333,514 research outputs found
Value-Focused Assessment of Information System Security in Organizations
This paper presents findings of an empirical study of information system (IS) security values adhered to by user managers in a cross section of firms in various industries. Using KeeneyiÌs (1999) value-focused thinking approach, 73 managers were interviewed to identify a set of fundamental and means values that are essential in protecting the information resources of a firm. The findings are used to develop a theoretical framework for conceptualizing individual and organizational issues in managing IS security. The proposed framework will be an appropriate underpinning for the development of an instrument for measuring IS security concerns
An Analysis of Text-Based Authentication using Images in Banking System
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval process, by banking organizations evolves and spreads with the introduction of enhanced communication technologies. Though, this novel business occasion for the provision of banking products and services increases the need for security, especially due to the sensitive nature of the information exchanged. The specific nature of Internet banking systems creates the necessity for focused facts on security issues to be able to successfully demeanor an assessment or security evaluation process. More specifically, the information systems (IS) auditor should have the necessary technical and operational skills and knowledge to carry out the review of the technology employed and risks associated with Internet banking. Following this requirement, this paper presents a novel authentication approach to provide security to the end users. This proposed system, Analysis of Text-Based Authentication using Images in Banking System (ATBAIBS) provides great value in terms of convenience, customer intimacy, time saving, inexpensiveness and coherence in banking sectors
Strengthening Governance of Small-Scale Fisheries: An Initial Assessment of the Theory and Practice
Preferred citation for this report: Basurto, X., Virdin, J., Smith, H. and R. Juskus. 2017. Strengthening Governance of Small-Scale Fisheries: An Initial Assessment of Theory and Practice. Oak Foundation.Often hidden in national statistics, small-scale fisheries have been poorly measured at a global level, and in thepast often ignored in states' policy-making. Yet estimates suggest their aggregate global contribution tonutrition, food security and poverty eradication is massive. The most recent estimates available suggest thatsmall-scale fisheries account for over 90 percent of the world's commercial fishers, processors and otherpersons employed along the value chain, equivalent to over 108 million people. Roughly half areemployed in the ocean and the other half in inland fisheriesâmaking small-scale fisheries far and awaythe ocean's largest employer (greater than oil and gas, shipping, tourism, etc.). This level of activitytranslates into a large portion of the global fish catch: an estimated 46 percent of the total, and 38 percentof the fish caught in the ocean. SSFs are also estimated to provide over half the animal protein intake inmany of the world's least developed countries, and over half of the fish for domestic consumption indeveloping countries more broadly. In sum, in many regions of the world SSFs provide both incomes tohelp reduce poverty and safety nets to help prevent it
The Role of Boards in Reviewing Information Technology Governance (ITG) as Part of Organizational Control Environment Assessments
IT Governance (ITG) is an important topic as US companies must now monitor ITG under the provisions of the Sarbanes-Oxley Act (2002) (Hoffmann, 2003). Trites (2003) indicates that directors are responsible for strategic planning, internal control structures and business risk. The control environment is defined in Australian Auditing Standard AUS 402 to mean "the overall attitude, awareness and actions of management regarding internal control and its importance to the entity". This paper contributes to the knowledge of ITG by forming an integrated ITG Literature (IIL) which links prior research to four key dimensions of ITG. The paper presents a review of literature on ITG performance measurement systems which assess the ability of organizations to achieve these four ITG dimensions. A revised ITG Dimensions Model offered for consideration. The final contribution of the paper is to propose critical issues Boards should consider as part of their assessment of organizational control environments
What's Cooking in Your Food System? A Guide to Community Food Assessment
Learn about Community Food Assessments, a creative way to highlight food-related resources and needs, promote collaboration and community participation, and create lasting change. This Guide includes case studies of nine Community Food Assessments; tips for planning and organizing an assessment; guidance on research methods and strategies for promoting community participation; and ideas for translating an assessment into action for change
Recommended from our members
Trafficking in Persons: U.S. Policy and Issues for Congress
[Excerpt] This report focuses on international and domestic human trafficking and U.S. policy responses, with particular emphasis on the TVPA and its subsequent reauthorizations. The report begins with a description of key TIP-related definitions and an overview of the human trafficking problem. It follows with an overview of major foreign policy responses to international human trafficking. The report then focuses on responses to trafficking into and within the United States, examining relief for trafficking victims in the United States and discussing U.S. law enforcement efforts to combat domestic trafficking. The report concludes with an overview of current anti-trafficking legislation and an analysis of policy issues
Recommended from our members
Border Security: Understanding Threats at U.S. Borders
[Excerpt] The United States confronts a wide array of threats at U.S. borders, ranging from terrorists who may have weapons of mass destruction, to transnational criminals smuggling drugs or counterfeit goods, to unauthorized migrants intending to live and work in the United States. Given this diversity of threats, how may Congress and the Department of Homeland Security (DHS) set border security priorities and allocate scarce enforcement resources?
