University of Oxford

Displaying 1-40 of 126 results

  • White Papers // Jul 2012

    Software Verification for Weak Memory Via Program Transformation

    Despite multiprocessors implementing weak memory models, verification methods often assume Sequential Consistency (SC), thus may miss bugs due to weak memory. The authors propose a sound transformation of the program to verify, enabling SC tools to perform verification w.r.t. weak memory. They present experiments for a broad variety of models...

    Provided By University of Oxford

  • White Papers // May 2012

    Provenance as a Security Control

    Much has been written about security and provenance. Although both have their own large areas of concern, there is a very significant intersection. One is often brought to bear upon the other, in the study of the security of provenance. The authors discuss through a series of examples how provenance...

    Provided By University of Oxford

  • White Papers // Dec 2011

    Advances in Probabilistic Model Checking

    Probabilistic model checking is an automated verification method that aims to establish the correctness of probabilistic systems. Probability may arise, for example, due to failures of unreliable components, communication across lossy media, or through the use of randomisation in distributed protocols. Probabilistic model checking enables a range of exhaustive, quantitative...

    Provided By University of Oxford

  • White Papers // Jun 2011

    Rewriting Ontological Queries Into Small Non-recursive Datalog Programs

    This paper is about query rewriting in the context of ontological database access. Query rewriting is an important new optimization technique specific to ontological queries. The essence of query rewriting, as will be explained in more detail below, is to compile a query and an ontological theory (usually formulated in...

    Provided By University of Oxford

  • White Papers // Jun 2011

    Here's Johnny: A Methodology for Developing Attacker Personas

    The adversarial element is an intrinsic part of the design of secure systems, but the assumptions about attackers and threat is often limited or stereotypical. Although there has been previous work on applying user-centered design on Persona development to build personas for possible attackers, such work is only speculative and...

    Provided By University of Oxford

  • White Papers // Jun 2011

    The Political Economy Of Global Financial Liberalisation In Historical Perspective

    This paper is a first attempt to garner the theory and evidence on the political economy of the first wave of financial liberalisation during the nineteenth and early twentieth century, and of its demise after World War I. Not everyone gained from the process of globalisation (of trade, labour, and...

    Provided By University of Oxford

  • White Papers // May 2011

    User-Centered Information Security Policy Development in a Post-Stuxnet World

    A balanced approach is needed for developing information security policies in Critical National Infrastructure (CNI) contexts. Requirements engineering methods can facilitate such an approach, but these tend to focus on either security at the expense of usability, or vice-versa; it is also uncertain whether existing techniques are useful when the...

    Provided By University of Oxford

  • White Papers // May 2011

    Temporal Evolution Of Financial Market Correlations

    The authors investigate financial market correlations using random matrix theory and principal component analysis. They use random matrix theory to demonstrate that correlation matrices of asset price changes contain structure that is incompatible with uncorrelated random price changes. They then identify the principal components of these correlation matrices and demonstrate...

    Provided By University of Oxford

  • White Papers // May 2011

    Fiscal Policy Adjustment To Shocks In Commodity-producing Countries

    This paper investigates the optimal fiscal policy adjustment to adverse terms of trade shocks by commodity-producing countries within a general equilibrium model, which allows for explicit distinction between public investment and government consumption. As the private sector has limited room for maneuver in correcting the shock itself, the public sector...

    Provided By University of Oxford

  • White Papers // Apr 2011

    Modelling in Java

    The development of software systems may be facilitated through modeling at different levels of abstraction. Various factors conspire to de-emphasise modeling in a commercial development process, such as pressure to deliver production code and its supporting documentation, the perception that modeling is an unstructured or opaque process, and the propensity...

    Provided By University of Oxford

  • White Papers // Apr 2011

    Leaving Matters: The Nature, Evolution And Effects Of Emigration Policies

    Debates on migration policies are strongly focused on immigration control, revealing a general receiving-country bias in migration research. To fill this gap, this paper reviews the nature, evolution and effects of emigration policies. Only a declining number of strong, authoritarian states with closed economies are willing and capable of imposing...

    Provided By University of Oxford

  • White Papers // Apr 2011

    Discussing Legal Adaptations Perspectives On Studying Migrants' Relationship With Law In The Host Country

    With immigration becoming a structural feature of nearly all industrialized countries, the twentieth century saw a development of a set of theoretical approaches to study the relationship between immigrants and the legal system of the host country. These frameworks - legal assimilation, legal transnationalism, legal pluralism, legal culture - legal...

