903 resultados para Security framework
Resumo:
For Design Science Research (DSR) to gain wide credence as a research paradigm in Information Systems (IS), it must contribute to theory. “Theory cannot be improved until we improve the theorizing process, and we cannot improve the theorizing process until we describe it more explicitly, operate it more self-consciously, and decouple it from validation more deliberately” (Weick 1989, p. 516). With the aim of improved design science theorizing, we propose a DSR abstraction-layers framework that integrates, interlates, and harmonizes key methodological notions, primary of which are: 1) the Design Science (DS), Design Research (DR), and Routine Design (RD) distinction (Winter 2008); 2) Multi Grounding in IS Design Theory (ISDT) (Goldkuhl & Lind 2010); 3) the Idealized Model for Theory Development (IM4TD) (Fischer & Gregor 2011); and 4) the DSR Theorizing Framework (Lee et al. 2011). Though theorizing, or the abstraction process, has been the subject of healthy discussion in DSR, important questions remain. With most attention to date having focused on theorizing for Design Research (DR), a key stimulus of the layered view was the realization that Design Science (DS) produces abstract knowledge at a higher level of generality. The resultant framework includes four abstraction layers: (i) Design Research (DR) 1st Abstract Layer, (ii) Design Science (DS) 2nd Abstract Layer, (iii) DSR Incubation 3rd Layer, and (iv) Routine Design 4th Layer. Differentiating and inter-relating these layers will aid DSR researchers to discover, position, and amplify their DSR contributions. Additionally, consideration of the four layers can trigger creative perspectives that suggest unplanned outputs. The first abstraction layer, including its alternative patterns of activity, is well recognized in the literature. The other layers, however, are less well recognized; and the integrated representation of layers is novel.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.
Resumo:
Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced.
Resumo:
In a post-disaster environment, housing reconstruction projects frequently face enormous difficulties due to the various, often apparently ill-considered, internal and external factors. Non-Governmental Organisations (NGOs) operating in post-disaster settings such as in Afghanistan continue to face blame over the failure of reconstruction projects, and worse, they are sometimes even viewed as being corrupt entities. While it is not always possible for NGOs to eliminate or reduce the impact of factors that are outside their control, they certainly can increase the chances of project success by placing considerable emphasis on working more effectively with the affected communities. To achieve maximum community participation in reconstruction projects , this research develops a specific logical framework to guide the process of community participation in post-disaster housing reconstruction in Afghanistan.
Resumo:
Three proof requirements as essential for a sustainable land registration system. These were proof of identity, proof of ownership, and authority to deal. Our attention in this paper is drawn to the latter two requirements and will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to proof of ownership and authority to deal. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years.
Resumo:
Although they sit outside the formal education sector, libraries are intrinsically centres of learning where people can engage with knowledge and ideas and acquire the literacy skills that are essential for active participation in an increasingly digital society. In Australia, National and State Libraries Australasia (NSLA) has acknowledged the need to not only better understand the general concept of the library as a learning institution, but also to help the individual NSLA libraries specifically identify their capabilities in this arena. The NSLA Literacy and Learning project aimed to improve the members' organisational comprehension and practice as learning institutions and to help them conceptualise their ability to deliver literacy and learning programmes that will benefit their staff and their communities. The NSLA concept of learning institution encompassed two discrete lenses: the internal lens of the library's own organisational understanding and practice, and the external lens of the clients who engage in the literacy and learning programmes delivered by the library. The ultimate goal was to develop a matrix which could enable libraries to assess their perceived levels of maturity as learning institutions along a continuum of emerging to active capabilities. The matrix should also serve as a tool for shared understanding about the NSLA's own strategic directions in the literacy and learning space. This case study documents the evolving process of developing a learning institution maturity framework for libraries that considers individual, team and organisational learning, as well as clients' interactions with the organisation, with the goal of producing a framework that has the potential to measure the value of learning and growth in both the library's staff and the library's communities
Resumo:
Three initiatives with respect to water reporting in the mining sector are compared in this paper to understand the quantities that are asked for by each initiative and the guidelines of those initiatives through means of a case study. The Global Reporting Initiative (GRI) was chosen because it has achieved widespread acceptance amongst mining companies and its water-related indicators are widely reported in corporate sustainability reporting. In contrast, the Water Footprint Network, which has been an important initiative in food and agricultural industries, has had low acceptance in the mining industry. The third initiative is the Water Accounting Framework, a collaboration between The Minerals Council of Australia and the Sustainable Minerals Institute of the University of Queensland. A water account had previously been created according to the Water Accounting Framework for the case study site, an open pit coal mine in the Bowen Basin. The resulting account provided consistent data for the Global Reporting Initiative (GRI) and the Water Footprint attributable to mining but in particular, a deficiency in the GRI indicator of EN10 reuse and recycling efficiency was illustrated quantitatively. This has far-reaching significance due to the widespread use of GRI indicators in mining corporate reports.
