961 resultados para Islamism, securitization, security agenda, Uzbekistan


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organizations generally are not responding effectively to rising IT security threats because people issues receive inadequate attention. The stark example of IT security is just the latest strategic IT priority demonstrating deficient IT leadership attention to the social dimension of IT. Universities in particular, with their devolved people organization, diverse adoption of IT, and split central/local federated approach to governance and leadership of IT, demand higher levels of interpersonal sophistication and strategic engagement from their IT leaders. An idealized model for IT leaders for the 21st century university is proposed to be developed as a framework for further investigation. The testing of this model in an action research study is proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Globalisation‟ and the "global knowledge economy‟ have become some of the most common "buzzwords‟ in Australian business, economic, and social sectors in the past decade. Further, knowledge service exports are a growing sector for Australia that utilise complex technical and creative capacities, increasingly rely on virtual work innovations, require new socio-technical systems to establish and maintain effective client relationships in global contexts; and – along with other innovations in the electronic age – may require novel coping abilities on the part of both managers and their employees to achieve desired outcomes (Bandura, 2002). Accordingly, this paper overviews such trends. The paper also includes a research agenda which is a "work-in-progress‟ with a major global company, Shell (Australia); it highlights both the objectives and proposed methodology of the study; it also outlines anticipated key benefits arising from the research.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reflects upon our attempts to bring a participatory design approach to design research into interfaces that better support dental practice. The project brought together design researchers, general and specialist dental practitioners, the CEO of a dental software company and, to a limited extent, dental patients. We explored the potential for deployment of speech and gesture technologies in the challenging and authentic context of dental practices. The paper describes the various motivations behind the project, the negotiation of access and the development of the participant relationships as seen from the researchers' perspectives. Conducting participatory design sessions with busy professionals demands preparation, improvisation, and clarity of purpose. The paper describes how we identified what went well and when to shift tactics. The contribution of the paper is in its description of what we learned in bringing participatory design principles to a project that spanned technical research interests, commercial objectives and placing demands upon the time of skilled professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Queensland Department of Public Works (QDPW) and the Queensland Department of Main Roads (QDMR) have identified a need for industry e-contracting guidelines in the short to medium term. Each of these organisations conducts tenders and contracts for over $600 million annually. This report considers the security and legal issues relating to the shift from a paper-based tendering system to an electronic tendering system. The research objectives derived from the industry partners include: • a review of current standards and e-tendering systems; • a summary of legal requirements impacting upon e-tendering; • an analysis of the threats and requirements for any e-tendering system; • the identification of outstanding issues; • an evaluation of possible e-tendering architectures; • recommendations for e-tendering systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides an overview of the Australian Government’s Facilities Management (FM) Action Agenda as announced in 2004 as a key policy plank designed to facilitate growth of the FM industry. The resulting consultation with industry leaders has seen the criterion and release in April 2005 of the FM Action Agenda’s strategic plan entitled ‘Managing the Built Environment’. This framework, representing a collaboration between the Australian Government, public and private sector stakeholders and Facility Management Association of Australia (FMA Australia) and other allied bodies, sets out to achieve the vision of a more “…productive and sustainable built environment…” through improved innovation, education and standards. The 36 month implementation phase is now underway and will take a multi-pronged approach to enhancing the recognition of the FM industry and removing impediments to its growth with a 20 point action plan across the following platforms: • Innovation – Improved appreciation of facility life cycles, and greater understanding of the key drivers of workplace productivity, and the improved application of information technology. • Education and Training – Improved access to dedicated FM education and training opportunities and creation clear career pathways into the profession. • Regulatory Reform – Explore opportunities to harmonise cross jurisdictional regulatory compliance requirements that have an efficiency impact on FM. • Sustainability – Improved utilization of existing knowledge and the development of tools and opportunities to improve the environmental performance of facilities. Additional information is available at www.fma.com.au

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite their increasing size and ease of access, the pornography and erotica industries have received scant attention from academics in the business disciplines. This paper examines what little research has been conducted and offers background material drawn from other disciplines on historical social approaches to pornography. These areas include sumptuary law and approaches to moral issues generally. The paper concludes with a suggested approach to determining a research agenda for this much neglected area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Measuring quality attributes of object-oriented designs (e.g. maintainability and performance) has been covered by a number of studies. However, these studies have not considered security as much as other quality attributes. Also, most security studies focus at the level of individual program statements. This approach makes it hard and expensive to discover and fix vulnerabilities caused by design errors. In this work, we focus on the security design of an object oriented application and define a number of security metrics. These metrics allow designers to discover and fix security vulnerabilities at an early stage, and help compare the security of various alternative designs. In particular, we propose seven security metrics to measure Data Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented class from the point of view of potential information flow.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"This book investigates the origins and implications of the securitization crisis, described by the chief executive of ANZ as a "financial services bloodbath". Based on extensive interviews it offers an integrated series of case studies drawn from the United States, the United Kingdom and Australia. A central purpose is to not only chart what went wrong with the investment houses and why the regulatory systems failed, but also provide policy guidance. The book therefore combines the empirical with the normative. In so doing, it provides a route map to navigate one of the most significant financial and regulatory failures in modern times."