162,609 research outputs found

    Evaluating megaprojects: from the “iron triangle” to network mapping

    Get PDF
    Evaluation literature has paid relatively little attention to the specific needs of evaluating large, complex industrial and infrastructure projects, often called ‘megaprojects’. The abundant megaproject governance literature, in turn, has largely focused on the so-called ‘megaproject pathologies’, i.e. the chronic budget overruns, and failure of such projects to keep to timetables and deliver the expected social and economic benefits. This article draws on these two strands of literature, identifies shortcomings, and suggests potential pathways towards an improved evaluation of megaprojects. To counterbalance the current overemphasis on relatively narrowly defined accountability as the main function of megaproject evaluation, and the narrow definition of project success in megaproject evaluation, the article argues that conceptualizing megaprojects as dynamic and evolving networks would provide a useful basis for the design of an evaluation approach better able to promote learning and to address the socio economic aspects of megaprojects. A modified version of ‘network mapping’ is suggested as a possible framework for megaproject evaluation, with the exploration of the multiple accountability relationships as a central evaluation task, designed to reconcile learning and accountability as the central evaluation functions. The article highlights the role of evaluation as an ‘emergent’ property of spontaneous megaproject ‘governing’, and explores the challenges that this poses to the role of the evaluator

    Industrial districts as organizational environments: resources, networks and structures

    Get PDF
    The paper combines economic and sociological perspectives on organizations in order to gain a better understanding of the forces shaping the structures of industrial districts (IDs) and the organizations of which they are constituted. To effect the combination , the resource based view (RBV) and resource dependency theory are combined to explain the evolution of different industry structures. The paper thus extends work by Toms and Filatotchev by spatializing consideration of resource distribution and resource dependence. The paper has important implications for conventional interpretations in the fields of business and organizational history and for the main areas of theory hitherto considered separately, particularly the Chandlerian model of corporate hierarchy as contrasted with the alternative of clusters of small firms coordinated by networks

    Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements

    Get PDF
    Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)

    Improving democratic governance through institutional design: civic participation and democratic ownership in Europe

    Get PDF
    In this article we provide a conceptual and argumentative framework for studying how institutional design can enhance civic participation and ultimately increase citizens’ sense of democratic ownership of governmental processes. First, we set out the socio-political context for enhancing the democratic governance of regulatory policies in Europe, and highlight the way in which civic participation and democratic ownership is given equal weight to economic competitiveness. We then discuss the potential for institutionalised participatory governance to develop and their prospects for improving effective and democratic governance in the multi-layered European polity. The article concludes by outlining a research agenda for the field and identifying the priorities for scholars working in interaction with civil society and governments

    A-MAKE: an efficient, anonymous and accountable authentication framework for WMNs

    Get PDF
    In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy, and accountability for communications in wireless mesh networks. More specifically, the framework provides an anonymous mutual authentication protocol whereby legitimate users can connect to network from anywhere without being identified or tracked. No single party (e.g., network operator) can violate the privacy of a user, which is provided in our framework in the strongest sense. Our framework utilizes group signatures, where the private key and the credentials of the users are generated through a secure three-party protocol. User accountability is implemented via user revocation protocol that can be executed by two semitrusted authorities, one of which is the network operator. The assumptions about the trust level of the network operator are relaxed. Our framework makes use of much more efficient signature generation and verification algorithms in terms of computation complexity than their counterparts in literature, where signature size is comparable to the shortest signatures proposed for similar purposes so far

    Clinical encounter and the logic of relationality : Reconfiguring bodies and subjectivities in clinical relations

    Get PDF
    Acknowledgements I would like to thank all the patients and staff for their collaboration in the study and to acknowledge the other members of the team: James N’Dow and Sara MacLennan for their helpful guidance. I am grateful to ZoĂ« Skea and Vikki Entwistle for the early discussions of the paper, to Natasha Mauthner and Lorna McKee for their insightful comments to various drafts, and to two anonymous reviewers for their thoughtful suggestions, which helped to clarify its argument. Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This research was supported by a grant from the Big Lottery Fund. The views expressed here are the author’s and do not necessarily reflect those of the funding bodies or any other organisation.Peer reviewedPostprin

    Securing personal distributed environments

    Get PDF
    The Personal Distributed Environment (PDE) is a new concept being developed by Mobile VCE allowing future mobile users flexible access to their information and services. Unlike traditional mobile communications, the PDE user no longer needs to establish his or her personal communication link solely through one subscribing network but rather a diversity of disparate devices and access technologies whenever and wherever he or she requires. Depending on the services’ availability and coverage in the location, the PDE communication configuration could be, for instance, via a mobile radio system and a wireless ad hoc network or a digital broadcast system and a fixed telephone network. This new form of communication configuration inherently imposes newer and higher security challenges relating to identity and authorising issues especially when the number of involved entities, accessible network nodes and service providers, builds up. These also include the issue of how the subscribed service and the user’s personal information can be securely and seamlessly handed over via multiple networks, all of which can be changing dynamically. Without such security, users and operators will not be prepared to trust their information to other networks
    • 

    corecore