auctioneer in the regional market. The LFS-DA can achieve an exact balance between electricity demand and supply for each time slot throughout the learning phase and was shown capable of solving the primal problem of maximizing the social welfare of the network without any central price setter, e.g., a utility or a large electricity company, in contrast with conventional real-time pricing (RTP. This paper presents a clarification of the relationship between the RTP algorithm derived on the basis of a dual decomposition framework and LFS-DA. Specifically, we proved that the changes in the price profile of the LFS-DA mechanism are equal to those achieved by the RTP mechanism derived from the dual decomposition framework, except for a constant factor.

  15. Information Security Awareness On-Line Materials Design with Knowledge Maps

    Science.gov (United States)

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  16. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  17. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  18. The IEA Model of Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Working Paper is intended for readers who wish to explore the MOSES methodology in depth; there is also a brochure which provides an overview of the analysis and results.

  19. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  20. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    as a particular approach that seeks to limit the scope of security to one’s community – be it the ‘nation-state’ or ‘civilization’. I will suggest that arguing against ‘security communitarianism’ requires paying further attention to the postcolonial critique of cosmopolitanism.......Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  1. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  2. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  3. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  4. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  5. Practical Computer Security through Cryptography

    Science.gov (United States)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  6. 76 FR 55989 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2011-09-09

    ... disclosure documents used in an offering of municipal securities. See endnote 10 to the Notice. It is also... as summarized in endnote 9 to the Notice: With respect to primary offerings of municipal securities...

  7. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  8. Social Security Administration

    Science.gov (United States)

    ... a my Social Security account. Newsroom Social Security's Fiscal Year (FY) 2017 Agency Financial Report (AFR) Our ... Us Accessibility FOIA Open Government Glossary Privacy Report Fraud, Waste or Abuse Site Map Other Government Websites: ...

  9. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  10. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  11. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  12. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  13. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  14. Security system signal supervision

    Energy Technology Data Exchange (ETDEWEB)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  15. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  16. Homeland Security Digital Library

    OpenAIRE

    Reneker, Maxine H.; Gassie, Lillian

    2003-01-01

    The Homeland Security Digital Library (HSDL) is the nation's premier collection of documents relating to homeland security policy, strategy and organizational management. The mission of the HSDL is to strengthen the national security of the United States by supporting local, state, territorial, tribal and federal analysis, debate, and decision-making needs and to assist academics of all disciplines in homeland defense and security-related research.

  17. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  18. Network Security Visualization

    Science.gov (United States)

    1999-09-27

    Internet Scanner 5.2 User Guide for Windows NT”, Internet Security Systems, Inc., 1998. “SBIR Topic AF97-043 Network Security Visualization...to the Server application to import into the NSV system database data that gets queried from ISS Internet Security Scanner 5.4. Objective #5 was... Internet Security Scanner scan of a live network and imported through a Cartridge component. The data was accessed through the Server component and

  19. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  20. Computer Security Models

    Science.gov (United States)

    1984-09-01

    September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...given in Section 5, in the form of questions and answers about security modeling. A glossary of terms used in the context of computer security is...model, so we will not be able to pursue it in this report. MODEL CHARACTERISTICS Computer security models are engineering models, giving them somewhat

  1. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  2. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  3. Advanced Linux Security

    OpenAIRE

    Ranjit Nimbalkar

    2013-01-01

    Using mandatory access control greatly increases the secu-rity of an operating system. SELinux, which is an implemen-tation of Linux Security Modules (LSM), implements several measures to prevent unauthorized system usage. The se-curity architecture used is named Flask, and provides a clean separation of security policy and enforcement. This paper is an overview of the Flask architecture and the implementation in Linux.

  4. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  5. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  6. Lemnos interoperable security project.

