868 resultados para Governance of security
Resumo:
L'obiettivo principale della politica di sicurezza alimentare è quello di garantire la salute dei consumatori attraverso regole e protocolli di sicurezza specifici. Al fine di rispondere ai requisiti di sicurezza alimentare e standardizzazione della qualità, nel 2002 il Parlamento Europeo e il Consiglio dell'UE (Regolamento (CE) 178/2002 (CE, 2002)), hanno cercato di uniformare concetti, principi e procedure in modo da fornire una base comune in materia di disciplina degli alimenti e mangimi provenienti da Stati membri a livello comunitario. La formalizzazione di regole e protocolli di standardizzazione dovrebbe però passare attraverso una più dettagliata e accurata comprensione ed armonizzazione delle proprietà globali (macroscopiche), pseudo-locali (mesoscopiche), ed eventualmente, locali (microscopiche) dei prodotti alimentari. L'obiettivo principale di questa tesi di dottorato è di illustrare come le tecniche computazionali possano rappresentare un valido supporto per l'analisi e ciò tramite (i) l’applicazione di protocolli e (ii) miglioramento delle tecniche ampiamente applicate. Una dimostrazione diretta delle potenzialità già offerte dagli approcci computazionali viene offerta nel primo lavoro in cui un virtual screening basato su docking è stato applicato al fine di valutare la preliminare xeno-androgenicità di alcuni contaminanti alimentari. Il secondo e terzo lavoro riguardano lo sviluppo e la convalida di nuovi descrittori chimico-fisici in un contesto 3D-QSAR. Denominata HyPhar (Hydrophobic Pharmacophore), la nuova metodologia così messa a punto è stata usata per esplorare il tema della selettività tra bersagli molecolari strutturalmente correlati e ha così dimostrato di possedere i necessari requisiti di applicabilità e adattabilità in un contesto alimentare. Nel complesso, i risultati ci permettono di essere fiduciosi nel potenziale impatto che le tecniche in silico potranno avere nella identificazione e chiarificazione di eventi molecolari implicati negli aspetti tossicologici e nutrizionali degli alimenti.
Resumo:
An expanding literature exists to suggest that the trading mechanism can influence the volatility of security returns. This study adds to this literature by examining the impact that the introduction of SETS, on the London Stock Exchange, had on the volatility of security returns. Using a Markov switching regime change model security volatility is categorized as being in a regime of either high or low volatility. It is shown that prior to the introduction of SETS securities tended to be in a low volatility regime. At the time SETS was introduced securities moved to a high volatility regime. This suggests that volatility increased when SETS was introduced.
Resumo:
This paper presents the findings of a recently completed research project. It sheds light upon the appropriate governance of inter-firm relationships, in order to achieve competitive success for the whole partnership and its individual members. An exploratory study in the German automotive industry using inductive Grounded Theory was conducted, in order to form a set of propositions that were then validated. The research has resulted in the consolidation of these propositions into a novel concept termed Collaborative Enterprise Governance, which draws on an inter-disciplinary body of knowledge. The core of the concept is a competence based contingency framework that helps enterprise managers in selecting the most appropriate governance strategy (i.e. enterprise structure) for an inter-firm relationships within automotive supply networks (i.e. enterprises), depending on various exogenous and endogenous factors.
Resumo:
There is now substantial evidence that locational and agglomeration influences can have a significant positive effect on innovation performance. Networking and boundary-spanning activities are also increasingly recognised as important contributors to innovation success. In this article we attempt to discover whether these factors are associated: in particular, is there any link between plant location, agglomeration effects and the extent of outsourcing in the innovation process? Using data for a large sample of UK and German manufacturing plants, we find that organisational and strategic factors play a much greater and more consistent role than locational influences in shaping the level of outsourcing in the innovation process. Strategic approaches to outsourcing may also benefit plants in obtaining economies of scope in the management or governance of outsourcing within the innovation process.
Resumo:
This thesis addresses the problem of information hiding in low dimensional digital data focussing on issues of privacy and security in Electronic Patient Health Records (EPHRs). The thesis proposes a new security protocol based on data hiding techniques for EPHRs. This thesis contends that embedding of sensitive patient information inside the EPHR is the most appropriate solution currently available to resolve the issues of security in EPHRs. Watermarking techniques are applied to one-dimensional time series data such as the electroencephalogram (EEG) to show that they add a level of confidence (in terms of privacy and security) in an individual’s diverse bio-profile (the digital fingerprint of an individual’s medical history), ensure belief that the data being analysed does indeed belong to the correct person, and also that it is not being accessed by unauthorised personnel. Embedding information inside single channel biomedical time series data is more difficult than the standard application for images due to the reduced redundancy. A data hiding approach which has an in built capability to protect against illegal data snooping is developed. The capability of this secure method is enhanced by embedding not just a single message but multiple messages into an example one-dimensional EEG signal. Embedding multiple messages of similar characteristics, for example identities of clinicians accessing the medical record helps in creating a log of access while embedding multiple messages of dissimilar characteristics into an EPHR enhances confidence in the use of the EPHR. The novel method of embedding multiple messages of both similar and dissimilar characteristics into a single channel EEG demonstrated in this thesis shows how this embedding of data boosts the implementation and use of the EPHR securely.
