2021 ◽  
Vol 14 (2) ◽  
pp. 105
Author(s):  
Evangelos Koumarianos ◽  
Apostolos Kapsalis ◽  
Nikolaos Avgeris

This article studies the impact of the economic recession, labor market deregulation and social security reforms on the level of non-compliance in Greece. It examines the theoretical framework of non-compliance in post-industrial economies, as well as the design of social security systems in preventing contribution evasion. To assess the evolution of non-compliance, especially under conditions of crisis, we examine the results of the INE-GSEE survey on the HORECA sector. According toour research findings, employers follow non-compliant practices in order to maximize their profits, taking advantage of the precariousness of workers, whereas workers accept or collude with non-compliance as a survival tactic within a highly competitive environment. Non-compliance in the Greek labour market appears to be a multi-factor phenomenon that cannot be explained exclusively in terms of a unique perspective.


2019 ◽  
pp. 346-375
Author(s):  
Jens Kohler ◽  
Christian Richard Lorenz ◽  
Markus Gumbel ◽  
Thomas Specht ◽  
Kiril Simov

In recent years, Cloud Computing has drastically changed IT-Architectures in enterprises throughout various branches and countries. Dynamically scalable capabilities like CPUs, storage space, virtual networks, etc. promise cost savings, as huge initial infrastructure investments are not required anymore. This development shows that Cloud Computing is also a promising technology driver for Big Data, as the storage of unstructured data when no concrete and defined data schemes (variety) can be managed with upcoming NoSQL architectures. However, in order to fully exploit these advantages, the integration of a trustworthy 3rd party public cloud provider is necessary. Thus, challenging questions concerning security, compliance, anonymization, and privacy emerge and are still unsolved. To address these challenges, this work presents, implements and evaluates a security-by-distribution approach for NoSQL document stores that distributes data across various cloud providers such that every provider only gets a small data chunk which is worthless without the others.


Author(s):  
Winfred Yaokumah ◽  
Peace Kumah

Extant studies on compliance with security policies have largely ignored the impact of monitoring, security operations, and roles and responsibilities on employees' compliance. This chapter proposes a theoretical model that integrates security policy, monitoring, security operations, and security roles to examine employees' security compliance. Data were collected from 233 IT security and management professionals. Using partial least square structural equation modelling and testing hypotheses, the study finds that information security policy has significant indirect influence on information security compliance. The effect of security policy is fully mediated by security roles, operations security activities, and security monitoring activities. Security policy strongly influences operations security activities and has the greatest effect on security roles and responsibilities. Among the three mediating variables, monitoring has the most significant influence on security compliance. Conversely, the direct impact of security policy on compliance is not significant.


Sign in / Sign up

Export Citation Format

Share Document