    Energy Technology Data Exchange (ETDEWEB)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  7. Crayons and security

    Directory of Open Access Journals (Sweden)

    Sue Dwyer

    1999-04-01

    Full Text Available Until recently I have thought of security in terms of guards, radios, grilled windows and doors, close coordination with other internationalNGOs and a strong organisational security policy. This was until I attended the InterAction/OFDA security training course in London inSeptember 1998.

  8. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  9. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  10. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  11. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  12. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  13. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  14. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  15. Social Security: Theoretical Aspects

    Directory of Open Access Journals (Sweden)

    O. I. Kashnik

    2013-01-01

    Full Text Available The paper looks at the phenomena of security and social security from the philosophical, sociological and psychological perspective. The undertaken analysis of domestic and foreign scientific materials demonstrates the need for interdisciplinary studies, including pedagogy and education, aimed at developing the guidelines for protecting the social system from destruction. The paper defines the indicators, security level indices and their assessment methods singled out from the analytical reports and security studies by the leading Russian sociological centers and international expert organizations, including the United Nations.The research is aimed at finding out the adequate models of personal and social security control systems at various social levels. The theoretical concepts can be applied by the teachers of the Bases of Life Safety course, the managers and researches developing the assessment criteria and security indices of educational environment evaluation, as well as the methods of diagnostics and expertise of educational establishments from the security standpoint. 

  16. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  17. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  18. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  19. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  20. Survey of quality defects in market beef and dairy cows and bulls sold through livestock auction markets in the Western United States: I. Incidence rates.

    Science.gov (United States)

    Ahola, J K; Foster, H A; Vanoverbeke, D L; Jensen, K S; Wilson, R L; Glaze, J B; Fife, T E; Gray, C W; Nash, S A; Panting, R R; Rimbey, N R

    2011-05-01

    A survey was conducted to quantify incidence of Beef Quality Assurance (BQA)-related defects in market beef and dairy cows and bulls selling at auction during 2 seasons in 2008. Twenty-three BQA-related traits were evaluated by 9 trained personnel during sales at 10 livestock auction markets in Idaho (n = 5; beef and dairy), California, (n = 4; dairy only), and Utah (n = 1; beef and dairy). Overall, 18,949 unique lots (8,213 beef cows, 1,036 beef bulls, 9,177 dairy cows, and 523 dairy bulls,) consisting of 23,479 animals (9,299 beef cows, 1,091 beef bulls, 12,429 dairy cows, and 660 dairy bulls) were evaluated during 125 sales (64 spring, 61 fall) for dairy and 79 sales (40 spring, 39 fall) for beef. The majority of market beef cows and bulls (60.9 and 71.3%, respectively) were predominantly black-hided, and the Holstein hide pattern was observed in 95.4 and 93.6% of market dairy cows and bulls, respectively. Market cattle weighed 548 ± 103.6 kg (beef cows), 751 ± 176.1 kg (beef bulls), 658 ± 129.7 kg (dairy cows), and 731 ± 150.8 kg (dairy bulls). Most beef cows (79.6%) weighed 455 to 726 kg, and most beef bulls (73.8%) weighed 545 to 954 kg, respectively. Among market beef cattle, 16.0% of cows and 14.5% of bulls weighed less than 455 and 545 kg, respectively, and 63.7% of dairy cows and 81.5% of dairy bulls weighed 545 to 817 kg or 545 to 954 kg, respectively. However, 19.5% of dairy cows and 13.1% of dairy bulls weighed less than 545 kg. Mean BCS for beef cattle (9-point scale) was 4.7 ± 1.2 (cows) and 5.3 ± 0.9 (bulls), and for dairy cattle (5-point scale) was 2.6 ± 0.8 (cows) and 2.9 ± 0.6 (bulls). Some 16.5% of beef cows and 4.1% of beef bulls had a BCS of 1 to 3, whereas 34.8% of dairy cows and 10.4% of dairy bulls had a BCS of 2 or less. Emaciation (beef BCS = 1, dairy BCS = 1.0) or near-emaciation (beef BCS = 2, dairy BCS = 1.5) was observed in 13.3% of dairy cows and 3.9% of beef cows. Among beef cattle, 15.1% of cows and 15.4% of bulls were

