479 resultados para security governance


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In June 2011, a research project team from the Institute for Ethics, Governance and Law (IEGL), Queensland University of Technology, the United Nations University, and the Australian Government’s Asia Pacific Civil-Military Centre of Excellence (APCMCOE) held three Capacity-Building Workshops (the Workshops) on the Responsibility to Protect (R2P) and the Protection of Civilians (POC) in Armed Conflict in Manila, Kuala Lumpur, and Jakarta. The research project is funded by the Australian Responsibility to Protect Fund, with support from APCMCOE. Developments in Libya and Cote d’Ivoire and the actions of the United Nations Security Council have given new significance to the relationship between R2P and POC, providing impetus to the relevance and application of the POC principle recognised in numerous Security Council resolutions, and the R2P principle, which was recognised by the United Nations General Assembly in 2005 and, now, by the Security Council. The Workshops considered the relationship between R2P and POC. The project team presented the preliminary findings of their study and sought contributions and feedback from Workshop participants. Prior to the Workshops, members of the project team undertook interviews with UN offices and agencies, international organisations (IOs) and non-government organisations (NGOs) in Geneva and New York as part of the process of mapping the relationship between R2P and POC. Initial findings were considered at an Academic-Practitioner Workshop held at the University of Sydney in November 2010. In addition to an extensive literature review and a series of academic publications, the project team is preparing a practical guidance text (the Guide) on the relationship between R2P and POC to assist the United Nations, governments, regional bodies, IOs and NGOs in considering and applying appropriate protection strategies. It is intended that the Guide be presented to the United Nations Secretariat in New York in early 2012. The primary aim of the Workshops was to test the project’s initial findings among an audience of diplomats, military, police, civilian policy-makers, practitioners, researchers and experts from within the region. Through dialogue and discussion, the project team gathered feedback – comments, questions, critique and suggestions – to help shape the development of practical guidance about when, how and by whom R2P and POC might be implemented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organizations today engage in various forms of alliances to manage their existing business processes or to diversify into new processes to sustain their competitive positions. Many of today’s alliances use the IT resources as their backbone. The results of these alliances are collaborative organizational structures with little or no ownership stakes between the parties. The emergence of Web 2.0 tools is having a profound effect on the nature and form of these alliance structures. These alliances heavily depend on and make radical use of the IT resources in a collaborative environment. This situation requires a deeper understanding of the governance of these IT resources to ensure the sustainability of the collaborative organizational structures. This study first suggests the types of IT governance structures required for collaborative organizational structures. Semi-structured interviews with senior executives who operate in such alliances reveal that co-created IT governance structures are necessary. Such structures include co-created IT-steering committees, co-created operational committees, and inter-organizational performance management and communication systems. The findings paved the way for the development of a model for understanding approaches to governing IT and evaluating the effectiveness for such governance mechanisms in today’s IT dependent alliances. This study presents a sustainable IT-related capabilities approach to assessing the effectiveness of suggested IT governance structures for collaborative alliances. The findings indicate a favourable association between organizations IT governance efforts and their ability to sustain their capabilities to leverage their IT resources. These IT-related capabilities also relate to measures business value at the process and firm level. This makes it possible to infer that collaborative organizations’ IT governance efforts contribute to business value.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Given the substantial investment in information technology (IT), and the significant impact IT has on organizational success, organizations consume considerable resources to manage acquisition and use of their IT resources. While various arguments proposed suggest which IT governance arrangements may work best, our understanding of the effectiveness of such initiatives is limited. We examine the relationship between the effectiveness of IT steering committee driven IT governance initiatives and firm's IT management and IT infrastructure related capabilities. We further propose that firm's ITrelated capabilities generated through IT governance initiatives should improve its business processes and firm-level performance. We test these relationships empirically by a field survey. Results suggest that firms' effectiveness of IT steering committee driven IT governance initiatives positively relates to the level of their IT-related capabilities. We also found positive relationships between IT-related capabilities and internal process-level performance. Our results also support that improvement in internal process-level performance positively relates to improvement in customer service and firm-level performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The emerging principle of a “responsibility to protect” (R2P) presents a direct challenge to China's traditional emphasis on the twin principles of non-intervention in the domestic affairs of other states and non-use of military force. This paper considers the evolution of China‟s relationship with R2P over the past ten years. In particular, it examines how China engaged with R2P during the recent Libyan crisis, and considers what impact this conflict may have first, on Chinese attitudes to R2P, and second, on the future development and implementation of the doctrine itself. This paper argues that China‟s decision to allow the passage of Security Council resolution 1973, authorising force in Libya, was shaped by an unusual set of pragmatic considerations, and should not be viewed as evidence of a dramatic shift in Chinese attitudes towards R2P. More broadly, controversy over the scope of NATO's military action in Libya has raised questions about R2P‟s legitimacy, which has contributed to a lack of timely international action in Syria and Yemen. In the short term at least, this post-Libya backlash against R2P is likely to constrain the Security Council‟s ability to respond decisively to other civilian protection situations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper provides an academic/practitioner collaborative reflection on the governance structure of a prominent New Zealand regional tourism organisation (RTO). The purpose is to address one of the neglected areas of tourism governance research; which is ‘Who’ governs the destination? The paper discusses the evolution of a public-private governance structure from the perspective of three former senior staff members. The authors were employed during a period of radical organisational change in the administration of the marketing of Rotorua, one of New Zealand’s leading resort destinations. The paper uses archival analysis and personal reflections, and concludes with a summary of key challenges and frustrations inherent in the complexity of public-private partnership (PPP) governance of an RTO. It is envisaged this summary of reflections will enhance tourism management students’ understanding of the complex and political nature of destination marketing organisation (DMO) governance at a local level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. This paper provides an explicit theoretical analysis towards watermarking security and robustness in figuring out the exact problem status from the literature. With the necessary hypotheses and analyses from technical perspective, we demonstrate the fundamental realization of the problem. Finally, some necessary recommendations are made for complete assessment of watermarking security and robustness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The legal arrangements for the management of the Murray-Darling Basin in Australia have changed significantly over the years. The Constitution of the Commonwealth has led to the legal arrangements for the management of the Murray-Darling Basin. The Water Act 2000 of Queensland aimed at advancing sustainable management and efficient use of water and other resources by establishing a system for the planning, allocation and use of water. The Water Management Act 2000 of New South Wales ensures the sustainable and integrated management of the water resources of the state benefiting the present and future generations. The Natural Resources Management Act 2004 of South Australia applies to water resources and to other natural resources. The Act aimed at assisting the achievement of ecologically sustainable development in the state.