52,498 research outputs found

    Holding Government to Account -- Advocacy in an Emerging Democracy: The Story of Black Sash

    Get PDF
    Describes the evolution and structure of a South African human rights organization's best practice advocacy model, which combines legislative lobbying, submission, litigation, monitoring, rights-based public education, legal advice, and trends analysis

    Knowledge based entrepreneurship in the Czech Republic and Hungary: results from 4 case studies

    Get PDF
    This paper describes knowledge based entrepreneurship in the Czech Republic and Hungary, in particular the growth and development process of 4 firms are studied: Dekonta, an environmental services firm, Et netera, an IT services firm, both operating in Czech Republic, along with a data recovery firm, Kurt, and a biopharmaceutical firm, Solvo, both operating in Hungary. The objectives of the case studies are to illustrate experiences of knowledge based entrepreneurship within a transition environment in terms of their different growth and development paths. By carrying out in depth case studies using semi structured interviews with the founders, top management teams, core employees and key stakeholders in industrial associations I am able to explain the growth process of entrepreneurial knowledge based ventures. I assume an ecological view of the firm and examine the role of internal, strategic, network and external factors in this development process. I propose that the relative importance of these factors evolve over time from start up to maturity. Moreover, I anticipate that there will be complementarities between these factors in the spirit of Milgrom and Roberts (1995) and Von Tunzelmann (2003). This approach should help us better understand the complex nature of entrepreneurship. The key contributions of these case studies are the application of an ecological conceptual framework to the development of knowledge based firms in Central and Eastern Europe, and so the viability of this model is tested within the transition environment. I follow the recommendations by Ireland et al. (2005) and introduce a temporal element in order to analyse the shift in importance of the factors impacting on firm development and growth, thus hoping to deal with some of the criticisms on existing entrepreneurial research

    CRC for Construction Innovation : annual report 2008-2009

    Get PDF

    Criminal networks, illegal immigration and the threat to border security

    Get PDF
    ABSTRACT This paper considers some of the challenges posed to law enforcement agencies in post

    Information security risk management in the South African small, medium and micro enterprise environment

    Get PDF
    The small, medium and micro enterprise (SMME) environment of South Africa contributes 42% to the national gross domestic product. This is a high number for a largely under-regulated environment. The corporate governance and IT governance standards that apply to South African companies are not feasible for SMMEs, and neither are they enforced, although 80% of failures of SMMEs are attributable to lack of enterprise management skill. The first objective of this dissertation is to examine the South African SMME, and in so doing determine whether local regulatory standards can be used for this unique enterprise formation. The second objective of this dissertation is to determine whether international methodologies for information security risk management, as an inclusive of IT governance, may be used in the unique local SMME formation. The result of these two objectives creates a gap in a typical information security risk management methodology that is suitable for the South African regulatory and economic environment for SMMEs. A model has been created as a possible answer for filling the gap. The dissertation includes the Peculium Model, which answers the regulatory and economic requirements that resulted from the second objective. The Model allows the small enterprise a simple but effective method for managing risks to its information assets, with the control of corporate governance and IT governance included in its framework. The Model answers the methods for identifying and assessing risk in a tradition-based but feasible new qualitative technique.Labuschagne, L., Prof

    How can SMEs benefit from big data? Challenges and a path forward

    Get PDF
    Big data is big news, and large companies in all sectors are making significant advances in their customer relations, product selection and development and consequent profitability through using this valuable commodity. Small and medium enterprises (SMEs) have proved themselves to be slow adopters of the new technology of big data analytics and are in danger of being left behind. In Europe, SMEs are a vital part of the economy, and the challenges they encounter need to be addressed as a matter of urgency. This paper identifies barriers to SME uptake of big data analytics and recognises their complex challenge to all stakeholders, including national and international policy makers, IT, business management and data science communities. The paper proposes a big data maturity model for SMEs as a first step towards an SME roadmap to data analytics. It considers the ‘state-of-the-art’ of IT with respect to usability and usefulness for SMEs and discusses how SMEs can overcome the barriers preventing them from adopting existing solutions. The paper then considers management perspectives and the role of maturity models in enhancing and structuring the adoption of data analytics in an organisation. The history of total quality management is reviewed to inform the core aspects of implanting a new paradigm. The paper concludes with recommendations to help SMEs develop their big data capability and enable them to continue as the engines of European industrial and business success. Copyright © 2016 John Wiley & Sons, Ltd.Peer ReviewedPostprint (author's final draft

    IASME: Information Security Management Evolution for SMEs

    Get PDF
    Most of the research in information risk and risk management has focused on the needs of larger organisations. In the area of standards accreditation, the ISO/IEC 27001 Information Risk Management standard has continued to grow in acceptance and popularity with such organisations, although not to a significant extent with SMEs. An interesting product recently developed for ENISA (European Nations Information Security Association) based on the Carnegie-Mellon maturity model and aimed at SMEs has not so far filled the gap. In this paper, a researcher and two practitioners from the UK discuss an innovative development in the UK for addressing the information assurance needs of smaller organisations. They also share their perceptions about the security of national information infrastructures, and concerns that SMEs do not get the priority that their position in the supply chain would suggest they should have. The authors also explore the development and roll out of IASME (Information Assurance for SMEs), which they have developed in the context of a tight market, where spare cash is in short supply, and many SMEs are still in survival mode. The question for the business is therefore not seen as “can we afford to spend on information security” but “can we afford not to spend…” As well as the effect on being able to do business at all of having an SMEs systems compromised, there are also matters of reputation, and the growing threat of fines as a result of not complying with laws and regulations. The paper concludes with achievements of real businesses using the IASME process to cost-effectively achieve information assurance levels appropriate for themselves
    • …
    corecore