439 resultados para Governance mechanisms
Resumo:
Control Objectives for Information and related Technology (COBIT) has grown to be one of the most significant IT Governance (ITG) frameworks available and also the best suited for audit, as it provides comprehensive guidance around IT processes and related business goals. However, given the constraints of both time and resources within which the Australian public sector is forced to operate, implementing an audit framework the size of COBIT in its entirety is often considered too large a task. As an alternative to full implementation it is not uncommon for the public sector to “cherry pick” controls from the framework in an effort to reduce its size. This paper reports on research undertaken to evaluate the potential to use an optimised sub-set of COBIT 5 for ITG audit in Australian public sector organisations. A survey methodology was employed to determine the control-objectives considered to be the most important to a selection of public sector organisations. Twelve control-objectives were identified as being most important to Queensland public sector organisations. As ten of these were also identified by previous studies, it appears possible to derive an optimised sub-set from COBIT 5 that would be both enduring and relevant across geographical and organisational contexts.
Resumo:
Our understanding of the mechanisms of action of GH and its receptor, the GHR, has advanced significantly in the last decade and has provided some important surprises. It is now clear that the GH-GHR axis activates a number of inter-related signalling pathways, not all of which are dependent on the intracellular tyrosine kinase, JAK2 as originally postulated. JAK2-independent pathways, mediated via the Src family kinases, together with a number of negative regulators of GH signalling and emerging cross-talk mechanisms with other growth factor receptors, provide a complex array of mechanisms that are capable of fine-tuning responses to GH in a cell context dependent manner. Additionally, it is also now clear that GH and the GHR can translocate to the nucleus of target cells and initiate, as yet not well defined, nuclear responses. Continued emphasis on elucidation of these complex mechanisms is critical to provide further insights into the diverse physiological and pathophysiological effects of GH.
Resumo:
Current discussions regarding the relationship between welfare governance systems and employment promotion in disability policy appeal to a rejuvenated neo-liberal and paternalistic understanding of welfare governance. At the core of this rationality is the argument that people with disabilities not only have rights, but also duties, in relation to the State. In the Australia welfare system, policy tools are deployed to produce a form of self-discipline, whereby the State emphasises personal responsibility via assessment tools, ‘mutual obligation’ policy, and motivational strategies. Drawing on a two-year semi-longitudinal study with 80 people with a disability accessing welfare benefits, we examine how welfare governance subject recipients to strategies to produce productive citizens who are able to contribute to the national goal of maintaining competitiveness in the global economy. Participants’ interviews reveal the intended and unintended effects of this activation policy, including some acceptance of the logic of welfare-to-work and counter-hegemonic resistance to de-valued social identities.
Resumo:
This book identifies the fundamental legal principles and the governance requirements of sustainable forest management. An analytical model for assessing forest regulation is created which identifies the doctrinal concepts that underpin forest regulation (justice, property, sovereignty and governance). It also highlights the dominant public international institutions involved in forest regulation (UNFF, UNFCCC and WB) which is followed by analysis of non-state international forest regulation (forest certification and ecosystem markets). The book concludes by making a number of practical recommendations for reform of global forest governance arrangements and suggested reforms for individual international forest institutions.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Many studies have focused on why deliberative institutions should be established in order to develop Chinese people’s citizenry skills; however few focus on the social conditions and public sentiments that shape the development of deliberative mechanisms. Skills and awareness of citizenry is not only brought into being by deliberative institutions that are set up by the government, but evolve through interplays between technologies and social changes. As a test-bed for economic reform Guangdong is increasingly identified by translocality and hybrid culture. This is framed by identity conflict and unrests, much of which is due to soaring wealth polarisation, high volumes of population movement, cultural collisions and ongoing linguistic contestations. These unrests show the region’s transformation goes beyond the economic front. Profound changes are occurring at what anthropologists and philosophers call the changing social conciseness or moral landscape (Ci, 1994; Yan, 2010). The changing social moralities are a reflection of the awareness of individuals’ rights and responsibilities, and their interdependencies from dominant ideologies. This paper discusses Guangdong’s social and cultural characteristics, and questions how existing social conditions allow the staging of political deliberation by facilitating political engagement and the formation of public opinion. The paper will investigate the tragedy of Xiao Yueyue in Foshan, Guangdong, where ‘right’ and ‘responsibility’, ‘self’ and ‘other’ define the public sentiments of deliberation and participation.
Resumo:
Information technology (IT) has been playing a powerful role in creating a competitive advantage for organisations over the past decades. This role has become proportionally greater over time as expectations for IT investments to drive business opportunities keep on rising. However, this reliance on IT has also raised concerns about regulatory compliance, governance and security. IT governance (ITG) audit leverages the skills of IS/IT auditors to ensure that IT initiatives are in line with the business strategies. ITG audit emerged as part of performance audit to provide an assessment of the effective implementation of ITG. This research attempts to empirically examine the ITG audit challenges in the public sector. Based on literature and Delphi research, this paper provides insights regarding the impact of, and required effort to address these challenges. The authors also present the ten major ITG audit challenges facing Australian public sector organisations today.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.
