20 research outputs found

    Reconstructing communities: the impact of regeneration on community dynamics and processes.

    Get PDF
    The New Labour government placed communities at the heart of urban regeneration policy. Area deprivation and social exclusion were to be addressed through rebuilding community in deprived areas, a process involving tenure diversification and the building of bridging social capital to support community empowerment, increased aspirations and wide-spread mutually supportive relationships. There is, however, little empirical evidence that tenure mix is an effective means for achieving the social goals of neighbourhood renewal. This thesis contributes to the mixed tenure debate by exploring the impact of regeneration on community. The research was guided by theories of social structure and cultural systems and argues that the regeneration process may give rise to social divisions and conflict between community groups, inhibiting culture change. The research was conducted on a social housing estate located within the West Midlands region. The findings represent the views of local residents and community workers and suggest that greater recognition needs to be given to the role intimate social ties play in community sustainability, that the provision of supportive services must be balanced with individual self-efficacy, and that regeneration policy should focus less on what new homeowners can bring to a community and more on what community can already offer

    The

    No full text
    Computer security incidents during the past few years have illustrated tha t unauthorized computer activity does not obey traditional boundaries (e.g., national, network, computer architecture). Instead, such activity frequently crosses these boundaries not just once, but several times per incident [Stoll89]. International cooperation am ong computer security response groups can be an effective means of dealing with computer security issues faced today by the computer user community. This paper addresses the need for such cooperation and suggests methods by which individual computer security response groups can work together internationally to cope with computer security incidents

    Report to the President's Commission on Critical Infrastructure Protection

    No full text
    : This report was submitted to the President's Commission on Critical Infrastructure Protection for their consideration. Based on the experience of the CERT SM Coordination Center, we identify threats to and vulnerabilities of the Internet and estimate the cascade effect that a successful, sustained attack on the Internet would have on the critical national infrastructures set out in Executive Order 13010. Finally, we discuss the implications for public policy and make specific recommendations. 1. Introduction At this writing, government, commercial, and educational organizations depend on computers to such an extent that day-to-day operations are significantly hindered when the computers are "down." Currently many of the day-to-day operations depend upon connections to the Internet, and new connections are continuously being made to the Internet. In July 1996, an estimated 12,900,000 computers worldwide were connected to the Internet, compared with 130,000 in 1989 and 1,000,000 in ..

    Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0

    No full text
    The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) is a framework for identifying and managing information security risks. It defines a comprehensive evaluation method that allows an organization to identify the information assets that are important to the mission of the organization, the threats to those assets, and the vulnerabilities that may expose those assets to the threats. By putting together the information assets, threats, and vulnerabilities, the organization can begin to understand what information is at risk. With this understanding, the organization can design and implement a protection strategy to reduce the overall risk exposure of its information assets
    corecore