In general, DHSâs answer to this question is organized around risk management, a process that involves risk assessment and the allocation of resources based on a cost-benefit analysis. This report focuses on the first part of this process by identifying border threats and describing a framework for understanding risks at U.S. borders. DHS employs models to classify threats as relatively high- or low-risk for certain planning and budgeting exercises and to implement certain border security programs. Members of Congress may wish to use similar models to evaluate the costs and benefits of potential border security policies and to allocate border enforcement resources. This report discusses some of the issues involved in modeling border-related threats
Study on cash transfers for seed security in humanitarian settings
This study examines the barriers and opportunities for cash transfers to be used to address seed security in humanitarian situations. Cash, while not a new approach, has gained momentum in recent years, especially with the emergence of the Cash Learning Partnership (CaLP) and humanitarian organizationsâ commitments through the Grand Bargain.2 Historically, direct seed distribution (DSD) has dominated agricultural responses in emergencies. While effective in many situations, other modalities of addressing farmersâ needs have also proven to be effective, including seed and voucher fairs and, increasingly, cash transfer responses. The latter response typically provides farmers greater choices to make decisions about their seed needs and preferences. However, as with direct distribution and vouchers, cash can be a viable option but may not always be appropriate in every situation.
The quality of seed is of paramount importance in choosing a response and has been an ongoing (and often contentious and political) discussion for decades. The results of this study advocate for a multi- stakeholder perspective on the quality of seed, while offering farmers the most flexible and most appropriate response possible for their given situation. In some cases, this will be cash transfers, but certainly not in all cases. A range of options offers the best chance for a successful, responsive, and appropriate program.
The evidence base on outcomes from using cash for seed in humanitarian contexts is limited, however, reviewing a series of examples shows the breadth and range of options that are being explored. The cases from an array of organizations and countries including Iraq, Ethiopia, Nigeria, Uganda, Zambia, Zimbabwe, Malawi, Madagascar, and Guatemala, show that understanding the context is key to the response analysis and the choice of modality. Organizational approaches and previous experience also played a role in the choice of modality. The evidence to date shows that cash, in addition to complementary programming such as technical or business training, offers promise for seed security interventions. In addition, initiatives to support both the demand and supply side of the market have proven to be effective.
Key findings include:
1. Market and needs assessments must include a seed component or SSSA to ensure a response designed to address the right problem, not the assumption. For markets, both informal and formal seed markets need to be included.
2. Good needs assessments, response analysis and program design help ensure participantsâ spending cash on what implementers anticipate they will.
3. Program participantsâ preferences on modalities are not consistently included in response analysis.
4. Mixed modalities (cash and vouchers, or cash and DSD) can broaden crop choices.
5. Quality screenings for seed are taking place; the quality of seed is important to organizations and project participants.
6. Cash for seed security interventions are limited, but growing in prevalence.
7. Providing cash plus complementary support is a promising practice for fostering seed security.
8. The nexus between relief and development is criticalâdesigning projects with a longer-term development view: cash can prepare the way for farmers to continue true market engagement post-relief, spur business development in subsequent seasons, and offer opportunities for financial inclusion.
9. Supporting supply side to bring quality seed markets âcloserâ to project participants should be considered along with demand-side interventions (cash, voucher and other).
10. Investment in preparedness provides a better foundation to implement impactful cash for seed security response.
The risks, mitigating actions, opportunities and enablers for cash and seed security response are also explored. The study concludes with actionable and practical recommendations for further advancing the evidence base, as well as implementation suggestions. Continuous collaboration of key stakeholders in seed systems is essential to advance the discussions and action on the way forward with cash and seed systems
- âŠ