    Provided By University of Oxford

  • White Papers // Apr 2011

    The Role Of Internal And International Relative Deprivation In Global Migration

    This paper analyses the role of internal (within-country) and international (bilateral and global) relative deprivation and absolute deprivation in international migration. It is argued that these three forms of relative deprivation need to be simultaneously taken into account in order to advance the theoretical understanding of the complex drivers of...

    Provided By University of Oxford

  • White Papers // Mar 2011

    A Win-Win Monetary Policy In Canada

    The Lucas critique has exposed the problem of the trade-off between changes in monetary policy and structural breaks in economic time series. The search for and characterization of such breaks has been a major econometric task ever since. The authors have developed an integral technique similar to CUSUM using an...

    Provided By University of Oxford

  • White Papers // Mar 2011

    Global Challenges From The Rapid Rise Of China

    Over the last 30 years there has already been a significant power shift to developing world in general and to China in particular. Section A tracks the shift in economic power to China by looking at shares of global GDP in terms of purchasing power parity. Section B provides a...

    Provided By University of Oxford

  • White Papers // Mar 2011

    A Multi-Period Bank Run Model For Liquidity Risk

    The authors present a new dynamic bank run model for liquidity risk where a financial institution finances its risky assets by a mixture of short- and long-term debt. The financial institution is exposed to liquidity risk as its short-term creditors have the possibility not to renew their funding at a...

    Provided By University of Oxford

  • White Papers // Mar 2011

    Comparing The Delegation Of Monetary And Fiscal Policy

    The apparent success of independent central banks in conducting monetary policy has led many to argue that some form of policy delegation should also be applied to the macroeconomic aspects of fiscal policy. A number of countries have recently established Fiscal Councils, although their role is typically to give advice...

    Provided By University of Oxford

  • White Papers // Mar 2011

    Relocating The Value Chain: Off-Shoring And Agglomeration In The Global Economy

    Fragmentation of stages of the production process is determined by international cost differences and by the benefits of co-location of related stages. The interaction between these forces depends on the technological relationships between these stages. This paper looks at both cost minimising and equilibrium fragmentation under different technological configurations. Reductions...

    Provided By University of Oxford

  • White Papers // Feb 2011

    Processing-Trade-Cum-FDI, Firm Heterogeneity And Exports Of Indigenous Firms: Firm-level Evidence From Technology-intensive Industries In China

    Using firm-level panel data from China, this paper examines the impact of processing trade-cum-foreign direct investment on the export performances of indigenous firms in technology-intensive industries. It finds that although a few industries have experienced rapid growth over the sample period, so far the indigenous Chinese firms have not built...

    Provided By University of Oxford

  • White Papers // Feb 2011

    China And The World: Assessment And Prospect Of The ?Post-Crisis? Era

    There have appeared four obvious trends in the present global development: economic globalization, ICT revolution, growing diversification of the world and green industrial revolution. Side by side are two new interactive developments: first, the demand for global public goods (including global security, global ecological environment, measures against global climate change...

    Provided By University of Oxford

  • White Papers // Feb 2011

    Uncanny Partnership In Global Imbalances: China?s Continual Accumulation Of US Treasuries

    The combination of American consumption excess and China's financial extravaganza in accumulating US treasuries has widely been perceived as a major contributor to the global imbalances. The current research examines whether this uncanny partnership can last long by concentrates on the Chinese side of the story, i.e. to what extent...

    Provided By University of Oxford

  • White Papers // Feb 2011

    Open Innovation In China: Policies And Practices

    This paper reviews the evolution of policies and practices concerning open innovation in China. Based on evidence from firm-level case studies, it analyses various practices of open innovation in indigenous Chinese companies. It finds that the Chinese firms have in practice employed a variety of open innovation models since the...

    Provided By University of Oxford

  • White Papers // Feb 2011

    The Dual Role Of Universities In Industrial Innovation In Emerging Economies: A Comparative Study Of China And The UK

    This paper attempts to investigate the role of universities in industrial innovation in emerging economies using a firm-level survey database from China. It also benchmarks the Chinese pattern against that of the UK. It finds that domestic universities have played a significant role in the promotion of the diffusion of...

    Provided By University of Oxford

  • White Papers // Feb 2011

    Firm Selection Into Export-Platform Foreign Direct Investment

    The authors characterize how firms select into exporting or foreign direct investment, and how many plants they choose to establish, in a group of foreign countries. They show that, if and only if firms' maximum profits are supermodular in tariffs and production costs, then: the most efficient firms establish a...

    Provided By University of Oxford

  • White Papers // Feb 2011

    Financial Development, Financial Instability And Poverty

    This paper investigates how financial development is beneficial to the reduction of poverty, on the one hand by promoting growth and in the other hand directly by the McKinnon conduit effect. At the same time, however, financial instability which accompanies financial development is detrimental to the poor and dampens the...

    Provided By University of Oxford

  • White Papers // Feb 2011

    What Should Fiscal Councils Do?

    Fiscal councils now exist in a number of countries. This paper first considers the extent of deficit bias, potential explanations for it, and how independent institutions could help reduce it. Are fiscal councils complements to or substitutes for fiscal rules, and why do none at present have any formal control...

    Provided By University of Oxford

  • White Papers // Jan 2011

    Two Requirements for Usable and Secure Software Engineering

    Despite the acknowledged need for systems to be both usable and secure, the authors lack guidance on how developers might build such systems. Based on recent research, they believe evidence exists that blending techniques from security, usability, and software engineering can lead to effective design processes for building such systems....

    Provided By University of Oxford

  • White Papers // Jan 2011

    FDI And Export Upgrading

    The debate on trade and growth increasingly focuses on the composition of exports. Exports of more "Sophisticated" products appear to be positively correlated with growth, and upgrading the quality of exports is high on the policy agenda of many countries. This paper presents evidence suggesting that attracting inflows of FDI...

    Provided By University of Oxford

  • White Papers // Jan 2011

    Decision Costs In Legislative Bargaining: An Experimental Analysis

    The authors conduct an experiment to assess the effects of different decision rules on the costs of decision making in a multilateral bargaining situation. Specifically, they compare the amount of costly delay observed in an experimental bargaining game under majority and unanimity rule. The main finding is that individual subjects...

    Provided By University of Oxford

  • White Papers // Dec 2010

    Strategic Thinking

    Most applications of game theory assume equilibrium, justified by presuming that learning will have converged to one; or in settings where that is implausible, that equilibrium approximates people's strategic thinking without learning. Yet recent experimental work suggests that initial responses to many kinds of games deviate systematically from equilibrium, and...

    Provided By University of Oxford

  • White Papers // Dec 2010

    Oligopoly And Trade

    In this chapter the authors present a selective analytic survey of some of the main results of trade under oligopoly. They concentrate on three topics: oligopoly as an independent determinant of trade, as illustrated by the reciprocal-markets model of Brander (1981); oligopoly as an independent rationale for government intervention, as...

    Provided By University of Oxford

  • White Papers // Dec 2010

    Privacy for mHealth Presence

    mHealth data provision focuses on providing health services to patients via mobile devices and presence technologies. It has great influence to the healthcare business today, especially in the developing countries. However, the mHealth presence might be sensitive; and it brings potential privacy issues. For controlling what presence information can be...

    Provided By University of Oxford

  • White Papers // Dec 2010

    Transitory Shocks And Long-Term Human Capital Accumulation: The Impact Of ConfliIct On Physical Health In Peru

    The recent literature on human capital highlights the importance of investments during the first few years after birth as a determinant of economic outcomes later in life, including labor productivity. This paper assesses the relationship between conflict exposures a transitory, aggregate, shock and early nutrition. The relationship between conflict exposure...

    Provided By University of Oxford

  • White Papers // Dec 2010

    International Cooperation And The Antitrafficking Regime

    States have cooperated on combating trafficking in persons for over a century. Over this period, the focus of countering trafficking in persons has broadened, moving from women exclusively, to include all persons, and from prostitution to nearly all forms of exploitation. As both the definition of groups of trafficked persons...

    Provided By University of Oxford

  • White Papers // Nov 2010

    The Effect Of Macroeconomic Shocks On A Small Open Economy With Financial Accelerator: Lessons For Eastern Europe

    This paper considers the effect of four shocks on the economies of the ten Eastern European transitional countries that recently joined the European Union. Each of these shocks stems from the process of integration and financial liberalization that these countries experience as they move from a centrally planned to a...

