14,418 research outputs found

    Meliorating women's representation within leadership positions in the UK construction industry

    Get PDF
    The construction industry in the North West of England is one of the region's largest industries and fundamental to all other economic activities. However, a scarcity of women in leadership positions in construction has persisted despite their increasing numbers in construction training. The lack of women leaders in construction has been a concern for many years, attracting government and industry wide attention. This issue has been made more prominent recently due to the potential managerial skills shortage facing the industry. Hence, a research project was carried out in order to study the underlying reasons for the scarcity of women in leadership positions in the construction industry, and to discover ways to improve the current position of women leaders in construction, with a particular emphasis on the North West of England.The research project conducted both critical literature review and case studies in order to understand the role of female leaders, the barriers faced by women in leadership positions, the present status of organisational policies and facilities and their suggestions for further improvement in construction and to provide effective practice guidelines. This paper presents the overall findings from this project and the recommendations to improve the current position of women leaders in construction. Although, the recommendations to organisations are mainly focusing on developing women leaders it recognises the importance of gender mainstreaming to facilitate all employees? career within the organisatio

    Constructing women leaders

    Get PDF

    AN OBLIGATION MODEL FOR USAGE CONTROL

    Get PDF
    ABSTRACT How to control the access and usage of digital resources is one of the most important issues in computer security nowadays. Among them, how to control the resources when they have been passed to the client-side is a research hot spot. The Usage Control Model (UCON) has been proposed to solve this problem. In this research, we focus on one core component of the UCON model, the obligation. We propose a new obligation model to solve the problems the current ones can not deal with, especially for post-obligation. We also offer two testing scenarios, propose an architecture for a prototype based on the proposed model and apply the scenarios to the prototype architecture for proof-of-concept

    Access Control Within MQTT-based IoT environments

    Get PDF
    IoT applications, which allow devices, companies, and users to join the IoT ecosystems, are growing in popularity since they increase our lifestyle quality day by day. However, due to the personal nature of the managed data, numerous IoT applications represent a potential threat to user privacy and data confidentiality. Insufficient security protection mechanisms in IoT applications can cause unauthorized users to access data. To solve this security issue, the access control systems, which guarantee only authorized entities to access the resources, are proposed in academic and industrial environments. The main purpose of access control systems is to determine who can access specific resources under which circumstances via the access control policies. An access control model encapsulates the defined set of access control policies. Access control models have been proposed also for IoT environments to protect resources from unauthorized users. Among the existing solutions, the proposals which are based on Attribute-Based Access Control (ABAC) model, have been widely adopted in the last years. In the ABAC model, authorizations are determined by evaluating attributes associated with the subject, object, and environmental properties. ABAC model provides outstanding flexibility and supports fine-grained, context-based access control policies. These characteristics perfectly fit the IoT environments. In this thesis, we employ ABAC to regulate the reception and the publishing of messages exchanged within MQTT-based IoT environments. MQTT is a standard application layer protocol that enables the communication of IoT devices. Even though the current access control systems tailored for IoT environments in the literature handle data sharing among the IoT devices by employing various access control models and mechanisms to address the challenges that have been faced in IoT environments, surprisingly two research challenges have still not been sufficiently examined. The first challenge that we want to address in this thesis is to regulate data sharing among interconnected IoT environments. In interconnected IoT environments, data exchange is carried out by devices connected to different environments. The majority of proposed access control frameworks in the literature aimed at regulating the access to data generated and exchanged within a single IoT environment by adopting centralized enforcement mechanisms. However, currently, most of the IoT applications rely on IoT devices and services distributed in multiple IoT environments to satisfy users’ demands and improve their functionalities. The second challenge that we want to address in this thesis is to regulate data sharing within an IoT environment under ordinary and emergency situations. Recent emergencies, such as the COVID-19 pandemic, have shown that proper emergency management should provide data sharing during an emergency situation to monitor and possibly mitigate the effect of the emergency situation. IoT technologies provide valid support to the development of efficient data sharing and analysis services and appear well suited for building emergency management applications. Additionally, IoT has magnified the possibility of acquiring data from different sensors and employing these data to detect and manage emergencies. An emergency management application in an IoT environment should be complemented with a proper access control approach to control data sharing against unauthorized access. In this thesis, we do a step to address two open research challenges related to data protection in IoT environments which are briefly introduced above. To address these challenges, we propose two access control frameworks rely on ABAC model: the first one regulates data sharing among interconnected MQTT-based IoT environments, whereas the second one regulates data sharing within MQTT-based IoT environment during ordinary and emergency situations.IoT applications, which allow devices, companies, and users to join the IoT ecosystems, are growing in popularity since they increase our lifestyle quality day by day. However, due to the personal nature of the managed data, numerous IoT applications represent a potential threat to user privacy and data confidentiality. Insufficient security protection mechanisms in IoT applications can cause unauthorized users to access data. To solve this security issue, the access control systems, which guarantee only authorized entities to access the resources, are proposed in academic and industrial environments. The main purpose of access control systems is to determine who can access specific resources under which circumstances via the access control policies. An access control model encapsulates the defined set of access control policies. Access control models have been proposed also for IoT environments to protect resources from unauthorized users. Among the existing solutions, the proposals which are based on Attribute-Based Access Control (ABAC) model, have been widely adopted in the last years. In the ABAC model, authorizations are determined by evaluating attributes associated with the subject, object, and environmental properties. ABAC model provides outstanding flexibility and supports fine-grained, context-based access control policies. These characteristics perfectly fit the IoT environments. In this thesis, we employ ABAC to regulate the reception and the publishing of messages exchanged within MQTT-based IoT environments. MQTT is a standard application layer protocol that enables the communication of IoT devices. Even though the current access control systems tailored for IoT environments in the literature handle data sharing among the IoT devices by employing various access control models and mechanisms to address the challenges that have been faced in IoT environments, surprisingly two research challenges have still not been sufficiently examined. The first challenge that we want to address in this thesis is to regulate data sharing among interconnected IoT environments. In interconnected IoT environments, data exchange is carried out by devices connected to different environments. The majority of proposed access control frameworks in the literature aimed at regulating the access to data generated and exchanged within a single IoT environment by adopting centralized enforcement mechanisms. However, currently, most of the IoT applications rely on IoT devices and services distributed in multiple IoT environments to satisfy users’ demands and improve their functionalities. The second challenge that we want to address in this thesis is to regulate data sharing within an IoT environment under ordinary and emergency situations. Recent emergencies, such as the COVID-19 pandemic, have shown that proper emergency management should provide data sharing during an emergency situation to monitor and possibly mitigate the effect of the emergency situation. IoT technologies provide valid support to the development of efficient data sharing and analysis services and appear well suited for building emergency management applications. Additionally, IoT has magnified the possibility of acquiring data from different sensors and employing these data to detect and manage emergencies. An emergency management application in an IoT environment should be complemented with a proper access control approach to control data sharing against unauthorized access. In this thesis, we do a step to address two open research challenges related to data protection in IoT environments which are briefly introduced above. To address these challenges, we propose two access control frameworks rely on ABAC model: the first one regulates data sharing among interconnected MQTT-based IoT environments, whereas the second one regulates data sharing within MQTT-based IoT environment during ordinary and emergency situations

