2,214 research outputs found
ANTICORRUPTION NATIONAL SYSTEM: Model Whistleblowers direct citizen action against corruption in Mexico
The phenomenon of corruption is a cancer that affects our country and that it is
necessary to eradicate; This dilutes the opportunities for economic and social
development, privileging the single conjunction of particular interests, political actors in non-legal agreements for their own benefit, which lead to acts of corruption. Recent
studies indicate that the level of corruption present in a political system is directly
related to the type of institutional structure that defines it (Boehm and Lambsdorff,
2009), as well as the ineffectiveness of the control organisms (Casar, 2015; Cárdenas,
2010, Rojas, 2010, Carbonell, 2009, Restrepo, 2004), which requires citizen action to
combat corruption (Sandoval, 2010, Villanueva, 2006). This work, focuses our attention
on the federal public administration, presenting as a proposal to empower the citizen
action in the fight against corruption and in the National Anticorruption System; the
figure of Whistleblowers or generator of citizen alert, based on two fundamental
principles: i) recognizing the citizen's obligation to report acts of corruption and ii) the
granting by the authority of witness protection. These two actions will result in two
important results: i) Consolidate the citizen's complaint to inform society about acts of
corruption and ii) and the exercise of freedom of information so that society is able to be informed about acts of corruption. These actions will allow promoting and
consolidating a culture of reporting acts of corruption that may constitute a crime as a
fundamental pillar in the National Anticorruption System in Mexico
Measuring Software Diversity, with Applications to Security
In this work, we briefly introduce and discuss some of the diversity measures
used in Ecology. After a succinct description and analysis of the most relevant
ones, we single out the Shannon-Weiner index. We justify why it is the most
informative and relevant one for measuring software diversity. Then, we show
how it can be used for effectively assessing the diversity of various real
software ecosystems. We discover in the process a frequently overlooked
software monopoly, and its key security implications. We finally extract some
conclusions from the results obtained, focusing mostly on their security
implications.Comment: 10 pages, 5 figure
Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES pada Smartphone
Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe. Cryptography supports the needs of two aspects of information security, namely secrecy (protection of the confidentiality of information data) and authenticity (protection against counterfeiting and changing unwanted information).
Along with the development of computer technology, the world of information technology requires a stronger and safer cryptographic algorithm. Currently the Advanced Encryption Standard (AES) is used as the latest standard cryptographic algorithm. For this reason, it is necessary to prepare an application that can secure a data and maintain its confidentiality so that it is not known by unauthorized parties. One alternative that can be used in making a data security application is by applying the Advanced Encryption Standard (AES) algorithm. hence the design of a data security application on a smartphone by designing the application of encryption and description of text data using the AES method. This method does a round of 10 rounds to get the results of encryption and decryption in the text
A Fuzzy approach based on dynamic programming and metaheuristics for selecting safeguards for risk management for information systems
In this paper we focus on the selection of safeguards in a fuzzy risk analysis and management methodology for information systems (IS). Assets are connected by dependency relationships, and a failure of one asset may affect other assets. After computing impact and risk indicators associated with previously identified threats, we identify and apply safeguards to reduce risks in the IS by minimizing the transmission probabilities of failures throughout the asset network. However, as safeguards have associated costs, the aim is to select the safeguards that minimize costs while keeping the risk within acceptable levels. To do this, we propose a dynamic programming-based method that incorporates simulated annealing to tackle optimizations problems
SMALL AND MEDIUM-SIZED ENTITIES BETWEEN THE ACCRUAL BASIS OF ACCOUNTING AND CASH ACCOUNTING
Should revenue be recognized when generated or when ultimately collected by a company? Should expenses be recognized when incurred or when finally paid? The answers to these questions vary and are dependent or whether a entities employs the cash or accrual basis of accounting. The cash basis of accounting focuses on the cash flows connected with revenue and expenses. But the cash basis of accounting is criticized as not being in accord with economic reality. The accrual basis of accounting overcomes the chief limitation of the cash basis – a possible mismatch of revenue and expenses.Cash accounting, accrual bassis of accounting, IFRS Project,financial statements, cash-flow
- …