    Provided By University of Oxford

  • White Papers // Nov 2010

    On Software Verification for Sensor Nodes

    The authors consider software written for networked, wireless sensor nodes, and specialize software verification techniques for standard C programs in order to locate programming errors in sensor applications before the software's deployment on motes. Ensuring the reliability of sensor applications is challenging: low-level, interrupt-driven code runs without memory protection in...

    Provided By University of Oxford

  • White Papers // Nov 2010

    Productivity Analysis In Global Manufacturing Production

    Despite the widely recognised importance of the manufacturing industry for successful development few studies investigate this sector in cross-country analysis. The authors fill this gap in the literature by analysing manufacturing production across a large number of developing and developed economies. The empirical framework allows for heterogeneous production technology and...

    Provided By University of Oxford

  • White Papers // Nov 2010

    Are Women More Sensitive To The Decision-Making Context?

    The authors conduct an experiment to assess gender differences across different economic contexts. Specifically, they test whether women are more sensitive to the decision-making context in situations in which different fairness principles can be used. They find that women adopt more often than men conditional fairness principles that require information...

    Provided By University of Oxford

  • White Papers // Nov 2010

    A Dissimilarity Index Of Multidimensional Inequality Of Opportunity

    A recent literature on inequality of opportunity offers quantitative tools for comparisons and measurement based on stochastic dominance criteria and traditional inequality indices. In this paper the author suggests an additional way of assessing inequality of opportunity with two indices of dissimilarity across distributions. The indices are based on a...

    Provided By University of Oxford

  • White Papers // Oct 2010

    Do Natural Resources Attract FDI? Evidence From Non-stationary Sector-level Data

    A new and extensive panel of outward Foreign Direct Investment (FDI) at the sector level is used to estimate the determinants of non-resource and resource FDI. Since FDI is I(1), the authors estimate panel error-correction models of FDI with spatial lags for FDI and market potential. The main result is...

    Provided By University of Oxford

  • White Papers // Jul 2012

    Software Verification for Weak Memory Via Program Transformation

    Despite multiprocessors implementing weak memory models, verification methods often assume Sequential Consistency (SC), thus may miss bugs due to weak memory. The authors propose a sound transformation of the program to verify, enabling SC tools to perform verification w.r.t. weak memory. They present experiments for a broad variety of models...

    Provided By University of Oxford

  • White Papers // May 2008

    Selectivity And Timing Performance Of Funds Of Hedge Funds: A Time-Varying Approach

    This paper empirically examines the time variation of the selectivity and timing performance of funds of hedge funds by employing rolling versions of the performance regression models of Jensen (1968) and Treynor and Mazuy (1966). The authors propose a cross-sectional regression method similar to those used by Fama and McBeth...

    Provided By University of Oxford

  • White Papers // Jun 2009

    The Life Cycle Of Family Ownership: A Comparative Study Of France, Germany, Italy And The U.K.

    Using firm-level data for the largest four European economies, this paper analyzes the evolution of ownership of the largest 4,000 companies, private or listed, in France, Germany, Italy and the U.K. over the 1996-2006 period. The authors find that family ownership in the U.K. follows a life cycle: U.K. family...

    Provided By University of Oxford

  • White Papers // Feb 2009

    Does Beta Move With News? Systematic Risk And Firm-Specific Information Flows

    This paper studies time-varying patterns in the systematic risk (or beta) of individual stocks during firm-specific information flows. The authors show that systematic risk increases by an economically and statistically significant amount on news announcement days, before reverting to its average level two to five days later. The authors employ...

    Provided By University of Oxford

  • White Papers // Feb 2009

    Prospect Theory, Partial Liquidation And The Disposition Effect

    The authors solve a liquidation problem for an agent with prospect theory preferences who seeks to sell a portfolio of (divisible) claims on an underlying asset. Their methodology enables them to consider different formulations of prospect preferences in the literature, and various asset price processes. They find that these differences...

    Provided By University of Oxford

  • White Papers // Aug 2009

    1xM Packet-Switched Router Based on the PPM Header Address for All-Optical WDM Networks

    This paper presents all-optical 1xM router architecture for simultaneous multiple-wavelength packet routing, without the need for wavelength conversion. The packet header address is based on the Pulse Position Modulation (PPM) format, which allows the use of only a single-bitwise optical AND gate for fast packet header address correlation. The proposed...

    Provided By University of Oxford

  • White Papers // Dec 2010

    Privacy for mHealth Presence

    mHealth data provision focuses on providing health services to patients via mobile devices and presence technologies. It has great influence to the healthcare business today, especially in the developing countries. However, the mHealth presence might be sensitive; and it brings potential privacy issues. For controlling what presence information can be...

    Provided By University of Oxford

  • White Papers // Jun 2011

    Rewriting Ontological Queries Into Small Non-recursive Datalog Programs

    This paper is about query rewriting in the context of ontological database access. Query rewriting is an important new optimization technique specific to ontological queries. The essence of query rewriting, as will be explained in more detail below, is to compile a query and an ontological theory (usually formulated in...

    Provided By University of Oxford

  • White Papers // Dec 2011

    Advances in Probabilistic Model Checking

    Probabilistic model checking is an automated verification method that aims to establish the correctness of probabilistic systems. Probability may arise, for example, due to failures of unreliable components, communication across lossy media, or through the use of randomisation in distributed protocols. Probabilistic model checking enables a range of exhaustive, quantitative...

    Provided By University of Oxford

  • White Papers // May 2012

    Provenance as a Security Control

    Much has been written about security and provenance. Although both have their own large areas of concern, there is a very significant intersection. One is often brought to bear upon the other, in the study of the security of provenance. The authors discuss through a series of examples how provenance...

    Provided By University of Oxford

  • White Papers // Apr 2010

    Reasoning About Codata

    Programmers happily use induction to prove properties of recursive programs. To show properties of co-recursive programs they employ co-induction, but perhaps less enthusiastically. Co-induction is often considered a rather low-level proof method, in particular, as it departs quite radically from equational reasoning. Co-recursive programs are conveniently defined using recursion equations....

    Provided By University of Oxford

  • White Papers // Oct 2010

    Do Natural Resources Attract FDI? Evidence From Non-stationary Sector-level Data

    A new and extensive panel of outward Foreign Direct Investment (FDI) at the sector level is used to estimate the determinants of non-resource and resource FDI. Since FDI is I(1), the authors estimate panel error-correction models of FDI with spatial lags for FDI and market potential. The main result is...

    Provided By University of Oxford

  • White Papers // Sep 2010

    Roll Out The Red Carpet And They Will Come: Investment Promotion And FDI Inflows

    As red tape in host countries and information asymmetries constitute a significant obstacle to investment flows across international borders, an important policy question is: what can aspiring FDI destinations do to reduce such barriers? This paper uses newly collected data on 124 countries to examine the effects of investment promotion...

    Provided By University of Oxford

  • White Papers // Feb 2009

    International Trade In General Oligopolistic Equilibrium

    This paper presents a new model of oligopoly in general equilibrium and explores its implications for positive and normative aspects of international trade. Using a "Continuum-quadratic" specification of preferences, the model allows for consistent aggregation over a continuum of sectors, each of which is characterised by Cournot competition between a...

    Provided By University of Oxford

  • White Papers // Jun 2010

    Corporate Tax Effects On The Quality And Quantity Of FDI

    This paper measures the relative importance of quality and quantity effects of corporate taxation on foreign direct investment. Quantity is affected if corporate taxes reduce the equilibrium stock of foreign capital in a given country. Quality effects arise if taxes decrease the extent to which investment contributes to the corporate...

    Provided By University of Oxford

  • White Papers // Nov 2010

    The Effect Of Macroeconomic Shocks On A Small Open Economy With Financial Accelerator: Lessons For Eastern Europe

    This paper considers the effect of four shocks on the economies of the ten Eastern European transitional countries that recently joined the European Union. Each of these shocks stems from the process of integration and financial liberalization that these countries experience as they move from a centrally planned to a...

    Provided By University of Oxford

  • White Papers // Aug 2010

    Globalized Finance And National Regulation: The Influence Of Internationalization On Supervisory Consolidation

    Financial regulatory reform remains high on global and national political agendas. Some proposals call for the consolidation of regulatory structures by merging or eliminating existing regulatory agencies. Financial supervisory consolidation has occurred in a number of developed countries over the past two and a half decades. This paper seeks to...

