![]() ![]() ; Pignault, Anne ![]() Scientific Conference (2015, May) Detailed reference viewed: 85 (3 UL)![]() ![]() Yusifli, Zahra ![]() in Elliott, Kimberly A. (Ed.) Handbook on Globalisation and Labour Standards (2022) Detailed reference viewed: 50 (3 UL)![]() Caregari, Laure ![]() in Wille, Christian; Reckinger, Rachel; Kmec, Sonja (Eds.) et al Spaces and Identities in Border Regions. Politics – Media – Subjects. (2016) Detailed reference viewed: 121 (9 UL)![]() Murphy, Emily ![]() in European Sociological Review (2014), 30(1), 588-602 The employment structure undergoes constant change. Certain occupations grow while others decline under the pressure of technological advances, internationalization and welfare state reforms. This ... [more ▼] The employment structure undergoes constant change. Certain occupations grow while others decline under the pressure of technological advances, internationalization and welfare state reforms. This evolution at the aggregate level has been well documented. Our knowledge of how macro-level change in the employment structure is brought about through micro-level career adjustments is less extensive. Drawing on panel data, this paper examines the types of workers most likely to leave occupations that have declined over the past 20 years, and the most likely destination of these exits in Great Britain, Germany and Switzerland. Overall, we find that women are more likely than men to leave a declining occupation, and the most likely route out of declining occupations for female workers is towards low paid growing occupations. Clerical workers are more likely to exit to high paid growing occupations than production workers, and male production workers are at higher risk than female clerks of exiting into unemployment. [less ▲] Detailed reference viewed: 117 (3 UL)![]() Stojkovski, Borce ![]() ![]() in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (2021) Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing ... [more ▼] Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing platforms has been notably less investigated by the security research community. Motivated by this research gap, we ground our work in the concrete challenge of understanding users’ perceptions of information sharing in CTI platforms. To this end, we propose a conceptual workflow and toolchain that would seek to verify whether users have an accurate comprehension of how far information travels when shared in a CTI sharing platform. We contextualize our concept within MISP as a use case, and discuss the benefits of our socio-technical approach as a potential tool for security analysis, simulation, or education/training support. We conclude with a brief outline of future work that would seek to evaluate and validate the proposed model. [less ▲] Detailed reference viewed: 83 (16 UL)![]() Stojkovski, Borce ![]() ![]() in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (2021) Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing ... [more ▼] Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing platforms has been notably less investigated by the security research community. Motivated by this research gap, we ground our work in the concrete challenge of understanding users’ perceptions of information sharing in CTI platforms. To this end, we propose a conceptual workflow and toolchain that would seek to verify whether users have an accurate comprehension of how far information travels when shared in a CTI sharing platform. We contextualize our concept within MISP as a use case, and discuss the benefits of our socio-technical approach as a potential tool for security analysis, simulation, or education/training support. We conclude with a brief outline of future work that would seek to evaluate and validate the proposed model. [less ▲] Detailed reference viewed: 83 (16 UL)![]() Stojkovski, Borce ![]() ![]() in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (2021) Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing ... [more ▼] Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing platforms has been notably less investigated by the security research community. Motivated by this research gap, we ground our work in the concrete challenge of understanding users’ perceptions of information sharing in CTI platforms. To this end, we propose a conceptual workflow and toolchain that would seek to verify whether users have an accurate comprehension of how far information travels when shared in a CTI sharing platform. We contextualize our concept within MISP as a use case, and discuss the benefits of our socio-technical approach as a potential tool for security analysis, simulation, or education/training support. We conclude with a brief outline of future work that would seek to evaluate and validate the proposed model. [less ▲] Detailed reference viewed: 83 (16 UL)![]() Stojkovski, Borce ![]() ![]() in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (2021) Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing ... [more ▼] Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing platforms has been notably less investigated by the security research community. Motivated by this research gap, we ground our work in the concrete challenge of understanding users’ perceptions of information sharing in CTI platforms. To this end, we propose a conceptual workflow and toolchain that would seek to verify whether users have an accurate comprehension of how far information travels when shared in a CTI sharing platform. We contextualize our concept within MISP as a use case, and discuss the benefits of our socio-technical approach as a potential tool for security analysis, simulation, or education/training support. We conclude with a brief outline of future work that would seek to evaluate and validate the proposed model. [less ▲] Detailed reference viewed: 83 (16 UL)![]() Settels, Jason ![]() in Work, Aging and Retirement (2018) As the