565 research outputs found

    On the inability of existing security models to cope with data mobility in dynamic organizations

    Get PDF
    Modeling tools play an important role in identifying threats in traditional\ud IT systems, where the physical infrastructure and roles are assumed\ud to be static. In dynamic organizations, the mobility of data outside the\ud organizational perimeter causes an increased level of threats such as the\ud loss of confidential data and the loss of reputation. We show that current\ud modeling tools are not powerful enough to help the designer identify the\ud emerging threats due to mobility of data and change of roles, because they\ud do not include the mobility of IT systems nor the organizational dynamics\ud in the security model. Researchers have proposed security models that\ud particularly focus on data mobility and the dynamics of modern organizations,\ud such as frequent role changes of a person. We show that none\ud of the current security models simultaneously considers the data mobility\ud and organizational dynamics to a satisfactory extent. As a result, none\ud of the current security models effectively identifies the potential security\ud threats caused by data mobility in a dynamic organization

    Agricultural Exceptionalism in Vermont Land Use Law

    Get PDF

    Privacy impact assessment in large-scale digital forensic investigations

    Get PDF
    The large increase in the collection of location, communication, health data etc. from seized digital devices like mobile phones, tablets, IoT devices, laptops etc. often poses serious privacy risks. To measure privacy risks, privacy impact assessments (PIA) are substantially useful tools and the Directive EU 2016/80 (Police Directive) requires their use. While much has been said about PIA methods pursuant to the Regulation EU 2016/679 (GDPR), less has been said about PIA methods pursuant to the Police Directive. Yet, little research has been done to explore and measure privacy risks that are specific to law enforcement activities which necessitate the processing of large amounts of data. This study tries to fill this gap by conducting a PIA on a big data forensic platform as a case study. This study also answers the question how a PIA should be carried out for large-scale digital forensic operations and describes the privacy risks, threats we learned from conducting it. Finally, it articulates concrete privacy measures to demonstrate compliance with the Police Directive

    ‘Just another start to the denigration of Anzac Day’ : Evolving commemorations of Australian LGBTI military service

    Get PDF
    This article examines key historical moments in 1982, 1996, 2013 and 2015 when current or formerly serving gay military personnel have publicly asserted their membership in Australia’s Anzac legend and the lesbian, gay, bisexual, transgender and intersex (LGBTI) community. Through using the public spaces of Anzac Day and Sydney Gay and Lesbian Mardi Gras, LGBTI service organisations have strategically positioned gay service personnel as past, present or future members of Australia’s Defence and LGBTI communities. Their public demonstrations have challenged Australians’ constructs of gay men’s masculinity, the Anzac legend, digger mythology and the Australian Defence Force

    Translanguaging and Visuality: Translingual Practices in Literary Art

    Get PDF
    Translanguaging is a resource for linguistic creativity in communication and for critical engagement with one’s sociolinguistic or sociocultural reality. This article examines how translanguaging operates in two visual art installations by the contemporary Chinese artist Xu Bing. Square Word Calligraphy takes a visual turn on translanguaging by inventing a hybrid calligraphy that incorporates English words into the orthographic frame of Chinese. By physically tracing the alphabet through the character, viewers gain an embodied translingual experience, which encompasses an intercultural imaginary negotiating and transcending the English-Chinese divide. By contrast, Post Testament demonstrates an intralingual mode of translanguaging, whereby a biblical text is inflected with heterogeneous registers and rendered ineffectual as coherent discourse. Here the encounter and intertwining of text registers create a transformative space replete with ambiguity and mayhem. In these radical works of language art, translanguaging delineates borders while simultaneously interrogating them, creating liminal zones and articulating a politics of (mis)recognition, (un)readability, and (in)communicability.published_or_final_versio

    Information Security in Business Intelligence based on Cloud: A Survey of Key Issues and the Premises of a Proposal

    Get PDF
    International audienceMore sophisticated inter-organizational interactions have generated changes in the way in which organizations make business. Advanced forms of collaborations, such as Business Process as a Service (BPaaS), allow different partners to leverage business intelligence within organizations. However, although it presents powerfull economical and technical benefits, it also arrises some pitfalls about data security, especially when it is mediated by the cloud. In this article, current aspects which have been tackled in the literature related to data risks and accountability are presented. In addition, some open issues are also presented from the analysis of the existing methodologies and techniques proposed in the literature. A final point is made by proposing an approach, which aims at preventive, detective and corrective accountability and data risk management, based on usage control policies and model driven engineering

    Transforming earth and fire: new narratives of identity and place in the Northern Ireland peace process

    Get PDF
    This thesis explores the cultural geographies of peacebuilding through a study of Belfast, Northern Ireland. I investigate the connections between transformations of contested landscapes, shifting meanings of place, and new narratives of identity and belonging emerging through the Northern Ireland peace process. The aims of my research serve two theoretical objectives: first, to examine how transformations of contested cultural landscapes provoke new perceptions of place and geographic scale; and second, to examine how these transformations shape the expression, creation and negotiation of identity in societies emerging from violent conflict. For this project, I have developed a collaborative, qualitative methodological approach that combines semi-structured interviews and participant observation. I ground my research in case studies of two contested landscapes, both of which bear symbolic and material weight from Northern Ireland’s thirty-year civil war. The first case study explores republican cultural identities in relation to Divis Mountain, the highest point in Belfast, as it transitions from a British military base to a public recreational resource. The second case study focuses on peacetime transformations of the contentious 11th Night bonfire tradition and their implications for shifting expressions of loyalist cultural identity. Crucially, I cross-cut these case studies with a third strand of inquiry that explores transformations of contested landscapes in relation to identities and ideas of belonging among Northern Ireland’s growing minority ethnic populations. I position this project as a challenge to existing models of analysis for Northern Ireland. By opening the dominant Protestant-Catholic binary to explore the less-studied perspectives of ethnic minorities, I highlight the diversity of cultural identities emerging in post-ceasefire Belfast. I argue that practice in and scholarship on Northern Ireland must expand beyond traditional, binary conceptualizations of sectarian conflict to acknowledge how diverse relationships, identities and communities are vital to the process of building peace

    The evolution and reform of Palestinian security forces 1993–2013

    Get PDF
    This article provides a contextual analysis of the evolution and reform processes of Palestinian security forces over the last two decades. It categorises the evolution of security reform processes into three phases: the Oslo Accords phase; the Second Intifada phase; and the Fayyadism phase. The article argues that despite the attempt to reverse the conditions of insecurity through security reform under Fayyadism (the Palestinian Authority’s state-building project between 2007–2013 in the occupied West Bank), fundamental tensions between the Palestinian Authority’s security forces and the Palestinian resistance movement have emerged. This tension manifested in authoritarian transformations and trends and therefore the entire security reform project constituted yet another form of institutionalised insecurity, but framed in a state-building and good governance framework. This article concludes that the enhanced functionality of the Palestinian Authority’s security forces and the reformed style of governance, resulted in the criminalisation of resistance against the Israeli occupation. In this way, the state-building project during the Fayyadism era directly and indirectly sustained the occupation. Conceptually, the Palestinian case demonstrates the fundamental flaws of conducting a security sector reform in the absence of sovereign authority and local ownership of the reform processes, and while living under a foreign military occupation

    The Ticker, April 9, 1997

    Full text link
    The Ticker is the student newspaper of Baruch College. It has been published continuously since 1932, when the Baruch College campus was the School of Business and Civic Administration of the City College of New York
    corecore