14,662 research outputs found

    American Families, Punished for Poverty: The Criminalization of Homelessness in the United States

    Get PDF
    Criminalization takes a toll, not only on adults, but also on the growing numbers of families, children and unaccompanied youth experiencing homelessness. This issue of Making the Link reviews the increase in families, children and youth experiencing homelessness, describes the criminalization measures increasingly being enacted and enforced against homeless persons and the severe consequences of these measures, and provides policy recommendations

    The Link between BPR, Evolutionary Delivery and Evolutionary Development

    Get PDF
    In this paper we intend to show how the challenges of managing a Business Process Reengineering (BPR) project are consistent with the ones of a Systems Development project. As traditional management techniques were no longer appropriate in the changing business environment, companies employed BPR to achieve elevated business performance. Similarly, as traditional systems development approaches delivered disappointing results, system developers experimented with other models, including Evolutionary Delivery and Evolutionary Development, in order to enable successful technology exploitation by businesses. Both these business and systems initiatives embrace elements of cultural change, management flexibility, empowerment, organisational readiness, and technology introduction in a changing environment. We will present the similarities of the two initiatives and show how progress in one initiative could contribute in the progress of the other

    The Necessary Architecture of Self-Regulating Teams

    Get PDF
    In this paper we present the meaning of self-regulation in Self- Regulating Teams (SRTs) and show the importance of self- regulating teams in a learning organisation. Self-regulating (also known as self-managing) teams guide and perform their own tasks without a visible leader. In the present dynamic business environment, SRTs promise to deliver higher motivation and empowerment to the individuals that participate in them as well as elevated performance and efficiency to the organisations that implement them. However, as management support and change in business culture are prerequisites for the success of SRTs, their implementation is not an easy task. Often, unsuccessful SRTs have been (in our opinion, wrongly) criticized as a source of ambiguity for organisations and as yet another management technique that does not deliver its promises. We start exploring the validity of such a criticism by discussing the shift from a training paradigm to a self- development paradigm in order to draw the picture of a learning organisation as an entity that facilitates learning of all its members and continuously transforms itself as a whole. We continue by showing the contribution that SRTs could make to the process of an organisation that aims to become a learning organisation. In this paper we adopt a cybernetic approach to describe the role of SRTs and to identify the necessary conditions for SRTs to work at all. We present the necessary architecture of SRTs; the architecture that is needed to deliver their promised advantages. We show how Gordon Pasks Conversation Theory could be applied to self-regulating teams and present how learning conversation could provide the framework for successful organisational evolution through team development and team self- regulation. We show how the establishment of such an architecture can lead to a better understanding of self-regulating teams and thus to their successful evolution and development within an organisation. We conclude by stating the implications of our analysis

    Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things

    Get PDF
    Previous generations of safety-related industrial control systems were ‘air gapped’. In other words, process control components including Programmable Logic Controllers (PLCs) and smart sensor/actuators were disconnected and isolated from local or wide area networks. This provided a degree of protection; attackers needed physical access to compromise control systems components. Over time this ‘air gap’ has gradually been eroded. Switches and gateways have subsequently interfaced industrial protocols, including Profibus and Modbus, so that data can be drawn from safety-related Operational Technology into enterprise information systems using TCP/IP. Senior management uses these links to monitor production processes and inform strategic planning. The Industrial Internet of Things represents another step in this evolution – enabling the coordination of physically distributed resources from a centralized location. The growing range and sophistication of these interconnections create additional security concerns for the operation and management of safety-critical systems. This paper uses lessons learned from recent attacks on Ukrainian critical infrastructures to guide a forensic analysis of an IIoT switch. The intention is to identify and mitigate vulnerabilities that would enable similar attacks to be replicated across Europe and North America

    Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems

    Get PDF
    Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition) applications monitor and control a wide range of safety-related functions. These include energy generation where failures could have significant, irreversible consequences. They also include the control systems that are used in the manufacture of safety-related products. In this case bugs in an ICS/SCADA system could introduce flaws in the production of components that remain undetected before being incorporated into safety-related applications. Industrial Control Systems, typically, use devices and networks that are very different from conventional IP-based infrastructures. These differences prevent the re-use of existing cyber-security products in ICS/SCADA environments; the architectures, file formats and process structures are very different. This paper supports the forensic analysis of industrial control systems in safety-related applications. In particular, we describe how forensic attack analysis is used to identify weaknesses in devices so that we can both protect components but also determine the information that must be analyzed during the aftermath of a cyber-incident. Simulated attacks detect vulnerabilities; a risk-based approach can then be used to assess the likelihood and impact of any breach. These risk assessments are then used to justify both immediate and longer-term countermeasures

    Geometry of Banach spaces and biorthogonal systems

    Full text link
    A separable Banach space X contains ℓ1\ell_1 isomorphically if and only if X has a bounded wc_0^*-stable biorthogonal system. The dual of a separable Banach space X fails the Schur property if and only if X has a bounded wc_0^*-biorthogonal system

    Mixture Models and Convergence Clubs

    Get PDF
    In this paper we argue that modeling the cross-country distribution of per capita income as a mixture distribution provides a natural framework for the detection of convergence clubs. The framework yields tests for the number of component distributions that are likely to have more power than "bump hunting" tests and includes a natural method of assessing the cross-component immobility necessary to imply a correspondence between components and convergence clubs. Applying the mixture approach to cross-country per capita income data for the period 1960 to 2000 we find evidence of three component densities in each of the nine years that we examine. We find little cross-component mobility and so interpret the multiple mixture components as representing convergence clubs. We document a pronounced tendency for the strength of the bonds between countries and clubs to increase. We show that the well-known "hollowing out" of the middle of the distribution is largely attributable to the increased concentration of the rich countries around their component means. This increased concentration as well as that of the poor countries around their component mean produces a rise in polarization in the distribution over the sample period.

    Fixed-Mobile Convergence in the 5G era: From Hybrid Access to Converged Core

    Get PDF
    The availability of different paths to communicate to a user or device introduces several benefits, from boosting enduser performance to improving network utilization. Hybrid access is a first step in enabling convergence of mobile and fixed networks, however, despite traffic optimization, this approach is limited as fixed and mobile are still two separate core networks inter-connected through an aggregation point. On the road to 5G networks, the design trend is moving towards an aggregated network, where different access technologies share a common anchor point in the core. This enables further network optimization in addition to hybrid access, examples are userspecific policies for aggregation and improved traffic balancing across different accesses according to user, network, and service context. This paper aims to discuss the ongoing work around hybrid access and network convergence by Broadband Forum and 3GPP. We present some testbed results on hybrid access and analyze some primary performance indicators such as achievable data rates, link utilization for aggregated traffic and session setup latency. We finally discuss the future directions for network convergence to enable future scenarios with enhanced configuration capabilities for fixed and mobile convergence.Comment: to appear in IEEE Networ
    • 

    corecore