industrialized world faces a rapidly aging population, it has become increasingly important to understand the factors that influence the well-being of older persons. In this regard, many scholars ... [more ▼] As the industrialized world faces a rapidly aging population, it has become increasingly important to understand the factors that influence the well-being of older persons. In this regard, many scholars have emphasized the importance of social connectedness. Various theories seek to explain social connectedness in later life, particularly as it applies to workforce involvement. Among those theories, we engage the theories of activity-substitution and of complementarity, and we seek to discover which provides a better account of the social and work lives of older Americans. We do so through an analysis of the first 2 waves (Wave 1: 2005–2006, Wave 2: 2010–2011) of the National Social Life, Health, and Aging Project (NSHAP). Workforce transitions over time are assessed for their impact on 3 social connectedness outcomes: expansiveness of close networks, overall friendship network, and social participation. Results provide strong support for the theory of activity-substitution. Furthermore, our results show that those re-entering paid work after some time out of the workforce show the largest changes in social connectedness. The present study reinforces the importance of studying social connectedness as a multidimensional concept and draws attention to the increasing variability in workforce participation patterns among older persons. [less ▲] Detailed reference viewed: 80 (3 UL)![]() de Saint-Georges, Ingrid ![]() Presentation (2015, March) Detailed reference viewed: 100 (2 UL)![]() ![]() Steffgen, Georges ![]() ![]() Scientific Conference (2017, November 24) Detailed reference viewed: 76 (10 UL)![]() ![]() Steffgen, Georges ![]() ![]() ![]() Scientific Conference (2016, July 21) Detailed reference viewed: 137 (9 UL)![]() ![]() Sischka, Philipp ![]() ![]() in Heinen, Andreas; Samuel, Robin; Vögele, Claus (Eds.) et al Wohlbefinden und Gesundheit im Jugendalter - Theoretische Perspektiven, empirische Befunde und Praxisansätze (2022) Detailed reference viewed: 28 (0 UL)![]() Sommarribas, Adolfo ![]() E-print/Working paper (2020) The COVID-19 took by surprise most Member States of the European Union, as they underestimated the rapid spread of the contagion in the continent. The response of the Member States was asymmetrical ... [more ▼] The COVID-19 took by surprise most Member States of the European Union, as they underestimated the rapid spread of the contagion in the continent. The response of the Member States was asymmetrical, individualistic and significantly slow. The first measures taken were to close down the internal borders. The response of the European Union was even slower to the point that and it was not until March 17th 2020 that the external borders were closed. These actions affected legal migration into the European Union from four perspectives: 1) it affected the mobility of those third country nationals who were on temporary stay in the Member States; 2) the entry of third country nationals to do seasonal work; 3) the entry and stay of legal migrants; and 4) the status quo of the third country nationals already residing in the Member States, especially those who have a loss of income. This article will deal with the measures taken by Member States on who to manage the immigration services during the crisis as well as the measures taken in order to deal with overstayers, seasonal workers and other legal migrants. Finally, we will focus in the vulnerable situation that third-country national salaried workers are exposed due to the loss of income or loss of employment in the Member States and the risk of being returned to their country of origin. [less ▲] Detailed reference viewed: 110 (6 UL)![]() Engel de Abreu, Pascale ![]() Poster (2009, November) The present study investigates how working memory and fluid intelligence are related in young children and which aspect of working memory span tasks– short-term storage or controlled attention - might ... [more ▼] The present study investigates how working memory and fluid intelligence are related in young children and which aspect of working memory span tasks– short-term storage or controlled attention - might drive the relationship. A sample of 119 children were followed from kindergarten to 2nd grade and completed assessments of working memory, short-term memory, and fluid intelligence. The data showed that working memory, verbal short-term memory, and fluid intelligence were highly related but separate constructs in young children. The results further showed that when the common variance between working memory and short-term memory was controlled, the residual working memory factor manifested significant links with fluid intelligence whereas the residual short-term memory factor did not. These findings suggest that in young children the executive demands rather than the storage component of working memory span tasks are the source of their link with fluid intelligence. [less ▲] Detailed reference viewed: 208 (3 UL)![]() ; ; Engel de Abreu, Pascale ![]() in Alloway, T; Alloway, R. G. (Eds.) Working Memory the Connected Intelligence (2013) We are on the cusp of a new revolution in intelligence that affects every aspect of our lives from work and relationships, to our childhood, education, and old age. Working Memory, the ability to remember ... [more ▼] We are on the cusp of a new revolution in intelligence that affects every aspect of our lives from work and relationships, to our childhood, education, and old age. Working Memory, the ability to remember and mentally process information, is so important that without it we could not function as a society or as individuals. People with superior working memory tend to have better jobs, better relationships, and more happy