51,391 research outputs found

    Poor Philanthropist II: New approaches to sustainable development

    Get PDF
    The second title in the Poor Philanthropist Series, this monograph represents the culmination of a six-year journey; a journey characterised in the first three years by in-depth qualitative research which resulted in an understanding of philanthropic traditions among people who are poor in southern Africa and gave rise to new and innovative concepts which formed the focus of the research monograph The Poor Philanthropist: How and Why the Poor Help Each Other, published by the Southern Africa-United States Centre for Leadership and Public Values in 2005

    Audit risk alert - 2001/02; Audit risk alerts

    Get PDF
    https://egrove.olemiss.edu/aicpa_indev/1636/thumbnail.jp

    Obligations of trust for privacy and confidentiality in distributed transactions

    Get PDF
    Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation of trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating parties to dynamically exchange their privacy and authorization requirements and capabilities, which the authors term a notification of obligation (NoB), as well as their commitments to fulfilling each other's requirements, which the authors term signed acceptance of obligations (SAO). The authors seek to describe some applicability of these concepts and to show how they can be integrated into distributed authorization systems for stricter privacy and confidentiality control. Design/methodology/approach – Existing access control and privacy protection systems are typically unilateral and provider-centric, in that the enterprise service provider assigns the access rights, makes the access control decisions, and determines the privacy policy. There is no negotiation between the client and the service provider about which access control or privacy policy to use. The authors adopt a symmetric, more user-centric approach to privacy protection and authorization, which treats the client and service provider as peers, in which both can stipulate their requirements and capabilities, and hence negotiate terms which are equally acceptable to both parties. Findings – The authors demonstrate how the obligation of trust protocol can be used in a number of different scenarios to improve upon the mechanisms that are currently available today. Practical implications – This approach will serve to increase trust in distributed transactions since each communicating party receives a difficult to repudiate digitally signed acceptance of obligations, in a standard language (XACML), which can be automatically enforced by their respective computing machinery. Originality/value – The paper adds to current research in trust negotiation, privacy protection and authorization by combining all three together into one set of standardized protocols. Furthermore, by providing hard to repudiate signed acceptance of obligations messages, this strengthens the legal case of the injured party should a dispute arise

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    Audit risk alert - 2001/02; Audit risk alerts

    Get PDF
    https://egrove.olemiss.edu/aicpa_indev/1636/thumbnail.jp

    E-business industry developments - 2001/02; Audit risk alerts

    Get PDF
    https://egrove.olemiss.edu/aicpa_indev/1695/thumbnail.jp

    Channel Choice Determinants; an exploration of the factors that determine the choice of a service channel in citizen initiated contacts

    Get PDF
    Citizens have various service channels at their disposal to interact with governmental agencies. In this paper we explore citizens’ motives to choose a certain channel in a certain situation. We conducted a qualitative study to accumulate the most important behavioral determinants. Six groups of determinants were found; habit, channel characteristics, task characteristics, situational constraints, experiences and personal characteristics. People appear to generally follow two lines of decision making when choosing channels, the first is based on habits. When task complexity and ambiguity increase, people start reasoning and follow the second line; channel choice based on a thorough elaboration between task and channel characteristics

    Ready for Tomorrow: Demand-Side Emerging Skills for the 21st Century

    Get PDF
    As part of the Ready for the Job demand-side skill assessment, the Heldrich Center explored emerging work skills that will affect New Jersey's workforce in the next three to five years. The Heldrich Center identified five specific areas likely to generate new skill demands: biotechnology, security, e-learning, e-commerce, and food/agribusiness. This report explores the study's findings and offers recommendations for improving education and training in New Jersey

    E-business industry developments - 2001/02; Audit risk alerts

    Get PDF
    https://egrove.olemiss.edu/aicpa_indev/1695/thumbnail.jp

    High-technology industry developments - 2001/02; Audit risk alerts

    Get PDF
    https://egrove.olemiss.edu/aicpa_indev/1111/thumbnail.jp
    • …
    corecore