6 resultados para cost-sharing

em Deakin Research Online - Australia


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The selection of an inappropriate regime by policy makers can thwart the effective implementation of public policy and lead to implementation failure. Competing values in the implementation process have a significant impact on the results of implementation, and the regime selected for implementation implies the choice of one value over another. Stoker has argued that on the one hand central leadership is valued for consistency, benefits of scale, co-ordination and cost sharing (instrumental model); and on the other, diffuse authority is valued as knowledge is particular and situational, and the task of analysis is to understand the problems, perspectives and interactions of implementation participants at the contact point between public programs and their clients (accommodation model). This study examines the implementation regime chosen by the Victorian Government for the introduction of a modern internal auditing function into the Victorian Public Service, using the Bureau of Internal Audit within its Department of Management and Budget. The selection of the Department of Management and Budget for the introduction of Internal Audit as a managerial accountability mechanism indicates that the instrumental model was held by the Victorian Government to be the most important in implementation. It is argued that use of a top-down central agency leadership approach resulted in implementation failure. Three propositions suggesting the mechanisms by which this result is brought about are examined: that lack of co-ordinated planning at the outset will result in inadequate definition of client needs as part of policy formulation; that intraorganisational conflict during the implementation success, as individual participants are likely to exercise their veto; and the increasing the number of participants contributes to complexity, so that they should only be involved in implementation when their presence is absolutely required. It is argued that the essential task of implementation is to create an environment where participants are likely to co-operate to achieve predetermined public policy goals; and that the introduction of a modern internal auditing approach into the Victorian Public Service required a more participatory implementation regime in order to facilitate policy outcomes and prevent implementation failure. It is also argued that the dominance of economic reform over accountability in Victoria restricted the ability of the Bureau of Internal Audit to implement change to internal audit practices within Victorian Government departments. The selection of an instrumental model of implementation by the Department of Management and Budget is examined in the context of the environment that existed in Victoria between 1982-1987; and while some of the values which Stoker associates with the top-down approach to policy making were observed, an alternative view to the development of internal auditing in the Victorian Public Service can be sustained.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of benefits to both the society and individuals. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. Ring signature is a promising candidate to construct an anonymous and authentic data sharing system. It allows a data owner to anonymously authenticate his data which can be put into the cloud for storage or analysis purpose. Yet the costly certificate verification in the traditional public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. Identity-based (ID-based) ring signature, which eliminates the process of certificate verification, can be used instead. In this paper, we further enhance the security of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that include this user still remain valid. This property is especially important to any large scale data sharing system, as it is impossible to ask all data owners to re-authenticate their data even if a secret key of one single user has been compromised. We provide a concrete and efficient instantiation of our scheme, prove its security and provide an implementation to show its practicality.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Systems and technologies used for unauthorised file sharing have received little attention in the Information Systems literature. This paper attempts to fill this gap by presenting a critical, qualitative study on the motivations for using unauthorised file sharing systems. Based on 30 interviews with music consumers, musicians, and the music industry, this paper reports on the decision of music consumers to ‘pirate or purchase’. This paper highlights file sharing from multiple perspectives of users, musicians, and representatives from the music recording industry. Three main themes emerged on the cost, convenience and choice as motivators for unauthorised file sharing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The present paper aims to review current evidence for the effectiveness and/or feasibility of using inter-agency data sharing of ED recorded assault information to direct interventions reducing alcohol-related or nightlife assaults, injury or violence. Potential data-sharing partners involve police, local council, liquor licensing regulators and venue management. A systematic review of the peer-reviewed literature was conducted. The initial search discovered 19,506 articles. After removal of duplicates and articles not meeting review criteria, n = 8 articles were included in quantitative and narrative synthesis. Seven of eight studies were conducted in UK EDs, with the remaining study presenting Australian data. All studies included in the review deemed data sharing a worthwhile pursuit. All studies attempting to measure intervention effectiveness reported substantial reductions of assaults and ED attendances post-intervention, with one reporting no change. Negative logistic feasibility concerns were minimal, with general consensus among authors being that data-sharing protocols and partnerships could be easily implemented into modern ED triage systems, with minimal cost, staff workload burden, impact to patient safety, service and anonymity, or risk of harm displacement to other licensed venues, or increase to length of patient stay. However, one study reported a potential harm displacement effect to streets surrounding intervention venues. In future, data-sharing systems should triangulate ED, police and ambulance data sources, and assess intervention effectiveness using randomised controlled trials that account for variations in venue capacity, fluctuations in ED attendance and population levels, seasonal variations in assault and injury, and control for concurrent interventions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hybrid cloud is a widely used cloud architecture in large companies that can outsource data to the publiccloud, while still supporting various clients like mobile devices. However, such public cloud data outsourcing raises serious security concerns, such as how to preserve data confidentiality and how to regulate access policies to the data stored in public cloud. To address this issue, we design a hybrid cloud architecture that supports data sharing securely and efficiently, even with resource-limited devices, where private cloud serves as a gateway between the public cloud and the data user. Under such architecture, we propose an improved construction of attribute-based encryption that has the capability of delegating encryption/decryption computation, which achieves flexible access control in the cloud and privacy-preserving in datautilization even with mobile devices. Extensive experiments show the scheme can further decrease the computational cost and space overhead at the user side, which is quite efficient for the user with limited mobile devices. In the process of delegating most of the encryption/decryption computation to private cloud, the user can not disclose any information to the private cloud. We also consider the communication securitythat once frequent attribute revocation happens, our scheme is able to resist some attacks between private cloud and data user by employing anonymous key agreement.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.