732 resultados para Interorganizational trust
Resumo:
Hong Kong has been one of the early jurisdictions to adopt Public Private Partnership (PPP) model for delivering large public infrastructure projects. The development of this procurement approach in Hong Kong has followed an intricate path. As such, it is believed that there are a number of areas which are interesting to unveil. As part of a comprehensive research study looking at implementing PPPs, interviews with experienced local industrial practitioners from the public sector were conducted to realize their perspective on the topic of procuring public works projects. Amongst these interviews, fourteen were launched government officials and advisers. The interview findings show that the majority of the Hong Kong and Australian interviewees had previously conducted some kind of research in the field of PPP. Both groups of interviewees agreed that “PPPs gain private sector’s added efficiency/expertise/management skills” when compared to projects procured traditionally. Also, both groups of interviewees felt that projects best suited to use PPP are those that have an “Economic business case”. The interviewees believed that “Contractor’s performance” could be used as key performance indicators for PPP projects. A large number of critical success factors were identified by the interviewees for PPP projects; two of these were similar for both groups of interviewees. These included “Project objectives well defined” and “Partnership spirit/commitment/trust”. Finally it was found that in-house guidance materials were more common in the organizations of the Australian interviewees compared to the Hong Kong ones. This paper studies the views of the public sector towards the topic of PPPs in Hong Kong and Australia, which helps to answer some of the queries that both academics and the private sector in these jurisdictions are keen to know. As a result the private sector can be more prepared when negotiating with the public sector and realise their needs better, academics on the other hand are provided a wider perspective of this topic benefiting the research industry at large.
Resumo:
Quote from Postgraduate Bronwyn Fredericks about postgraduate studies
Resumo:
Since 1986 Vietnam has been engaged in the transition from a centrally-controlled economy to a socialist-oriented market economy (the 'doi moi' renovation). The process for global economic integration has been slow given the magnitude of necessary reforms. Consequently technology entrepreneurs often discount Vietnam as a possible commercialization base which means that it is not realising its economic potential as a hub of technology transfer in the Asia-Pacific region. Three significant factors in the current uncertainty are Vietnam's laws on competition, intellectual property and technology transfer. Another problem is the lack of literature on these laws. This article first discusses the conceptual relationship between competition, intellectual property and technology transfer. Hopefully the article will provide some guidance for the technology entrepreneur considering foreign direct investment (FDI) in Vietnam. The bottom line is that these laws still need further reform to bolster entrepreneurial confidence.
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.
Resumo:
Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.
Resumo:
This paper proposes a security architecture for the basic cross indexing systems emerging as foundational structures in current health information systems. In these systems unique identifiers are issued to healthcare providers and consumers. In most cases, such numbering schemes are national in scope and must therefore necessarily be used via an indexing system to identify records contained in pre-existing local, regional or national health information systems. Most large scale electronic health record systems envisage that such correlation between national healthcare identifiers and pre-existing identifiers will be performed by some centrally administered cross referencing, or index system. This paper is concerned with the security architecture for such indexing servers and the manner in which they interface with pre-existing health systems (including both workstations and servers). The paper proposes two required structures to achieve the goal of a national scale, and secure exchange of electronic health information, including: (a) the employment of high trust computer systems to perform an indexing function, and (b) the development and deployment of an appropriate high trust interface module, a Healthcare Interface Processor (HIP), to be integrated into the connected workstations or servers of healthcare service providers. This proposed architecture is specifically oriented toward requirements identified in the Connectivity Architecture for Australia’s e-health scheme as outlined by NEHTA and the national e-health strategy released by the Australian Health Ministers.