and fulfilling lives. People with poor working memory struggle in their work, their personal lives, and are more likely to experience trouble with the law. But there is exciting evidence emerging: working memory can be trained, and, as a result, we can change our circumstances. But what works and what doesn’t? And can all of us benefit from working memory training? This book reviews cutting-edge scientific research and examines how working memory influences our lives, as well as the evidence on working memory training. [less ▲] Detailed reference viewed: 268 (7 UL)![]() Engel de Abreu, Pascale ![]() in Intelligence (2010), 38(6), 552-561 The present study investigates how working memory and fluid intelligence are related in young children and how these links develop over time. The major aim is to determine which aspect of the working ... [more ▼] The present study investigates how working memory and fluid intelligence are related in young children and how these links develop over time. The major aim is to determine which aspect of the working memory system-short-term storage or cognitive control-drives the relationship with fluid intelligence. A sample of 119 children was followed from kindergarten to second grade and completed multiple assessments of working memory, short-term memory, and fluid intelligence. The data showed that working memory, short-term memory, and fluid intelligence were highly related but separate constructs in young children. The results further showed that when the common variance between working memory and short-term memory was controlled, the residual working memory factor manifested significant links with fluid intelligence whereas the residual short-term memory factor did not. These findings suggest that in young children cognitive control mechanisms rather than the storage component of working memory span tasks are the source of their link with fluid intelligence. [less ▲] Detailed reference viewed: 212 (4 UL)![]() ![]() Engel de Abreu, Pascale ![]() Scientific Conference (2011, July) The study investigates how working memory and fluid intelligence are related in young children and how these links develop over time. The major aim is to determine which aspect of the working memory ... [more ▼] The study investigates how working memory and fluid intelligence are related in young children and how these links develop over time. The major aim is to determine which aspect of the working memory system - short-term storage or cognitive control - drives the relationship with fluid intelligence. 119 children were followed from kindergarten to second grade and completed multiple assessments of working memory, short-term memory, and fluid intelligence. The data showed that working memory, short-term memory, and fluid intelligence were highly related but separate constructs in young children. When the common variance between working memory and short-term memory was controlled, the residual working memory factor manifested significant links with fluid intelligence whereas the residual short-term memory factor did not. These findings suggest that in young children cognitive control mechanisms rather than the storage component of working memory span tasks are the source of their link with fluid intelligence. [less ▲] Detailed reference viewed: 152 (8 UL)![]() ; ; et al in Sternberg, R; Kaufman, S (Eds.) Cambridge Handbook of Intelligence (2011) This volume provides the most comprehensive and up-to-date compendium of theory and research in the field of human intelligence. Each of the 42 chapters is written by world-renowned experts in their ... [more ▼] This volume provides the most comprehensive and up-to-date compendium of theory and research in the field of human intelligence. Each of the 42 chapters is written by world-renowned experts in their respective fields, and collectively, they cover the full range of topics of contemporary interest in the study of intelligence. The handbook is divided into nine parts: Part I covers intelligence and its measurement; Part II deals with the development of intelligence; Part III discusses intelligence and group differences; Part IV concerns the biology of intelligence; Part V is about intelligence and information processing; Part VI discusses different kinds of intelligence; Part VII covers intelligence and society; Part VIII concerns intelligence in relation to allied constructs; and Part IX is the concluding chapter, which reflects on where the field is currently and where it still needs to go. [less ▲] Detailed reference viewed: 349 (8 UL)![]() Engel de Abreu, Pascale ![]() Poster (2009, October) The aim of the present study was to investigate the contribution of two working memory systems (the phonological loop and the central executive) to children’s foreign language learning. A sample of 119 ... [more ▼] The aim of the present study was to investigate the contribution of two working memory systems (the phonological loop and the central executive) to children’s foreign language learning. A sample of 119 Luxembourgish children, whose native language is Luxembourgish and who learn German and French as secondary languages in school were assessed longitudinally over a 4-year time period. Children were tested in kindergarten (5 years of age), in first, second, and third grade with a one-year interval between each testing wave. Results indicate that individual differences in phonological loop functioning were causally related to foreign vocabulary development. One particular phonological loop measure - the repetition of low wordlike nonwords - was identified as the single best predictor of the acquisition of an unfamiliar foreign language up to two years later, suggesting that this measure may provide a valuable tool for early screening to identify children who are at present and future risk for foreign language learning difficulties. [less ▲] Detailed reference viewed: 116 (2 UL) |
||