573 research outputs found

    An Approach to Optimize the Management of Information Security in Public Organizations of Ecuador

    Get PDF
    The problems of information security in public organizations in Ecuador are evident, which, as a result, have led to corruptions that are present at all levels of operational, tactical and strategic management. The objective of this chapter is to analyze the available information found in different media, written, spoken, among others. The deductive method was used for the collection of information and observation techniques. It turned out the improve in the administrative processes, prototype diagram of sequence of access of users and services, prototype of integration of technologies of security of the information for public organizations of Ecuador. It was concluded that to avoid corruption in a country change should happen at all levels: the way of thinking and culture of the inhabitants, laws, penalties to politicians without parliamentary immunity, application of information and communications technologies (ICT) in an appropriate manner, and complying with international standards in information security. To improve information security, administrative policies on information security must be changed, and technologies related to immutable security algorithms, Ledger, Hyperledger, etc., must be used

    Trademark Searching Tools and Strategies: Questions for the New Millennium

    Get PDF
    The intent of this discussion is to raise questions about trademark searching which will be discussed in future issues of IDEA. I will lead you through the questions raised by my journey through primarily legal literature in treatises and periodicals on the Lexis and Westlaw platforms

    Data analytics 2016: proceedings of the fifth international conference on data analytics

    Get PDF

    Blockchain technology in the area of e-Governance – Guidelines for implementation

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementThe perception of the public administration among society is widely associated with the area before the digital age and the information revolution: Less efficiency, less democratic, partially transparent, majorly bureaucratic, insufficient service quality, and slow responsiveness. Driven by information and communication technologies, there is an urgent need for disrupting the public sector to improve government decisions, increase the trust of citizens and their participation possibilities as well as enhance government accountability and transparency. The blockchain as a novel and innovative technology with its underlaying technological concept provides a plausible solution to reinvent the public administration processes and transactions with other governments, businesses, or citizens. This dissertation follows a design science research approach to apply multiple analytical methods and perspectives to create an artifact. The type of evidence within this methodology is a systematic literature review, with the goal to attain insights into the current state-of-the-art research of blockchain technology in the area of e-Governance. Additionally, proven best practices from the industry are examined in depth to further strengthen the credibility. Thereby, the systematic literature review shall be used to pinpoint, analyze, and comprehend the obtainable empirical studies and research questions. This methodology supports the main goal of this dissertation, to develop and propose evidence-based practice guidelines for the implementation of blockchain technology that can be followed by the public administration

    Volcanic Activity: Processing of Observation and Remote Sensing Data (VAPOR)

    Get PDF
    The World Bank makes a very clear distinction between disasters and natural phenomena. Natural phenomena are events like volcanic eruptions. A disaster only occurs when the ability of the community to cope with natural phenomenon has been surpassed, causing widespread human, material, economic or environmental losses. By these definitions, volcanic eruptions do not have to lead to disasters. On November 13, 1985, the second most deadly eruption of the twentieth century occurred in Colombia. Within a few hours of the eruption of the Nevado del Ruiz volcano, 23,000 people were dead because no infrastructure existed to respond to such an emergency. Six years later, the 1991 eruption of Mount Pinatubo in the Philippines was the largest volcanic eruption in the 21st century to affect a heavily populated area. Because the volcano was monitored, early warning of the eruption was provided and thousands of lives were saved. Despite these improvements, some communities still face danger from volcanic events and volcano-monitoring systems still require further development. There remain clear gaps in monitoring technologies, in data sharing, and in early warning and hazard tracking systems. A global volcano-monitoring framework such as the VIDA framework can contribute to filling these gaps. VIDA stands for “VAPOR Integrated Data-sharing and Analysis” and is also the Catalan and Spanish word for ‘life’. The ultimate goal for this project is to help save the lives of people threatened by volcanic hazards, while protecting infrastructure and contributing to decision support mechanisms in disaster risk management scenarios

    The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study

    Get PDF
    The practice of spamming (sending unsolicited electronic communications) has been dubbed “the scourge of the 21st century” affecting different stakeholders. This practice is also credited for not only disrupting electronic communications but also, it overloads electronic systems and creates unnecessary costs for those affected than the ones responsible for sending such communications. In trying to address this issue nations have implemented anti-spam laws to combat the scourge. South Africa not lagging behind, has put in place anti-spam provisions to deal with the scourge. The anti-spam provisions are scattered in pieces of legislation dealing with diverse issues including: consumer protection; direct marketing; credit laws; and electronic transactions and communications. In addition to these provisions, an Amendment Bill to one of these laws and two Bills covering cybercrimes and cyber-security issues have been published. In this thesis, a question is asked on whether the current fragmented anti-spam provisions are adequate in protecting consumers. Whether the overlaps between these pieces of legislation are competent to deal with the ever increasing threats on electronic communications at large. Finally, the question as to whether a multi-faceted approach, which includes a Model Law on spam would be a suitable starting point setting out requirements for the sending of unsolicited electronic communications can be sufficient in protecting consumers. And as spam is not only a national but also a global problem, South Africa needs to look at the option of entering into mutual agreements with other countries and organisations in order to combat spam at a global level.Mercantile LawLL. D

    A Comparative Study of Judicial Safeguards in Relation to Investor-State Dispute Settlement

    Get PDF
    ISDS is a relatively young and dynamic regime. It faces challenges for which other adjudicative systems, after centuries of development, have found solutions. In ISDS, fair rules and procedures are essential since ISDS is an adjudicative regime said to be based on the rule of law. The importance of complex and carefully crafted rules and procedural safeguards is underscored by the impact of ISDS on a wide array of parties and interests and by its encroachment on the powers of sovereign states affecting their populations. Yet ISDS is criticized as unfair and open to unacceptable appearances of bias due to a lack of institutional safeguards. In this thesis, I assess whether these criticisms are compelling. Considering their prevalence in the debates about ISDS, I focus on issues of neutrality and fairness and, in particular, on two core values: (1) adjudicative independence and impartiality; and (2) the right of standing. I do so by examining institutional measures adopted to safeguard these values. These include: a) methods of appointment and case assignment; b) protections of the independence of individual adjudicators in the form of tenure and financial security; and c) guaranteed standing for parties with a legal interest. The goal of the thesis is to evaluate institutional safeguards of these values in ISDS through the method of a comparative study of adjudicative bodies in various contexts and to map the spectrum of safeguards used by other forums based on their common comparisons and similarities with ISDS. The results of the research highlight that, although ISDS has been lauded for its perceived neutrality and as a system superior to domestic courts, it is the regime with the weakest safeguards among all comparators, while domestic courts employ the strongest institutional safeguards. The central conclusion is that ISDS has systemic flaws and failures because it lacks mechanisms to safeguard the examined values, thus substantiating the relevant concerns about the institutional design of ISDS. To safeguard these essential values, it appears unavoidable that ISDS must be rejected in its current form
    corecore