823,797 research outputs found
Strengthening Data Security: an Holistic Approach
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards the construction of firm and resilient data and information security policies within the social science data archiving communities. While international standards can provide theoretical guidelines for the construction of such a policy, procedures need to be informed by more practical considerations. Attention is drawn to the necessity of following a holistic approach to data security, which includes the education of data creators in the reduction of disclosure risk, the integration of robust and appropriate data processing, handling and management procedures, the value of emerging technological solutions, the training of data users in data security, and the importance of management control, as well as the need to be informed by emerging government security and digital preservation standards
Impact of Accounting Information System on Performance of Vietnamese Construction Enterprises
Purpose: The article analyzes the impact of the accounting information system on the performance of Vietnamese construction enterprises, providing more empirical evidence on the impact of the accounting information system to the performance of Vietnamese construction enterprises.
Â
Theoretical framework: This paper uses Organizational information processing theory, Situation theory, System Theory.
Â
Design/Methodology/Approach: The research method uses a questionnaire survey of accountants, chief accountants, business managers. Firm Performance, AIS Availability, AIS Security and Integrity, AIS Confidentiality and Privacy, AIS System Quality measured on a five-point Likert scale Very good, good, moderate, not good, weak.
Â
Findings: Research results show that AIS Availability, AIS Security and Integrity, AIS Confidentiality and Privacy, AIS System Quality has a positive impact on the performance of Vietnamese construction enterprises.
Â
Research, Practical  &  Social  implications: Based on the research results, the author has proposed recommendations to improve the performance of construction enterprises in Vietnam.
Â
Originality/Value: This study fills the gap in the the the impact of the accounting information system on the performance of Vietnamese construction enterprises
Audit Games with Multiple Defender Resources
Modern organizations (e.g., hospitals, social networks, government agencies)
rely heavily on audit to detect and punish insiders who inappropriately access
and disclose confidential information. Recent work on audit games models the
strategic interaction between an auditor with a single audit resource and
auditees as a Stackelberg game, augmenting associated well-studied security
games with a configurable punishment parameter. We significantly generalize
this audit game model to account for multiple audit resources where each
resource is restricted to audit a subset of all potential violations, thus
enabling application to practical auditing scenarios. We provide an FPTAS that
computes an approximately optimal solution to the resulting non-convex
optimization problem. The main technical novelty is in the design and
correctness proof of an optimization transformation that enables the
construction of this FPTAS. In addition, we experimentally demonstrate that
this transformation significantly speeds up computation of solutions for a
class of audit games and security games
Research on the Realization Path of Intelligent Logistics in the âNew Retailâ Era
New retail is the product of innovation and transformation of e-commerce, physical retail and modern logistics. New retail relies on omni-channel logistics based on supply chain integration, order-driven precise logistics service and high intensity urban distribution carrying capacity, which has brought huge impacts and development opportunities to the logistics industry. At present, there are limitations in China\u27s intelligent logistics, both in terms of logistics infrastructure construction, logistics information services, and regulatory guarantee systems, which restrict the development of new retail . In order to realize the high-quality support of new retail by intelligent logistics, a trinity of intelligent logistics construction path of government guidance, market leadership, and social co-governance is proposed. We should accelerate the construction of intelligent logistics infrastructure under the guidance of the government, give full play to the leading role of the market to build an intelligent logistics information platform, and build a multi-security logistics security system through joint governance of all sectors of society to meet the overall objective of the high-quality support of logistics for new retail
Beacon Light: February
Photos from the Convent construction Sister Jameen Administrator column on the value of teamwork retirement program changes Biographies on Dr. J. Weston Smith, Dr. Stephen Sommers, Dr. William C. Randall, Dr. Clifford Stiles Profile on Reinhard Gohl Ashot Y. Carapet an Iranian x-ray Technion, observes an equipment installation Social Security Information Medical Record Department profil
Research on Application of Cloud Computing Based University Education Informationization
With the development of information age and technological means, peopleâs production and life, way of thinking and working concept are gradually changing. Cloud computing has become one of the hottest topics in the world. Cloud computing based on efficient computing power, scalable storage capacity and high security has become a new favorite in all walks of life. Chinese university information construction should also seize the opportunity to fully combine the advantages of cloud computing technology to strengthen the university campus network construction, enhance the integration of educational resources and promote information sharing. By combining cloud computing technology to expand network cloud service platform, Chinese universities education has greater space for development. Thus, it is an inevitable trend to apply cloud computing technology to Chinese university informationization construction. Based on the above purpose, this paper will start from the technical summary behind cloud computing technology, in-depth analysis and computing technology definition and characteristics. By exploring the application and existing problems of cloud computing technology in university information construction, this paper provides new ideas for university information construction development. This improves the overall development level of education industry, colleges and universitiesâ social influence and credibility
The Heartbleed bug : insecurity repackaged, rebranded and resold
The emergence of a post-industrial information economy shaped by and around networked communication technology has presented new opportunities for identity theft. In particular, the accidental leakage or deliberate harvesting of information, via either hacking or social engineering, is an omnipresent threat to a large number of commercial organisations and state agencies who manage digital databases and sociotechnical forms of data. Throughout the twenty-first century the global media have reported on a series of data breaches fuelling amongst the public an anxiety concerning the safety and security of their personal and financial data. With concern outpacing reliable information a reassurance gap has emerged between the public's expectations and the state's ability to provide safety and security online. This disparity presents a significant opportunity for a commercial computer crime control industry who has sought to position itself as being able to offer consumer citizens the antidotes for such ills. This paper considers how neoliberal discourses of cybercrime control are packaged, branded and sold, through an examination of the social construction of the Heartbleed bug. It demonstrates how security company Codenomicon masterfully communicated the vulnerability, the product of a simple coding error, through its name, a logo and an accompanying website, in turn, shaping news coverage across the mainstream media and beyond
Decent work in construction and the role of local authorities the case of Bulawayo city, Zimbabwe.
