98,794 research outputs found

    Reve\{a,i\}ling the risks: a phenomenology of information security

    Get PDF
    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we distinguish between revealed and reveiled security instead. Linking these notions with the concepts of confidence and trust, we are able to give a phenomenological explanation of the electronic voting controversy in the Netherlands

    Alcohol, assault and licensed premises in inner-city areas

    Get PDF
    This report contains eight linked feasibility studies conducted in Cairns during 2010. These exploratory studies examine the complex challenges of compiling and sharing information about incidents of person-to-person violence in a late night entertainment precinct (LNEP). The challenges were methodological as well as logistical and ethical. The studies look at how information can be usefully shared, while preserving the confidentiality of those involved. They also examine how information can be compiled from routinely collected sources with little or no additional resources, and then shared by the agencies that are providing and using the information.Although the studies are linked, they are also stand-alone and so can be published in peer-reviewed literature. Some have already been published, or are ‘in press’ or have been submitted for review. Others require the NDLERF board’s permission to be published as they include data related more directly to policing, or they include information provided by police.The studies are incorporated into the document under section headings. In each section, they are introduced and then presented in their final draft form. The final published form of each paper, however, is likely to be different from the draft because of journal and reviewer requirements. The content, results and implications of each study are discussed in summaries included in each section.Funded by the National Drug Law Enforcement Research Fund, an initiative of the National Drug StrategyAlan R Clough (PhD) School of Public Health, Tropical Medicine and Rehabilitation Sciences James Cook UniversityCharmaine S Hayes-Jonkers (BPsy, BSocSci (Hon1)) James Cook University, Cairns.Edward S Pointing (BPsych) James Cook University, Cairns

    Legitimacy strategies in the annual reports - what turn to social responsibility in post-privatization context

    Get PDF
    The present paper offers a narrative of the attempts of the privatized Romanian oil-company Petrom to assert its legitimacy in an environment characterized by global insecurity of the energy industry, instability of the political regime in Romania and an intensified all-levels fight with corruption, imposed by the EU integration process. The main interest was therefore to see how the changing environment and the need for legitimacy are affecting the financial communication of the company through the corporate annual reports. The case study is based on the content analysis of three consecutive post-privatization annual reports, explored in close connection with the changes in the social and political context.legitimacy; corporate social responsibility; stakeholders; corporate communication; privatization

    Semantics for incident identification and resolution reports

    Get PDF
    In order to achieve a safe and systematic treatment of security protocols, organizations release a number of technical briefings describing how to detect and manage security incidents. A critical issue is that this document set may suffer from semantic deficiencies, mainly due to ambiguity or different granularity levels of description and analysis. An approach to face this problem is the use of semantic methodologies in order to provide better Knowledge Externalization from incident protocols management. In this article, we propose a method based on semantic techniques for both, analyzing and specifying (meta)security requirements on protocols used for solving security incidents. This would allow specialist getting better documentation on their intangible knowledge about them.Ministerio de Economía y Competitividad TIN2013-41086-

    Dimensions of global food systems: addressing food security on a world stage

    Get PDF
    In 2007/8 I conducted interviews with government officials and representatives of international donor agencies in Malawi and Lesotho, two countries in which ‘food insecurity’ has dominated policy discourse. The approaches of the two governments and the stance of the donors differed strikingly. Briefly, Lesotho’s Ministry of Agriculture and Food Security was promoting the idea of ‘block farming’ in which more innovative, commercially-oriented farmers would rent land directly from their neighbours or engage in business partnerships to create larger holdings, and attract outside investment. This plan reflected the government’s belief in the efficiency of large scale production and populist attachment to the symbolism of increasing domestic production to reduce reliance on imported food. The donor community, notably DFID, opposed the approach, prioritising the ‘food security’ side of the ‘agriculture and food security’ policy. They insisted that investment in grain production in Lesotho could not be economically viable, particularly given the country’s membership of a customs union with neighbouring South Africa where food was produced vastly more efficiently. Instead, drawing on Sen’s (1981) entitlements approach, they argued that the problem of food insecurity in Lesotho related to the inability of the poor to purchase food, and pushed for a broader focus on enhancing livelihoods

    Back to the Future: A Century of Compensation

    Get PDF
    What were the hot compensation issues and practices over the past century? Does history offer any lessons that may inform our compensation decisions in the future? To answer these questions, we reviewed newspapers and business publications from the past 100 years. To highlight changes in compensation systems during that time, we selected four topics to examine in detail in this paper: compensation\u27s role in the changing nature of the deal; the evolution of pay-for-performance; the emergence of benefits; and the bellwethers of compensation systems. Four lessons for the future are drawn. These include: End the search for the one right compensation strategy; Understand what in the context matters; Continue pragmatic experimentation, and Support continuous learning about compensation. Readers are invited to delve into the history of compensation to discover what they take away for the future

    Digital Expungement

    Get PDF
    Digital technology might lead to the extinction of criminal rehabilitation. In the digital era, criminal history records that were expunged by the state remain widely available through commercial vendors (data brokers) who sell this information to interested parties, or simply through a basic search of the Internet. The wide availability of information on expunged criminal history records increases the collateral consequences a criminal record entails, thereby eliminating the possibility of reintegration into society. Acknowledging the social importance of rehabilitation, policymakers attempted to regulate the practices of data brokers by imposing various legal obligations and restrictions, usually relating to the nature and accuracy of criminal records and the purposes for which they may be used. These regulations have been proven insufficient to ensure rehabilitation. But regardless of future outcomes of such regulatory attempts, policymakers have largely overlooked the risks of the Internet to expungement. Many online service providers and hosting services enable the wide dissemination and accessibility of criminal history records that were expunged. Legal research websites, websites that publish booking photographs taken during investigation (mugshots), social media platforms, and media archives all offer access to expunged criminal histories, many times without charge, and all with the simple use of a search engine. Without legal intervention, rehabilitation in the digital age in the U.S. has become nearly impossible. This Article offers a legal framework for reducing the collateral consequences of expunged criminal records by offering to re-conceptualize the public nature of criminal records. It proceeds as follows. After an introduction, Part II examines rehabilitation and expungement as facets of criminal law. Part III explores the challenges of digital technology to rehabilitation measures. Part IV evaluates and discusses potential ex-ante and ex-post measures that could potentially enable rehabilitation in the digital age. It argues that while ex-post measures are both unconstitutional and unrealistic for enabling digital expungement, ex-ante measures could be a viable solution. Accordingly, this Article suggests implanting a graduated approach towards the public nature of criminal history records, which would be narrowly tailored to serve the interests of rehabilitation-by-expungement. Finally, the last Part concludes the discussion and warns against reluctance in regulating expunged criminal histories

    Fearsquare: hacking open crime data to critique, jam and subvert the 'aesthetic of danger'

    Get PDF
    We present a critical evaluation of a locative media application, Fearsquare, which provocatively invites users to engage with personally contextualized risk information drawn from the UK open data crime maps cross-referenced with geo-located user check-ins on Foursquare. Our analysis of user data and a corpus of #Fearsquare discourse on Twitter revealed three cogent appraisals ('Affect', 'Technical' and 'Critical') reflecting the salient associations and aesthetics that were made between different components of the application and interwoven issues of technology, risk, danger, emotion by users. We discuss how the varying strength and cogency of these public responses to Fearsquare call for a broader imagining and analysis of how risk and danger are interpreted; and conclude how our findings reveal important challenges for researchers and designers wishing to engage in projects that involve the computer-mediated communication of risk
    corecore