A good and scientific analysis starts with a closer look at the conceptualisation at hand. The definition of CIP is not easy because of its wide range. This paper examines infrastructures that are critical and need protection. Each word entails a specific connotation and is characterized by several components
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not properly addressed by organizations. We contribute to reverse this situation by introducing a framework composed of a method for identification and assessment of insider threat risks and of two supporting deliverables for awareness of insider threat. The deliverables are: (i) attack strategies structured in four decomposition trees, and (ii) a matrix which correlates defense strategies, attack strategies and control principles. The method output consists of goal-based requirements for the defense against insiders
A good and scientific analysis starts with a closer look at the conceptualisation at hand. The definition of CIP is not easy because of its wide range. This paper examines infrastructures that are critical and need protection. Each word entails a specific connotation and is characterized by several components
The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornishâs seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been applied in our community. The study provides evidence confirming that the approach is increasingly popular; and takes stock of crime scripting practices through a systematic review of over one hundred scripts published between 1994 and 2018. The results offer the first comprehensive picture of this approach, and highlights new directions for those interested in using data from cyber-systems and the Internet of Things to develop effective situational crime prevention measures
[Excerpt] I am pleased to submit this Semiannual Report to Congress, which highlights the most significant activities and accomplishments of the U.S. Department of Labor, Office of Inspector General (DOL-OIG), for the six-month period ending September 30, 2009. During this reporting period, our investigative work led to 214 indictments, 221 convictions, and 123.1millioninmonetaryaccomplishments.Inaddition,weissued22auditandotherreports.OIGauditsandinvestigationscontinuetoassesstheeffectiveness,efficiency,economy,andintegrityofDOLâsprogramsandoperations.Wealsocontinuetoinvestigatelaborracketeeringand/ororganizedcrimeinfluenceagainstunions,employeebenefitplans,andworkers.Fromanauditperspective,theOIGishighlyengagedinensuringtheintegrityofDOLactivitiesrelatedtotheAmericanRecoveryandReinvestmentActof2009(RecoveryAct)funding.Duringthisreportingperiod,weissuedfivereportstothatend.AmongourfindingsarethatDOLimplementedproceduresfortheaccountingofRecoveryActfinancialactivity,actedquicklytoimplementthepremiumâassistanceprovisionsforworkerswhotemporarilymaintaintheirhealthinsuranceatgroupratesafterlosingtheirjobs,andeffectivelyimplementedthetemporaryprogramforadditionalunemploymentcompensationforeligiblerecipients.Wealsoidentifiedareasforimprovementrelatedtofinancialandperformancereportingandprogrammaticcoordinationwithstates.AnauditfoundshortcomingswithDOLâsnewiCertsystem,whichisdesignedtoidentifyinaccuraciesinHâ1Blaborconditionapplications(LCAs)forforeignworkers.Wefoundthat,becauseofmissingelectronicchecks,manualreviewsoftheLCAsbyanalystsarenecessary.However,increasesinthevolumeofapplicationsmayresultinanalystsnotbeingabletoperforma100percentreview.ThisincreasestheriskofLCAsbeingimproperlycertified.OurauditsalsocontinuetorevealthatsomeJobCorpscentersdonotcomplywithrequirementsforreportingperformanceforstudentattendanceandaccountability.Wealsofoundthat,atthreecenters,acontractorhadnotensuredcompliancewithprocedurestoaddressstudentmisconduct.AnauditofthehandlingofinjuredFederalemployeesâreemploymentstatusattwoFederalworkersâcompensationdistrictofficesfoundthattheDepartmentdidnotensurethatconsistentinterventionactionsweretakentowardremovingcasesfromtheperiodicroll.ThisincreasedtheriskofclaimantscontinuingtoreceivefullFederalEmployeeâsCompensationActbenefitsaftertheywereabletoreturntoworkoraftertheircompensationcouldhavebeenreduced.Ourinvestigationscontinuetocombatorganizedcrimeand/orlaborracketeeringinvolvingthemoniesinunionâsponsoredbenefitplans,internalunioncorruption,andlaborâmanagementrelations.AmajorOIGinvestigationdisclosedmorethan30yearsoforganizedcrimecontroloftheInternationalLongshoremenâsAssociationLocal1235,whichrepresentsportworkersinNewJersey.Inanotherinvestigation,thebusinessmanagerfortheElectricalWorkersLocalUnionNo.3,whowasaformerNewYorkStateassemblyman,wassentencedto10yearsâimprisonmentonracketeering,bankfraud,andfalsestatementchargesinvolvinganumberofschemescarriedoutforpersonalgain.OIGinvestigationsalsoidentifiedvulnerabilitiesandfraudinDOLprograms,suchastheforeignlaborcertification(FLC)program.OneOIGinvestigationledtotherecentsentencingofViktarKrusandhiscoâconspiratorstovariousperiodsofincarcerationforfraudulentlyobtainingvisasformorethan3,800foreignnationalsanddefraudingthegovernmentof7.4 million in payroll taxes. Because of our investigative expertise, the OIG is a member of the International Organized Crime (IOC) strategy headed by the U.S. Attorney General. The IOC is committed to combating crime by international organized groups.
Finally, I would like to express my sincere gratitude to former DOL Inspector General Gordon S. Heddell, who is now serving as the Inspector General at the U.S. Department of Defense. During his leadership of more than eight years, the DOL-OIG consistently achieved significant results similar to those presented in this report. As Acting Inspector General, I look forward to continuing to work with the Secretary of Labor and her management team in ensuring the effectiveness of DOL in delivering services and protecting the rights and benefits of American workers and retirees
The World Economic Forum's Global Risks 2012 report is based on a survey of 469 experts from industry, government, academia and civil society that examines 50 global risks across five categories. The report emphasizes the singular effect of a particular constellation of global risks rather than focusing on a single existential risk. Three distinct constellations of risks that present a very serious threat to our future prosperity and security emerged from a review of this year's set of risks. Includes a special review of the important lessons learned from the 2011 earthquake, tsunami and the subsequent nuclear crisis at Fukushima, Japan. It focuses on therole of leadership, challenges to effective communication in this information age and resilient business models in response to crises of unforeseen magnitude
Expanding on the works of Beck and others on the growing business of risk, this paper examines the role of private industry in the creation, management and perpetuation of the world risk society. It observes that the replacement of the concept of security with risk over the past decades has permitted private firms to identify a growing range of unknown and unknown-unknown dangers which cannot be eliminated and require continuous risk management. Using the discourse of risk and its strategies of commercialized, individualized and reactive risk management, the private risk industry has thus contributed to the rise of a world risk society in which the demand for security can never be satisfied and so guarantees continuous profits