Resumo:
The Association of South East Asian Nations (ASEAN) Secretariat and its member states have repeatedly professed their commitment to the protection and advancement of women’s economic and human rights. Such commitments have included the Declaration on the Advancement of Women in ASEAN in 1988, the ASEAN Declaration on the Elimination of Violence Against Women in 2004, and the ASEAN Declaration of Human Rights in 2012, as well as the establishment of the ASEAN Committee on Women in 2002 and the ASEAN Commission on the Promotion and Protection of Women and Children in 2009. However, none of these regional commitments or institutions expressly take up the core concern of the Women, Peace and Security (WPS) agenda set out in United Nations Security Council (UNSC) Resolution 1325 in 2000. ASEAN has no 1325 regional action plan and amongst the ASEAN membership, the Philippines is the only state that has adopted a 1325 National Action Plan (NAP). We explore the possible reasons for lack of ASEAN institutional engagement with 1325, outline the case for regional engagement, and suggest specific roles for ASEAN Secretariat, donor governments and individual member states to commit to UNSCR 1325 as a regional priority.
Resumo:
In response to the rail industry lacking a consistently accepted standard of minimal training to perform incident investigations, the Australasian rail industry requested the development of a unified approach to investigator training. This paper details how the findings from a training needs analysis were applied to inform the development of a standardised training package for rail incident investigators. Data from job descriptions, training documents and subject matter experts sourced from 17 Australasian organisations were analysed and refined to yield a draft set of 10 critical competencies. Finally the draft of critical competencies was reviewed by industry experts to verify the accuracy and completeness of the competency list and to consider the most appropriate level of qualification for training development. The competencies identified and the processes described to translate research into an applied training framework in this paper, can be generalised to assist practitioners and researchers in developing industry approved standardised training packages.
Resumo:
In 2012, the Bureau of Meteorology under the banner of the Water Accounting Standards Board released the Australian Water Accounting Standard 1 (AWAS 1). This standard has been in development since 2007 with key milestones being the release of the Preliminary Australian Water Accounting Standard in 2009, and the exposure draft of the Australian Water Accounting Standard in 2010. Throughout this period, the Minerals Council of Australia’s Water Accounting Framework has developed concurrently with the Australian standards and the standards have informed elements of the framework. However, the framework is not identical to the standard as the objectives between the two are different. The objective of the Water Accounting Framework is to create consistency in water reporting of the minerals industry and to assist companies reporting to corporate sustainability initiatives. The objective of AWAS 1 is to provide information to water management bodies to facilitate decisions about the allocation of water resources. Companies are to report on an annual basis, not only physical flows of water but contractual requirements to supply and obtain water, regardless of whether the transaction has been fulfilled in the reporting period. In contrast, the Water Accounting Framework only reports on flows that have physically happened. The paper will provide summary information on aspects of AWAS 1 that are most relevant to the minerals industry, show the alignment and differences between AWAS 1 and the Water Accounting Framework and explain how to obtain the information for the AWAS 1 reporting statements.
Resumo:
The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. This volume addresses the issues that are at stake in this dual process of political closure, and therefore rethinks how states can respond to terrorist threats. The contributors range from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.
Resumo:
Pandemics are for the most part disease outbreaks that become widespread as a result of the spread of human-to-human infection. Beyond the debilitating, sometimes fatal, consequences for those directly affected, pandemics have a range of negative social, economic and political consequences. These tend to be greater where the pandemic is a novel pathogen, has a high mortality and/or hospitalization rate and is easily spread. According to Lee Jong-wook, former Director-General of the World Health Organization (WHO), pandemics do not respect international borders. Therefore, they have the potential to weaken many societies, political systems and economies simultaneously.
Resumo:
Water reporting is becoming increasingly common amongst minerals companies. The Minerals Council of Australia’s (MCA) Water Accounting Framework (WAF), co-developed by the Centre for Water in the Minerals Industry (CWiMI), provides a standard set of terms for water reporting. The WAF was established due to the need of the minerals industry to report on its water management consistently, rather than report using company-specific terms which can cause confusion and makes company comparisons impossible. The WAF consists of two models: The Input-Output Model, which represents interactions between a site and its surrounding community and environment, and the Operational Model, which represents the interactions within a site.
Resumo:
This paper provides a three-layered framework to monitor the positioning performance requirements of Real-time Relative Positioning (RRP) systems of the Cooperative Intelligent Transport Systems (C-ITS) that support Cooperative Collision Warning (CCW) applications. These applications exploit state data of surrounding vehicles obtained solely from the Global Positioning System (GPS) and Dedicated Short-Range Communications (DSRC) units without using other sensors. To this end, the paper argues the need for the GPS/DSRC-based RRP systems to have an autonomous monitoring mechanism, since the operation of CCW applications is meant to augment safety on roads. The advantages of autonomous integrity monitoring are essential and integral to any safety-of-life system. The autonomous integrity monitoring framework proposed necessitates the RRP systems to detect/predict the unavailability of their sub-systems and of the integrity monitoring module itself, and, if available, to account for effects of data link delays and breakages of DSRC links, as well as of faulty measurement sources of GPS and/or integrated augmentation positioning systems, before the information used for safety warnings/alarms becomes unavailable, unreliable, inaccurate or misleading. Hence, a monitoring framework using a tight integration and correlation approach is proposed for instantaneous reliability assessment of the RRP systems. Ultimately, using the proposed framework, the RRP systems will provide timely alerts to users when the RRP solutions cannot be trusted or used for the intended operation.