Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailEconomic insecurity and political preferences
Bossert, Walter; Clark, Andrew UL; d'Ambrosio, Conchita UL et al

in Oxford Economic Papers (in press)

Economic insecurity has attracted growing attention, but there is no consensus as to its definition. We characterize a class of individual economic-insecurity measures based on the time profile of ... [more ▼]

Economic insecurity has attracted growing attention, but there is no consensus as to its definition. We characterize a class of individual economic-insecurity measures based on the time profile of economic resources. We apply this economic-insecurity measure to political-preference data in the USA, UK, and Germany. Conditional on current economic resources, economic insecurity is associated with both greater political participation (support for a party or the intention to vote) and more support for conservative parties. In particular, economic insecurity predicts greater support for both Donald Trump before the 2016 US Presidential election and the UK leaving the European Union in the 2016 Brexit referendum. [less ▲]

Detailed reference viewed: 11 (0 UL)
See detailBank Politics: Structural Reform in Comparative Perspective
Howarth, David UL; James, Scott

Book published by Oxford University Press (in press)

The problem of banks being 'too big to fail' was the defining regulatory issue of the global financial crisis. However, attempts to tackle the problem by separating retail banking from higher risk trading ... [more ▼]

The problem of banks being 'too big to fail' was the defining regulatory issue of the global financial crisis. However, attempts to tackle the problem by separating retail banking from higher risk trading activities - known as structural reform - proved to be highly divisive and contributed to significant regulatory divergence. In this book, David Howarth and Scott James explain this variation by examining the politics of bank structural reform across six key jurisdictions: the United States, the European Union, the United Kingdom, France, Germany, and the Netherlands. Integrating political economy and public policy approaches, they develop a novel 'comparative financial power' framework to analyse how financial industry influence is mediated by two factors: first, whether bank lobbying is unified and centralized (cooperative financial power) or divided and fragmented (competitive financial power); and second, policy makers' use of venue shifting to depoliticize contentious policy issues. The book explains that the US and UK governments implemented major reforms because the banking industry was divided and faced significant opposition. However, venue shifting to an independent committee led to durable reform in the UK, while political polarization in the US contributed to contested reform. By contrast, the French and German governments balanced unified bank lobbying and political pressures to act by pursuing limited symbolic reforms; the Dutch government deflected the issue through delegation to multiple commissions (no reform); while political stalemate at the EU level resulted from early venue shifting and concerted pan-European bank lobbying. The book makes a major contribution to scholarship on the political economy of finance and business power. [less ▲]

Full Text
Peer Reviewed
See detailI-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
Pascoal, Túlio UL; Decouchant, Jérémie; Boutet, Antoine et al

in Proceedings on Privacy Enhancing Technologies (2023)

Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS ... [more ▼]

Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS statistics might give rise to privacy attacks. Several works attempted to reconcile secure processing with privacy-preserving releases of GWASes. However, we highlight that these approaches remain vulnerable if GWASes utilize overlapping sets of individuals and genomic variations. In such conditions, we show that even when relying on state-of-the-art techniques for protecting releases, an adversary could reconstruct the genomic variations of up to 28.6% of participants, and that the released statistics of up to 92.3% of the genomic variations would enable membership inference attacks. We introduce I-GWAS, a novel framework that securely computes and releases the results of multiple possibly interdependent GWASes. I-GWAS continuously releases privacy-preserving and noise-free GWAS results as new genomes become available. [less ▲]

Detailed reference viewed: 34 (7 UL)
Full Text
See detailSpatial adaptive settlement systems in archaeology. Modelling long-term settlement formation from spatial micro interactions
Sikk, Kaarel UL

Doctoral thesis (2023)

Despite research history spanning more than a century, settlement patterns still hold a promise to contribute to the theories of large-scale processes in human history. Mostly they have been presented as ... [more ▼]

