1.

Record Nr.

UNINA9910482982603321

Autore

Neu Marc

Titolo

SGB II-Grundsicherung und soziale Inklusion : Eine empirisch-soziologische Bestandsaufnahme / / von Marc Neu

Pubbl/distr/stampa

Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer VS, , 2017

ISBN

3-658-15765-8

Edizione

[1st ed. 2017.]

Descrizione fisica

1 online resource (IX, 171 S. 19 Abb.)

Collana

Springer VS Research

Disciplina

361.61

Soggetti

Social policy

Sociology

Social Policy

Sociology, general

Lingua di pubblicazione

Tedesco

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

Soziale Exklusion als Kategorie sozialer Ungleichheit -- Soziologische Theorien des Wohlfahrtsstaats -- Grundzüge der Grundsicherung für Arbeitsuchende (SGB II) -- Grundsicherung und Armutsvermeidung -- SGB II-Leistungsbezugsverläufe im regionalen Kontext.

Sommario/riassunto

Marc Neu untersucht das sozialstaatliche Instrument der im SGB II geregelten Grundsicherung für Arbeitsuchende in Hinblick auf soziale Exklusion und Inklusion. Im Ergebnis wird deutlich, dass die SGB II-Leistungen im Sinne des „Förderns und Forderns“ in der Regel weder finanziell ausreichend sind, um soziale Teilhabe zu sichern, noch kann die eigentliche Zielsetzung der Hartz IV-Reform, die Arbeitsmarktpartizipation nachhaltig zu gewährleisten, in ausreichendem Maße sichergestellt werden. Auch unter regional unterschiedlichen Rahmenbedingungen belegen die empirischen Befunde verfestigte Strukturen in den SGB II-Leistungsbezugsverläufen. Der Inhalt • Soziale Exklusion als Kategorie sozialer Ungleichheit • Soziologische Theorien des Wohlfahrtsstaats • Grundzüge der Grundsicherung für Arbeitsuchende (SGB II) • Grundsicherung und Armutsvermeidung • SGB II-Leistungsbezugsverläufe im regionalen Kontext Die Zielgruppen • Lehrende und Studierende aus den Sozialwissenschaften, insbesondere der Fachgebiete Soziologie,



Sozialpolitik und empirische Sozialforschung • Verantwortliche aus Politik und Verwaltung Der Autor Marc Neu war während der Arbeiten zur vorliegenden Dissertation wissenschaftlicher Mitarbeiter am Zentrum für interdisziplinäre Regionalforschung (ZEFIR) an der Fakultät für Sozialwissenschaft der Ruhr-Universität Bochum. Derzeit ist er als wissenschaftlicher Mitarbeiter am Sozialwissenschaftlichen FrauenForschungsinstitut (SoFFI F.) an der Ev. Hochschule Freiburg tätig.

2.

Record Nr.

UNINA9910765875003321

Autore

Jerábek Rudolf

Titolo

Protokolle des Ministerrates der Zweiten Republik der Republik Österreich, Kabinett Leopold Figl I, Band 7 (9. September 1947 bis 18. November 1947) / Rudolf Jerábek, Wolfgang Mueller, Gertrude Enderle-Burcel

Pubbl/distr/stampa

[s.l.] : , : Verlag der Österreichischen Akademie der Wissenschaften, , 2016

Descrizione fisica

1 online resource (1 p.)

Lingua di pubblicazione

Tedesco

Formato

Materiale a stampa

Livello bibliografico

Monografia

Sommario/riassunto

The Edition of the Minutes of the Cabinet Meetings Figl I constitutes an important contribution to research on the early years of Austria's Second Republic and the reconstruction and renewal of the state and its political components after World War II. The minutes of the cabinet meetings have to be regarded as central source materials on this early and complex phase of the Second Republic. Volume 7 of the Edition encompasses the minutes of 9. September 1947 till 18. November 1947 as well as the accompanying minutes of the Wirtschaftliches Ministerkomitee from that period of time.



3.

Record Nr.

UNINA9910765480703321

Autore

Yung Moti

Titolo

Science of Cyber Security : 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings / / edited by Moti Yung, Chao Chen, Weizhi Meng

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023

ISBN

9783031459337

3031459334

Edizione

[1st ed. 2023.]

Descrizione fisica

1 online resource (526 pages)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 14299

Altri autori (Persone)

ChenChao

MengWeizhi

Disciplina

025.04

Soggetti

Information storage and retrieval systems

Database management

Data mining

Machine learning

Application software

Information Storage and Retrieval

Database Management

Data Mining and Knowledge Discovery

Machine Learning

Computer and Information Systems Applications

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Session 1 Network and System Security  -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi



Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model’s Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional.

Sommario/riassunto

This book constitutes the refereed proceedings of the 5th International Conference on Science of Cyber Security, SciSec 2023, held in Melbourne, VIC, Australia, during July 11–14, 2023. The 21 full papers presented together with 6 short papers were carefully reviewed and selected from 60 submissions. The papers are organized in the topical sections named: ACDroid: Detecting Collusion Applications on Smart Devices; Almost Injective and Invertible Encodings for Jacobi Quartic Curves; Decompilation Based Deep Binary-Source Function Matching.