Resumo:
Adopting an institutional approach from organization studies, this paper explores the role of key actors on “purposeful governance for sustainability” (Smith, Voss et al. 2010: 444) through the case of smart metering in the UK. Institutions are enduring patterns in social life, reflected in identities, routines, rules, shared meanings and social relations, which enable, and constrain, the beliefs and behaviours of individual and collective actors within a field (Thornton and Ocasio 2008). Large-scale external initiatives designed to drive regime-level change prompt ‘institutional entrepreneurs’ to perform ‘institutional work’ – “purposive action aimed at creating, maintaining and disrupting institutions” (Lawrence and Suddaby, 2006). Organization scholars are giving increasing attention to ‘field-configuring events’ (FCEs) which provide social spaces for diverse organizational actors to come together to collectively shape socio-technical pathways (Lampel and Meyer 2008). Our starting point for this exploratory study is that FCEs can offer important insights to the dynamics, politics and governance of sustainability transitions. Methodologically, FCEs allow us to observe and “link field evolution at the macro-level with individual action at the micro-level” (Lampel and Meyer, 2008: 1025). We examine the work of actors during a series of smart metering industry forums over a three-year period (industry presentations [n= 77] and panel discussions [n= 16]). The findings reveal new insights about how institutional change unfolds, alongside technological transitions, in ways that are partial and aligned with the interests of powerful incumbents whose voices are frequently heard at FCEs. The paper offers three contributions. First, the study responds to calls for more research examining FCEs and the role they play in transforming institutional fields. Second, the emergent findings extend research on institutional work by advancing our understanding of a specific site of institutional work, namely a face-to-face inter-organizational arena. Finally, in line with the research agenda for innovation studies and sustainability transitions elaborated by Smith et al (2010), the paper illustrates how actors in a social system respond to, translate, and enact interventions designed to promote industrial transformation, ultimately shaping the sustainability transition pathway.
Resumo:
The enterprise management (EM) approach provides a holistic view of organizations and their related information systems. In order to align information technology (IT) innovation with global markets and volatile virtualization, traditional firms are seeking to reconstruct their enterprise structures alongside repositioning strategy and establish new information system (IS) architectures to transform from single autonomous entities into more open enterprises supported by new Enterprise Resource Planning (ERP) systems. This chapter shows how ERP engage-abilities cater to three distinctive EM patterns and resultant strategies. The purpose is to examine the presumptions and importance of combing ERP and inter-firm relations relying on the virtual value chain concept. From a review of the literature on ERP development and enterprise strategy, exploratory inductive research studies in Zoomlion and Lanye have been conducted. In addition, the authors propose a dynamic conceptual framework to demonstrate the adoption and governance of ERP in the three enterprise management forms and points to a new architectural type (ERPIII) for operating in the virtual enterprise paradigm. © 2012, IGI Global.
Resumo:
Purpose – The purpose of this paper is to consider hierarchical control as a mode of governance, and analyses the extent of control exhibited by central government over local government through the best value (BV) and comprehensive performance assessment (CPA) performance regimes. Design/methodology/approach – This paper utilises Ouchi's framework and, specifically, his articulation of bureaucratic or hierarchical control in the move towards achievement of organisational objectives. Hierarchical control may be inferred from the extent of “command and control” by Central Government, use of rewards and sanctions, and alignment to government priorities and discrimination of performance. Findings – CPA represents a more sophisticated performance regime than BV in the governance of local authorities by central government. In comparison to BV, CPA involved less scope for dialogue with local government prior to introduction, closer inspection of and direction of support toward poorer performing authorities, and more alignment to government priorities in the weightings attached to service blocks. Originality/value - The paper focuses upon the hierarchic/bureaucratic mode of governance as articulated by Ouchi and expands on this mode in order to analyse shifts in performance regimes in the public sector.