Despite research history spanning more than a century, settlement patterns still hold a promise to contribute to the theories of large-scale processes in human history. Mostly they have been presented as passive imprints of past human activities and spatial interactions they shape have not been studied as the driving force of historical processes. While archaeological knowledge has been used to construct geographical theories of evolution of settlement there still exist gaps in this knowledge. Currently no theoretical framework has been adopted to explore them as spatial systems emerging from micro-choices of small population units. The goal of this thesis is to propose a conceptual model of adaptive settlement systems based on complex adaptive systems framework. The model frames settlement system formation processes as an adaptive system containing spatial features, information flows, decision making population units (agents) and forming cross scale feedback loops between location choices of individuals and space modified by their aggregated choices. The goal of the model is to find new ways of interpretation of archaeological locational data as well as closer theoretical integration of micro-level choices and meso-level settlement structures. The thesis is divided into five chapters, the first chapter is dedicated to conceptualisation of the general model based on existing literature and shows that settlement systems are inherently complex adaptive systems and therefore require tools of complexity science for causal explanations. The following chapters explore both empirical and theoretical simulated settlement patterns based dedicated to studying selected information flows and feedbacks in the context of the whole system. Second and third chapters explore the case study of the Stone Age settlement in Estonia comparing residential location choice principles of different periods. In chapter 2 the relation between environmental conditions and residential choice is explored statistically. The results confirm that the relation is significant but varies between different archaeological phenomena. In the third chapter hunter-fisher-gatherer and early agrarian Corded Ware settlement systems were compared spatially using inductive models. The results indicated a large difference in their perception of landscape regarding suitability for habitation. It led to conclusions that early agrarian land use significantly extended land use potential and provided a competitive spatial benefit. In addition to spatial differences, model performance was compared and the difference was discussed in the context of proposed adaptive settlement system model. Last two chapters present theoretical agent-based simulation experiments intended to study effects discussed in relation to environmental model performance and environmental determinism in general. In the fourth chapter the central place foragingmodel was embedded in the proposed model and resource depletion, as an environmental modification mechanism, was explored. The study excluded the possibility that mobility itself would lead to modelling effects discussed in the previous chapter. The purpose of the last chapter is the disentanglement of the complex relations between social versus human-environment interactions. The study exposed non-linear spatial effects expected population density can have on the system and the general robustness of environmental inductive models in archaeology to randomness and social effect. The model indicates that social interactions between individuals lead to formation of a group agency which is determined by the environment even if individual cognitions consider the environment insignificant. It also indicates that spatial configuration of the environment has a certain influence towards population clustering therefore providing a potential pathway to population aggregation. Those empirical and theoretical results showed the new insights provided by the complex adaptive systems framework. Some of the results, including the explanation of empirical results, required the conceptual model to provide a framework of interpretation. [less ▲]

Detailed reference viewed: 33 (2 UL)
Full Text
Peer Reviewed
See detailRegional heterogeneity and individual characteristics in the development of a European tax policy: historical insights from Luxembourg
Danescu, Elena UL

in Danescu, Elena; Dima, Alina Mihaela (Eds.) Fostering recovery through metaverse business modelling - An interdisciplinary analysis of the new paradigm shift (2023, March)

Luxembourg is currently one of the most politically stable, consensus-oriented, and prosperous countries in the world, characterised by am advanced social market economy, and a level of material wellbeing ... [more ▼]

Luxembourg is currently one of the most politically stable, consensus-oriented, and prosperous countries in the world, characterised by am advanced social market economy, and a level of material wellbeing above the EU average. Its strong fiscal position is well illustrated by a longstanding AAA credit rating, a significant accumulation of government financial assets, and a distinct fiscal approach. In this light, this paper aims to investigate the specific features of the tax system in Luxembourg from a multidisciplinary perspective by analysing historical sources and exploring the development of these particularities over time, their impact on the socioeconomic context and their repercussions for the European integration process, especially in the design and completion of Economic and Monetary Union (EMU). [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
See detailGlobal Mega-Science: Universities Scientize the World
Baker, David UL; Powell, Justin J W UL

Book published by Stanford University Press (2023)

Detailed reference viewed: 50 (2 UL)
Full Text
Peer Reviewed
See detailSoK: Secure E-Voting with Everlasting Privacy
Haines, Thomas; Mueller, Johannes UL; Mosaheb, Rafieh UL et al

in Proceedings on Privacy Enhancing Technologies (PoPETs) (2023)

Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e-voting ... [more ▼]

Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e-voting) protocols have been proposed to address this challenge, striving for everlasting privacy. This property guarantees that even computationally unbounded adversaries cannot break privacy of past elections. The broad interest in secure e-voting with everlasting privacy has spawned a large variety of protocols over the last three decades. These protocols differ in many aspects, in particular the precise security properties they aim for, the threat scenarios they consider, and the privacy-preserving techniques they employ. Unfortunately, these differences are often opaque, making analysis and comparison cumbersome. In order to overcome this non-transparent state of affairs, we systematically analyze all e-voting protocols designed to provide everlasting privacy. First, we illustrate the relations and dependencies between all these different protocols. Next, we analyze in depth which protocols do provide secure and efficient approaches to e-voting with everlasting privacy under realistic assumptions, and which ones do not. Eventually, based on our extensive and detailed treatment, we identify which research problems in this field have already been solved, and which ones are still open. Altogether, our work offers a well-founded reference point for conducting research on secure e-voting with everlasting privacy as well as for future-proofing privacy in real-world electronic elections. [less ▲]

Detailed reference viewed: 32 (7 UL)
Peer Reviewed
See detailDesigning and delivering an online research article writing course for doctoral students in Luxembourg during Covid-19
Deroey, Katrien UL; Skipp, Jennifer

in Fenton, James; Gimenez, Julio; Mansfield, Katherine (Eds.) et al International perspectives on teaching academic English in turbulent times (2023)

This chapter reports on the design, delivery and evaluation of an online research article writing course for doctoral students. The course format was a response to COVID-19 but was designed to be ... [more ▼]

This chapter reports on the design, delivery and evaluation of an online research article writing course for doctoral students. The course format was a response to COVID-19 but was designed to be sustainable through enabling flexible, interactive, personalised and independent learning. Its five major components are independent learning tasks, online workshops, writing output, peer review and consultations. Moodle is used for resources and assignments; WebEx for workshops and consultations. Students independently use the e-coursebook to read the theory and submit tasks based on their own texts and articles in their discipline ahead of a workshop on the topic. Additionally, they periodically submit article drafts and engage in peer review. Consultations with the instructor further personalise learning. Having described the course, the chapter goes on to evaluate its affordances and issues by reporting student feedback and teachers’ experiences. It was found that students greatly appreciated the systematic work on their writing in tasks and workshops. However, workshop preparation was very time-consuming for teachers and students would prefer them to be ‘offline’. Furthermore, multidisciplinary peer reviewing and the need to write throughout the course were positively perceived, although requiring greater flexibility in submission times. Consultations were also rated as extremely useful. We conclude with recommendations regarding online course delivery and a blended adaptation for post-COVID purposes. [less ▲]

Detailed reference viewed: 45 (3 UL)
Full Text
Peer Reviewed
See detailPower Allocation for Space-Terrestrial Cooperation Systems with Statistical CSI
Chien, Trinh-Van; Lagunas, Eva UL; Hoang, Tiep M. et al

in IEEE Global Communications Conference (IEEE Globecom), Rio de Janeiro, Brazil, Dec. 2022 (2022, December)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailCoexistence of eMBB and URLLC in Open Radio Access Networks: A Distributed Learning Framework
Al-Senwi, Madyan Abdullah Othman UL; Lagunas, Eva UL; Chatzinotas, Symeon UL

in IEEE Global Communications Conference (IEEE Globecom), Rio de Janeiro, Brazil, Dec. 2022 (2022, December)

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailTerminal-Aware Multi-Connectivity Scheduler for Uplink Multi-Layer Non-Terrestrial Networks
Dazhi, Michael UL; Al-Hraishawi, Hayder UL; Mysore Rama Rao, Bhavani Shankar UL et al

Scientific Conference (2022, December)

This paper introduces the concept of multi-connectivity (MC) to the multi-orbit non-terrestrial networks (NTNs), where user terminals can be served by more than one satellite to achieve higher peak ... [more ▼]

