15,242 research outputs found
American Families, Punished for Poverty: The Criminalization of Homelessness in the United States
Criminalization takes a toll, not only on adults, but also on the growing numbers of families, children and unaccompanied youth experiencing homelessness. This issue of Making the Link reviews the increase in families, children and youth experiencing homelessness, describes the criminalization measures increasingly being enacted and enforced against homeless persons and the severe consequences of these measures, and provides policy recommendations
The Link between BPR, Evolutionary Delivery and Evolutionary Development
In this paper we intend to show how the challenges of managing a Business Process Reengineering (BPR) project are consistent with the ones of a Systems Development project. As traditional management techniques were no longer appropriate in the changing business environment, companies employed BPR to achieve elevated business performance. Similarly, as traditional systems development approaches delivered disappointing results, system developers experimented with other models, including Evolutionary Delivery and Evolutionary Development, in order to enable successful technology exploitation by businesses. Both these business and systems initiatives embrace elements of cultural change, management flexibility, empowerment, organisational readiness, and technology introduction in a changing environment. We will present the similarities of the two initiatives and show how progress in one initiative could contribute in the progress of the other
The Necessary Architecture of Self-Regulating Teams
In this paper we present the meaning of self-regulation in Self- Regulating Teams (SRTs) and show the importance of self- regulating teams in a learning organisation. Self-regulating (also known as self-managing) teams guide and perform their own tasks without a visible leader. In the present dynamic business environment, SRTs promise to deliver higher motivation and empowerment to the individuals that participate in them as well as elevated performance and efficiency to the organisations that implement them. However, as management support and change in business culture are prerequisites for the success of SRTs, their implementation is not an easy task. Often, unsuccessful SRTs have been (in our opinion, wrongly) criticized as a source of ambiguity for organisations and as yet another management technique that does not deliver its promises. We start exploring the validity of such a criticism by discussing the shift from a training paradigm to a self- development paradigm in order to draw the picture of a learning organisation as an entity that facilitates learning of all its members and continuously transforms itself as a whole. We continue by showing the contribution that SRTs could make to the process of an organisation that aims to become a learning organisation. In this paper we adopt a cybernetic approach to describe the role of SRTs and to identify the necessary conditions for SRTs to work at all. We present the necessary architecture of SRTs; the architecture that is needed to deliver their promised advantages. We show how Gordon Pasks Conversation Theory could be applied to self-regulating teams and present how learning conversation could provide the framework for successful organisational evolution through team development and team self- regulation. We show how the establishment of such an architecture can lead to a better understanding of self-regulating teams and thus to their successful evolution and development within an organisation. We conclude by stating the implications of our analysis
Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things
Previous generations of safety-related industrial control systems were âair gappedâ. In other words, process control
components including Programmable Logic Controllers (PLCs) and smart sensor/actuators were disconnected and
isolated from local or wide area networks. This provided a degree of protection; attackers needed physical access to
compromise control systems components. Over time this âair gapâ has gradually been eroded. Switches and
gateways have subsequently interfaced industrial protocols, including Profibus and Modbus, so that data can be
drawn from safety-related Operational Technology into enterprise information systems using TCP/IP. Senior
management uses these links to monitor production processes and inform strategic planning. The Industrial Internet
of Things represents another step in this evolution â enabling the coordination of physically distributed resources
from a centralized location. The growing range and sophistication of these interconnections create additional
security concerns for the operation and management of safety-critical systems. This paper uses lessons learned
from recent attacks on Ukrainian critical infrastructures to guide a forensic analysis of an IIoT switch. The intention
is to identify and mitigate vulnerabilities that would enable similar attacks to be replicated across Europe and North
America
Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems
Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition) applications monitor
and control a wide range of safety-related functions. These include energy generation where failures could have
significant, irreversible consequences. They also include the control systems that are used in the manufacture of
safety-related products. In this case bugs in an ICS/SCADA system could introduce flaws in the production of
components that remain undetected before being incorporated into safety-related applications. Industrial Control
Systems, typically, use devices and networks that are very different from conventional IP-based infrastructures.
These differences prevent the re-use of existing cyber-security products in ICS/SCADA environments; the
architectures, file formats and process structures are very different. This paper supports the forensic analysis of
industrial control systems in safety-related applications. In particular, we describe how forensic attack analysis is
used to identify weaknesses in devices so that we can both protect components but also determine the information
that must be analyzed during the aftermath of a cyber-incident. Simulated attacks detect vulnerabilities; a risk-based
approach can then be used to assess the likelihood and impact of any breach. These risk assessments are then used
to justify both immediate and longer-term countermeasures
Geometry of Banach spaces and biorthogonal systems
A separable Banach space X contains isomorphically if and only if X
has a bounded wc_0^*-stable biorthogonal system. The dual of a separable Banach
space X fails the Schur property if and only if X has a bounded
wc_0^*-biorthogonal system
Mixture Models and Convergence Clubs
In this paper we argue that modeling the cross-country distribution of per capita income as a mixture distribution provides a natural framework for the detection of convergence clubs. The framework yields tests for the number of component distributions that are likely to have more power than "bump hunting" tests and includes a natural method of assessing the cross-component immobility necessary to imply a correspondence between components and convergence clubs. Applying the mixture approach to cross-country per capita income data for the period 1960 to 2000 we find evidence of three component densities in each of the nine years that we examine. We find little cross-component mobility and so interpret the multiple mixture components as representing convergence clubs. We document a pronounced tendency for the strength of the bonds between countries and clubs to increase. We show that the well-known "hollowing out" of the middle of the distribution is largely attributable to the increased concentration of the rich countries around their component means. This increased concentration as well as that of the poor countries around their component mean produces a rise in polarization in the distribution over the sample period.
Fixed-Mobile Convergence in the 5G era: From Hybrid Access to Converged Core
The availability of different paths to communicate to a user or device
introduces several benefits, from boosting enduser performance to improving
network utilization. Hybrid access is a first step in enabling convergence of
mobile and fixed networks, however, despite traffic optimization, this approach
is limited as fixed and mobile are still two separate core networks
inter-connected through an aggregation point. On the road to 5G networks, the
design trend is moving towards an aggregated network, where different access
technologies share a common anchor point in the core. This enables further
network optimization in addition to hybrid access, examples are userspecific
policies for aggregation and improved traffic balancing across different
accesses according to user, network, and service context. This paper aims to
discuss the ongoing work around hybrid access and network convergence by
Broadband Forum and 3GPP. We present some testbed results on hybrid access and
analyze some primary performance indicators such as achievable data rates, link
utilization for aggregated traffic and session setup latency. We finally
discuss the future directions for network convergence to enable future
scenarios with enhanced configuration capabilities for fixed and mobile
convergence.Comment: to appear in IEEE Networ
- âŠ