  1. Willingness to pay for small solar powered bed net fans: results of a Becker-DeGroot-Marschak auction in Ghana.

    Science.gov (United States)

    Yukich, Joshua O; Briët, Olivier J T; Ahorlu, Collins K; Nardini, Peter; Keating, Joseph

    2017-08-07

    Long-lasting insecticidal nets (LLINs) are one of the main interventions recommended by the World Health Organization for malaria vector control. LLINs are ineffective if they are not being used. Subsequent to the completion of a cluster randomized cross over trial conducted in rural Greater Accra where participants were provided with the 'Bɔkɔɔ System'-a set of solar powered net fan and light consoles with a solar panel and battery-or alternative household water filters, all trial participants were invited to participate in a Becker-DeGroot-Marschak auction to determine the mean willingness to pay (WTP) for the fan and light consoles and to estimate the demand curve for the units. Results demonstraed a mean WTP of approximately 55 Cedis (~13 USD). Demand results suggested that at a price which would support full manufacturing cost recovery, a majority of households in the area would be willing to purchase at least one such unit.

  2. A study to determine influential factors on data security

    OpenAIRE

    Naser Azad; Neda Abbasi; Seyed Foad Zarifi

    2014-01-01

    During the past few years, there has been increasing interest in making online transaction. As people become more interested in using internet for their daily business activities such as regular communications, financial transactions, etc., there will be more concerns on security of available data. In fact, data security is the primary concern in today’s online activities. This paper performs an empirical investigation to find important factors influencing data security in Municipality is cit...

  3. The Internal Aspects of Ukrainian National Security

    National Research Council Canada - National Science Library

    Bazhenov, Igor

    1997-01-01

    .... Poor economic conditions, organized crime, high levels of corruption within the government, and an irresponsible parliament are the primary causes of instability in Ukraine. Resolution of these issues is vital to Ukrainian National Security as well as the continuation of Ukrainian independence.

  4. Securing clean water: A secret to success

    Science.gov (United States)

    Michael Somerville; Dino DeSimone

    2000-01-01

    Securing clean water is a primary goal for many agencies, organizations, and concerned citizens. To achieve that goal, agencies have traditionally taken a mostly regulatory approach. In recent years, however, a major trend in government has been to move decision-making and action-taking to the local level. Conservation Districts, watershed organizations, and other...

  5. Intermediation and Competing Auctions

    DEFF Research Database (Denmark)

    Kennes, John; Schiff, Aaron

    this information to some or all buyers. We show that this always raises total welfare, even if it causes the informed buyers not to trade with low quality sellers. However, buyers and some sellers may be made worse off in equilibrium. We also examine the provision of information by a profit maximizing monopoly......We examine the effects of provision of information about seller qualities by a third-party in a directed search model with heterogeneous sellers, asymmetric information, and where prices are determined ex post. The third party separates sellers into quality-differentiated groups and provides...

  6. Competing Auctions of Skills

    DEFF Research Database (Denmark)

    Kennes, John; le Maire, Daniel

    We generalize McAfee’s (1993) game of competing sellers to the case of heterogeneous sellers. In the generalized McAfee (GM) game, the equilibrium expected job offer distribution of each worker (seller) type evolves over time as a function of stochastic events. We derive a tractable method of sol...

  7. UFA Auction Sampling Data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Between 1984 January - 2002 June, personnel from NMFS/PIFSC/FRMD/FMB/FMAP and Hawaii Department of Aquatic Resources (DAR) conducted port sampling at the United...

