954 resultados para security complex
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Creativity in policing: building the necessary skills to solve complex and protracted investigations
Resumo:
Despite an increased focus on proactive policing in recent years, criminal investigation is still perhaps the most important task of any law enforcement agency. As a result, the skills required to carry out a successful investigation or to be an ‘effective detective’ have been subjected to much attention and debate (Smith and Flanagan, 2000; Dean, 2000; Fahsing and Gottschalk, 2008:652). Stelfox (2008:303) states that “The service’s capacity to carry out investigations comprises almost entirely the expertise of investigators.” In this respect, Dean (2000) highlighted the need to profile criminal investigators in order to promote further understanding of the cognitive approaches they take to the process of criminal investigation. As a result of his research, Dean (2000) produced a theoretical framework of criminal investigation, which included four disparate cognitive or ‘thinking styles’. These styles were the ‘Method’, ‘Challenge’, ‘Skill’ and ‘Risk’. While the Method and Challenge styles deal with adherence to Standard Operating Procedures (SOPs) and the internal ‘drive’ that keeps an investigator going, the Skill and Risk styles both tap on the concept of creativity in policing. It is these two latter styles that provide the focus for this paper. This paper presents a brief discussion on Dean’s (2000) Skill and Risk styles before giving an overview of the broader literature on creativity in policing. The potential benefits of a creative approach as well as some hurdles which need to be overcome when proposing the integration of creativity within the policing sector are then discussed. Finally, the paper concludes by proposing further research into Dean’s (2000) skill and risk styles and also by stressing the need for significant changes to the structure and approach of the traditional policing organisation before creativity in policing is given the status it deserves.
Resumo:
Transnational Organised Crime (TOC) has become a focal point for a range of private and public stakeholders. While not a new phenomenon, the rapid expansion of TOC activities and interests, its increasingly complex structures and ability to maximise opportunity by employing new technologies at a rate impossible for law enforcement to match complicates law enforcement’s ability to develop strategies to detect, disrupt, prevent and investigate them. In an age where the role of police has morphed from simplistic response and enforcement activities to one of managing human security risk, it is argued that intelligence can be used to reduce the impact of strategic surprise from evolving criminal threats and environmental change. This review specifically focuses on research that has implications for strategic intelligence and strategy setting in a TOC context. The review findings suggest that current law enforcement intelligence literature focuses narrowly on the management concept of intelligence-led policing in a tactical, operational setting. As such the review identifies central issues surrounding strategic intelligence and highlights key questions that future research agendas must address to improve strategic intelligence outcomes, particularly in the fight against TOC.
Resumo:
A key function of activated macrophages is to secrete proinflammatory cytokines such as TNF; however, the intracellular pathway and machinery responsible for cytokine trafficking and secretion is largely undefined. Here we show that individual SNARE proteins involved in vesicle docking and fusion are regulated at both gene and protein expression upon stimulation with the bacterial cell wall component lipopolysaccharide. Focusing on two intracellular SNARE proteins, Vti1b and syntaxin 6 (Stx6), we show that they are up-regulated in conjunction with increasing cytokine secretion in activated macrophages and that their levels are selectively titrated to accommodate the volume and timing of post-Golgi cytokine trafficking. In macrophages, Vti1b and syntaxin 6 are localized on intracellular membranes and are present on isolated Golgi membranes and on Golgi-derived TNF� vesicles budded in vitro. By immunoprecipitation, we find that Vti1b and syntaxin 6 interact to form a novel intracellular Q-SNARE complex. Functional studies using overexpression of full-length and truncated proteins show that both Vti1b and syntaxin 6 function and have rate-limiting roles in TNF� trafficking and secretion. This study shows how macrophages have uniquely adapted a novel Golgi-associated SNARE complex to accommodate their requirement for increased cytokine secretion.
