Results 1 to 10 of about 31 (29)
Application of Securitization of Leasing Assets
Securitization of leasing assets was widely adopted abroad within the last decades. Securitization of leasing assets usually is meant as process of formation of a portfolio based on future leasing payments of one and (or) more leasing company and sale of
Igor Viktorovich Linev
doaj +5 more sources
Scholars have focused on algorithms used during sentencing, bail, and parole, but little work explores what we term “carceral algorithms” that are used during incarceration.
Vanessa A. Massaro +3 more
doaj +1 more source
Due to the characteristics of sports public service venues, there are still some financing difficulties under the PPP (public-private partnership) operation mode. Although asset securitization can solve its corresponding problems and enhance the standardization of PPP projects, its many participants, complex transaction structure, and other influencing
openaire +2 more sources
Information and communication components of diplomatic missions’ work
The urgency of the topic of research is determined by global trends in the development of world politics in general and the algorithm of forming the national security model of Ukraine in the context of hybrid warfare with Russia in particular.
Yuliia Sedliar, Olha Stadnichenko
doaj +1 more source
IntroductionThe development and growth of Asset-Backed Securitization (ABS) finance in the e-commerce supply chain is of great value in alleviating the capital constraints of enterprises.
Lei Yang +3 more
doaj +1 more source
IntroductionThe EU Artificial Intelligence Act (AI Act) represents a global landmark in digital governance, yet the underlying political rationale structuring its provisions—securitization versus liberalization—remains underexplored.
Athanasios Raptis, Nikolaos Papadakis
doaj +1 more source
Some of the next articles are maybe not open access.
Technology in Society, 2023
Artificial intelligence is often framed as a tool to be used to counter violent extremism. This paper seeks to make a contribution to scholarship on the use of AI by considering the other side of the debate: how AI and algorithms themselves can and are being used to radicalize, polarize, and spread racism and political instability. The central argument
openaire +1 more source
Artificial intelligence is often framed as a tool to be used to counter violent extremism. This paper seeks to make a contribution to scholarship on the use of AI by considering the other side of the debate: how AI and algorithms themselves can and are being used to radicalize, polarize, and spread racism and political instability. The central argument
openaire +1 more source
When Big Data Meet Securitization. Algorithmic Regulation with Passenger Name Records
European Journal for Security Research, 2018This contribution deals with big data as a resource for state regulation. The academic interest in the specificities of contemporary technology-based regulation has generated the concept of “algorithmic regulation” (Yeung, Regulat Govern 347(6):1–19, 2017), which yet needs to be refined empirically. This article sets out to analyze the use of passenger
openaire +1 more source
Annales des Télécommunications, 1980
Apres un rappel des algorithmes gloutons, cet article presente deux methodes de resolution accelerees et exactes des problemes de recherche de sousensembles optimaux maximisant une fonction objectif surmodulaire: une premiere methode fournit de tres bonnes solutions approchees et un encadrement (au sens de l’inclusion) de l’optimum exact; une deuxieme ...
openaire +2 more sources
Apres un rappel des algorithmes gloutons, cet article presente deux methodes de resolution accelerees et exactes des problemes de recherche de sousensembles optimaux maximisant une fonction objectif surmodulaire: une premiere methode fournit de tres bonnes solutions approchees et un encadrement (au sens de l’inclusion) de l’optimum exact; une deuxieme ...
openaire +2 more sources
Can securitization theory be used in normative analysis? Towards a just securitization theory
Security Dialogue, 2011Rita Floyd
exaly

