{"title":"Cybersecurity for Chemical Industry","authors":"M. Sadiku, S. Musa, O. Musa","doi":"10.2139/ssrn.3267292","DOIUrl":"https://doi.org/10.2139/ssrn.3267292","url":null,"abstract":"Cybersecurity risk pervades all sectors of the US economy. It challenges the reliability, resiliency, and safety of our infrastructures. The chemical industry, particularly the petro-chemical industry, is a critical infrastructure that is vulnerable to cyber attacks. By its nature, the chemical industry deals with products that are sometimes highly hazardous for people and the environment. Cyber attacks on chemical industry represent a threat beyond the boundaries of the factory involved. This paper presents a brief introduction to how cybersecurity affects the chemical industry.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124337717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Misreporting in Sensitive Health Behaviors and its Impact on Treatment Effects: An Application to Intimate Partner Violence","authors":"Jorge M. Agüero, Verónica Frisancho","doi":"10.2139/ssrn.3103802","DOIUrl":"https://doi.org/10.2139/ssrn.3103802","url":null,"abstract":"A growing literature seeks to identify policies that could reduce intimate partner violence. However, in the absence of reliable administrative records, this violence is often measured using self-reported data from health surveys. In this paper, an experiment is conducted comparing data from such surveys against a methodology that provides greater privacy to the respondent. Non-classical measurement error in health surveys is identified as college-educated women, but not the less educated, underreport physical and sexual violence. The paper provides a low-cost solution to correct the bias in the estimation of causal effects under non-classical measurement error in the dependent variable.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123220801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Chip Off the Old Block or a New Direction for Payment Card Security? Chips, Pins, and the Law and Economics of Payment Card Fraud","authors":"James C. Cooper, Todd J. Zywicki","doi":"10.2139/ssrn.3169606","DOIUrl":"https://doi.org/10.2139/ssrn.3169606","url":null,"abstract":"The issue of consumer payments and data security has reached a high level of public and regulatory interest as a result of a number of recent high-profile data breaches that compromised consumer payment cards. In addition, the ecosystem of consumer payment security has changed dramatically in recent years as a result of the introduction and rapid spread of contactless payment technologies. In response to growing concerns about payment fraud, payment card networks in the United States have moved toward the rapid replacement of traditional magnetic-stripe payment card technology to new EMV (Europay, Mastercard, and Visa) computer chip–based technology. Notably, however, US card issuers and networks have chosen not to adopt the personal identification number (PIN) method of customer verification that has been standard in the United Kingdom and much of Europe for the past decade or so but instead have chosen signature verification as the preferred method. This article conducts an economic analysis of the regulation of consumer payment cards and payment card fraud. We examine the marginal benefits and costs from heightened levels of payment card security. We examine the dynamic evolution of payment card anti-fraud technology over time and suggest that there is little evidence of market failure in the provision of payment security by card networks and issuers and little reason to believe that mandating one exclusive, decades-old, static verification technology (namely, chip and PIN) would be likely to improve overall consumer welfare and economic efficiency today. We conclude that rather than blindly adopting the particular verification technology that Europe put into place many years ago, US regulators should be alert to the evolving and contemporary nature of consumer payments and the fluid nature of threats to data privacy and thus should not freeze or hamper the adaptability of the payment system.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121369632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compliance Externalities and the Role Model Elect on Law Abidance: Field and Survey-Experimental Evidence","authors":"M. Fabbri, Sven Hoeppner","doi":"10.2139/ssrn.2963577","DOIUrl":"https://doi.org/10.2139/ssrn.2963577","url":null,"abstract":"Recent theories of compliance predict that, apart from utilitarian considerations, individual decisions to respect or break the law account for virtuous motives and non-utilitarian willingness to promote the social good. We test whether empirical evidence resonates with these theories by collecting in a natural setting data on cyclists’ decisions to run a red traffic light. We consider different situations where non-compliance is costly but without risk and material deterrence incentives from legal sanctions remain constant. The only difference between the situations lies in who is observing the cyclists’ decision at the traffic light at the intersection of a footpath with the cycle track. We find that about 60% of cyclists ignore the red traffic light when there is the opportunity to do so. This frequency does not change substantially when adult bystanders are observing at the pedestrian traffic light. Interestingly, the violation frequency drops to about 10% when children are present. Robustness checks rule out the suggestion that this change is driven by concerns for childrens’ unpredictable actions, or by the simultaneous presence of other adult bystanders. In a vignette study, we disentangle the cyclists’ motives. Results confirm the “role-model effect\" on compliance. The majority of participants self-report that willingness to educate and be a good example is the most important reason for their decision to abide by the law, hence supporting the empirical observation that non-utilitarian motives can be an important determinant of compliance decisions.