873 resultados para security management
Resumo:
The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.
Resumo:
Sexual harassment can be conceptualized as a series of interactions between harassers and targets that either inhibit or increase outrage by third parties. The outrage management model predicts the kinds of actions likely to be used by perpetrators to minimize outrage, predicts the consequences of failing to use these tactics—namely backfire, and recommends countertactics to increase outrage. Using this framework, our archival study examined outrage-management tactics reported as evidence in 23 judicial decisions of sexual harassment cases in Australia. The decisions contained precise, detailed information about the circumstances leading to the claim; the events which transpired in the courtroom, including direct quotations; and the judges' interpretations and findings. We found evidence that harassers minimize outrage by covering up the actions, devaluing the target, reinterpreting the events, using official channels to give an appearance of justice, and intimidating or bribing people involved. Targets can respond using countertactics of exposure, validation, reframing, mobilization of support, and resistance. Although there are limitations to using judicial decisions as a source of information, our study points to the value of studying tactics and the importance to harassers of minimizing outrage from their actions. The findings also highlight that, given the limitations of statutory and organizational protections in reducing the incidence and severity of sexual harassment in the community, individual responses may be effective as part of a multilevel response in reducing the incidence and impact of workplace sexual harassment as a gendered harm.
Resumo:
Ecologically sustainable development has become a major feature of legal systems at the international, national and local levels throughout the world. In Australia, governments have responded to environmental crises by enacting legislation imposing obligations and restrictions over privately-owned land. Whilst these obligations and restrictions may well be necessary to achieve sustainability, the approach to management of information concerning these instruments is problematic. For example, management of information concerning obligations and restrictions in Queensland is fragmented, with some instruments registered or recorded on the land title register, some on external registers, and some information only available in the legislation itself. This approach is used in most Australian jurisdictions. This fragmented approach has led to two separate but interconnected problems. First, the Torrens system is no longer meeting its goal of providing a complete and accurate picture of title. Second, this uncoordinated approach to the management of land titles, and obligations and restrictions on land use, has created a barrier to sustainable management of natural resources. This is because compliance with environmental laws is impaired in the absence of easily accessible and accurate information. These problems demonstrate a clear need for reform in this area. To determine how information concerning these obligations and restrictions may be most effectively managed, this thesis will apply a comparative methodology and consider three case studies, which each utilise different models for management of this information. These jurisdictions will be assessed according to a set of guidelines for comparison to identify which features of their systems provide for effective management of information concerning obligations and restrictions on title and use. Based on this comparison, this thesis will devise a series of recommendations for an effective system for the management of information concerning obligations and restrictions on land title and use, taking into account any potential legal issues and barriers to implementation. This series of recommendations for reform will be supplemented by suggested draft legislative provisions.
Resumo:
A research study was conducted in a key area of project management: stakeholder and relationship management through communication - ‘the soft skills’. It was conducted with Diploma of Project Management graduates from one Australian Registered Training Organisation (RTO), the Australian College of Project Management (ACPM). The study was designed to initially identify the qualifications and project management experience of the participants. Further, it identified the respondents’ understanding of and attitude to commonly held principles and literature within the project management field as it relates to the soft skills of projects. This is specifically connected to their project experience and knowledge, approach to project communications, and the stakeholder’s needs. Some of the literature showed that through the management and application of the project soft skills by project managers may actually be a recipe for project success. Hence, an important underpinning of this study was that the project manager can enhance project success (or reduce the impact of failure) by identifying and prioritising stakeholders, developing and implementing strategies for engaging and communicating with them. The use of a positivist approach to this research study allowed for the evaluation and understanding of respondents to the emergent theories of successful projects being delivered through the management of stakeholders, communications, and relationships. Consequently, a quantitative approach to this study was undertaken. The participants were drawn from graduates who completed (graduated) from the ACPM with the Diploma of Project Management between January 2004 and December 2007 only. A list of graduates was collated from this period indicating that a total of 656 graduates have completed and graduated with the qualification. The data collection for this study was done in one phase only. The questionnaire was emailed individually by the researcher directly to the selected potential respondents. Subsequently, a total of 44 responses were received, providing an overall response rate of 43%. Two key factors emerged from the survey questionnaire. Firstly, the need for the soft skills to be incorporated in project management curriculum and education programs, and secondly, that successful projects are delivered through the management and application of the project soft skills. It is expected that the findings of this study be provided across various forums (such as vocational education and training, and project management conferences) and via project management bodies such as the Australian Institute of Project Management (AIPM) to inform learning and provide greater insight into the soft skills of project management. It is the contention of the researcher that this quantitative study of Diploma of Project Management graduates’ views and attitudes highlights the importance of project soft skills and its importance in the delivery of successful projects as well as being part of the competencies of a successful project manager. This study also revealed the value of project experience and knowledge as it pertains to the management and application of the project soft skills.
Resumo:
Infrastructure organisations are operating in an increasingly challenging business environment as a result of globalisation, privatisation and deregulation. Under such circumstances, asset managers need to manage their infrastructure assets effectively in order to contribute to the overall performance of their organisation. In an external business environment that is constantly changing, extant literature on strategic management advocates a resourced--�]based view (RBV) approach that focuses on factors internal to the organisation such as resources and capabilities to sustain organisation performance. The aim of this study is to explore the core capabilities needed in the management of infrastructure assets. Using a multiple case study research strategy focusing on transport infrastructure, this research firstly examines the goals of infrastructure asset management and their alignment with broader corporate goals of an infrastructure organisation. It then examines the strategic infrastructure asset management processes that are needed to achieve these goals. The core capabilities that can support the strategic infrastructure asset management processes are then identified. This research produced a number of findings. First, it provided empirical evidence that asset management goals are being pursued with the aim of supporting the broader business goals of infrastructure organisations. Second, through synthesising the key asset management processes deemed necessary to achieve the asset management goals, a strategic infrastructure asset management model is proposed. Third, it identified five core capabilities namely stakeholder connectivity, cross-functional, relational, technology absorptive and integrated information management capability as central to executing the strategic infrastructure asset management processes well. These findings culminate in the development of a capability model to improve the performance of infrastructure assets.
Resumo:
Building for a sustainable environment requires sustainable infrastructure assets. Infrastructure capacity management is the process of ensuring optimal provision of such infrastructure assets. Effectiveness in this process will enable the infrastructure asset owners and its stakeholders to receive full value on their investment. Business research has shown that an organisation can only achieve business value when it has the right capabilities. This paradigm can also be applied to infrastructure capacity management. With limited access to resources, the challenge for infrastructure organisations is to identify and develop core capabilities to enable infrastructure capacity management. This chapter explores the concept of capability and identifies the core capability needed in infrastructure capacity management. Through a case study of the Port of Brisbane, this chapter shows that infrastructure organisations must develop their intelligence gathering capability to effectively manage the capacity of their infrastructure assets.
Resumo:
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.
Resumo:
Managing service quality is of primary importance for organizations that are increasingly service oriented, and offering a growing range of services to external and internal customers. Managing service quality requires the capacity to measure service quality, concomitantly requiring explicit conceptions of ‘service’ and ‘service quality’. This white-paper explores three keys areas of service and service marketing literature: service definition and conceptualisation, service classifications, and service quality models, and make the following observations and proposals.