    Provided By University of Oxford

  • White Papers // Feb 2009

    The Recession And Migration: Alternative Scenarios

    The current recession, expected to be the worst in a generation, is likely to affect international migration and remittances differently than past recessions. In 1973-74 and 1981-82, a rise in oil prices was associated with recession in oil-buying countries and an economic boom in oil-exporting countries, enabling some migrants to...

    Provided By University of Oxford

  • White Papers // Apr 2011

    Leaving Matters: The Nature, Evolution And Effects Of Emigration Policies

    Debates on migration policies are strongly focused on immigration control, revealing a general receiving-country bias in migration research. To fill this gap, this paper reviews the nature, evolution and effects of emigration policies. Only a declining number of strong, authoritarian states with closed economies are willing and capable of imposing...

    Provided By University of Oxford

  • White Papers // Oct 2009

    Insurance, Credit And Safety Nets For The Poor In A World Of Risk

    This paper asks how insurance can be more effectively delivered to the poor, and what its role should be relative to other microfinance programmes, safety nets and informal insurance systems. The authors focus on the various interactions, including how insurance may crowd out credit and informal insurance, and implications for...

    Provided By University of Oxford

  • White Papers // Mar 2011

    A Multi-Period Bank Run Model For Liquidity Risk

    The authors present a new dynamic bank run model for liquidity risk where a financial institution finances its risky assets by a mixture of short- and long-term debt. The financial institution is exposed to liquidity risk as its short-term creditors have the possibility not to renew their funding at a...

    Provided By University of Oxford

  • White Papers // Apr 2010

    Conceptual Knowledge Acquisition Using Automatically Generated Large-Scale Semantic Networks

    The authors present a method for automatically creating large-scale semantic networks from natural language text, based on deep semantic analysis. They provide a robust and scalable implementation, and sketch various ways in which the representation may be deployed for conceptual knowledge acquisition. A translation to RDF establishes interoperability with a...

    Provided By University of Oxford

  • White Papers // Feb 2010

    SUAAVE: Combining Aerial Robots and Wireless Networking

    The SUAAVE project is funded by EPSRC under the WINES wireless networking initiative to consider issues of multiple aerial vehicles communicating and collaborating in performing tasks, and involves teams from University College London, University of Ulster, and the University of Oxford. The focus of SUAAVE lies in the creation and...

    Provided By University of Oxford

  • White Papers // Feb 2010

    Trusted Computing and Provenance: Better Together

    It is widely realised that provenance systems can benefit from greater awareness of security principles and the use of security technology. In this paper, the authors argue that trusted computing, a hardware-based method for establishing platform integrity, is not only useful, but immediately applicable. They demonstrate how existing trusted computing...

    Provided By University of Oxford

  • White Papers // Jun 2011

    Here's Johnny: A Methodology for Developing Attacker Personas

    The adversarial element is an intrinsic part of the design of secure systems, but the assumptions about attackers and threat is often limited or stereotypical. Although there has been previous work on applying user-centered design on Persona development to build personas for possible attackers, such work is only speculative and...

    Provided By University of Oxford

  • White Papers // May 2011

    User-Centered Information Security Policy Development in a Post-Stuxnet World

    A balanced approach is needed for developing information security policies in Critical National Infrastructure (CNI) contexts. Requirements engineering methods can facilitate such an approach, but these tend to focus on either security at the expense of usability, or vice-versa; it is also uncertain whether existing techniques are useful when the...

    Provided By University of Oxford

  • White Papers // Jan 2011

    Two Requirements for Usable and Secure Software Engineering

    Despite the acknowledged need for systems to be both usable and secure, the authors lack guidance on how developers might build such systems. Based on recent research, they believe evidence exists that blending techniques from security, usability, and software engineering can lead to effective design processes for building such systems....

    Provided By University of Oxford

  • White Papers // Sep 2010

    Security and Usability: Searching for the Philosopher's Stone

    This paper describes the unique challenges facing usable security research and design, and introduces three proposals for addressing these. For all intents and purposes security design is currently a craft, where quality is dependent on individuals and their ability, rather than principles and engineering. However, the wide variety of different...

