984 resultados para security governance


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Major infrastructure assets are often governed by a mix of public and private organizations, each fulfilling a specific and separate role i.e. policy, ownership, operation or maintenance. This mix of entities is a legacy of Public Choice Theory influenced NPM reforms of the late 20th century. The privatization of the public sector has resulted in agency theory based ‘self-interest’ relationships and governance arrangements for major infrastructure assets which emphasize economic efficiency but which do not do not advance non-economic public values and the collective Public Interest. The community is now requiring that governments fulfill their stewardship role of also satisfying non-economic public values such as sustainability and intergenerational responsibility. In the 21st century governance arrangements which minimize individual self-interest alone and look to also pursue the interests of other stakeholders have emerged. Relational contracts, Public-Private Partnerships (PPP’s) and hybrid mixes of organizations from the state, market and network modes (Keast et al 2006) provide options for governance which better meet the interests of contractors, government and the community there is emerging a body of research which extends the consideration of the immediate governance configuration to the metagovernance environment constituted by hierarchy, regulation, industry standards, trust, culture and values. Stewardship theory has reemerged as a valuable aid in the understanding of the features of governance configurations which establish relationships between principal and agent which maximize the agent acting in the interests of the principal, even to the detriment of the agent. This body of literature suggests that an improved stewardship outcome from infrastructure governance configurations can be achieved by the application of the emerging options as to the immediate governance configuration, and the surrounding metagovernance environment. Stewardship theory provides a framework for the design of the relationships within that total governance environment, focusing on the achievement of a better, complete stewardship outcome. This paper explores the directions future research might take in seeking to improve the understanding of the design of the governance of major, critical infrastructure assets.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Measuring quality attributes of object-oriented designs (e.g. maintainability and performance) has been covered by a number of studies. However, these studies have not considered security as much as other quality attributes. Also, most security studies focus at the level of individual program statements. This approach makes it hard and expensive to discover and fix vulnerabilities caused by design errors. In this work, we focus on the security design of an object oriented application and define a number of security metrics. These metrics allow designers to discover and fix security vulnerabilities at an early stage, and help compare the security of various alternative designs. In particular, we propose seven security metrics to measure Data Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented class from the point of view of potential information flow.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to identify some key issues for the analysis of corporate governance based on the papers within this special issue including the Guest Editor's perspectives. Design/methodology/approach – The five papers included in this special issue are summarized and their main contribution to the literature is highlighted. Findings – The paper collectively deal with the role and impact of corporate boards on the quality of information provided to capital markets. Practical implications – The theoretical and empirical research included in the special issue advance the understanding of corporate governance which provides impetus for practitioner and policy change. Originality/value – The normative concepts of best practice need to be validated by empirical testing in the context of firms and their institutional settings. This suite of papers provides evidence of the effectiveness of corporate governance in improving accounting quality

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Schools, homes and communities are increasingly perceived as risky spaces for children. This concern is a driving force behind many forms of governance imposed upon Australian children by well-meaning adults. Children are more and more the subjects of both overt and covert regulation by teachers and other adults in school contexts. Are children, though, passive in this process of governance? It is this issue that is the focus of this paper. In order to respond to the question of how young children enact governance in their everyday lives, video-recorded episodes of naturally occurring interactions among children in a preparatory classroom were captured. These data were then transcribed and analysed using the methods of conversation analysis and membership categorisation analysis. This paper shows a number of strategies that the children used when enacting governance within their peer cultures in the classroom. It focuses specifically on how adult and child-formulated rules and social orders of the classroom were drawn upon and developed in order to control and govern during the interaction. This paper illustrates that children are not passive in enacting governance, but actively and competently enact governance through their peer cultures. These findings are significant for educators to consider, as they help to develop an understanding of the complex social orders that children are continually constructing in the early childhood classroom.