Resumo:
Chemical and physical restraints are frequently used in the intensive care unit (ICU) to control agitated patients and to prevent self-harm and unplanned extubations. Published work relating to the numerous issues of the care and treatment strategies for these patients remains conflicting and unclear. Literature regarding sedation and chemical restraint reveals a trend towards management with lighter sedation, use of sedation assessment tools and sedation protocols. It remains unclear which treatment is best for agitated and delirious patients, and the evidence on the effect of sedation is conflicting. A large portion of the literature on the use of physical restraint is from general hospital wards and residential homes, and not from the ICU environment. The purpose of this paper is to provide a summary of the existing literature on the use of physical and chemical restraints in the ICU setting. In Part 1 of this two-part paper, the evidence on chemical and physical restraints is explored with specific focus on definition of terms, unplanned
Resumo:
An important goal of the care for the mechanically ventilated patient is to minimize patient discomfort and anxiety. This is partly achieved by frequent use of chemical and physical restraints. The majority of patients in intensive care will receive some form of sedation. The goal and use of sedation has changed considerably over the past few decades with literature evidencing trends toward overall lighter sedation levels and daily interruption of sedation. Conversely, the use of physical restraint for the ventilated patient in ICU differs considerably between nations and continents. A large portion of the literature on the use of physical restraint is from general hospital wards and residential homes, and not from the ICU environment. Recent literature suggests minimal use of physical restraint in the ICU, and that reduction programmes have been initiated. However, very few papers illuminate the patient's experience of physical and chemical restraints as a treatment strategy. In Part 1 of this two-part review, the evidence on chemical and physical restraints was explored with specific focus on definitions of terms, unplanned extubation, agitation, delirium as well as the impact of nurse–patient ratios in the ICU on these issues. This paper, Part 2, examines the evidence related to chemical and physical restraints from the mechanically ventilated patient's perspective.
Resumo:
GMPLS is a generalized form of MPLS (MultiProtocol Label Switching). MPLS is IP packet based and it uses MPLS-TE for Packet Traffic Engineering. GMPLS is extension to MPLS capabilities. It provides separation between transmission, control and management plane and network management. Control plane allows various applications like traffic engineering, service provisioning, and differentiated services. GMPLS control plane architecture includes signaling (RSVP-TE, CR-LDP) and routing (OSPF-TE, ISIS-TE) protocols. This paper provides an overview of the signaling protocols, describes their main functionalities, and provides a general evaluation of both the protocols.
Resumo:
Construction procurement organisations in the Australian framework provide broad guidelines on project management in setting benchmark performance measurements and processes for evaluating their projects. Despite this, little has been known in the project management practise in transport construction projects in Australia, in particular Queensland. Questionnaire data from 53 project management practitioners employed in State and City public sector organisations in Queensland,suggested that many practitioners in the public sector have little or a lack of understanding of government regulatory policies, which are used as economic evaluation tools for project options. Public sector project managers perceive socio-economic evaluation tools as inappropriate for public sector projects. The survey results also found conducting risk management analysis, developing a risk register and mitigation of risks were most effective way of managing risk. This study provides an opportunity for the public sector to review and provide training on project management practices and government regulatory policies governing public projects. This will improve project management practitioners’ understanding and interpretation of government regulatory policies.
Resumo:
Purpose – Building project management requires real time flow of information between all the project team members or the supply chain members. In the present scenario, when project participants are geographically separated, adoption of Information Communication Technology (ICT) enables such effective communication. But strategic adoption of ICT requires that all the supply chain members follow the accepted methods of communication or the communication protocols. The majority of the construction organizations are small and medium enterprises (SMEs). This research, therefore, proposes to focus on developing IT-enhanced communication protocols for building project management by SMEs. Design/methodology/approach – The research adopts a sequential mixed methods approach, where data collection and analysis are conducted in both the quantitative and qualitative phases of research. Findings – The protocols are proposed as a “Strategic Model for Enhancing ICT Diffusion in Building Projects”. The framework for the model is discussed at three levels of study, i.e industry, organization, and people. Practical implications – While the research was conducted in an Indian context, the research outcome is envisaged to be widely applicable in other countries with due considerations. Originality/value – The developed framework has implications for national level bodies and academic institutions, organizations, people or project managers and is applicable at the international level after due considerations.
Resumo:
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.
Resumo:
This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities of a standard wireless sensor node to provide security services such as message integrity, confidentiality, authenticity, and system integrity based on RSA public-key and XTEA-based symmetric-key cryptography. In addition trustedFleck provides secure storage of private keys and provides platform configuration registers (PCRs) to store system configurations and detect code tampering. We analyze system performance using metrics that are important for WSN applications such as computation time, memory size, energy consumption and cost. Our results show that trustedFleck significantly outperforms previous approaches (e.g., TinyECC) in terms of these metrics while providing stronger security levels. Finally, we describe a number of examples, built on trustedFleck, of symmetric key management, secure RPC, secure software update, and remote attestation.