Resumo:
The new model of North Island Cenozoic palaeogeography developed by Kamp et al. has a range of important implications for the evolution of New Zealand terrestrial taxa over the past 30 Ma. Key aspects include the prolonged isolation of the biota on the North Island landmass from the larger and more diverse greater South Island, and the founding of North Island taxa from the potentially unusual ecosystem of a small island around Northland. The prolonged period of isolation is expected to have generated deep phylogenetic splits within taxa present on both islands, and an important current aim should be to identify such signals in surviving endemics to start building a picture of the historical phylogeography, and inferred ecology of both islands through the Cenozoic. Given the potential differences in founding terrestrial species and climatic conditions, it seems likely that the ecology may have been very diferent between the North and South Islands. New genetic data from the 10 or so species of extinct moa suggest that the radiation of moa was much more recent than previously suggested, and reveals a complex pattern that is inferred to result from the interplay of the Cenozoic biogeography, marine barriers, and glacial cycles.
Resumo:
At the core of our uniquely human cognitive abilities is the capacity to see things from different perspectives, or to place them in a new context. We propose that this was made possible by two cognitive transitions. First, the large brain of Homo erectus facilitated the onset of recursive recall: the ability to string thoughts together into a stream of potentially abstract or imaginative thought. This hypothesis is sup-ported by a set of computational models where an artificial society of agents evolved to generate more diverse and valuable cultural outputs under conditions of recursive recall. We propose that the capacity to see things in context arose much later, following the appearance of anatomically modern humans. This second transition was brought on by the onset of contextual focus: the capacity to shift between a minimally contextual analytic mode of thought, and a highly contextual associative mode of thought, conducive to combining concepts in new ways and ‘breaking out of a rut’. When contextual focus is implemented in an art-generating computer program, the resulting artworks are seen as more creative and appealing. We summarize how both transitions can be modeled using a theory of concepts which high-lights the manner in which different contexts can lead to modern humans attributing very different meanings to the interpretation of one concept.
Resumo:
Purpose – The rapidly changing role of capital city airports has placed demands on surrounding infrastructure. The need for infrastructure management and coordination is increasing as airports and cities grow and share common infrastructure frameworks. The purpose of this paper is to document the changing context in Australia, where the privatisation of airports has stimulated considerable land development with resulting pressures on surrounding infrastructure provision. It aims to describe a tool that is being developed to support decision-making between various stakeholders in the airport region. The use of planning support systems improves both communication and data transfer between stakeholders and provides a foundation for complex decisions on infrastructure. Design/methodology/approach – The research uses a case study approach and focuses on Brisbane International Airport and Brisbane City Council. The research is primarily descriptive and provides an empirical assessment of the challenges of developing and implementing planning support systems as a tool for governance and decision-making. Findings – The research assesses the challenges in implementing a common data platform for stakeholders. Agency data platforms and models, traditional roles in infrastructure planning, and integrating similar data platforms all provide barriers to sharing a common language. The use of a decision support system has to be shared by all stakeholders with a common platform that can be versatile enough to support scenarios and changing conditions. The use of iPadss for scenario modelling provides stakeholders the opportunity to interact, compare scenarios and views, and react with the modellers to explore other options. Originality/value – The research confirms that planning support systems have to be accessible and interactive by their users. The Airport City concept is a new and evolving focus for airport development and will place continuing pressure on infrastructure servicing. A coordinated and efficient approach to infrastructure decision-making is critical, and an interactive planning support system that can model infrastructure scenarios provides a sound tool for governance.
