7,960 research outputs found

    Opnet, Arne, and the Classroom

    Get PDF
    This paper examines OPNET Technology, Inc\u27s management programs, and Regis University\u27s Academic Research Network (ARNe) needs to find out which OPNET programs can meet the needs of ARNe. The method used was to examine ARNe\u27s needs, and research Microsoft\u27s SMF/MOF management framework, research OPNET\u27s program and module offerings, research OPNET\u27s University Program, and research how OPNET\u27s programs are used at some other universities. The research was used to create a match up between Microsoft\u27s Service Management Functions and OPNET\u27s programs and modules. And it was used to create a list of textbooks, labs, and lab manuals that would work with OPNET\u27s IT Guru and Modeler in a classroom to help teach networking theory. The examination was combined with the research to create an evaluation criteria matrix from which project recommendations could be drawn. The conclusion was that the following OPNET Technology programs and modules could be of benefit to Regis University\u27s ARNe - ACE, Automation module, Commander, DAC module, Flow Analysis module, IT Sentinel, IT Guru, NetDoctor, Report Server, and VNE Server

    Security through aid: countering violent extremism and terrorism with Australia’s aid program

    Get PDF
    Overview This paper argues that countering violent extremism (CVE) and terrorism are international security and development issues. Australia’s foreign aid should be used to strengthen resilience to violent extremist ideologies. Improving governance in weak states can help to deny terrorists the easy recruiting grounds of lawless communities. The ASPI report argues that there are several ways to better leverage our foreign aid program to counter terrorism and violent extremism. Where a clear need has been identified, implement direct CVE aid programs Apply a CVE and counter-terrorism ‘filter’ to our aid programs Develop targeted reporting on CVE aid programs Use InnovationXchange to explore avenues for implementing CVE into the aid strategy Share information on CVE and aid Lead the debate to modernise official development assistance (ODA) reportin

    Five steps to smarter multi-bi aid: a new way forward for earmarked finance

    Get PDF
    Multi-bi aid – donor contributions to multilateral organisations earmarked for specific purposes – is an important channel for financing development, and is expected to grow. Yet multi-bi aid poses significant challenges for both multilateral and bilateral actors, including lack of alignment with recipient-country priorities, aid fragmentation, and increased transaction costs. This report explores the potential for smart reforms of multi-bi aid. A five-step plan to improve multi-bi aid requires: better data-access and management; recovering the full economic cost of earmarking; fee structures for improving impact; stronger internal rules to curb fragmentation; and better country ownership and participation. These reforms can make multi-bi aid more effective and efficient while enhancing its legitimacy in the eyes of recipients

    The Role of Transportation in Campus Emergency Planning, MTI Report 08-06

    Get PDF
    In 2005, Hurricane Katrina created the greatest natural disaster in American history. The states of Louisiana, Mississippi and Alabama sustained significant damage, including 31 colleges and universities. Other institutions of higher education, most notably Louisiana State University (LSU), became resources to the disaster area. This is just one of the many examples of disaster impacts on institutions of higher education. The Federal Department of Homeland Security, under Homeland Security Presidential Directive–5, requires all public agencies that want to receive federal preparedness assistance to comply with the National Incident Management System (NIMS), which includes the creation of an Emergency Operations Plan (EOP). Universities, which may be victims or resources during disasters, must write NIMS–compliant emergency plans. While most university emergency plans address public safety and logistics management, few adequately address the transportation aspects of disaster response and recovery. This MTI report describes the value of integrating transportation infrastructure into the campus emergency plan, including planning for helicopter operations. It offers a list of materials that can be used to educate and inform campus leadership on campus emergency impacts, including books about the Katrina response by LSU and Tulane Hospital, contained in the report®s bibliography. It provides a complete set of Emergency Operations Plan checklists and organization charts updated to acknowledge lessons learned from Katrina, 9/11 and other wide–scale emergencies. Campus emergency planners can quickly update their existing emergency management documents by integrating selected annexes and elements, or create new NIMS–compliant plans by adapting the complete set of annexes to their university®s structures

