112,030 research outputs found

    Attributed Metagraph Modelling to Design Business Process Security Management

    Get PDF
    Cross organizational process flow is having increasing importance as organizational focus is on offshoring & outsourcing to develop complex business processes. Utilizing the development of telecommunications frameworks, IT systems are fundamental to collaborating and distributing business processes for both internal as well as external business units. But, this increased dependency exists in an ecosystem of increasing threats to information security along with market sensitivity and regulatory power. Based on recent process flow studies, we explore application of attributed metagraph representation to evaluate process security. Utilizing examples of both risk-analysis and impactmitigation, we reveal the effectiveness of attributed metagraph for business process analysis. Metagraph-based model helps in analysis of as-is processes as well as offers normative direction for process remodelling

    Submission to the Attorney-General’s Department on the Exposure Draft Telecommunications and Other Legislation Amendment Bill 2015

    Get PDF
    EXECUTIVE SUMMARY As has been stated in previous submissions to Government, the Associations acknowledge Government’s desire to protect telecommunications infrastructure and the information transmitted across it from unauthorised access and interference. Indeed, Australian Carriers, Carriage Service Providers and Carriage Service Intermediaries (C/CSPs) and other industry participants have an active and vested interest in ensuring that the nation’s networks and communications infrastructure are robust and resistant to external attack. Industry is, however, unable to support the proposed Telecommunications Sector Security Reform (TSSR), as described in the exposure draft legislation, for reasons including that it constitutes regulatory ‘over-reach’ in the form of a framework that: will face challenges protecting communications networks, i.e. it will not deliver the increased protection the proposed reforms are aiming to achieve; is out of step with regulatory approaches to protecting networks adopted in other countries, including the UK, USA and Canada, thereby putting Australia at a disadvantage in fighting cyber threats and undermine Industry’s ability to support these important peers; hands unjustifiably significant additional and intrusive powers to Government and places regulatory burdens on Industry that will undermine its ability to protect against and respond to cyber attacks; risks being highly disruptive to the deployment of new network technologies that are more robust in preventing cyber attacks; will be a significant deterrent to technological investment in Australia; imposes additional costs on Industry and (ultimately) consumers undermining Australia’s competitiveness at a time when digital innovation is an important area for growth for Australia; fails to offer protection/indemnity to C/CSPs against the risk of civil litigation through ‘safe harbours’, thereby limiting information sharing and the ability to quickly respond to threats and to jointly engage in preventative action; carries the risk that competition in infrastructure supply will be reduced, to the detriment of all Australians; lacks transparency; and fails to provide adequate consultative mechanisms and avenues of appeal

    Managing ubiquitous eco cities: the role of urban telecommunication infrastructure networks and convergence technologies

    Get PDF
    A successful urban management system for a Ubiquitous Eco City requires an integrated approach. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated, transparent and open decision making mechanism and necessary infrastructure and technologies. Rapidly developing information and telecommunication technologies and their platforms in the late 20th Century improves urban management and enhances the quality of life and place. Telecommunication technologies provide an important base for monitoring and managing activities over wired, wireless or fibre-optic networks. Particularly technology convergence creates new ways in which the information and telecommunication technologies are used. The 21st Century is an era where information has converged, in which people are able to access a variety of services, including internet and location based services, through multi-functional devices such as mobile phones and provides opportunities in the management of Ubiquitous Eco Cities. This paper discusses the recent developments in telecommunication networks and trends in convergence technologies and their implications on the management of Ubiquitous Eco Cities and how this technological shift is likely to be beneficial in improving the quality of life and place. The paper also introduces recent approaches on urban management systems, such as intelligent urban management systems, that are suitable for Ubiquitous Eco Cities

    The ECHELON Trail: An Illegal Vision

    Get PDF
    This article tells the story behind the uncovering of the US operated global telecommunications interceptions system now known as ECHELON. It begins with the use of fieldwork techniques in the early 1970's exploring the configuration of Britain's Post Office Towers – these were ostensibly the microwave links through which Britain's long distance telephone calls were made. This modelling process revealed a system within the system of microwave towers linked to the American Base of Menwith Hill in the North York Moors. All the key researchers were then promptly arrested, a raid by Special Branch on the author's university at Lancaster ensued and later a show trail for the other main researchers, most notably Duncan Campbell. Eventually in 1988, Duncan wrote up the ECHELON story, which for its time was an incredible piece of detective work using materials lifted from waste bins by the women activists campaigning around the Menwith Hill Base. Little notice was taken until 1997 when an obscure book by Nicky Hager, Secret Power explained the role and function of ECHELON in more depth. The author represented these findings in a policy report to the European Parliament on the technology of political control that led to a process of political debate and disagreement of the ethics of such a system which continues even today

    From Bureaucracy to Enterprise? The Changing Jobs and Careers of Managers in Telecommunications Service

    Get PDF
    This paper analyzes how organizational restructuring is affecting managerial labor markets. Drawing on field research from several Bell operating companies plus a detailed survey of managers in one company, this paper considers how organizational restructuring affects the employment levels, the nature of work, and the career trajectories of lower and middle level line managers. Does restructuring lead to a loss or managerial power and a convergence in the working conditions of managerial and nonmanagerial workers? Or, conversely, do managers stand to gain from the flattening of hierarchies and devolution of decision-making to lower organizational levels? The paper\u27s central argument is that a new vision of organization has taken hold – one that replaces bureaucracy with enterprise. This vision, however, entails sharp contradictions because it relies on two competing approaches to organizational reform: one that relies on decentralizing management to lower levels to enhance customer responsiveness; the other that relies on reengineering and downsizing to realize scale economies. While the first approach views lower and middle managers as central to competitiveness, the second views them as indirect costs to be minimized. The central question is whether or how the two approaches can be reconciled. The evidence from this case study shows that restructuring has had the unintended consequence of creating new organizational cleavages: between lower and middle level managers on the one hand, and top managers on the other

    A proposed lightweight image encryption using ChaCha with hyperchaotic maps

    Get PDF
    Image encryption plays a pivotal rule in enhancing telecommunications media. Since Privacy is necessary in our daily life in many areas, the personal image will be encrypted when it sent it over the Internet to the recipient to maintain privacy issue. In this paper, the image is encrypted using ChaCha symmetric stream cipher with Hyperchaotic Map. Due to the sensitivity characteristics of initial conditions, pseudo randomness chaotic maps and control parameters in chaotic, Hyperchaotic maps is use, higher security is obtained via using initial seed number, variance of parameters, and unpredictable direction of chaotic. The suggested lightweight image encryption has confirmed robustness contra brute force attacks by providing a massive key space. Furthermore, the suggested lightweight image encryption is eligible to defense from statistical cracking, insecurity of image based on criteria's histogram correlation and entropy

    Collective bargaining centralisation against all odds? The Italian telecommunications industry after market liberalization

    Get PDF
    The widespread trends towards markets liberalisation, decline in trade union power, and flexible work organization were expected to push collective bargaining institutions to converge to a decentralised bargaining structure. This crude version of the neoliberal convergence thesis, however, was not borne out. Instead, change in employment relations has been more nuanced than initially thought. This paper explores the conditions under which centralisation of bargaining is possible, even in a more competitive environment with pressures for greater flexibility. It draws on case study evidence from the Italian telecommunications industry, tracing back the process of liberalisation since the early 1990s. It is shown how the strategies and the coalitions between organised labour, business and the state explain in large part this path of institutional change
    • …
    corecore