205 resultados para Security classification (Government documents)


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organizations generally are not responding effectively to rising IT security threats because people issues receive inadequate attention. The stark example of IT security is just the latest strategic IT priority demonstrating deficient IT leadership attention to the social dimension of IT. Universities in particular, with their devolved people organization, diverse adoption of IT, and split central/local federated approach to governance and leadership of IT, demand higher levels of interpersonal sophistication and strategic engagement from their IT leaders. An idealized model for IT leaders for the 21st century university is proposed to be developed as a framework for further investigation. The testing of this model in an action research study is proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Collaboration is acknowledged as a key to continued growth in the Australian construction industry. Government, as a major industry client, has an important role to play with respect to fostering collaboration and ensuring the global competitiveness of the industry. The paper draws upon data collected for the Construction 2020 study and aims to demonstrate that government can a) help to break down the adversarial situation that currently exists between clients, project managers and subcontractors; and b) allow the supply chain to collaborate more effectively in terms of satisfying the relational and financial needs of all parties. Government can also provide a clear set of guidelines (backed up by a functional dispute resolution system) that will promote confidence with respect to forging relationships. Thus, the paper will discuss the way in which public policy can be more closely aligned with actual industry needs in order to promote greater collaboration.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.