Resumo:
Aim: Worldwide, injury is the leading cause of death and disability for young people. Injuries among young people are commonly associated with risk taking behaviour, including violence and transport risks, which often occur in the context of alcohol use. The school environment has been identified as having a significant role in shaping adolescent behaviour. In particular, school connectedness, the degree to which adolescents feel that they belong and are accepted at school, has been shown to be an important protective factor. Strategies for increasing school connectedness may therefore be effective in reducing risk taking and associated injury. Prior to developing connectedness strategies, it is important to understand the perspectives of those in the school regarding the construct and how it is realised in the school context. The aim of this research was to understand teachers’ perspectives of school connectedness, the strategies they employ to connect with students, and their perceptions of school connectedness as a strategy for risk taking and injury prevention. Method: In depth interviews of approximately 45 minutes duration were conducted with 13 Health and PE teachers and support staff from 2 high schools in Southeast Queensland, Australia. Additionally, 6 focus group workshop discussions were held with 35 Education department employees (5-6 per group), including teachers from 15 Southeast Queensland high schools. Results: Participants were found to place strong importance on the development of connectedness among students, including those at risk for problem behaviour. Strategies used to promote connectedness included building trust, taking an interest in each student and being available to talk to, and finding something positive for students to succeed at. Teachers identified strategies as being related to decreased risk taking behavior. Teacher training on school connectedness was perceived as an important and useful inclusion in a school based injury prevention program. Conclusions: The established link between increased school connectedness and decreased problem behaviour has implications for school based strategies designed to decrease adolescent risk taking behaviour and associated injury. Targeting school connectedness as a point of intervention, in conjunction with individual attitude and behaviour change programs, may be an effective injury prevention strategy.
Resumo:
Clients with acquired brain injury often demonstrate hypertonicity and decreased function in their upper limbs, requiring appropriate intervention. Splinting is one of the intervention methods that is widely used to address these issues. Literature shows that some clients are not using splints following fabrication. However, there is a paucity of research about the factors that influence clients to use or not use splints. This study aims to investigate these influential factors for clients with upper limb hypertonicity. Two survey tools including therapist and client questionnaires were developed and completed by both therapists and clients. Six therapists and 14 clients participated in this study and completed the relevant questionnaires. The results illustrate that most clients (13 out of 14) were continuing to use their splints four weeks following discharge from hospital. The main goals of choosing splints for both therapists and clients were prevention of contracture and deformity. The most indicated client reasons for adhering to the splint wearing program were therapist-related factors including clients’ trust and reliance on their therapists. Further reasons for clients implementing the recommended splint-wearing program and clinical implications are discussed.
Resumo:
The present paper examines whether the potential advantages of the expanding practice of web-based public participation only complement the benefits of the traditional techniques, or are empowering enough to replace them. The question is examined in a real-world case of neighbourhood revitalization, in which both techniques were practiced simultaneously. Comparisons are made at four major planning junctions, in order to study the contributions of each technique to the qualities of involvement, trust, and empowerment. The results show that web-based participants not only differ from the participants of traditional practices, but they also differ from each other on the basis of their type of web participation. The results indicate that web-based participation is an effective and affective complementary means of public participation, but it cannot replace the traditional unmediated techniques.
Resumo:
This paper investigates whether Socially Responsible Investment (SRI) is more or less sensitive to market downturns than conventional investment, and examines the legal implications for fund managers and trustees. Using a market model methodology, we find that over the past 15 years, the beta risk of SRI, both in Australia and internationally, increased more than that of conventional investment during economic downturns. This implies that companies acting as fund trustees, managed investment schemes and traditional institutional fund managers risk breaching their fiduciary or statutory duties if they go long - or remain long - in SRI funds during market downturns, unless perhaps relevant legislation is reformed. If reform is viewed as desirable, possible reforms could include explicitly overriding the common law to allow all traditional funds to invest in SRI; granting immunity to directors of trustee companies from potential personal liability under sections 197 or 588G et seq of the Corporations Act; allowing companies acting as trustees, managed investment schemes and traditional institutional fund managers and trustees to invest in SRI without triggering a substantial capital gains tax liability through trust resettlement; tax concessions for SRI (eg. introducing a 150% tax deduction or investment allowance for SRI); and allowing SRI sub-funds to obtain “deductible gift recipient” status or the equivalent from relevant taxation authorities. The research is important and original insofar as the assessment of risk in SRIs during market downturns is an area which has hitherto not been subjected to rigorous empirical investigation, despite its serious legal implications.
Resumo:
Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.