7,050 research outputs found
The Political Economy of Data Localization
For Symposium abstract is not require
Recommended from our members
Evaluation Approach for an Effective Blockchain Implementation in an Accounting Environment
Blockchain has the potential to revolutionize accounting transactions in the same way the Internet revolutionized the collection and dissemination of information. Nonetheless, like the Internet, blockchain technology is a double-edged sword offering tremendous benefits but also drawbacks. The literature points to inadequacies in blockchain implementations, particularly when evaluating and selecting controls to help ensure an effective blockchain implementation in organizations. This research develops an approach that not only addresses the inadequacies identified in the literature, but also prompts organizations to a more precise evaluation and selection of controls to achieve effective blockchain implementation. The approach uses Desirability Functions to quantify the desirability of each control after considering its benefits and drawbacks, providing organizations with an objective metric when assessing and selecting controls. Through a case assessment exercise, the approach proved successful in providing accurate evaluation, ranking, and potential selection of controls for organizations to consider when implementing blockchain accounting technology
Cyber Supply Chain Risks in Cloud Computing - Bridging the Risk Assessment Gap
Cloud computing represents a significant paradigm shift in the delivery of information technology (IT) services. The rapid growth of the cloud and the increasing security concerns associated with the delivery of cloud services has led many researchers to study cloud risks and risk assessments. Some of these studies highlight the inability of current risk assessments to cope with the dynamic nature of the cloud, a gap we believe is as a result of the lack of consideration for the inherent risk of the supply chain. This paper, therefore, describes the cloud supply chain and investigates the effect of supply chain transparency in conducting a comprehensive risk assessment. We conducted an industry survey to gauge stakeholder awareness of supply chain risks, seeking to find out the risk assessment methods commonly used, factors that hindered a comprehensive evaluation and how the current state-of-the-art can be improved. The analysis of the survey dataset showed the lack of flexibility of the popular qualitative assessment methods in coping with the risks associated with the dynamic supply chain of cloud services, typically made up of an average of eight suppliers. To address these gaps, we propose a Cloud Supply Chain Cyber Risk Assessment (CSCCRA) model, a quantitative risk assessment model which is supported by decision support analysis and supply chain mapping in the identification, analysis and evaluation of cloud risks
Connectivity, confidentiality and confidence: Key issues in the provision of online pro bono activities
The provision of pro bono activities for law students has become an established feature of the undergraduate legal education landscape in Law Schools in the United Kingdom (“UK”) and beyond, providing the experiential elements of clinical legal education programmes. Pro bono activities conducted online, or utilising and enhanced by technologies in other ways (for example, through the development of a mobile phone application providing legal guidance), are increasingly becoming a part of this offering, reflecting wider shifts within legal practice and society and an increasing recognition of the importance of digital literacy skills. This paper will situate these forms of online and technologically-enhanced pro bono activities both within the wider context of contemporary clinical legal education and also as a part of broader professional and societal shifts. It will explore a variety of innovative approaches being taken internationally, including work done by The Open University’s Open Justice Centre in the UK, before moving on to focus on a number of key challenges and opportunities which may arise through the increasing provision of these new forms of pro bono activities by Law Schools. These include the potential and pitfalls of the technology involved, issues with confidentiality (particularly in the context of online legal advice) and the issue of how to foster trust in the online environment. The paper will conclude with a number of suggestions for areas requiring further research and discussion to enable contemporary clinicians to fully utilise the potential of online and technologically-enhanced pro bono activities
Vertical Industries Requirements Analysis & Targeted KPIs for Advanced 5G Trials
Just before the commercial roll out of European 5G networks, 5G trials in
realistic environments have been recently initiated all around Europe, as pat
of the Phase 3 projects of 5GPPP H2020 program [1]. The goal is to showcase
5G's capabilities and to convince stakeholders about its value adding business
potential. The approach is to offer advanced 5G connectivity to real vertical
industries and showcase how it enables them to overcome existing 4G network
limitations and other long standing issues. The 5G EVE H2020 5GPPP project [2]
offers cutting edge 5G end to end facilities (in 4 countries) to diversified
vertical industry experimenters. The objective is to understand the needs of
prominent industries across Europe and to offer tailor made 5G experience to
each and every one of them. This paper contributes to the understanding of
vertical services' needs, by offering a thorough and concise vertical
requirements analysis methodology, including an examination of the 4G
limitations. It also provides real life values for the targeted KPIs of three
vertical sectors namely, Smart Industry (4.0), Smart Cities / Health and Smart
Energy, while assisting market roll out by prioritizing their connectivity
needs.Comment: EuCNC 201
Inclusion Needs a Different School Culture
Teachers' beliefs and values are affecting the emerging organizational paradigm called inclusive education. A social constructivist perspective on teachers' beliefs acknowledges that teachers have their ideals and this knowledge influences their actions in the implementation of inclusive schooling. This happens within a social and cultural context of the school and the community. This paper addresses a critical aspect of the changes needed for the development of inclusive schooling and the associated professional development for teachers
Oversee Cyber Security as Hackers Seek to Infiltrate Even the Most Sophisticated Information Security Systems
This report studies the impact of cyber security attacks its initial use and develop mechanisms for security of internet. There are numerous systems that are interconnected with internet and it is at risk and brief background of the cyber-attacks is outlined and our concentration in this report is on the impact of communication, positioning and implementing value delivery in order to increase productivity. It is concluded that the senior executives and government play major role in minimizing these risks and potential errors. In order to reduce them it is obligatory that IT professionals should take major responsibility of these issues and take productive measures. The research determines that cybersecurity threats also impacts Small and Medium Enterprises (SMEs), detecting just at the particulars for SMEs failing and the helping of IT inside the modern SME. The use of internet is becoming more often now a days and it is a major threat for SMEs due to oubsolete Microsoft versions technological systems therefore steps should be taken to mitigate these risks in order to minimize costs and boost performance by upgrading its software systems. The importance of cyber-intellienge should also be considerd due to vital practice to determine how firewalls coaching and detection structures work and compliance with risk management standards. There are different forms of attack such as viruses malware and these types of attacks create problem for initial users to have confidence and believe in technology. Such issue can be addressed by having antiviruses and it can eliminate financial as well as reputational losses for business in longrun. Keywords: Cyber Security, SME, Information Security System. JEL Classification: D80, L8
Recommended from our members
Information security trust and outcomes : a case study of compliance in a complex system
As recent high-profile data breaches illustrate, an organization that complies with information security control frameworks can also suffer from successful attacks and the subsequent erosion of trust. Information security frameworks used in the federal, payment, and health care industries use a core catalogue of security controls to standardize practices and facilitate assessment. In theory, an organization implementing these standard controls and practices would maintain sufficient security to protect sensitive data. However, these catalogues of controls require resources to implement and change slowly compared to the evolution of technology and threats. Viewed as a static set of rules in a dynamic complex system, the implementation of catalogues of controls may not create predictable outcomes, or act as reliable indicators of the quality of an organization’s security program. I used a case study approach to analyze an organization’s security outcomes during a period when control catalogue implementation transitioned from a best practice to a regulatory mandate I analyzed the organization through the perspective of a complex adaptive system, identifying the complex properties of the organization and its information security team as they endeavored to ensure strict compliance with the control catalogues. I collected data on factors related to the organization’s security outcomes, as well as finances, strategy, and governance. Despite significant changes in IT intensity, strategy, and corporate leadership, the security outcomes faltered and recovered, as emergent processes evolved from the dynamic environment. The compliance results, however, were ambiguous. The formal third-party compliance assessment presented outcomes that overstated the impact of isolated controls from the catalogue, while failing to highlight the broader issues related to organizational risk. This prevented the compliance assessment from representing the true state of security of the organization’s systems. I conclude that the current method of assessing the quality of an organization’s information security program against a control catalogue does not provide sufficient information to establish meaningful trust between organizations. Alternate method that requires a broader perspective of risk may improve the reliability of assessments and provide a more meaningful method to communicate trust.Informatio
A conservation policy statement for research libraries
Caption title.Bibliography: p. 20-23
- …