    Provided By University of Oxford

  • White Papers // Mar 2010

    A Model of Security Culture for e-Science

    There is a need to understand the cultural issues affecting security in large, distributed and heterogeneous systems; such systems are typified by e-Science projects. The authors present a model of security culture for e-Science, grounded both in the security literature and in empirical data from an e-Science project. From this...

    Provided By University of Oxford

  • White Papers // Aug 2010

    The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design

    Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats endangering it. Often, however, personas need to be partly derived from assumptions; these may be embedded in a variety of different representations. Assumption Personas have been...

    Provided By University of Oxford

  • White Papers // Jun 2010

    Barry Is Not the Weakest Link: Eliciting Secure System Requirements With Personas

    Building secure and usable systems mean specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-centered design approaches encourage an early focus on users and their contexts of use, but these need to be integrated with approaches for engineering secure systems. This paper...

    Provided By University of Oxford

  • White Papers // Nov 2009

    Analysing and Visualising Security and Usability in IRIS

    Despite a long-standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remain a challenge. Balancing security and usability is difficult due to human biases in security perception, and managing the sheer volume of data arising from risk and task...

    Provided By University of Oxford

  • White Papers // Jul 2009

    Context-Sensitive Requirements and Risk Analysis

    When a system's context of use changes, the security impact may be felt in other contexts. Risks mitigated for one operational context may continue to pose a danger in others due to contextual differences in assets, threats and vulnerabilities. The research presented will identify security factors in these contexts of...

    Provided By University of Oxford

  • White Papers // Feb 2009

    Using Quantitative Analysis to Implement Autonomic IT Systems

    The software underpinning today's IT systems needs to adapt dynamically and predictably to rapid changes in system workload, environment and objectives. The authors describe a software framework that achieves such adaptiveness for IT systems whose components can be modeled as Markov chains. The framework comprises an autonomic architecture that uses...

    Provided By University of Oxford

  • White Papers // Sep 2008

    Monetary Policy And Inflation Modeling In A More Open Economy In South Africa.

    South Africa in the 1990s became globally more integrated after years of isolation. Opening the trade and capital accounts gave impetus to a monetary policy regime change to inflation targeting from 2000, after a costly transitional period of monetary mismanagement with low policy transparency. Changes in openness can, however, disrupt...

    Provided By University of Oxford

  • White Papers // Feb 2009

    Some Issues In Modeling And Forecasting Inflation In South Africa

    Inflation targeting central banks will be hampered without good models to assist them to be forward-looking. Many current inflation models fail to forecast turning points adequately, because they miss key underlying long-run influences. The world is on the cusp of a dramatic turning point in inflation. If inflation falls rapidly,...

    Provided By University of Oxford

  • White Papers // Nov 2009

    Optimal Time-Invariant Monetary Policy

    This paper investigates how best to determine time-invariant policy rules in macroeconomic models with forward-looking constraints, where fully optimal policy is known to be time-inconsistent. It proposes a new 'Coefficient optimisation' approach that improves upon the timeless perspective method of Woodford (2003) in deterministic problems, and on average in stochastic...

    Provided By University of Oxford

  • White Papers // Oct 2010

    Aggregation Versus Heterogeneity In Cross-Country Growth Empirics

    The cross-country growth literature commonly uses aggregate economy datasets such as the Penn World Table (PWT) to estimate homogeneous production function or convergence regression models. Against the background of a dual economy framework this paper investigates the potential bias arising when aggregate economy data instead of sectoral data is adopted...

    Provided By University of Oxford

  • White Papers // Jan 2009

    BITs, DTTs, And FDI flows: An Overview

    In the past two decades, Foreign Direct Investment (FDI) has been spurred by the widespread liberalization of the FDI regulatory framework, combined with advances in information and communication technologies and competition among firms. Most countries have opened themselves to foreign investment, improved the operational conditions for foreign affiliates and strengthened...

    Provided By University of Oxford

  • White Papers // Feb 2011

    Firm Selection Into Export-Platform Foreign Direct Investment

    The authors characterize how firms select into exporting or foreign direct investment, and how many plants they choose to establish, in a group of foreign countries. They show that, if and only if firms' maximum profits are supermodular in tariffs and production costs, then: the most efficient firms establish a...

    Provided By University of Oxford