479 resultados para security governance


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Examines the political and ideological influences on China's economic reforms since the early 1980s. Discusses the influence of the Chinese Communist Party and Confucianism on economic progress and assesses the effect of reforms. Outlines the requirement for new corporate governance laws to meet the needs of expanding private businesses and considers China's use and adaptation of some Western models of corporate governance. Comments on whether these fit easily with China's business culture. Criticises the shortcomings of China's corporate laws. Looks in particular at the telecommunications industry and at the Company Law 2006.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Economic reforms have transformed China into a modern economy - this requires greater emphasis on regulating markets and governing corporations to ensure economic growth continues. Yet, legal reforms are not as straightforward as transplanting Western models; more modification to suit Chinese political land cultural considerations needs to be incorporated. Likewise privatisation of the telecommuications sector does not mean that government influence in the new corporations cease. This is not necessarily negative as long as safeguards are in place. Plainly further reforms to the law and governance will be needed. Given that Confucian philosophy continues to play a central role in Chinese society and values, developing laws and governance practices from Confucian principles will arguably be appropriate for modern China.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hong Kong is a thriving cosmopolitan business capital in Asia where much of its values are shaped by both pragmatism and its Chinese heritage. Against this backdrop, Hong Kong's corporate law and governance principles are mostly British, much of which remains quite alien to the local business community. Like may other countries, Hong Kong is obligated by international markets to embrace these requirements. Yet many business operators lack even the understanding of basic company law and governance expectations, partly because the provisions are incompatible with their values and corporate cultures. The paper will argue that Confucian philosophies should be the basis for developing a corporate governance framework for Hong Kong, given that Confucius; doctrines are already entrenched in the island's traditions and identity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the wake of recent corporate collapses, 'corporate governance' has received unprecedented levels of attention. It can be narrowly defined as how a company is directed and steered. The responsibility of steering a company is entrusted with the board of directors, who become the focus of governance mechanisms.Yet this is not as straightforward as it appears - Australia has experienced massive shifts in business regulations over the past two decades. One innovation in Australian business regulation is 'enforced self-regulation' which combines the benefits of voluntary self-regulation with the coercive power of the State, implemented via a compliance program. A possible hazard of compliance system is that management might treat this responsibility as a 'box ticking' exercise. Therefore effective governance and compliance entails more than setting up internal and regulatory mechanisms; the willingness of various stakeholders to collaborate is crucial. This suggests that managing relationships between stakeholders of an organization is the key to averting corporate collapses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Leading scholars on nonprofit governance have urged that future research be more informed by theory in order to promote more rigorous analysis. The aim of this paper is to survey the major theories on board governance, including those based in the disciplines of economics, management, sociology, psychology, politics, history and theology, in order to respond to this challenge. In addition, the relevance of these theories to a critical set of board behaviors - that is, how boards monitor, judge and influence organizational performance - is examined. Gaps in the theoretical literature are identified, and implications for public policy are explored. We conclude that a multi-theory and multi-disciplinary perspective is needed if research on governance of nonprofit organizations is to be complete in scope, rich in content, and relevant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper, underpinned by a framework of autopoietic principles of creativity/innovation and leadership/governance, argues that open forms of creativity in ‘arts’ provide opportunity for impact upon concepts of development, leadership and governance. The alliance of creativity and governance suggests that by examining various understandings of artistic experiences, readers may perceive new understandings of alliance, application and assessment of such experiences. This critical understanding would include assessing whether such experience supports people changing their aspirations as they become what they want to be. Such understanding may also suggest that different applications of the creative capacity of the ‘arts’ offers relevance in alleged ‘non-creative’ areas of academe, particularly in areas of management, leadership and governance. This alliance also offers the possibility of new staff development programs that facilitate learning and building of individual capacity, as well as facilitate congruent development process and policy, particularly within academic organisational structures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.

Relevância:

20.00% 20.00%

Publicador: