479 resultados para security governance


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A security system based on the recognition of the iris of human eyes using the wavelet transform is presented. The zero-crossings of the wavelet transform are used to extract the unique features obtained from the grey-level profiles of the iris. The recognition process is performed in two stages. The first stage consists of building a one-dimensional representation of the grey-level profiles of the iris, followed by obtaining the wavelet transform zerocrossings of the resulting representation. The second stage is the matching procedure for iris recognition. The proposed approach uses only a few selected intermediate resolution levels for matching, thus making it computationally efficient as well as less sensitive to noise and quantisation errors. A normalisation process is implemented to compensate for size variations due to the possible changes in the camera-to-face distance. The technique has been tested on real images in both noise-free and noisy conditions. The technique is being investigated for real-time implementation, as a stand-alone system, for access control to high-security areas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Australia, collaborative contracts, and in particular, project alliances, have been increasingly used to govern infrastructure projects. These contracts use formal and informal governance mechanisms to manage the delivery of infrastructure projects. Formal mechanisms such as financial risk sharing are specified in the contract, while informal mechanisms such as integrated teams are not. Given that the literature contains a multiplicity of often untestable definitions, this paper reports on a review of the literature to operationalize the concepts of formal and informal governance. This work is the first phase of a study that will examine the optimal balance of formal and informal governance structures. Desk-top review of leading journals in the areas of construction management and business management, as well as recent government documents and industry guidelines, was undertaken to to conceptualise and operationalize formal and informal governance mechanisms. The study primarily draws on transaction-cost economics (e.g. Williamson 1979; Williamson 1991), relational contract theory (Feinman 2000; Macneil 2000) and social psychology theory (e.g. Gulati 1995). Content analysis of the literature was undertaken to identify key governance mechanisms. Content analysis is a commonly used methodology in the social sciences area. It provides rich data through the systematic and objective review of literature (Krippendorff 2004). NVivo 9, a qualitative data analysis software package, was used to assist in this process. A previous study by the authors identified that formal governance mechanisms can be classified into seven measurable categories: (1) negotiated cost, (2) competitive cost, (3) commercial framework, (4) risk and reward sharing, (5) qualitative performance, (6) collaborative multi-party agreement, and (7) early contractor involvement. Similarly, informal governance mechanisms can be classified into four measureable categories: (1) leadership structure, (2) integrated team, (3) team workshops, and (4) joint management system. This paper explores and further defines the key operational characteristics of each mechanism category, highlighting its impact on value for money in alliance project delivery. The paper’s contribution is that it provides the basis for future research to compare the impact of a range of individual mechanisms within each category, as a means of improving the performance of construction projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigates how ownership structure and corporate governance relate to the post-listing liquidity of IPO firms. Using a sample of 1,049 Chinese IPOs from 2001 to 2010, the results show firms with a broader shareholder base and higher ownership concentration have greater post-listing liquidity. So do firms with higher state ownership and lower institution ownership. Corporate governance is also important; post-listing liquidity is higher for firms with CEO duality, a larger and more independent board, and more frequent board meetings. The 2005 Split Share Structure Reform, which increased the proportion of tradable shares, has a positive impact on liquidity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper conceptualizes and defines knowledge governance (KG) in project-based organizations (PBOs). Two key contributions towards a multi-faceted view of KG and an understanding of KG in PBOs are advanced, as distinguished from knowledge management and organizational learning concepts. The conceptual framework addresses macro- and micro-level elements of KG and their interaction. Our definition of KG in PBOs highlights the contingent nature of KG processes in relation to their organizational context. These contributions provide a novel platform for understanding KG in PBOs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article discusses the issues of resistance; that is resistance by prisoners to the various manifestations of power operating in high security prisons, as well as that of attempted shifts in the regime from physical to psychological control. Other topics highlighted include legitimacy and 'official discourse', mourning and the construction of 'ungrievable lives' and the importance of finding a way out of the cycle of violence, which high security regimes perpetuate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing importance of logistics in increasingly globalised production and consumption systems strengthens the case for explicit consideration of the climate risks that may impact on the operation of ports in the future, as well as the formulation of adaptation responses that act to enhance their resilience. Within a logistics chain, seaports are functional nodes of significant strategic importance, and are considered as critical gateways linking local and national supply chains to global markets. However, they are more likely to be exposed to vagaries of climate-related extreme events due to their coastal locations. As such, they need to be adaptive and respond to the projected impacts of climate change, in particular extreme weather events. These impacts are especially important in the logistics context as they could result in varying degrees of business interruption; including business closure in the worst case scenario. Since trans-shipment of freight for both the import and export of goods and raw materials has a significant impact on Australia’s sustained economic growth it was considered important to undertake a study of port functional assets, to assess their vulnerability to climate change, to model the potential impacts of climate-related