361 resultados para financial security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Systemic risks and other factors that contributed to the global financial crisis have highlighted the need to reconsider the scope and nature of financial literacy initiatives and programs. In this article, we argue the case for rethinking financial literacy and the need for integrated solutions that explicitly incorporate solutions to behavioural shortcomings exhibited by individuals in their financial decision-making. While recognising the need to consider behavioural biases in individuals’ financial decisions, to date regulatory responses have largely ignored those biases in their proposed education and other strategies designed to address poor financial literacy and improve financial disclosure that, in turn, will improve financial decision-making.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the anti-money laundering systems of Australia, the United Arab Emirates (UAE), the United Kingdom (UK) and the United States of America (USA), the extent to which they have implemented the Financial Action Task Force (FATF) recommendations, and how compliance with these recommendations is affected by local cultural and economic factors. The paper makes use of FATF evaluation reports to compare the countries’ compliance; it examines some of the underlying cultural considerations and culture-specific ethical issues that affect the extent of compliance, and how cultural and ethical considerations may affect good governance. The findings indicate that the UK and the USA are the most advanced with regards to their compliance with the FATF recommendations and Australia and the UAE less so. The UAE is in particular found to be least compliant. We relate this finding to previous work on how a country’s legal and financial systems develop in line with its religion, culture and socio-economic situation, and examine how such local factors have affected the UAE’s financial and anti-money laundering and combating the financing of terrorism (AML/CFT) systems. This research will be of interest to policy-makers and government agencies involved in addressing money laundering and its successful detection and prosecution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security policy defines the governance and implementation strategy for information security in alignment with the corporate risk policy objectives and strategies. Research has established that alignment between corporate concerns may be enhanced when strategies are developed concurrently using the same development process as an integrative relationship is established. Utilizing the corporate risk management framework for security policy management establishes such an integrative relationship between information security and corporate risk management objectives and strategies. There is however limitation in the current literature on presenting a definitive approach that fully integrates security policy management with the corporate risk management framework. This paper presents an approach that adopts a conventional corporate risk management framework for security policy development and management to achieve alignment with the corporate risk policy. A case example is examined to illustrate the alignment achieved in each process step with a security policy structure being consequently derived in the process. It is shown that information security policy management outcomes become both integral drivers and major elements of the corporate-level risk management considerations. Further study should involve assessing the impact of the use of the proposed framework in enhancing alignment as perceived in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper describes a number of requirements for enhancing the trust of location acquisition from Satellite Navigation Systems, particularly for those applications where the location is monitored through a remote GNSS receiver. We discuss how the trust of a location acquisition could be propagated to an application through the use of a proposed tamper-­resistant GNSS receiver which quantifies the trust of a location solution from the signaling used (ie. P(Y) code, Galileo SOL, PRS, CS) and provides a cryptographic proof of this to a remote application. The tamper­-resistance state of the receiver is also included in this cryptographic proof.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: To provide recommendations for construction clients who design and implement financial incentive mechanisms (FIMs) on projects. ---------- Methodology: Four large Australian building projects commissioned by government clients under managing contractor contracts and completed between 2001 and 2005 were examined to explore the ‘drivers’ that promoted motivation toward financial incentive goals. The results were triangulated across data sources, projects and stakeholder types. ---------- Findings: FIM design should incorporate: 1. flexibility to modify goals and measurement procedures over time, 2. multiple goals covering different project areas, 3. distribution of rewards across all the key organizations contributing to team performance (e.g. potentially not just the contractor, but the subcontractors and consultants) and a reward amount sufficient to be valued by potential recipients. FIM benefits are maximized through the following complementary procurement initiatives: 4. equitable contract risk allocation, 5. early contractor involvement in design, 6. value-driven tender selection, 7. relationship workshops, and 8. future work opportunities.---------- Research Limitations: This paper provides practical recommendations to industry and hence does not emphasize theoretical aspects.---------- Practical Implications: The uptake of these recommendations is likely to increase the impact of FIMs on motivation and improve project and industry outcomes. Although the study focuses on government clients of building projects, all the recommendations would seem to apply equally to private-sector clients and to non-building projects.---------- Originality: In order to improve motivation and reward high performance, clients are increasingly using FIM in their construction contracts. Despite the rising use of financial incentives, there is a lack of comprehensive construction-specific knowledge available to help clients maximize outcomes. The study addresses this gap in the literature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Construction industry observers tout the use of financial incentives as promoters of motivation and commitment on projects. Yet, little empirical evidence exists concerning their effectiveness. What are the drivers of motivation on construction projects? The reasons that construction project participants are motivated to pursue voluntary incentive goals are examined through four Australian case studies. The results demonstrate the critical role played by project relationships and equitable contract conditions in promoting the effectiveness of financial incentives. In the context of a construction project, this study finds financial incentives to be less important to motivation and performance than relationship enhancement initiatives. This finding is unexpected and has implications for the design of project procurement strategies. These results suggest if project clients ignore the importance of relationship quality between participants, the impact of any financial incentive will be compromised.