9 resultados para ubiquitous identity management
em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast
Resumo:
The susceptibility of WiFi networks to Rogue Access Point attacks derives from the lack of identity for 802.11 devices. The most common means of detecting these attacks in current research is through tracking the credentials or the location of unauthorised and possibly malicious APs. In this paper, the authors outline a method of distinguishing WiFi Access Points using 802.11 MAC layer management frame traffic profiles. This system does not require location estimation or credential tracking techniques as used in current research techniques, which are known to be inaccurate. These characteristic management traffic profiles are shown to be unique for each device, tantamount to a MAC identity. The application of this technique to solving Rogue AP attacks under the constraints of an open access, public WiFi environment is discussed with the conclusion that the identity is practically very difficult to forge
Resumo:
A corporate identity denotes a set of attributes that senior managers ascribe to their organization. It is therefore an organizational identity articulated by a powerful interest group. It can constitute a claim which serves inter alia to justify the authority vested in top managers and to further their interests. The academic literature on organizational identity, and on corporate identity in particular, pays little attention to these political considerations. It focuses in an apolitical manner on shared meanings when corporate identity works, or on cognitive dissonance when it breaks down. In response to this analytical void, we develop a political analysis of corporate identity and its development, using as illustration a longitudinal study of successive changes in the corporate identity of a Brazilian telecommunications company. This suggests a cyclical model in which corporate identity definition and redefinition involve power relations, resource mobilization and struggles for legitimacy. © Blackwell Publishing Ltd 2007.
Resumo:
'Grooming' has been termed 'a ubiquitous feature of the sexual abuse of children' (Thornton, 2003: 144). Despite the prominence of the term in contemporary discourses on sexual offending against children, it is a term that is insufficiently understood in the psychological, sociological, criminological or legal literature. Most recently, the term has been used in two primary offending contexts - on-line grooming and abuse by strangers, and institutional grooming and abuse by those in positions of trust. This article argues, however, that grooming and its role in child sexual abuse is a multi-faceted phenomenon and much more complex than has been highlighted previously. While there are a number of typologies of grooming, this article concentrates on those which may be most relevant for treatment and management contexts - 'peer-to-peer grooming' and 'institutional grooming.' Drawing on extensive fieldwork with professionals who work in the fields of child protection or victim support, and sex offender assessment, treatment or management across the United Kingdom and the Republic of Ireland, the aim of this article is two-fold: (i) to deconstruct the term grooming and examine its actual role in the onset of sexual offending against children; and (ii) to draw out the implications of these complexities for policy and practice, chiefly in terms of treatment and prevention.
Resumo:
Social psychologists have attempted to capture the ideological quality of the nation through a consideration of its taken-for-granted quality, whereby it forms an unnoticed ‘banal’ background to everyday life and is passively absorbed by its members in contrast to its ‘hot’, politically created and contested nature. Accordingly, national identity is assumed to be both passively absorbed from the national backdrop and actively acquired through national inculcation. This raises the question of how national identity is expressed, transmitted and acquired in a foreign context, where the banal national backdrop is unavailable to scaffold identity and the national resources for identity transmission may be unavailable. The present article addresses this gap by examining the situation of Irish women raising children in England. Critical discursive analyses of the 16 interviews revealed that all women treated their children’s national identity and the issue of transmitting identity as dilemmatic: passive transmission risks children passively absorbing English, but active transmission contravenes the assumed naturalness of national identity and can furthermore conflict with children’s own personal choice. These results point to the complex interaction between the management of national identity and the broader personal and national context within which this occurs.
Resumo:
Partnership working is nowadays a seemingly ubiquitous aspect of the management and delivery of public services, yet there remain major differences of opinion about how they best work for the different stakeholders they involve. The balances between mandate and trust, and between hard and soft power, are crucial to current debates about public service partnerships. This paper explores the example of social housing procurement in Northern Ireland, and the requirement to form mandated procurement groups. The research shows that the exercise of hierarchical power is still important in network governance; that mandated partnerships alter the balance between trust and power in partnership working, but the impact is uneven; and that these relationships are (re)shaping the ‘hybrid’ identity of housing associations. The balance between accountability for public resources and the independence of third sector organisations is the key tension in mandated partnerships. The Northern Ireland experience suggests that trust-based networks could provide more productive working relationships in partnerships for service delivery.
Resumo:
Article 4(2) TEU requires that the European Union (EU) respect the Member States’ national identities, creating a legal obligation enforceable before the CJEU and valuable in political negotiations. However, the concept of national identities is unclear, leaving open questions about the scope or parameters of the provision and its applicability. The CJEU appears likely to take a relatively flexible approach in light of Article 4(2) TEU’s relationship with national constitutional courts’ reserves. This flexible approach would enable Member States to rely upon a range of aspects as part of their national identity, including ones that were previously unidentified. This is a crucial feature if one considers that national identities may evolve gradually or even dramatically, including where Member States purposefully attempt to develop their national identities further. This possibility of an evolved national identity is exemplified by the French Charte de l’Environnement. It may thereby be possible for Member States to stretch the scope and application of Article 4(2) TEU through reference to these evolving national identities. This potential raises significant challenges for the EU regarding the management of Article 4(2) TEU, which it will need to address if it wishes to ensure harmonisation and uniformity in the relevant areas.
Resumo:
To date there is an absence of any systematic and extensive data on Australian multinational enterprises (MNEs). This research paper fills the information gap and leads to a discussion of the human resource management (HRM) practices of Australian MNEs in the global arena and whether there is a distinctive national identity associated with these practices. We report on the profile of Australian-based multinational enterprises (MNEs). Drawing on a systematic database developed by the authors in 2010–11 we are able to identify the numbers of Australian MNEs and their characteristics and compare them against a representative sample of foreign-owned MNEs operating in Australia.