Resumo:
This study describes the design of a biphasic scaffold composed of a Fused Deposition Modeling scaffold (bone compartment) and an electrospun membrane (periodontal compartment) for periodontal regeneration. In order to achieve simultaneous alveolar bone and periodontal ligament regeneration a cell-based strategy was carried out by combining osteoblast culture in the bone compartment and placement of multiple periodontal ligament (PDL) cell sheets on the electrospun membrane. In vitro data showed that the osteoblasts formed mineralized matrix in the bone compartment after 21 days in culture and that the PDL cell sheet harvesting did not induce significant cell death. The cell-seeded biphasic scaffolds were placed onto a dentin block and implanted for 8 weeks in an athymic rat subcutaneous model. The scaffolds were analyzed by μCT, immunohistochemistry and histology. In the bone compartment, a more intense ALP staining was obtained following seeding with osteoblasts, confirming the μCT results which showed higher mineralization density for these scaffolds. A thin mineralized cementum-like tissue was deposited on the dentin surface for the scaffolds incorporating the multiple PDL cell sheets, as observed by H&E and Azan staining. These scaffolds also demonstrated better attachment onto the dentin surface compared to no attachment when no cell sheets were used. In addition, immunohistochemistry revealed the presence of CEMP1 protein at the interface with the dentine. These results demonstrated that the combination of multiple PDL cell sheets and a biphasic scaffold allows the simultaneous delivery of the cells necessary for in vivo regeneration of alveolar bone, periodontal ligament and cementum. © 2012 Elsevier Ltd.
Resumo:
Public dialogue regarding the high concentration of drug use and crime in inner city locations is frequently legitimised through visibility of drug-using populations and a perception of high crime rates. The public space known as the Brunswick Street Mall (Valley mall), located in the inner city Brisbane suburb of Fortitude Valley, has long provided the focal point for discussions regarding the problem of illicit drug use and antisocial behaviour in Brisbane. During the late 1990s a range of stakeholders in Fortitude Valley became mobilised to tackle crime and illicit drugs. In particular they wanted to dismantle popular perceptions of the area as representing the dark and unsafe side of Brisbane. The aim of this campaign was to instil a sense of safety in the area and dislodge Fortitude Valley from its reputation as a =symbolic location of danger‘. This thesis is a case study about an urban site that became contested by the diverse aims of a range of stakeholders who were invested in an urban renewal program and community safety project. This case study makes visible a number of actors that were lured from their existing roles in an indeterminable number of heterogeneous networks in order to create a community safety network. The following analysis of the community safety network emphasises some specific actors: history, ideas, technologies, materialities and displacements. The case study relies on the work of Foucault, Latour, Callon and Law to draw out the rationalities, background contingencies and the attempts to impose order and translate a number of entities into the community safety project in Fortitude Valley. The results of this research show that the community safety project is a case of ontological politics. Specifically the data indicates that both the (reality) problem of safety and the (knowledge) solution to safety were created simultaneously. This thesis explores the idea that while violence continues to occur in the Valley, evidence that community safety got done is located through mapping its displacement and eventual disappearance. As such, this thesis argues that community safety is a =collateral reality‘.
Resumo:
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.
Resumo:
Four morphologically cryptic species of the Bactrocera dorsalis fruit fly complex (B. dorsalis s.s., B. papayae, B. carambolae and B. philippinensis) are serious agricultural pests. As they are difficult to diagnose using traditional taxonomic techniques, we examined the potential for geometric morphometric analysis of wing size and shape to discriminate between them. Fifteen wing landmarks generated size and shape data for 245 specimens for subsequent comparisons among three geographically distinct samples of each species. Intraspecific wing size was significantly different within samples of B. carambolae and B. dorsalis s.s. but not within samples of B. papayae or B. philippinensis. Although B. papayae had the smallest wings (average centroid size=6.002 mm±0.061 SE) and B. dorsalis s.s. the largest (6.349 mm±0.066 SE), interspecific wing size comparisons were generally non-informative and incapable of discriminating species. Contrary to the wing size data, canonical variate analysis based on wing shape data discriminated all species with a relatively high degree of accuracy; individuals were correctly reassigned to their respective species on average 93.27% of the time. A single sample group of B. carambolae from locality 'TN Malaysia' was the only sample to be considerably different from its conspecific groups with regards to both wing size and wing shape. This sample was subsequently deemed to have been originally misidentified and likely represents an undescribed species. We demonstrate that geometric morphometric techniques analysing wing shape represent a promising approach for discriminating between morphologically cryptic taxa of the B. dorsalis species complex.