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Type unions, pointer variables and function pointers are a long standing source of subtle security bugs in C program code. Their use can lead to hard-to-diagnose crashes or exploitable vulnerabilities that allow an attacker to attain privileged access over classified data. This paper describes an automatable framework for detecting such weaknesses in C programs statically, where possible, and for generating assertions that will detect them dynamically, in other cases. Exclusively based on analysis of the source code, it identifies required assertions using a type inference system supported by a custom made symbol table. In our preliminary findings, our type system was able to infer the correct type of unions in different scopes, without manual code annotations or rewriting. Whenever an evaluation is not possible or is difficult to resolve, appropriate runtime assertions are formed and inserted into the source code. The approach is demonstrated via a prototype C analysis tool.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Before making a security or privacy decision, Internet users should evaluate several security indicators in their browser, such as the use of HTTPS (indicated via the lock icon), the domain name of the site, and information from extended validation certificates. However, studies have shown that human subjects infrequently employ these indicators, relying on other indicators that can be spoofed and convey no cryptographic assurances. We identify four simple security indicators that accurately represent security properties of the connection and then examine 125 popular websites to determine if the sites' designs result in correctly displayed security indicators during login. In the vast majority of cases, at least some security indicators are absent or suboptimal. This suggests users are becoming habituated to ignoring recommended security indicators.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several studies have developed metrics for software quality attributes of object-oriented designs such as reusability and functionality. However, metrics which measure the quality attribute of information security have received little attention. Moreover, existing security metrics measure either the system from a high level (i.e. the whole system’s level) or from a low level (i.e. the program code’s level). These approaches make it hard and expensive to discover and fix vulnerabilities caused by software design errors. In this work, we focus on the design of an object-oriented application and define a number of information security metrics derivable from a program’s design artifacts. These metrics allow software designers to discover and fix security vulnerabilities at an early stage, and help compare the potential security of various alternative designs. In particular, we present security metrics based on composition, coupling, extensibility, inheritance, and the design size of a given object-oriented, multi-class program from the point of view of potential information flow.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Refactoring focuses on improving the reusability, maintainability and performance of programs. However, the impact of refactoring on the security of a given program has received little attention. In this work, we focus on the design of object-oriented applications and use metrics to assess the impact of a number of standard refactoring rules on their security by evaluating the metrics before and after refactoring. This assessment tells us which refactoring steps can increase the security level of a given program from the point of view of potential information flow, allowing application designers to improve their system’s security at an early stage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The concept of strategic entrepreneurship has received increased attention over the past ten yeras. Viewed as the intersection of entrepreneurship and strategy this field of research is populated by conceptual studies which focus mainly on the nature and perceived benefits of strategic entrepreneurship. Similarly the study of entrepreneurship in a public sector context has gained increasing support in recent years but also remains underexplored. To address these gaps this thesis considers : what are the underlying elements and financial implications of strategic entrepreneurship in New Zealand's state-owned enterprises, New Zealand's SOE sector comprising 17 government-owned,commercially focused organisations, is considered to be a prime subject for this research. Well known for their implementation of new public management, many New Zealand SOEs have also been publicly recognised as both innovative and entrepreneurial. The research question is addressed by first developing a preliminary framework of strategic entrepreneurship from literature on entrepreneurhsip and strategy. The framework is then examined in the context of case studies on activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this paper is to provide a review of the theoretical and research literature on the ways in which financial planning can enhance well-being. In reviewing the literature, the paper develops a conceptual framework for thinking about the extended value of financial planning, beyond financial outcomes, by examining the process of planning in the financial domain and its relationship to life satisfaction, living an intentional life, attainment of life goals, and the development of a sense of mastery. An essential element of psychological well-being is engagement in life tasks and roles. Planning can be considered a life management strategy that enables individuals to control and structure their lives. Having meaningful goals and the plans to achieve those goals enable individuals to experience higher levels of life engagement and well-being (MacLeod et al., 2008). Recent research on well-being suggests that domain-specific behaviours contribute to domain-specific satisfactions, which in turn contribute to an individual’s overall satisfaction with life (Easterlin, 2003; 2006). Thus changes in domain satisfaction, such as financial satisfaction, are likely to effect changes in life satisfaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The period from 2007 to 2009 covered the residential property boom from early 2000, to the property recession following the Global Financial Crisis. Since late 2008, a number of residential property markets have suffered significant falls in house prices, buth this has not been consistent across all market sectors. This paper will analyze the housing market in Brisbane Australia to determine the impact, similarities and differences that the4 GFC had on range of residential sectors across a divesified property market. Data analysis will provide an overview of residential property prices, sales and listing volumes over the study period and will provide a comparison of median house price performance across the geographic and socio-economic areas of Brisbane.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Even though security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human machine interface. This paper reports on a diary study conducted in order to investigate what people identify as security decisions that they make while using the web. The study aimed to uncover how security is perceived in the individual's context of use. From this data, themes were drawn, with a focus on addressing security goals such as confidentiality and authentication. This study is the first study investigating users' web usage focusing on their self-documented perceptions of security and the security choices they made in their own environment.