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133927769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Sector Reform: Nigerian Men, Gender Rights and Organizational Culture","authors":"Obianuju Osude","doi":"10.2139/ssrn.2959081","DOIUrl":"https://doi.org/10.2139/ssrn.2959081","url":null,"abstract":"This dissertation seeks to analyze the impact of societal norms on the organizational culture of security sector institutions with respect to male gender rights. A case study of the Nigeria Police Force's response to male victims of gender-based violence (GBV) was used as the basis of the research. \u0000Service delivery by officers of the Nigeria Police Force (NPF) has remained one of the major indicators for the success of the security sector reform process in Nigeria. Considered a highly repressive male dominated and gender-insensitive institution, for the past few years, there have been persistent calls for the transformation of the NPF into a citizen-friendly organization. In response, several reform-oriented initiatives have been introduced and implemented. In 2009, the NPF adopted its institutional Gender Policy and reconstituted its Gender Unit on 13th October 2014, all in a bid to ensure that gender is effectively mainstreamed in its organizational culture. By comparing the case study findings on the policies, norms and employee behavior within the NPF with a literature review and analytical framework, the dissertation attempts to determine whether the existing culture within the Nigerian society plays a major role in the organizational culture of the NPF in respect to institutional response to male victims of gender based violence.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115191810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does Increasing Ethnic Representativeness Reduce Police Misconduct? Evidence from Police Reform in England and Wales","authors":"Sounman Hong","doi":"10.1111/PUAR.12629","DOIUrl":"https://doi.org/10.1111/PUAR.12629","url":null,"abstract":"This study examines whether representative bureaucracy improves organizational integrity. The evidence is from English and Welsh police forces that implemented ambitious targets to increase ethnic minority officers during the 1999-2010 period. Specifically, we present evidence of an association between an increase in police force ethnic minority representation and a subsequent reduction in police misconduct. An increase in representativeness is also shown to be associated with a decrease in the share of black complainants but not with a change in the ethnicity of those subject to complaints. This evidence suggests that diversifying a bureaucratic workforce to reflect the community it serves may effectively catalyze bureaucratic integrity. In turn, improved organizational integrity influences bureaucrats’ attitudes and behaviors towards minority citizens, resulting in greater satisfaction among the minority constituents. Representative bureaucracy may be an effective internal means of controlling administrative power for the good of the citizenry.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115375014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Economists' and Criminologists' Views on Guns: Crime, Suicides, and Right-to-Carry Concealed Handgun Laws","authors":"J. Lott, G. Mauser","doi":"10.2139/SSRN.2728123","DOIUrl":"https://doi.org/10.2139/SSRN.2728123","url":null,"abstract":"Economists and Criminologists have very different models of human behavior. A total of 74 out of all 130 academics who published peer-reviewed empirical research on gun issues in criminology and economics journals responded to our survey. That was a 57% response rate. Looking at their views on their views on deterrence and regulations generally, our survey finds that these two groups have very different views on gun regulations that vary in systematic, predictable ways. Our survey results are consistent with those predictions and statistically significant. While economists tend to view guns as making people safer, criminologists hold this position less strongly. Combining all the economists and criminologists together shows that researchers believe that guns are used more in self-defense than in crime; gun-free zones attract criminals; guns in the home do not increase the risk of suicide; concealed handgun permit holders are much more law-abiding than the typical American; and that permitted concealed handguns lower the murder rate. All those results are statistically significant. The survey of economists was conducted from August 25th to September 12th 2014. The survey of criminologists was conducted from May 29th to June 14th 2015.