981 resultados para Internal security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This project examined the differences in healing of metaphyseal bone, when the implants of variable stiffness are used for fracture fixation. This knowledge is important in development of novel orthopaedic implants, used in orthopaedic surgery to stabilise the fractures. Dr Koval used a mouse model to create a fracture, and then assessed its healing with a combination of mechanical testing, microcomputed tomography and histomorphometric examination.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have previously suggested that three proof requirements are essential for a sustainable land registration system. These were proof of identity, proof of ownership and authority to deal. Our attention in this article is drawn to the security framework that surrounds these requirements. We will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to them. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years. We also canvass some more incremental suggestions that evolve out of what we currently do, as well as outlining some comparative externally sourced ideas as to how the transfer and ownership of land can be made safer for all citizens. Such a goal is imperative when land transfer and secure property ownership is a critical component of the economic infrastructure of a modern society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, increasing focus has been made on making good business decisions utilizing the product of data analysis. With the advent of the Big Data phenomenon, this is even more apparent than ever before. But the question is how can organizations trust decisions made on the basis of results obtained from analysis of untrusted data? Assurances and trust that data and datasets that inform these decisions have not been tainted by outside agency. This study will propose enabling the authentication of datasets specifically by the extension of the RESTful architectural scheme to include authentication parameters while operating within a larger holistic security framework architecture or model compliant to legislation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A recurring feature of modern practice is the stress placed on project professionals, with both debilitating effects on the people concerned and indirectly affecting project success. Cost estimation, for example, is an essential task for successful project management involving a high level of uncertainty. It is not surprising, therefore, that young cost estimators especially can become stressful at work due to a lack of experience and the heavy responsibilities involved. However, the concept of work stress and the associated underlying dimensions has not been clearly defined in extant studies in the construction management field. To redress this situation, an updated psychology perceived stress questionnaire (PSQ) , first developed by Levenstein et al (1993) and revised by Fliege et al (2005), is used to explore the dimensions of work stress with empirical evidence from the construction industry in China. With 145 reliable responses from young (less than 5 years’ experience) Chinese cost estimators, this study explores the internal dimensions of work stress, identifying four dimensions of tension, demands, lack of joy and worries. It is suggested that this four-dimensional structure may also be applicable in a more general context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BreastScreen Queensland (BSQ) is a government-based health service that provides free breast cancer screening services to eligible women using digital mammography technology.' In 2007, BSQ launched its first social marketing campaign' aimed at achieving a 30 per cent increase in women's programme participation by addressing the barriers to regular screening and by dispelling myths about breast cancer (Tornabene 2010). 'The Facts' mass media social marketing campaign used a credible spokesperson, Australian journalist]ana Wendt, to deliver the call to action' Don't make excuses. Make an appointment'.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates whether academics can capitalize on their external prominence (measured by the number of pages indexed on Google, TED talk invitations or New York Times bestselling book successes) and internal success within academia (measured by publication and citation performance) in the speakers’ market. The results indicate that the larger the number of web pages indexing a particular scholar, the higher the minimum speaking fee. Invitations to speak at a TED event, or making the New York Times Best Seller list is also positively correlated with speaking fees. Scholars with a stronger internal impact or success also achieve higher speaking fees. However, once external impact is controlled, most metrics used to measure internal impact are no longer statistically significant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper finds evidence for the growing importance of informal interactions between the internal audit function and the audit committee (AC) in Australia – a relatively unexplored topic in the literature – using a survey of Chief Audit Executives (CAEs). It also describes the nature of these informal interactions. The most innovative elements of this paper are the findings that certain personal characteristics of CAEs, the specific knowledge and expertise of the AC chair, as well as some of the AC chair’s personal characteristics are associated with the existence (and increase) of informal interactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – This paper aims to recognise the importance of informal processes within corporate governance and complement existing research in this area by investigating factors associated with the existence of informal interactions between audit committees and internal audit functions and in providing directions for future research. Design/methodology/approach – To examine the existence and drivers of informal interactions between audit committees and internal audit functions, this paper relies on a questionnaire survey of chief audit executives (CAEs) in the UK from listed and non-listed, as well as financial and non-financial, companies. While prior qualitative research suggests that informal interactions do take place, most of the evidence is based on particular organisational setting or on a very small range of interviews. The use of a questionnaire enabled the examination of the existence of internal interactions across a relatively larger number of entities. Findings – The paper finds evidence of audit committees and internal audit functions engaging in informal interactions in addition to formal pre-scheduled regular meetings. Informal interactions complement formal meetings with the audit committee and as such represent additional opportunities for the audit committees to monitor internal audit functions. Audit committees’ informal interactions are significantly and positively associated with audit committee independence, audit chair’s knowledge and experience, and internal audit quality. Originality/value – The results demonstrate the importance of the background of the audit committee chair for the effectiveness of the governance process. This is possibly the first paper to examine the relationship between audit committee quality and internal audit, on the existence and driver of informal interactions. Policy makers should recognize that in addition to formal mechanisms, informal processes, such as communication outside of formal pre-scheduled meetings, play a significant role in corporate governance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internal communication is an important concept and integral to internal public relations with links to positive organizational and employee outcomes such as employee engagement. While scholars emphasize the importance of the relationship between internal communication and employee engagement, the association has not been empirically tested. Using surveys and regression analysis this study confirms that internal organizational communication and internal supervisor communication support workplace relationships based on meaning and worth, and have a significant part to play in developing and maintaining optimal employee engagement.