Not just arms and legs: Student working and the local labour market
(2019)
Presentation / Conference Contribution
All Outputs (64)
Evidence-based, default-open, risk-managed, user-centred data access (2018)
Presentation / Conference Contribution
In recent years, there has been an increasing demand from the academic community for more access to confidential data for research purposes, particularly that data collected by government departments. This has happened for three reasons. First, both... Read More about Evidence-based, default-open, risk-managed, user-centred data access.
Valuable Puzzles for Proofs-of-Work (2018)
Presentation / Conference Contribution
Proof-of-work (PoW) is used as the consensus mechanism in most cryptocurrencies. PoW-based puzzles play an important part in the operation and security of a cryptocurrency, but come at a considerable energy cost. One approach to the problem of energy... Read More about Valuable Puzzles for Proofs-of-Work.
Graphchain: A blockchain-free scalable decentralised ledger (2018)
Presentation / Conference Contribution
© 2018 Copyright held by the owner/author(s). Blockchain-based replicated ledgers, pioneered in Bitcoin, are effective against double spending, but inherently attract centralised mining pools and incompressible transaction delays. We propose a framew... Read More about Graphchain: A blockchain-free scalable decentralised ledger.
MtB versus VAIC in measuring intellectual capital: Empirical evidence from Italian listed companies (2017)
Presentation / Conference Contribution
Purpose – Grounded in the extant theoretical and empirical literature, the purpose of this paper is to compare two of the most employed methods measuring IC value in order to find the most suitable in the context of Italian listed firms. Moreover, th... Read More about MtB versus VAIC in measuring intellectual capital: Empirical evidence from Italian listed companies.
Lessons learned in training ‘safe users’ of confidential data (2017)
Presentation / Conference Contribution
Many statistical organisations require researchers using detailed sensitive data to undergo ‘safe researcher’ training. Such training has traditionally reflected the ‘policing’ model of data protection. This mirrors the defensive stance often adopted... Read More about Lessons learned in training ‘safe users’ of confidential data.
Open data: Who needs it? (2017)
Presentation / Conference Contribution
This presentation, to introduce and stimulate a panel discussion, argued that we have 50 years worth of experience in knowing how to use data safely for researcher; as such we should be concentrating on practical management problems not theory: "how-... Read More about Open data: Who needs it?.
The "Five Safes": A framework for planning, designing and evaluating data access solutions (2017)
Presentation / Conference Contribution
The ‘Five Safes’ is a popular way to structure thinking about data access solutions. Originally used mainly by statistical agencies and social science academics , in recent years it has been adopted more widely across government, health organisations... Read More about The "Five Safes": A framework for planning, designing and evaluating data access solutions.
The insurance case of corporate social responsibility (CSR): Is ambivalence the key?” (empirical paper) (2017)
Presentation / Conference Contribution
The Insurance Case of Corporate Social Responsibility (CSR): Is Ambivalence the Key?” (empirical paper)
CARIBE: Cascaded IBE for maximum flexibility and user-side control (2017)
Presentation / Conference Contribution
© Springer International Publishing AG 2017. Mass surveillance and a lack of end-user encryption, coupled with a growing demand for key escrow under legal oversight and certificate authority security concerns, raise the question of the appropriatenes... Read More about CARIBE: Cascaded IBE for maximum flexibility and user-side control.
Key recovery: Inert and public (2017)
Presentation / Conference Contribution
We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic me... Read More about Key recovery: Inert and public.
The insurance case of corporate social responsibility (CSR): Is ambivalence the key (2017)
Presentation / Conference Contribution
Ambivalence is the underlying mechanism in the CSR insurance case
The standard narrative on history of macroeconomics: Central banks and DSGE models (2017)
Presentation / Conference Contribution
How do macroeconomists write the history of their own discipline? This article provides a careful reconstruction of the history of macroeconomics
told by the practitioners working today in the dynamic stochastic general equilibrium (DSGE) approach.... Read More about The standard narrative on history of macroeconomics: Central banks and DSGE models.
The effects of over-education on returns in the graduate labour market (2016)
Presentation / Conference Contribution
Using a Household Income Survey (HIS), this study examines the private returns to education in Malaysian
financial sector. First, we estimate the private returns to education using the highest certificate qualification or
“sheepskin effects". Sec... Read More about The effects of over-education on returns in the graduate labour market.
Improving data quality: The value of the user as data detective (2016)
Presentation / Conference Contribution
In this presentation, we explore how users can contribute to a better understanding of data quality. We illustrate, with reference to minimum wage compliance, how users identify the sort of data problems missed by NSIs
Fair client puzzles from the Bitcoin blockchain (2016)
Presentation / Conference Contribution
Client puzzles have been proposed as a mechanism for proving legitimate intentions by providing “proofs of work”, which can be applied to discourage malicious usage of resources. A typical problem of puzzle constructions is the difference in expected... Read More about Fair client puzzles from the Bitcoin blockchain.
Evidence-based, context-sensitive, user-centred, risk-managed SDC planning: Designing data access solutions for scientific use (2015)
Presentation / Conference Contribution
Disclosure control planning is characterised by over-reliance on theoretical models, inappropriate disclosure scenarios, worst-case planning, confusion over subjective versus objective risk management, and an unwillingness to consider the evidence ba... Read More about Evidence-based, context-sensitive, user-centred, risk-managed SDC planning: Designing data access solutions for scientific use.
Intellectual capital and its determinants in Italian listed companies (2015)
Presentation / Conference Contribution
PURPOSE: The purpose of the paper is to match the intellectual capital (IC) measurement methods and the reporting practices of a group of Italian listed firms, in order to examine potential convergence in practice. The study applies a holistic market... Read More about Intellectual capital and its determinants in Italian listed companies.
The underlying mechanism of the insurance case of corporate social performance (CSP) (2015)
Presentation / Conference Contribution
CSP insurance effect and its underlying mechanism
Corporate social responsibility of tobacco companies: A consumer perspective (2015)
Presentation / Conference Contribution
Investment in corporate social responsibility (CSR) by companies that have a bad reputation, namely those which produce tobacco has invited controversies from various quarters. Given the lack of studies that highlight the acceptance among consumers r... Read More about Corporate social responsibility of tobacco companies: A consumer perspective.