Results 11 to 20 of about 8,634,070 (89)

The Mortality Effects of Retirement: Evidence from Social Security Eligibility at Age 62

open access: yes, 2016
Social Security eligibility begins at age 62, and approximately one third of Americans immediately claim at that age. We examine whether age 62 is associated with a discontinuous change in aggregate mortality, a key measure of population health.
Maria D. Fitzpatrick, T. Moore
semanticscholar   +1 more source

Exploiting Data Sparsity in Secure Cross-Platform Social Recommendation [PDF]

open access: yesarXiv, 2022
Social recommendation has shown promising improvements over traditional systems since it leverages social correlation data as an additional input. Most existing work assumes that all data are available to the recommendation platform. However, in practice, user-item interaction data (e.g.,rating) and user-user social data are usually generated by ...
arxiv  

Aging, Social Security Design, and Capital Accumulation

open access: yesSocial Science Research Network, 2015
This paper analyzes the impact of aging on capital accumulation and welfare in a country with a sizable unfunded social security system. Using a two-period overlapping generation model with endogenous retirement decisions, the paper shows that the type ...
Antoine Dedry, Harun Onder, P. Pestieau
semanticscholar   +1 more source

Social Media Networks Attacks and their Preventive Mechanisms: A Review [PDF]

open access: yesarXiv, 2022
We live in a virtual world where actual lifestyles are replicated. The growing reliance on the use of social media networks worldwide has resulted in great concern for information security. One of the factors popularizing the social media platforms is how they connect people worldwide to interact, share content, and engage in mutual interactions of ...
arxiv  

A Survey on Privacy and Security in Online Social Networks [PDF]

open access: yesOnline Social Networks and Media Journal October 2017, 2015
Online Social Networks (OSN) are a permanent presence in today's personal and professional lives of a huge segment of the population, with direct consequences to offline activities. Built on a foundation of trust-users connect to other users with common interests or overlapping personal trajectories-online social networks and the associated ...
arxiv   +1 more source

Searching for Job Security and the Consequences of Job Loss

open access: yesSocial Science Research Network, 2021
Job loss comes with large present value earnings losses which elude workhorse models of unemployment and labor market policy. I propose a parsimonious model of a frictional labor market in which jobs differ in terms of unemployment risk and workers ...
Gregor Jarosch
semanticscholar   +1 more source

Reviewing Cyber Security Social Engineering Training and Awareness Programs - Pitfalls and Ongoing Issues

open access: yesFuture Internet, 2019
The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment.
Hussain Aldawood, G. Skinner
semanticscholar   +1 more source

Resilience of local food systems and links to food security – A review of some important concepts in the context of COVID-19 and other shocks

open access: yesFood Security, 2020
The objective of this review is to explore and discuss the concept of local food system resilience in light of the disruptions brought to those systems by the 2020 COVID-19 pandemic.
C. Béné
semanticscholar   +1 more source

Machine Learning in IoT Security: Current Solutions and Future Challenges [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2019
The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives. The participating nodes in IoT networks are usually resource-constrained, which makes them luring targets for cyber attacks.
Fatima Hussain   +3 more
semanticscholar   +1 more source

Social Engineering Resistant 2FA [PDF]

open access: yesarXiv, 2020
Attackers increasingly, and with high success rates, use social engineering techniques to circumvent second factor authentication (2FA) technologies, compromise user accounts and sidestep fraud detection technologies. We introduce a social engineering resistant approach that we term device-aware 2FA, to replace the use of traditional security codes.
arxiv  

Home - About - Disclaimer - Privacy