The role of local authorities in promoting decent work is little understood and has been absent from both policy and practice (GIAN, 2005). The purpose of this interdisciplinary study was to identify and describe the existing and potential roles of Bulawayo City in fostering decent work in the construction sector, urban development and related services through policy making, strategic planning and project activities. The study outcomes will contribute to the shared knowledge among local authorities and other stakeholders at the local and international levels. Bulawayo is Zimbabweâs second largest urban settlement with a 2002 population close to 700 000 i.e. 6% of the national population or 20% of the urban population (CSO, 2002:21), a budget of Z2.5 billion in 2000 and Z$797 billion in 20051. The research team collected national and local level secondary data on decent work variables with a view to compile decent work indicators to help compare Bulawayo City against national and global conditions. Such data was sought from the Central Statistical Office (CSO), the National Social Security Authority (NSSA), employer and worker organisations, construction firms, research institutions and Bulawayo City itself. Key informants in all these institutions were interviewed using a semi-structured questionnaire and grey literature related to decent work was identified and collected where feasible. While Zimbabwe is not âstatistics poorâ, statistics collected from the institutions cited above are not in formats suitable to answer descent work questions. The political-economic crisis in the country and in particular the governmentâs frosty relations with the UK, the EU the USA and the white Commonwealth (GoZ, 2005: 25c), have compounded conditions of insecurity for most institutions and individuals; making even the release to outsiders of routine administrative information for research purposes a sensitive affair. Increasingly, key informants were not prepared to release information unless there was a direct financial benefit to themselves or their organisations. It is in this context of economic crisis and tense relations that some in the west have expressed doubts regarding the accuracy of employment, economic and population statistics; alleging that these are manipulated to suit the ruling party. Further, high population movements and the âinformalizationâ of the economy since mid 1990s have left significant socio-economic activities outside the data frameworks of institutions such as the CSO and NSSA. Thus lack of informal sector data is the main limitation of this study. The above obstacles not withstanding, the study compiled reasonable information with detailed data on the social security, social dialogue, health and safety and Bulawayo Cityâs efforts at strategic planning and local economic development. The term âdecent workâ was neither known nor used by a majority of the key informants in this study. In general, while the statutory provisions for decent work promotion are sound, in practice the economic crisis has compromised efforts to create and stabilise employment, has poisoned the climate of social dialogue, eroded the value of pensions and benefits and heightened the risks of accidents at work. Except in its areas of direct jurisdiction, Bulawayo City has not played significant roles in promoting social dialogue and social security - issues that are the domain of national authorities. But it has been exemplary in its strategic planning efforts, partnerships, promotion of equality and indigenisation, employment creation, training and education. Employment conditions in Bulawayo are characterised by an acute economic climate that has led to decreasing numbers of jobs since the 1990s in many sectors including the construction sector. The informal sector which had created many jobs during this period is struggling to survive and was disrupted by the 2005 government operation to clear informal enterprises and settlements.
Recommended from our members
MODERN CRYPTOGRAPHY
We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers.
An extremely important algorithm in today\u27s practice is the Advanced Encryption Standard (AES), which is used by our very own National Security Agency (NSA) for data up to TOP SECRET. Another frequently used cipher is the RSA cryptosystem. Its security is based on the concept of prime factorization, and the fact that it is a hard problem to prime factorize huge numbers, numbers on the scale of 2^{2048} or larger. Cryptanalysis, the study of breaking ciphers, will also be studied in this paper. Understanding effective attacks leads to understanding the construction of these very secure ciphers
Leading Sector Analysis in Gunung Mas Regency
This study aims to find out which economic sectors are the leading sectors in Indonesia, to know the structure of the regional economy, to find out the development of the leading economic sectors and to find out which sectors have potential sectors in Gunung Mas Regency. The analysis tools used are Location Quotient Analysis, Shift Share, Klassen Typology and Growth Ratio Model. From the results of the analysis it can be concluded from the four analytical tools: (1) the results of the Location Quotient analysis, namely the Agriculture, Forestry and Fisheries Sector, the Construction Sector, the Food and Drink Accommodation Provision Sector, the Information and Communication Sector, the Real Estate Sector, the Service Sector Companies, the Government Administration Sector, Defense and Compulsory Social Security, the Education Services Sector, and the Health Services and Social Activities Sector which are the leading economic sectors in Gunung Mas Regency, Central Kalimantan Province. (2) The results of the Shift Share analysis are that there is no shift in the economic structure in Gunung Mas Regency. (3) The results of the Klassen Typology, namely the Advanced and Rapidly Growing Sector (Quadrant I) in Gunung Mas Regency are the Agriculture, Forestry and Fisheries Sector, the Mining and Quarrying Sector, the Construction Sector and the Information and Communication Sector. (4) The results of the analysis of the Growth Ratio Model, that the Potential sector is the Wholesale and Retail Trade Sector; Car and Motorcycle Repair, Real Estate Sector, Government Administration Sector, Defense and Compulsory Social Security, Health Services and Social Activities Secto
- âŠ