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report focuses on risk-assessment practices in the private rental market, with particular consideration of their impact on low-income renters. It is based on the fieldwork undertaken in the second stage of the research process that followed completion of the Positioning Paper. The key research question this study addressed was: What are the various factors included in ‘risk-assessments’ by real estate agents in allocating ‘affordable’ tenancies? How are these risks quantified and managed? What are the key outcomes of their decision-making? The study builds on previous research demonstrating that a relatively large proportion of low-cost private rental accommodation is occupied by moderate- to high-income households (Wulff and Yates 2001; Seelig 2001; Yates et al. 2004). This is occurring in an environment where the private rental sector is now the de facto main provider of rental housing for lower-income households across Australia (Seelig et al. 2005) and where a number of factors are implicated in patterns of ‘income–rent mismatching’. These include ongoing shifts in public housing assistance; issues concerning eligibility for rent assistance; ‘supply’ factors, such as loss of low-cost rental stock through upgrading and/or transfer to owner-occupied housing; patterns of supply and demand driven largely by middle- to high-income owner-investors and renters; and patterns of housing need among low-income households for whom affordable housing is not appropriate. In formulating a way of approaching the analysis of ‘risk-assessment’ in rental housing management, this study has applied three sociological perspectives on risk: Beck’s (1992) formulation of risk society as entailing processes of ‘individualisation’; a socio-cultural perspective which emphasises the situated nature of perceptions of risk; and a perspective which has drawn attention to different modes of institutional governance of subjects, as ‘carriers of specific indicators of risk’. The private rental market was viewed as a social institution, and the research strategy was informed by ‘institutional ethnography’ as a method of enquiry. The study was based on interviews with property managers, real estate industry representatives, tenant advocates and community housing providers. The primary focus of inquiry was on ‘the moment of allocation’. Six local areas across metropolitan and regional Queensland, New South Wales, and South Australia were selected as case study localities. In terms of the main findings, it is evident that access to private rental housing is not just a matter of ‘supply and demand’. It is also about assessment of risk among applicants. Risk – perceived or actual – is thus a critical factor in deciding who gets housed, and how. Risk and its assessment matter in the context of housing provision and in the development of policy responses. The outcomes from this study also highlight a number of salient points: 1.There are two principal forms of risk associated with property management: financial risk and risk of litigation. 2. Certain tenant characteristics and/or circumstances – ability to pay and ability to care for the rented property – are the main factors focused on in assessing risk among applicants for rental housing. Signals of either ‘(in)ability to pay’ and/or ‘(in)ability to care for the property’ are almost always interpreted as markers of high levels of risk. 3. The processing of tenancy applications entails a complex and variable mix of formal and informal strategies of risk-assessment and allocation where sorting (out), ranking, discriminating and handing over characterise the process. 4. In the eyes of property managers, ‘suitable’ tenants can be conceptualised as those who are resourceful, reputable, competent, strategic and presentable. 5. Property managers clearly articulated concern about risks entailed in a number of characteristics or situations. Being on a low income was the principal and overarching factor which agents considered. Others included: - unemployment - ‘big’ families; sole parent families - domestic violence - marital breakdown - shift from home ownership to private rental - Aboriginality and specific ethnicities - physical incapacity - aspects of ‘presentation’. The financial vulnerability of applicants in these groups can be invoked, alongside expressed concerns about compromised capacities to manage income and/or ‘care for’ the property, as legitimate grounds for rejection or a lower ranking. 6. At the level of face-to-face interaction between the property manager and applicants, more intuitive assessments of risk based upon past experience or ‘gut feelings’ come into play. These judgements are interwoven with more systematic procedures of tenant selection. The findings suggest that considerable ‘risk’ is associated with low-income status, either directly or insofar as it is associated with other forms of perceived risk, and that such risks are likely to impede access to the professionally managed private rental market. Detailed analysis suggests that opportunities for access to housing by low-income householders also arise where, for example: - the ‘local experience’ of an agency and/or property manager works in favour of particular applicants - applicants can demonstrate available social support and financial guarantors - an applicant’s preference or need for longer-term rental is seen to provide a level of financial security for the landlord - applicants are prepared to agree to specific, more stringent conditions for inspection of properties and review of contracts - the particular circumstances and motivations of landlords lead them to consider a wider range of applicants - In particular circumstances, property managers are prepared to give special consideration to applicants who appear worthy, albeit ‘risky’. The strategic actions of demonstrating and documenting on the part of vulnerable (low-income) tenant applicants can improve their chances of being perceived as resourceful, capable and ‘savvy’. Such actions are significant because they help to persuade property managers not only that the applicant may have sufficient resources (personal and material) but that they accept that the onus is on themselves to show they are reputable, and that they have valued ‘competencies’ and understand ‘how the system works’. The parameters of the market do shape the processes of risk-assessment and, ultimately, the strategic relation of power between property manager and the tenant applicant. Low vacancy rates and limited supply of lower-cost rental stock, in all areas, mean that there are many more tenant applicants than available properties, creating a highly competitive environment for applicants. The fundamental problem of supply is an aspect of the market that severely limits the chances of access to appropriate and affordable housing for low-income rental housing applicants. There is recognition of the impact of this problem of supply. The study indicates three main directions for future focus in policy and program development: providing appropriate supports to tenants to access and sustain private rental housing, addressing issues of discrimination and privacy arising in the processes of selecting suitable tenants, and addressing problems of supply.