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131453639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metoda scenariilor în analiza informațiilor de securitate națională. Studiu teoretic-aplicativ (Using Scenerio Building Method for National Security Intelligence Analysis. Theoretical and Practical Study)","authors":"Iulian F. Popa","doi":"10.2139/ssrn.2580757","DOIUrl":"https://doi.org/10.2139/ssrn.2580757","url":null,"abstract":"Romanian Abstract: Metoda scenariilor presupune analiza prospectivă și modelarea probabilistică a implicațiilor posibile ale unor ale unor evenimente actuale și/sau anterioare asupra viitorului. Selectarea, conturarea și proiectarea de scenarii asupra viitorului – bazate pe elemente cunoscute și validate din trecut sau prezent – constituie, de fapt, procese și mijloace prin care se incearcă minimizarea gradului de incertitudine ce planează asupra unor evenimente posibile și/sau probabile din viitor. In cadrul acestui studiu, am incercat să arăt de ce metoda (sau tehnica analizei) scenariilor contribuie semnificativ la identificarea și structurarea unor posibile repere de interes ale viitorului, in scopul acumulării sau fundamentării cunoașterii necesare luării deciziilor și limitării pe cât posibil a neprevăzutului.English Abstract: Scenario building method involves the use of prospective analysis for mapping the future starting from plausible and scientifically validated information. By selecting, shaping, and designing scenarios regarding the future – based on known and validated elements from the past or present – the analysts try to minimize the uncertainty linked to any possible and/or probable events from the future. In other words, the scenario building method helps the analysts to properly identify and structure future events of interest (e.g. security risks, threats, opportunities, etc.) in order to properly or consistently brief the customers’ and enhance their knowledge regarding what is necessary to be done. In this paper I create a common and introductory theoretical framework regarding the use of scenario building method within intelligence and security analysis.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115388862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Socio-Technical Concerns for Smart Grid Security and Resilience","authors":"K. Kubeczko, L. Langer, M. Paier, Paul Smith","doi":"10.2139/ssrn.2824408","DOIUrl":"https://doi.org/10.2139/ssrn.2824408","url":null,"abstract":"The future smart grid will make use of ICT to support the inclusion of new renewable energy sources and advanced energy services. In some cases, the Internet will be used as part of this critical infrastructure, e.g., to enable communication with end-user services. Consequently, developing technologies for ensuring the security and resilience of smart grids and the Internet are of paramount importance. For these technologies to be widely adopted, important socio-economic aspects must be considered, which will be addressed in a new EU-funded project, called SPARKS. In this paper, two examples are given of how socio-economic aspects affect security and resilience of smart grid development. The first one outlines the chain-of-custody issue, which might influence the security architecture of a smart grid. The second one outlines a bottleneck in the institutional setting, which might restrict the flexibility and resilience at the distribution level of smart grids.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128295918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case Study: Harmonizing Security Rights","authors":"W. Loof, A. Berlee","doi":"10.2139/SSRN.2462137","DOIUrl":"https://doi.org/10.2139/SSRN.2462137","url":null,"abstract":"An undertaking is financed primarily by two groups: the financiers, generally banks, and the suppliers of the undertaking. The extent to which these separate groups can take security is a policy choice made by the lawgiver. Currently these policy choices are made on a national level. Should that remain so, or should the choices be made on a different level? This contribution aims to provide an answer to that question by concentrating on the substantive legal political choices that are currently made by the national legislators, and assess whether harmonization, either by a top-down or bottom-up approach, would provide at least a minimal efficiency gain (similar to a ‘Pareto-improvement’) relative to the current situation. In particular, the extent of the security that can be taken is assessed. Does this include future assets, newly formed goods, and even the proceeds of the sale to sub-purchasers? The development of the law on security in The Netherlands, England & Wales and Belgium is assessed in light of these questions. Furthermore, various model laws aimed at the harmonization of this area of the law, such as Book IX DCFR and Article 9 UCC, are also taken into account. The authors come to the conclusion that the national policy choices in relation to the security available for a financier are very similar, whereas in relation to suppliers there appears to be a larger discrepancy. Therefore, they purport that a functional approach, on the basis of a model law, would be the preferred method of harmonization. In this way step-by-step harmonization can be achieved, starting with a security right for financiers, without upsetting the national system of ‘superpriorities’.","PeriodicalId":165936,"journal":{"name":"PSN: Security & Safety (Topic)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133797077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}