692,077 research outputs found

    Policy and Practice Brief: Expanding Health Insurance Options; A Framework for Advising Social Security Beneficiaries of Their Rights Under Private Insurance Contracts

    Get PDF
    This brief provides a framework for advising Social Security beneficiaries of their rights under private insurance contracts. Reviewed are basic insurance concepts; coverage issues; pre-existing condition clauses; COBRA; ERISA; and, appeal rights

    Self-organising management of Grid environments

    Get PDF
    This paper presents basic concepts, architectural principles and algorithms for efficient resource and security management in cluster computing environments and the Grid. The work presented in this paper is funded by BTExacT and the EPSRC project SO-GRM (GR/S21939)

    National Security and Defense: basic concepts for an analysis

    Get PDF
    No artigo se busca uma delimitação de conceitos e abrangĂȘncia dos nĂ­veis de cada polĂ­tica da ĂĄrea de defesa e participação de civis e militares.The aim of the paper is to delimit the definition of both concepts and levels of coverage of each policy in the Defense area and civil and military participation

    Code Access Security in Microsoft’s .NET

    Get PDF
    This paper introduces basic concepts of code access security, using and implementing security features, as well as types of security syntax and mechanism of checking and requesting specific permissions

    Modeling of economically sustainable information security management systems in seaport clusters

    Get PDF
    The paper researches the usage of ARIS Express process modeling tool in creation of economically sustainable information security management system in seaport clusters. Basic concepts of information security in seaport cluster stakeholder’s organizations are detailed, and relations and interactions between organizations and their environment are researched. Portfolio approach to information security is being endorsed along with quantification of total levels of the risk and the resulting cost of information security. The authors identify two basic process paths of information security in seaport clusters: basic activities and supporting activities. Furthermore, main components of both are being researched in detail, along with their interactions that create a robust system of information security management in seaport clusters. Process flow of all activities is constructed by using business process model implementation of ARIS Express software

    A Review of Information Systems Security Management: An Integrated Framework

    Get PDF
    As information has been a basic commodity and strategic asset, information systems (IS) security has become increasingly important to organizations. This paper conducts a review on the prior literature that has studied non-technical factors of IS security issues from organizational perspective rather than individual level. Five key concepts are studied: IS security management, organizational factors, human factors, strategic planning, and IS security policies. By integrating the main concepts that are reflected in the literature, this paper proposes an integrated framework which provides a comprehensive look at effective IS security management. Four propositions are developed. This framework is intended to provide guidance for organizations and security practitioners that need to implement their IS security management effectively

    Modeling of economically sustainable information security management systems in seaport clusters

    Get PDF
    The paper researches the usage of ARIS Express process modeling tool in creation of economically sustainable information security management system in seaport clusters. Basic concepts of information security in seaport cluster stakeholder’s organizations are detailed, and relations and interactions between organizations and their environment are researched. Portfolio approach to information security is being endorsed along with quantification of total levels of the risk and the resulting cost of information security. The authors identify two basic process paths of information security in seaport clusters: basic activities and supporting activities. Furthermore, main components of both are being researched in detail, along with their interactions that create a robust system of information security management in seaport clusters. Process flow of all activities is constructed by using business process model implementation of ARIS Express software

    Europe ́s Coherence Gap in External Crisis and Conflict Management The EU’s Integrated Approach between Political Rhetoric and Institutional Practice. November 2019

    Get PDF
    The European Union (EU) aspires to play a part in conflict prevention, crisis management and post-conflict peace- building through civil and/or military operations, through stabilisation efforts, and by building resilience at home and abroad. To bring this ambition to fruition, EU institutions have gradually expanded their ‘comprehensive approach to external conflict and crisis’ (CA) to become a full-fledged ‘integrated approach to conflict and crisis’ (IA).1 In their most basic form, CAs seek coordination and coherence in responding to external conflicts and crises by adopting a system-wide ‘whole-of-government approach’ (WGA). In their more elaborate form, IAs have incorpo- rated non-traditional security concepts, variously known as conflict transformation, (non-liberal) peacebuilding and human-security approaches. In their most expansive form, IAs may even be understood to apply to external action writ large
    • 

    corecore