1000 resultados para security outsourcing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mass media representations foster a view that the "War on Terror" is taking place both everywhere and nowhere, presenting Western governments with an opportunity to mobilize public support in new and ubiquitous ways. Starting with Virilio's critique of technology, speed, and de-territorialization, this article discusses the ways in which mass support is mobilized by the state in conventional pursuit of geopolitical objectives. Drawing on  contemporary international relations theory, the authors introduce the concept of "securitization" and discuss how war coverage in cyberspace has been used to securitize international threats, such as "global terrorism," to justify state intervention, including war. It is concluded that one of the paradoxes of war coverage in cyberspace is that whereas cyber-technologies should democratize the politics of war by liberating access to information about war, the state has coopted information and communication technologies to facilitate new forms of mass mobilization for war itself.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure management of Australia's commercial critical infrastructure presents ongoing challenges to owners and the government. Currently a high-level iriformation sharing collaboration between the government and business manages complex security issues, but critical irifrastructure protection also lacks a scalable model exhibiting the overall structure of critical infrastructure at various levels, sectors and sub-sectors. This research builds on the work of Marasea and Warren (2003) to establish a representative model of Australia's critical irifrastructure; discusses the boundaries between critical infrastructures, and considers the existence andpotential irifluence ofcritical irifrastructure relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the conversion of paper health records to electronic health records, the health care sector is increasingly relying on technology to maintain the integrity of and update patients’ data. This reliance on technology requires an acute level of protection from technological disasters and/or threats of human error or sabotage. Research has shown there are inadequacies in the installation and use of security controls for health information records and that current methods of security analysis lack the techniques to analyse the technical and social aspects of security. This paper reports on progress towards development of a health information security evaluation methodology based on Unified Modelling Language techniques, and discusses an imminent case study that will be used for validation of the methodology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite recent advances in the area of humanitarian responses and the publication and dissemination of various guidelines with regard to nutritional interventions, there is, however a paucity of studies which have examined the human right to food in complex emergencies. 186 countries including those affected by both human made and natural disasters and countries who are donors of humanitarian relief aid adopted the Rome Declaration on Food Security and World Summit plan of Action reaffirming “ the right to adequate food and the fundamental right of everyone to be free from hunger”. The human right to adequate and nutritious food in refugee settings implies that every refugee has physical and economic access to sufficient food to provide the necessary nutrients for effective physical and physiological functions and achieve well being. There are many grounds for believing that the current humanitarian responses to disasters more often violate than respect the human right to adequate and nutritious food. Using elements of household food security as our working framework this paper focuses on the complex ethical and moral questions raised by the conventional humanitarian assistance framework and in particular the issue of human right to food and household food security in refugee settings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The trend away from full-time permanent employment raises questions about the relevance of traditional approaches to managing and compensating employees. Employment in the Australian building industry is characterised by short-term, project-based employment. Employers and unions in the industry have adopted alternative compensation models to accommodate the short-term nature of employment, most notably through portable benefit schemes. In 1997, the Victorian building industry extended the range of portable benefits to include sick leave. Empirical evidence suggests a relationship between employee absence behaviour and accrual entitlement models. Research reported here supports this link, and suggests that both employers and employees can benefit from an alternative, portable, approach to accrued entitlements. Employers can benefit because employees may be less likely to take an instrumental approach to their entitlements. Employees benefit because they are able to accrue entitlements for the period they remain in the building industry, irrespective of the extent to which they change jobs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

E-commerce security is a complex issue; it is concerned with a number of security risks that can appear at either a technical level or organisational level. This paper uses a systemic framework, the viable system model (VSM) to determine the high level security risks and then uses baseline security methods to determine the lower level security risks.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of participational approaches to system design has been debated for a number of years. Within this paper we describe a method that was used to effectively design information systems and implement computer security countermeasures within an health care environment and shown how it was used in a number of environments.

Relevância:

20.00% 20.00%

Publicador: