4,734 research outputs found

    Information Security as Strategic (In)effectivity

    Full text link
    Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have. In this work, we suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information flows can be compared by looking at the adversary's ability to harm the system. Then, we propose that the information flow in a system is effectively information-secure if it does not allow for more harm than its idealized variant based on the classical notion of noninterference

    The Globalization of Food Security: Rice Policy Reforms in the Philippines

    Get PDF
    This paper describes the forces that have come to bear on the shaping of food security policy in the Philippines in recent years, and the government's responses to the emerging challenges. It attempts a political economy and public administration insight into the effectiveness and efficiency of the government's efforts to boost rice production. Public goods and policy has greater significance in rice productivity and growth than in most other commodities and services. Research and analysis that intensifies attention to public sector governance as a crucial factor in the attainment of sustainable food security is thus appropriate.rice policy reforms, Grains Sector Development Program, rice sector governance

    The Globalization of Food Security: Rice Policy Reforms in the Philippines

    Get PDF
    This paper describes the forces that have come to bear on the shaping of food security policy in the Philippines in recent years, and the government's responses to the emerging challenges. It attempts a political economy and public administration insight into the effectiveness and efficiency of the government's efforts to boost rice production. Public goods and policy has greater significance in rice productivity and growth than in most other commodities and services. Research and analysis that intensifies attention to public sector governance as a crucial factor in the attainment of sustainable food security is thus appropriate.rice policy reforms, Grains Sector Development Program, rice sector governance

    Politics of Randomness

    Get PDF
    The main drawback of the public-policy contest is that the notion of contest success function, a crucial component of the contest model, does not have micro-foundations and, therefore, the random behavior of the government seems ad-hoc. In the present paper we propose a partial micro-foundation for the public-policy contest. The possible rationalization of random government behavior is illustrated in the case of the all-pay auction and Tullock's lottery logit functions. We also clarify how stake asymmetry, lobbying-skill asymmetry and return to lobbying effort determine the relative desirability, from the government's point of view, of these CSFsinterest groups, policy makers, lobbying, public-policy contests, contest success function, rationalization of random government's behavior

    The alternative of green open space management in Jakarta City, Indonesia

    Get PDF
    At the present time, the application of policy management of urban green open space of Jakarta have many weakness that caused by overlapping management. There are three institutions of management of urban green open space, those are Park Service (Dinas Pertamanan),, Forest Service (Dinas Kehutanan),, and Agricultural Service (Dinas Pertanian), which are all of them are under the scope of local government of DKI Jakarta. The management consists of several basic activities, including planning and controlling, organizing, human resources, coordination and financing. The prominent indicator associated with the managing urban green open space that related to the aspect of "market failure", it is commonly indicated by public goods, asymmetry of information, externality and aspect of “government failure”. It is also indicated by problems lingered around regulation of law, bureaucracy and bureaucrat agent. The core of the main problems in the policy of management formulation of urban green open space in Jakarta is the lack of managements" of urban green open space of DKI Jakarta. This was indicated by variety of critics coming from the members of society in DKI Jakarta about the function of it, where it will result the impact of environment.In the relation to that problem, there are two questions raised: a. What caused the management of the urban green open space in DKI Jakarta unsuccessful? b. What kind of factors that hampered the management of the urban green open space? As the follow up of the questions above is giving the alternatives to solve that hampered, then, the question is, How is the policy alternative to solve the lack of management of the urban green open space in DKI JakartaThe objective of study is getting the policy to manage the urban green open space in DKI Jakarta. The reflecting of the objective above was explained in the set of policy such as in the regulation and the institutional

    Utilisation of mobile technology in logistics

    Get PDF
    Accessing information quickly has become more and more important. Mobile devices can nowadays be used to perform and accomplish tasks more efficiently. Logistics companies can benefit from mobile applications in many ways. Many logistics areas, such as warehouse managing and transportation, concentrate on the physical movement of goods. The benefits of mobile applications are emphasised in those environments where portability and real-time information are of great use. The business IT alignment framework offers an approach to researching companies business and IT strategies and execution. The enterprise mobile applications may bring many advantages but also disadvantages to organisations utilising them. In this thesis, the business It alignment framework is used in the context of researching the utilisation of enterprise mobile applications in the case organisations. The utilisation of mobile applications in logistics is studied in this research by using the qualitative research method. Research data has been gathered from semi-structured interviews with case company employees responsible for logistics mobile application projects. The logistics areas where mobile applications are used are warehouse management and transportation. A new logistics IT alignment measurement tool was developed for the purposes of this study, as no such a tool existed before. The tool utilises the previous business IT alignment literature. Companies or researchers can utilise this tool in determining their logistics IT alignment level. This study finds that there are multiple important features that companies should take into account when developing and implementing logistics mobile applications. Ease of use and user friendliness are the most important of them. In addition, information quality and efficiency and effectiveness should be considered. Many companies also benefit from end device independence. Companies can get many advantages from logistics mobile applications. These advantages are for example better information quality, real-time information and cost reductions by consuming less paper. High logistics IT alignment supports in gaining these advantages