This paper introduces the concept of multi-connectivity (MC) to the multi-orbit non-terrestrial networks (NTNs), where user terminals can be served by more than one satellite to achieve higher peak throughput. MC is a technique initially introduced by the 3rd Generation Partnership Project (3GPP) for terrestrial communications in 4G and 5G, it has shown much gain in the terrestrial domain and this paper explores areas where this concept can benefit the satellite domain. MC can increase throughput, but this entails increased power consumption at user terminal for uplink transmissions. The energy efficiency of uplink communications can be improved by designing efficient scheduling schemes, and to this end, we developed a terminal aware multi-connectivity scheduling algorithm. This proposed algorithm uses the available radio resources and propagation information to intelligently define a dynamic resource allocation pattern, that optimally routes traffic so as to maximize uplink data rate while minimizing the energy consumption at the UT. The algorithm operates with the terminal differentiating multi-layer NTN resource scheduling architecture, which has a softwarized dispatcher at the network layer that classifies and differentiates the packets based on terminal type. The performance of the proposed algorithm was compared with round robin and joint carrier schedulers in terms of uplink data rate and energy efficiency. We also provide architectural design of implementable schedulers for multi-orbital satellite networks that can operate with different classes of terminals. [less ▲]

Detailed reference viewed: 29 (5 UL)
Full Text
Peer Reviewed
See detailCorporate Managers, Price Noise and the Investment Factor
Lehnert, Thorsten UL

in Financial Innovation (2022), 8(61),

Detailed reference viewed: 51 (7 UL)
Full Text
Peer Reviewed
See detailRent, sell, and remanufacture: The manufacturer’s choice when remanufacturing can be outsourced
liu, Jian; Mantin, Binyamin UL; Song, Xuefeng

in European Journal of Operational Research (2022), 303(1), 184-200

Manufacturers have increasingly started offering rental options for the products they sell. Renting products offers an opportunity: segmenting consumers. However, this also raises a challenge: what to do ... [more ▼]

Manufacturers have increasingly started offering rental options for the products they sell. Renting products offers an opportunity: segmenting consumers. However, this also raises a challenge: what to do with the returned products? One solution is to remanufacture these products and then rent or resell them. Subsequently, should remanufacturing be outsourced to a third-party firm that can remanufacture at a lower cost? Here, we use a multi-period setting and examine the optimal decisions for different selling and renting constellations. Importantly, we allow the manufacturing costs of the sales and rental products to differ, as they seem to be critical in determining the manufacturer's renting and selling decisions and remanufacturing strategies. For example, under integrated (i.e. in-house) remanufacturing, when the new rental product's manufacturing cost is sufficiently high, no remanufacturing happens. Under both remanufacturing strategies—integrated and outsourced—the manufacturer does not rent new products in the second period if the manufacturing costs of the sales and rental products are identical. If the rental product's manufacturing cost is either sufficiently low or high, then integrated remanufacturing is more profitable; when this manufacturing cost is within a moderate range, the manufacturer outsources remanufacturing to an independent remanufacturer. Surprisingly, in some situations, the production quantity of the new sales product may even increase with its manufacturing cost. This is because the manufacturer may extract an even higher margin compared with the new rental product. Finally, we also consider several extensions such as uncertainty regarding the quality of the returned goods, simultaneous selling and renting of remanufactured goods, and longer horizons and the product's life cycle. [less ▲]

Detailed reference viewed: 45 (0 UL)
Full Text
Peer Reviewed
See detailPrivacy-preserving federated learning for residential short-term load forecasting
Delgado Fernandez, Joaquin UL; Potenciano Menci, Sergio UL; Lee, Chul Min UL et al

in Applied Energy (2022), 326

With high levels of intermittent power generation and dynamic demand patterns, accurate forecasts for residential loads have become essential. Smart meters can play an important role when making these ... [more ▼]

With high levels of intermittent power generation and dynamic demand patterns, accurate forecasts for residential loads have become essential. Smart meters can play an important role when making these forecasts as they provide detailed load data. However, using smart meter data for load forecasting is challenging due to data privacy requirements. This paper investigates how these requirements can be addressed through a combination of federated learning and privacy preserving techniques such as differential privacy and secure aggregation. For our analysis, we employ a large set of residential load data and simulate how different federated learning models and privacy preserving techniques affect performance and privacy. Our simulations reveal that combining federated learning and privacy preserving techniques can secure both high forecasting accuracy and near-complete privacy. Specifically, we find that such combinations enable a high level of information sharing while ensuring privacy of both the processed load data and forecasting models. Moreover, we identify and discuss challenges of applying federated learning, differential privacy and secure aggregation for residential short-term load forecasting. [less ▲]