extreme events, and to highlight possible adaptation responses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For over 150 years Australia has exported bulk, undifferentiated, commodities such as wool, wheat, meat and sugar to the UK and more recently to Japan, Korea, and the Middle East. It is estimated that, each year, Australia's farming system feeds a domestic population of some 22 million people, while exporting enough food to feed another 40 million. With the Australian population expected to double in the next 40 years, and with the anticipated growth in the world's population to reach a level of some 9 billion (from its present level of 7 billion) in the same period, there are strong incentives for an expansion of food production in Australia. Neoliberal settings are encouraging this expansion at the same time as they are facilitating importation of foods, higher levels of foreign direct investment and the commoditisation of resources (such as water). Yet, expansion in food production – and in an era of climate change – will continue to compromise the environment. After discussing Australia's neoliberal framework and its relation to farming, this paper outlines how Australia is attempting to address the issue of food security. It argues that productivist farming approaches that are favoured by both industry and government are proving incapable of bringing about long-term production outcomes that will guarantee national food security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article investigates the extent to which the purported greening of food retailing and consumption in Australia is consistent with the development of a corporate-environmental food regime. Recent developments in food regime theory, particularly the concept of an emerging third food regime (the so-called ‘corporate-environmental food regime’), provide a useful organizing framework for understanding recent agri-restructuring trends. We find that, while a globally based, third food regime is becoming more apparent, the attributes that relate to corporate retail-driven greening of the supply chain are less evident within Australia’s domestic market than in its EU counterparts. However, there is some evidence that Australia’s export market is subject to some degree of ‘greening at a distance’ due to private regulations imposed by supermarkets overseas. We argue that while broader agri-restructuring trends may be evident at an international level, elements of greening specific to national contexts are important for determining the trajectory of any third food regime.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our study investigates the quality of firms’ continuous disclosure compliance during mandatory continuous disclosure reform, and whether the compliance quality is impacted by corporate governance, using the New Zealand market as the setting. We use a novel coding of different categories of disclosures (nonroutine, non-procedural and internal), which represents the extent of proprietary insider information inherent in disclosures, to evaluate firms’compliance quality. Our findings provide evidence that firms’ compliance quality improved after the reform, and this improvement is inconsistently impacted by corporate gvernance. Our findings provide important implications for regulators in their quest for a superior disclosure regime

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Responsibility to Protect and Women, Peace and Security: Aligning the Protection Agendas, editors Davies, Nwokora, Stamnes and Teitt address the intersections of the Responsibility to Protect (R2P) principle and the Women, Peace, and Security (WPS) agenda. Widespread or systematic sexual or gender-based violence is a war crime, a crime against humanity and an act of genocide, all of which are clearly addressed in the R2P principle. The protection of those at risk of widespread sexual violence is therefore not only relative to the Women, Peace and Security (WPS) agenda, but a fundamental sovereign obligation for all states as part of their commitment to R2P. Contributions from policy-makers and academics consider both the merits and the utility of aligning the protection agendas of R2P and WPS. Ultimately, a number of actionable recommendations are made concerning a unification of the agendas to best support the global empowerment of women and prevention of mass atrocities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Major disasters, such as bushfires or floods, place significant stress on scarce public resources. Climate change is likely to exacerbate this stress. An integrated approach to disaster risk management (DRM) and climate change adaptation (CCA) could reduce the stress by encouraging the more efficient use of pooled resources and expertise. A comparative analysis of three extreme climate-related events that occurred in Australia between 2009 and 2011 indicated that a strategy to improve interagency communication and collaboration would be a key factor in this type of policy/planning integration. These findings are in accord with the concepts of Joined-up Government and Network Governance. Five key reforms are proposed: developing a shared policy vision; adopting multi-level planning; integrating legislation; networking organisations; and establishing cooperative funding. These reforms are examined with reference to the related research literature in order to identify potential problems associated with their implementation. The findings are relevant for public policy generally but are particularly useful for CCA and DRM.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To describe and illustrate a breakthrough in the understanding of governance in schools arising from research in seven countries, and to provide guidelines to help every school to become as successful as the best.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although there are many approaches for developing secure programs, they are not necessarily helpful for evaluating the security of a pre-existing program. Software metrics promise an easy way of comparing the relative security of two programs or assessing the security impact of modifications to an existing one. Most studies in this area focus on high level source code but this approach fails to take compiler-specific code generation into account. In this work we describe a set of object-oriented Java bytecode security metrics which are capable of assessing the security of a compiled program from the point of view of potential information flow. These metrics can be used to compare the security of programs or assess the effect of program modifications on security using a tool which we have developed to automatically measure the security of a given Java bytecode program in terms of the accessibility of distinguished ‘classified’ attributes.