577 research outputs found

    CoESS’ Facts and Figures 2013

    Get PDF

    Strengthening Institutions, Functions And Authority The Indonesian National Commission On Human Rights In Implementing The Protection And Enforcement Of Human Rights In Indonesia

    Get PDF
    One of the requirements of state law is the recognition and guarantee of the protection and enforcement of human rights, this guarantee should be included in the constitution in force in a country. To guarantee the implementation of human rights protection and enforcement is then required institutions of human rights protection and enforcement of an effective and independent in exercising its functions and powers guaranteed by the constitution. Powerlessness The Indonesian National Commission on Human Rights in resolving cases of human rights violations to the fullest is inseparable from the question of institutional models that still contains a number of weaknesses. As the issue is still weak independence, functions and authority, inadequate budgets, yet the strong position of the Commission in the state system of Indonesia and the number of members who are not in accordance with the mandate of the law. These issues make the Commission has not so strong when faced with the challenges and complexities of the issues of human rights in Indonesia today. Human Rights on the Second Amendment was included in a separate chapter, Section XA on Human Rights, which includes as many as 10 (ten) articles from Article 28 to Article 28j set out in the 1945 Constitution. However, it should be noted that in Chapter XA on Human Rights on the 1945 changes is no list of institutional/ enforcement institutions Human Rights or The Indonesian National Commission on Human Rights in it, whereas the habit of setting “chapter” in the 1945 Constitution will bear State institutions that govern them. Whereas in some other countries, especially in the Asia Pacific region, where their human rights commission has been set up by a special law, even in Thailand and South Africa is set directly in the constitution. Keywords: Strengthening Institutions, Functions and Authority, The Indonesian National Commission on Human Rights

    Information Systems Control: A Review and Framework for Emerging Information Systems Processes

    Get PDF
    A major stream of information systems (IS) research examines the topic of control, which focuses on attempts to affect employee behavior as a means to achieve organizational objectives. Despite a rich history of IS control research, approximately 90 percent of the publications focus on only three IS processes: managing information systems development, managing IS outsourcing, and managing security. However, the emergence of new IS processes and technologies with distinct control challenges, such as managing enterprise architecture and managing innovation, highlights a need to consider the wider applicability of past control insights. In this paper, we first integrate existing IS control constructs and relationships into a comprehensive IS control model. Second, we apply this model to emerging IS processes to guide future research and practice. We review 65 influential IS control-related journal papers and identify five control dimensions. We then consolidate these dimensions into a single, integrated model to apply past IS control findings to the challenges of emerging information systems by posing a series of related propositions. With this paper, we position current IS control research to be increasingly applicable and relevant to tomorrow’s emerging IS opportunities and challenges

    The assessment of the relationship between information technology (IT) and airport performance

    Get PDF
    The evolution of the airport business is demonstrated by airports that are adopting new business strategies and commercial models, which allow them to be, for example, service providers instead of real-estate managers, with the focus on cost reduction and increasing non-aeronautical (commercial) revenues. Information technology (IT) can be used by airports to achieve their business goals, such as enhancing performance by delivering cost reductions and generating additional revenue streams. Airports operate in an increasingly competitive and dynamic market, with the aim of attracting a larger share of hub traffic from neighbouring airports. Therefore, financial and operational performance will be key elements for airlines when choosing a new airport destination. The research shows that airports are more focused on passenger satisfaction, resulting in airport performance indicators that have the passenger at its operational core and performance targets (e.g. Airport Service Quality passenger satisfaction survey). IT plays an important role in increasing airport performance through the automation of processes such as the deployment of common-use check-in desks and self-service check-in kiosks. Studies of other industries have shown evidence that IT impacts firm performance, but there have been few studies related to the airport industry. Thus, the aim of this research is to assess the relationship between IT and airport performance, and it proposes a conceptual framework to assess the relationship between IT and airport performance by drawing from studies in other industries. Two methodologies were used in this research, the first one was the case study, and the second one was the online survey. The case studies consisted of 16 faceto- face interviews with senior staff representing two airports in Asia, one airport in Australia, and one airport in Europe. The case studies result show that there is a relationship between IT and airport performance ... [cont.]

    Security Challenges from Abuse of Cloud Service Threat

    Get PDF
    Cloud computing is an ever-growing technology that leverages dynamic and versatile provision of computational resources and services. In spite of countless benefits that cloud service has to offer, there is always a security concern for new threats and risks. The paper provides a useful introduction to the rising security issues of Abuse of cloud service threat, which has no standard security measures to mitigate its risks and vulnerabilities. The threat can result an unbearable system gridlock and can make cloud services unavailable or even complete shutdown. The study has identified the potential challenges, as BotNet, BotCloud, Shared Technology Vulnerability and Malicious Insiders, from Abuse of cloud service threat. It has further described the attacking methods, impacts and the reasons due to the identified challenges. The study has evaluated the current available solutions and proposed mitigating security controls for the security risks and challenges from Abuse of cloud services threat

    WP 51 - The distribution of responsibility for social security in Denmark

    Get PDF
    High levels of unemployment, or high levels of social expenditures as well as the growing demand for a flexible labour force have given new impetus to the world-wide discussion on what model to use for an efficiently operating labour market and in particular on the role of institutions. Although there seems to be a growing consensus on the restricted governmental role in recent decades, this has not been translated into a unanimous appraisal of the role of intermediary organisations, such as trade unions. There is no clear view on an appropriate distribution of responsibility between government, social partners and the market. The research project ‘distribution of responsibility for social security’ aims to create a scientific basis for a clear and consistent view on the role and distribution of responsibilities between the different labour market institutions. As part of this research project, this paper provides an elaborate country study of Denmark. It is shown that legislation of unemployment insurance and active labour market policy is set by the national government. Legislation with respect to employment protection, however, is largely left to the social partners, i.e. the dismissal of salaried workers is regulated by a special piece of national law, while the rules for blue-collar workers are defined as part of the negotiations between the social partners. The Danish system of unemployment insurance and active labour market policy is a two-tier system: unemployment insurance for members of unemployment insurance funds and social assistance for non-members. The first tier is basically state-run system, while the second tier is administered by the municipalities. As for the performance of the Danish labour market, participation rates are quite high and although unemployment rates are relatively high and differentiated across groups, this is dominated by short-term unemployment.
    corecore