Detailed reference viewed: 25 (7 UL)
Full Text
Peer Reviewed
See detailElectricity powered by blockchain: A review with a European perspective
Roth, Tamara UL; Utz, Manuel; Baumgarte, Felix et al

in Applied Energy (2022), 325

Blockchain is no longer just a hype technology, and effective blockchain applications exist in many industries. Yet, few blockchain projects have been successful in Europe’s energy systems. To identify ... [more ▼]

Blockchain is no longer just a hype technology, and effective blockchain applications exist in many industries. Yet, few blockchain projects have been successful in Europe’s energy systems. To identify the reasons for this slow progress, we reviewed the recent energy literature regarding the use of blockchain, analyzed industry reports, and interviewed experts who have conducted blockchain projects in Europe’s energy systems. Our analysis reveals eight common use cases, their expected benefits, and the challenges encountered. We find that the expected benefits are often little more than generic hopes, largely outweighed by technological, organizational, and regulatory challenges. The identified challenges are significant and numerous, especially for peer-to-peer trading and microgrid use cases. The fact that few projects have yet provided robust evidence for profitable use suggests there is still a rocky road ahead. Moreover, many use cases appear to require more than just blockchain technology to succeed. In particular, privacy and scalability requirements often call for systems in which blockchains only take a backseat. This realization may be essential for the future use of blockchain technology in energy systems – in Europe and beyond. [less ▲]

Detailed reference viewed: 12 (1 UL)
Full Text
Peer Reviewed
See detailSecure and Distributed Assessment of Privacy-Preserving Releases of GWAS
Pascoal, Túlio UL; Decouchant, Jérémie; Volp, Marcus UL

in ACM/IFIP International Middleware Conference (2022, November)

Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed ... [more ▼]

Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed algorithms for a federation of genome data holders that spans multiple institutional and legislative domains to securely compute GWAS results. However, these algorithms have limited applicability, since they still require a centralized instance to decide whether GWAS results can be safely disclosed, which is in violation to privacy regulations, such as GDPR. In this work, we introduce GenDPR, a distributed middleware that leverages Trusted Execution Environments (TEEs) to securely determine a subset of the potential GWAS statistics that can be safely released. GenDPR achieves the same accuracy as centralized solutions, but requires transferring significantly less data because TEEs only exchange intermediary results but no genomes. Additionally, GenDPR can be configured to tolerate all-but-one honest-but-curious federation members colluding with the aim to expose genomes of correct members. [less ▲]

Detailed reference viewed: 14 (6 UL)
Full Text
Peer Reviewed
See detailSpecifying Source Code and Signal-based Behaviour of CPS Components
Dawes, Joshua UL; Bianculli, Domenico UL

in Dawes, Joshua; Bianculli, Domenico (Eds.) Proceedings of the 18th International Conference on Formal Aspects of Component Software (2022, November)

Specifying properties over the behaviour of components of Cyber-Physical Systems usually focuses on the behaviour of signals, i.e., the behaviour of the physical part of the system, leaving the behaviour ... [more ▼]

Specifying properties over the behaviour of components of Cyber-Physical Systems usually focuses on the behaviour of signals, i.e., the behaviour of the physical part of the system, leaving the behaviour of the cyber components implicit. There have been some attempts to provide specification languages that enable more explicit reference to the behaviour of cyber components, but it remains awkward to directly express the behaviour of both cyber and physical components in the same specification, using one formalism. In this paper, we introduce a new specification language, Source Code and Signal Logic (SCSL), that 1) provides syntax specific to both signals and events originating in source code; and 2) does not require source code events to be abstracted into signals. We introduce SCSL by giving its syntax and semantics, along with examples. We then provide a comparison between SCSL and existing specification languages, using an example property, to show the benefit of using SCSL to capture certain types of properties. [less ▲]

Detailed reference viewed: 39 (18 UL)
Full Text
Peer Reviewed
See detailBetting Against Noisy Beta
Lehnert, Thorsten UL

in Journal of Finance and Data Science (2022), 8(-), 55-68

Detailed reference viewed: 52 (4 UL)