    Financing the Post-2015 Sustainable Development Goals: A Rough Roadmap

    Get PDF
    We regroup the main types of global development finance into three clusters: concessional public finance (including domestic taxes), public borrowing on market-related terms, and private finance. We look at the main purposes they can be used for, and their interdependence. We consider the global outlook for capital markets, the determinants of country creditworthiness and why grant aid should be prioritised for less creditworthy countries. We suggest that financing plans for most of the new Sustainable Development Goals should be developed at the country level rather than globally, so that key trade-offs can be fully explored. We look at specific policies to unlock access to private sector participation in five key areas -- including social services. We introduce a Market Aid Index to help track donor engagement with the private sector. We investigate how a country's mix of development finance changes as it grows -- the so-called 'missing middle' dilemma. We find that public resources overall fall continuously until a country is well into middle income status, as international assistance falls faster than tax revenues rise. Static per capita income thresholds are becoming increasingly unreliable guides to resource allocation. We look at alternative groupings, especially taking into account fiscal capacity, creditworthiness and vulnerability. We assess the recent literature on trade-offs between rapid growth and climate change mitigation imperatives. We examine the geography of public climate finance, which is intrinsically different from that of development aid, and the lack of a credible 'additionality' test for funding the former over and above the latter. We therefore consider how the limited public grant element so far available should best be rationed, to limit the scope for distortions. We revisit the role of the multilateral development banks' market-related windows, in view of the missing middle problem. We consider what factors underpin their secular stagnation, and how to overcome them. We summarise other specific international reform options in response to our analysis, on private sector contributions, market-related lending and climate finance. We conclude by contrasting two alternative world views: (1) making international public finance a complement to private finance everywhere, and (2) deliberately focusing public stakes where the private sector is not present. We suggest a way forward

    A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC

    Get PDF
    Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects\u27 roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as one complemented policy. In addition, Duties Separation and Data Coloring (DSDC)-MAC model applying new data coloring security method is proposed to enable granular access control from the viewpoint of Segregation of Duty (SoD). The case study demonstrated that the proposed modeling work maintains the practicality through the design of Human Resources management System. The proposed model in this study is suitable for organizations like military forces or intelligence agencies where confidential information should be carefully handled. Furthermore, this model is expected to protect systems against malicious insiders and improve the confidentiality and integrity of data

    A Sustainable Approach to Security and Privacy in Health Information Systems

    Get PDF
    This paper identifies and discusses recent information privacy violations or weaknesses which have been found in national infrastructure systems in Australia, the United Kingdom (UK) and the United States of America (USA), two of which involve departments of health and social services. The feasibility of health information systems (HIS) based upon intrinsically more secure technological architectures than those in general use in today\u27s marketplace is investigated. We propose a viable and sustainable IT solution which addresses the privacy and security concerns at all levels in HIS with a focus on trustworthy access control mechanisms

    Aid Financing of Global Public Goods: an Update

    Get PDF
    The paper compares different aggregates of aid financed global public goods and detects the presence, for the period 1995-2006, of the substitution effect between these aggregates and traditional aid that was found by former studies for earlier periods. A second focus of the paper is on the differences in the importance that donors attach to the various types of global public goods, trying to detect regular patterns in their choices of financing. Statistical regularities, representative of common historical, social, cultural factors, for groups of countries (Anglo-Saxon, Northern European and Central European) give rise to the existence of a certain clusterized homogeneity in global public goods financing. Potential explanatory variables are examined in a panel analysis, which reveals the dominance of the donors’ wealth, preferences for public goods and public finance constraints in the decision of aid funding of global public goods. Finally, there is evidence that some global public goods with weakest-link technologies have become increasingly important at the global level. The increase in their financing through aid flows could be explained by the rich countries’ fear of an insufficient provision by poor countries, which, increasingly, cannot afford to pay for them: rich countries are therefore stepping in to avoid sub-optimal levels of provision, as already foreseen by Sandler (1998).Foreign aid, Global public goods
    • 

    corecore