    Selective Intervention and Internal HybridsInterpreting and Learning from the Rise and Decline of the Oticon Spaghetti Organization

    Get PDF
    Infusing hierarchies with elements of market control has become a much-used way of simultaneously increasing entrepreneurialism and motivation in firms. However, this paper argues that such “internal hybrids,” particularly in their radical forms, are inherently hard to successfully design and implement, because of fundamental credibility problems related to managerial promises to not intervene in delegated decision-making ¾ an incentive problem that is often referred to as the “problem of selective intervention.” This theoretical theme is developed and illustrated, using the case of the world-leading Danish hearing aids producer, Oticon. In the beginning of the 1990s, Oticon became famous for its radical internal hybrid, the ”spaghetti organization.” Recent work has interpreted the spaghetti organization as a radical attempt to foster dynamic capabilities by imposing loose coupling on the organization, neglecting, however, that about a decade later, the spaghetti organization has given way to a more traditional matrix organization. This paper presents an organizational economics interpretation of organizational changes in Oticon, and argues that a strong liability of the spaghetti organization was the above incentive problem. Motivation in Oticon was strongly harmed by selective intervention on the part of top-management Changing the organizational structure was one means of repairing these motivational problems. Refutable implications are developed, both for the understanding of efficient design of internal hybrids, and for the more general issue of the distinction between firms and markets, as well as the choice between internal and external hybrids.Internal hybrids, organizational change, delegation, managerial commitment problems, new organizational forms

    Performance Pay, Delegation, and Multitasking under Uncertainty and Innovativeness An Empirical Investigation

    Get PDF
    The existing empirical evidence is somewhat inconclusive with respect to a number of the key predictions of the agency model. Although the reach of agency theory is considerably wider, the dominant portion of work has been taken up with examining the nature of the trade-off between risk and incentives, and the implications thereof for contractual design. More specifically, some researchers have recently noted that the predicted trade-off between risk and incentives turns out to be rather weak, and perhaps non-existent, when confronted with the available empirical evidence. In this paper, we examine the risk-incentives trade-off and related predictions from agency theory on the basis of data from a data set encompassing close to 1000 Danish firms. We find that the relation between the use of performance pay in these firms and the environmental uncertainty they confront which is one way to test the risk/incentives tradeoff is indeed weak and in many cases even perverse. We then suggest, in line with other recent contributions to the literature, that this may be caused by the widespread use of delegation. One effect of delegation is that it breaks the simple relation between risks and incentives. We examine the suggestion that that those firms that are more prone to use delegation of decision rights in their internal organization are facing an uncertain environment to a larger extent than the rest of the population. We argue that this constitutes an indirect confirmation of the hypothesis. We also examine the multi-tasking agency hypothesis that as risk increases, the flexibility of agents is restricted. We fail to find support for this hypothesis. It is suggested that the reason for this finding is also related to delegation.Uncertainty, pay-for-performance, delegation, innovation, competition
    • …
    corecore