2,214 research outputs found

    ANTICORRUPTION NATIONAL SYSTEM: Model Whistleblowers direct citizen action against corruption in Mexico

    Get PDF
    The phenomenon of corruption is a cancer that affects our country and that it is necessary to eradicate; This dilutes the opportunities for economic and social development, privileging the single conjunction of particular interests, political actors in non-legal agreements for their own benefit, which lead to acts of corruption. Recent studies indicate that the level of corruption present in a political system is directly related to the type of institutional structure that defines it (Boehm and Lambsdorff, 2009), as well as the ineffectiveness of the control organisms (Casar, 2015; Cárdenas, 2010, Rojas, 2010, Carbonell, 2009, Restrepo, 2004), which requires citizen action to combat corruption (Sandoval, 2010, Villanueva, 2006). This work, focuses our attention on the federal public administration, presenting as a proposal to empower the citizen action in the fight against corruption and in the National Anticorruption System; the figure of Whistleblowers or generator of citizen alert, based on two fundamental principles: i) recognizing the citizen's obligation to report acts of corruption and ii) the granting by the authority of witness protection. These two actions will result in two important results: i) Consolidate the citizen's complaint to inform society about acts of corruption and ii) and the exercise of freedom of information so that society is able to be informed about acts of corruption. These actions will allow promoting and consolidating a culture of reporting acts of corruption that may constitute a crime as a fundamental pillar in the National Anticorruption System in Mexico

    Measuring Software Diversity, with Applications to Security

    Full text link
    In this work, we briefly introduce and discuss some of the diversity measures used in Ecology. After a succinct description and analysis of the most relevant ones, we single out the Shannon-Weiner index. We justify why it is the most informative and relevant one for measuring software diversity. Then, we show how it can be used for effectively assessing the diversity of various real software ecosystems. We discover in the process a frequently overlooked software monopoly, and its key security implications. We finally extract some conclusions from the results obtained, focusing mostly on their security implications.Comment: 10 pages, 5 figure

    Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES pada Smartphone

    Get PDF
    Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe. Cryptography supports the needs of two aspects of information security, namely secrecy (protection of the confidentiality of information data) and authenticity (protection against counterfeiting and changing unwanted information). Along with the development of computer technology, the world of information technology requires a stronger and safer cryptographic algorithm. Currently the Advanced Encryption Standard (AES) is used as the latest standard cryptographic algorithm. For this reason, it is necessary to prepare an application that can secure a data and maintain its confidentiality so that it is not known by unauthorized parties. One alternative that can be used in making a data security application is by applying the Advanced Encryption Standard (AES) algorithm. hence the design of a data security application on a smartphone by designing the application of encryption and description of text data using the AES method. This method does a round of 10 rounds to get the results of encryption and decryption in the text

    A Fuzzy approach based on dynamic programming and metaheuristics for selecting safeguards for risk management for information systems

    Get PDF
    In this paper we focus on the selection of safeguards in a fuzzy risk analysis and management methodology for information systems (IS). Assets are connected by dependency relationships, and a failure of one asset may affect other assets. After computing impact and risk indicators associated with previously identified threats, we identify and apply safeguards to reduce risks in the IS by minimizing the transmission probabilities of failures throughout the asset network. However, as safeguards have associated costs, the aim is to select the safeguards that minimize costs while keeping the risk within acceptable levels. To do this, we propose a dynamic programming-based method that incorporates simulated annealing to tackle optimizations problems

    SMALL AND MEDIUM-SIZED ENTITIES BETWEEN THE ACCRUAL BASIS OF ACCOUNTING AND CASH ACCOUNTING

    Get PDF
    Should revenue be recognized when generated or when ultimately collected by a company? Should expenses be recognized when incurred or when finally paid? The answers to these questions vary and are dependent or whether a entities employs the cash or accrual basis of accounting. The cash basis of accounting focuses on the cash flows connected with revenue and expenses. But the cash basis of accounting is criticized as not being in accord with economic reality. The accrual basis of accounting overcomes the chief limitation of the cash basis – a possible mismatch of revenue and expenses.Cash accounting, accrual bassis of accounting, IFRS Project,financial statements, cash-flow
    corecore