Resumo:
Designing practical rules for controlling invasive species is a challenging task for managers, particularly when species are long-lived, have complex life cycles and high dispersal capacities. Previous findings derived from plant matrix population analyses suggest that effective control of long-lived invaders may be achieved by focusing on killing adult plants. However, the cost-effectiveness of managing different life stages has not been evaluated. We illustrate the benefits of integrating matrix population models with decision theory to undertake this evaluation, using empirical data from the largest infestation of mesquite (Leguminosae: Prosopis spp) within Australia. We include in our model the mesquite life cycle, different dispersal rates and control actions that target individuals at different life stages with varying costs, depending on the intensity of control effort. We then use stochastic dynamic programming to derive cost-effective control strategies that minimize the cost of controlling the core infestation locally below a density threshold and the future cost of control arising from infestation of adjacent areas via seed dispersal. Through sensitivity analysis, we show that four robust management rules guide the allocation of resources between mesquite life stages for this infestation: (i) When there is no seed dispersal, no action is required until density of adults exceeds the control threshold and then only control of adults is needed; (ii) when there is seed dispersal, control strategy is dependent on knowledge of the density of adults and large juveniles (LJ) and broad categories of dispersal rates only; (iii) if density of adults is higher than density of LJ, controlling adults is most cost-effective; (iv) alternatively, if density of LJ is equal or higher than density of adults, management efforts should be spread between adults, large and to a lesser extent small juveniles, but never saplings. Synthesis and applications.In this study, we show that simple rules can be found for managing invasive plants with complex life cycles and high dispersal rates when population models are combined with decision theory. In the case of our mesquite population, focussing effort on controlling adults is not always the most cost-effective way to meet our management objective.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
As a growing number of nations embark on a path to democracy, criminologists have become increasingly interested and engaged in the challenges, concerns, and questions connecting democracy with both crime and criminal justice. Rising levels of violence and street crime, white collar crime and corruption both in countries where democracy is securely in place and where it is struggling, have fuelled a deepening skepticism as to the capacity of democracy to deliver on its promise of security and justice for all citizens. What role does crime and criminal justice play in the future of democracy and for democratic political development on a global level? The editors of this special volume of The Annals realized the importance of collecting research from a broad spectrum of countries and covering a range of problems that affect citizens, politicians, and criminal justice officials. The articles here represent a solid balance between mature democracies like the U.S. and U.K. as well as emerging democracies around the globe – specifically in Latin America, Africa and Eastern Europe. They are based on large and small cross-national samples, regional comparisons, and case studies. Each contribution addresses a seminal question for the future of democratic political development across the globe. What is the role of criminal justice in the process of building democracy and instilling confidence in its institutions? Is there a role for unions in democratizing police forces? What is the impact of widespread disenfranchisement of felons on democratic citizenship and the life of democratic institutions? Under what circumstances do mature democracies adopt punitive sentencing regimes? Addressing sensitive topics such as relations between police and the Muslim communities of Western Europe in the wake of terrorist attacks, this volume also sheds light on the effects of terrorism on mature democracies under increasing pressure to provide security for their citizens. By taking a broad vantage point, this collection of research delves into complex topics such as the relationship between the process of democratization and violent crime waves; the impact of rising crime rates on newly established as well as secure democracies; how crime may endanger the transition to democracy; and how existing practices of criminal justice in mature democracies affect their core values and institutions. The collection of these insightful articles not only begins to fill a gap in criminological research but also addresses issues of critical interest to political scientists as well as other social and behavioral scientists and scholars. Taking a fresh approach to the intersection of crime, criminal justice, and democracy, this volume of The Annals is a must-read for criminologists and political scientists and provides a solid foundation for further interdisciplinary research.