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The most frequently told story charting the rise of mass schooling should be fairly familiar to most of us. This story normally centres around the post-enlightenment social changes of the late 18th and early 19th centuries, and details how society slowly became more caring and more humane, and how we all decided that rather than simply being fodder for the mills, all children – including those from the working-classes - had the right to an education. The more civilised we became, the more we pushed back the school leaving age, until we eventually developed schools which clearly reflected the values and ambitions of the wider community. After all, are school not simply microcosms of society at large? In addition to this, the form that modern schooling takes is regarded as an unproblematic part of the same story. Of course we should organise our learning in the way we do, with the emphasis on formalised learning spaces, graded curricula, timetables of activities, various forms of assessment, and a clear hierarchy of authority. These features of the contemporary education merely reflect the fact that this is self-evidently the best system available. After all, how else could education possibly be organised?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rather than passing judgment of the content of young women’s magazines, it will be argued instead that such texts actually exist as manuals of self-formation, manuals which enroll young women to do specific kinds of work on themselves. In doing so, they form an effective link between the governmental imperatives aimed at constructing particular personas – such as the sexually responsible young girl - and the actual practices whereby these imperatives are operationalised.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The essays in this book catalogue a wide and varied range of instances where 'things go wrong' in the practice of criminal justice. The contributions document instances where laws, policies and practices have produced unintended consequences of the most deleterious kind, drawing attention to 'boot camps', detention centres and specific penal policies such as 'short, sharp shock' and 'three strikes and you're out'. Also examined are policing practices such as 'zero tolerance', 'saturation policing' and punitive laws in the area of drug use, sex offences, and prostitution. It will be demonstrated that in each of these cases, the objectives of government resulted in the creation of new and unforeseen problems requiring further reform to the justice system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to investigate whether security culture has emerged into practices in Saudi Arabian organizations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As organisations strive to improve their capabilities in the areas of Service Management and Service-oriented Architectures (SOA), SOA Governance is becoming an increasingly important success factor. However, the concept of SOA Governance is complex and not well-understood, and the adoption of an adequate SOA Governance approach in an organisation can be difficult. Tools that support SOA Governance mostly have a technical bias and rarely address organisational aspects. In this paper, we contribute to the field by specifying a conceptual meta model for SOA Governance that integrates the structure of major IT and SOA Governance frameworks into one consolidated view. By presenting this conceptualisation and a corresponding prototypical implementation of a tool that supports SOA Governance maturity assessment, reference framework exploration and company-specific tailoring of SOA Governance, we provide insights into the first step of a Design Science research project, i.e. the development of an important IT artefact.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A method of improving the security of biometric templates which satisfies desirable properties such as (a) irreversibility of the template, (b) revocability and assignment of a new template to the same biometric input, (c) matching in the secure transformed domain is presented. It makes use of an iterative procedure based on the bispectrum that serves as an irreversible transformation for biometric features because signal phase is discarded each iteration. Unlike the usual hash function, this transformation preserves closeness in the transformed domain for similar biometric inputs. A number of such templates can be generated from the same input. These properties are illustrated using synthetic data and applied to images from the FRGC 3D database with Gabor features. Verification can be successfully performed using these secure templates with an EER of 5.85%

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As multi-stakeholder entities that explicitly inhabit both social and economic domains, social enterprises pose new challenges and possibilities for local governance. In this paper, we draw on new institutional theory to examine the ways in which locally-focused social enterprises disrupt path dependencies and rules in use within local government. Rather than examining the more commonly asked question of the influence of the state on social enterprise, our purpose here is to examine the impacts of social enterprise on governmental institutions at the local level. Our discussion is based on a mixed-methods study, including an online survey of 66 local government staff, document analysis, and in-depth interviews with 24 social enterprise practitioners and local government actors working to support social enterprise development in Victoria, Australia. We find that, in some instances, the hybrid nature of social enterprise facilitates ‘joining up’ between different functional areas of local government. Beyond organisational relationships, social enterprise also influences local governance through the reinterpretation and regeneration of institutionalised public spaces.