Resumo:
Efficient state asset management is crucial for governments as they facilitate the fulfillment of their public functions, which include the provision of essential services and other public administration support. In recent times economies internationally and particularly in South east Asia, have displayed increased recognition of the importance of efficiencies across state asset management law, policies and practice. This has been exemplified by a surge in notable instances of reform in state asset management. A prominent theme in this phenomenon is the consideration of governance principles within the re-conceptualization of state asset management law and related policy, with many countries recognizing variability in the quality of asset governance and opportunities for profit as being critical factors. This issue is very current in Indonesia where a major reform process in this area has been confirmed by the establishment of a new Directorate of State Asset Management. The incumbent Director-General of State Asset Management has confirmed a re-emphasis on adherence to governance principles within applicable state asset management law and policy reform. This paper reviews aspects of the challenge of reviewing and reforming Indonesian practice within state asset management law and policy specifically related to public housing, public buildings, parklands, and vacant land. A critical issue in beginning this review is how Indonesia currently conceptualizes the notion of asset governance and how this meaning is embodied in recent changes in law and policy and importantly in options for future change. This paper discusses the potential complexities uniquely Indonesian characteristics such as decentralisation and regional autonomy regime, political history, and bureaucratic culture.
Resumo:
This paper will focus on the legal issues associated with people displaced as a result of water scarcity. Human displacement can lead to internal displacement (displacement of people within their country) and external displacement (displacement of people into another country). If the displacement takes place as a result of climate change these people may be referred to as climate refugees. The majority of work on climate refugees has focused on those people that will lose their homes as a result of sea –level rise. The number of people that could be displaced as a result of prolonged drought and lack of adequate water supplies is likely to be far more significant in number. There are estimates that around 2.8 billion people will suffer water shortages by 2025 and many of these people are at increased risk of internal or external displacement. Certain groups are more likely to be displaced as a result of prolonged drought or water scarcity. These groups include indigenous and minorities groups living in areas that are more susceptible to climate change and groups living in areas with a history of water shortage and supply issues. People displaced as a result of water scarcity are at increased risks of malnutrition and of dehydration. Furthermore the lack of adequate water supplies in such areas increases the risk and spread of disease among the population. In certain instances internal and external displacement may lead to escalation of conflict and competition for water resources in newly settled territories. This paper will use case studies from Australia (indigenous groups and rural landholders) and East Africa (Ethiopia, Sudan and Kenya) to demonstrate the significance of human displacement arising as a result of water scarcity. Climate adaptation policy frameworks will need to address a number of legal issues, arising as a result of climate displacement from water scarcity. There are a number of unresolved legal issues for both categories of environmental displaced people. The major legal issue for externally environmentally displaced people is lack of international recognition and support for these people. The Climate Change Convention, the Refugee Convention, the Desertification Convention and Human Rights instruments all fail to provide recognition for people externally displaced as a result of environmental conditions. Similarly there is a lack of legal recognition and legal support mechanisms to assist those people internally displaced by environmental conditions. The lack of developed environmental rights in most countries contributes to this problem. Polices and governance frameworks must be put in place which aims to prevent such displacement through programs identifying populations at risk and instigating damage mitigation and relocation programs. In addition there are a number of legal issues which may arise such as; rights of compensation, property and tenure disputes, increases on the water demand and environmental degradation in places of relocation and jurisdictional issues arising in federal countries. This paper will provide an overview of the legal issues at the international and national levels arising as a result of climate displacement from water scarcity.
Resumo:
Staphylococcus aureus, one of the major pathogenic bacteria, is associated with substantial morbidity and mortality. The disease burden of staphylococcal infections is significant, which is primarily attributed to its adaptability and resistance to environmental stresses. S. aureus has the ability to develop multiple resistances to antimicrobial agents. These high resistances make pathogenicity of S. aureus one of the most complex mechanisms to understand and manage. Proteomic and bioinformatics approaches show great potential in exploring microbial adaptation strategies, ability to cause disease by pathogenic bacteria and the development of diagnostic tools. A summary of the latest developments in the application of ‘omics’ technologies to understand resistance mechanisms in S. aureus and their future role in antistaphylococcal vaccine and/or drug discovery is given here.
Resumo:
Cu/Ni/W nanolayered composites with individual layer thickness ranging from 5nm to 300nm were prepared by a magnetron sputtering system. Microstructures and strength of the nanolayered composites were investigated by using the nanoindentation method combined with theoretical analysis. Microstructure characterization revealed that the Cu/Ni/W composite consists of a typical Cu/Ni coherent interface and Cu/W and Ni/W incoherent interfaces. Cu/Ni/W composites have an ultrahigh strength and a large strengthening ability compared with bi-constituent Cu–X(X¼Ni, W, Au, Ag, Cr, Nb, etc.) nanolayered composites. Summarizing the present results and those reported in the literature, we systematically analyze the origin of the ultrahigh strength and its length scale dependence by taking into account the constituent layer properties, layer scales and heterogeneous layer/layer interface characteristics, including lattice and modulus mismatch as well as interface structure.
Resumo:
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unicast, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.