  8. Competing Auctions of Skills

    DEFF Research Database (Denmark)

    Kennes, John; le Maire, Christian Daniel

    The model of competing sellers McAfee (1993) is applied to a labor market environment with heterogeneous workers, who differ by outside option and skill type, and heterogeneous firms, who differ by the amount of output produced when matched to each possible worker tyoe. We derive both a static...

  9. Security infrastructure for on-demand provisioned Cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Wlodarczyk, T.W.; Rong, C.; Ziegler, W.

    2011-01-01

    Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (IaaS) environment. Cloud security infrastructure should address two aspects of the

  10. Practical secure decision tree learning in a teletreatment application

    NARCIS (Netherlands)

    de Hoogh, Sebastiaan; Schoenmakers, Berry; Chen, Ping; op den Akker, Harm

    In this paper we develop a range of practical cryptographic protocols for secure decision tree learning, a primary problem in privacy preserving data mining. We focus on particular variants of the well-known ID3 algorithm allowing a high level of security and performance at the same time. Our

  11. RELIGION, PEACE AND SECURITY IN NIGERIA Osaji, Jacob ...

    African Journals Online (AJOL)

    HP

    2005-02-07

    Feb 7, 2005 ... day, nor the pestilence that stalks in darkness nor the destruction that wastes at noonday. Islam is another prevailing religion in Nigeria. The purpose of. Islamic law – Maqasidush – Shariah is security. 12. Security of life, property, progeny, intellect, religion and honour is the primary function of. Islamic law.

  12. Surveying Public Attitudes of Security Sector Reforms in the Arab ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    One constant in the ebb and flow of the Arab Spring has been the increased influence of public opinion on public policy. Few areas of public concern have had more resonance than the role of state security services in shaping and preserving undemocratic regimes. The notion that the security sector's primary responsibility ...

  13. A study of institutional environment and household food security at ...

    African Journals Online (AJOL)

    The study looked into the current scenario of food security in Rwanda. After analysing the national level institutional and food security scenarios by using available secondary data, the researchers used primary data that have been collected from a random sample of 200 households spreading over six sectors of the Huye ...

  14. A scoping review of traditional food security in Alaska.

    Science.gov (United States)

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  15. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  16. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  17. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  18. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...... of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t

  19. SecurID

    CERN Document Server

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  20. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  1. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  2. European Cyber Security Policy

    OpenAIRE

    Bendiek, Annegret

    2012-01-01

    The gradually developing European cyber security policy tries to establish minimum standards in all EU member states with regard to prevention, resilience and international cooperation. It aims to foster national security without compromising democratic principles or unduly limiting individual liberties. However, it is hard to find a balance between these goals, and the EU’s measures thus inevitably raise questions about the democratic implications of European cyber security policy. Are the i...

  3. Information Security Training & Awareness

    OpenAIRE

    Hogervorst, Monique

    2009-01-01

    Information security standards, best practices and literature all identify the need for Training & Awareness, the theory is clear. The surveys studied show that in the real world the situation is different: the focus of businesses is still on technical information security controls aimed at the external attacker. And although threats and vulnerabilities point out that personnel security becomes more important, the attitude of managers and employees does not reflect tha...

  4. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  5. Design for Security Workshop

    Science.gov (United States)

    2014-09-30

    Apps  Content providers  DRM for movies, songs, etc.  Finance companies  Account data, passwords  IOT  home automation , health, etc... devices and systems  Tools for secure interplay between hardware and software  Design environment for modeling and simulating hardware attacks and...and email  Improperly secured devices – no PIN lock  User intervention – jailbreaking, unlocking  Mobile has become the enterprise security

  6. Enhancing mobile learning security

    OpenAIRE

    Shonola, Shaibu Adekunle; Joy, Mike

    2016-01-01

    Mobile devices have been playing vital roles in modern day education delivery as students can access or download learning materials on their smartphones and tablets, they can also install educational apps and study anytime, anywhere. The need to provide adequate security for portable devices being used for learning cannot be underestimated. In this paper, we present a mobile security enhancement app, designed and developed for Android smart mobile devices in order to promote security awarenes...