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recognising that creativity is a major driving force in the post-industrial economy, the Chinese government has recently established a range of "creative clusters" – industrial parks devoted to media industries, and arts districts – in order to promote the development of the creative industries. This book examines these new creative clusters, outlining their nature and purpose, and assessing their effectiveness. Drawing on case studies of a range of cluster models, and comparing them with international examples, the book demonstrates that creativity, both in China and internationally, is in fact a process of fitting new ideas to existing patterns, models and formats. It shows how large and exceptionally impressive creative clusters have been successfully established, but raises the important questions of whether profit or culture is the driving force, and of whether the bringing together of independent-minded, creative people, entrepreneurial businessmen, preferential policies and foreign investment may in time lead to unintended changes in social and political attitudes in China, including a weakening of state bureaucratic power. An important contribution to the existing literature on the subject, this book will be of great interest to scholars of urban studies, cultural geography, cultural economics and Asian studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper introduces the underlying principles and the general features of a meta-method (MAP method) developed as part of and used in various research, education and professional development programmes at ESC Lille. This method aims at providing effective and efficient structure and process for acting and learning in various complex, uncertain and ambiguous managerial situations (projects, programmes, portfolios). The paper is developed around three main parts. First, I suggest revisiting the dominant vision of the project management knowledge field, based on the assumptions they are not addressing adequately current business and management contexts and situations, and that competencies in management of entrepreneurial activities are the sources of creation of value for organisations. Then, grounded on the former developments, I introduce the underlying concepts supporting MAP method seen as a ‘convention generator’ and how this meta method inextricably links learning and practice in addressing managerial situations. Finally, I briefly describe an example of application, illustrating with a case study how the method integrates Project Management Governance, and give few examples of use in Management Education and Professional Development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to show how project management governance is addressed through the use of a specific meta-method. Governance is defined here on two criteria: accountability and performance. Accountability is promoted through transparency and performance is promoted by responsive and responsible decision-making. According to a systemic perspective, transparency and decision-making involve having information, tacit or explicit knowledge, as well as understanding of the context, the different parameters and variables, their interaction and conditions of change. Although this method of methods was built according a heuristic process involving 25 years of various researches and consulting activities, it seems appropriate to draw its foundations. I clarify first my epistemological position and the notion of project and project management, as Art and Science. This lead me to define a "Be" / "Have" posture to this regards. Then, the main theoretical roots of MAP Method are exposed: Boisot' s Social Learning Cycle, Praxeology and Theory of Convention. Then we introduced the main characteristics of the method and the 17 methods and tools constituting MAP "tool box", thus with regard to the project management governance perspective. Finally, I discuss the integration of two managerial modes (operational and project modes) and the consequence in term of governance in a specific socio-techno-economic project/context ecosystem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper introduces the underlying principles and the general features of a meta-method (MAP method – Management & Analysis of Projects) developed as part of and used in various research, education and professional development programmes at ESC Lille. This method aims at providing effective and efficient structure and process for acting and learning in various complex, uncertain and ambiguous managerial situations (projects, programmes, portfolios). The paper is organized in three parts. In a first part, I propose to revisit the dominant vision of the project management knowledge field, based on the assumptions they are not addressing adequately current business and management contexts and situations, and that competencies in management of entrepreneurial activities are the sources of creation of value for organisations. Then, grounded on the new suggested perspective, the second part presents the underlying concepts supporting MAP method seen as a ‘convention generator' and how this meta-method inextricably links learning and practice in addressing managerial situations. The third part describes example of application, illustrating with a brief case study how the method integrates Project Management Governance, and gives few examples of use in Management Education and Professional Development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sustainable property practices will be essential for Australia’s future. The various levels of government offer incentives aimed at encouraging residents to participate in sustainable practices. Many of these programmes however are only accessible by owner occupiers, or landlords and tenants with long term tenancies. Improving security of tenure for tenants, to enable longer term tenancies, would positively impact upon property practices. This article explains what security of tenure is and identifies how a lack of security of tenure adversely impacts property practices. By comparison with Genevan property practices, it concludes by making suggestions as to how security of tenure can be reinforced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the technocratic priorities of criminological discourse following the Second World War. In doing so, it charts the role and influence of the United Nations and the doctrine of social defence, and traces those shifts and events that have forged a nexus between criminological endeavour and processes of governance. This article aims to illustrate that social defence and international reconstruction provide a useful framework for understanding the links between power/knowledge and the pragmatic orientations of criminological scholarship.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explores the influence of new modes of governance on the production of criminological knowledge. In doing so, it examines the rise of discourses on risk and critiques the ways in which academic environments are changing under new managerialist philosophies. The article further explores the increasing 'commodification of criminological knowledge' and analyses its effect on contemporary criminological scholarship. Finally, this article examines the contours of critical criminological scholarship and advocates for a criminology of resistance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.