5 research outputs found
Living at the cutting edge: Women's experiences of protection orders. Volume 2: What's to be done? A critical analysis of statutory and practice approaches to domestic violence
This report examines the experiences of 43 MÄori, Pakeha, Pasifika and other ethnic minority women who were victims of male partner violence, the impact of the violence on them and their children, and their experiences of the justice system when they reached out for protection. The objectives of the project were to:
a.identify and describe the experiences of a sample of women in obtaining protection orders, the impact of protection orders and the response to breaches of protection orders;
b.identify those aspects that are working well (that is, positive experiences of protection orders); and
c.identify areas for improvement including barriers that prevent women from applying for and obtaining protection orders
Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
As companies are increasingly exposed to information security threats, decision makers are permanently forced to pay attention to security issues. Information security risk management provides an approach for measuring the security through risk assessment, risk mitigation, and risk evaluation. Although a variety of approaches have been proposed, decision makers lack well-founded techniques that (1) show them what they are getting for their investment, (2) show them if their investment is efficient, and (3) do not demand in-depth knowledge of the IT security domain. This article defines a methodology for management decision makers that effectively addresses these problems. This work involves the conception, design, and implementation of the methodology into a software solution. The results from two qualitative case studies show the advantages of this methodology in comparison to established methodologies
An evaluation of approaches adopted by various departments in implementing integrated risk management in the Eastern Cape provincial government.
Thesis (MBA)-University of KwaZulu-Natal, 2006.The current business environment demands a more integrated approach to risk
management due to the complex interrelationship and reliance across all divisions of an
organisation. It is no longer sufficient to manage risk by individual or functional area.
Organisations around the world now benefit from a more comprehensive approach to
dealing with all risks.
The study has been influenced by the Treasury Board of Canada Secretariat's (TBS)
Integrated Risk Management Framework (IRM). Its aim is to promote and increase
awareness of IRM across all departments in the Eastern Cape Provincial Government
(ECPG). The study establishes progress towards implementation of IRM. The research
scope covered thirteen government departments in the Eastern Cape. The study includes
researching recent best public and private integrated risk management practices, both
internationally and locally. The approach included development of a questionnaire on
best practices and on principles of Integrated Risk Management based on TBS Integrated
Risk Management Framework. Interviews were conducted and results documented to
understand perceptions of the adequacy of current risk information in various
departments and to discuss possible improvements to IRM. The process of collecting
data for this study allowed information sharing with each department regarding current
IRM Practices, and stimulated discussion on the nature and importance of IRM and
actions that could move IRM forward.
The research highlights key elements of IRM and establishes the progress by departments
in implementing these elements. It also focuses on techniques and approaches that are
used by the departments in dealing with IRM implementation. It uses Risk Management
Maturity Continuum developed by Deloitte & Touche to determine extend to which
departments have implemented their IRM.
Lastly, the study highlights tools and techniques for strengthening of implementation of
IRM based on best practices and conclude by making recommendations
Recommended from our members
Professionalsâ perceptions of young males in child sexual exploitation policy: a critical policy genealogical analysis
Background: The discourse on young males affected by or involved in child sexual exploitation (CSE) is often silenced due to the preoccupation with, and generally greater publicity of, female victims within professional practice, policy and research. Historical and contemporary CSE discourse is largely conceptualised through Feminism and Moral Panic Theory, enmeshed within a general reduction of available professional vocabulary in English child protection policy. This thesis aims to investigate these discourses.
Methodology: This research analyses CSE policy implementation between 2000 and 2016 with alternative social theories within a critical policy genealogy (CPG). The CPG considers Foucaultâs position of the âqualified speakersâ on childhood sexuality to identify the ethics of CSE policy enactment. Two specific methodologies are utilised to establish the discourse
and counter-discourse on multiple levels: a critical realist synthesis of CSE policy literature (n=44) and a Foucauldian-inspired discourse analysis of policy actors (n=18) in a geographically-defined case study.
Results: By bringing together the critical realist and Foucauldian-inspired datasets, the CPG presents six discourse norm circles (Elder-Vass 2011, 2012) involved in CSE policy enactment: political influences; visibility / surveillance; the construction of the âperfect victimâ; inclusivity for young males; local governance; and championing the specialist / minority voice. CSE
policy is understood, experienced and perceived inconsistently by policy enactors across a range of fields, however those within the voluntary sector are key to developing better understandings of the realities of young males.
Conclusions: Policy enactors are stuck in a constant negotiating position, or dance, between co-existing realities of CSE presented by government policy and its implementation. They have to try to make sense of these dances of power (dynamism) by attempting to implement, whilst simultaneously adapting policy expectations to accommodate CSE victims. It is only through this dynamism, however, a new knowledge on young males can be revealed