68,452 research outputs found
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
Governance of Dual-Use Technologies: Theory and Practice
The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologiesânuclear, biological, cyberâthat can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University
Food security, risk management and climate change
This report identifies major constraints to the adaptive capacity of food organisations operating in Australia. This report is about food security, climate change and risk management. Australia has enjoyed an unprecedented level of food security for more than half a century, but there are new uncertainties emerging and it would be unrealistic â if not complacent â to assume the same level of food security will persist simply because of recent history. The project collected data from more than 36 case study organisations (both foreign and local) operating in the Australian food-supply chain, and found that for many businesses, risk management practices require substantial improvement to cope with and exploit the uncertainties that lie ahead. Three risks were identified as major constraints to adaptive capacity of food organisations operating in Australia: risk management practices; an uncertain regulatory environment â itself a result of gaps in risk management; climate change uncertainty and projections about climate change impacts, also related to risk management
Recommended from our members
Feeding Britain: Food Security after Brexit
This Food Brexit Briefing brings together three interlinked issues that demand policy attention as the clock ticks towards Brexit:
1. The question of whether the Government is paying enough attention to agri-food in the negotiating process, given its central role in both public wellbeing and the national economy.
2. The threat a careless Brexit poses to the UKâs short-term food security â and any long-term attempt to develop a genuinely sustainable food strategy for the whole of the UK.
3. The risk generated to the UKâs status as a potential trading partner of the EU by the Food Standards Agencyâs decision to press ahead with major reform of UK food safety regulation, at a time when regulatory stability and clarity have never been more important.
The report was written by FRCâs Professor Tim Lang, with Professor Erik Millstone (Sussex), Tony Lewis (Head of Policy at Chartered Institute for Environmental Health) and Professor Terry Marsden (Cardiff). It takes stock of âfood Brexitâ and argues that a hard Brexit or no-deal Brexit (and retreat to WTO rules) would imperil the sustainability and security of Britainâs food supply.
The report recommends that the Government should:
- Maintain a clear and explicit focus on the potential adverse effects of Brexit on food security in the UK, while negotiating the UKâs future trading relationships with the EU and other jurisdictions.
- Publish Brexit impact studies on the UKâs agricultural and food system for the White Paper and Chequers Statement and any subsequent proposals.
- Ensure that high food standards remain at the heart of any future trade deals.
- Provide clarity on its proposed migration policy, taking account of the contributions that non-UK citizens of the EU are making to the quantity and quality of the UKâs food supply and services.
- Avoid a hard Food Brexit at all costs.The UK must not retreat to a WTO-rules-based regime. The EU would then categorise the UK as a â3rd Countryâ, which could be a recipe for chaos.
- Create a new Sustainable Food Security Strategy. This would engage with the complexities of the food system and the multiple criteria by which it should be evaluated; and identify clear priorities and pathways for progress.
The report also calls on the Food Standards Agency to:
- Address the calls for clarification and evidence posed in the paper in respect of its Regulating Our Future (ROF) Where such clarification or evidence is not available, then the Agency should modify or suspend the introduction of its proposals, at least until after Brexit
An exploratory study in to the money laundering threats, vulnerabilities, and controls within the UK bookmaker sector, with a specific focus on Fixed-Odds Betting Terminals
The purpose of this exploratory study was to generate an understanding in to the money laundering threats, vulnerabilities and controls found within UK betting shops, with a direct focus on the exponential growth of Fixed-Odd Betting Terminals. Qualitative research methods facilitated eight semi-structured interviews with key stakeholders linked to the gambling and/or money laundering sphere. This included the Gambling Commission, Campaign for Fairer Gambling, an ex-Head of Security and Safety at a major bookmaker, and five regular Fixed-Odd Betting Terminal users. The interviews were recorded, transcribed and coded for thematic analysis, subsequently resulting in the emergence of four interesting and meaningful themes. These were (1) Ineffective CDD enforcement facilitating anonymity (2) Weak anti-money laundering safeguards unable to mitigate known threats (3) A lack of anti-money laundering training, awareness, and resources (4) The Gambling Commissionâs attempt for increased anti-money laundering regulation unsuccessful. By allowing a phenomenological framework to guide the data collection process, the interpreted subjective views and experiences of the participants involved, although somewhat limited, indicate that money laundering threats within the bookmaker sector are inherently high, with a lack of effective safeguards in place to mitigate the identified vulnerabilities
Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementIn this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone
uses different devices, IT infrastructures, and applications for various purposes at school,
office, home, hospitals everywhere. With the enlightenment of technology, the nature of
cyber-attack has been changed dramatically, and that is why the number of cyber-attacks
have been increased. Enterprises face billions of Euros loss from such incidents; even the
data loss and operational hazard may have a devastating impact not only on the service,
security, privacy, brand image but also upon overall business. A constrictive and realistic
CSCD (cyber security and cyber defense) strategy along with the proper implementation of
it, can safeguard the enterprises and strongly from cyber attacks. In this paper, we prepare
an improved CSCD control framework based on several hundreds of scientific papers and
frameworks. Moreover, we identify different aspects and strategic elements by holistic CSCD
control risk assessment and data analysis for preparing CSCD strategy and planning of
different levels of organizations to maintain effective CSCD governance and cyber resilience
CYBERSECURITY IN THE HEALTHCARE ENVIRONMENT
Abstract
In 1990 the online world began to take shape when Tim Berners-Lee invented the World Wide Web. Almost simultaneously, cybersecurity was birthed to protect and minimize the various threats including but not limited to worms, viruses, and data breaches. Cybersecurity includes the various technologies, equipment both hardware and software, processes, and procedures that are used to guard against unauthorized attacks or access to protected information.
This paper will focus on cybersecurity as it relates to the healthcare environment. Every department in a healthcare facility is responsible for taking care of patients. This should be their number one priority and information technology is no exception. While IT staff most likely do not provide hands on care to patients, they go to great lengths to protect their personal health information.
In a healthcare environment, there are numerous departments such as Lab, Radiology, and Pharmacy etc. that need to have integrated systems. These systems must also be able to reach the internet and often be accessible to outside/non-employed vendors for support and maintenance.
Also, communication among employees and with the outside world is a must. Email, video conferencing, desktop sharing, and faxing are all used thousands of times a day. It is imperative that cybersecurity be a top priority and everyone holds himself or herself responsible for protecting the systems that allow staff to take care of their patients
- âŠ