    Biofuel supply chain risk mitigation strategy framework: expert interview based approach

    Get PDF
    Purpose: The purpose of this case study is to develop and framework the biodiesel downstream supply chain characteristics and risk mitigation strategies. Design/methodology/approach: This study employs an expert interview-based approach as a qualitative approach with a multi-perspectives view. Findings: There are varying strategies among perspectives, such as perspectives of organization and business types, stakeholder types, times and methods. These also show that business strategies of collaborative, coordinative, and cooperative arise as alternative strategies for each perspective and each level of stakeholder. Those business strategies may apply in a variety of operational strategies linking them through an energy security framework element, as a company’s competitive priorities. Research limitations/implications: The research scope includes only a certain area of the country’s territory and the target company’s supply chain areas of activity. The research method includes only internal stakeholders and experts as respondents and data sources. The level of analysis was only at a corporate level in the corporate case study context. The research also targets only downstream activities of biodiesel supply chain context. The interview-based approach as a qualitative approach faces some subjectivity challenges among respondents. Practical implications: The research result provides some positive implications for business practice, including how to minimize the impact of supply chain risk on a company’s business activities and performance, how supply chain experts and practitioners used risk mitigation practices, how to formulate strategic plans to minimize the impact of supply chain risk and enhance the effectivity and sustainability of the supply chain activities. Social implications: The implication for business practice was that a company’s leaders implemented supply chain risk mitigation strategies that provide positive impacts on the more valuable relationship among supply chain actors and stakeholders. Originality/value: The first, is an activities area and operational schemes-based of biodiesel supply chain point of view. The second, is a multi-perspectives-based biodiesel supply chain characteristics framework. The third, is an energy security framework-based biodiesel risk mitigation strategies framework.Peer Reviewe

    Evaluation of Efficiency of Cybersecurity

    Get PDF
    Uurimistöö eesmĂ€rgiks on uurida, kuidas tĂ”hus kĂŒberjulgeolek on olnud edukas. Uurimistöö kasutab parima vĂ”imaliku tulemuse saamiseks mitmesuguseid uurimismeetodeid ja kirjanduse ĂŒlevaade on sĂŒstemaatiline. Kuid uurimistöö jĂ€reldus on see, et uuring ei suuda kinnitada vĂ”i tagasi lĂŒkata peamist töö hĂŒpoteesi. Uuring ei Ă”nnestunud, sest puuduvad korralikud teooriad, mis nĂ€itavad ohutuse ja kĂŒberjulgeoleku nĂ€htusi ning puuduvad head nĂ€itajad, mis annaksid kĂŒberohutuse tĂ”hususe kohta kehtivaid ja ratsionaalseid tulemusi, kui hĂ€sti on kĂŒberkuritegevuse abil Ă”nnestunud kĂŒberkuritegevuse tĂ”husaks vĂ”itmiseks ja kĂŒberkuritegude tĂ”husaks vĂ€hendamiseks. SeepĂ€rast on kĂŒberjulgeoleku teadusteooria ja julgeoleku teadusteooria vĂ€hearenenud 2018. aastal. Uuringud on teinud kĂŒberjulgeoleku ja turvalisuse arendamise pĂ”hilisi avastusi. Edasiste pĂ”hiuuringute suund on luua ĂŒldine turbeteooria, mis kirjeldab ohtlike muutujate ohtlike muutujate kavatsust, ressursse, pĂ€devust ja edusamme ohtlike muutujate ja aksioomide puhul, kus ohtlike muutujate mÔÔtmisel saab teha selle sisse loodetavas ja teooria kirjeldab, millised on tĂ”husad meetmed, et vĂ€ltida ja leevendada ning millised ei ole ja lĂ”puks kehtestada nĂ”uetekohased mÔÔdikud, et mÔÔta turvalisuse ja kĂŒberjulgeoleku tĂ”husust loodetavus ja kehtivusega.The purpose of the thesis is to research how effectively cybersecurity has succeeded on its mission. The thesis used multiple research methods to get best possible answer and the literature review has been systematic. However, the conclusion of the research was that the study is unable to either confirm or reject the main working hypothesis. The study is unable to do it because of the lack of proper theories to describe what are the phenomena in secu-rity and cybersecurity and the lack of proper metrics to give valid and sound conclusion about the effective of cybersecurity and how well have cybersecurity succeed on its mis-sion to effectively prevent and mitigate cybercrime. Therefore, the science of security and science of cybersecurity are underdeveloped in 2018. The research has made basic discov-eries of development of cybersecurity and security. A direction of further basic research is to establish a general theory of security which describes threat variables, threat variables intention, resources, competence and progress of the threat variables and axioms where measurement of threat variables can be made with reliability and the theory would describe which are effective measures to prevent and mitigate and which are not and finally, estab-lish proper metrics to measure efficiency of security and cybersecurity with reliability and validity
    • 

    corecore