162,609 research outputs found
Evaluating megaprojects: from the âiron triangleâ to network mapping
Evaluation literature has paid relatively little attention to the specific needs of evaluating large, complex industrial and infrastructure projects, often called âmegaprojectsâ. The abundant megaproject governance literature, in turn, has largely focused on the so-called âmegaproject pathologiesâ, i.e. the chronic budget overruns, and failure of such projects to keep to timetables and deliver the expected social and economic benefits. This article draws on these two strands of literature, identifies shortcomings, and suggests potential pathways towards an improved evaluation of megaprojects. To counterbalance the current overemphasis on relatively narrowly defined accountability as the main function of megaproject evaluation, and the narrow definition of project success in megaproject evaluation, the article argues that conceptualizing megaprojects as dynamic and evolving networks would provide a useful basis for the design of an evaluation approach better able to promote learning and to address the socio economic aspects of megaprojects. A modified version of ânetwork mappingâ is suggested as a possible framework for megaproject evaluation, with the exploration of the multiple accountability relationships as a central evaluation task, designed to reconcile learning and accountability as the central evaluation functions. The article highlights the role of evaluation as an âemergentâ property of spontaneous megaproject âgoverningâ, and explores the challenges that this poses to the role of the evaluator
Industrial districts as organizational environments: resources, networks and structures
The paper combines economic and sociological perspectives on organizations in order to gain a better understanding of the forces shaping the structures of industrial districts (IDs) and the organizations of which they are constituted. To effect the combination , the resource based view (RBV) and resource dependency theory are combined to explain the evolution of different industry structures. The paper thus extends work by Toms and Filatotchev by spatializing consideration of resource distribution and resource dependence. The paper has important implications for conventional interpretations in the fields of business and organizational history and for the main areas of theory hitherto considered separately, particularly the Chandlerian model of corporate hierarchy as contrasted with the alternative of clusters of small firms coordinated by networks
Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements
Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)
Improving democratic governance through institutional design: civic participation and democratic ownership in Europe
In this article we provide a conceptual and argumentative framework for studying how institutional design can enhance civic participation and ultimately increase citizensâ sense of democratic ownership of governmental processes. First, we set out the socio-political context for enhancing the democratic governance of regulatory policies in Europe, and highlight the way in which civic participation and democratic ownership is given equal weight to economic competitiveness. We then discuss the potential for institutionalised participatory governance to develop and their prospects for improving effective and democratic governance in the multi-layered European polity. The article concludes by outlining a research agenda for the field and identifying the priorities for scholars working in interaction with civil society and governments
A-MAKE: an efficient, anonymous and accountable authentication framework for WMNs
In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy, and accountability for communications in wireless mesh networks. More specifically, the framework provides an anonymous mutual authentication protocol whereby legitimate users can connect to network from anywhere without being identified or tracked. No single party (e.g., network operator) can violate the privacy of a user, which is provided in our framework in the strongest sense. Our framework utilizes group signatures, where the private key and the credentials of the users are generated through a secure three-party protocol. User accountability is implemented via user revocation protocol that can be executed by two semitrusted authorities, one of which is the network operator. The assumptions about the trust level of the network operator are relaxed. Our framework makes use of much more efficient signature generation and verification algorithms in terms of computation complexity than their counterparts in literature, where signature size is comparable to the shortest signatures proposed for similar purposes so far
Clinical encounter and the logic of relationality : Reconfiguring bodies and subjectivities in clinical relations
Acknowledgements I would like to thank all the patients and staff for their collaboration in the study and to acknowledge the other members of the team: James NâDow and Sara MacLennan for their helpful guidance. I am grateful to ZoĂ« Skea and Vikki Entwistle for the early discussions of the paper, to Natasha Mauthner and Lorna McKee for their insightful comments to various drafts, and to two anonymous reviewers for their thoughtful suggestions, which helped to clarify its argument. Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This research was supported by a grant from the Big Lottery Fund. The views expressed here are the authorâs and do not necessarily reflect those of the funding bodies or any other organisation.Peer reviewedPostprin
Securing personal distributed environments
The Personal Distributed Environment (PDE) is a new concept being developed by Mobile VCE allowing future mobile users flexible access to their information and services. Unlike traditional mobile communications, the PDE user no longer needs to establish his or her personal communication link solely through one subscribing network but rather a diversity of disparate devices and access technologies whenever and wherever he or she requires. Depending on the servicesâ availability and coverage in the location, the PDE communication configuration could be, for instance, via a mobile radio system and a wireless ad hoc network or a digital broadcast system and a fixed telephone network. This new form of communication configuration inherently imposes newer and higher security challenges relating to identity and authorising issues especially when the number of involved entities, accessible network nodes and service providers, builds up. These also include the issue of how the subscribed service and the userâs personal information can be securely and seamlessly handed over via multiple networks, all of which can be changing dynamically. Without such security, users and operators will not be prepared to trust their information to other networks
- âŠ