  7. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  8. Rome Laboratory Computer Security

    Science.gov (United States)

    1993-10-11

    34) 11101993 Report Type N/A Dates Covered (from... to) ("DD MON YYYY") Title and Subtitle Rome Laboratory Computer Security Contract or Grant Number...Rome Laboratory Computer Security 5. FUNDING NUMBERS 6. AUTHOR(S) Joseph Giordano 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING...UNCLASSIFIED 20. LIMITATION OF ABSTRACT None COMPUTER SECURITY OBJECTIVE: TO DEVELOP & DEMONSTRATE THE TOOLS & TECHNOLOGY NECESSARY TO REALIZE TRUSTED C31

  9. Computer Security Assistance Program

    Science.gov (United States)

    1997-09-01

    Information COMPUTER SECURITY ASSISTANCE PROGRAM OPR: HQ AFCA/SYS (CMSgt Hogan) Certified by: HQ USAF/SCXX (Lt Col Francis X. McGovern) Pages: 5...Distribution: F This instruction implements Air Force Policy Directive (AFPD) 33-2, Information Protection, establishes the Air Force Computer Security Assistance...Force single point of contact for reporting and handling computer security incidents and vulnerabilities including AFCERT advisories and Defense

  10. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  11. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  12. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  13. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to whole spectrum of ICT users and Providers including home users; small, medium & large organisations, Government and Academia. Strategies: ...

  14. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  15. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  16. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  17. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  18. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  19. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  20. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  1. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  2. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  3. Exploring consumers’ perception and willingness to pay for “Non-Added Sulphite” wines through experimental auctions: A case study in Italy and Spain

    Directory of Open Access Journals (Sweden)

    Mario Amato

    2017-12-01

    Full Text Available Although scientific literature is still uncertain towards the real causes that can link headache episodes with moderate wine consumption, a growing proportion of consumers seems to address sulphites as possible culprits. Hence, the objective of this study is to assess consumers` willingness to pay for wine bearing a sulphites-free label in two traditional wine producing countries, Italy and Spain. The methodological framework is based on the specification of the Becker-DeGroot-Marschak (BDM type of auction applied to consumers purchasing wine in the supermarket stores of both countries. A left censored Tobit model is used to analyse the bidding behaviour for conventional and 'Non-Added Sulphite' (NAS wine. Results in both countries show that consumers who link the headaches with the consumption of sulphite are willing to exchange the habitually consumed bottle of wine with a NAS wine and pay extra premium prices. Keywords: Experimental auctions, Non-added sulphite wines, Consumer behavior

  4. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  5. Syphilis - primary

    Science.gov (United States)

    ... their newborn (congenital syphilis). Syphilis has three stages: Primary syphilis Secondary syphilis Tertiary syphilis (the late phase ... screening, and treatment. Symptoms The incubation period for primary syphilis is 14 to 21 days. Symptoms of ...

  6. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  7. Securing Personal Network Clusters

    NARCIS (Netherlands)

    Jehangir, A.; Heemstra de Groot, S.M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters

  8. VMware view security essentials

    CERN Document Server

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  9. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  10. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  11. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    thereby reducing the number of bits required for transmissions . Further assume that the system designers would like even greater security regarding...scenarios. A common systemic security analogy for cognition lies within the context of a command and control structure’s observe, orient, decide... telephony , satellite communications and networks). Critical Program Information (CPI): ICT that is a critical component is defined as Critical

  12. CIOs Uncensored: Security Smarts.

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  13. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  14. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  15. Hydrological extremes and security

    Directory of Open Access Journals (Sweden)

    Z. W. Kundzewicz

    2015-04-01

    Full Text Available Economic losses caused by hydrological extremes – floods and droughts – have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes − floods and droughts − are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state’s task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  16. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  17. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  18. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  19. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  20. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.