Resumo:
This paper introduces a joint load balancing and hotspot mitigation protocol for mobile ad-hoc network (MANET) termed by us as 'load_energy balance + hotspot mitigation protocol (LEB+HM)'. We argue that although ad-hoc wireless networks have limited network resources - bandwidth and power, prone to frequent link/node failures and have high security risk; existing ad hoc routing protocols do not put emphasis on maintaining robust link/node, efficient use of network resources and on maintaining the security of the network. Typical route selection metrics used by existing ad hoc routing protocols are shortest hop, shortest delay, and loop avoidance. These routing philosophy have the tendency to cause traffic concentration on certain regions or nodes, leading to heavy contention, congestion and resource exhaustion which in turn may result in increased end-to-end delay, packet loss and faster battery power depletion, degrading the overall performance of the network. Also in most existing on-demand ad hoc routing protocols intermediate nodes are allowed to send route reply RREP to source in response to a route request RREQ. In such situation a malicious node can send a false optimal route to the source so that data packets sent will be directed to or through it, and tamper with them as wish. It is therefore desirable to adopt routing schemes which can dynamically disperse traffic load, able to detect and remove any possible bottlenecks and provide some form of security to the network. In this paper we propose a combine adaptive load_energy balancing and hotspot mitigation scheme that aims at evenly distributing network traffic load and energy, mitigate against any possible occurrence of hotspot and provide some form of security to the network. This combine approach is expected to yield high reliability, availability and robustness, that best suits any dynamic and scalable ad hoc network environment. Dynamic source routing (DSR) was use as our underlying protocol for the implementation of our algorithm. Simulation comparison of our protocol to that of original DSR shows that our protocol has reduced node/link failure, even distribution of battery energy, and better network service efficiency.
Resumo:
Attitudes to quangos are paradoxical. On the one hand they are perceived to be undemocratic, unaccountable organisations, while on the other they are seen to improve effectiveness, limit political interference and increase public confidence in government. This paradox is reflected in the behaviour of political parties, which generally adopt a harsh line towards quangos in opposition, but come to rely on these bodies in office. Ahead of the 2010 general election it was, however, noticeable that the Conservative party rejected this dynamic by promising to pursue ‘a more sophisticated approach’. This article explores the Coalition government's subsequent ‘public bodies reform programme’, assessing its progress against recommendations contained within the Institute for Government's Read before Burning report of July 2010. It concludes that while the Coalition has addressed long-standing concerns about the day-to-day governance of public bodies, it has failed to resolve a set of broader and strategic (metagovernance) issues.
Resumo:
Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system. This paper examines the anomaly-based intrusion detection based on sequences of system calls. The point is to construct a model that describes normal or acceptable system activity using the classification trees approach. The created database is utilized as a basis for distinguishing the intrusive activity from the legal one using string metric algorithms. The major results of the implemented simulation experiments are presented and discussed as well.
Resumo:
With automotive plants being closed in Australia and western Europe, this article reflects on the employment status of ex-MG Rover (MGR) workers following the closure of the Longbridge plant in 2005. In particular, it draws on Standing's typology of labour market insecurity and uses a mixed-methods approach including an analysis of a longitudinal survey of some 200 ex-MGR workers, and in-depth interviews with ex-workers and policy-makers. While the policy response to the closure saw significant successes in terms of the great majority of workers successfully adjusting into re-employment, and with positive findings in terms of re-training and education, the paper finds significant challenges in terms of security of employment, income, job quality and representation at work years after closure. In particular, the paper posits that the general lack of attention to employment security at the macrolevel effectively undermined elements of a positive policy response over the longer run. This in turn suggests longer-term policy measures are required to address aspects of precariousness at work.
Resumo:
The enterprise management (EM) approach provides a holistic view of organizations and their related information systems. In order to align information technology (IT) innovation with global markets and volatile virtualization, traditional firms are seeking to reconstruct their enterprise structures alongside repositioning strategy and establish new information system (IS) architectures to transform from single autonomous entities into more open enterprises supported by new Enterprise Resource Planning (ERP) systems. This chapter shows how ERP engage-abilities cater to three distinctive EM patterns and resultant strategies. The purpose is to examine the presumptions and importance of combing ERP and inter-firm relations relying on the virtual value chain concept. From a review of the literature on ERP development and enterprise strategy, exploratory inductive research studies in Zoomlion and Lanye have been conducted. In addition, the authors propose a dynamic conceptual framework to demonstrate the adoption and governance of ERP in the three enterprise management forms and points to a new architectural type (ERPIII) for operating in the virtual enterprise paradigm.
Resumo:
In the global Internet economy, e-business as a driving force to redefine business models and operational processes is posing new challenges for traditional organizational structures and information system (IS) architectures. These are showing promises of a renewed period of innovative thinking in e-business strategies with new enterprise paradigms and different Enterprise Resource Planning (ERP) systems. In this chapter, the authors consider and investigate how dynamic e-business strategies, as the next evolutionary generation of e-business, can be realized through newly diverse enterprise structures supported by ERP, ERPII and so-called "ERPIII" solutions relying on the virtual value chain concept. Exploratory inductive multi-case studies in manufacturing and printing industries have been conducted. Additionally, it proposes a conceptual framework to discuss the adoption and governance of ERP systems within the context of three enterprise forms for enabling dynamic and collaborative e-business strategies, and particularly demonstrate how an enterprise can dynamically migrate from its current position to the patterns it desires to occupy in the future - a migration that must and will include dynamic e-business as a core competency, but that also relies heavily on ERP-based backbone and other robust technological platform and applications.